Firstyear
afd674d346
Add mail support to groups ( #2718 )
...
* Add mail support to groups
* Update libs/client/src/group.rs
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2024-04-23 07:08:28 +00:00
Firstyear
604adccdae
Add session limit ( #2714 )
2024-04-23 16:02:42 +10:00
Joost Rijneveld
5485483aba
Fix typo in oauth2 error message ( #2715 )
...
Removes a duplicate 'again'
2024-04-20 22:55:35 +00:00
Firstyear
d7834b52e6
Begin the basis of the key provider model ( #2640 )
...
This completely reworks how we approach and handle cryptographic keys in Kanidm. This is needed as a foundation for replication coordination which will require handling and rotation of cryptographic keys in automated ways.
This change influences many other parts of the code base in it's implementation.
The primary influences are:
* Modification of how domain user signing keys are revoked or rotated.
* Merging of all existing service-account token keys are retired (retained) keys into the domain to simplify token signing and validation
* Allowing multiple configurations of local command line tools to swap between instances using disparate signing keys.
* Modification of key retrieval to be key id based (KID), removing the need to embed the JWK into tokens
A side effect of this change is that most user authentication sessions and oauth2 sessions will have to be re-established after upgrade. However we feel that session renewal after upgrade is an expected side effect of an upgrade.
In the future this lays the ground work to remove a large number of legacy key handling processes that have evolved, which will allow large parts of code to be removed.
2024-04-15 23:44:37 +00:00
Daniil Egortsev
f252035254
fix(TotpDigits): fix typo in TryFrom impl ( #2702 )
2024-04-11 10:31:34 +10:00
Firstyear
c09daa4643
kanidm unixd mfa capabilities ( #2672 )
...
Improve the support for the resolver to support MFA options with pam. This enables async task spawning and cancelation via the resolver backend as well.
Co-authored-by: David Mulder <dmulder@samba.org>
2024-03-28 01:17:21 +00:00
Firstyear
10ad183732
[SECURITY: LOW] Administrator triggered thread crash in oauth2 claim maps #2686 ( #2686 )
...
When an admin configured oauth2 custom claims during the creation it
was not enforced that at least one value must be present. This led to
an incorrect logic flaw in str_concat! which didn't handle the 0 case.
This hardens str_concat! to prevent the thread crash by using itertools
for the join instead, and it enforces stricter validation on the valueset
to deny creation of empty claims.
This fix has a low security impact as only an administrator or high
level user can trigger this as a possible denial of service.
Fixes #2680 Fixes #2681
2024-03-26 01:43:03 +00:00
Firstyear
fcc65e6fbe
20240312 concread upgrade ( #2668 )
...
* Update concread
2024-03-19 12:06:52 +07:00
Vladimir Dronnikov
3e0ec78a61
fix api typo ( #2657 )
2024-03-18 16:29:28 +07:00
Merlijn
a3ab0e39a6
Update bootstrap 5.0.2 to 5.3.3 & minor UI fixes ( #2650 )
2024-03-13 00:38:24 +00:00
Vladimir Dronnikov
45f26888be
increase severity for "{:?} !⊆ allowed: {:?}" ( #2648 )
...
Co-authored-by: Firstyear <william@blackhats.net.au>
2024-03-12 03:08:50 +00:00
Firstyear
285f4362b2
20230224 2437 orca remodel ( #2591 )
2024-03-09 16:09:15 +10:00
Firstyear
b4d9cdd7d5
20240301 systemd uid ( #2602 )
...
Fixes #2601 Fixes #393 - gid numbers can be part of the systemd nspawn range.
Previously we allocated gid numbers based on the fact that uid_t is a u32, so we allowed 65536 through u32::max. However, there are two major issues with this that I didn't realise. The first is that anything greater than i32::max (2147483648) can confuse the linux kernel.
The second is that systemd allocates 524288 through 1879048191 to itself for nspawn.
This leaves with with only a few usable ranges.
1000 through 60000
60578 through 61183
65520 through 65533
65536 through 524287
1879048192 through 2147483647
The last range being the largest is the natural and obvious area we should allocate from. This happens to nicely fall in the pattern of 0x7000_0000 through 0x7fff_ffff which allows us to take the last 24 bits of the uuid then applying a bit mask we can ensure that we end up in this range.
There are now two major issues.
We have now changed our validation code to enforce a tighter range, but we may have already allocated users into these ranges.
External systems like FreeIPA allocated uid/gid numbers with reckless abandon directly into these ranges.
As a result we need to make two concessions.
We *secretly* still allow manual allocation of id's from 65536 through to 1879048191 which is the nspawn container range. This happens to be the range that freeipa allocates into. We will never generate an ID in this range, but we will allow it to ease imports since the users of these ranges already have shown they 'don't care' about that range. This also affects SCIM imports for longer term migrations.
Second is id's that fall outside the valid ranges. In the extremely unlikely event this has occurred, a startup migration has been added to regenerate these id values for affected entries to prevent upgrade issues.
An accidental effect of this is freeing up the range 524288 to 1879048191 for other subuid uses.
2024-03-07 03:25:54 +00:00
Vladimir Dronnikov
221445d387
expose group patch for parity ( #2628 )
...
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2024-03-07 09:54:20 +10:00
James Hodgkinson
4c1fa0d644
Adding a builtin class for all built-in things ( #2603 )
...
* adding builtin class to builtin objects
* Resolve issues with builtin PR
---------
Co-authored-by: William Brown <william@blackhats.net.au>
2024-03-06 01:33:14 +00:00
Vladimir Dronnikov
8175253bae
apidoc tag fixes ( #2625 )
...
