Commit Graph

463 Commits (ea73135ab4b074a5adf877ef312d3f6df0bd9084)
 

Author SHA1 Message Date
Ran Shamay ea73135ab4 Merge branch 'master' of https://github.com/plankanban/planka 2 years ago
Ran Shamay 8d98d7ec61
Merge pull request #14 from ranshamay/email-support
Email support
2 years ago
Ran Shamay 86e9791be6 remove gh 2 years ago
Ran Shamay e50d74a0d2 expose env 2 years ago
Ran Shamay d161f259ff support mail 2 years ago
Yu Inoue fdef87e3b9
fix: Add support for OIDC configuration thru Helm (#550)
Closes #548
2 years ago
Ran Shamay 8d2b66913c
Merge pull request #13 from ranshamay/rtl-support
changed docker
2 years ago
Ran Shamay a100daa6d4 changed docker 2 years ago
Ran Shamay f7b7478aad
Merge pull request #12 from ranshamay/rtl-support
remove redundant platforms
2 years ago
Ran Shamay c282c13c9e remove redundant platforms 2 years ago
Ran Shamay e40cd8d2f1
Merge pull request #11 from ranshamay/rtl-support
tag
2 years ago
Ran Shamay 6c8814c692 tag 2 years ago
Ran Shamay 42742c4f8b
Merge pull request #10 from ranshamay/rtl-support
gha
2 years ago
Ran Shamay 14255f0b27 gha 2 years ago
Ran Shamay bc389a04ca
Merge pull request #9 from ranshamay/rtl-support
Rtl support
2 years ago
Ran Shamay f54370d849 Merge branch 'master' into rtl-support 2 years ago
Ran Shamay a2270fa3e6 added chrome 70 support 2 years ago
Maksim Eltyshev 964498dbaa chore: Use Node v18 2 years ago
Maksim Eltyshev 5b519cb62f chore: Update version 2 years ago
Yu Inoue 11fc3b4485
fix: Separate service port and container port in Helm (#549) 2 years ago
Maksim Eltyshev 37c0b59f82 chore: Update vips version 2 years ago
Maksim Eltyshev 239611ad51 chore: Update dependencies 2 years ago
Ran Shamay 277a80c8a0
Merge pull request #8 from ranshamay/rtl-support
Rtl support
2 years ago
Ran Shamay e2cc71efa9 cleanup 2 years ago
Ran Shamay cc59687b71 align docker 2 years ago
Ran Shamay 6c5619ec9e use 3000 port 2 years ago
Ran Shamay e551b9b7ed added rtl support 2 years ago
Yu Inoue 0575e665fe
fix: Fix time format in Japanese locale (#546)
Closes #542
2 years ago
Maksim Eltyshev 019766dced chore: Update version 2 years ago
Maksim Eltyshev 6dc9e4ed99 fix: Disable role change when OIDC roles are not ignored 2 years ago
Balthasar Hofer d4b64b90fc
feat: Add ability to ignore roles when logging in with SSO (#534)
Closes #533
2 years ago
Daniel Hiller 1a49826b85 docs: adjust filenames to match the docs 2 years ago
Daniel Hiller 815643eb2c ci: ignore some paths on push 2 years ago
Daniel Hiller bcc4c0d923 chore: update version 2 years ago
Daniel Hiller cf7810b067 fix: add admin user variables 2 years ago
Maksim Eltyshev f1c72df8b6 chore: Update version 2 years ago
Maksim Eltyshev 5056d38848 fix: Fix logging out with invalid token 2 years ago
Maksim Eltyshev 3ef5b3ead8 fix: Make default admin environment variables optional
Closes #526
2 years ago
Vishnu Kaushik ded58dc8b0
fix: Add task counter in card modal (#525)
Closes #467
2 years ago
Maksim Eltyshev d8ee1ecdd1 ci: Do not mark released chart as latest 2 years ago
Maksim Eltyshev fc2f4cd5d3 chore: Update version 2 years ago
Maksim Eltyshev 7ef457157e fix: Fallback to query if there is no fragment 2 years ago
Maksim Eltyshev 23ee815200 chore: Update version 2 years ago
Maksim Eltyshev 40c04c35ff ref: Refactoring 2 years ago
Lorenz Brun 743f2956c8
feat: Improve OIDC SSO (#524)
The OIDC implementation merged in https://github.com/plankanban/planka/pull/491 is flawed for multiple reasons.

It assumes that the access_token returned by the IDP has to be a JWT parseable by the RP which is not the case [1].
Many major IDPs do issue tokens which are not JWTs and RPs should not rely on the contents of these at all.
The only signed token which has a standardized format for direct RP consumption is the OIDC ID token (id_token), but this by default doesn't contain many claims, especially role claims are omitted from them by default for size reasons. To get these additional claims into the ID token, one needs an IDP with support for the "claims" parameter.

It requires manual specification of the JWKS URL which is mandatory in any OIDC discovery document and thus never needs to be manually specified.

It also makes the questionable decision to use a client-side code flow with PKCE where a normal code flow would be much more appropriate as all user data is processed in the backend which can securely hold a client secret (confidential client). This has far wider IDP support, is safer (due to direct involvement of the IDP in obtaining user information) and doesn't require working with ID tokens and claim parameters.

By using a server-side code flow we can also offload most complexity to the server alone, no longer requiring an additional OIDC library on the web client.

Also silent logout doesn't work on most IDPs for security reasons, one needs to actually redirect the user over to the IDP, which then prompts them once more if they actually want to log out.

This implementation should work with any OIDC-compliant IDP and even OAuth 2.0-only IDPs as long as they serve and OIDC discovery document.

[1] rfc-editor.org/rfc/rfc6749#section-5.1
2 years ago
Maksim Eltyshev 5bf5db27d8 chore: Update chart version 2 years ago
Maksim Eltyshev 667c5daf25 chore: Update version 2 years ago
Maksim Eltyshev 6662b0a717 fix: Fix order of checks when logging in 2 years ago
Maksim Eltyshev 348bf4d6c4 Merge branch 'master' of github.com:gorrilla10101/planka 2 years ago
Maksim Eltyshev 3ac2d289d0 chore: Update version 2 years ago