Commit Graph

1597 Commits

Author SHA1 Message Date
4e54a2bb3f Feature Update: OAuth Settings Management / Dual-Schema Support (#1515) 2023-04-10 20:03:28 -04:00
c7aba5626d Moved authentication settings editor JavaScript into js_main assets build process instead of direct linking it to the view. 2023-04-10 19:58:58 -04:00
9f076330d6 Removed legacy backend controller code for handling authentication settings form submission. 2023-04-10 19:54:47 -04:00
69ce3cb88a Added additional UI alerts / messaging to handle success / failure scenarios. 2023-04-10 19:52:18 -04:00
e132ced669 Completed first pass at the jQuery Validation implementation for the authentication settings editor. 2023-04-10 19:29:18 -04:00
ea10b814d6 Working on implementing the jQuery Validation plugin for the authentication settings editor. 2023-04-10 18:35:25 -04:00
cf62890fcf Working on implementing the jQuery Validation plugin for the authentication settings editor. 2023-04-10 17:28:54 -04:00
a4b6fba2be Working on implementing the jQuery Validation plugin for the authentication settings editor. 2023-04-10 16:35:02 -04:00
6a19ed2903 Completed basic handling of authentication settings save process to the database. 2023-04-10 13:24:42 -04:00
2e30b83545 Added jQuery Validation 1.19.5 to the project NPM configuration as well as the Flask assets build script for js_main. 2023-04-10 13:06:06 -04:00
022e780d77 Working on authentication editor data saving workflow. 2023-04-10 12:49:12 -04:00
0912dd2805 Working on Knockout model integration into existing authentication settings editor view.
Settings are now loading via new backend API.
2023-04-10 07:39:21 -04:00
827da59ae2 Working on Knockout model integration into existing authentication settings editor view. 2023-04-09 10:26:07 -04:00
737e104912 Added KnockoutJS NPM package.
Re-formatted and re-organized settings model.

Working on Knockout model integration into existing authentication settings editor view.
2023-04-09 10:11:00 -04:00
ece9626212 Updated the OAuth login handlers to utilize uniform user naming variables.
Updated the GitHub login process to split the user's full name based on spaces so that first and last name are filled in on PDA profile.
2023-04-08 18:14:40 -04:00
9168dd99e0 Updated the OAuth login handlers to utilize uniform user naming variables.
Updated the GitHub login process to split the user's full name based on spaces so that first and last name are filled in on PDA profile.
2023-04-08 18:11:55 -04:00
a46ab760fd Reorganized universal OAuth fields' order to a uniform standard. Also updated the Client ID field prompts to a uniform standard. 2023-04-08 17:40:30 -04:00
ee9012fa24 Completed OAuth change to make the use of the metadata URL setting exclusive to the authorization and token URL settings. If the former is defined, it will be used in preference to the latter. 2023-04-08 17:14:55 -04:00
ab4495dc46 Completed the implementation of the SERVER_EXTERNAL_SSL environment setting into the app config files.
Completed the implementation of the aforementioned environment setting into the OAuth workflows.

Documented the aforementioned setting in the Environment-variables.md wiki document.
2023-04-08 17:05:27 -04:00
cacfc042e2 Fix Zone Type can not be changed from "native" when adding or modifying zones (#1502) 2023-04-02 15:07:57 -04:00
a2429ad9d6 Make it possible again to use a different Zone Type than 'native', fixes #1501 2023-04-02 20:46:32 +02:00
1f6a0504c8 OAuth Settings Updates (#1500)
Completed the removal of the OAuth JWKS URL setting as well as the update of how the existing metadata URL settings are being used.

