Fabi
3bc3ef1f2c
fix: add register org and key pairs ( #1275 )
2021-02-12 16:51:12 +01:00
Fabi
320679467b
feat: User login commands ( #1228 )
...
* feat: change login to command side
* feat: change login to command side
* fix: fix push on user
* feat: user command side
* feat: sign out
* feat: command side login
* feat: command side login
* feat: fix register user
* feat: fix register user
* feat: fix web auth n events
* feat: add machine keys
* feat: send codes
* feat: move authrequest to domain
* feat: move authrequest to domain
* feat: webauthn working
* feat: external users
* feat: external users login
* feat: notify users
* fix: tests
* feat: cascade remove user grants on project remove
* fix: webauthn
* fix: pr requests
* fix: register human with member
* fix: fix bugs
* fix: fix bugs
2021-02-08 11:30:30 +01:00
Livio Amstutz
b71a444e86
fix: primary domain claim ( #1082 )
...
* fix: primary domain scope (overwrite by roles and rogue `:`)
* disable wrong users
* fix test
* show requested org name
* only show domain when selected
2020-12-14 10:54:29 +01:00
Livio Amstutz
300ade66a7
feat: add WebAuthN support for passwordless login and 2fa ( #966 )
...
* at least registration prompt works
* in memory test for login
* buttons to start webauthn process
* begin eventstore impl
* begin eventstore impl
* serialize into bytes
* fix: u2f, passwordless types
* fix for localhost
* fix script
* fix: u2f, passwordless types
* fix: add u2f
* fix: verify u2f
* fix: session data in event store
* fix: u2f credentials in eventstore
* fix: webauthn pkg handles business models
* feat: tests
* feat: append events
* fix: test
* fix: check only ready webauthn creds
* fix: move u2f methods to authrepo
* frontend improvements
* fix return
* feat: add passwordless
* feat: add passwordless
* improve ui / error handling
* separate call for login
* fix login
* js
* feat: u2f login methods
* feat: remove unused session id
* feat: error handling
* feat: error handling
* feat: refactor user eventstore
* feat: finish webauthn
* feat: u2f and passwordlss in auth.proto
* u2f step
* passwordless step
* cleanup js
* EndpointPasswordLessLogin
* migration
* update mfaChecked test
* next step test
* token name
* cleanup
* attribute
* passwordless as tokens
* remove sms as otp type
* add "user" to amr for webauthn
* error handling
* fixes
* fix tests
* naming
* naming
* fixes
* session handler
* i18n
* error handling in login
* Update internal/ui/login/static/i18n/de.yaml
Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
* Update internal/ui/login/static/i18n/en.yaml
Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
* improvements
* merge fixes
* fixes
* fixes
Co-authored-by: Fabiennne <fabienne.gerschwiler@gmail.com>
Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
2020-12-02 17:00:04 +01:00
Fabi
6b3f5b984c
feat: metrics ( #1024 )
...
* refactor: switch from opencensus to opentelemetry
* tempo works as designed nooooot
* fix: log traceids
* with grafana agent
* fix: http tracing
* fix: cleanup files
* chore: remove todo
* fix: bad test
* fix: ignore methods in grpc interceptors
* fix: remove test log
* clean up
* typo
* fix(config): configure tracing endpoint
* fix(span): add error id to span
* feat: metrics package
* feat: metrics package
* fix: counter
* fix: metric
* try metrics
* fix: coutner metrics
* fix: active sessin counter
* fix: active sessin counter
* fix: change current Sequence table
* fix: change current Sequence table
* fix: current sequences
* fix: spooler div metrics
* fix: console view
* fix: merge master
* fix: Last spool run on search result instead of eventtimestamp
* fix: go mod
* Update console/src/assets/i18n/de.json
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
* fix: pr review
* fix: map
* update oidc pkg
* fix: handlers
* fix: value observer
* fix: remove fmt
* fix: handlers
* fix: tests
* fix: handler minimum cycle duration 1s
* fix(spooler): handler channel buffer
* fix interceptors
Co-authored-by: adlerhurst <silvan.reusser@gmail.com>
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
2020-12-02 08:50:59 +01:00
Livio Amstutz
2331b8a4c0
feat(oidc): add clock skew and userinfo claims in ID Token ( #1022 )
...
* feat: add clock skew
* add IDTokenUserinfoAssertion
* migration
* fix missing converter
* update oidc version
* fix interface impl
2020-11-27 14:10:52 +01:00
Silvan
168242e725
fix(tracing): from opencensus to opentelemetry ( #937 )
...
* refactor: switch from opencensus to opentelemetry
* tempo works as designed nooooot
* fix: log traceids
* with grafana agent
* fix: http tracing
* fix: cleanup files
* chore: remove todo
* fix: bad test
* fix: ignore methods in grpc interceptors
* fix: remove test log
* clean up
* typo
* fix(config): configure tracing endpoint
* fix(span): add error id to span
2020-11-20 07:57:39 +01:00
Fabi
78c0cf2f57
fix: add and verified projectID in audience ( #957 )
...
* feat: new scope for project id in aud
* feat: add doc
* feat: projectid endpoint
* feat: remove handle Proejct id
* fix: remove go.mod replace
* fix: add project id to aud
* fix: update oidc version
* fix: change project id scope
* update projectID scope to current usage
* typo: ZITADEL uppercase
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
2020-11-16 10:54:48 +01:00
Fabi
202aae4954
feat: mfa policy ( #913 )
...
* feat: add mfa to login policy
* feat: add mfa to login policy
* feat: add mfa to login policy
* feat: add mfa to login policy
* feat: add mfa to login policy on org
* feat: add mfa to login policy on org
* feat: append events on policy views
* feat: iam login policy mfa definition
* feat: login policies on orgs
* feat: configured mfas in login process
* feat: configured mfas in login process
* Update internal/ui/login/static/i18n/en.yaml
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
* fix: rename software and hardware mfas
* fix: pr requests
* fix user mfa
* fix: test
* fix: oidc version
* fix: oidc version
* fix: proto gen
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
Co-authored-by: Max Peintner <max@caos.ch>
2020-11-04 11:26:10 +01:00
Fabi
51417be35d
feat: primary domain ( #936 )
...
* fix: primary domain
* fix: remove comment
* fix: oidc version
2020-11-03 10:50:03 +01:00
Livio Amstutz
b3f68c8f48
feat: add tracing interceptors to login and oidc ( #764 )
...
* add tracing interceptors to login and oidc
* add some tracing spans
* trace login calls
* add some spans
* add some spans (change password)
* add some more tracing in oauth/oidc
* revert org exists
* Merge branch 'master' into http-tracing
# Conflicts:
# internal/api/oidc/auth_request.go
# internal/api/oidc/client.go
# internal/auth/repository/eventsourcing/eventstore/auth_request.go
# internal/auth/repository/eventsourcing/eventstore/user.go
# internal/authz/repository/eventsourcing/eventstore/token_verifier.go
# internal/authz/repository/eventsourcing/view/token.go
# internal/user/repository/eventsourcing/eventstore.go
2020-10-21 10:18:34 +02:00
Livio Amstutz
a321d850ae
feat: project roles ( #843 )
...
* fix logging
* token verification
* feat: assert roles
* feat: add project role assertion on project and token type on app
* id and access token role assertion
* add project role check
* user grant required step in login
* update library
* fix merge
* fix merge
* fix merge
* update oidc library
* fix tests
* add tests for GrantRequiredStep
* add missing field ProjectRoleCheck on project view model
* fix project create
* fix project create
2020-10-16 07:49:38 +02:00
Fabi
265b491696
feat: tokens on user aggregate ( #837 )
...
* fix: fix remove policies in spoolers
* fix: reread of token by id
* fix: update oidc package
* fix: possible nil pointer on token split
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
2020-10-15 13:52:41 +02:00
Livio Amstutz
da8f243129
fix: marshal of user info address ( #767 )
2020-09-21 12:55:39 +02:00
Silvan
5a8cafcae5
fix: JWT Profile ( #748 )
...
* fix: correct env var for tracing type
* fix: local env tracing
* fix: key in detail as string
* fix: implement storage
* fix: machine key by id
fix: store public key as bytes instead of crypto value
* update oidc pkg
* dont check origins for service account tokens
* fix: scopes
* fix: dependencies
* fix: dependencies
* fix: remove unused code
* fix: variable naming
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
2020-09-17 08:49:33 +02:00
Livio Amstutz
c1c85e632b
fix: cookie handling ( #654 )
...
* feat: set cookie prefix and max age
* cookie prefix on csrf cookie
* fix: check user agent cookie in login
* update oidc pkg
* cleanup
2020-08-31 08:49:35 +02:00
Fabi
7295383621
fix: translation ( #647 )
...
* fix: translation
* fix: translation
* fix: translation
* fix: remove unused code
* fix: log err
2020-08-28 09:44:43 +02:00
Livio Amstutz
34ec2508d3
feat: add domain verification notification ( #649 )
...
* fix: dont (re)generate client secret with auth type none
* fix(cors): allow Origin from request
* feat: add origin allow list and fix some core issues
* rename migration
* fix UserIDsByDomain
* feat: send email to users after domain claim
* username
* check origin on userinfo
* update oidc pkg
* fix: add migration 1.6
* change username
* change username
* remove unique email aggregate
* change username in mgmt
* search global user by login name
* fix test
* change user search in angular
* fix tests
* merge
* userview in angular
* fix merge
* Update pkg/grpc/management/proto/management.proto
Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
* Update internal/notification/static/i18n/de.yaml
Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
* fix
Co-authored-by: Fabi <38692350+fgerschwiler@users.noreply.github.com>
2020-08-27 17:18:23 +02:00
Livio Amstutz
4e1e8a714a
fix: cors ( #621 )
...
* fix: dont (re)generate client secret with auth type none
* fix(cors): allow Origin from request
* feat: add origin allow list and fix some core issues
* rename migration
* fix UserIDsByDomain
* check origin on userinfo
* update oidc pkg
2020-08-24 10:06:55 +02:00
Fabi
5699fe80d5
feat: app handling compliance ( #527 )
...
* feat: check oidc compliance
* fix: add tests
* fix: add oidc config tests
* fix: add oidc config tests user agent
* fix: test oidc config compliance
* fix: test oidc config compliance
* fix: useragent implicit authmethod none
* fix: merge master
* feat: translate compliance problems
* feat: check native app for custom url
* fix: better compliance handling
* fix: better compliance handling
* feat: add odidc dev mode
* fix: remove deprecated request fro management api
* fix: oidc package version
* fix: migration
* fix: tests
* fix: remove unused functions
* fix: generate proto files
* fix: native implicit and code none compliant
* fix: create project
* Update internal/project/model/oidc_config_test.go
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
* fix: tests
* Update internal/project/model/oidc_config.go
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
* Update internal/project/model/oidc_config.go
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
* fix: tests
Co-authored-by: Livio Amstutz <livio.a@gmail.com>
2020-08-10 09:34:56 +02:00
Livio Amstutz
6128c0c672
fix: response type mapping ( #426 )
...
* fix: return authorizations on userinfo
* fix: response type mapping
* fix tests
* fix angular
* regenerate mgmt proto
* enable login link again
2020-07-09 15:52:20 +02:00
Livio Amstutz
8efa697af2
fix: return authorizations on userinfo ( #420 )
2020-07-09 14:05:12 +02:00
Livio Amstutz
3549a8b64e
feat: port reduction ( #323 )
...
* move mgmt pkg
* begin package restructure
* rename auth package to authz
* begin start api
* move auth
* move admin
* fix merge
* configs and interceptors
* interceptor
* revert generate-grpc.sh
* some cleanups
* console
* move console
* fix tests and merging
* js linting
* merge
* merging and configs
* change k8s base to current ports
* fixes
* cleanup
* regenerate proto
* remove unnecessary whitespace
* missing param
* go mod tidy
* fix merging
* move login pkg
* cleanup
* move api pkgs again
* fix pkg naming
* fix generate-static.sh for login
* update workflow
* fixes
* logging
* remove duplicate
* comment for optional gateway interfaces
* regenerate protos
* fix proto imports for grpc web
* protos
* grpc web generate
* grpc web generate
* fix changes
* add translation interceptor
* fix merging
* regenerate mgmt proto
2020-07-08 13:56:37 +02:00