about summary refs log tree commit diff
AgeCommit message (Collapse)Author
2026-03-11Resources: make-public: Assign new privilege to data curator role. HEAD mainFrederick Muriuki Muriithi
2026-03-11Resources: make-public: Create new privilege.Frederick Muriuki Muriithi
Create the new 'system:resource:make-public' privilege to be used to restrict the ability of users to make their resources accessible by the general public.
2026-03-11Assign 'systemwide-docs-editor' role to sysadmins.Frederick Muriuki Muriithi
2026-03-11Assign 'system:documentation:edit' privilege to 'systemwide-docs-editor' role.Frederick Muriuki Muriithi
2026-03-11Create the 'systemwide-docs-editor' role.Frederick Muriuki Muriithi
2026-03-11Documention Edit: Add new privilege.Frederick Muriuki Muriithi
Add a privilege to restrict ability to edit documentation that comes with the Genenetwork system.
2026-02-10Check only for the base URL and path.Frederick Muriuki Muriithi
To allow the client to pass flags to the redirect_uri that the authorisation server has no interest in, check that only the "base" url (protocol, hostname/netlog and path) are registered, ignoring any query and fragment parameters.
2026-02-10Bug: Fix import path.Frederick Muriuki Muriithi
2026-02-10Setup correct flash message classes.Frederick Muriuki Muriithi
2026-02-10Authorisation Check: New function to check user has edit access.Frederick Muriuki Muriithi
2026-02-10Authorisation Check: New function to check user has view access.Frederick Muriuki Muriithi
2026-02-10Use Auth function that checks for delete access.Frederick Muriuki Muriithi
2026-02-10Authorisation Check: New function to check user has delete access.Frederick Muriuki Muriithi
2026-02-06Use AuthorisationError to indicate error condition.Frederick Muriuki Muriithi
2026-02-06Replace hard-coded email check with check against privilegesFrederick Muriuki Muriithi
Fix the check: rather than using a hard-coded email to check for authorisation, we instead check against the privileges the user has on the resource, or whether they have global privileges allowing them to act on any data.
2026-02-06Fetch a single resource ID: delete data from one resource at a time.Frederick Muriuki Muriithi
2026-02-06Add new 'systemwide-data-curator' role.Frederick Muriuki Muriithi
Add a new role named 'systemwide-data-curator' that is able to edit and/or delete any data on the system regardless of who own it.
2026-01-30Add placeholder check for privilegesFrederick Muriuki Muriithi
For now, only one user is allowed to delete data from Genenetwork. To get the code online as quickly as possible, in order to test out the system, I have elected to do a quick and dirty check that prevents everyone except @acenteno from being able to delete data from the system. To fix this, I'll need to actually implement (a) new role(s) to grant certain users special permissions on **ALL** the data in the system regardless of who owns it.
2026-01-28Reapply "Channel - guix-bioinformatics: Upgrade to commit 9b0955f."Frederick Muriuki Muriithi
This reverts commit 47e025d91330f40ccffe56a17c57f62bbea70b55.
2026-01-28Channels: Fix commits of upstream channels to prevent build failuresFrederick Muriuki Muriithi
* guix-past: Fix to commit 473c942. * guix-rust-past-crates: Fix to commit b8b7ffb.
2026-01-28Revert "Channel - guix-bioinformatics: Upgrade to commit 9b0955f."Frederick Muriuki Muriithi
The guix-bioinformatics commit 9b0955f leads to a cascade of breakages. I am thus reverting this commit to restore a previous sane state. This reverts commit 254ded2ec5fb412c2ba33a72f72bbed29fb7d9bc.
2026-01-28Channel - guix-bioinformatics: Upgrade to commit 9b0955f.Frederick Muriuki Muriithi
Update the commit for the guix bioinformatics channel to fit in with @mbonz update at https://git.genenetwork.org/gn-machines/commit/?id=04c2a18f615bc0a387235544433989af2e8cb62b
2026-01-27Leave notes for tasks that need doing.Frederick Muriuki Muriithi
2026-01-27Proof-of-concept: Delete linked phenotype data.Frederick Muriuki Muriithi
2026-01-27Simplify relative import.Frederick Muriuki Muriithi
2025-12-29`system_resource(...)` function takes either connection or cursorFrederick Muriuki Muriithi
Refactor to allow the `gn_auth.auth.authorisation.resources.system.models.system_resource` function to take either a database connection or cursor and use that to retrieve the "system resource".
2025-12-29`create_resource(...)` function takes either connection or cursorFrederick Muriuki Muriithi
Refactor to allow the `gn_auth.auth.authorisation.resources.models.create_resource` function to take either a database connection or cursor to perform its tasks.
2025-12-15Fix issues caught by mypy.Frederick Muriuki Muriithi
2025-12-15Explicitly include all channel dependencies.Frederick Muriuki Muriithi
There's a bug in guix where if we declare a that channel C depends on channel B, and channel B happens to rely on channel A, then channel A is not propagated for C, leading to build failures.
2025-12-15Trigger BuildFrederick Muriuki Muriithi
2025-12-15Update channel dependencies: Use only `gn-machines`.Frederick Muriuki Muriithi
2025-12-15Revert "Add pinned 'guix channel to gn-auth's channel."Frederick Muriuki Muriithi
This reverts commit bb56c3d6a1bb2c9d4b3a94750a9049bcdf9cbc29. We do not pin the channel dependencies here — we pin the channel dependencies at the point of use, a.k.a gn-machines.
2025-12-15Use package definition in gn-machinesFrederick Muriuki Muriithi
Use the package definition in gn-machines rather than that in guix-bioinformatics in order to ensure that we have the latest dependencies.
2025-12-09Add pinned 'guix channel to gn-auth's channel.Munyoki Kilyungi
Signed-off-by: Munyoki Kilyungi <me@bonfacemunyoki.com>
2025-12-03Improve error messaging.Frederick Muriuki Muriithi
2025-12-03Add endpoint for getting user details, given user IDzsloan
2025-11-11Update channels.Munyoki Kilyungi
Signed-off-by: Munyoki Kilyungi <me@bonfacemunyoki.com>
2025-10-06flask-cors: Remove minimum version pinning.Frederick Muriuki Muriithi
The build was failing with ``` ContextualVersionConflict(flask-cors 0.0.1 ... Requirement.parse('flask-cors>=3.0.9'), {'gn-auth'}) ```
2025-07-31Clean up data on group deletion.Frederick Muriuki Muriithi
2025-07-31Re-grant access to sysadmin, in case they're removed as group memberFrederick Muriuki Muriithi
2025-07-31Revoke roles a user has on group when they are removed as a member.Frederick Muriuki Muriithi
2025-07-31Check for data inconsistency.Frederick Muriuki Muriithi
2025-07-31Prevent error in case sysadmin user already has accessFrederick Muriuki Muriithi
In case any sysadmin user has access to the resource, we do not want the query failing for other sysadmins.
2025-07-31Grant sysadmins access to user group when its created.Frederick Muriuki Muriithi
2025-07-31Add type-hinting to the top-level exception handler.Frederick Muriuki Muriithi
2025-07-31Set HTTP response code from the exception if present.Frederick Muriuki Muriithi
2025-07-31Delete a group.Frederick Muriuki Muriithi
2025-07-31Break circular dependency - move utility function to module of use.Frederick Muriuki Muriithi
2025-07-31Add function to retrieve inbredset-group data.Frederick Muriuki Muriithi
2025-07-31Fix query to remove user from group.Frederick Muriuki Muriithi