* apidoc tag fixes
* apidoc typo fixed
2024-03-06 00:41:47 +00:00
Firstyear
47fe9c78e6
Fix missing entry managed by on anonymouns ( #2623 )
2024-03-05 03:43:19 +00:00
James Hodgkinson
9d05b797ed
SPAs really are stupid sometimes ( #2609 )
2024-03-04 13:14:51 +10:00
Vladimir Dronnikov
1a81b437d8
apidoc fixes ( #2614 )
2024-03-04 02:10:01 +00:00
Vladimir Dronnikov
e1f3703f0c
Typo fixes ( #2610 )
...
* api typo fix
* schema description typo fix
* v1 group post typo fix
2024-03-03 17:25:44 +10:00
Firstyear
633d11a21e
Return consent scope to service account ( #2605 )
2024-03-02 01:30:59 +00:00
James Hodgkinson
dbf59474bb
OpenAPI schema fixes ( #2590 )
...
* OpenAPI schema fixes
* Adding OpenAPI schema checks to the release script
2024-03-01 16:57:36 +10:00
James Hodgkinson
e35f5093a0
WASM test fixing ( #2595 )
...
* wasm test fixing
* remove flaky skip
2024-02-29 05:13:47 +00:00
Merlijn
eddca4fc86
Feature object graph ( #2518 )
...
* Refactor: move the object graph ui to admin web ui
* Add dynamic js loading support
Load viz.js dynamically
* Add some js docs
* chore: cleanup imports
* chore: remove unused clipboard feature
chore: remove unused mermaid.sh
* Messing with the profile.release settings and reverting the changes I tried has now made the build much smaller yay :D
* Refactor: user raw search requests
Assert service-accounts properly
* refactor: new v1 proto structure
* Add self to CONTRIBUTORS.md
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2024-02-29 02:25:40 +00:00
Firstyear
3760951b6d
Add domain version test framework ( #2576 )
...
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2024-02-28 21:04:33 +00:00
Firstyear
fbc021f487
20240221 2489 cleanup api v1 ( #2573 )
2024-02-27 09:25:02 +00:00
James Hodgkinson
4096b8f02d
Changing to allow startup without a config file ( #2582 )
...
* Changing to allow startup without a config file, using environment variables
2024-02-27 15:40:00 +10:00
Firstyear
adb575947f
Adjust output of claim maps for better parsing ( #2566 )
...
* Adjust output of claim maps for better parsing
* Update python tests for OAuth2 bits
* fixing workflows for container builds
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2024-02-26 13:33:32 +10:00
Sebastiano Tocci
d3af1a9e1b
improved error description for commit_credential_update ( #2579 )
2024-02-24 00:18:38 +00:00
Firstyear
3bf16d4253
Make /status less noisy ( #2574 )
2024-02-22 17:34:46 +10:00
Firstyear
752bdf7578
Add system range protection ( #2565 )
2024-02-21 23:27:37 +10:00
James Hodgkinson
4efdb7208f
of course I started looking at clippy things and now I can't stop ( #2560 )
2024-02-21 00:52:10 +00:00
Firstyear
68d788a9f7
20240216 308 resource limits ( #2559 )
...
This adds account policy based resource limits to control the maximum
number of entries that an account may query
2024-02-21 00:15:43 +00:00
Daniil Egortsev
5701da8f23
fix(oauth2): typo in basic path ( #2562 )
2024-02-20 22:20:37 +00:00
James Hodgkinson
097db70c3d
prctl compile-time fixes, also chasing lints ( #2558 )
...
* fixing up error handling for prctl calls
* minor clippy lintypoos
* making clippy happier
* clippizing a test
* more clippy-calming
* adding tpm-udev to ubuntu flows for testing
* rebuilt wasm
* moving from rg to grep because someone doesn't like nice things
* such clippy like wow
* clippy config to the rescue
2024-02-20 18:21:33 +10:00
James Hodgkinson
84b2c4956d
Removing unused constant and updating docstring for LDAP bind address ( #2556 )
2024-02-20 11:10:02 +10:00
Firstyear
cc28fb2c4b
Re-enable HW tpm support ( #2531 )
2024-02-17 01:30:08 +00:00
Firstyear
62dff7565e
Add further hardening for system services ( #2542 )
2024-02-17 00:11:32 +00:00
James Hodgkinson
48f33fb8c9
when the HTTPS server fails, handle that gracefully ( #2546 )
2024-02-16 08:30:43 +00:00
Firstyear
816fde766f
Fix update intent ttl parameters ( #2540 )
2024-02-16 07:02:36 +00:00
Firstyear
a4c2e66afd
Fix incorrect documentation elements ( #2533 )
...
This adds the account-policy section for credential-type-minimums
and fixes the replication config defaults to match the documented
behaviour.
2024-02-16 01:58:41 +00:00
Firstyear
3549c8562f
Remove replication is in dev flag ( #2535 )
2024-02-16 11:39:43 +10:00
Firstyear
002ab13698
Add code_challenge_methods_supported to OIDC discovery ( #2525 )
2024-02-15 09:17:08 +10:00
Firstyear
e3e77fe7b4
Update to latest dev version ( #2486 )
2024-02-08 09:54:07 +10:00
Firstyear
7567514044
Release 1.1.0-rc.16 ( #2483 )
2024-02-07 04:39:02 +00:00
Firstyear
cdbaefe23d
Fix for incorrect domain migration rollbacks ( #2482 )
2024-02-07 13:11:55 +10:00
Firstyear
9050188b29
Add tools for remigration and domain level raising ( #2481 )
2024-02-06 10:01:06 +00:00
Firstyear
ddea9c6699
Support SPN in groups claim ( #2474 )
2024-02-06 03:56:04 +00:00
illode
8cd62d4d4a
Credential update tweaks ( #2475 )
...
