Commit Graph

6037 Commits

Author SHA1 Message Date
Livio Spring
911200aa9b feat(api): allow Device Authorization Grant using custom login UI (#9387)
# Which Problems Are Solved

The OAuth2 Device Authorization Grant could not yet been handled through
the new login UI, resp. using the session API.
This PR adds the ability for the login UI to get the required
information to display the user and handle their decision (approve with
authorization or deny) using the OIDC Service API.

# How the Problems Are Solved

- Added a `GetDeviceAuthorizationRequest` endpoint, which allows getting
the `id`, `client_id`, `scope`, `app_name` and `project_name` of the
device authorization request
- Added a `AuthorizeOrDenyDeviceAuthorization` endpoint, which allows to
approve/authorize with the session information or deny the request. The
identification of the request is done by the `device_authorization_id` /
`id` returned in the previous request.
- To prevent leaking the `device_code` to the UI, but still having an
easy reference, it's encrypted and returned as `id`, resp. decrypted
when used.
- Fixed returned error types for device token responses on token
endpoint:
- Explicitly return `access_denied` (without internal error) when user
denied the request
  - Default to `invalid_grant` instead of `access_denied`
- Explicitly check on initial state when approving the reqeust
- Properly handle done case (also relates to initial check) 
- Documented the flow and handling in custom UIs (according to OIDC /
SAML)

# Additional Changes

- fixed some typos and punctuation in the corresponding OIDC / SAML
guides.
- added some missing translations for auth and saml request

# Additional Context

- closes #6239

---------

Co-authored-by: Tim Möhlmann <tim+github@zitadel.com>
2025-02-25 07:33:13 +01:00
Max Peintner
6468c60603 rm Self hosting prefix 2025-02-24 18:07:09 +01:00
Iraq
f2e82d57ac fix: adding code to test ListUsers with and without permission_check_v2 flag set (#9383)
# Which Problems Are Solved

Enhancing `v2/ListUsers()` tests by adding code to run all test with and
without `permission_check_v2` flag set

# Additional Context

- Closes https://github.com/zitadel/zitadel/issues/9356

---------

Co-authored-by: Iraq Jaber <IraqJaber@gmail.com>
2025-02-24 16:29:51 +00:00
Max Peintner
65712dac98 Merge branch 'main' into rm-env-id 2025-02-24 16:57:25 +01:00
Max Peintner
b8571dc365 cleanup 2025-02-24 16:55:56 +01:00
Max Peintner
a2edb62005 fix: eliminate ZITADEL_SERVICE_USER_ID 2025-02-24 16:54:09 +01:00
Elio Bischof
19abbfc2e2 Merge pull request #375 from zitadel/base-path
chore(docker): use better base path
2025-02-24 15:39:35 +01:00
Elio Bischof
d43e434169 remove pnpm cache 2025-02-24 15:08:50 +01:00
Elio Bischof
7c780c5eab remove cypress binary cache 2025-02-24 15:05:59 +01:00
Elio Bischof
3a6ccd5376 chore(docker): use better base path 2025-02-24 14:46:28 +01:00
Elio Bischof
7ec2daae6c Merge pull request #373 from zitadel/fix-docker-build
Fix docker build
2025-02-21 18:26:50 +01:00
Ramon
70234289cf fix: v2 user console errors (#9386)
# Which Problems Are Solved

- Fixed filtering in overview
- Only get users from current organization
- Use V2 api to get auth user

# How the Problems Are Solved

Added the organization filter to the List queries
Get current User ID from ID Token to get auth user by id

# Additional Changes

Refactored the UserList

# Additional Context
- Closes #9382
2025-02-21 14:57:09 +01:00
Elio Bischof
386c5d6782 Revert "Reapply "tmp push on fix-docker-build branch""
This reverts commit 33f051a07a.
2025-02-21 14:35:10 +01:00
Elio Bischof
33f051a07a Reapply "tmp push on fix-docker-build branch"
This reverts commit 0c6a666155.
2025-02-21 14:34:46 +01:00
Elio Bischof
0c6a666155 Revert "tmp push on fix-docker-build branch"
This reverts commit eea7c3ec9a.
2025-02-21 14:33:27 +01:00
Elio Bischof
91e60cd8f4 Merge branch 'fix-docker-build' of github.com:zitadel/typescript into fix-docker-build 2025-02-21 14:33:16 +01:00
Elio Bischof
eea7c3ec9a tmp push on fix-docker-build branch 2025-02-21 14:33:08 +01:00
Elio Bischof
d29421aef8 Merge branch 'main' into fix-docker-build 2025-02-21 14:32:31 +01:00
Elio Bischof
e4e3ae3eab Merge pull request #372 from zitadel/custom-request-headers
feat: allow configuring custom request headers
2025-02-21 14:06:50 +01:00
Elio Bischof
89ba665e6b Merge branch 'main' into custom-request-headers 2025-02-21 14:03:51 +01:00
Elio Bischof
27675d1a3f chore(pipeline): fix docker build 2025-02-21 13:59:16 +01:00
Elio Bischof
e7c1ba7984 don't checkout again 2025-02-21 13:56:08 +01:00
Elio Bischof
6d2dcb6cd2 no dockerignore 2025-02-21 13:51:13 +01:00
Elio Bischof
3e97cf85a3 debug docker build 2025-02-21 13:42:32 +01:00
Elio Bischof
9e9ab955a9 lint 2025-02-21 12:36:28 +01:00
Elio Bischof
e0a08ad1a2 feat: allow configuring custom request headers 2025-02-21 12:10:20 +01:00
Elio Bischof
03c82918a5 Merge pull request #370 from zitadel/fix-pipeline-docker
chore(pipeline): fix docker build
2025-02-21 12:09:39 +01:00
Elio Bischof
cc8698c99e Merge branch 'main' into fix-pipeline-docker 2025-02-21 12:03:12 +01:00
Elio Bischof
4dfb581911 Merge pull request #371 from zitadel/remove-interceptor
fix: remove interceptor
2025-02-21 12:03:00 +01:00
Elio Bischof
6a2d250153 Merge branch 'fix-pipeline-docker' of github.com:zitadel/typescript into fix-pipeline-docker 2025-02-21 11:17:25 +01:00
Elio Bischof
c613f18741 move changes to other pr 2025-02-21 11:16:53 +01:00
Elio Bischof
9ddd7f1dc3 fix: remove interceptor 2025-02-21 11:16:07 +01:00
Elio Bischof
903deb41af Merge branch 'main' into fix-pipeline-docker 2025-02-21 11:14:45 +01:00
Elio Bischof
31d15abe29 slash 2025-02-21 11:14:01 +01:00
Elio Bischof
1b1ecca6b2 turbo 2025-02-21 11:11:48 +01:00
Elio Bischof
fa7f98d1c9 chore: fix docker build 2025-02-21 11:10:35 +01:00
Elio Bischof
b4efbc0dd9 order 2025-02-21 10:57:48 +01:00
Iraq
9aad207ee4 fix(permissions): return current user when calling ListUsers() when user does not have permissions (#9374)
# Which Problems Are Solved

When running `ListUsers()` with no permissions, the calling user shoud
be returned

# How the Problems Are Solved

Added additional clause to SQL search statement 

# Additional Changes

n/a

# Additional Context

- Closes https://github.com/zitadel/zitadel/issues/9355

---------

Co-authored-by: Iraq Jaber <IraqJaber@gmail.com>
2025-02-20 15:39:48 +00:00
Stefan Benz
93466055ee test: add sink functionality for idp intents (#9116)
# Which Problems Are Solved

New integration tests can't use command side to simulate successful
intents.

# How the Problems Are Solved

Add endpoints to only in integration tests available sink to create
already successful intents.

# Additional Changes

None

# Additional Context

Closes #8557

---------

Co-authored-by: Livio Spring <livio.a@gmail.com>
2025-02-20 13:27:20 +01:00
Max Peintner
52a99d3840 return statement 2025-02-20 10:23:20 +01:00
Max Peintner
0311238dcf Revert "same file callback"
This reverts commit 8944e38851.
2025-02-20 10:22:21 +01:00
Max Peintner
8944e38851 same file callback 2025-02-20 10:21:39 +01:00
Max Peintner
b769fb6c6e Merge pull request #357 from zitadel/saml-2
feat: SAML
2025-02-20 10:11:13 +01:00
Kenta Yamaguchi
9b35b98cae fix(i18n): add some missing elements in Japanese (#9353)
# Which Problems Are Solved

Some i18n elements are not translated in Japanese yet.

# How the Problems Are Solved

Add some missing i18n elements to `console/src/assets/i18n/ja.json`,
`internal/api/ui/login/static/i18n/ja.yaml`, and
`internal/static/i18n/ja.yaml`.

More details are following:
- `console/src/assets/i18n/ja.json`
  - `POLICY.PRIVATELABELING.BACKGROUNDCOLOR`
  - `POLICY.PRIVATELABELING.PRIMARYCOLOR`
  - `POLICY.PRIVATELABELING.WARNCOLOR`
  - `POLICY.PRIVATELABELING.FONTCOLOR`
  - `POLICY.LOGIN_TEXTS.MESSAGE_TEXTS.TYPES.IU`
  - `IDP.CREATE.APPLE.TITLE`
  - `IDP.CREATE.APPLE.DESCRIPTION`
  - `IDP.CREATE.SAML.TITLE`
  - `IDP.CREATE.SAML.DESCRIPTION`
  - `IDP.APPLE.TEAMID`
  - `IDP.APPLE.KEYID`
  - `IDP.APPLE.PRIVATEKEY`
  - `IDP.APPLE.UPDATEPRIVATEKEY`
  - `IDP.APPLE.UPLOADPRIVATEKEY`
  - `IDP.KEYMAXSIZEEXCEEDED`
  - `IDP.SAML.METADATAXML`
  - `IDP.SAML.METADATAURL`
  - `IDP.SAML.BIDNING`
  - `IDP.SAML.SIGNEDREQUEST`
  - `IDP.SAML.NAMEIDFORMAT`
  - `IDP.SAML.TRANSIENTMAPPINGATTRIBUTENAME`
  - `IDP.SAML.TRANSIENTMAPPINGATTRIBUTENAME_DESC`
  - `SMTP.LIST.DIALOG.TEST_TITLE`
  - `SMTP.LIST.DIALOG.TEST_DESCRIPTION`
  - `SMTP.LIST.DIALOG.TEST_EMAIL`
  - `SMTP.LIST.DIALOG.TEST_RESULT`
- `internal/api/ui/login/static/i18n/ja.yaml`
  - `LDAP.Title`
  - `LDAP.Description`
  - `LDAP.LoginNameLabel`
  - `LDAP.PasswordLabel`
  - `LDAP.NextButtonText`
  - `PasswordChange.Footer`
  - `Footer.SupportEmail`
  - `Errors.User.AlreadyExists`
  - `Errors.User.Profile.NotFound`
  - `Errors.User.Profile.NotChanged`
  - `Errors.User.Profile.Empty`
  - `Errors.User.Profile.FirstNameEmpty`
  - `Errors.User.Profile.LastNameEmpty`
  - `Errors.User.Profile.IDMissing`
  - `Errors.User.Email.NotFound`
  - `Errors.User.Email.Invalid`
  - `Errors.User.Email.AlreadyVerified`
  - `Errors.User.Email.NotChanged`
  - `Errors.User.Email.Empty`
  - `Errors.User.Email.IDMissing`
  - `Errors.User.Phone.NotFound`
  - `Errors.User.Phone.Invalid`
  - `Errors.User.Phone.AlreadyVerified`
  - `Errors.User.Phone.Empty`
  - `Errors.User.Phone.NotChanged`
  - `Errors.User.Address.NotFound`
  - `Errors.User.Address.NotChanged`
  - `Errors.User.Username.AlreadyExists`
  - `Errors.User.Username.Reserved`
  - `Errors.User.Username.Empty`
  - `Errors.Org.LoginPolicy.RegistrationNotAllowed`
- `internal/static/i18n/ja.yaml`
  - `Errors.SMSConfig.NotExternalVerification`
  - `Errors.User.Profile.Empty`
  - `Errors.User.Profile.FirstNameEmpty`
  - `Errors.User.Profile.LastNameEmpty`
  - `Errors.User.Email.Empty`
  - `Errors.User.Email.IDMissing`
  - `Errors.User.Phone.Empty`
  - `Errors.User.Phone.NotChanged`
  - `Errors.User.Username.Empty`
  - `Errors.Org.LabelPolicy.NotFound`
  - `Errors.Org.LabelPolicy.NotChanged`
  - `EventTypes.project.application.oidc.key.added`
  - `EventTypes.project.application.oidc.key.removed`

# Additional Changes

- Change some order of the elements in `internal/static/i18n/ja.yaml`
  - `EventTypes.user.human.password.change.sent`
  - `EventTypes.user.human.password.hash.updated`
- Remove an element which is not used in the `us.yaml` from
`internal/static/i18n/ja.yaml`
  - `EventTypes.user.phone.removed`
- Correct a translation in `internal/static/i18n/ja.yaml`
  - `EventTypes.user.human.password.change.sent`
2025-02-19 12:51:53 +00:00
Max Peintner
f2000e1302 cleanup fcn 2025-02-19 10:11:10 +01:00
Elio Bischof
58ff71d885 Merge pull request #368 from zitadel/fix-pipeline-docker
chore: fix docker pipeline
2025-02-18 12:54:04 +01:00
Elio Bischof
df3aec08c4 chore: fix docker pipeline 2025-02-18 12:40:30 +01:00
Iraq
5bbb953ffb feat(ldap): adding root ca option to ldap config (#9292)
# Which Problems Are Solved

Adding ability to add a root CA to LDAP configs

# Additional Context

- Closes https://github.com/zitadel/zitadel/issues/7888

---------

Co-authored-by: Iraq Jaber <IraqJaber@gmail.com>
2025-02-18 10:06:50 +00:00
Fabienne Bühler
d7332d1ac4 docs: remove user schema and user api documentation from v3 api version (#9358)
# Which Problems Are Solved

Due to other priorities we decided to push the implementation of user
schema back in the roadmap.
As the feature is not yet complete and can't be tested/used, the API
Docs V3 for user schema and user lead to confusion.

# How the Problems Are Solved

I removed the api docs for user schema and user v3 from the sidenav for
the moment

Co-authored-by: Livio Spring <livio.a@gmail.com>
2025-02-18 07:11:52 +00:00
Ramon
3042bbb993 feat: Use V2 API's in Console (#9312)
# Which Problems Are Solved
Solves #8976

# Additional Changes
I have done some intensive refactorings and we are using the new
@zitadel/client package for GRPC access.

# Additional Context
- Closes #8976

---------

Co-authored-by: Max Peintner <peintnerm@gmail.com>
2025-02-17 19:25:46 +01:00