Age | Commit message (Collapse) | Author | |
---|---|---|---|
2024-06-07 | Update role assignment: user resource_roles table | Frederick Muriuki Muriithi | |
We no longer use the group_roles table, and have moved to the less privilege-escalation-prone resource_roles table. This commit updates the queries to use the newer resource_roles table. | |||
2024-06-07 | migration: Drop `group_roles` db table. | Frederick Muriuki Muriithi | |
2024-06-06 | migration: Create `resource_roles` db table | Frederick Muriuki Muriithi | |
2024-06-06 | migration: Move role-manipulation privileges from group to resources | Frederick Muriuki Muriithi | |
Attach the role-manipulation privileges to the resource rather than the group, because the roles actually act on the resource itself - thus each role needs to track which resource it acts on. | |||
2024-06-06 | Add deprecation warning to /group-privileges endpoint function. | Frederick Muriuki Muriithi | |
2024-06-05 | Bug: Point to correct key to avoid errors | Frederick Muriuki Muriithi | |
2024-06-04 | Approximate the GN2 look-and-feel. | Frederick Muriuki Muriithi | |
2024-06-04 | auth: scope: Remove confusing UI elements | Frederick Muriuki Muriithi | |
2024-06-04 | Update system name from GeneNetwork3 to gn-auth | Frederick Muriuki Muriithi | |
2024-06-04 | Update email styling and text. | Frederick Muriuki Muriithi | |
2024-06-04 | Redirect appropriately when verifying emails. | Frederick Muriuki Muriithi | |
2024-06-03 | Raise explicit error messages for more graceful handling.enable-sending-emails | Frederick Muriuki Muriithi | |
2024-06-03 | Log out emails in debug mode. | Frederick Muriuki Muriithi | |
Log out emails sent when the application is in debug mode to help with maintenance efforts. | |||
2024-06-03 | Handle unverified emails | Frederick Muriuki Muriithi | |
If a user provides the correct credentials to login, but they are unverified, redirect them to the email verification page, where they are provided with a chance to verify their email, or send a new verification code. | |||
2024-06-03 | Update docs on launching the application. | Frederick Muriuki Muriithi | |
2024-06-03 | Provide endpoint for verification and do verification | Frederick Muriuki Muriithi | |
2024-06-03 | Send verification email on registration. | Frederick Muriuki Muriithi | |
2024-06-03 | Use asdict(...) | Frederick Muriuki Muriithi | |
Use dataclasses.asdict function to generate the dict that will be used for the response rather than building it up manually. | |||
2024-06-03 | Move user creation from db resultset into static method | Frederick Muriuki Muriithi | |
Creation of a User object from the database resultset will mostly be the same. This commit moves the repetitive code into a static method that can be called wherever we need it. This improves maintainability, since we only ever need to do an update in one place now. | |||
2024-06-03 | Save the creation date and verification status. | Frederick Muriuki Muriithi | |
2024-06-03 | Update db schema to allow user verification. | Frederick Muriuki Muriithi | |
2024-06-03 | Initialise default email settings for the application. | Frederick Muriuki Muriithi | |
2024-06-03 | Set module for sending emails. | Frederick Muriuki Muriithi | |
2024-05-29 | Remove unused import. | Frederick Muriuki Muriithi | |
2024-05-29 | Revert "jwt: add user roles to the jwt token." | Frederick Muriuki Muriithi | |
This reverts commit 0582565fa7db4b95e86fb0dde8d83e3170e566a7. Adding the user roles to the token makes the token ridiculously large. Rather than doing that, we'll use an endpoint on the auth server to get the user roles and privileges instead. | |||
2024-05-24 | Revoke refresh token, and all its children. | Frederick Muriuki Muriithi | |
2024-05-24 | Check whether a refresh token has been used before | Frederick Muriuki Muriithi | |
Check whether a refresh token has been used before using it to generate a new JWT token. If the refresh token has been used previously, it should be revoked, and an error raised. As of this commit the actual revocation process hasn't been implemented. | |||
2024-05-24 | Linting: reorganise imports. | Frederick Muriuki Muriithi | |
2024-05-24 | Use monads consistently to reduce chances of errors. | Frederick Muriuki Muriithi | |
2024-05-23 | jwt: add user roles to the jwt token. | Frederick Muriuki Muriithi | |
2024-05-13 | Skip "PasswordGrant" tests. | Frederick Muriuki Muriithi | |
2024-05-13 | Provide missing `CLIENTS_SSL_PUBLIC_KEYS_DIR` config for tests. | Frederick Muriuki Muriithi | |
2024-05-13 | Fix myriad of linting error | Frederick Muriuki Muriithi | |
These linting errors can't be rebased into the newer commits. | |||
2024-05-13 | Link old refresh token to newly issued refresh token | Frederick Muriuki Muriithi | |
We need to track the "lineage" of refresh tokens in order to detect possible stolen tokens and mitigate damage. | |||
2024-05-13 | Register the RefreshTokenGrant with the server | Frederick Muriuki Muriithi | |
Register the RefreshTokenGrant with the server to enable refreshing of the tokens. | |||
2024-05-13 | Use None as default for expires_in | Frederick Muriuki Muriithi | |
2024-05-13 | Save refresh token when it is generated. | Frederick Muriuki Muriithi | |
2024-05-13 | Save token with same ID as JWT's "jti" value. | Frederick Muriuki Muriithi | |
2024-05-13 | Initialise JWTRefreshToken model | Frederick Muriuki Muriithi | |
Add a model for the JWT refresh tokens. | |||
2024-05-09 | Refresh tokens: Create db schema. | Frederick Muriuki Muriithi | |
2024-05-06 | Add `jti` claim | Frederick Muriuki Muriithi | |
Have each JWT token have a `jti` claim (JWT ID) to help with tracking refreshes, and therefore validity of the JWTs. If a refresh token is used more than once, then that refresh token, and all its progeny/descendants are considered invalid, since that token could have been stolen. | |||
2024-05-02 | Include refresh tokens with generated JWT | Frederick Muriuki Muriithi | |
This shim enables us to have a refresh token with the JWT. This might not be the way to refresh JWTs - this is because the `authlib.oauth2.rfc7523.token.JWTBearerTokenGenerator.__call__(…)` method has a comment that states: # there is absolutely no refresh token in JWT format Searching on the internet, however, seems to indicate that JWTs can be used in conjunction with refresh tokens... We need to verify this and fix this if necessary. | |||
2024-05-02 | Delete a client's public key. | Frederick Muriuki Muriithi | |
2024-05-02 | Improve UI look-and-feel. | Frederick Muriuki Muriithi | |
2024-05-02 | Register a client's public key(s). | Frederick Muriuki Muriithi | |
2024-05-02 | Compute and cache the client's KeySet. | Frederick Muriuki Muriithi | |
2024-05-02 | Provide missing client name. | Frederick Muriuki Muriithi | |
2024-05-02 | Fix editing of grant_types | Frederick Muriuki Muriithi | |
This commit makes the values for the grant types dynamic, enabling adding and/or removing of supported grant types. The editing was not updating the grant type values correctly either - we update the metadata key from "grants" to "grant_types" to fix that. | |||
2024-05-02 | Use same name as register-client form | Frederick Muriuki Muriithi | |
2024-05-02 | Make registration of grant-types more flexible. | Frederick Muriuki Muriithi | |