* Make the Credential Update page more user-friendly
2024-02-06 03:36:22 +00:00
Firstyear
23cc2e7745
Fix RUV trim ( #2466 )
...
Fixes two major issues with replication.
The first was related to server refreshes. When a server was refreshed it would retain it's server unique id. If the server had lagged and was disconnected from replication and administrator would naturally then refresh it's database. This meant that on next tombstone purge of the server, it's RUV would jump ahead causing it's refresh-supplier to now believe it was lagging (which was not the case).
In the situation where a server is refreshed, we reset the servers unique replication ID which avoids the RUV having "jumps".
The second issue was related to RUV trimming. A server which had older RUV entries (say from servers that have been trimmed) would "taint" and re-supply those server ID's back to nodes that wanted to trim them. This also meant that on a restart of the server, that if the node had correctly trimmed the server ID, it would be re-added in memory.
This improves RUV trimming by limiting what what compare and check as a supplier to only CID's that are within the valid changelog window. This itself presented challenges with "how to determine if a server should be removed from the RUV". To achieve this we now check for "overlap" of the RUVS. If overlap isn't occurring it indicates split brain or node isolation, and replication is stopped in these cases.
2024-02-02 15:38:45 +10:00
Firstyear
d42268269a
20240125 2217 client credentials grant ( #2456 )
...
* Huge fix of a replication problem.
* Update test
* Increase min replication level
* Client Credentials Grant implementation
2024-02-01 02:00:29 +00:00
James Hodgkinson
c8bd1739f9
PyKanidm updates and testing ( #2301 )
...
* otel can eprintln kthx
* started python integration tests, features
* more tests more things
* adding heaps more things
* updating docs
* fixing python test
* fixing errors, updating integration test
* Add models for OAuth2, Person, ServiceAccount and add missing endpoints
* Alias Group to GroupInfo to keep it retrocompatible
* Fixed issues from review
* adding oauth2rs_get_basic_secret
* adding oauth2rs_get_basic_secret
* Fixed mypy issues
* adding more error logs
* updating test scripts and configs
* fixing tests and validating things
* more errors
---------
Co-authored-by: Dogeek <simon.bordeyne@gmail.com>
2024-01-31 03:27:43 +00:00
Firstyear
50c324c063
Fix inverted key/chain logic from TLS error improvement ( #2453 )
2024-01-24 16:51:41 +10:00
Firstyear
967bc7c9df
Improve TLS configuration errors ( #2447 )
...
This improves the errors during TLS configuration to localise them to
the error site, as well as calling our file path diagnostics tool
to assist with permission errors.
2024-01-23 16:13:14 +10:00
Firstyear
86916a3d87
Return sshkey label to cli fields ( #2440 )
...
* Return ssh label to cli fields
2024-01-20 17:17:57 +10:00
Firstyear
b1e7cb13a5
Add rfc8414 metadata ( #2434 )
2024-01-19 04:14:52 +00:00
Firstyear
8e4980b2c1
Add test for delete referer invalid ( #2435 )
...
When a delete of an entry occurs which is reference by another entry,
if the entry has a MUST schema condition on the deleted entry then the
delete should be blocked to prevent the entries structure becoming
invalid.
2024-01-19 02:18:11 +00:00
Firstyear
8dc884f38e
2390 1980 allow native applications ( #2428 )
2024-01-16 10:44:12 +10:00
Firstyear
a1fa59b83c
Clean RUV ( #2424 )
2024-01-12 09:43:20 +10:00
Firstyear
666448f787
Upgrade replication to use anchors ( #2423 )
...
* Upgrade replication to use anchors
2024-01-10 04:46:08 +00:00
Firstyear
0e44cc1dcb
Minor fixes for oidc with single page applications ( #2420 )
2024-01-08 23:57:14 +00:00
Firstyear
e9340c682e
Use case insensitive match on substrings in line with ldap ( #2419 )
2024-01-06 15:52:21 +10:00
Firstyear
cc79b2a205
20231222 piv authentication ( #2398 )
...
Foundations of PIV authentication
2023-12-29 23:15:26 +00:00
James Hodgkinson
307a66ea29
Update docs, closes SQLite Write-Ahead Logging might make page size immutable #2404 ( #2405 )
2023-12-30 08:34:50 +10:00
Firstyear
7f27a6fcd9
Force apply idm migrations to apply access controls ( #2401 )
2023-12-28 12:24:29 +10:00
cuberoot74088
a16525d520
fix backup filename and regexp pattern for cleanup ( #2386 )
...
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2023-12-24 12:06:43 +00:00
Firstyear
fd71a748ca
Add improved domain migration framework and default MFA ( #2382 )
2023-12-21 14:44:20 +10:00
Firstyear
77b01e3a31
Trim and lowecase usernames ( #2380 )
2023-12-19 06:41:12 +00:00
Firstyear
3408816932
Add DN as a virtual ldap attr ( #2379 )
2023-12-19 15:07:19 +10:00
James Hodgkinson
a4c44bc5f9
fixing default for oauth2 request_parameter_supported metadata ( #2378 )
2023-12-19 11:56:47 +10:00
Firstyear
5c445a4704
20231218 ipa sync unix password ( #2374 )
...
