aboutsummaryrefslogtreecommitdiff
path: root/app
Commit message (Collapse)AuthorAgeFilesLines
...
* | Map added but no dynamic points placed, the current points are hand-picked ↵Nemael2020-10-081-0/+48
|/ | | | from the data
* Attempt to a fix for the edit resource pageNemael2020-10-081-2/+2
|
* Added leaflet gem and changed a bit the Edit Ressource page to be able to ↵Nemael2020-10-081-4/+6
| | | | edit categories
* Fix form, add flashhellekin2020-10-065-3/+88
|
* First pass at Resources...hellekin2020-10-064-4/+19
|
* First pass at listing Resourceshellekin2020-10-064-2/+77
| | | | | | This implements resource listing and pagination. See /resources
* Add Resource modelhellekin2020-10-062-0/+7
| | | | | | Resources will be stored as JSON, in the (GeoJSON) :feature column. They are assigned an UUID upon creation if they don't comme with one. They belong to an Agent.
* Refactor authentication method to make it a bit more readablehellekin2020-10-061-35/+67
|
* Fix URLhellekin2020-10-061-1/+1
|
* First pass at something visiblehellekin2020-10-0620-8/+333
| | | | This is a first version of the application, to go beyond simple authentication.
* Extract Role check to a background jobhellekin2020-10-062-9/+57
| | | | | | | When using SSO, the Discourse sends a list of the user groups. We take the opportunity to update Agency information for the user. This is performed as a background job, as it involves networked requests to the Discourse, e.g., to verify group ownership...
* Add instance methodshellekin2020-10-061-0/+10
| | | | | | | The Agency class can `grant` and `revoke` roles for a given Agent and User. Since it is primarily used in context of both an Agent and User, we add convenience methods so that one can grant or revoke a role simply by passing the desired role to the instance.
* Add Authentication logichellekin2020-10-057-0/+127
| | | | | | | | | | | The ApplicationController provides a `current_user` method (and helper) to access the authenticated user (if any). The WelcomeController provides minimal logic to authenticate against DiscourseSSO. Current state is that one can login and logout. Views need a lot of work.
* Add Agent and Agency modelshellekin2020-10-052-0/+26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since IN COMMON is about collective management of data we're using the concept of Agent to describe a group of users acting together. In ActivityPub terms, Agent will be the Actor when manipulating data, so that any individual User (or application) member of this Agent will be able to manipulate data on behalf of this Agent. Therefore a User has many Agencies, and an Agent as well: the Agency model allows not only to create a joint table between Agents and Users, but also to manage User roles within the related Agent. Roles are defined as: - observer: one who can read and review or flag data - editor: one who create or edit data - maintainer: one who can edit data and manage maps - leader: one who can manage roles A User may have zero or more roles in an Agent. A User without a Agency record for a specific Agent will only be able to 'observe' public data from this Agent. (Note that this is not currently specified, but matches existing reflection on Agents) https://doc.incommon.cc/#agents
* Configure Discourse SSOhellekin2020-10-053-1/+8
| | | | | | | | We're creating a minimal User model that will be filled from SSO. We also configure Inflections so we can use SSO instead of Sso which looks weird for a module named after an acronym. Use Discourse as SSO: https://meta.discourse.org/t/using-discourse-as-a-sso-provider/32974
* Add Discourse SSO codehellekin2020-10-052-0/+99
|
* rails new incommon-map -d postgresql -C -Thellekin2020-10-0514-0/+80