- [TD-6862] Optimize QX permissions
- [TD-6911]
- update Elixir 1.18
- update dependencies
- update Docker RUNTIME_BASE=alpine:3.21
- remove unused dependencies
- remove swagger
- remove cabagge
- [TD-6865] Automatically create groups based on LDAP
- [TD-6989] Roolback 6811 and include profile_mapping configuration in runtime
- [TD-6991] Put permission roles in cache when roles are edited
- [TD-6811] Add uid field to LDAP integration
- [TD-6950] Fix add and delete user role functionality
- [TD-6184] Role for Agents, and remove role_type fro users
- [TD-6602] Update cache when ACL resource is created, edited or deleted
- [TD-6619] Fix pattern matching for empty sslopts
- [TD-6619] Add sslopt to exladp.open
- [TD-6619] Function typo
- [TD-6619] Add ad sslops and remove environment variables for booleans
- [TD-6619] Environment variables for booleans in td-auth
- [TD-5520] Added new permissions group to visualize grants
- [TD-5495] Foreing keys columns should match original ID columns in all tables
- [TD-6386] Users listing with Default Role Permissions
- [TD-4110] Allow structure scoped permissions management
- [TD-6425] Ensure SSL if configured for release migration
- [TD-6195] Permissions for Business Concept Ai Suggestions
- [TD-6336] Get test-truedat-eks config on deploy stage
- [TD-6152] Permissions for QX executions
- [TD-6140] Added permissions for Ai suggestions
- [TD-5505] Added permissions for
manage_grant_removal
andmanage_foreign_grant_removal
- [TD-6059] Added permissions for QualityControls
- [TD-6079] Allow all users to get roles
- [TD-5468] Change the resource_acl_path to acl_path for kong update version
- [TD-5912]
.gitlab-ci.yml
adaptations for develop and main branches
- [TD-5770] Add database TSL configuration
- [TD-5691] Domains and role filter for grant requests
- [TD-5297] Added
DB_SSL
environment variable for Database SSL connection
- [TD-5509] link_structure_to_structure permission
- [TD-4300] manage_basic_implementations permission
- [TD-5258] Add
role
to user data - [TD-5256] Update dependencies, build with
elixir-1.13.4-alpine
- [TD-5284] Phoenix 1.6.x
- [TD-4903] Include
sobelow
static code analysis in CI pipeline
- [TD-5082] view_protected_metadata permission
- [TD-5133] filter on /user/search for retreaving users with a specific permission
- [TD-5036] Support for custom permissions
- [TD-3614] Support short-lived access tokens with refresh mechanism using secure cookie
- [TD-4412] Support for caching groups and group related acls
- [TD-4431] New permission
request_grant_removal
- [TD-4918] Refactor quality implementations permissions
- [TD-4540] New permissions for implementation workflow
- [TD-4089] New permission
manage_ruleless_implementations
- [TD-4538] New permission
manage_segments
indata_quality
- [TD-4271] New permissions
link_implementation_structure
- [TD-4625]
RoleLoader.load_roles/0
was failing when no roles exist
- [TD-4271] New permissions
link_implementation_business_concept
- [TD-3233] Rule result remediation plan
manage_remediations
permission - [TD-4577] Move view
StructureNotes
permissions todata_structure
group
- [TD-2501] Database timeout and pool size can now be configured using
DB_TIMEOUT_MILLIS
andDB_POOL_SIZE
environment variables - [TD-4491] Caching of permissions has been refactored
- [TD-4604] Removed route
/api/users/me/permissions
- New permissions:
- [TD-4437]
manage_rule_results
- [TD-4481]
manage_business_concepts_domain
- [TD-4437]
- [TD-4456] Include user external_id in UserCache.put (removes [TD-4212])
- [TD-4228] Include optional
external_id
for users
- [TD-4212]
- Remove ACLs after domain member deletion
- Remove ACLs after user deletion
- [TD-4203] Update
td-cache
for role permissions
