Girish Ramakrishnan
e49b57294d
Give optional name for tokens
2018-08-27 14:59:52 -07:00
Girish Ramakrishnan
b4c9f64721
Issue token on password reset and setup
2018-08-21 18:42:18 -07:00
Girish Ramakrishnan
f7a7e4e95a
Fix text in account setup screen
2018-08-05 21:58:07 -07:00
Girish Ramakrishnan
38977858aa
When issuing token intersect with the existing user roles
...
Also:
* Move token validation to accesscontrol.js
* Use clients.addTokenByUserId everywhere
2018-06-28 00:07:43 -07:00
Girish Ramakrishnan
ce4424d115
debug out the scope
2018-06-27 13:54:10 -07:00
Girish Ramakrishnan
b6b7d08af3
Rename to accesscontrol.canonicalScopeString
2018-06-17 22:43:42 -07:00
Girish Ramakrishnan
c3631350cf
We can skip user.scope here since we will intersect at access time anyway
2018-06-17 15:11:10 -07:00
Girish Ramakrishnan
669a1498aa
Do not dump token in logs
2018-06-17 15:01:42 -07:00
Girish Ramakrishnan
858ffcec72
Add note
2018-06-15 17:04:18 -07:00
Girish Ramakrishnan
05a8911cca
condense the comments
2018-06-15 16:56:35 -07:00
Girish Ramakrishnan
0a0884bf93
lint
2018-06-15 16:10:06 -07:00
Girish Ramakrishnan
2e92172794
Do not dump the entire token
2018-06-15 14:56:52 -07:00
Girish Ramakrishnan
042ea081a0
Typo
2018-06-15 14:35:52 -07:00
Girish Ramakrishnan
f7089c52ff
normalizeScope -> intersectScope
2018-06-14 20:23:56 -07:00
Girish Ramakrishnan
32e6b9024c
Add email query param to reset code path
...
This reduces any attack surface
2018-06-12 17:56:41 -07:00
Girish Ramakrishnan
6534297a5d
Remove hat module
...
It's not been updated for 6 years!
2018-06-11 12:38:29 -07:00
Girish Ramakrishnan
c85ca3c6e2
account setup simply redirects to main page now
2018-05-17 09:17:08 -07:00
Girish Ramakrishnan
a45b1449de
Allow ghost users to skip 2fa
2018-05-14 15:07:01 -07:00
Girish Ramakrishnan
f09e8664d1
Return canonical scope in REST responses
...
The '*' scope is purely an implementation detail. It cannot
be requested as such.
2018-05-02 12:36:41 -07:00
Girish Ramakrishnan
c5ffb65563
Fix usage of normalizeScope
2018-05-01 13:21:53 -07:00
Girish Ramakrishnan
9789966017
Set the scope for a token basedon what the user has access to
2018-04-30 21:21:18 -07:00
Girish Ramakrishnan
1432d90f37
lint
2018-04-30 21:13:23 -07:00
Johannes Zellner
6e19153350
Remove now unused result argument
2018-04-30 20:37:12 +02:00
Johannes Zellner
c5c3748aa9
Do not auto login on password reset
2018-04-30 19:55:59 +02:00
Girish Ramakrishnan
f809e359c9
refactor the global variables as functions
2018-04-29 20:17:45 -07:00
Girish Ramakrishnan
b5f8ca6c16
Fix nasssty typo
2018-04-29 17:50:12 -07:00
Girish Ramakrishnan
3b7bcc1f61
refactor scopes into accesscontrol.js
...
this will be our authorization layer for oauth and non-oauth tokens.
2018-04-29 17:50:07 -07:00
Girish Ramakrishnan
6e3b060615
Use SCOPE_PROFILE constant
2018-04-29 17:12:30 -07:00
Girish Ramakrishnan
d8acf92929
UserError -> UsersError
2018-04-29 11:22:15 -07:00
Girish Ramakrishnan
4fd58fb46b
Rename user.js to users.js
2018-04-29 11:19:04 -07:00
Girish Ramakrishnan
6768994bbe
Capitalize the 2fa text
2018-04-28 10:20:33 -07:00
Johannes Zellner
faeb89b258
Add 2fa token login to oauth login form
2018-04-27 11:46:41 +02:00
Johannes Zellner
eb02c182e5
Avoid linter issue
2018-04-26 14:45:12 +02:00
Johannes Zellner
726202b040
Amend app object where applicable to login event
2018-03-02 19:21:11 +01:00
Johannes Zellner
39d6ec96b7
amend full user object to login action
2018-03-02 19:21:11 +01:00
Johannes Zellner
b6384d5025
Remove intrinsicFqdn
2018-02-08 15:07:49 +01:00
Johannes Zellner
b1939e73f4
Remove all occurances of altDomain in the code
...
Tests are pending
2018-02-08 09:00:31 +01:00
Girish Ramakrishnan
969fba83ea
Do not use config.fqdn to determine application name
2018-01-10 15:44:12 -08:00
Girish Ramakrishnan
537fbff4aa
Use ws directly to handle new exec ws route
2017-08-18 19:46:18 -07:00
Johannes Zellner
52db28e876
Verify the websocket request
2017-08-18 11:25:49 -07:00
Girish Ramakrishnan
b421866bf5
Remove simpleauth
...
Simple Auth used to provide auth over HTTP. The original motivation
behind this was this was a simple way to add Cloudron Auth integration.
Back in the day, Cloudron Auth was a requirement for apps but this is
not the case anymore.
This is currently not used by any app and having this might encourage
people to make Cloudron specific un-upstreamable changes.
2017-03-19 01:31:38 -07:00
Johannes Zellner
97a17ff25f
Amend common template values in a central place
2016-10-13 17:34:21 +02:00
Johannes Zellner
68d37b7260
Render the cloudronName in oauth views
2016-10-13 17:24:26 +02:00
Johannes Zellner
bca57b5e47
Show cloudron name for webadmin login
...
Fixes #80
2016-10-13 13:56:29 +02:00
Girish Ramakrishnan
59b53d347f
display demo user credentials in demo cloudrons
2016-09-01 16:21:12 -07:00
Johannes Zellner
f60ff45cb6
Tokens are now valid for a week
2016-08-01 10:14:47 +02:00
Johannes Zellner
4e9dc75a37
Replace DatabaseError with ClientsError where applicable
2016-06-13 14:43:56 +02:00
Johannes Zellner
0160c12965
Allow to distinguish between built-in auth clients and external ones
2016-06-09 15:35:00 +02:00
Johannes Zellner
4776a005a5
Remove redundant client TYPE_*s
2016-06-08 14:09:06 +02:00
Johannes Zellner
207e81345f
Log event for external login
2016-06-07 11:59:54 +02:00