Skip to content

Releases: CanDIG/candig-opa

v3.1.0: Data model 3, site curator role

25 Oct 02:17
1d9bfa0
Compare
Choose a tag to compare

Updates for data model v3, enable site curator role, refactoring for more detailed decision logging

What's Changed

  • v2.0.0: Opa uses Vault to store data by @daisieh in #45
  • v2.1.0: OPA Service tokens and health check by @OrdiNeu in #50
  • v3.0.0: Site roles, program authz, user authz by @daisieh in #57
  • Hotfix: need "as" clause by @daisieh in #58
  • Usernames aren't secrets by @daisieh in #59
  • If vault stores already exist, don't wipe them out by @daisieh in #60
  • DIG-1189: Authz user can view datasets by @daisieh in #61
  • DIG-1652: Remove use of OPA_SERVICE_TOKEN and OPA_ROOT_TOKEN by @daisieh in #62
  • Opa should always renew its IDP information by @daisieh in #63
  • Replace 'single quote' in PR titles by @mshadbolt in #64
  • Update to model 3 by @SonQBChau in #65
  • DIG-1705: implement site-level curator role by @daisieh in #66
  • DIG-1506: Make the decision logic in Opa more transparent by @daisieh in #67
  • hotfix: authx can always see permissions by @daisieh in #68
  • Hotfix: site curator is allowed to curate always by @daisieh in #70
  • v3.1.0: Data model 3, site curator role by @daisieh in #69
  • hotfix: remove default users by @daisieh in #72

Full Changelog: v3.0.0...v3.1.0

v3.0.0: Site roles, program authz, user authz

02 May 17:50
a989584
Compare
Choose a tag to compare

Highlights

  • Site roles, including site admin, now defined in Opa
  • Program authorizations are defined in Opa's vault secret store
  • User-specific program authorizations are defined in Opa's vault secret store
  • Refactored rego policies and created unit tests

What's Changed

  • DIG-1520: Site admin is a role defined in Opa, not in jwt by @daisieh in #51
  • DIG-1518: Rego policies now based on ProgramAuthorizations by @daisieh in #52
  • Interpolate default usernames from .env file instead of hardcoding by @daisieh in #53
  • DIG-1546: Opa unit tests by @daisieh in #54
  • DIG-1502: Opa implements user-specific authorizations by @daisieh in #55
  • DIG-898: allow service_token to view user_key by @daisieh in #56

Full Changelog: v2.1.0...v2.2.0

v2.1.0: OPA Service tokens and health check

05 Mar 20:53
baf2ea1
Compare
Choose a tag to compare

Summary of Changes

  • Add a path for Opa to verify service tokens
  • Add a health check
  • Add HTSGet paths
  • What's Changed

New Contributors

Full Changelog: v2.0.0...v2.1.0

v2.0.0: Use vault to store secrets

01 Feb 18:53
1de4979
Compare
Choose a tag to compare

What's Changed

  • DIG-1318: Opa startup only registers its own token by @daisieh in #38
  • DIG-1377: Be consistent in our use of candig user inside containers by @OrdiNeu in #39
  • DIG-1169, DIG-1402: Opa uses Vault for secret storage by @daisieh in #40

Full Changelog: v1.3.3...v2.0.0

v1.3.3

18 Jul 17:59
1410ad0
Compare
Choose a tag to compare

What's Changed

Full Changelog: v1.3.2...v1.3.3

Bug fix: var safety issue

16 May 05:09
c0e496f
Compare
Choose a tag to compare

What's Changed

Full Changelog: v1.3.1...v1.3.2

Multiple IDPs

04 May 17:37
81d4845
Compare
Choose a tag to compare

What's Changed

  • DIG-970: Update rego files for multiple IDPs by @daisieh in #34

Full Changelog: v1.3.0...v1.3.1

New paths for MoH, htsget

28 Apr 21:55
70881fc
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v1.2.0...v1.3.0

TFRI demo

15 Nov 23:42
9e105da
Compare
Choose a tag to compare

What's Changed

Full Changelog: v1.1.1...v1.2.0

auth tweaks

09 Sep 17:14
cc16c3d
Compare
Choose a tag to compare
Merge pull request #23 from CanDIG/daisieh/secrets

Handle OPA secrets via docker-secrets