Anon Ray
4b4c675ab7
better handling for pgcrypto extension ( fix #338 ) ( #423 )
2018-09-14 17:11:51 +05:30
Praveen Durairaj
17490e14ee
fix add manual relationships state ( close #442 ) ( #450 )
2018-09-14 14:11:03 +05:30
Praveen Durairaj
eeb15f663f
sort untracked table list alphabetically ( close #421 ) ( #449 )
2018-09-14 12:55:11 +05:30
Praveen Durairaj
7b6add51e6
fix track_table pattern, error handling in run_sql ( close #392 ) ( #448 )
2018-09-14 12:44:41 +05:30
Anon Ray
f7dbf2a6f1
add jwt + auth0 todo example app ( #445 )
2018-09-14 09:47:08 +05:30
Rikin Kachhia
d2decec32b
update docs ( #441 )
...
* docs: update custom resolvers docs
* docs: update mono repo links
2018-09-13 18:45:34 +05:30
Anon Ray
af6121f83d
jwt claims check should be case-insensitive ( fix #435 ) ( #438 )
2018-09-13 18:34:50 +05:30
Tirumarai Selvan
c3a38517cd
dont retry http requests in the client ( close #434 ) ( #436 )
2018-09-13 17:22:11 +05:30
Rikin Kachhia
dae3410e4d
add docs on setting default value for columns ( #437 )
2018-09-13 17:10:17 +05:30
Shahidh K Muhammed
5929ec5be3
add installation manifests ( #432 )
2018-09-13 15:03:13 +05:30
Anon Ray
acd62c3bf8
add community boilerplates and examples ( #430 )
2018-09-13 12:00:07 +05:30
Shahidh K Muhammed
be20a11d37
update checks on ci systems ( close #319 ) ( #383 )
2018-09-12 16:33:36 +05:30
Rikin Kachhia
fffaed7bcb
docs update ( #427 )
2018-09-12 14:58:55 +05:30
Anon Ray
a5930edd8a
uri-decode database uri strings ( fix #372 ) ( #424 )
2018-09-12 11:49:08 +05:30
Shahidh K Muhammed
d3d9845497
merge docs into main repo ( close #397 ) ( #398 )
2018-09-11 16:41:24 +05:30
Aravind Shankar
9c7c650d2b
migration apply should not fail if there are no migrations ( close #389 ) ( #390 )
2018-09-10 18:51:30 +05:30
Praveen Durairaj
7a8fc66f73
export event triggers component ( #386 )
2018-09-10 17:48:20 +05:30
Shahidh K Muhammed
e12184d530
update event-triggers.md
2018-09-09 12:04:40 +05:30
Rakesh Emmadi
86b769c8e5
returning on json queries now returns only affected row ( fix #380 ) ( #381 )
2018-09-08 23:02:58 +05:30
Aravind Shankar
79a6849241
add parallel tests and update dependencies ( #374 )
2018-09-08 23:01:14 +05:30
Shahidh K Muhammed
617f379128
update event-triggers doc
2018-09-07 18:41:01 +05:30
Vamshi Surabhi
dd8e09d6cb
add jsonb boolean operators ( close #369 ) ( #376 )
2018-09-07 17:45:28 +05:30
Tirumarai Selvan
e905535beb
implement api to deliver a particular event ( close #371 ) ( #373 )
2018-09-07 17:21:01 +05:30
Tirumarai Selvan
2814e87e37
make sure only events for existing triggers are fetched ( #368 )
2018-09-07 13:53:56 +05:30
Anon Ray
f726bb549d
add custom namespace in jwt claims ( close #350 ) ( #364 )
2018-09-07 11:30:50 +05:30
Shahidh K Muhammed
fd53eb9c1e
update readme with event trigger stuff ( #366 )
2018-09-06 18:07:03 +05:30
Karthik Venkateswaran
e3102dfd5e
ui buttons to export and import metadata, reload metadata api ( close #293 ) ( #323 )
2018-09-05 20:55:30 +05:30
Tirumarai Selvan
1d1d83021b
add create event trigger video link to md ( #362 )
2018-09-05 19:27:56 +05:30
Praveen Durairaj
a49188a606
console: handle non access key errors ( #356 )
...
[skip ci]
2018-09-05 18:38:19 +05:30
Praveen Durairaj
258885ad4d
console: update request payload event triggers ( #358 )
2018-09-05 18:37:52 +05:30
Shahidh K Muhammed
6c9d176921
add event triggers readme ( #359 )
...
[skip ci]
2018-09-05 18:34:29 +05:30
Praveen Durairaj
e8a86a569f
console: add version check for event triggers ( #361 )
...
