Branch | Commit message | Author | Age | |
---|---|---|---|---|
auth/implement-authorization-code-flow | auth: Implement "Authorization Code Flow" | Frederick Muriuki Muriithi | 2 years | |
data-access-levels-endpoint | auth: Unlink data from resources | Frederick Muriuki Muriithi | 2 years | |
feature/autocomplete-generation | init commit | Alexander_Kabui | 2 years | |
feature/lmdb-rust | add lmdb rust caller function | Alexander_Kabui | 2 years | |
gn-guile | Added comment | Pjotr Prins | 23 months | |
luna | Running luna in container | GN3 production | 3 years | |
main | Add rdf-tests after the check phase. | Munyoki Kilyungi | 9 months | |
migrate-to-python3.10 | Fix linting errors caused by bump to Python 3.10 | Frederick Muriuki Muriithi | 2 years | |
oauth2_auth_flow | auth: implement OAuth2 flow. | Frederick Muriuki Muriithi | 3 years | |
rework-genotype-linking | Rework genenetwork linking | Frederick Muriuki Muriithi | 2 years | |
[...] | ||||
Age | Commit message | Author | ||
2023-05-09 | auth: Implement "Authorization Code Flow"•••Implement the "Authorization Code Flow" for the authentication of users. * gn3/auth/authentication/oauth2/grants/authorisation_code_grant.py: query and save the authorisation code. * gn3/auth/authentication/oauth2/models/authorization_code.py: Implement the `AuthorisationCode` model * gn3/auth/authentication/oauth2/models/oauth2client.py: Fix typo * gn3/auth/authentication/oauth2/server.py: Register the `AuthorisationCodeGrant` grant with the server. * gn3/auth/authentication/oauth2/views.py: Implement `/authorise` endpoint * gn3/templates/base.html: New HTML Templates of authorisation UI * gn3/templates/common-macros.html: New HTML Templates of authorisation UI * gn3/templates/oauth2/authorise-user.html: New HTML Templates of authorisation UI * main.py: Allow both "code" and "token" response types. auth/implement-authorization-code-flow | Frederick Muriuki Muriithi | ||
2023-04-27 | auth: Retrieve `system:*` privileges from resource roles•••With the assignment of `system:*` privileges to roles, we need to check for their existence when doing authorisation. This commit provides a hack for that, seeing as user groups (and the system itself) are not treated as resources, and therefore the way to fetch the privileges is not entirely consistent. | Frederick Muriuki Muriithi | ||
2023-04-27 | auth: List also the non-resource privileges the user has•••While creating new group roles, enable the listing of non-resource privileges, e.g. `system:group:*` and `system:user:*` that the user has to allow for them to be used in role creation. | Frederick Muriuki Muriithi | ||
2023-04-27 | auth: Add authorisation checks for role editting. | Frederick Muriuki Muriithi | ||
2023-04-27 | oauth2: Provide missing `user_editable` argument. | Frederick Muriuki Muriithi | ||
2023-04-25 | auth: bug: Provide missing `user_editable` argument. | Frederick Muriuki Muriithi | ||
2023-04-25 | auth: provide `user_editable` flag in dictified output | Frederick Muriuki Muriithi | ||
2023-04-25 | auth: Roles: Check for editability•••Some roles should not be user-editable, and as such, we need to check before allowing any edits on such roles. This commit makes that possible. | Frederick Muriuki Muriithi | ||
2023-04-24 | auth: Return the actual privileges for the user•••Previously, the `oauth2/data/authorisation` endpoint was returning hard-coded values for the privileges assigned to the user for each resource. In this change, we rework to return the actual privileges for the user. | Frederick Muriuki Muriithi | ||
2023-04-21 | logging: Set LOG LEVEL on root logger to enable logs | Frederick Muriuki Muriithi | ||
[...] |