Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ocis 3743 show hide share status #1

Merged
merged 70 commits into from
Sep 18, 2023
Merged
Changes from 1 commit
Commits
Show all changes
70 commits
Select commit Hold shift + click to select a range
aa7f446
Support signature authentication for public links (#118)
C0rby Mar 25, 2021
eff2d45
Reduce the 'build-and-publish- pipleine scope to the master branch
SamuAlfageme Mar 25, 2021
33ae0f7
[CI] Trigger release pipeline for the node-cs3apis bindings
SamuAlfageme Apr 13, 2021
c2d1034
[skip-ci] Rename 'master' to 'main'
SamuAlfageme Apr 14, 2021
b8436e9
Add 'node' to the Makefile targets
SamuAlfageme Apr 14, 2021
bc19782
Write only management API for User and Group resources (#119)
refs Apr 21, 2021
b440728
Add user type field to user ID (#120)
ishank011 Apr 26, 2021
62377dd
Added a new OpenInApp request/response (#121)
glpatcern Apr 27, 2021
2bb7c93
update share api (#124)
C0rby May 6, 2021
37848ee
Add token scope field to gateway authenticate requests (#123)
ishank011 May 7, 2021
e3ac6ae
Application passwords management (#127)
ishank011 May 27, 2021
f4588ef
Further to #121, added the relevant gateway API (#128)
glpatcern May 27, 2021
72517b1
Extend InitiateFileUpload to support exclusive uploads and etags-base…
glpatcern Jun 11, 2021
1ed9b2f
Fixed documentation (#132)
glpatcern Jun 11, 2021
1a4ab6b
Extend references for retrieval via relative paths with resource IDs …
butonic Jun 14, 2021
6da44cb
update the storageprovider recycle api (#135)
Jul 2, 2021
05f37d3
Extend app registry with methods to add providers and mimetype filter…
ishank011 Jul 26, 2021
5cb2b09
Add the ListSupportedMimeTypes call (#138)
ishank011 Aug 2, 2021
a86e5cb
add DenyGrant method (#136)
labkode Aug 2, 2021
cf97f94
Use a URL object in OpenInAppResponse (#139)
ishank011 Aug 12, 2021
63c2cee
add a filter for share grantee types (#142)
Sep 6, 2021
4967603
Add filter to exclude denials in listing of shares (#146)
glpatcern Sep 16, 2021
5e29c7c
Extensions for the AppProviders to improve the UI (#145)
glpatcern Sep 22, 2021
b33d276
use the google protobuf field mask (#144)
butonic Oct 4, 2021
656f69e
Add space id to GetQuota method (#147)
micbar Oct 6, 2021
2321eb6
Add a create flag to MimeTypeInfo (#149)
glpatcern Oct 7, 2021
634e606
Add key parameter to recycle bin methods (#152)
ishank011 Oct 18, 2021
a8924f7
Add config to control fetching groups with users and vice versa (#153)
ishank011 Oct 26, 2021
942713c
Update README.md
labkode Nov 3, 2021
dfc8f0d
[docs-only] cd cs3apis in readme instructions (#155)
michielbdejong Nov 3, 2021
9648574
add default_application to MimeTypeInfo (#157)
wkloucek Nov 4, 2021
50cca47
add TouchFile (#154)
wkloucek Dec 13, 2021
2182b58
Adding support for a Lock API (#160)
glpatcern Dec 14, 2021
48b68f8
first prototype for the permissions service api (#161)
Dec 14, 2021
2fb79d4
Rework Lock API metadata and add missing argument to Unlock (#162)
butonic Jan 26, 2022
dfd5454
Data transfer pull model (#143)
redblom Feb 14, 2022
6fcd39b
Match multiple providers in auth registry (#164)
ishank011 Feb 18, 2022
8a2c7a3
Add an optional lock_id argument to storage methods (#163)
glpatcern Feb 25, 2022
c1dc440
Added parent_id reference to ResourceInfo (#167)
glpatcern Mar 28, 2022
96b8d98
Add namespace config to user preferences calls (#166)
ishank011 Mar 30, 2022
993b147
add quicklink field to link cs3api (#168)
kobergj Apr 12, 2022
4a7b51b
Add path filter to list storage spaces request (#170)
ishank011 May 12, 2022
0d4031d
add creator to grant (#172)
kobergj Jun 17, 2022
47bde33
Performance improvements (#173)
micbar Jun 20, 2022
726aedb
add spaceID to resourceID (#174)
micbar Jun 21, 2022
25c9af8
add user filter (#175)
dragonchaser Jul 11, 2022
04cd991
Add an expiration to FileUploadProtocol (#176)
aduffeck Jul 14, 2022
a9392fb
add a if_unmodified_since condition to InitiateFileUploadRequest (#178)
aduffeck Aug 18, 2022
dd6c85f
Added PREVIEW as an additional ViewMode for apps (#179)
glpatcern Sep 5, 2022
1dbd99f
Continuation of cs3org/cs3apis#179 (#180)
glpatcern Sep 13, 2022
2752ed6
add optional oldLock to RefreshLockRequest (#183)
micbar Sep 29, 2022
2bd69ed
Add description to public share (#184)
gmgigi96 Sep 29, 2022
4a6c00f
add description in create public share request (#185)
gmgigi96 Sep 30, 2022
d935639
Allow a public share to be used internally (#186)
gmgigi96 Oct 4, 2022
1e56ee2
add more share filters (#181)
Oct 5, 2022
bb7fbfa
add new user type space owner (#187)
butonic Oct 12, 2022
ec4bcc9
add an expiration timestamp to grants
Jan 4, 2023
cb322b6
add API changes to support share expiration
Jan 9, 2023
d08b8e8
Get initiator's info on AcceptInvite (#196)
gmgigi96 Jan 16, 2023
de86908
add description when generating an invitation token (#197)
gmgigi96 Jan 17, 2023
c098de0
Add error codes to InviteAPIs (#198)
gmgigi96 Jan 17, 2023
383c14c
trigger CI
micbar Jan 11, 2023
b4e6e9a
change secret name
micbar Feb 6, 2023
8a34fee
Correct echo
micbar Feb 6, 2023
194e643
Name change in module datatx: PullTransfer -> CreateTransfer (#195)
redblom Feb 7, 2023
9043cf3
Merge branch 'main' into grant-expiration
glpatcern Feb 7, 2023
6d5621d
change secret handling
micbar Feb 9, 2023
c07d894
Merge branch 'main' into grant-expiration
micbar Feb 9, 2023
a927825
the code locked added
2403905 May 17, 2023
c50bc47
add hide share value
dragonchaser Sep 1, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Add token scope field to gateway authenticate requests (cs3org#123)
  • Loading branch information
ishank011 authored May 7, 2021
commit 37848ee7d8f0cd2061ffc287c665f5458ae237f1
5 changes: 5 additions & 0 deletions cs3/auth/provider/v1beta1/provider_api.proto
Original file line number Diff line number Diff line change
@@ -28,6 +28,7 @@ option java_package = "com.cs3.auth.provider.v1beta1";
option objc_class_prefix = "CAP";
option php_namespace = "Cs3\\Auth\\Provider\\V1Beta1";