- [TD-4205] TdAuth.Permissions.RoleLoader server was not started on application
- [TD-4044] Filter permissions without role before putting to cache
- [TD-4057] OIDC: Allow discovery uri to be self-signed
- New permission
approve_grant_request
- [TD-4076] store roles with permissions in cache
- [TD-4030] Conflict with permission
create_grant_request
- [TD-3931] Update acl entry resource
- [TD-3982] New permission
create_grant_request
- [TD-3833] Allow to setup user groups to be allowed to enter the application for SAML integration
- [TD-3945] New permissions to view and manage grants
- [TD-3947] Updated td-cache to write cache for user_name
- [TD-3873] Include a specific permission to be able to share a concept with a domain
- [TD-3833] Allow to setup user groups to be allowed to enter the application for SAML integration
- [TD-3894] User email is now optional
- Removed deprecated
is_admin
field in user requests and responses
- [TD-3617] url in state for auth0 and idc
- [TD-3720] New permission
manage_structures_domain
- [TD-3900] Allow proxy authentication in
OpenIdConnect
- [TD-3522] Added permissions to StructureNotes management
- [TD-3816] Build using Elixir 1.12 and Erlang/OTP 23
- [TD-3102] Improve change password functionality
- [TD-3753] Build using Elixir 1.12 and Erlang/OTP 24
- [TD-3503]
- Created APIs
api/users/search
andapi/groups/search
- Removed permissions for non-admin users to
:index
users and groups
- Created APIs
- [TD-3526]
link_data_structure_tag
permission to link a structure to a tag
- [TD-3628] Force release to update base image
- [TD-3445] Postgres port configurable through
DB_PORT
environment variable
- [TD-3326] Configure JWT token TTL using environment variables
- [TD-3297] PKCE code verifier length is now configurable using environment
variable
PKCE_CODE_VERIFIER_LENGTH
(defaults to 128)
- [TD-1389] Generates events for login attempts and successes
- [TD-2951] Permission
profile_structures
.
- Build with
elixir:1.11.3-alpine
, runtimealpine:3.13
- [TD-3245] Tested compatibility with PostgreSQL 9.6, 10.15, 11.10, 12.5 and
13.1. CI pipeline changed to use
postgres:12.5-alpine
.
- [TD-3296] Support for PKCE in OAuth 2.0 authentication code flow. To enable
PKCE, set the environment varible
PKCE_CODE_CHALLENGE_METHOD
toS256
.
- [TD-3146] Delete acl entries from deleted domain ids collection
- [TD-3163] Initial support for service accounts
- [TD-3164] Service accounts can view auth API resources
- [TD-3163] Auth tokens now include rule claim instead of is_admin flag
- [TD-3182] Allow to use redis with password
- [TD-3074] Allow to query
users
andgroups
for users having permissions in bg
- [TD-3162] users
is_protected
field
- [TD-3170] Build docker image which runs with non-root user
- [TD-3139]
/api/init
now creates the initial admin user as unprotected unlessis_protected: true
is specified in the payload
- [TD-3143] Support Azure Active Directory with OAuth 2.0 auth code flow
- [TD-2486] Permissions
manage_data_sources
andmanage_configurations
- [TD-2461] Split
business_glossary
permission group into groupsbusiness_glossary_view
andbusiness_glossary_management
- [TD-3101]
GET /api/users/init/can
Verifies if unprotected users exists
- [TD-3110] Increased maximum accepted length of HTTP request header values
- [TD-3047] Renamed permission
execute_quality_rule
toexecute_quality_rule_implementations
- [TD-2872]
GET /api/users/init/can
Can create initial user
- [TD-2534] Refresh acl cache after group is updated
- [TD-2280] Do not reference to domains by their names
- [TD-2687] Remove
email
andis_admin
from principal in ACL entry responses - [TD-2684]
POST /api/:resource_type/:resource_id/acl_entries
to create a new ACL entry for a resource - Updated to Phoenix 1.5
