Commit Graph

8424 Commits

Author SHA1 Message Date
Girish Ramakrishnan
7511339656 bump timeout when waiting for container
some server disks are very slow
2023-05-16 09:51:42 +02:00
Girish Ramakrishnan
f83295372b updater: combine installer logs into the task file 2023-05-15 19:09:40 +02:00
Girish Ramakrishnan
e6506d9458 updater: use log 2023-05-15 19:05:39 +02:00
Girish Ramakrishnan
ff539e2669 remove crashnotifier
it's not really used
2023-05-15 11:08:00 +02:00
Girish Ramakrishnan
506d3adf70 Fix crash when querying backup mount status 2023-05-15 10:40:39 +02:00
Girish Ramakrishnan
94eb7849fe tasks: return 404 if task not found
part of #826
2023-05-15 10:16:00 +02:00
Girish Ramakrishnan
500d2361ec replace delay.js with timers/promises 2023-05-14 10:53:50 +02:00
Girish Ramakrishnan
b26c8d20cd network: add trusted ips
This allows the user to set trusted ips to Cloudflare or some other CDN
and have the logs have the correct IPs.

fixes #801
2023-05-13 16:15:47 +02:00
Johannes Zellner
04f2bd1ec3 Add password-reveal feature to oidc login 2023-05-12 18:47:48 +02:00
Johannes Zellner
e08116c9ad be more consistent in oidc login screen with dashboard login 2023-05-12 18:24:54 +02:00
Johannes Zellner
da7fbeee3d oidc: Give proper login error feedback 2023-05-12 17:14:40 +02:00
Johannes Zellner
61aa32d8c5 App icon route is no open to public 2023-05-12 15:14:47 +02:00
Johannes Zellner
74ff5e8de4 Fix authorize for text in oidc consent screen 2023-05-12 14:01:20 +02:00
Johannes Zellner
aad70a49b7 Remove dashboard button on oidc logout 2023-05-12 13:54:35 +02:00
Johannes Zellner
d332bb05fa Show app name during oidc login 2023-05-12 13:51:50 +02:00
Girish Ramakrishnan
4a1cdd4ef1 Update aws-sdk and suppress maintenance mode message
https://github.com/aws/aws-sdk-js/issues/4354
2023-05-11 22:18:00 +02:00
Johannes Zellner
bba911165b Remove noisy openid debugs 2023-05-11 16:22:58 +02:00
Johannes Zellner
8656bea4f2 Update oidc-provider 2023-05-11 16:16:19 +02:00
Johannes Zellner
9024844449 Set favicon for OpenId views 2023-05-11 13:48:36 +02:00
Johannes Zellner
b5fc377dab Set app's fqdn as fallback logout redirect URI for oidc 2023-05-11 10:57:52 +02:00
Girish Ramakrishnan
092cc40da6 Fix test 2023-05-11 08:32:31 +02:00
Girish Ramakrishnan
5274e1c454 docker: registry finally has ipv6 support
https://github.com/docker/roadmap/issues/89
2023-05-10 10:14:25 +02:00
Girish Ramakrishnan
8910c76bcf Update redis to 7.0.11 2023-05-09 10:54:17 +02:00
Girish Ramakrishnan
ca59bbe1aa remove try/catch 2023-05-08 11:30:21 +02:00
Girish Ramakrishnan
a237b11ff7 timezone: set default tz to UTC 2023-05-07 20:51:02 +02:00
Girish Ramakrishnan
15e0f11bb9 acme: handle LE validation type cache logic
LE stores the validation type for 60 days. So, if we authorized via http previously,
we won't get a DNS challenge for that duration.

There are two ways to fix this:
* Deactivate the challenges - https://community.letsencrypt.org/t/authorization-deactivation/19860 and https://community.letsencrypt.org/t/deactivate-authorization/189526
* Just be able to handle dns or http challenge, whatever is asked. This is what this commit does. It prefers DNS challenge when possible

Other relevant threads:

https://community.letsencrypt.org/t/flush-of-authorization-cache/188043
https://community.letsencrypt.org/t/let-s-encrypt-s-vulnerability-as-a-feature-authz-reuse-and-eternal-account-key/21687
https://community.letsencrypt.org/t/http-01-validation-cache/22529
2023-05-02 23:07:32 +02:00
Girish Ramakrishnan
057e4db6c1 use debug instead of console.error 2023-04-30 21:49:34 +02:00
Girish Ramakrishnan
883915c9d3 backups: move mount status to separate route 2023-04-30 17:21:18 +02:00
Girish Ramakrishnan
898413bfd4 convert console.log to debug 2023-04-30 10:18:48 +02:00
Girish Ramakrishnan
aa02d839a7 remove console.log 2023-04-30 10:18:48 +02:00
Girish Ramakrishnan
a4ba3a4dd0 import: backupConfig cannot be null 2023-04-30 10:18:48 +02:00
Johannes Zellner
d2b12ff1ab oidc: discovery document is explicitly on openid/.well-known instead of .well-known 2023-04-29 14:09:31 +02:00
Girish Ramakrishnan
d7c5e36627 sftp: delete any existing keys since we are committed to regenerating at this point in code 2023-04-27 20:03:56 +02:00
Johannes Zellner
aaf31efd0f Improve oidc login popup style layout 2023-04-27 16:58:55 +02:00
Johannes Zellner
5b6e6a556a Apply ACLs to internal oidc clients 2023-04-25 19:35:59 +02:00
Girish Ramakrishnan
2e38e1a79c nginx: refactor the config 2023-04-24 21:13:01 +02:00
Johannes Zellner
90b5d240a8 Filter internal oidc clients for rest api 2023-04-24 17:16:57 +02:00
Johannes Zellner
0036bf1e2f Add addon hook to get dynamic environment variables 2023-04-24 15:29:57 +02:00
Johannes Zellner
828e77ad80 Also set sso in configure accordingly for oidc 2023-04-21 15:36:05 +02:00
Johannes Zellner
bd7e931674 Do not throw if oidc addon client already exists 2023-04-21 15:09:49 +02:00
Johannes Zellner
5ac8e89c8e Set some oidc addon loginRedirectUri default 2023-04-21 12:36:20 +02:00
Girish Ramakrishnan
a846dc5bf1 add bunny 2023-04-21 12:14:06 +02:00
Johannes Zellner
f24e8b7132 Allow csp for form action on openId connect views
Only because of chrome and https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/form-action
2023-04-19 18:45:44 +02:00
Girish Ramakrishnan
c4f4f3e914 logs: use %o to format error
otherwise, they are printed as multi-line and this messes up tail+date formatting
2023-04-16 10:49:59 +02:00
Johannes Zellner
da38d8a045 oidc: support app addon oidc configs as normal clients 2023-04-14 22:22:04 +02:00
Johannes Zellner
5688b51abc Add oidc addon configs 2023-04-14 21:18:52 +02:00
Girish Ramakrishnan
b95427cc09 mongodb: allow more time for startup 2023-04-11 10:46:08 +02:00
Girish Ramakrishnan
04bc1e8f56 Wait double the time for container to start up 2023-04-11 09:36:09 +02:00
Girish Ramakrishnan
354eff93b7 disable slowloris prevention: https://github.com/nodejs/node/issues/47421 2023-04-10 10:35:25 +02:00
Girish Ramakrishnan
d26c86f60f Fix bug where node 18 is returning 408 incorrectly with low header timeouts sporadically 2023-04-07 00:50:55 +02:00