* Add support for importing the users password as unix password
2023-12-18 11:20:37 +10:00
Firstyear
d09c2448ff
1481 2024 access control rework ( #2366 )
...
Rework default access controls to better separate roles and access profiles.
2023-12-17 23:10:13 +00:00
Firstyear
854b696532
249 2024 managed by syntax ( #2359 )
...
Allows hierarchial entry management rules.
2023-12-07 10:00:09 +00:00
James Hodgkinson
340d41482b
typo ( #2356 )
2023-12-05 01:22:59 +00:00
Firstyear
4bd5d584cb
20231204 ipa sync minor improvements ( #2357 )
2023-12-04 16:58:15 +10:00
Firstyear
76269f9de2
20231129 webauthn attestation ( #2351 )
...
This adds full support for attestation of webauthn/passkeys.
2023-12-03 06:13:52 +00:00
James Hodgkinson
9a464c653c
Using proper axum http headers lib for compatibility ( #2348 )
2023-12-01 08:55:51 +10:00
Firstyear
cbdbaa8fe0
Bearer should send with same caps we accept ( #2345 )
2023-11-30 09:25:34 +10:00
Firstyear
31b939fca3
20231128 freeipa migration ( #2338 )
...
* Add more weak password formats for freeipa
* Verification of freeipa migration from older ipa versions
2023-11-29 10:43:15 +10:00
Firstyear
ac299b5286
Update to the latest compact-jwt version ( #2331 )
2023-11-24 02:53:22 +00:00
James Hodgkinson
916bb4ec04
Adding env var configs for the server ( #2329 )
...
* env var config for server
* I am my own clippy now
* Man, that got complicated quick
2023-11-24 01:27:49 +00:00
Firstyear
bb8914c70d
20231120 2320 sssd compat ( #2328 )
2023-11-22 10:18:03 +10:00
Firstyear
b71b0460f3
Add test ( #2323 )
2023-11-19 21:56:19 +10:00
James Hodgkinson
2be287c1ff
OAuth2 scopes validation logging missing details ( #2317 )
...
* OAuth2 scopes validation logging missing details - Fixes #2316
* clippy was mad
2023-11-17 16:08:08 +10:00
Firstyear
8f150ad032
20231115 oauth2 authreq ( #2310 )
...
* fix oauth2 requests
* Fix json compat of wasm bindgen
2023-11-15 12:41:01 +10:00
Firstyear
a2a3010860
Remove serde json from wasm ( #2304 )
...
* Remove serde json from wasm
* Fix missing json
2023-11-12 15:38:37 +10:00
Firstyear
8a40f5ab7b
Fix spelling ( #2303 )
2023-11-11 03:04:35 +00:00
Firstyear
47bcea7708
20231109 1122 credential class ( #2300 )
...
* Add CredentialType for acc pol
* Reword ui hints
* Finish account policy
* Clean up artefacts
2023-11-11 09:26:44 +10:00
James Hodgkinson
60e5935faa
Moving daemon tracing to OpenTelemetry ( #2292 )
...
* sally forth into the great otel unknown
* make the build env identification slightly more durable
* docs updates
* wasm recompile
2023-11-09 05:15:12 +00:00
James Hodgkinson
12f1de8358
Update OpenAPI schema gen to actually... be kinda sorta valid. ( #2296 )
...
* updating lockfile
* OpenAPI validation issues
Fixes #2295
* clippy sez no
* adding another validator, more specs
2023-11-07 11:35:17 +10:00
Firstyear
b7852d1d71
pw min length in account policy ( #2289 )
2023-11-05 10:33:25 +10:00
James Hodgkinson
b9d47fe8f7
oauth2 typo ( #2290 )
2023-11-04 06:45:40 +00:00
James Hodgkinson
7025a9ff55
Feature: kanidm CLI pulling OpenAPI schema ( #2285 )
...
* diag is super noisy when you actually turn on logging... even though it wasn't an error?
* adding api download-schema to the CLI
* docs
2023-11-03 17:37:27 +10:00
James Hodgkinson
cf35a7e667
Feature: configurable replication poll interval ( #2283 )
...
* Feature: configurable replication poll interval (#2282 )
* Updating log messages because REPL != LDAP
2023-11-02 02:07:53 +00:00
Firstyear
9e5449a644
Minor improvements to incoming replication ( #2279 )
2023-11-02 01:21:21 +00:00
Allan
dbf476fe5e
Remove unused imports and clippy lint ( #2276 )
...
* Fix unused import errors
* Apply clippy get_first lint
* Add contributor
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2023-11-01 05:54:29 +00:00
Samuel Cabrero
c3c0b5f459
Rework ldap bind routine ( #2268 )
...
Signed-off-by: Samuel Cabrero <scabrero@suse.de>
2023-11-01 15:09:22 +10:00
Firstyear
a3266978c8
Disable inconsistent test ( #2278 )
2023-11-01 02:02:53 +00:00
William Brown
4a08b77285
make versions consistent
2023-10-31 21:24:07 +10:00
James Hodgkinson
6642139900
Release 1.1.0-rc.15-dev
2023-10-31 19:26:18 +10:00
James Hodgkinson
ef96ca6aa1
started writing docs and ended up in another rabbit hole ( #2267 )
...
* started writing docs and ended up in another rabbit hole
* updoots
* dangit fedora
2023-10-31 19:15:35 +10:00
James Hodgkinson
3bfc347c53
CLI integration test beginnings ( #2261 )
...
