Skip to content
Snippets Groups Projects

Repository graph

You can move around the graph by using the arrow keys.
Select Git revision
  • ci-trigger-aura-tests
  • fix-aura-sysuser protected
  • gorm-v2+gormigrate-v2
  • main default protected
  • remove-playlists
  • topic/exteneded-metadata
  • 1.0.0-alpha6 protected
  • 1.0.0-alpha5 protected
  • 1.0.0-alpha4 protected
  • 1.0.0-alpha3 protected
  • 1.0.0-alpha2 protected
  • 1.0.0-alpha1 protected
12 results
Created with Raphaël 2.2.015May128129Apr2524232120191716111065331Mar292827262423222120191716151413121118Nov7Oct6521Sep1916151098732131Aug181615129875420Jul1817161514865432130Jun2927252423221716154Jan330Dec27262524232132130Nov16fix auth middlewaresome more cleanupsome more refactoringsome more refactoringrefactoring API function callsrefactoring auth http handlertidy up go modulesgin bindings are actually not that niceall api components now use ginimports and uploads converted to gin as wellapi files is now using ginfix result message for session logoutauth is fully converted to ginauth session handling ported to ginapi: first test with ginImprove explanation of MariaDB (Ubuntu 18.04 is also affected)making 4080 the new default portadded some comments for handling file creation errorsminor cleanupdeactivate auth in sample configoidc session refreshersession cleanup is purely done by maintenance tasksession states are orderedmake oidc login with exisiting oauth2 token a little bit nicersome more session test-casesadded some todos/notesexpired vs. validadded oidc session refresh function (needs testing!)shallow vs empty copyoidc: use new session shallow copiessessions.insert() vs session.new()disable auth in sample configminor cleanupMerge branch 'topic/oidc-resource-server'oidc session creation with existing access_token works nowadded support for external access_tokenuse context for session expiryadded arguments for new oidc session request to in future accept access_tokensminor refactoring in oidc codeadded tests for middleware
Loading