[skip ci]
2018-09-05 18:30:27 +05:30
Tirumarai Selvan
e402d11318
update catalog version to 2 ( #357 )
2018-09-05 17:12:20 +05:30
Tirumarai Selvan
82e09efce6
add event triggers ( #329 )
2018-09-05 16:56:46 +05:30
Praveen Durairaj
d397d932d6
console: fix error notification non json, auto height css ( #354 )
2018-09-05 12:06:21 +05:30
Rakesh Emmadi
0a3f68a6eb
allow selectively updating columns on a conflict during insert ( fix #342 )
...
* fix primary key changing on upsert, fix #342
* add 'update_columns' in 'on_conflict' object, consider 'allowUpsert'
* 'ConflictCtx' type should respect upsert cases
* validation for not null fields in an object
2018-09-04 19:09:48 +05:30
Rakesh Emmadi
10edb431e4
generate a returning field in a mutation only when the select permission is defined ( fix #340 ) ( #341 )
2018-09-03 12:35:00 +05:30
Aravind Shankar
ea9b187e7c
update tests to use access key ( close #113 ) ( #296 )
...
Closes #113
2018-08-30 21:24:12 +05:30
Shahidh K Muhammed
80bc927d29
Revert "add links to share and help ( #303 )" ( #334 )
...
This reverts commit 798efdd1c0
.
2018-08-30 19:27:06 +05:30
Shahidh K Muhammed
fc9104f0c9
compare only major and minor versions for cli-server ( fix #331 ) ( #332 )
2018-08-30 16:14:07 +05:30
Anon Ray
b2f88ff28a
add support for jwt authorization ( close #186 ) ( #255 )
...
The API:
1. HGE has `--jwt-secret` flag or `HASURA_GRAPHQL_JWT_SECRET` env var. The value of which is a JSON.
2. The structure of this JSON is: `{"type": "<standard-JWT-algorithms>", "key": "<the-key>"}`
`type` : Standard JWT algos : `HS256`, `RS256`, `RS512` etc. (see jwt.io).
`key`:
i. Incase of symmetric key, the key as it is.
ii. Incase of asymmetric keys, only the public key, in a PEM encoded string or as a X509 certificate.
3. The claims in the JWT token must contain the following:
i. `x-hasura-default-role` field: default role of that user
ii. `x-hasura-allowed-roles` : A list of allowed roles for the user. The default role is overriden by `x-hasura-role` header.
4. The claims in the JWT token, can have other `x-hasura-*` fields where their values can only be strings.
5. The JWT tokens are sent as `Authorization: Bearer <token>` headers.
---
To test:
1. Generate a shared secret (for HMAC-SHA256) or RSA key pair.
2. Goto https://jwt.io/ , add the keys
3. Edit the claims to have `x-hasura-role` (mandatory) and other `x-hasura-*` fields. Add permissions related to the claims to test permissions.
4. Start HGE with `--jwt-secret` flag or `HASURA_GRAPHQL_JWT_SECRET` env var, which takes a JSON string: `{"type": "HS256", "key": "mylongsharedsecret"}` or `{"type":"RS256", "key": "<PEM-encoded-public-key>"}`
5. Copy the JWT token from jwt.io and use it in the `Authorization: Bearer <token>` header.
---
TODO: Support EC public keys. It is blocked on frasertweedale/hs-jose#61
2018-08-30 16:02:09 +05:30
Rakesh Emmadi
daf01c2b9d
mutation return type and query type are same ( close #315 ) ( #324 )
2018-08-30 15:19:21 +05:30
Rakesh Emmadi
f72d8de87a
fix insert fails for non-admin roles on v1/query ( fix #327 ) ( #328 )
...
* fix insert fails for non-admin roles on v1/query, fix #327
* add test case for user role upsert usint constraint name
2018-08-29 19:11:33 +05:30
Rakesh Emmadi
75e4400bc5
add req_user_id as alias to x-hasura-user-id ( fix #317 ) ( #320 )
2018-08-29 11:17:13 +05:30
Praveen Durairaj
798efdd1c0
add links to share and help ( #303 )
2018-08-27 19:55:34 +05:30
Rakesh Emmadi
efc9fc7ba9
simpler root level select fields using primary keys ( fix #304 ) ( #306 )
...
* select fields by primary key col values as argument values, fix #304
* change field name 'table_by_pkey' to 'table_by_pk'
2018-08-27 19:47:03 +05:30
Rakesh Emmadi
0f13f72bfe
do not allow creating permissions for admin role, fix #310 ( #312 )
2018-08-27 17:20:18 +05:30
Praveen Durairaj
c645fc5c46
permissions ui/ux improvements ( close #205 ) ( #295 )
...
- Delete role(s)
- Apply same type of permission to multiple roles
Closes #205
2018-08-22 13:55:48 +05:30
Rakesh Emmadi
a0574307c3
set header variables in subscription transaction, fix #297 ( #299 )
2018-08-22 13:53:53 +05:30
Aravind Shankar
396a2ccf8d
change hasuradb url format, export some migrate functions ( #294 )
...
* fix migrate to use headers in query params
* export executeMigrations and PrintStatus
2018-08-22 00:07:47 +05:30