Johannes Zellner
aa693e529b
Only list apps where a user has access to
2016-02-25 12:20:11 +01:00
Johannes Zellner
63013c7297
Just check for .admin flag in the user object
2016-02-25 11:42:25 +01:00
Johannes Zellner
c8db6419d8
Admins are not special cased in apps.js app listing
...
This is done in the route
2016-02-25 11:41:14 +01:00
Johannes Zellner
93c1ddd982
Always amend the admin flag for further use
2016-02-25 11:40:48 +01:00
Johannes Zellner
df102ec374
Add basic getAllByUser() app tests
2016-02-25 11:28:45 +01:00
Johannes Zellner
9688e4c124
Add apps.getAllByUser()
2016-02-25 11:28:29 +01:00
Johannes Zellner
0fb44bfbc1
Forward the error.message instead of making a new Error object
...
That leads to only Internal Error
2016-02-24 18:12:31 +01:00
Johannes Zellner
c167bd8996
Set error in installationProgress also on uninstallation errors
2016-02-24 17:53:21 +01:00
Johannes Zellner
a3737c3797
Report access denied errors in route53 backend
2016-02-23 17:29:28 +01:00
Johannes Zellner
86f14b0149
Thanks JS for being so value focused...
2016-02-19 17:23:09 +01:00
Johannes Zellner
81bd4f2ea5
Remove console.log()
2016-02-19 16:29:40 +01:00
Johannes Zellner
351ddcb218
Fixup the unit tests
2016-02-19 16:29:29 +01:00
Johannes Zellner
dd18f9741a
Dynamically detect oauth proxy needs in apptask
2016-02-19 16:18:47 +01:00
Johannes Zellner
cdce6e605d
Adjust to new apps api
2016-02-19 16:14:02 +01:00
Johannes Zellner
d4480ec407
Remove oauthProxy usage in the database wrapper
2016-02-19 16:12:58 +01:00
Johannes Zellner
85c92ab0b4
Remove oauthProxy from the apps.js api
2016-02-19 16:07:49 +01:00
Johannes Zellner
230c24d6c6
Adjust the route unit tests, to remove oauthProxy
2016-02-19 16:01:08 +01:00
Johannes Zellner
eab3bda8e1
Remove oauthProxy from the apps rest routes
2016-02-19 15:54:01 +01:00
Johannes Zellner
f731c1ed0b
Dynamically detect if an oauth proxy should be used for an app
2016-02-19 15:44:15 +01:00
Johannes Zellner
edec3601f4
Do not rely on oauthProxy property of app object in nginx configuration code
2016-02-19 15:43:39 +01:00
Johannes Zellner
9e87fd0440
Add apps.requiresOAuthProxy()
2016-02-19 15:03:36 +01:00
Johannes Zellner
deb30e440a
Disable ejs debug flag
2016-02-18 18:00:23 +01:00
Johannes Zellner
86ef9074b1
Add access restriction tests for ldap auth
2016-02-18 17:40:53 +01:00
Johannes Zellner
1a13128ae1
Ensure accessRestriction is either an object or an empty string
2016-02-18 17:28:00 +01:00
Johannes Zellner
b41642552d
The ldap property is part of req.connection
2016-02-18 16:40:30 +01:00
Johannes Zellner
b0d11ddcab
Adhere to access control on ldap user bind
2016-02-18 16:04:53 +01:00
Johannes Zellner
804464c304
Add apps.getByIpAddress()
2016-02-18 15:43:46 +01:00
Johannes Zellner
ecf7f442ba
Add docker.getContainerIdByIp()
2016-02-18 15:39:27 +01:00
Johannes Zellner
9ddd3aeb07
Show app id and fix naked domain in debugApp()
2016-02-18 12:51:25 +01:00
Johannes Zellner
9bf1fe3b7d
Show naked_domain for healthtask summary
2016-02-14 17:42:52 +01:00
Johannes Zellner
5f96d862ab
Move default memory limit to constants.js
2016-02-14 12:13:49 +01:00
Johannes Zellner
79199bf023
Ensure we stash and restore the memoryLimit
2016-02-14 12:10:22 +01:00
girish@cloudron.io
beec4dddca
my -> our
2016-02-13 11:22:47 -08:00
Johannes Zellner
754e33af2a
do not allow removing the admin group
2016-02-13 12:42:41 +01:00
Johannes Zellner
63cab7d751
Allow non-empty groups to be deleted
2016-02-13 12:42:41 +01:00
girish@cloudron.io
5669d387af
check app state before exec
2016-02-12 12:32:58 -08:00
Johannes Zellner
957f20a9a8
Always store the memory limit in the app db record and adjust on update if needed
2016-02-11 18:14:16 +01:00
Johannes Zellner
71bfc1cbda
Ensure we never go below minimum memoryLimit
2016-02-11 18:13:42 +01:00
Johannes Zellner
489ea3a980
Add memoryLimit validation
2016-02-11 17:39:15 +01:00
Johannes Zellner
75d22d7988
Introduce memoryLimit to apps routes
2016-02-11 17:00:21 +01:00
Johannes Zellner
5643d49bef
Check if user deletion actually affected a row
2016-02-11 12:07:43 +01:00
Johannes Zellner
81ec26e45c
Ensure we can delete users which belong to a group
2016-02-11 12:02:35 +01:00
Johannes Zellner
72c5ebcc06
Add user api tests for adding/removing from admin group
2016-02-11 11:39:19 +01:00
Johannes Zellner
ecf7575dd3
UserError.NOT_ALLOWED is not unused
2016-02-11 11:32:48 +01:00
Johannes Zellner
98a7f44dc1
Check for last admin not required anymore
...
This is now prevented by the fact that an admin
cannot remove itself from the admin group. There
remains a race, just like before, where two admins could
trigger an admin group removal of the other admin in parallel
and the calls are in a state after admin flag check of
the used tokens. This can only be prevented with a db constraint
in the end.
2016-02-11 11:30:21 +01:00
Johannes Zellner
5fce9c8d1f
Do not allow an admin remove itself from admins group
2016-02-11 11:29:04 +01:00
Johannes Zellner
0ea89fccb8
Remove admin api route tests
2016-02-11 11:26:35 +01:00
Johannes Zellner
2c2922d725
Make tests succeed for now
...
We still have to bring back the sending of email when admins are changed
2016-02-11 11:26:35 +01:00
Johannes Zellner
fbeefeca7d
setGroups() has no result
2016-02-11 11:26:35 +01:00
Johannes Zellner
163ceef527
Remove the admin toggle route
2016-02-11 11:26:35 +01:00