ZITADEL - Identity infrastructure, simplified for you.
Go to file
Tim Möhlmann c0e45b63d8
fix: reset the call timestamp after a bulk trigger (#6080)
* reproduce #5808

Add an integration test that imports and gets N amount of human users.
- With N set to 1-10 the operation seems to succeed always
- With N set to 100 the operation seems to fail between 1 and 7 times.

* fix merge issue

* fix: reset the call timestamp after a bulk trigger

With the use of `AS OF SYSTEM TIME` in queries,
there was a change for the query package not
finding the latest projection verson after
a bulk trigger.
If events where processed in the bulk trigger,
the resulting row timestamp would be after the call
start timestamp.
This sometimes resulted in consistency issues when
Set and Get API methods are called in short succession.
For example a Import and Get user could sometimes result in a Not Found
error.

Although the issue was reported for the Management API user import,
it is likely this bug contributed to the flaky integration and e2e tests.

Fixes #5808

* trigger bulk action in GetSession

* don't use the new context in handler schedule

* disable reproduction test

---------

Co-authored-by: Livio Spring <livio.a@gmail.com>
2023-07-07 08:15:05 +00:00
.artifacts/zitadel ci(e2e): Run Tests in Pipelines (#3903) 2022-08-05 20:00:46 +02:00
.codecov chore(codecov): make codecov configurable in repo (#40) 2020-04-08 07:37:24 +02:00
.github feat: push telemetry (#6027) 2023-07-06 08:38:13 +02:00
build feat: Apply OCI source label to Docker image (#6070) 2023-07-06 11:32:41 +00:00
cmd feat: improve milestone format (#6150) 2023-07-06 19:31:08 +02:00
console feat: show font name & preview font in branding (#6026) 2023-06-23 15:36:11 +00:00
deploy/knative feat(admin-api): list events (#4989) 2023-01-16 11:30:03 +00:00
docs docs(nextjs): yarn, remove redundant description (#5764) 2023-07-07 07:05:36 +00:00
e2e test(quotas): test exhausted cookie handling (#5788) 2023-05-22 16:32:50 +02:00
internal fix: reset the call timestamp after a bulk trigger (#6080) 2023-07-07 08:15:05 +00:00
openapi chore(v2): move to new org (#3499) 2022-04-26 23:01:45 +00:00
pkg/grpc feat(api): new session service (#5801) 2023-05-05 15:34:53 +00:00
proto docs: Password reset (#6108) 2023-06-28 13:52:53 +02:00
statik fix(zitadel-image): refactor dockerfiles and gh action (#2027) 2021-07-27 14:34:56 +02:00
tools feat: user v2alpha email API (#5708) 2023-04-25 09:02:29 +02:00
.dockerignore chore: speed up local console docker build (#5824) 2023-05-12 07:36:44 +00:00
.gitignore feat: push telemetry (#6027) 2023-07-06 08:38:13 +02:00
.golangci.yaml feat: add quotas (#4779) 2023-02-15 02:52:11 +01:00
.goreleaser.yaml chore: backward compatible stub gen (#5926) 2023-05-24 23:19:48 +02:00
.releaserc.js fix(login): url safe encoding base64 (#5983) 2023-06-08 09:27:03 +02:00
buf.work.yaml chore(console): buf stub build (#5215) 2023-02-17 14:09:11 +00:00
changelog.config.js feat: Merge master (#1260) 2021-02-08 16:48:41 +01:00
CODE_OF_CONDUCT.md chore: rename docs links (#3668) 2022-05-20 14:32:06 +00:00
CONTRIBUTING.md feat: push telemetry (#6027) 2023-07-06 08:38:13 +02:00
go.mod chore(deps): update oidc (#6002) 2023-06-09 15:18:14 +00:00
go.sum chore(deps): update oidc (#6002) 2023-06-09 15:18:14 +00:00
LICENSE chore: Update LICENSE (#1087) 2020-12-14 09:40:09 +01:00
main.go chore: test server for direct resource access 2023-04-24 20:40:31 +03:00
README.md docs: add section about subscribing to mailing list (#5915) 2023-06-01 10:30:30 +02:00
release-channels.yaml chore: update stable to 2.21.3 (#5514) 2023-03-29 14:07:23 +00:00
SECURITY.md docs: update security policies (#5452) 2023-03-16 08:52:12 +01:00
yarn.lock docs: fix preview link (#4965) 2023-01-03 10:14:13 +00:00

Zitadel Logo Zitadel Logo

Do you look for a user management that's quickly set up like Auth0 and open source like Keycloak?

Do you have project that requires a multi-tenant user management with self-service for your customers?

Look no further — ZITADEL combines the ease of Auth0 with the versatility of Keycloak.

We provide you with a wide range of out of the box features to accelerate your project. Multi-tenancy with branding customization, secure login, self-service, OpenID Connect, OAuth2.x, SAML2, LDAP, Passwordless with FIDO2 (including Passkeys), OTP, U2F, and an unlimited audit trail is there for you, ready to use.

With ZITADEL you can rely on a hardened and extensible turnkey solution to solve all of your authentication and authorization needs.


🏡 Website 💬 Chat 📋 Docs 🧑‍💻 Blog 📞 Contact

Get started

👉 Quick Start Guide

Deploy ZITADEL (Self-Hosted)

Deploying ZITADEL locally takes less than 3 minutes. So go ahead and give it a try!

See all guides here

If you are interested to get professional support for your self-hosted ZITADEL please reach out to us!

Setup ZITADEL Cloud (SaaS)

If you want to experience a hands-free ZITADEL, you should use ZITADEL Cloud.

It is free for up to 25'000 authenticated requests and provides you all the features that make ZITADEL great. Learn more about the pay-as-you-go pricing.

Example applications

Clone one of our example applications or deploy them directly to Vercel.

SDKs

Use our SDKs for your favorite language and framework.

Why choose ZITADEL

We built ZITADEL with a complex multi-tenancy architecture in mind and provide the best solution to handle B2B customers and partners. Yet it offers everything you need for a customer identity (CIAM) use case.

Features

Authentication

Multi-Tenancy

Integration

  • GRPC and REST APIs
  • Actions to call any API, send webhooks, adjust workflows, or customize tokens
  • Role Based Access Control (RBAC)

Self-Service

Deployment

Track upcoming features on our roadmap.

How To Contribute

Details about how to contribute you can find in the Contribution Guide

Contributors

Made with contrib.rocks.

Showcase

Quick Start Guide

Secure a React Application using OpenID Connect Authorization Code with PKCE

Quick Start Guide

Login with Passkeys

Use our login widget to allow easy and secure access to your applications and enjoy all the benefits of Passkeys (FIDO 2 / WebAuthN):

Passkeys

Admin Console

Use Console or our APIs to setup organizations, projects and applications.

Console Showcase

Security

See the policy here.

Technical Advisories are published regarding major issues with the ZITADEL platform that could potentially impact security or stability in production environments.

License

See the exact licensing terms here

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.