Commit Graph

281 Commits

Author SHA1 Message Date
Quan HL
1b165b9692 fix: riva_server_uri 2023-02-10 20:28:29 +07:00
Quan HL
922ef9f0b7 fix: riva_server_uri 2023-02-10 20:26:18 +07:00
Quan HL
f6612f551e feat: nvidia speech credential 2023-02-10 14:51:43 +07:00
EgleH
d4f2be3dc1 Add check for users to delete function (#104)
* add check for users to delete function

* fix typo

* fix active admin check

---------

Co-authored-by: eglehelms <e.helms@cognigy.com>
v0.8.0-rc14 v0.8.0-rc12
2023-02-08 07:16:29 -05:00
Dave Horton
a46c24b3aa change applications.app_json to TEXT as it could hold large strings v0.8.0-rc10 v0.8.0-rc11 v0.8.0-rc9 2023-02-03 16:34:11 -05:00
AFelix53
f5c833720a feat: added twilio gateways (#99) v0.8.0-rc8 2023-01-30 10:16:27 -05:00
EgleH
4d2cc15de4 Bug/speech creds get all with no sp sid (#102)
* backwards compatibility

* fetch account and sp speech remove duplicates

* fix retrieval of SP credentials associated to an account level user

* update gh actions

---------

Co-authored-by: eglehelms <e.helms@cognigy.com>
Co-authored-by: Dave Horton <daveh@beachdognet.com>
2023-01-30 10:06:16 -05:00
Hoan Luu Huu
019599741a feat: add app_json to applications endpoint (#100)
* added phone_numbers.app_json column

* modify prev commit to put app_json on applications table

* feat: add app_json to applications endpoint

---------

Co-authored-by: Dave Horton <daveh@beachdognet.com>
Co-authored-by: Quan HL <quanluuhoang8@gmail.com>
2023-01-28 10:02:04 -05:00
EgleH
f2c2623b28 Speech should always be attached to an SP (#98)
* user will always be attached to SP, thus always provide SP sid

* add another fallback for service_provider_sid

* fix the email and username check in user creation that was crashing the server

* not allow same names for shared and account carriers

Co-authored-by: eglehelms <e.helms@cognigy.com>
2023-01-26 07:53:29 -05:00
EgleH
6c494786c8 add check to not allow the same password to be user as new (#97)
Co-authored-by: eglehelms <e.helms@cognigy.com>
v0.8.0-rc6
2023-01-23 07:59:33 -05:00
EgleH
80ee1d06d7 Return scoped carriers and speech creds in /SP GET call (#96)
* return scoped carriers and speech creds in /SP GET call

* apply review comments

Co-authored-by: eglehelms <e.helms@cognigy.com>
2023-01-19 10:53:37 -05:00
EgleH
274377960e Allow falsy values for force_change and Is_active in PUT user call (#95)
* allow falsy values

* apply review comments

Co-authored-by: eglehelms <e.helms@cognigy.com>
2023-01-19 10:39:57 -05:00
Charles Chance
02bba9d981 Update Simwood gateways (#92) 2023-01-12 07:48:47 -05:00
Dave Horton
642a6615a0 additional db upgrade statements for 0.8 v0.8.0-rc4 v0.8.0-rc5 2023-01-10 10:28:46 -05:00
Dave Horton
b0f317b545 final fix for proper alter table v0.8.0-rc3 2023-01-09 15:53:10 -05:00
Dave Horton
43d991ef1c fix error in db update statement 2023-01-09 15:41:24 -05:00
Dave Horton
5ab1ad9056 fixes to update db script for 0.8.0 2023-01-09 14:51:54 -05:00
Dave Horton
37062fa720 gh: run tests on PR 2023-01-09 10:13:08 -05:00
Dave Horton
e42634d726 error case: creating user with duplicate email, return json with msg for toast v0.8.0-rc2 2022-12-26 13:19:24 -06:00
Dave Horton
5a9e22df5e add PUT for Account level Carrier 2022-12-26 11:14:41 -06:00
Dave Horton
e75eae4e24 Bugfix/fix permissions (#89)
* protect service provider data retrieval so only admin users and appropriate service provider users can access

* allow accounts to access ServiceProvider API but filter response data so they dont see other accounts or data they should not
2022-12-25 14:52:57 -06:00
Snyk bot
2000e7de90 fix: package.json & package-lock.json to reduce vulnerabilities (#88)
The following vulnerabilities are fixed with an upgrade:
- https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180020
- https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180022
- https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180024
- https://snyk.io/vuln/SNYK-JS-JSONWEBTOKEN-3180026
2022-12-22 12:01:04 -06:00
Dave Horton
317a094b3e return account name and sp name in getUsers (#87) 2022-12-19 15:05:35 -05:00
Dave Horton
86953b9524 encode account name and sp name as part of jwt (#86) 2022-12-19 08:50:23 -05:00
Dave Horton
c6fd24bc13 restore service_provider_limits.category enum and same for account 2022-12-14 19:50:20 -05:00
Dave Horton
21a81c224f switch to jwt auth 2022-12-12 21:06:11 -05:00
Dave Horton
59445d62cc upgrade script needs to create permissions table 2022-12-12 21:03:30 -05:00
Dave Horton
4a78c5c1fc allow numbers of up to 132 chars in phone_number table 2022-12-12 13:12:54 -05:00
Dave Horton
89f25d7eda save instance_id as part of ibm stt credential v0.8.0-rc1 2022-12-10 09:20:44 -05:00
Dave Horton
49491fe1c4 update qs 2022-12-10 09:16:00 -05:00
dependabot[bot]
add9f2cb99 Bump express from 4.17.1 to 4.17.3 in /test/feature-server-test-scaffold (#84)
Bumps [express](https://github.com/expressjs/express) from 4.17.1 to 4.17.3.
- [Release notes](https://github.com/expressjs/express/releases)
- [Changelog](https://github.com/expressjs/express/blob/master/History.md)
- [Commits](https://github.com/expressjs/express/compare/4.17.1...4.17.3)

