aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* enable backtraces for makefile-run commandsHEADmasterJesse Luehrs2019-12-181-4/+4
|
* just return a future from the handler functionJesse Luehrs2019-12-181-27/+51
|
* add a few more makefile targetsJesse Luehrs2019-12-181-0/+8
|
* make the oauth client a struct instead of a traitJesse Luehrs2019-12-188-171/+182
|
* move client id file manipulation out of oauthJesse Luehrs2019-12-164-42/+41
| | | | it doesn't actually have anything to do with the oauth flow
* bump seedJesse Luehrs2019-12-075-8/+13
|
* bump oauth2Jesse Luehrs2019-12-073-39/+18
|
* bump depsJesse Luehrs2019-12-075-143/+172
|
* simplifyJesse Luehrs2019-11-281-6/+6
|
* fix confusing type signatureJesse Luehrs2019-11-283-4/+4
|
* simplifyJesse Luehrs2019-11-271-17/+19
|
* refactor a bitJesse Luehrs2019-11-272-84/+132
|
* pull auth_client out into its own fieldJesse Luehrs2019-11-277-36/+61
| | | | | | it doesn't hurt anything even though it's not super necessary for plain logins, and it's more convenient to access without needing to deconstruct the enum value
* rethink how oauth logins need to workJesse Luehrs2019-11-274-150/+81
| | | | | | | i can't exchange refresh tokens for access tokens without knowing the webface oauth configuration either, so this strategy also won't work. the server actually needs to only receive access tokens, and request the web server to refresh them as needed.
* better error messagesJesse Luehrs2019-11-272-2/+20
|
* make the oauth methods return both tokensJesse Luehrs2019-11-272-10/+14
|
* add oauth endpointJesse Luehrs2019-11-272-0/+62
| | | | no functionality yet
* implement logging in with the oauth tokens on the server sideJesse Luehrs2019-11-272-10/+83
|
* fix method nameJesse Luehrs2019-11-271-2/+2
|
* actually, the token response needs to send both tokensJesse Luehrs2019-11-271-7/+23
| | | | | | the server needs the access token to use for the current login process, but it'll also need to store the refresh token so that it doesn't need to re-login afterwards
* simplifyJesse Luehrs2019-11-275-26/+8
|
* calculate the redirect_url for web oauth tooJesse Luehrs2019-11-274-21/+37
| | | | | a bit more complicated because it needs to use the configured public_address, etc
* make the web client use raw clients for everythingJesse Luehrs2019-11-272-22/+20
|
* the server doesn't need to know about the web oauth configsJesse Luehrs2019-11-273-39/+24
|
* split oauth_response into two different messagesJesse Luehrs2019-11-273-14/+39
| | | | | | | | | | the local client needs to receive the code and send it directly to the server, which handles the rest of the oauth flow (because the client doesn't have the server's oauth configuration, so it can't do the exchange itself), but the web client needs to receive the code and exchange it for a token and send that token to the server (because the server doesn't have the web server's oauth configuration, so it can't do the exchange itself)
* fix error messageJesse Luehrs2019-11-261-4/+1
|
* make plain logins also hit the serverJesse Luehrs2019-11-261-5/+129
| | | | this also provides a foundation for how to handle oauth logins
* read the oauth method configs in the webfaceJesse Luehrs2019-11-266-2/+61
| | | | the oauth login link doesn't work yet, but the ui works at least
* store more information about the login stateJesse Luehrs2019-11-265-9/+20
| | | | | | we need to know both who we are (so that the webface can display it) and also how to log back in as that user (since oauth methods log back in without specifying the username at all)
* simplify oauth url handlingJesse Luehrs2019-11-262-15/+22
|
* rename this structJesse Luehrs2019-11-261-5/+5
|
* allow creating raw clients that don't handle the login processJesse Luehrs2019-11-261-37/+77
| | | | | so that frontends that want to handle logins themselves can still have the client handle the connection process
* pass oauth login urls along to the browserJesse Luehrs2019-11-264-11/+89
|
* allow multiple oauth configurations using the same auth typeJesse Luehrs2019-11-2611-70/+225
| | | | | this should allow us to configure a separate oauth application for tt web than normal (since the redirect_url needs to be different)
* add a logout buttonJesse Luehrs2019-11-267-1/+39
|
* allow configuring the allowed login methods for the web serverJesse Luehrs2019-11-264-1/+37
|
* remove title from webconfigJesse Luehrs2019-11-266-11/+2
| | | | this was only temporary to prove the webconfig stuff worked
* styleJesse Luehrs2019-11-261-3/+1
|
* use the correct username to log in on the server sideJesse Luehrs2019-11-252-10/+11
| | | | now that we're persisting it properly
* also build the wasm with -OzJesse Luehrs2019-11-253-1/+2
|
* remove a format! callJesse Luehrs2019-11-253-2/+2
| | | | apparently they are expensive (in code size)
* move value extraction logic into the viewJesse Luehrs2019-11-255-9/+11
| | | | since it depends more on the structure of the rendered page
* make logins persistentJesse Luehrs2019-11-2510-18/+97
| | | | so if the server knows we're logged in, don't show the login page
* autofocus the username text boxJesse Luehrs2019-11-253-4/+6
|
* a bit more refactoringJesse Luehrs2019-11-254-16/+26
|
* add a basic login screenJesse Luehrs2019-11-244-4/+13
|
* simplify the update logic a bitJesse Luehrs2019-11-244-47/+42
|
* refactorJesse Luehrs2019-11-243-22/+47
|
* start working on the login flowJesse Luehrs2019-11-2312-3/+205
|
* declare a character encodingJesse Luehrs2019-11-231-0/+1
|