* more integration test things, using assert_cmd to test the CLI end-to-end
* packagez
* making clippy happy
* making deno happy
2023-10-30 06:10:54 +00:00
William Brown
ecc46bb015
Add book chapter + cli
2023-10-28 13:07:06 +10:00
NavinShrinivas
b80a3b271c
Cargo fmt and clippy checks
...
Signed-off-by: NavinShrinivas <karupal2002@gmail.com>
2023-10-28 13:07:06 +10:00
NavinShrinivas
12ea1c8702
Restrict posix passwords on ldap bind with config
...
Signed-off-by: NavinShrinivas <karupal2002@gmail.com>
2023-10-28 13:07:06 +10:00
James Hodgkinson
e02328ae8b
Splitting the SPAs ( #2219 )
...
* doing some work for enumerating how the accounts work together
* fixing up build scripts and removing extra things
* making JavaScript as_tag use the struct field names
* making shared.js a module, removing wasmloader.js
* don't compress compressed things
2023-10-27 06:03:58 +00:00
James Hodgkinson
ad3c491d07
Bug chasing ( #2257 )
...
* service-account validity expire-at doesn't accept all time nouns as defined by docs
Fixes #2153
* realised a logic bug
* making clippy happy while I'm here
* returning an empty set from the creds if the creds attribute is not found, which is then handled downstream
2023-10-27 05:30:38 +00:00
Samuel Cabrero
99ba97088d
cargo fmt + clippy ( #2241 )
...
Signed-off-by: Samuel Cabrero <scabrero@suse.de>
2023-10-27 04:40:24 +00:00
James Hodgkinson
7dc18e4f9e
adding service account patch methods ( #2255 )
...
* adding service_account PATCH
2023-10-26 13:40:45 +10:00
Firstyear
afe9d28754
20231019 1122 account policy basics ( #2245 )
...
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2023-10-22 11:16:42 +00:00
Firstyear
6ff9082fd2
20231014 account policy ( #2218 )
...
* Start to prep for unix+ssh keys in credupdate session
2023-10-19 01:40:06 +00:00
James Hodgkinson
6850a17e8c
Windows build fixes and test coverage ( #2220 )
...
* adding testing for users functions
* turning KanidmClient build error into a ClientError
* removing a redundant closure
2023-10-17 07:18:07 +00:00
James Hodgkinson
eead47aec8
Fixing dependabot and its mistakes ( #2232 )
...
* updating to utoipa 4.0.0
* hi dependabot
2023-10-16 05:15:53 +00:00
dependabot[bot]
1a36673c46
chore(deps): bump utoipa-swagger-ui from 3.1.5 to 4.0.0 ( #2224 )
...
Bumps [utoipa-swagger-ui](https://github.com/juhaku/utoipa ) from 3.1.5 to 4.0.0.
- [Release notes](https://github.com/juhaku/utoipa/releases )
- [Commits](https://github.com/juhaku/utoipa/compare/utoipa-swagger-ui-3.1.5...utoipa-swagger-ui-4.0.0 )
---
updated-dependencies:
- dependency-name: utoipa-swagger-ui
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-10-15 20:45:27 +00:00
James Hodgkinson
f28d5cef22
OpenAPI/swagger docs autogen ( #2175 )
...
* always be clippyin'
* pulling oauth2 api things out into their own module
* starting openapi generation
2023-10-14 12:39:14 +10:00
Firstyear
8bcf1935a5
20231012 346 name deny list ( #2214 )
...
* Migrate to improved system config reload, cleanup acc pol
* Denied names feature
2023-10-13 08:50:36 +10:00
Firstyear
88da55260a
Add file diagnosis ( #2210 )
2023-10-12 12:09:54 +10:00
Firstyear
fbc62ea51e
fix RUV on startup, improve filter output ( #2211 )
2023-10-11 21:14:27 +10:00
James Hodgkinson
d9da1eeca0
Chasing yaks down dark alleyways ( #2207 )
...
* adding some test coverage because there was some rando panic-inducing thing
* ldap constants
* documenting a macro
* helpful weird errors
* the war on strings continues
* less json more better
* testing things fixing bugs
* idm_domain_reset_token_key wasn't working, added a test and fixed it (we weren't testing it)
* idm_domain_set_ldap_basedn - adding tests
* adding testing for idm_account_credential_update_cancel_mfareg
* warning of deprecation
2023-10-11 15:44:29 +10:00
dependabot[bot]
d538f80fa1
chore(deps): bump axum-auth from 0.4.0 to 0.4.1 ( #2200 )
...
Bumps [axum-auth](https://github.com/owez/axum-auth ) from 0.4.0 to 0.4.1.
- [Commits](https://github.com/owez/axum-auth/compare/0.4.0...v0.4.1 )
---
updated-dependencies:
- dependency-name: axum-auth
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-10-08 21:26:48 +00:00
Firstyear
a91bf55471
20231008 remove expect used ( #2191 )
...
* Stop using expect on some tasks
2023-10-08 17:39:00 +10:00
James Hodgkinson
19f9fde012
Thread naming and display ( #2190 )
...
* sometimes handlers fail
* enums are better than strings
* clippyisms
2023-10-08 13:08:46 +10:00
James Hodgkinson
48979b8e1a
Replication tweaks - try the most recent successful one and error less ( #2189 )
...
* made an error less error-y and also found a way to try the last-most-working repl peer
2023-10-07 13:09:42 +10:00
James Hodgkinson
0adc3e0dd9
Chasing wooly quadrapeds again ( #2163 )
...
* I really like well-tended yaks
* documenting yaks
* spellink
* less surprise more good
* schema test fix
* clippyisms
2023-10-05 12:30:46 +10:00
Firstyear
f6d2bcb44b
68 20230929 replication finalisation ( #2160 )
...
