Commit Graph

1656 Commits

Author SHA1 Message Date
Rauno Tuul
d27fa2aa96 minor syntax improvement to use single history object as list 2023-04-04 22:27:21 +03:00
Rauno Tuul
84d792ac07 Resolved merge conflict 2023-04-04 15:50:46 +03:00
Rauno Tuul
fe10665e19 Refactored zone history retrieval, parsing and displaying code. 2023-04-04 15:32:52 +03:00
Stefan Ubbink
bae746cffe Show the current zone type and soa-edit-api settings on the zone settings page 2023-04-03 17:40:46 +02:00
Matt Scott
cacfc042e2
Fix Zone Type can not be changed from "native" when adding or modifying zones (#1502) 2023-04-02 15:07:57 -04:00
Stefan Ubbink
a2429ad9d6 Make it possible again to use a different Zone Type than 'native', fixes #1501 2023-04-02 20:46:32 +02:00
Matt Scott
1f6a0504c8
OAuth Settings Updates (#1500)
Completed the removal of the OAuth JWKS URL setting as well as the update of how the existing metadata URL settings are being used.

For additional information, reference GitHub issue #1499.
2023-04-02 09:35:17 -04:00
Matt Scott
19335439bd
Completed the removal of the OAuth JWKS URL setting as well as the update of how the existing metadata URL settings are being used.
For additional information, reference GitHub issue #1499.
2023-04-02 09:19:05 -04:00
Rauno Tuul
e6c0b4c15f Performance gain in activity records list as in #1381 2023-03-30 16:23:03 +03:00
Jan Koppe
0d0339a316
fix #1485: allow more than 100 rows default in dashboard
The dashboard.domains_custom route was hardcoded to either return all
the domains, or at most 100, regardless of default_domain_table_size
setting.

Make this limit be dependent on default_domain_table_size instead.

The API will now limit to 100 or default_domain_table_size, whichever
one is higher. This is done to not break any seconday use-cases that
might depend on the hardcoded setting.
2023-03-29 14:52:00 +02:00
Rauno Tuul
bb34daa333 Activity pages history base_query unification and perfomance improvement for standard user 2023-03-28 16:41:08 +03:00
Matt Scott
53cfa4fdaa
Fix activity search invalid form markup causing submission failures #1481 2023-03-25 10:00:12 -04:00
Rauno Tuul
e0dffff325 Fix activity search form structure 2023-03-25 11:47:58 +02:00
Matt Scott
b86282b442
Added references to the project's discord server. 2023-03-24 19:43:08 -04:00
Matt Scott
7b91804a8e
Merge remote-tracking branch 'origin/dev' into dev 2023-03-24 19:42:45 -04:00
Matt Scott
15e29b6771
Added references to the project's discord server. 2023-03-24 19:42:35 -04:00
Matt Scott
004d1d40c9
Improve exception handling for invalid UTF-8 encoded X-API-KEY header (#1479) 2023-03-22 04:34:55 -04:00
Nigel Kukard
a954800869 fix(api): fixed internal server error being generated from invalid UTF-8 encoded X-API-KEY 2023-03-22 01:27:52 +00:00
Matt Scott
92033aa109
Updated project README to include organization sponsorship reference. 2023-03-21 19:11:30 -04:00
Matt Scott
271f483062
Updated project README to include organization sponsorship reference. 2023-03-21 19:09:48 -04:00
Matt Scott
1762a5481b
Updated build-and-publish workflow to exclude non-relevant project paths. 2023-03-19 17:06:01 -04:00
Matt Scott
419bf35892
Updated build-and-publish workflow to exclude non-relevant project paths. 2023-03-19 17:05:30 -04:00
Matt Scott
a187d70470
Updated CodeQL workflow to exclude non-relevant project paths. 2023-03-19 17:03:02 -04:00
Matt Scott
f6009ba47b
Updated CodeQL workflow to exclude non-relevant project paths. 2023-03-19 17:02:45 -04:00
Matt Scott
55faefeedc Updated stale thread workflow with updated message verbiage.
Updated lock thread workflow to properly exclude threads with specific labels.
2023-03-19 15:11:01 -04:00
Matt Scott
236487eada Updated Security section header of the project README. 2023-03-19 15:11:01 -04:00
Matt Scott
976f52ce7a Corrected minor formatting issue with project's Code of Conduct policy. 2023-03-19 15:11:01 -04:00
Matt Scott
4e54b5ae0a Added GitHub sponsors configuration. 2023-03-19 15:11:01 -04:00
Matt Scott
ba19943c64 Updated stale thread workflow with updated message verbiage.
Updated lock thread workflow to properly exclude threads with specific labels.
2023-03-19 15:09:52 -04:00
Matt Scott
6b9638ca19 Updated Security section header of the project README. 2023-03-19 12:39:44 -04:00
Matt Scott
e11f55523d Corrected minor formatting issue with project's Code of Conduct policy. 2023-03-19 12:36:44 -04:00
Matt Scott
506a75300a Added GitHub sponsors configuration. 2023-03-18 21:45:28 -04:00
Matt Scott
80b191bc0d Updated project README to include donation section. 2023-03-18 20:55:41 -04:00
Matt Scott
5acbabaed5 Updated project README to include donation section. 2023-03-18 20:55:20 -04:00
Matt Scott
0a66089cad Updated dependabot configuration to target the dev branch. 2023-03-18 20:49:15 -04:00
Matt Scott
522705a52b Updated dependabot configuration to target the dev branch. 2023-03-18 20:49:01 -04:00
Matt Scott
519b8579db
Merge pull request from GHSA-6c8m-4h29-hmmh
fix: fix for CVE-2023-0286 & CVE-2023-23931 - cryptography update to 39.0.2
2023-03-18 20:00:05 -04:00
Nigel Kukard
e7547ff8d3 fix: fix for CVE-2023-0286 & CVE-2023-23931 - cryptography update to 39.0.2 2023-03-18 23:56:22 +00:00
Matt Scott
b71f9ae5b4
Merge pull request from GHSA-3pcw-h28g-9w3v
Upgrade setuptools to 65.5.1 (CVE-2022-40897 fix)
2023-03-18 19:53:41 -04:00
Nigel Kukard
78e8d9950d fix: upgrade setuptools to fix CVE-2022-40897 2023-03-18 23:38:48 +00:00
Matt Scott
ca4bf18f67 Updated invalid value in dependabot workflow. 2023-03-18 19:21:14 -04:00
Matt Scott
1918f713e1 Merge remote-tracking branch 'origin/dev' into dev 2023-03-18 19:20:47 -04:00
Matt Scott
33614ae102 Updated invalid value in dependabot workflow. 2023-03-18 19:20:36 -04:00
Matt Scott
d3da1e43ed
Fix LDAP group restrictions by allowing the use of any combination of groups. (#1463) 2023-03-18 19:15:01 -04:00
Nigel Kukard
138532fb95 fix: allow the specification of any combination of groups in LDAP group security configuration
Previous behavior required the specification of all three group security groups before the
"Save Settings" button would be enabled.

This adds a check into users.py which checks that the group is set before searching and
removes the javascript preventing the specification of any combination of groups.

Tested:
- Tested all combinations on AD after MR 1238
- Tested all combinations on OpenLDAP
- Tested enabling the Group Security with no groups set which correctly prevents login

Resolves #1462
2023-03-18 20:30:52 +00:00
Matt Scott
c24b4b047d
Merge pull request #1461 from nkukard/nkupdates-fix-session-clear
fix: fixed session clearing and let logout_user take care of cleanup
2023-03-18 16:05:20 -04:00
Matt Scott
defb3e5a48
Merge pull request #1238 from melck/fix-ldap-ad-nested-member
Fix LDAP user group search for nested groups #1238
2023-03-18 16:03:48 -04:00
Nigel Kukard
f44ff7d261 fix: fixed session clearing and let logout_user take care of cleanup
It seems when logging in and logging out, then logging back in, setting
the session timeout to 5 minutes, then waiting for expiry can cause
a situation when using SQLA-based sessions which results in a NULL field
in the database and causes a persistent 500 Internal Server Error.

As per issue 1439 here is a fix found by @raunz.

Resolves #1439.

Tested for about 8 hours and tons and tons of expired sessions, could not
reproduce with the fix applied.
2023-03-18 19:14:58 +00:00
Matt Scott
340e84ab89 Updated MegaLinter workflow to include a manual dispatch option. 2023-03-18 08:52:39 -04:00
Matt Scott
2606ad0395 Updated various yaml files to include proper opening lines.
Tweaked the name of the stale threads workflow.
2023-03-18 08:48:34 -04:00