Commit Graph

6037 Commits

Author SHA1 Message Date
Stefan Benz
8ec099ae28 fix: restructure resend email code to send email code (#9099)
# Which Problems Are Solved

There is currently no endpoint to send an email code for verification of
the email if you don't change the email itself.

# How the Problems Are Solved

Endpoint HasEmailCode to get the information that an email code is
existing, used by the new login.
Endpoint SendEmailCode, if no code is existing to replace
ResendEmailCode as there is a check that a code has to be there, before
it can be resend.

# Additional Changes

None

# Additional Context

Closes #9096

---------

Co-authored-by: Silvan <27845747+adlerhurst@users.noreply.github.com>
2024-12-27 16:34:38 +01:00
Max Peintner
506f7b828b override stub for invite 2024-12-27 15:38:26 +01:00
Max Peintner
00df9134b2 fix integration test 2024-12-27 15:33:05 +01:00
Max Peintner
e0c1626f09 username null check 2024-12-27 15:13:15 +01:00
Max Peintner
4ff9b44f88 build 2024-12-27 15:08:19 +01:00
Max Peintner
be13b0e1bf fix build 2024-12-27 15:06:01 +01:00
Max Peintner
a6c1016202 Merge branch 'main' into qa 2024-12-27 14:49:49 +01:00
Max Peintner
18f2cbaf6c Merge pull request #325 from zitadel/buf-gen-branch
send code on verify page visit, generate from branch
2024-12-27 14:48:19 +01:00
Max Peintner
2b43be7893 send code on verify page visit, generate from branch 2024-12-27 14:47:58 +01:00
Max Peintner
478f795113 Merge pull request #322 from zitadel/verify-email
fix: verify email
2024-12-27 14:21:43 +01:00
Elio Bischof
5f19892c82 Merge pull request #323 from zitadel/idp-invite
fix: add IDPs to invite flow
2024-12-27 12:23:35 +01:00
Elio Bischof
36187ecdc4 Update apps/login/src/app/(login)/idp/[provider]/success/page.tsx 2024-12-27 12:13:07 +01:00
Max Peintner
d8532140bc cleanup 2024-12-27 12:09:16 +01:00
Max Peintner
ab2136d5ab show error 2024-12-27 11:55:35 +01:00
Max Peintner
aa6a597191 fix: ordering of conditions 2024-12-27 11:48:11 +01:00
Max Peintner
52d9753358 Update apps/login/src/lib/server/loginname.ts
Co-authored-by: Elio Bischof <elio@zitadel.com>
2024-12-27 11:43:12 +01:00
Max Peintner
13f6cbaf8f not a module 2024-12-27 09:55:16 +01:00
Max Peintner
c39f1b4e6d fix org context for accounts page - new user 2024-12-27 08:42:31 +01:00
Max Peintner
d59b2ed612 remove unnec initializer 2024-12-24 11:40:37 +01:00
Max Peintner
807f01f5b5 fix error handler, skip send 2024-12-24 09:50:40 +01:00
Max Peintner
53fc22e048 skipsend, checkinvite 2024-12-24 09:15:12 +01:00
Max Peintner
2951b617ce verify check, mfa check response 2024-12-23 16:26:20 +01:00
Max Peintner
0546a1c06e rm redundant language providers 2024-12-23 09:36:19 +01:00
Max Peintner
2bb46137ce rm logs 2024-12-23 09:35:07 +01:00
Max Peintner
d3111d3ba3 handle error when linking 2024-12-23 09:32:01 +01:00
Branislav Davidovic
1f8623d3dc docs(adopter): XPeditionist (#8984)
N/A

Co-authored-by: Fabi <fabienne@zitadel.com>
Co-authored-by: Silvan <27845747+adlerhurst@users.noreply.github.com>
Co-authored-by: Livio Spring <livio.a@gmail.com>
2024-12-23 07:01:35 +00:00
Livio Spring
bcf416d4cf fix(saml): parse xsd:duration format correctly (#9098)
# Which Problems Are Solved

SAML IdPs exposing an `EntitiesDescriptor` using an `xsd:duration` time
format for the `cacheDuration` property (e.g. `PT5H`) failed parsing.

# How the Problems Are Solved

Handle the unmarshalling for `EntitiesDescriptor` specifically.
[crewjam/saml](bbccb7933d/metadata.go (L88-L103))
already did this for `EntitiyDescriptor` the same way.

# Additional Changes

None

# Additional Context

- reported by a customer
- needs to be backported to current cloud version (2.66.x)
2024-12-20 16:03:06 +00:00
Max Peintner
14760d84e3 idp pages 2024-12-20 15:54:04 +01:00
Max Peintner
09dbaf4106 linking failed page 2024-12-20 12:08:02 +01:00
Elio Bischof
ab6c4331df fix(login): avoid disallowed languages with custom texts (#9094)
# Which Problems Are Solved

If a browsers default language is not allowed by instance restrictions,
the login still renders it if it finds any custom texts for this
language. In that case, the login tries to render all texts on all
screens in this language using custom texts, even for texts that are not
customized.


![image](https://github.com/user-attachments/assets/1038ecac-90c9-4352-b75d-e7466a639711)

![image](https://github.com/user-attachments/assets/e4cbd0fb-a60e-41c5-a404-23e6d144de6c)

![image](https://github.com/user-attachments/assets/98d8b0b9-e082-48ae-9540-66792341fe1c)

# How the Problems Are Solved

If a custom messages language is not allowed, it is not added to the
i18n library's translations bundle. The library correctly falls back to
the instances default language.


![image](https://github.com/user-attachments/assets/fadac92e-bdea-4f8c-b6c2-2aa6476b89b3)

This library method only receives messages for allowed languages

![image](https://github.com/user-attachments/assets/33081929-d3a5-4b0f-b838-7b69f88c13bc)

# Additional Context

Reported via support request
2024-12-20 11:31:03 +01:00
Max Peintner
3887e26896 add idps to invite flow 2024-12-20 11:14:03 +01:00
Max Peintner
670ed71dd1 cleanup idp, cleanup session actions 2024-12-20 10:57:56 +01:00
Max Peintner
f1f7d661ce passkey actions cleanup 2024-12-20 08:44:59 +01:00
Max Peintner
ed584c59e1 move email verification 2024-12-19 15:12:50 +01:00
Livio Spring
d9a89d9fcf chore: update dependencies (#9087)
Updates most urgent dependencies
2024-12-19 14:01:33 +00:00
Stefan Benz
c3b97a91a2 feat: add saml request to link to sessions (#9001)
# Which Problems Are Solved

It is currently not possible to use SAML with the Session API.

# How the Problems Are Solved

Add SAML service, to get and resolve SAML requests.
Add SAML session and SAML request aggregate, which can be linked to the
Session to get back a SAMLResponse from the API directly.

# Additional Changes

Update of dependency zitadel/saml to provide all functionality for
handling of SAML requests and responses.

# Additional Context

Closes #6053

---------

Co-authored-by: Livio Spring <livio.a@gmail.com>
2024-12-19 11:11:40 +00:00
Max Peintner
ab5bcb9eea verify commands 2024-12-19 11:28:35 +01:00
Livio Spring
50d2b26a28 feat: specify login UI version on instance and apps (#9071)
# Which Problems Are Solved

To be able to migrate or test the new login UI, admins might want to
(temporarily) switch individual apps.
At a later point admin might want to make sure all applications use the
new login UI.

# How the Problems Are Solved

- Added a feature flag `` on instance level to require all apps to use
the new login and provide an optional base url.
- if the flag is enabled, all (OIDC) applications will automatically use
the v2 login.
  - if disabled, applications can decide based on their configuration
- Added an option on OIDC apps to use the new login UI and an optional
base url.
- Removed the requirement to use `x-zitadel-login-client` to be
redirected to the login V2 and retrieve created authrequest and link
them to SSO sessions.
- Added a new "IAM_LOGIN_CLIENT" role to allow management of users,
sessions, grants and more without `x-zitadel-login-client`.

# Additional Changes

None

# Additional Context

closes https://github.com/zitadel/zitadel/issues/8702
2024-12-19 10:37:46 +01:00
Max Peintner
ab03996297 env variable 2024-12-19 09:08:18 +01:00
Max Peintner
6cd0e7cb18 context on verification pages 2024-12-19 08:59:39 +01:00
Stefan Schöb
b5e92a6144 docs (adopters): add Micromate (#9031)
# Which Problems Are Solved
Added Micromate as adopter :)

# How the Problems Are Solved
By adding us to the list :)

# Additional Changes
None
2024-12-19 05:56:59 +00:00
Stefan Benz
870e3b1b26 feat: add exclusion of criteria for active idp query (#9040)
# Which Problems Are Solved

To list IDPs for potential linking, we need to filter them. The
GetActiveIdentityProviderResponse should therefore be extended to
provide the IDPConfig or information about whether the IDP is allowed to
be linked or created.

# How the Problems Are Solved

Add parameters to the request to exclude CreationDisallowed and/or
LinkingDisallowed in the query.

# Additional Changes

Added integration tests for the GetGetActiveIdentityProvider endpoint.

# Additional Context

Closes #8981

---------

Co-authored-by: Livio Spring <livio.a@gmail.com>
2024-12-18 16:19:05 +00:00
Tim Möhlmann
da706a8b30 fix(setup): make step 39 repeatable (#9085)
# Which Problems Are Solved

When downgrading zitadel and upgrading it again, it might be that orgs
deleted in this period still have stale entries in the fields table.

# How the Problems Are Solved

- Make the cleanup repeatable
- Scope the query by instance so that an index is used.
2024-12-18 16:48:22 +01:00
Silvan
b89e8a6037 fix(setup): make step 41 repeatable (#9084)
# Which Problems Are Solved

setup step 41 cannot handle downgrades at the moment. This step writes
the instance domain to the fields table. If there are new instances
created during the downgraded version is running there would be domain
missing in the fields afterwards.

# How the Problems Are Solved

Make step 41 repeatable for each version
2024-12-18 15:28:29 +00:00
Fabian Hirter
efaa3ab6a1 docs(adopters): add hirschengraben.io (#9046)
added a new adopter

Co-authored-by: Swarna Podila <swarnap@users.noreply.github.com>
Co-authored-by: Silvan <27845747+adlerhurst@users.noreply.github.com>
Co-authored-by: Fabi <fabienne@zitadel.com>
2024-12-18 08:09:59 +00:00
Nils Carstensen
7d03050472 docs(adopters): add roclub (#9067)
![image](https://github.com/user-attachments/assets/773ccda4-1b7b-414c-8c6b-a223401d2b35)
2024-12-17 21:14:24 +00:00
Max Peintner
4bb03574e6 fix: verify email 2024-12-17 15:57:42 +01:00
Max Peintner
0f4d31eec7 Merge pull request #320 from zitadel/qa
fix: Finish IDP Signup for OIDC flow
2024-12-17 11:28:10 +01:00
Max Peintner
0fa5752f4c update idp list 2024-12-17 08:44:44 +01:00
Max Peintner
af3bef8b09 Merge branch 'main' into qa 2024-12-16 17:00:34 +01:00