Commit Graph

8865 Commits

Author SHA1 Message Date
Johannes Zellner e08116c9ad be more consistent in oidc login screen with dashboard login 2023-05-12 18:24:54 +02:00
Johannes Zellner da7fbeee3d oidc: Give proper login error feedback 2023-05-12 17:14:40 +02:00
Johannes Zellner 61aa32d8c5 App icon route is no open to public 2023-05-12 15:14:47 +02:00
Johannes Zellner 74ff5e8de4 Fix authorize for text in oidc consent screen 2023-05-12 14:01:20 +02:00
Johannes Zellner aad70a49b7 Remove dashboard button on oidc logout 2023-05-12 13:54:35 +02:00
Johannes Zellner d332bb05fa Show app name during oidc login 2023-05-12 13:51:50 +02:00
Girish Ramakrishnan 4a1cdd4ef1 Update aws-sdk and suppress maintenance mode message
https://github.com/aws/aws-sdk-js/issues/4354
2023-05-11 22:18:00 +02:00
Johannes Zellner bba911165b Remove noisy openid debugs 2023-05-11 16:22:58 +02:00
Johannes Zellner 8656bea4f2 Update oidc-provider 2023-05-11 16:16:19 +02:00
Johannes Zellner 9024844449 Set favicon for OpenId views 2023-05-11 13:48:36 +02:00
Johannes Zellner b5fc377dab Set app's fqdn as fallback logout redirect URI for oidc 2023-05-11 10:57:52 +02:00
Girish Ramakrishnan 092cc40da6 Fix test 2023-05-11 08:32:31 +02:00
Girish Ramakrishnan 5274e1c454 docker: registry finally has ipv6 support
https://github.com/docker/roadmap/issues/89
2023-05-10 10:14:25 +02:00
Girish Ramakrishnan 8910c76bcf Update redis to 7.0.11 2023-05-09 10:54:17 +02:00
Girish Ramakrishnan ca59bbe1aa remove try/catch 2023-05-08 11:30:21 +02:00
Girish Ramakrishnan a237b11ff7 timezone: set default tz to UTC 2023-05-07 20:51:02 +02:00
Girish Ramakrishnan 15e0f11bb9 acme: handle LE validation type cache logic
LE stores the validation type for 60 days. So, if we authorized via http previously,
we won't get a DNS challenge for that duration.

There are two ways to fix this:
* Deactivate the challenges - https://community.letsencrypt.org/t/authorization-deactivation/19860 and https://community.letsencrypt.org/t/deactivate-authorization/189526
* Just be able to handle dns or http challenge, whatever is asked. This is what this commit does. It prefers DNS challenge when possible

Other relevant threads:

https://community.letsencrypt.org/t/flush-of-authorization-cache/188043
https://community.letsencrypt.org/t/let-s-encrypt-s-vulnerability-as-a-feature-authz-reuse-and-eternal-account-key/21687
https://community.letsencrypt.org/t/http-01-validation-cache/22529
2023-05-02 23:07:32 +02:00
Girish Ramakrishnan 057e4db6c1 use debug instead of console.error 2023-04-30 21:49:34 +02:00
Girish Ramakrishnan 883915c9d3 backups: move mount status to separate route 2023-04-30 17:21:18 +02:00
Girish Ramakrishnan 898413bfd4 convert console.log to debug 2023-04-30 10:18:48 +02:00
Girish Ramakrishnan aa02d839a7 remove console.log 2023-04-30 10:18:48 +02:00
Girish Ramakrishnan a4ba3a4dd0 import: backupConfig cannot be null 2023-04-30 10:18:48 +02:00
Johannes Zellner d2b12ff1ab oidc: discovery document is explicitly on openid/.well-known instead of .well-known 2023-04-29 14:09:31 +02:00
Girish Ramakrishnan d7c5e36627 sftp: delete any existing keys since we are committed to regenerating at this point in code 2023-04-27 20:03:56 +02:00
Johannes Zellner aaf31efd0f Improve oidc login popup style layout 2023-04-27 16:58:55 +02:00
Johannes Zellner 5b6e6a556a Apply ACLs to internal oidc clients 2023-04-25 19:35:59 +02:00
Girish Ramakrishnan 2e38e1a79c nginx: refactor the config 2023-04-24 21:13:01 +02:00
Johannes Zellner 90b5d240a8 Filter internal oidc clients for rest api 2023-04-24 17:16:57 +02:00
Johannes Zellner 0036bf1e2f Add addon hook to get dynamic environment variables 2023-04-24 15:29:57 +02:00
Johannes Zellner 828e77ad80 Also set sso in configure accordingly for oidc 2023-04-21 15:36:05 +02:00
Johannes Zellner bd7e931674 Do not throw if oidc addon client already exists 2023-04-21 15:09:49 +02:00
Johannes Zellner 5ac8e89c8e Set some oidc addon loginRedirectUri default 2023-04-21 12:36:20 +02:00
Girish Ramakrishnan a846dc5bf1 add bunny 2023-04-21 12:14:06 +02:00
Johannes Zellner f24e8b7132 Allow csp for form action on openId connect views
Only because of chrome and https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/form-action
2023-04-19 18:45:44 +02:00
Girish Ramakrishnan c4f4f3e914 logs: use %o to format error
otherwise, they are printed as multi-line and this messes up tail+date formatting
2023-04-16 10:49:59 +02:00
Johannes Zellner da38d8a045 oidc: support app addon oidc configs as normal clients 2023-04-14 22:22:04 +02:00
Johannes Zellner 5688b51abc Add oidc addon configs 2023-04-14 21:18:52 +02:00
Girish Ramakrishnan b95427cc09 mongodb: allow more time for startup 2023-04-11 10:46:08 +02:00
Girish Ramakrishnan 04bc1e8f56 Wait double the time for container to start up 2023-04-11 09:36:09 +02:00
Girish Ramakrishnan 354eff93b7 disable slowloris prevention: https://github.com/nodejs/node/issues/47421 2023-04-10 10:35:25 +02:00
Girish Ramakrishnan d26c86f60f Fix bug where node 18 is returning 408 incorrectly with low header timeouts sporadically 2023-04-07 00:50:55 +02:00
Johannes Zellner badcc0ac2c oidc: set application_type to native to skip elaborate web redirect URIs 2023-04-06 13:28:24 +02:00
Johannes Zellner de72400706 oidc: Allow multiple redirectUris 2023-04-06 12:42:51 +02:00
Johannes Zellner 909c68b924 Only respond to dashboardFqdn for oidc well-known 2023-04-06 10:27:37 +02:00
Johannes Zellner 3b0442c972 Only serve oidc well-known from dashboard domain 2023-04-05 18:11:46 +02:00
Girish Ramakrishnan 4ad26d8874 Set timeout properly in addons (again) 2023-04-05 12:14:35 +02:00
Girish Ramakrishnan c9f0f300a6 put timeout settings when creating the server 2023-04-05 11:07:15 +02:00
Girish Ramakrishnan 61b7dfa58c log: date is iso string 2023-04-04 19:12:30 +02:00
Girish Ramakrishnan 42a4912cc7 logs: prepend date and append newline 2023-04-04 18:58:50 +02:00
Johannes Zellner 8f4c86c1b4 oidc: add clients.tokenSignatureAlgorithm 2023-04-04 16:43:10 +02:00