import "cs3/auth/provider/v1beta1/resources.proto";
import "cs3/identity/user/v1beta1/resources.proto";
import "cs3/rpc/v1beta1/status.proto";
import "cs3/types/v1beta1/types.proto";
@@ -61,4 +62,8 @@ message AuthenticateRequest {
message AuthenticateResponse {
cs3.rpc.v1beta1.Status status = 1;
cs3.identity.user.v1beta1.User user = 2;
// REQUIRED.
// The scope of the token to be issued.
// This would be a list of resources with corresponding role-based access scope.
map<string, Scope> token_scope = 3;
}
62 changes: 62 additions & 0 deletions cs3/auth/provider/v1beta1/resources.proto
Original file line number Diff line number Diff line change
@@ -0,0 +1,62 @@
// Copyright 2018-2019 CERN
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// In applying this license, CERN does not waive the privileges and immunities
// granted to it by virtue of its status as an Intergovernmental Organization
// or submit itself to any jurisdiction.

syntax = "proto3";

package cs3.auth.provider.v1beta1;

option csharp_namespace = "Cs3.Auth.Provider.V1Beta1";
option go_package = "providerv1beta1";
option java_multiple_files = true;
option java_outer_classname = "ResourcesProto";
option java_package = "com.cs3.auth.provider.v1beta1";
option objc_class_prefix = "CAP";
option php_namespace = "Cs3\\Auth\\Provider\\V1Beta1";

import "cs3/types/v1beta1/types.proto";

// Scope defines role-based permissions for various resources.
message Scope {
// REQUIRED.
// The resource embedded in the request of a particular method. It depends on
// the method, hence is left as opaque.
cs3.types.v1beta1.OpaqueEntry resource = 1;
// REQUIRED.
// The role associated with the resource.
Role role = 2;
}

// The role associated with the scope.
enum Role {
// Used for invalid roles
ROLE_INVALID = 0;
// Grants owner permissions on a resource
ROLE_OWNER = 1;
// Provides backwards compatibility
ROLE_LEGACY = 2;
// Grants non-editor role on a resource
ROLE_VIEWER = 3;
// Grants editor permission on a resource, including folders
ROLE_EDITOR = 4;
// Grants editor permission on a single file
ROLE_FILE_EDITOR = 5;
// Grants co-owner permissions on a resource
ROLE_COOWNER = 6;
// Role with only write permission can use InitiateFileUpload, nothing else
ROLE_UPLOADER = 7;
}
170 changes: 170 additions & 0 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -593,6 +593,10 @@ <h2>Table of Contents</h2>
<a href="#cs3.auth.provider.v1beta1.AuthenticateResponse"><span class="badge">M</span>AuthenticateResponse</a>
</li>

