4e54a2bb3f
Feature Update: OAuth Settings Management / Dual-Schema Support ( #1515 )
2023-04-10 20:03:28 -04:00
c7aba5626d
Moved authentication settings editor JavaScript into js_main
assets build process instead of direct linking it to the view.
2023-04-10 19:58:58 -04:00
9f076330d6
Removed legacy backend controller code for handling authentication settings form submission.
2023-04-10 19:54:47 -04:00
69ce3cb88a
Added additional UI alerts / messaging to handle success / failure scenarios.
2023-04-10 19:52:18 -04:00
e132ced669
Completed first pass at the jQuery Validation implementation for the authentication settings editor.
2023-04-10 19:29:18 -04:00
ea10b814d6
Working on implementing the jQuery Validation plugin for the authentication settings editor.
2023-04-10 18:35:25 -04:00
cf62890fcf
Working on implementing the jQuery Validation plugin for the authentication settings editor.
2023-04-10 17:28:54 -04:00
a4b6fba2be
Working on implementing the jQuery Validation plugin for the authentication settings editor.
2023-04-10 16:35:02 -04:00
6a19ed2903
Completed basic handling of authentication settings save process to the database.
2023-04-10 13:24:42 -04:00
2e30b83545
Added jQuery Validation 1.19.5 to the project NPM configuration as well as the Flask assets build script for js_main
.
2023-04-10 13:06:06 -04:00
022e780d77
Working on authentication editor data saving workflow.
2023-04-10 12:49:12 -04:00
0912dd2805
Working on Knockout model integration into existing authentication settings editor view.
...
Settings are now loading via new backend API.
2023-04-10 07:39:21 -04:00
827da59ae2
Working on Knockout model integration into existing authentication settings editor view.
2023-04-09 10:26:07 -04:00
737e104912
Added KnockoutJS NPM package.
...
Re-formatted and re-organized settings model.
Working on Knockout model integration into existing authentication settings editor view.
2023-04-09 10:11:00 -04:00
ece9626212
Updated the OAuth login handlers to utilize uniform user naming variables.
...
Updated the GitHub login process to split the user's full name based on spaces so that first and last name are filled in on PDA profile.
2023-04-08 18:14:40 -04:00
9168dd99e0
Updated the OAuth login handlers to utilize uniform user naming variables.
...
Updated the GitHub login process to split the user's full name based on spaces so that first and last name are filled in on PDA profile.
2023-04-08 18:11:55 -04:00
a46ab760fd
Reorganized universal OAuth fields' order to a uniform standard. Also updated the Client ID
field prompts to a uniform standard.
2023-04-08 17:40:30 -04:00
ee9012fa24
Completed OAuth change to make the use of the metadata URL setting exclusive to the authorization and token URL settings. If the former is defined, it will be used in preference to the latter.
2023-04-08 17:14:55 -04:00
ab4495dc46
Completed the implementation of the SERVER_EXTERNAL_SSL
environment setting into the app config files.
...
Completed the implementation of the aforementioned environment setting into the OAuth workflows.
Documented the aforementioned setting in the Environment-variables.md wiki document.
2023-04-08 17:05:27 -04:00
cacfc042e2
Fix Zone Type can not be changed from "native" when adding or modifying zones ( #1502 )
2023-04-02 15:07:57 -04:00
a2429ad9d6
Make it possible again to use a different Zone Type than 'native', fixes #1501
2023-04-02 20:46:32 +02:00
1f6a0504c8
OAuth Settings Updates ( #1500 )
...
Completed the removal of the OAuth JWKS URL setting as well as the update of how the existing metadata URL settings are being used.
For additional information, reference GitHub issue #1499 .
2023-04-02 09:35:17 -04:00
19335439bd
Completed the removal of the OAuth JWKS URL setting as well as the update of how the existing metadata URL settings are being used.
...
For additional information, reference GitHub issue #1499 .
2023-04-02 09:19:05 -04:00
53cfa4fdaa
Fix activity search invalid form markup causing submission failures #1481
2023-03-25 10:00:12 -04:00
e0dffff325
Fix activity search form structure
2023-03-25 11:47:58 +02:00
7b91804a8e
Merge remote-tracking branch 'origin/dev' into dev
2023-03-24 19:42:45 -04:00
15e29b6771
Added references to the project's discord server.
2023-03-24 19:42:35 -04:00
004d1d40c9
Improve exception handling for invalid UTF-8 encoded X-API-KEY header ( #1479 )
2023-03-22 04:34:55 -04:00
a954800869
fix(api): fixed internal server error being generated from invalid UTF-8 encoded X-API-KEY
2023-03-22 01:27:52 +00:00
271f483062
Updated project README to include organization sponsorship reference.
2023-03-21 19:09:48 -04:00
419bf35892
Updated build-and-publish workflow to exclude non-relevant project paths.
2023-03-19 17:05:30 -04:00
f6009ba47b
Updated CodeQL workflow to exclude non-relevant project paths.
2023-03-19 17:02:45 -04:00
ba19943c64
Updated stale thread workflow with updated message verbiage.
...
Updated lock thread workflow to properly exclude threads with specific labels.
2023-03-19 15:09:52 -04:00
6b9638ca19
Updated Security section header of the project README.
2023-03-19 12:39:44 -04:00
e11f55523d
Corrected minor formatting issue with project's Code of Conduct policy.
2023-03-19 12:36:44 -04:00
506a75300a
Added GitHub sponsors configuration.
2023-03-18 21:45:28 -04:00
5acbabaed5
Updated project README to include donation section.
2023-03-18 20:55:20 -04:00
522705a52b
Updated dependabot configuration to target the dev branch.
2023-03-18 20:49:01 -04:00
519b8579db
Merge pull request from GHSA-6c8m-4h29-hmmh
...
fix: fix for CVE-2023-0286 & CVE-2023-23931 - cryptography update to 39.0.2
2023-03-18 20:00:05 -04:00
e7547ff8d3
fix: fix for CVE-2023-0286 & CVE-2023-23931 - cryptography update to 39.0.2
2023-03-18 23:56:22 +00:00
b71f9ae5b4
Merge pull request from GHSA-3pcw-h28g-9w3v
...
Upgrade setuptools to 65.5.1 (CVE-2022-40897 fix)
2023-03-18 19:53:41 -04:00
78e8d9950d
fix: upgrade setuptools to fix CVE-2022-40897
2023-03-18 23:38:48 +00:00
1918f713e1
Merge remote-tracking branch 'origin/dev' into dev
2023-03-18 19:20:47 -04:00
33614ae102
Updated invalid value in dependabot workflow.
2023-03-18 19:20:36 -04:00
d3da1e43ed
Fix LDAP group restrictions by allowing the use of any combination of groups. ( #1463 )
2023-03-18 19:15:01 -04:00
138532fb95
fix: allow the specification of any combination of groups in LDAP group security configuration
...
Previous behavior required the specification of all three group security groups before the
"Save Settings" button would be enabled.
This adds a check into users.py which checks that the group is set before searching and
removes the javascript preventing the specification of any combination of groups.
Tested:
- Tested all combinations on AD after MR 1238
- Tested all combinations on OpenLDAP
- Tested enabling the Group Security with no groups set which correctly prevents login
Resolves #1462
2023-03-18 20:30:52 +00:00
c24b4b047d
Merge pull request #1461 from nkukard/nkupdates-fix-session-clear
...
fix: fixed session clearing and let logout_user take care of cleanup
2023-03-18 16:05:20 -04:00
defb3e5a48
Merge pull request #1238 from melck/fix-ldap-ad-nested-member
...
Fix LDAP user group search for nested groups #1238
2023-03-18 16:03:48 -04:00
f44ff7d261
fix: fixed session clearing and let logout_user take care of cleanup
...
It seems when logging in and logging out, then logging back in, setting
the session timeout to 5 minutes, then waiting for expiry can cause
a situation when using SQLA-based sessions which results in a NULL field
in the database and causes a persistent 500 Internal Server Error.
As per issue 1439 here is a fix found by @raunz.
Resolves #1439 .
Tested for about 8 hours and tons and tons of expired sessions, could not
reproduce with the fix applied.
2023-03-18 19:14:58 +00:00
340e84ab89
Updated MegaLinter workflow to include a manual dispatch option.
2023-03-18 08:52:39 -04:00