- [TD-2684]
PATCH /api/:resource_type/:resource_id/acl_entries
is no longer used, removed unusedupdate_acl_entry
permission check - Prometheus metrics exporter
- [TD-2361] Manage raw rule implementations permission
- [TD-2394] Endpoint for returning user permissions domains
- [TD-940] Migrated to Elixir 1.10, simplified routes, improved hypermedia on
/api/:resource_type/:resource_id/acl_entries
- [TD-2281] Include permission groups in JWT token, added permissions for dashboards and lineage
- [TD-2330] Allow custom login validations based on Ldap attributes
- [TD-832] Group api for permissions
- Default log format is now with UTC timestamp and includes PID and module metadata
- [TD-2170] permission to manage metadata
- [TD-2181] Proxy login now returns token on first step
- Use td-cache 3.7.0
- [TD-740] Group users endpoint
- Use td-cache 3.5.1
- Use td-hypermedia 3.6.1
- [TD-2044] Permission execute_quality_rule
- [TD-1775] Permission manage quality rule implementations
- [TD-1776] Permission view_quality_rule
- [TD-2002] Update td-cache and delete permissions list from config
- [TD-1594] fix allow_proxy_login config to accept environment value
- [TD-1618] Cache improvements (use td-cache instead of td-perms)
- [TD-1594] Support for proxy login
- [TD-1893] Use CI_JOB_ID instead of CI_PIPELINE_ID
- [TD-1702] New permission view_data_structures_profile
- [TD-1699] New flow for ldap authentication
- [TD-1535] New permission manage_ingest_relations
- [TD-1774] Newline is missing in logger format
- [TD-1605] Remove acl entry from cache at delete
- [TD-1636] Use alpine:3.9 as base image for docker runtime
- [TD-1544] Added a connection parameter to Auth0 config
- [TD-1571] Elixir's Logger config will check for EX_LOGGER_FORMAT variable to override format
- [TD-1463] Added a description field to acl_entries
- [TD-1463] Description field has now 120 charactes length
- [TD-1087] control role name uniqueness on changeset
- Updated esaml to v4.1.0
- Removed access_method variable from session create
- [TD-980] An user can change his password if he is logged with username and password
/api/init
is now a POST method allowing initial credentials to be specified- Improve naming of Auth0 configuration variables
- [TD-1379] SAML authentication: allow certain roles to be rejected
- Variable Auth0 Configuration
- [TD-1326] include SAML name attribute in profile mapping
- rename init endpoint to api/init
- [TD-1357] removed default users from migration and added init_credential endpoint
- [TD-1326] support for SAML authentication flow
- CI builds are now on OTP 21.2 and Elixir 1.7.4
- Update to distillery 2.0
- Removed unused edeliver artifacts
- Response codes 403 (forbidden) and 401 (unauthorized) were sometimes being used incorrectly
- Update to phoenix 1.4.0, ecto 3.0
- Remove unused channels / phoenix_pubsub artifacts
- Added manage_confidential_structures permission
- Update td_perms version 2.10.0
- Update to openid_connect 0.2.0 and specify id_token as resposne type
- [TD-1172] Fixed missing authorization for update_acl_entry
- [TD-1153] Refactor /api/auth :index. Now it returns a map with the various available auth methods configurated
- Production build requires new environment variable: AUTH_CLIENT_ID
- Get surname in login with Auth0
- Update dependencies (td-perms 0.8.2, credo 0.10.2)
- Configurable log level for controllers and reduce logging in PingController
- User cache loader writes user email by full_name
- API endpoint to list authentication methods (currently only returns OIDC endpoint)
- Prevent application startup from failing if OIDC environment variables are absent
- Failure loading acl cache when user list is empty
- Support for OpenID Connect