For additional information, reference GitHub issue #1499.
2023-04-02 09:35:17 -04:00
19335439bd Completed the removal of the OAuth JWKS URL setting as well as the update of how the existing metadata URL settings are being used.
For additional information, reference GitHub issue #1499.
2023-04-02 09:19:05 -04:00
53cfa4fdaa Fix activity search invalid form markup causing submission failures #1481 2023-03-25 10:00:12 -04:00
e0dffff325 Fix activity search form structure 2023-03-25 11:47:58 +02:00
7b91804a8e Merge remote-tracking branch 'origin/dev' into dev 2023-03-24 19:42:45 -04:00
15e29b6771 Added references to the project's discord server. 2023-03-24 19:42:35 -04:00
004d1d40c9 Improve exception handling for invalid UTF-8 encoded X-API-KEY header (#1479) 2023-03-22 04:34:55 -04:00
a954800869 fix(api): fixed internal server error being generated from invalid UTF-8 encoded X-API-KEY 2023-03-22 01:27:52 +00:00
271f483062 Updated project README to include organization sponsorship reference. 2023-03-21 19:09:48 -04:00
419bf35892 Updated build-and-publish workflow to exclude non-relevant project paths. 2023-03-19 17:05:30 -04:00
f6009ba47b Updated CodeQL workflow to exclude non-relevant project paths. 2023-03-19 17:02:45 -04:00
ba19943c64 Updated stale thread workflow with updated message verbiage.
Updated lock thread workflow to properly exclude threads with specific labels.
2023-03-19 15:09:52 -04:00
6b9638ca19 Updated Security section header of the project README. 2023-03-19 12:39:44 -04:00
e11f55523d Corrected minor formatting issue with project's Code of Conduct policy. 2023-03-19 12:36:44 -04:00
506a75300a Added GitHub sponsors configuration. 2023-03-18 21:45:28 -04:00
5acbabaed5 Updated project README to include donation section. 2023-03-18 20:55:20 -04:00
522705a52b Updated dependabot configuration to target the dev branch. 2023-03-18 20:49:01 -04:00
519b8579db Merge pull request from GHSA-6c8m-4h29-hmmh
fix: fix for CVE-2023-0286 & CVE-2023-23931 - cryptography update to 39.0.2
2023-03-18 20:00:05 -04:00
e7547ff8d3 fix: fix for CVE-2023-0286 & CVE-2023-23931 - cryptography update to 39.0.2 2023-03-18 23:56:22 +00:00
b71f9ae5b4 Merge pull request from GHSA-3pcw-h28g-9w3v
Upgrade setuptools to 65.5.1 (CVE-2022-40897 fix)
2023-03-18 19:53:41 -04:00
78e8d9950d fix: upgrade setuptools to fix CVE-2022-40897 2023-03-18 23:38:48 +00:00
1918f713e1 Merge remote-tracking branch 'origin/dev' into dev 2023-03-18 19:20:47 -04:00
33614ae102 Updated invalid value in dependabot workflow. 2023-03-18 19:20:36 -04:00
d3da1e43ed Fix LDAP group restrictions by allowing the use of any combination of groups. (#1463) 2023-03-18 19:15:01 -04:00
138532fb95 fix: allow the specification of any combination of groups in LDAP group security configuration
Previous behavior required the specification of all three group security groups before the
"Save Settings" button would be enabled.

This adds a check into users.py which checks that the group is set before searching and
removes the javascript preventing the specification of any combination of groups.

Tested:
- Tested all combinations on AD after MR 1238
- Tested all combinations on OpenLDAP
- Tested enabling the Group Security with no groups set which correctly prevents login

Resolves #1462
2023-03-18 20:30:52 +00:00
c24b4b047d Merge pull request #1461 from nkukard/nkupdates-fix-session-clear
fix: fixed session clearing and let logout_user take care of cleanup
2023-03-18 16:05:20 -04:00
defb3e5a48 Merge pull request #1238 from melck/fix-ldap-ad-nested-member
Fix LDAP user group search for nested groups #1238
2023-03-18 16:03:48 -04:00
f44ff7d261 fix: fixed session clearing and let logout_user take care of cleanup
It seems when logging in and logging out, then logging back in, setting
the session timeout to 5 minutes, then waiting for expiry can cause
a situation when using SQLA-based sessions which results in a NULL field
in the database and causes a persistent 500 Internal Server Error.

As per issue 1439 here is a fix found by @raunz.

Resolves #1439.

Tested for about 8 hours and tons and tons of expired sessions, could not
reproduce with the fix applied.
2023-03-18 19:14:58 +00:00
340e84ab89 Updated MegaLinter workflow to include a manual dispatch option. 2023-03-18 08:52:39 -04:00