Branch | Commit message | Author | Age |
auth/implement-authorization-code-flow | auth: Implement "Authorization Code Flow" | Frederick Muriuki Muriithi | 23 months |
data-access-levels-endpoint | auth: Unlink data from resources | Frederick Muriuki Muriithi | 25 months |
feature/autocomplete-generation | init commit | Alexander_Kabui | 24 months |
feature/lmdb-rust | add lmdb rust caller function | Alexander_Kabui | 22 months |
gn-guile | Added comment | Pjotr Prins | 20 months |
luna | Running luna in container | GN3 production | 2 years |
main | Add rdf-tests after the check phase. | Munyoki Kilyungi | 6 months |
migrate-to-python3.10 | Fix linting errors caused by bump to Python 3.10 | Frederick Muriuki Muriithi | 21 months |
oauth2_auth_flow | auth: implement OAuth2 flow. | Frederick Muriuki Muriithi | 2 years |
rework-genotype-linking | Rework genenetwork linking | Frederick Muriuki Muriithi | 22 months |
[...] |
|
|
Age | Commit message | Author |
2023-05-09 | auth: Implement "Authorization Code Flow"•••Implement the "Authorization Code Flow" for the authentication of users.
* gn3/auth/authentication/oauth2/grants/authorisation_code_grant.py: query and
save the authorisation code.
* gn3/auth/authentication/oauth2/models/authorization_code.py: Implement the
`AuthorisationCode` model
* gn3/auth/authentication/oauth2/models/oauth2client.py: Fix typo
* gn3/auth/authentication/oauth2/server.py: Register the
`AuthorisationCodeGrant` grant with the server.
* gn3/auth/authentication/oauth2/views.py: Implement `/authorise` endpoint
* gn3/templates/base.html: New HTML Templates of authorisation UI
* gn3/templates/common-macros.html: New HTML Templates of authorisation UI
* gn3/templates/oauth2/authorise-user.html: New HTML Templates of
authorisation UI
* main.py: Allow both "code" and "token" response types.
auth/implement-authorization-code-flow | Frederick Muriuki Muriithi |
2023-04-27 | auth: Retrieve `system:*` privileges from resource roles•••With the assignment of `system:*` privileges to roles, we need to check for
their existence when doing authorisation.
This commit provides a hack for that, seeing as user groups (and the system
itself) are not treated as resources, and therefore the way to fetch the
privileges is not entirely consistent.
| Frederick Muriuki Muriithi |
2023-04-27 | auth: List also the non-resource privileges the user has•••While creating new group roles, enable the listing of non-resource privileges,
e.g. `system:group:*` and `system:user:*` that the user has to allow for them
to be used in role creation.
| Frederick Muriuki Muriithi |
2023-04-27 | auth: Add authorisation checks for role editting. | Frederick Muriuki Muriithi |
2023-04-27 | oauth2: Provide missing `user_editable` argument. | Frederick Muriuki Muriithi |
2023-04-25 | auth: bug: Provide missing `user_editable` argument. | Frederick Muriuki Muriithi |
2023-04-25 | auth: provide `user_editable` flag in dictified output | Frederick Muriuki Muriithi |
2023-04-25 | auth: Roles: Check for editability•••Some roles should not be user-editable, and as such, we need to check before
allowing any edits on such roles. This commit makes that possible.
| Frederick Muriuki Muriithi |
2023-04-24 | auth: Return the actual privileges for the user•••Previously, the `oauth2/data/authorisation` endpoint was returning hard-coded
values for the privileges assigned to the user for each resource. In this
change, we rework to return the actual privileges for the user.
| Frederick Muriuki Muriithi |
2023-04-21 | logging: Set LOG LEVEL on root logger to enable logs | Frederick Muriuki Muriithi |
[...] |