1
0
Fork 0
mirror of https://github.com/plankanban/planka.git synced 2025-07-18 20:59:44 +02:00
Commit graph

443 commits

Author SHA1 Message Date
Daniel Hiller
752a73711b Update branch 2023-12-21 00:51:17 +01:00
Daniel Hiller
55d60d6c24 ci: Add retry on failure 2023-12-20 23:50:51 +01:00
Daniel Hiller
804a888827 ci: Switch to matrix workflow 2023-12-20 23:28:35 +01:00
Maksim Eltyshev
2e89e934d5 chore: Update version 2023-12-20 13:49:07 +01:00
Maksim Eltyshev
dcdb36a854 fix: Add missing date formats to Ukrainian translation 2023-12-20 12:58:43 +01:00
Denis Polishchuk
2f3a0c34c6 feat: Add Ukrainian translation (#571) 2023-12-20 12:39:51 +01:00
ossdate
635f16b401 fix: Update Chinese translation (#569) 2023-12-20 12:33:37 +01:00
Yu Inoue
db9e877506 fix: Display year when date is outside of current year (#567) 2023-12-20 12:26:01 +01:00
Maksim Eltyshev
fbd1b28312 chore: Update version 2023-12-11 00:18:14 +01:00
Gilberto Vidal
8fbdf3365a fix: Fix eslint rules for Windows (#508) 2023-12-11 00:13:04 +01:00
NavyStack
d926907b8e fix: Fine-tune Korean and Japanese translations, fix full stops (#561) 2023-12-10 23:47:04 +01:00
Maksim Eltyshev
bdf30f4535 docs: Little readme fixes 2023-12-10 22:20:23 +01:00
Maksim Eltyshev
e2488db000 chore: Bump chart-releaser-action version 2023-12-10 17:55:15 +01:00
Maksim Eltyshev
8085da388b chore: Update version 2023-12-09 17:23:01 +01:00
Maksim Eltyshev
a64a8c6f88 fix: Attempt to fix error that occurs during reconnection 2023-12-09 17:19:40 +01:00
Maksim Eltyshev
28e4abaf76 fix: Add state parameter to OIDC authorization url
Closes #558
2023-12-09 17:06:45 +01:00
Maksim Eltyshev
8018b74038 fix: Add issuer to OIDC callback parameters
Closes #562
2023-12-09 16:28:24 +01:00
Maksim Eltyshev
92e9ddde9e fix: Fix Korean translation linting 2023-12-04 11:42:15 +01:00
NavyStack
5032ad6016 fix: Update Korean translation (#560) 2023-12-04 11:40:04 +01:00
Maksim Eltyshev
0af96a21c8 build: Stop using base image 2023-12-01 18:02:19 +01:00
Maksim Eltyshev
709952ac4b fix: Fix Romanian translation linting 2023-11-24 12:43:00 +01:00
Maksim Eltyshev
8110b7f3a5 chore: Revert remark-gfm update 2023-11-23 14:40:44 +01:00
Maksim Eltyshev
cea6db2a0d build: Use pnpm import before installing dependencies 2023-11-23 11:54:28 +01:00
Andrei Covali
4db9d8f826 feat: Add Romanian translation (#555) 2023-11-22 14:58:13 +01:00
Yu Inoue
9cee75fdcf fix: Add support for OIDC configuration thru Helm (#550)
Closes #548
2023-11-20 14:16:19 +01:00
Maksim Eltyshev
3ada84527f chore: Use Node v18 2023-11-18 09:26:31 +01:00
Maksim Eltyshev
965f7cd1ed chore: Update version 2023-11-17 22:13:04 +01:00
Yu Inoue
ecf94dccc1 fix: Separate service port and container port in Helm (#549) 2023-11-17 22:11:35 +01:00
Maksim Eltyshev
bca077831b chore: Update vips version 2023-11-17 21:48:26 +01:00
Maksim Eltyshev
22aa3c4adf chore: Update dependencies 2023-11-17 14:34:10 +01:00
Yu Inoue
064b9a915c fix: Fix time format in Japanese locale (#546)
Closes #542
2023-11-13 12:51:00 +01:00
Maksim Eltyshev
9d5de93dcd chore: Update version 2023-10-25 23:41:48 +02:00
Maksim Eltyshev
d951ba59dd fix: Disable role change when OIDC roles are not ignored 2023-10-25 23:39:34 +02:00
Balthasar Hofer
e41a434fc8 feat: Add ability to ignore roles when logging in with SSO (#534)
Closes #533
2023-10-26 02:01:35 +05:00
Daniel Hiller
43f196c9e6 docs: adjust filenames to match the docs 2023-10-24 13:17:49 +02:00
Daniel Hiller
d789498c2d ci: ignore some paths on push 2023-10-22 22:47:39 +02:00
Daniel Hiller
0a507da408 chore: update version 2023-10-22 22:31:10 +02:00
Daniel Hiller
ed48090b6b fix: add admin user variables 2023-10-22 22:27:25 +02:00
Maksim Eltyshev
879878b961 chore: Update version 2023-10-20 22:38:43 +02:00
Maksim Eltyshev
4e7e57dfd9 fix: Fix logging out with invalid token 2023-10-20 22:34:58 +02:00
Maksim Eltyshev
6a09e9a984 fix: Make default admin environment variables optional
Closes #526
2023-10-20 21:52:12 +02:00
Vishnu Kaushik
e3d3130797 fix: Add task counter in card modal (#525)
Closes #467
2023-10-21 00:20:04 +05:00
Maksim Eltyshev
d820d5e5d0 ci: Do not mark released chart as latest 2023-10-19 23:30:58 +02:00
Maksim Eltyshev
4d03e5f971 chore: Update version 2023-10-19 23:08:40 +02:00
Maksim Eltyshev
ff2223c490 fix: Fallback to query if there is no fragment 2023-10-19 23:06:37 +02:00
Maksim Eltyshev
7c599d5c6f chore: Update version 2023-10-19 16:07:52 +02:00
Maksim Eltyshev
0fab6075bd ref: Refactoring 2023-10-19 16:05:34 +02:00
Lorenz Brun
9011ee61da feat: Improve OIDC SSO (#524)
The OIDC implementation merged in https://github.com/plankanban/planka/pull/491 is flawed for multiple reasons.