<li>
<a href="#cs3.auth.provider.v1beta1.AuthenticateResponse.TokenScopeEntry"><span class="badge">M</span>AuthenticateResponse.TokenScopeEntry</a>
</li>




@@ -604,6 +608,25 @@ <h2>Table of Contents</h2>
</li>


<li>
<a href="#cs3%2fauth%2fprovider%2fv1beta1%2fresources.proto">cs3/auth/provider/v1beta1/resources.proto</a>
<ul>

<li>
<a href="#cs3.auth.provider.v1beta1.Scope"><span class="badge">M</span>Scope</a>
</li>


<li>
<a href="#cs3.auth.provider.v1beta1.Role"><span class="badge">E</span>Role</a>
</li>



</ul>
</li>


<li>
<a href="#cs3%2fauth%2fregistry%2fv1beta1%2fregistry_api.proto">cs3/auth/registry/v1beta1/registry_api.proto</a>
<ul>
@@ -5467,6 +5490,46 @@ <h3 id="cs3.auth.provider.v1beta1.AuthenticateResponse">AuthenticateResponse</h3
<td><p> </p></td>
</tr>

<tr>
<td>token_scope</td>
<td><a href="#cs3.auth.provider.v1beta1.AuthenticateResponse.TokenScopeEntry">AuthenticateResponse.TokenScopeEntry</a></td>
<td>repeated</td>
<td><p>REQUIRED.
The scope of the token to be issued.
This would be a list of resources with corresponding role-based access scope. </p></td>
</tr>

</tbody>
</table>





<h3 id="cs3.auth.provider.v1beta1.AuthenticateResponse.TokenScopeEntry">AuthenticateResponse.TokenScopeEntry</h3>
<p></p>


<table class="field-table">
<thead>
<tr><td>Field</td><td>Type</td><td>Label</td><td>Description</td></tr>
</thead>
<tbody>

<tr>
<td>key</td>
<td><a href="#string">string</a></td>
<td></td>
<td><p> </p></td>
</tr>

<tr>
<td>value</td>
<td><a href="#cs3.auth.provider.v1beta1.Scope">Scope</a></td>
<td></td>
<td><p> </p></td>
</tr>

</tbody>
</table>

@@ -5501,6 +5564,113 @@ <h3 id="cs3.auth.provider.v1beta1.ProviderAPI">ProviderAPI</h3>



<div class="file-heading">
<h2 id="cs3/auth/provider/v1beta1/resources.proto">cs3/auth/provider/v1beta1/resources.proto</h2><a href="#title">Top</a>
</div>
<p></p>


<h3 id="cs3.auth.provider.v1beta1.Scope">Scope</h3>
<p>Scope defines role-based permissions for various resources.</p>


<table class="field-table">
<thead>
<tr><td>Field</td><td>Type</td><td>Label</td><td>Description</td></tr>
</thead>
<tbody>

<tr>
<td>resource</td>
<td><a href="#cs3.types.v1beta1.OpaqueEntry">cs3.types.v1beta1.OpaqueEntry</a></td>
<td></td>
<td><p>REQUIRED.
The resource embedded in the request of a particular method. It depends on
the method, hence is left as opaque. </p></td>
</tr>

<tr>
<td>role</td>
<td><a href="#cs3.auth.provider.v1beta1.Role">Role</a></td>
<td></td>
<td><p>REQUIRED.
The role associated with the resource. </p></td>
</tr>

</tbody>
</table>







<h3 id="cs3.auth.provider.v1beta1.Role">Role</h3>
<p>The role associated with the scope.</p>
<table class="enum-table">
<thead>
<tr><td>Name</td><td>Number</td><td>Description</td></tr>
</thead>
<tbody>

<tr>
<td>ROLE_INVALID</td>
<td>0</td>
<td><p>Used for invalid roles</p></td>
</tr>

<tr>
<td>ROLE_OWNER</td>
<td>1</td>
<td><p>Grants owner permissions on a resource</p></td>
</tr>

<tr>
<td>ROLE_LEGACY</td>
<td>2</td>
<td><p>Provides backwards compatibility</p></td>
</tr>

<tr>
<td>ROLE_VIEWER</td>
<td>3</td>
<td><p>Grants non-editor role on a resource</p></td>
</tr>

<tr>
<td>ROLE_EDITOR</td>
<td>4</td>
<td><p>Grants editor permission on a resource, including folders</p></td>
</tr>

<tr>
<td>ROLE_FILE_EDITOR</td>
<td>5</td>
<td><p>Grants editor permission on a single file</p></td>
</tr>

<tr>
<td>ROLE_COOWNER</td>
<td>6</td>
<td><p>Grants co-owner permissions on a resource</p></td>
</tr>

<tr>
<td>ROLE_UPLOADER</td>
<td>7</td>
<td><p>Role with only write permission can use InitiateFileUpload, nothing else</p></td>
</tr>

</tbody>
</table>







<div class="file-heading">
<h2 id="cs3/auth/registry/v1beta1/registry_api.proto">cs3/auth/registry/v1beta1/registry_api.proto</h2><a href="#title">Top</a>
</div>