aboutsummaryrefslogtreecommitdiff
BranchCommit messageAuthorAge
auth/implement-authorization-code-flowauth: Implement "Authorization Code Flow"Frederick Muriuki Muriithi23 months
data-access-levels-endpointauth: Unlink data from resourcesFrederick Muriuki Muriithi25 months
feature/autocomplete-generationinit commitAlexander_Kabui24 months
feature/lmdb-rustadd lmdb rust caller functionAlexander_Kabui22 months
gn-guileAdded commentPjotr Prins20 months
lunaRunning luna in containerGN3 production2 years
mainAdd rdf-tests after the check phase.Munyoki Kilyungi6 months
migrate-to-python3.10Fix linting errors caused by bump to Python 3.10Frederick Muriuki Muriithi21 months
oauth2_auth_flowauth: implement OAuth2 flow.Frederick Muriuki Muriithi2 years
rework-genotype-linkingRework genenetwork linkingFrederick Muriuki Muriithi22 months
[...]
 
 
AgeCommit messageAuthor
2023-05-09auth: Implement "Authorization Code Flow"•••Implement the "Authorization Code Flow" for the authentication of users. * gn3/auth/authentication/oauth2/grants/authorisation_code_grant.py: query and save the authorisation code. * gn3/auth/authentication/oauth2/models/authorization_code.py: Implement the `AuthorisationCode` model * gn3/auth/authentication/oauth2/models/oauth2client.py: Fix typo * gn3/auth/authentication/oauth2/server.py: Register the `AuthorisationCodeGrant` grant with the server. * gn3/auth/authentication/oauth2/views.py: Implement `/authorise` endpoint * gn3/templates/base.html: New HTML Templates of authorisation UI * gn3/templates/common-macros.html: New HTML Templates of authorisation UI * gn3/templates/oauth2/authorise-user.html: New HTML Templates of authorisation UI * main.py: Allow both "code" and "token" response types. auth/implement-authorization-code-flowFrederick Muriuki Muriithi
2023-04-27auth: Retrieve `system:*` privileges from resource roles•••With the assignment of `system:*` privileges to roles, we need to check for their existence when doing authorisation. This commit provides a hack for that, seeing as user groups (and the system itself) are not treated as resources, and therefore the way to fetch the privileges is not entirely consistent. Frederick Muriuki Muriithi
2023-04-27auth: List also the non-resource privileges the user has•••While creating new group roles, enable the listing of non-resource privileges, e.g. `system:group:*` and `system:user:*` that the user has to allow for them to be used in role creation. Frederick Muriuki Muriithi
2023-04-27auth: Add authorisation checks for role editting.Frederick Muriuki Muriithi
2023-04-27oauth2: Provide missing `user_editable` argument.Frederick Muriuki Muriithi
2023-04-25auth: bug: Provide missing `user_editable` argument.Frederick Muriuki Muriithi
2023-04-25auth: provide `user_editable` flag in dictified outputFrederick Muriuki Muriithi
2023-04-25auth: Roles: Check for editability•••Some roles should not be user-editable, and as such, we need to check before allowing any edits on such roles. This commit makes that possible. Frederick Muriuki Muriithi
2023-04-24auth: Return the actual privileges for the user•••Previously, the `oauth2/data/authorisation` endpoint was returning hard-coded values for the privileges assigned to the user for each resource. In this change, we rework to return the actual privileges for the user. Frederick Muriuki Muriithi
2023-04-21logging: Set LOG LEVEL on root logger to enable logsFrederick Muriuki Muriithi
[...]