Replication is now ready for test deployments!
2023-10-05 11:11:27 +10:00
James Hodgkinson
e7f594a1c1
In-system image storage ( #2112 )
...
* In-system image storage refers to #2057
* adding multipart feature to axum
* thanks to @Firstyear for fixing my bufs
* fixing coverage test things
* clippy-calming
* more tests, jpg acropalypse tests, benches
* spelling
* lockfile updates
* linting
2023-10-04 17:24:12 +10:00
Firstyear
cb985a2fd0
fix credential update intent defaults ( #2162 )
2023-09-30 20:06:44 +10:00
Firstyear
3e345174b6
68 20230919 replication configuration ( #2131 )
2023-09-29 12:02:13 +10:00
James Hodgkinson
c7a269575c
Enforce TLS key size minimums ( #2145 )
...
* Enforce TLS key size minimums - Fixes #2144
* at some point clippy got mad
2023-09-26 09:59:00 +10:00
James Hodgkinson
c998a1eda5
bindaddress default doesn't match documentation ( #2150 )
...
Fixes #2147
2023-09-26 09:38:07 +10:00
James Hodgkinson
d5ed335b52
Cinco de yakko ( #2108 )
...
* there are always more yaks
* see? ldap yaks.
* fixing stupid radius container build thing
2023-09-16 12:11:06 +10:00
Firstyear
77da40d528
68 20230912 session consistency ( #2110 )
...
This adds support for special-casing sessions in replication to allow them to internally trim and merge so that session revocations and creations are not lost between replicas.
2023-09-16 09:22:11 +10:00
James Hodgkinson
383592d921
Schema dooby doo ... yon ( #2103 )
...
Refers #1987
Notable changes:
- in server/lib/src/entry.rs - aiming to pass the enum instead of the strings
- changed signature of add_ava to take Attribute instead of &str (which is used in the entry_init macro... which was fun)
- set_ava<T> now takes Attribute
- added TryFrom<&AttrString> for Attribute
2023-09-12 11:47:24 +10:00
Firstyear
b3aed1df34
68 20230908 replication attrunique ( #2086 )
...
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2023-09-12 08:50:51 +10:00
James Hodgkinson
d3d80e7364
Schema-dooby-doo-part-trois ( #2082 )
...
* adding extra_attributes field to BuiltinGroup, migrating more things.
* checkpoint 3 - ACP, easy as 1,2,3
* codespell
* now throwing error on dyngroup with defined members
2023-09-09 09:38:47 +10:00
James Hodgkinson
4b7563adc8
CLI and test things ( #2080 )
...
* testing things actually run is handy
* adding build mode to scripts
* uh, so I started messing with handling exit codes...
2023-09-09 09:35:59 +10:00
Firstyear
61c59d5a5a
68 20230907 replication ( #2081 )
...
* Test replication when nodes are valid beyond cl trim
2023-09-08 08:59:06 +10:00
James Hodgkinson
2f312e6b2d
Removing default features from git2 package ( #2078 )
...
* don't need ssh or https in git2 - saves 50.69s
* codespell
2023-09-06 08:25:29 +10:00
Firstyear
d1fe7b9127
68 20230829 replication referential integrity ( #2048 )
...
* Member of works!
* Hooray, refint over replication works.
2023-09-05 21:30:51 +10:00
James Hodgkinson
d5d76d1a3c
Schema dooby doo part two ( #2071 )
...
* scim strings!
* mapmapmap
* mapmapmap -comments and map
* updating delete teest
* fixing some tests
2023-09-05 16:58:42 +10:00
Firstyear
538429838d
When an empty body was returned, do request would error incorrectly ( #2074 )
2023-09-05 14:14:00 +10:00
James Hodgkinson
1d88cede1b
Yak hassling ( #2059 )
...
* trying this query thing again
* if error show error not panic
* clippyism
* moving dependencies around and fixing log messages for healthcheck
* cleaning up some comment mess
* fixing the "debug thing breaks packaging" issue and test failures
2023-09-05 11:50:51 +10:00
dependabot[bot]
07c9a9078e
chore(deps): bump tower-http from 0.4.3 to 0.4.4 ( #2064 )
...
Bumps [tower-http](https://github.com/tower-rs/tower-http ) from 0.4.3 to 0.4.4.
- [Release notes](https://github.com/tower-rs/tower-http/releases )
- [Commits](https://github.com/tower-rs/tower-http/compare/tower-http-0.4.3...tower-http-0.4.4 )
---
updated-dependencies:
- dependency-name: tower-http
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-09-03 21:04:53 +00:00
Sebastiano Tocci
f2e9c8a16e
Add tests for X-Forwarded-For header (kinda) ( #1957 )
...
* Add tests for X-Forwarded-For header (kinda)
* testing for invalid header format
* added debug endpoint and got tests working
* various fixing here and there
2023-08-31 09:31:16 +08:00
Firstyear
5bd69b81b8
Clear cache before verify on some low-level tests ( #2044 )
2023-08-29 12:26:29 +10:00
Firstyear
0f977d33b9
68 20230828 replication of schema ( #2045 )
2023-08-29 12:20:27 +10:00
Firstyear
da56738dea
pam multistep auth state machine ( #2022 )
...
Himmelblau needs to maintain some data about the state of an authentication across the course of pam exchanges.
Signed-off-by: David Mulder <dmulder@samba.org>
Co-authored-by: David Mulder <dmulder@samba.org>
2023-08-28 09:27:29 +10:00
Samuel Cabrero
9dda8b1ad3
Authentication shortcut to get a RW session ( #1993 )
...