It assumes that the access_token returned by the IDP has to be a JWT parseable by the RP which is not the case [1].
Many major IDPs do issue tokens which are not JWTs and RPs should not rely on the contents of these at all.
The only signed token which has a standardized format for direct RP consumption is the OIDC ID token (id_token), but this by default doesn't contain many claims, especially role claims are omitted from them by default for size reasons. To get these additional claims into the ID token, one needs an IDP with support for the "claims" parameter.

It requires manual specification of the JWKS URL which is mandatory in any OIDC discovery document and thus never needs to be manually specified.

It also makes the questionable decision to use a client-side code flow with PKCE where a normal code flow would be much more appropriate as all user data is processed in the backend which can securely hold a client secret (confidential client). This has far wider IDP support, is safer (due to direct involvement of the IDP in obtaining user information) and doesn't require working with ID tokens and claim parameters.

By using a server-side code flow we can also offload most complexity to the server alone, no longer requiring an additional OIDC library on the web client.

Also silent logout doesn't work on most IDPs for security reasons, one needs to actually redirect the user over to the IDP, which then prompts them once more if they actually want to log out.

This implementation should work with any OIDC-compliant IDP and even OAuth 2.0-only IDPs as long as they serve and OIDC discovery document.

[1] rfc-editor.org/rfc/rfc6749#section-5.1
2023-10-19 17:39:21 +05:00
Maksim Eltyshev
ec9194dac7 chore: Update chart version 2023-10-18 23:33:30 +02:00
Maksim Eltyshev
2a24fc5155 chore: Update version 2023-10-18 23:20:30 +02:00