1
0
Fork 0
mirror of https://github.com/plankanban/planka.git synced 2025-07-19 05:09:43 +02:00
Commit graph

96 commits

Author SHA1 Message Date
Maksim Eltyshev
3aba4d4a56 ref: Little refactoring 2025-07-14 14:54:06 +02:00
Maksim Eltyshev
230f50e3d9 feat: Add ability to link tasks to cards 2025-07-11 01:04:02 +02:00
Maksim Eltyshev
b22dba0d11 feat: Move webhooks configuration from environment variable to UI 2025-07-04 22:04:11 +02:00
Maksim Eltyshev
86cfd155f2 feat: Add board activity log 2025-05-22 23:14:46 +02:00
Maksim Eltyshev
3aedbff5d0 feat: Log action when user is removed from card 2025-05-17 22:24:37 +02:00
Maksim Eltyshev
f6568ce41b feat: Add notification when user is added to card 2025-05-17 01:50:40 +02:00
cjmaldonado
57450a7651
fix: Increase max length of OIDC code challenge (#1126)
Closes #1113
2025-05-13 10:56:01 +02:00
Maksim Eltyshev
2ee1166747 feat: Version 2
Closes #627, closes #1047
2025-05-10 02:09:06 +02:00
Lukas Corona
4821d407a7 feat: Ability to set list color indicator (#1033)
Closes #840
2025-02-25 15:58:59 +01:00
Derzsi Dániel
480c280ab3 fix: Lazy initialize OIDC client (#947) 2024-11-18 22:38:52 +01:00
Maksim Eltyshev
97f4c0ab0d fix: Secure S3 attachments, bump SDK, refactoring
Closes #673
2024-11-12 15:58:22 +01:00
Matthew Stickney
37fc7847e8 feat: Configurable file storage locations (#886)
* feat: Make logfile location customizable

It may be desirable to log to a more standard location (e.g. in /var/log/),
or in some cases to turn logging to file off. To support these, use a
custom config property to determine the location of the output log file,
and default to the previous location if it is unset.

* feat: Support alternate storage locations for uploaded files

This involves a couple primary changes:
1) to make Sails' temporary file-upload directory a configurable location
   by using a common file-upload-receiving helper;
2) to create custom static routes for the file-upload locations, so they
   can be outside the application's public directory; and
3) to use the file-uploading handler everywhere that receives files, so
   config for the helper is applied to all file uploads consistently.

This is sufficient to allow the application directory to be deployed read-
only, with writable storage used for file uploads. The new config property
for Sails' temporary upload directory, combined with the existing settings
for user-avatar and background-image locations are sufficient to handle
uploads; the new custom routes handle serving those files from external
locations.

The default behavior of the application should be unchanged, with files
uploaded to, and served from, the public directory if the relevant
config properties aren't set to other values.
2024-09-20 20:29:11 +02:00
iMarKoLiGa
fca77c02b3 feat: Ability to configure OIDC claims source (#888)
Closes #884
2024-09-20 16:19:54 +02:00
Maksim Eltyshev
50519f1bcd feat: Additional httpOnly token for enhanced security in browsers 2024-09-01 09:31:04 +02:00
Aurélien Troncy
ccfc621d51 feat: Ability to show detailed auth errors, set to false by default (#860) 2024-08-30 11:47:29 +02:00
Maksim Eltyshev
545b3d711d fix: Fix styles, refactoring 2024-08-12 23:17:17 +02:00
Arkadiusz Dzięgiel
c4c6d738a5 feat: Colorize due date and make it toggleable (#845) 2024-08-12 18:29:50 +02:00
Maksim Eltyshev
07e1903bb5 feat: Languages with country codes 2024-07-21 19:33:57 +02:00
Maksim Eltyshev
0cc9408857 ref: Refactoring, fix linting 2024-07-16 12:33:38 +02:00
aleb_the_flash
d45cbeb0fb feat: Improve OIDC support for strict providers (#824) 2024-07-16 12:19:27 +02:00
NathanVss
0f8e2b4b0d feat: Ability to allow everyone to create projects (#787) 2024-06-14 16:38:06 +02:00
Maksim Eltyshev
87683fe523 feat: Webhooks configuration, all events support, refactoring 2024-06-12 00:51:36 +02:00
HannesOberreiter
193daf6cfb feat: Events via webhook (#771)
Closes #215, closes #656
2024-06-06 20:22:14 +02:00
Samuel
3ce2e8ef91 feat: Sort cards within list (#717)
Closes #390
2024-04-22 21:56:07 +02:00
Maksim Eltyshev
4fe77c305c feat: Automatic logout when session expires
Closes #693
2024-04-09 15:12:46 +02:00
Maksim Eltyshev
7273b33768 chore: Cleanup 2024-04-08 01:47:24 +02:00
Matthieu Bollot
2eff8b80f1 feat: Slack bot notifications (#676) 2024-04-08 01:27:10 +02:00
Matthieu Bollot
c61b23c713 feat: Add ability to duplicate card (#668) 2024-04-08 01:24:50 +02:00
Edouard
ca4d6761cd feat: SMTP integration and email notifications (#631) 2024-04-08 01:24:50 +02:00
Maksim Eltyshev
d297e2340a fix: Fix nullable boolean inputs 2024-04-08 01:24:50 +02:00
Maksim Eltyshev
6c826c7127 feat: Add ability to enforce SSO
Closes #543, closes #545
2024-04-08 01:24:10 +02:00
Maksim Eltyshev
def2327165 feat: Add ability to map OIDC attributes and ignore username
Closes #554
2024-04-08 01:18:26 +02:00
Brad Bahls
f11fa8d504 updated to use currentUser.name for messages 2023-12-28 09:03:41 -07:00
GlitchWitch
719ba9fc9c Rename custom.js -> slack.js 2023-12-23 10:52:15 -06:00
Brad Bahls
b8ce112dc3 added new custom service with slack integration helper functions; added axios package; added notifications for card create, delete, and update (move); added notifications for comment create 2023-12-23 08:52:07 -07:00
Maksim Eltyshev
d951ba59dd fix: Disable role change when OIDC roles are not ignored 2023-10-25 23:39:34 +02:00
Maksim Eltyshev
0fab6075bd ref: Refactoring 2023-10-19 16:05:34 +02:00
Lorenz Brun
9011ee61da feat: Improve OIDC SSO (#524)
The OIDC implementation merged in https://github.com/plankanban/planka/pull/491 is flawed for multiple reasons.

It assumes that the access_token returned by the IDP has to be a JWT parseable by the RP which is not the case [1].
Many major IDPs do issue tokens which are not JWTs and RPs should not rely on the contents of these at all.
The only signed token which has a standardized format for direct RP consumption is the OIDC ID token (id_token), but this by default doesn't contain many claims, especially role claims are omitted from them by default for size reasons. To get these additional claims into the ID token, one needs an IDP with support for the "claims" parameter.

It requires manual specification of the JWKS URL which is mandatory in any OIDC discovery document and thus never needs to be manually specified.

It also makes the questionable decision to use a client-side code flow with PKCE where a normal code flow would be much more appropriate as all user data is processed in the backend which can securely hold a client secret (confidential client). This has far wider IDP support, is safer (due to direct involvement of the IDP in obtaining user information) and doesn't require working with ID tokens and claim parameters.

By using a server-side code flow we can also offload most complexity to the server alone, no longer requiring an additional OIDC library on the web client.

Also silent logout doesn't work on most IDPs for security reasons, one needs to actually redirect the user over to the IDP, which then prompts them once more if they actually want to log out.

This implementation should work with any OIDC-compliant IDP and even OAuth 2.0-only IDPs as long as they serve and OIDC discovery document.

[1] rfc-editor.org/rfc/rfc6749#section-5.1
2023-10-19 17:39:21 +05:00
Maksim Eltyshev
1ef736106c fix: Fix order of checks when logging in 2023-10-18 23:07:57 +02:00
Maksim Eltyshev
b9716c6e3a fix: OIDC finalization and refactoring 2023-10-17 19:18:19 +02:00
Maksim Eltyshev
e59535b9b4 feat: Use environment variables for default admin configuration 2023-09-12 01:12:38 +02:00
gorrilla10101
6941500c7b feat: OIDC with PKCE flow (#491) 2023-09-04 20:06:59 +05:00
Maksim Eltyshev
8578883fac fix: Fix saving milliseconds for timestamps 2023-06-12 23:54:57 +02:00
Maksim Eltyshev
22ec8707ac fix: Rename timer to stopwatch
Closes #392
2023-02-27 19:09:51 +01:00
Maksim Eltyshev
a741e26ccb feat: Labels reordering
Closes #289
2023-01-09 12:17:06 +01:00
Maksim Eltyshev
58eda7d555 fix: Subscribe only when needed 2023-01-05 15:03:06 +01:00
Maksim Eltyshev
5cd025ffb7 ref: Remove board types, refactoring 2022-12-26 21:10:50 +01:00
Maksim Eltyshev
05b57142f9 feat: Preserve original format of images, change interpolation kernel
Closes #349
2022-12-24 00:47:59 +01:00
Christoph Enne
948485c861 feat: Trello board JSON import (#352)
Closes #27, closes #105
2022-12-17 03:48:06 +05:00
Maksim Eltyshev
a5e8c5feec fix: Fix missing board memberships loading 2022-10-03 13:04:52 +02:00