Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove npmrc #21

Closed
wants to merge 36 commits into from
Closed

Remove npmrc #21

wants to merge 36 commits into from

Conversation

SethGosslerOES
Copy link

No description provided.

phoenix-oes and others added 30 commits May 27, 2022 15:37
- Fix linting, such as adding language to fenced code blocks
- Add instructions for installing Rust/Cargo
- Add instructions for updating config if running locally
- Why are we saying npm when we have a yarn.lock file?
* End with one blank line
* Define sandard properties with all vendor properties
* Comment out empty blocks
* Where 'ROLES' are stored in the Auth0 object
* AuthEffects
* authActions
* Add Auth0 AuthHttpInterceptor
* Remove TokenInterceptor
* Remove JWT Interceptor
* Remove old AuthInterceptor
* Update ErrorInterceptor to use Auth0 AuthService
* Remove old AuthGuard
* Add Auth0 AuthGuard
* Update UserRoleGuard
* Remove JwtAuthService
* Users no longer editable form this hmi
* No more interface (handled by Auth0 now)
* authRole type
* Consolidate canX authorization
* Fixes hoisting issues after merge
* prost update now requires C++ toolchain
…and adds documentation:

- The authorization flow in `Server::auth::authorize()` has been updated to 'Auth0` flow.
  This means that the token the server receives from the client when granting resource access
  has it's issuer and role fields 'validated'. This means the token has both the required fields
  and those required fields contain the required data to access the requested resource.

- `Server::auth::Role` now three variants: SuperUser, Engineer, and Viewer.

- The README has been updated to include the fact that OpenSSL is a dependency of alcoholic_jwt,
  which is a dependency of `Server::auth`.

Signed-off-by: Timothy <tim@openenergysolutionsinc.com>
Signed-off-by: Timothy <tim@openenergysolutionsinc.com>
* update docker build
- move env vars
- add steps to construct and verify docker tags
- remove the test githash step

Signed-off-by: sean drexler <seand@esdelab.com>

* removed unused env variable

Signed-off-by: sean drexler <seand@esdelab.com>
- add docker and git changes
Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>
SethGosslerOES and others added 6 commits October 19, 2022 05:52
…t-static to the Rustflags in the Dockerfile. Alpine musl libs are dynamic, so libs like libressl couldnt resolve.

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>
- Add auth object to environment.ts
- Add auth variables to env.json and app.toml
- Add read for new auth variables to server
- Update write_hmi_env function in server to update auth values
- Update client to use new environment auth variables for auth configuration

Signed-off-by: sean drexler <seand@esdelab.com>
* Add authorizePath option

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Get authorizePath from env

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - working dev container. Added the rust feature to the devcontainer.

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - Cleaning up the devcontainer.

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Fix typo and missing auth path stuff
- Value missing in env.json
- Values missing in .dev and .prod environments
- Typo and missing values in hmi_server.rs

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Use fixed version of auth0-spa-js-dist

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Remove python

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update deps

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Add authorize_path placeholder to app.toml

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Change camelCase to snake_case

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* added and updated appropriate variable values for keycloak auth

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Fix Keycloak compatibility
- WIP

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - got the auth flow from keycloak all the way through. We lost some audience validation along the way

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - some more note sfor the morning.

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - working JWK and UI.

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - getting it working on auth0 and keycloak

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - tested and working for both auth0 and keycloak

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - removing cleanup.md

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Update - brining default equipment json back in.

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

* Fix - change the user-role guard canActivate to return an observable<boolean> rather than a promise<boolean>

Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>

---------

Signed-off-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Signed-off-by: Seth Gossler <seth@openenergysolutionsinc.com>
Co-authored-by: Phoenix Gabriel <phoenix@openenergysolutionsinc.com>
Co-authored-by: Ryan Gauthier <ryan.eugene.gauthier@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants