-
Notifications
You must be signed in to change notification settings - Fork 86
Upgrade to github.com/Sirupsen/logrus v1.0 and fix the weird case-sensitive problems #1395
Comments
@xcoulon This cannot happen until goa uses the lowercase version of the package in any of its 1.X versions. |
yes, that was my understanding, too. I tried to migrate just after I created the issue with I got stuck into a mix of |
Goa 1.3 uses the lowercased |
This commit will probably not build because not all packages that this project depends on have adopted the lowercase version of the package. We have to merge this commit anyway, I think. Also updated GOA to 1.3.0 See also fabric8-services#1395
I have created PRs for each inter-linked repository and changed the following:
If I'm not totally wrong, we can merge all of these four PRs:
and once they are all in their respective I've removed the explicit dependency on If my suggestion doesn't work, we can roll back each PR individually. As long as we don't roll out a new version to production, we're safe IMHO. @xcoulon @aslakknutsen do you think this is a valid short-term approach? |
Removed the |
This commit will probably not build because not all packages that this project depends on have adopted the lowercase version of the package. We have to merge this commit anyway, I think. Also updated GOA to 1.3.0 See also fabric8-services#1395
* Switched from github.com/Sirupsen/logrus to github.com/sirupsen/logrus This commit will probably not build because not all packages that this project depends on have adopted the lowercase version of the package. We have to merge this commit anyway, I think. Also updated GOA to 1.3.0 See also fabric8-services/fabric8-wit#1395 * Updated glide.lock * Remove the dep on wit * Revert "Remove the dep on wit" This reverts commit c2e4ea8. * Make auth compile * Fix version of wit
Avoid lower level package dependency on external generated REST API. Related to fabric8-services/fabric8-wit#1395
Avoid lower level package dependency on external generated REST API. Related to fabric8-services/fabric8-wit#1395
#394) Switched from github.com/Sirupsen/logrus to github.com/sirupsen/logrus * updated GOA to 1.3.0 Related fabric8-services/fabric8-wit#1395
to fabric8-services/fabric8-wit@c6fc618 As you can see there are quite a lot of changes (**83 files changed, 2914 insertions(+), 728 deletions(-)**) and the delta is quite huge. We might want to deploy more often to reduce this delta... ## Quiet CI (fabric8-services/fabric8-wit#1704) Installs RPM more quietly, builds docker containers more quietly, and pulls docker images more quietly. ## `make dev` fails to start because of container connection issue on macOS (fabric8-services/fabric8-wit#1705) remove the `network_mode` option in the containers specify the host/port for the `auth` service to connect to its `db`, using the internal Postgres port (5432) and using the container's hostname (the container name itself) same applies for the `core` service to connect to its `db` Fixes fabric8-services/fabric8-wit#1705 ## Random test failures because of work item creation error (fabric8-services/fabric8-wit#1676) Using the `Last-Modified` response header when possible Also, making sure that the list of spaces is always ordered by `updated_at DESC` to get the most recents spaces first. Move the `work item number sequence` in its own subpackage. Refactored the test to use the TestFixture to initialise the work items from the data set. Using an `UPSERT` statement to avoid creating then updating the work item number sequence, which also avoids putting a `LOCK` on the row (using the `... FOR UPDATE` option in the `SELECT` statement) Remove the `optionalKeywords` which contained the work item number but failed when the 3rd work item was retrieved because its number ('3') would match the description. This worked in the past when the number did not exist and the search was based on the ID (UUID). Added some weight on the work item number (`*A`) when the URL matches a known one and the number can be extracted. Also, add a test to search by number using the `number:%d` query. Adding a test to create work items concurrently Refactor identities creation in test: using UUIDs of created identities instead of usernames also, move a comment to `init()` where it belongs also, comment on use of `:*A` in fulltext search Also: move some log statements to `DEBUG` instead of `INFO` to reduce the noise during test executions Fixes fabric8-services/fabric8-wit#1676 ## WIP sirupsen-case for fabric8-wit (fabric8-services/fabric8-wit#1672) Goa 1.3 now seems to check length requirements in from the design. * Update golden files by running these commands: $ go test -v github.com/fabric8-services/fabric8-wit/controller -run \ TestSuiteWorkItemType -testify.m TestCreate -update $ go test -v github.com/fabric8-services/fabric8-wit/controller -run \ TestSuiteWorkItemType -testify.m TestShow -update $ go test -v github.com/fabric8-services/fabric8-wit/controller -run \ TestSuiteWorkItemType -testify.m TestValidate -update * Switch postgres to registry.centos.org/postgresql/postgresql:9.6 in CI tests * Forgot to pass F8_RESOURCE_REMOTE=1 when running remote tests WITH coverage Fixes fabric8-services/fabric8-wit#1395 ## Make link topology a type based on string (fabric8-services/fabric8-wit#1710) * Make link topology a type based on string * Rename CheckValidTopology to CheckValid and make it a member function of a Topology ## Simplify usage of test fixture customization functions (fabric8-services/fabric8-wit#1711) ## Added "not found" cases for search by number (fabric8-services/fabric8-wit#1712) * Update search_repository_whitebox_test.go Update TestSearch - By Number Add "not found" case for when searching by space and not by space. Added case with single and multiple results for when searching by number without a space. ## 'make dev' fails to start because of container connection issue on macOS (fabric8-services/fabric8-wit#1705) (fabric8-services/fabric8-wit#1713) keep the previous changes in `docker-compose.macos.yml` for now revert the changes as they break on Linux Fixes fabric8-services/fabric8-wit#1705 ## Improve the field type system and add tests (fabric8-services/fabric8-wit#1130) We now support a "bool" type for fields in a work item type. I've added a lot of tests for valid and invalid field types on both, repo- and controller-level. The field type `KindWorkitemReference` has been removed. ## Do not import pkg 'notification' in pkg 'test' (fabric8-services/fabric8-wit#1716) Move the 'test/notification.go' file into a subpackage Rename the 'NotificationChannel' into 'FakeNotificationChannel' to enforce its testing purpose. Fixes fabric8-services/fabric8-wit#1716 ## Work items disappear after unlinking (fabric8-services/fabric8-wit#1708) * Work items disappear after unlinking (fabric8-services/fabric8-wit#1708) Fix the SQL filter query by making sure only undeleted links are taken into account when the `parentexists` filter is activated. Also, reduce the number of subselects and add index on table and improve query Also, refactor the `search/search_repository_blackbox_test.go` by using sub tests. Also, make sure that tests in `TestSearchParentExists` include the `userSpaceID` in the search expression. Fixes fabric8-services/fabric8-wit#1708 ## Creator filter (fabric8-services/fabric8-wit#1715) Filter for work item creator ## Use just `state` instead of `workitemstate` (fabric8-services/fabric8-wit#1721) ## Only space collaborator and WI creators should be able to update/delete links (fabric8-services/fabric8-wit#1718) ## Enable Authorization by default (fabric8-services/fabric8-wit#1723) Previously authorization had to be enabled explicitly in dev mode. With this change, WIT talks to AUTH which handles the authorization implementation details ( like talking to keycloak ). ## Copy links to relationships for `List space` endpoint (1/2) (fabric8-services/fabric8-wit#1687) This ensure that the response will be compliant with the JSON-API specification. Fixes fabric8-services/fabric8-wit#1687 ## Save description when new iteration created (fabric8-services/fabric8-wit#1726) Fixes: https://openshift.io/openshiftio/openshiftio/plan/detail/1555 ## Delete iteration API (fabric8-services/fabric8-wit#1683) Allow the user to delete the iteration (soft-delete) using API. ## WIP: Make the parenting link type have a tree-topology (fabric8-services/fabric8-wit#1729) Based on [this discussion](https://chat.openshift.io/developers/pl/gqwxx3mj13fejfdwqqc61mrwba) we decided to make the parenting link type have a tree topology. See also fabric8-ui/fabric8-planner#2291 (comment)
* Move 'FetchKeys()' function into a subpkg (#435) * Move 'FetchKeys()' function into a subpkg (#433) Fixes #433 Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * refactor 'token/keycloak/keys' pkg to 'token/jwt' Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * Rename jwt to jwk * Rename jwt to jwk * Tests for key fetcher (#436) * Tests for key fetcher * Test default fetcher * Delete tenants from Tenant service when deprovisioning user (#484) * Delete user from Tenant service when deprovisioning * Re-org tenant service * Generate Auth SA when creating Token Manager * Test for signer * Add delete tenant * Add tests for init * More tests * Delete tenant tests * Controller * Update tenant dep * Controller tests * dont delete namespaces for deprovisioned=false * Switched from github to the local keycloak instance (#654) Fixes #653 * Use relative URL's rather than FQDN's for dependency services (#802) Fixes #775 * Space id for wi, wit and tracker query (Fixed: #685 and #766) * Create Keycloak resource when space created (#962) Fixes #961 * Add check for request Scheme to detect HTTPS (#1080) * Add check for X-Forwarded-Proto to detect HTTPS (#1090) Related to #1080 * Minor fixes to get HTTP/2 running (#1440) * Move health checks to use HTTPS * Check TLS config on Request to determine REST response URL protocol * Revert "Minor fixes to get HTTP/2 running (#1440)" This reverts commit 74d90c1f9f25bc8100ecaeaad1a18eb4d6767e46. * Rename project to Fabric8-WIT (#1450) Related to #345 * renamed packages * Close responses to prevent FDs leaks (#205) Ensure that response bodies are closed and read from, minimally. fixes #204 * Update existing Keycloak users when registering new users (#231) * Fix params in email verify redirect URL (#260) fixes https://github.com/fabric8-services/fabric8-common/issues/258 * Add trailing slash to user.cluster, APIURL, ConsoleURL, and MetricsURL (#309) Regardless of actual URLs we store in user's profile and cluster configuration for OSO API, Console, and Metrics URL we should return these URLs with a trailing slash (for example "https://api.*.openshift.com/") * Generate user tokens in Auth service (#402) - New private keys ( added in openshift secrets ) in configuration (should match keys in KC) - We don't load public keys from KC any more - During login (/login and /token) we now generate our own keys (access & refresh) based on the KC - tokens instead of passing along the original KC tokens to client - We also generate new tokens when refreshing the token (/token/refresh) - Added new methods in token manager to generate tokens (access & refresh) based on Identity (in addition to methods to generate tokens based on KC tokens). These methods are not used atm but fully tested and ready to be used when we decommission KC - /token/generate (in Dev Mode) now doesn't use KC - /token/refresh in Dev Mode (but not in tests) doesn't use KC either fixes #229 * Return subscription status to UI when unapproved user is trying to login (#422) * Show subscription status when unapproved user is trying to login * Extract username from token * OS Templates * Tests * fix typos * Fix ineffassign * Clean up * Fix tests * Http Client * Client tests * Fix typo * Test default client * Delete tenants from Tenant service when deprovisioning user (#484) * Delete user from Tenant service when deprovisioning * Re-org tenant service * Generate Auth SA when creating Token Manager * Test for signer * Add delete tenant * Add tests for init * More tests * Delete tenant tests * Controller * Update tenant dep * Controller tests * dont delete namespaces for deprovisioned=false * Proxy /api/clusters to Cluster Management Service (#659) * Proxy /cluster to Cluster Management Service * Call Cluster Managment Service to get cluster info * Fix test compilation errors * Remove unused function * Fix tests * Fix conflicts after merge to master * More tests * cleanup * Fix merge conflicts * Lazy cluster service initialization * More tests * Add synchronization to Default Token Manager initialization * More tests * Addressing PR review comments * Return a copy of cluster instead of pointer to original cached object * Add comments about avoiding Auth-Cluster cycle dependencies during startup * Add some logs * Fix cluster/auth path * include token/jwk package from auth also, reorganize `rest`, `http` and `httpsupport`, moving all possible content in `httpsupport` to avoid the name confusion/clash with `net/http` fixes #18 Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * fix(#572): use correct identityId in notification request payload (#589) * fix test Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * remove old 'token' pkg before importing from fabric8-cluster Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * Add Login Service for user auth via GitHub using OAuth (#229) Login entrypoint mounted on /api/login/authorize Login entry point mounted on /api/login/authorize Contributed-by Konrad Kleine <kwk@users.noreply.github.com> Contributed-by Shoubhik Bose <sbose78@gmail.com> Contributed-by Pranav Gore <pranavgore09@gmail.com> Fixes #20, #219, #321, #325, #327, #328, #337 Related #304 * Add basic error stack (#642) * Add stack to all error reporting methods ... that could be found using this: find . -name "*.go" -exec sed -i -e 's/return\(.*\) err$/return\1 errors.WithStack(err)/g' {} \; See #641 * Added github.com/pkg/errors See #641 * Fix missing import of github.com/pkg/errors * Use github.com/pkg/errors.New() instead of standard errors.New() * Use errors.Errorf() instead of fmt.Errorf() * Use errors.Cause() in tests that check for a particular error type * Error type switch based on cause of error * Print bubbled up errors with stack * Simplify code when formatting with gofmt (#748) * Use keycloak tokens instead of generating our own (#692) Use keycloak tokens instead of generating our own ones when serving client auth requests Fixes #672 * Added doc files to improve the documentation (#803) Added doc files to improve the documentation. * Refactored test token generation (#812) * Refactored test token generation * Centralized the token generation function * Use "context" instead of "golang.org/x/net/context" (#1385) * Use "context" instead of "golang.org/x/net/context" * fix(goa): upgrade goa to 1.2.0 Fixes #1357 * Rename project to Fabric8-WIT (#1450) Related to #345 * renamed packages * Load public keys from KC instead of storing them in configuration (#85) * Auth Service Account (#96) * On login, notify & update user info in WIT service too. (#82) * Check token claims if user is approved (#124) * New "api_client" param for /api/login (#126) * Data model for "external provider token" services. (#131) Data model for storing tokens retrieved as part of linking OpenShift Online and Github user accounts. fixes #132 * Move TokenToJson to service level (#137) Avoid lower level package dependency on external generated REST API. Related to fabric8-services/fabric8-wit#1395 * rename ExternalProviderToken to ExternalToken (#143) * REST API for account linking (#136) The new API for account linking which doesn't use keycloak IDPs linking. ## Linking Accounts ``` POST /api/token/link Content-Type: application/x-www-form-urlencoded Payload: for=<resource>&token=<access_token>&scope=<scope>&redirect=<redirect_url> ``` **`<resource>`** - Resource we need to link accounts for. For example https://github.com/somecoolrepo or https://console.starter-us-east-2.openshift.com/console/project/coolproject **`<scope>`** - required scope. Multiple scopes can be specified by separating them with a space. Optional. If not defined then the default scope is used. Not supported in the first version! **`<redirect>`** - after successful linking the client will be redirected to this URL. If not specified then the URL from the “Referer” header will be used. If both “Referer” header and “redirect” param are missing then a Bar Request response will be returned. **`<access_token>`** - user’s access token If the token for such user already exists then the account will be re-linked and the token will be updated. In the first version, we support only **github** and **openshift** represents OSO-us-starter-2. Later an individual **openshift** provider will be associated with the user during signup by the registration app, as part of multicluster support. **Example:** ``` POST /api/token/link Content-Type: application/x-www-form-urlencoded for=https://github.com/somecoolrepo&token=ABSDEF12345678990&redirect=https%3A%2F%2Fopenshift.io&scope=user%20public_repo ``` ## Re-linking Accounts If some services catches 401 when trying to use Git or OS token this service should return 401 to UI with the following header: `WWW-Authenticate: Link url=<link_url_optional>, description=”<description_optional>”` UI should initiate re-linking when it catches such 401 response. Fixes fabric8-services/fabric8-auth#134 * Fix return type of OpenShift Config. (#144) * Add API to get external provider token (#140) * REST API for removing linked/external tokens (#152) * Support multiple resources when linking accounts (#160) `for` can now contains a set of resources separated by comma. For example: `/api/token/link?for=https://github.com,https://api.openshift.com` Fixes fabric8-services/fabric8-auth#159 * simplify DB tests setup (#180) * Clean up test identity in account linking tests (#181) * Service Account token issuance (login) endpoint (#169) * Rename auth Service Account to 'fabric8-auth' (#183) * Delete account links from Keycloak (#192) While deleting tokens from DB, also remove link from keycloak. * Support GET /token?for=resource for service accounts (#195) * Close responses to prevent FDs leaks (#205) Ensure that response bodies are closed and read from, minimally. fixes #204 * Return 200 with payload instead of 303 when initiate account linking (#211) * Return 200 with payload containing redirect url instead of 303 when initiate account linking * Use GET /api/token/link instead of POST. * Support for creating users using service account tokens (#170) * add support for creating users using service acc * update user data in kc & WIT * add rhd linking * Disable more KC authZ tests fixes #166 and #167 * Fetch user's username