---
updated-dependencies:
- dependency-name: express
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2022-12-10 09:13:46 -05:00
EgleH
dd2176bf89 feature/user-api-calls (#80)
* initial changes for jwt auth

* return permissions as an array of string

* basic GET, POST, DELETE user api calls

* add permission checks

* hide hashed_password

* cleanup

* add check if admin user is active

* return account and serviceProvider sid un user object

* add more values to user PUT

* logout user after self delete, fix scope assignment

* add admin scope user tests

* fix test case and align jwt and api key data model in req.user

* fixes for ibm speech

* add limits license_count and voice_call_minutes

* update limits enum again

* rebase to main

* allow predefined carriers and speech credentials for Account user

* reverse the hasAccountPermissions changes

* SpeechCredentials permissions

* fix /Users/me api non-saas jambonz

Co-authored-by: Dave Horton <daveh@beachdognet.com>
Co-authored-by: eglehelms <e.helms@cognigy.com>
2022-12-10 09:12:05 -05:00
Dave Horton
fadbe116c2 update limits enum again 2022-11-26 12:55:00 -05:00
Dave Horton
02e3358c8f add limits license_count and voice_call_minutes 2022-11-25 11:01:43 -05:00
Dave Horton
7bb78a9a2a fixes for ibm speech 2022-11-25 10:55:57 -05:00
Dave Horton
5e070324ae add support for ibm speech credentials, and test for ibm tts (#82)
* add support for ibm speech credentials, and test for ibm tts

* add stt testing for ibm watson
2022-11-21 21:16:26 -05:00
Guilherme Rauen
5be286d3db update node image to the latest and most secure (#81)
Co-authored-by: Guilherme Rauen <g.rauen@cognigy.com>
2022-11-11 11:23:38 -05:00
Dave Horton
0fc8500361 added testing of microsoft stt credential 2022-11-10 17:54:40 -05:00
Dave Horton
ee5e25bb8d add support for deepgram STT 2022-11-10 14:34:04 -05:00
Dave Horton
1b67d5f89d Feature/add users api (#77)
* initial changes for jwt auth

* return permissions as an array of string

* Add JWT expiration environment variable (#74)

* allow fromHost in createCall REST API

* add JWT_EXPIRES_IN=<mins> env variable, 60 mins by default

* add jwt expiration in register.js and signin.js

* fix tests - add permissions and scope to encoded obj in jwt

Co-authored-by: Dave Horton <daveh@beachdognet.com>
Co-authored-by: eglehelms <e.helms@cognigy.com>

* return only the jwt-token in the api response

* update swagger.yaml

* add /users api

* apply review comments

* add users test case

* added User model

* bugfix: admin user should be able to create a carrier for a service provider

Co-authored-by: EgleH <egle.helms@gmail.com>
Co-authored-by: eglehelms <e.helms@cognigy.com>
2022-11-07 13:47:18 -05:00
Dave Horton
46eee0cc60 initial changes to support nuance speech (#78)
* initial changes to support nuance speech

* fixes from testing
2022-10-31 09:59:36 -04:00
Dave Horton
8d303390b7 jwt contains {scope, permissions, user_sid, account_sid, service_provider_sid}, force_change now in the body of /login response 2022-10-27 10:50:17 -04:00
Dave Horton
35214a04dc Feature/jwt auth (#75)
* initial changes for jwt auth

* return permissions as an array of string

* Add JWT expiration environment variable (#74)

* allow fromHost in createCall REST API

* add JWT_EXPIRES_IN=<mins> env variable, 60 mins by default

* add jwt expiration in register.js and signin.js

* fix tests - add permissions and scope to encoded obj in jwt

Co-authored-by: Dave Horton <daveh@beachdognet.com>
Co-authored-by: eglehelms <e.helms@cognigy.com>

* return only the jwt-token in the api response

Co-authored-by: EgleH <egle.helms@gmail.com>
Co-authored-by: eglehelms <e.helms@cognigy.com>
2022-10-27 07:39:11 -04:00
Dave Horton
110c4ed0d8 allow fromHost in createCall REST API 2022-10-25 13:22:30 -04:00
Dave Horton
7890de8c8f update deps v0.7.7-7 2022-10-23 15:22:36 -04:00
Dave Horton
b65dc7080c Dh password settings (#72)
* update package-lock.json

* Feat: password settings for account (#65)

* feat: password settings for account

* feat: password settings for account

* fix: review comments

* fix: review comments

* fix: review comments

* return empty json

* fix: after review

Co-authored-by: xquanluu <110280845+xquanluu@users.noreply.github.com>
2022-10-23 14:11:00 -04:00
Markus Frindt
9d0be0f8e1 [snyk] Fix vulnerabilities (#70)
Co-authored-by: Markus Frindt <m.frindt@cognigy.com>
v0.7.7-4
2022-10-20 21:34:07 -04:00
Dave Horton
81cae89387 actual fix for column name v0.7.7-1 v0.7.7 2022-10-10 14:14:57 +01:00
Dave Horton
0811002c05 update time-series v0.7.7-rc9 2022-10-10 09:17:34 +01:00
Dave Horton
b465e0b8cf bugfix: wrong name of column in db upgrade script 2022-10-10 08:57:21 +01:00