* auth: Add a privileged flag to AuthStep::Init2 step to request a rw session
The privileged flag is defined as Option<bool> for compatibility with
existing clients.
2023-08-24 09:54:33 +10:00
Sebastiano Tocci
47e953bfd2
wopsies, missing imports ( #2023 )
...
* wopsies, missing imports
* more clippy and fmt
* adding test build for kanidm with idv-tui feature
* making codespell happy
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2023-08-23 22:40:25 +10:00
Sebastiano Tocci
70b19f0630
idv cli ( #2001 )
2023-08-23 20:51:24 +10:00
James Hodgkinson
def4420c4c
pykanidm updoots ( #2019 )
...
* fixing some derpitude in headers and auth, adding tests
* dox fox
* cleaning up typing
2023-08-23 13:55:08 +10:00
Firstyear
2355dbfead
68 20230821 replication ( #2020 )
...
* Resolve spn incremental replication
2023-08-23 11:17:13 +10:00
Sebastiano Tocci
eb7527379b
Configurable session timeouts ( #1965 )
...
* added `auth_session_expiry` and `auth_privilege_expiry`
* Added `AcountPolicy` struct
* spelling and stuff
* added cli tools
2023-08-22 11:00:43 +10:00
James Hodgkinson
05b35df413
Less human strings more enums ( #1989 )
...
* statics or enums you choose
* acp rewrite, defined SchemaAcp as a test
* macros and targetscopes and filters oh my
2023-08-21 17:16:43 +10:00
dependabot[bot]
75263c6214
chore(deps): bump gloo-timers from 0.2.6 to 0.3.0 ( #2011 )
...
Bumps [gloo-timers](https://github.com/rustwasm/gloo ) from 0.2.6 to 0.3.0.
- [Release notes](https://github.com/rustwasm/gloo/releases )
- [Changelog](https://github.com/rustwasm/gloo/blob/master/CHANGELOG.md )
- [Commits](https://github.com/rustwasm/gloo/compare/gloo-timers-v0.2.6...0.3.0 )
---
updated-dependencies:
- dependency-name: gloo-timers
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-08-20 23:40:42 +00:00
James Hodgkinson
01cdeedc72
reordering layers so the web server works in non-debug-mode ( #1999 )
2023-08-19 11:00:53 +10:00
Firstyear
f6001504a9
20230817 idv migration ( #1992 )
...
* Must attr
* Post merge cleanup of idv
2023-08-18 20:29:00 +10:00
Samuel Cabrero
17741c4929
daemon: kanidmd version requires a config file to run ( #1959 ) ( #1990 )
...
Signed-off-by: Samuel Cabrero <scabrero@suse.de>
2023-08-17 17:02:24 +10:00
Firstyear
bc341af9d8
Resolve issues with dyngroup members ( #1986 )
2023-08-17 15:52:12 +10:00
Firstyear
0183ae6c71
Revert "sqlite where IN for id entry ( #1988 )" ( #1991 )
...
This reverts commit 46f9a36a1c
.
2023-08-17 13:47:11 +10:00
James Hodgkinson
46f9a36a1c
sqlite where IN for id entry ( #1988 )
...
Fixes #258
2023-08-17 13:32:41 +10:00
Sebastiano Tocci
003234c2d0
Identity verification feature ( #1819 )
2023-08-16 21:02:48 +10:00
Firstyear
87866c568b
1982 service account access ( #1985 )
...
* Fix issue with incorrect filter class preventing service account delete
2023-08-16 15:33:28 +10:00
James Hodgkinson
9a6168b67d
Fixing test release ( #1983 )
...
* Fixing cargo test --release
* more tracing less dbg
2023-08-15 15:42:15 +10:00
James Hodgkinson
83f189fed3
error handling and web server logging fixes ( #1960 )
...
* Fixing the setup_dev_environment script
* clippy calming
* handle_internalunixusertokenread throwing 500's without context
Fixes #1958
2023-08-14 20:47:49 +10:00
James Hodgkinson
aba9f6a724
Struct-ifying schema things ( #1971 )
...
* structifying things
2023-08-14 19:39:49 +10:00
James Hodgkinson
9246293922
Fighting with zypper, tagging our images ( #1964 )
...
* fighting weird build issues
* labels are better outside
* ugh that stupid linter
* why do you always lint on me
* neat
* adding comments
2023-08-14 10:06:53 +10:00
James Hodgkinson
cc79f7eba1
Are we JSON yet? Kinda. But we're closer. ( #1967 )
2023-08-14 08:51:44 +10:00
J. B. Crawford
054b580fe6
Allow one-character usernames ( #1941 )
2023-08-10 08:09:18 +10:00
Sebastiano Tocci
c742497866
providing server configuration in the testkit::test macro ( #1953 )
2023-08-08 20:01:18 +10:00
Sebastiano Tocci
5d96412181
replaced skip_serializing_if
with skip_serializing_none
( #1932 )
...
* replaced `skip_serializing_if` with `skip_serializing_none`
2023-08-03 08:51:30 +10:00
Sebastiano Tocci
d50373e64b
fixed serialization of oauth2 token scope ( #1930 )
2023-08-02 09:50:57 +10:00
Sebastiano Tocci
de45732322
added compression layer for the pkg route ( #1928 )
2023-08-02 08:10:46 +10:00
Firstyear
bf3e16cbd3
Resolve issue with publishing ( #1925 )
...
* Resolve issue with publishing
* Fix version
2023-08-01 17:25:32 +10:00
Firstyear
0fe5ff0f87
Set dev version ( #1924 )
2023-08-01 15:23:07 +10:00
Firstyear
689c7c74f6
Release 1.1.0-beta.13 ( #1922 )
2023-08-01 15:12:35 +10:00
Firstyear
cccc20ea42
20230731 release ( #1921 )
...
* Cleanup how we check for last git commit to avoid an insecure dep
* Resolve unmaintained or old deps
* Fix ci
2023-07-31 22:27:21 +10:00
Firstyear
62ce42f8c1
Improve default shells for distros ( #1920 )
2023-07-31 14:58:27 +10:00
Firstyear
d731b20a9d
20230728 techdebt paydown ( #1909 )
2023-07-31 12:20:52 +10:00
James Hodgkinson
ea4d755d7b
chasing weirdness ( #1910 )
...
* security headers, fixing error on empty username, handling login without SPN better
* making deno happy
* cleaning up windows build
2023-07-31 10:49:59 +10:00
Firstyear
99b761c966
20230727 unix int modularity ( #1907 )
2023-07-28 10:48:56 +10:00
Firstyear
8f282e3a30
68 20230720 replication improvements ( #1905 )
2023-07-27 12:30:22 +10:00
Firstyear
54544075c1
Improve service file for host installs ( #1901 )
2023-07-25 12:23:47 +10:00
Firstyear
e17dcc0ddb
1788 admin unix socket ( #1880 )
2023-07-24 10:05:10 +10:00
dependabot[bot]
2a65bc11a3
chore(deps): bump axum-macros from 0.3.7 to 0.3.8 ( #1892 )
...
Bumps [axum-macros](https://github.com/tokio-rs/axum ) from 0.3.7 to 0.3.8.
- [Release notes](https://github.com/tokio-rs/axum/releases )
- [Changelog](https://github.com/tokio-rs/axum/blob/main/CHANGELOG.md )
- [Commits](https://github.com/tokio-rs/axum/compare/axum-macros-v0.3.7...axum-macros-v0.3.8 )
---
updated-dependencies:
- dependency-name: axum-macros
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-07-23 21:30:20 +00:00
dependabot[bot]
f76edfc995
chore(deps): bump tower-http from 0.4.1 to 0.4.3 ( #1888 )
...
Bumps [tower-http](https://github.com/tower-rs/tower-http ) from 0.4.1 to 0.4.3.
- [Release notes](https://github.com/tower-rs/tower-http/releases )
- [Commits](https://github.com/tower-rs/tower-http/compare/tower-http-0.4.1...tower-http-0.4.3 )
---
updated-dependencies:
- dependency-name: tower-http
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-07-23 21:02:56 +00:00
Sebastiano Tocci
fa78c4bbb4
added hsts header middleware ( #1882 )
...
* added hsts header middleware
* Update header to use the strongly typed version
2023-07-22 13:16:10 -07:00
Firstyear
79ff5e9775
1785 allow sync attr yielding via partial write admin ( #1879 )
2023-07-19 11:42:53 +10:00
Firstyear
4f3f7e2708
Revert to opensuse based radius container. ( #1878 )
2023-07-19 11:41:57 +10:00
Sebastiano Tocci
e5748fdebb
Unix gid duplicate fix ( #1876 )
...
* added gid removal only when the gid is actually set and updated tests
---------
Signed-off-by: Sebastiano Tocci <seba.tocci@gmail.com>
2023-07-19 09:44:51 +10:00
Firstyear
60a1cdf9d8
Sync account import improvements ( #1873 )
2023-07-18 08:49:22 +10:00
James Hodgkinson
5cd62eb974
Upgraded clap, removing atty as a dependency ( #1849 )
...
* upgraded clap, removing atty as a dependency
* changing the PR template so when you add a list up the top it doesn't break the bottom
2023-07-13 12:19:28 +10:00
Firstyear
c260f1244d
Ensure we dont use std hashmaps ( #1848 )
...
* Ensure we dont use std hashmaps
* coalescing the clippy config files
---------
Co-authored-by: James Hodgkinson <james@terminaloutcomes.com>
2023-07-13 06:51:40 +10:00
Firstyear
07580cf57a
Improve selinux in tasks daemon ( #1847 )
2023-07-11 15:39:28 +10:00
James Hodgkinson
749522418c
headless webdriver testing, starting on brotli feature ( #1844 )
...
* headless chromedriver testing
* updating build scripts
2023-07-10 16:49:09 +10:00
dependabot[bot]
9562accde0
chore(deps): bump is-terminal from 0.4.8 to 0.4.9 ( #1837 )
...
Bumps [is-terminal](https://github.com/sunfishcode/is-terminal ) from 0.4.8 to 0.4.9.
- [Commits](https://github.com/sunfishcode/is-terminal/compare/v0.4.8...v0.4.9 )
---
updated-dependencies:
- dependency-name: is-terminal
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2023-07-09 21:41:11 +00:00
Yuri Iozzelli
e2d7b53367
Allow Authorization header in CORS preflight response ( #1831 )
...
This is needed for public clients running as SPAs (like OCIS).
2023-07-10 06:53:02 +10:00
Firstyear
a818cebc85
Add preflight headers ( #1829 )
2023-07-09 12:06:40 +10:00
Firstyear
0e53476a76
Persist nonce through refresh to support client ( #1826 )
2023-07-08 20:30:30 +10:00
Firstyear
72bca853f7
Cleanup spa handling ( #1825 )
2023-07-08 16:37:15 +10:00