for linked Github/OpenShiftOnline account (#214) fixes #212 * ISSUE-71 initial endpoint implementation for resource registration (#94) Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * Update existing Keycloak users when registering new users (#231) * Changed state param from UUID to string (#239) * Synchronize keycloak from auth service's DB upon login (#265) * refactor to sync from auth to keycloak * invoke * make the api work * fix profile update * sync emailverified better * cleanup * fix tests * add tests * add comments * add tests * more tests * Fix OSO token endpoint URL (#280) * GET /api/clusters for oso-proxy and tenant services (#283) fixes #282 * Explicitly read response body when closing it to avoid FD leaks (#307) * Add trailing slash to user.cluster, APIURL, ConsoleURL, and MetricsURL (#309) Regardless of actual URLs we store in user's profile and cluster configuration for OSO API, Console, and Metrics URL we should return these URLs with a trailing slash (for example "https://api.*.openshift.com/") * Validate all incoming tokens (#306) * Support `response_mode=fragment` for /authorize (#308) * Added response_mode and refactored function to support response_mode * Made /authorize/callback to return code and state in fragment mode * Modified tests to test with the fragment mode * Added Test for nil responseMode in which /authorize ok * - Removed use of "query" from implemetation, in response_type="query" response_type would be treated as nil - More description for fragment mode - Other minor changes * Added some tests for the new ResponseMode * OauthStateReference.ResponseMode as *string instead of string. If you change it to *string then you will be able to store NULL or a string value in DB. If you keep it as string then instead of NULL you will store an empty string. * Modified tests * Fix logging * Extract an interface for the parsing of tokens (OSIO#2091) (#323) Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * Include the 'PublicKeys()' method in the 'token.Parser' interface (OSIO#2091) (#325) Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * Fixed inappropriate error handling if delete is unsuccessful (#326) * Fixed inappropriate error handling if delete is unsuccessful * added log for load failure * Add alias for user's OSO url to /api/token?for=<alias> (#335) * Add alias for user's OSO/github url to GET /api/token?for=<alias> * Add alias for user's OSO/github url to POST /api/token/link?for=<alias> * Add alias for user's OSO/github url to DELETE /api/token?for=<alias> fixes #334 * Support forcePull for cluster tokens (#351) part of openshiftio/openshift.io#2304 * API for notifying Auth about deprovisioned users (#354) - [x] New endpoint which accepts requests from OpenShiftOnline Reg App SA only: ``` PATCH /api/users:id { "data": { "type": "identities", "attributes": { "deprovisioned": true } } ``` Returns `200 OK` if succeed. - [x] Login returns 401 if user has been deprovisioned - [x] Token refresh returns 401 if user has been deprovisioned - [x] `GET /api/user`returns 401 if user has been deprovisioned. Tenant init service is not called. - [x] `GET /api/userinfo`returns 401 if user has been deprovisioned. Tenant init service is not called. - [x] `GET /api/users/:id` returns 401 if user has been deprovisioned but only if called by Tenant SA. Still open for other clients, so, UI is not broken. - [x] Tests Fixes fabric8-services/fabric8-auth#353 * Add Jenkins-Idler SA to cluster and token API (#362) * Add Jenkins Proxy SA and allow it accessing Cluster & Token APIs (#363) * Generate user tokens in Auth service (#402) - New private keys ( added in openshift secrets ) in configuration (should match keys in KC) - We don't load public keys from KC any more - During login (/login and /token) we now generate our own keys (access & refresh) based on the KC - tokens instead of passing along the original KC tokens to client - We also generate new tokens when refreshing the token (/token/refresh) - Added new methods in token manager to generate tokens (access & refresh) based on Identity (in addition to methods to generate tokens based on KC tokens). These methods are not used atm but fully tested and ready to be used when we decommission KC - /token/generate (in Dev Mode) now doesn't use KC - /token/refresh in Dev Mode (but not in tests) doesn't use KC either fixes #229 * Return subscription status to UI when unapproved user is trying to login (#422) * Show subscription status when unapproved user is trying to login * Extract username from token * OS Templates * Tests * fix typos * Fix ineffassign * Clean up * Fix tests * Http Client * Client tests * Fix typo * Test default client * Support offline token generation (#427) * Support offline token generation * Tests * Fix import after rebasing * Move 'FetchKeys()' function into a subpkg (#435) * Move 'FetchKeys()' function into a subpkg (#433) Fixes #433 Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * refactor 'token/keycloak/keys' pkg to 'token/jwt' Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * Rename jwt to jwk * Rename jwt to jwk * Tests for key fetcher (#436) * Tests for key fetcher * Test default fetcher * Introduce service layer (#456) # Refactoring of application package - Repositories interface extracted into repository subpackage This provides a global fix for import cycle issues, solving the problem of having to create a separate repositories interfaces for the service layer - Services interface introduced. Provides a convenient way for controllers to access the service layer # Decouple transaction control from the application package ## Transaction-related functionality moved to application/transaction package - Allows transactions to be managed without introducing import cycle issues with application package - Transactional method refactored: ` func Transactional(tm TransactionManager, todo func(f TransactionalResources) error) error` The `tm` parameter is used by the `Transactional` method to initiate the transaction. Code executed within the transaction block (i.e. the `todo` function) may interact with transactional resources (e.g. repositories) via the `TransactionalResources` parameter. **Some notes:** The `Application` object implements `TransactionManager`, so transactions can continue to be conveniently managed inside the controller package: ``` err := transaction.Transactional(c.app, func(tr transaction.TransactionalResources) error { // transactional code } ``` `TransactionalResources` implements the `Repositories` interface, providing convenient access to repository types: ``` err := transaction.Transactional(c.app, func(tr transaction.TransactionalResources) error { tr.ResourceRepository().Delete(ctx, ctx.ResourceID) } ``` The scope of `TransactionalResources` may be easily extended in the future to include other transactional resources, not just repositories. # Introduction of service layer - Transaction control moved to service layer Since the service layer is responsible for the atomic integrity of the operation, transaction control was moved to the service layer where required. - Extracted db-specific code from service layer to repository layer This leaves the service layer as a purely business logic layer. In many cases, this has left the service layer as a thin facade over the repository layer, which is exactly what the Service Layer design pattern recommends. For example, `RoleManagementService` which was previously over 300 lines of code is now only about 40 lines. - Fixed Preload issues Many hours was spent deep inside the Gorm source code to determine why `Preload()` was failing, and I'm pleased to report that I was able to identify the issue and rectify it in our code. As a result, I was able to do some extensive code refactoring to significantly reduce the number of lines of code required to execute some queries and get the results we required. For example, I was able to reduce the methods in `RoleManagementService` (some of them around 70 lines of code) significantly (in some cases just over 10 lines of code) in the `IdentityRole` repository. # Adds `IdentityAssociation` struct This type is a general purpose DTO for transferring membership and role assignment state from the repository/service layer to the controller layer. It is designed to replace multiple other DTO types (such as the [`IdentityOrganization`](https://github.com/fabric8-services/fabric8-auth/blob/master/authorization/organization/organization.go) type) with a single reusable type. Two convenience methods have been added to the `authorization` package to support this struct: ``` func AppendAssociation(associations []IdentityAssociation, resourceID string, resourceName *string, identityID *uuid.UUID, member bool, role *string) func MergeAssociations(associations []IdentityAssociation, merge []IdentityAssociation) []IdentityAssociation ``` The `AppendAssociation` function can be used to add new state to an `IdentityAssociation` array. It either merges the state into an existing element (if there is a match) or creates a new element if necessary. The `MergeAssociations` function is used to correctly merge the state of two separate `IdentityAssociation` arrays into one. Fixes #446 Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * return latest token first (#473) * Reorganize account package (#483) - Move all repositories from /account to /account/repository - Move all services from /account, /account/email/, /account/userprofile to /account/services * Delete tenants from Tenant service when deprovisioning user (#484) * Delete user from Tenant service when deprovisioning * Re-org tenant service * Generate Auth SA when creating Token Manager * Test for signer * Add delete tenant * Add tests for init * More tests * Delete tenant tests * Controller * Update tenant dep * Controller tests * dont delete namespaces for deprovisioned=false * Return error if object not found when deleting (#500) * Return error if object not found when deleting * Rename db to result * Add WWW-Authenticate: LOGIN header to the error response when login is required (#519) - [x] `WWW-Authenticate: LOGIN ur="https://auth.openshift.io/api/login" description="re-login is required"` header is added if any request to Auth contains an invalid bearer token: `Authorization: bearer ${token}` - [x] The same `WWW-Authenticate: LOGIN` header added to the 401 response if https://auth.openshift.io/api/token/refresh endpoint got 401 from Keycloak This PR is required to fix the backend side of openshiftio/openshift.io#3746 Also part of openshiftio/openshift.io#3736 * Service Account for Analytics Gemini Service (#520) * Refactor Notification Service (#529) * Send invitation e-mail to user via notification service (#514) * ISSUE-507 add new column to invitation table Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 testing framework enhancements Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 send notification for user invitation Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 modified notification messages Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 lookup space name from WIT service Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 updated acceptance URL Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 configurable accept url Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 don't process invite messages in separate thread Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 minor fixes Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 more tests to improve coverage Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 fix identity resource lookup Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 fixes for PR Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * Fix configuration * ISSUE-507 fixed tests Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 updated to use WIT config Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * ISSUE-507 fixed tests Signed-off-by: Shane Bryzak <sbryzak@redhat.com> * Clean up Keycloak collaborators/resources (#533) * Clean up Keycloak collaborators/resources * Tests * More tests to fix * Clean up configuration * Drop space-resources * fix method call * remove kc permissionID policyID * Refactor RemoteWITService as per new design of service (#560) - Adds RemoteWITService as new service under all available services for application. - Renamed lookupSpaceName to GetSpaceNameAndOwnedBy and moved it under wit_service.go - Modified tests as per new logic fixes #559 #536 * Extracting cluster service from Auth. Initial commit * Add fabric8-common * Fix compilation errors * Migration test placeholder * Fix auth for tests * Fix compilation errors in tests * Remove SA signer * Fix tests * Fix fetch keys tests * Fix status tests * Rename cluster to f8cluster (#1) * Rename cluster to f8cluster * Format * Rename OS templates * cleanup: fixes some errors in golangci (#4) * fixing tests Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * Fix auth for tests * Fix compilation errors in tests * Fix tests * Fix controller tests * fix tests Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * fix build failure and remove unused func Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * apply review comments Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * add comment on test Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * refactor HTTP query params tests Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * formatting Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * output example on 'AbsoluteURL' function Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * restore more exhaustive tests on tokens Signed-off-by: Xavier Coulon <xcoulon@redhat.com> * add 'resource.Require(t, resource.UnitTest)' and refactor tests Signed-off-by: Xavier Coulon <xcoulon@redhat.com>
github.com/Sirupsen/logrus
v1.0
has been released along but the package name has been lower-cased, which can cause some case-sensitive issues when runningglide install
(see explanation on the project page.The solution is to use the lower-casing everywhere, both in
.go
files and inglide.yaml
.The text was updated successfully, but these errors were encountered: