Commit graph

45 commits

Author SHA1 Message Date
Lauri Ojansivu
c936d83b38 Reverted all previous Oauth2 filepath code, thinking is there some better way.
Thanks to xet7 !

Related https://github.com/wekan/wekan/pull/5619,
related https://github.com/wekan/wekan/pull/5616
2024-12-13 01:51:42 +02:00
walster001
30273709ae Add support for external email verification
Add support for external email verification against OIDC login script. This will check local file for presence of email and log the user in if it is or deny them if it isn't.
2024-12-12 00:34:22 +10:30
Vadim Aleksandrov
f010235ff2
Fix DEBUG environment variable check 2024-04-17 14:06:15 +03:00
Lauri Ojansivu
93be112a94 Azure AD B2C login using OAuth2. https://github.com/wekan/wekan/wiki/B2C
Thanks to snowsky and xet7 !

Fixes #5242
2023-12-17 13:54:55 +02:00
Diego Steiner
3e469c5a44
feature: add permissions for default boards 2023-11-20 16:01:18 +01:00
Diego Steiner
63201e992c
feature: add permissions for default boards 2023-11-19 14:08:16 +01:00
Lauri Ojansivu
65a231a040
Merge pull request #5098 from scout-ch/feature/default-board-for-users
Proposal: default board for users
2023-08-23 00:08:37 +03:00
Diego Steiner
72fa2972f0
fix: revert debugging output 2023-08-22 14:09:51 +02:00
Diego Steiner
00826660b4
feature: add user to default board after login 2023-08-22 14:06:49 +02:00
Tobias Wolf
452e2e2408 Fix "PROPAGATE_OIDC_DATA" mechanism if "info.groups" is undefined
This may happen if no group information is shared via OAuth2/OIDC but synchronization of user data is intended by WeKan administration. Without the patch the following exception is raised:
Error in OAuth Server: groups is not iterable
2023-07-16 23:13:46 +02:00
Lauri Ojansivu
bc67b5c3bc Fix OIDC login loop for integer user ID.
Thanks to danielkaiser !

Fixes #4795,
related f2a92be01a
2023-01-07 01:33:28 +02:00
Lauri Ojansivu
f2a92be01a Fix OIDC login loop for integer user ID.
Thanks to danielkaiser and xet7 !

Fixes #4795
2023-01-03 16:51:35 +02:00
viehlieb
d90e78e417 move logic for group routine to wekan-oidc package 2022-12-23 11:47:33 +01:00
viehlieb
c5dd0b729d get ServiceConfiguration from server 2022-07-08 16:48:06 +02:00
viehlieb
5df5c7f5d7 merge master changes 2022-07-08 11:55:32 +02:00
viehlieb
84d51393e4 enable redirect to oidc provider to empower sso solutions even further 2022-06-10 17:52:52 +02:00
Lauri Ojansivu
00768b4392 Added back WeKan lockout, ldap, oidc, cas.
Thanks to xet7 !
2022-05-16 21:12:27 +03:00
viehlieb
2e354f9b1e wip redirect on landing page and logout to oidc provider 2022-05-11 09:05:43 +02:00
Daniel Kaiser
ada770c9e6
Update oidc_server.js 2022-04-04 14:22:47 +02:00
viehlieb
9179e5ea71 added Readme 2022-03-10 16:02:47 +01:00
viehlieb
f90875d8ef updating teams from oidc possible, fixed undefined error, no need for extra login to assign/create teams/orgs 2022-03-10 15:56:35 +01:00
viehlieb
263b405fc8 minor changes to README 2022-03-04 18:53:43 +01:00
viehlieb
a0dbfa1f7e add README and functionality for more control through oidc - create teams/orgs if not exist and addto user - make user admin when flag is set 2022-03-04 18:29:29 +01:00
viehlieb
db6fc57515 fix userwas used before assignment 2022-02-24 13:08:55 +01:00
viehlieb
6b404da9f8 add functionality for oidc login to change MongoDB data for email, fullname, username, user.teams 2022-02-23 15:09:03 +01:00
Lauri Ojansivu
40265144af Upgrade to Meteor 2.3.4
Thanks to xet7 !
2022-02-15 13:16:27 +03:00
Lauri Ojansivu
1e837dec11 Fix Google SSO to access Wekan has not been working
by reverting Wekan v5.31 not-working fixes to OAUTH2_LOGIN_STYLE=redirect Has No Effect.

Thanks to unpokitodxfavor and xet7 !

Fixes #3854,
opens #3845
2021-06-11 13:08:23 +03:00
Lauri Ojansivu
78324263c1 Try to fix OAUTH2_LOGIN_STYLE=redirect Has No Effect.
Thanks to xet7 !

Fixes #3845
2021-06-08 16:50:48 +03:00
Lauri Ojansivu
5f647fd2ab Try to fix Color picker of lists is empty. Part 3.
Thanks to bronger and xet7 !

Related #3418
2021-01-06 15:47:21 +02:00
Lauri Ojansivu
6007fe263e Try to fix Color picker of lists is empty. Part 2.
Thanks to bronger and xet7 !

Related #3418
2021-01-06 15:43:46 +02:00
Lauri Ojansivu
26921a9c36 Try to fix Color picker of lists is empty.
Thanks to bronger and xet7 !

Related #3418
2021-01-06 15:32:47 +02:00
Samuel MARTIN MORO
ae9d82430a fix(oidc): wekan/wekan#3299 2020-11-01 20:48:50 +01:00
Lauri Ojansivu
ec8a78537f Login with OIDC OAuth2 Oracle on premise identity manager OIM, with setting ORACLE_OIM_ENABLED=true.
Thanks to xet7 !
2020-10-02 23:15:39 +03:00
Lauri Ojansivu
f6bdb4d694 - Remove mouse scroll settings of already removed custom scrollbar.
- Add setting OAUTH2_ADFS_ENABLED=false
- Add testing for both string and boolean version of true

Thanks to xet7 !

Fixes #2949
2020-09-13 09:41:53 +03:00
phaseshift3r
a1f9536657
Update oidc_server.js
added hack for getting the claims in the accessToken instead of the /adfs/oauth2/userinfo endpoint 

https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/overview/ad-fs-faq#i-am-trying-to-get-additional-claims-on-the-user-info-endpoint-but-its-only-returning-subject-how-can-i-get-additional-claims

Environment variable needed set
OAUTH2_ADFS=true
2020-09-11 11:16:28 +02:00
Cansu Kavili
2c792363bf ocp hack added 2020-04-13 14:03:19 +02:00
Benoit MOUQUET
b26e65c70c Fix: Error when retrieve token from some OIDC due to not necessary scope parameter 2020-03-05 12:52:46 +01:00
Bojan Hartmann
7bba07ccbf Implemented Nextcloud OAuth2 Hack
Fixed: OAuth2 authentication via Nextcloud(tested Nextcloud 17.0.2-18.0.0)
Todo: actually use the profile data: Fullname and Email in Profile
2020-01-22 22:28:03 +01:00
Lauri Ojansivu
9b905c2833 Try to fix Node 12 Buffer() deprecation errors.
Thanks to xet7 !
2020-01-18 16:01:02 +02:00
Lauri Ojansivu
e01f4dbf13 Change Buffer to Buffer.alloc on Node v12. Try to fix Snap. 2020-01-11 13:08:29 +02:00
Lauri Ojansivu
8b31c0768c Try to fix OIDC login.
Thanks to xet7 !
2019-06-12 06:29:57 +03:00
benji
fd390d2560 Update oidc_server.js
with this fix, Authentication via OAuth2 with Google is possible.
1.) token endpoint and userinfo-endpoint in Google are different, so you have to check that,
2.) request the scopes of the environment variable "process.env.OAUTH2_REQUEST_PERMISSIONS"
with this small little fix the login with google in oauth2-protocol gets possible :-)
I would be very happy about a master-merge

thank you in advance
2019-06-11 09:23:12 +02:00
DominikPf
892ee60527 Fix Scope parsing Issue for OAuth2 Login 2019-05-23 10:28:08 +02:00
Samuel
b17359ec6f
fix(oidc): can not log in
Trying to configure wekan authenticating against LemonLDAP-NG, I used to read about errors like the following:

```
XXX: getUserInfo response:  { sub: 'demoone' }
XXX: userinfo: { sub: 'demoone' }
{"line":"431","file":"oauth.js","message":"Error in OAuth Server: id is not defined","time":{"$date":1556286530412},"level":"warn"}
Exception while invoking method 'login' { stack: 'ReferenceError: id is not defined\n    at Object.handleOauthRequest (packages/wekan-oidc.js:39:68)\n    at OAuth._requestHandlers.(anonymous function) (packages/oauth2.js:27:31)\n    at middleware (packages/oauth.js:203:5)\n    at packages/oauth.js:176:5',
source: 'method' }
```

Looking at the sources, that error message seems to be right: we have several references to `id`, `uid`, `displayName` or `email`, which are not defined. Probably a typo, assuming we meant these to be strings.

Applying that patch, I confirm I can finally log in:

```
XXX: getUserInfo response:  { sub: 'demoone' }
XXX: userinfo: { sub: 'demoone' }
XXX: serviceData: { id: undefined,
  username: undefined,
  fullname: undefined,
  accessToken: 'e57dc4e9e81cc98c279db3ed08b1c72f',
  expiresAt: 1556298699213,
  email: undefined }
XXX: profile: { name: undefined, email: undefined }
```

All the credit goes to @pcurie .
2019-04-26 18:21:42 +02:00
Lauri Ojansivu
73e265d8fd Include to Wekan packages directory contents, so that meteor command would build all directly.
This also simplifies build scripts.

Thanks to xet7 !
2019-04-20 15:18:33 +03:00