Commit Graph

811 Commits (a91762c15bb33b3c155a989e1f10dbe61adc7487)

Author SHA1 Message Date
James Elliott a91762c15b
fix(templates): plain text email misleading (#5036)
The plain text email template for identity verifications indicates it's for registering a 2FA device but it may also be used for password resets. This fixes that issue.

Fixes #4915
2023-03-07 10:45:59 +11:00
James Elliott ff6be40f5e
feat(oidc): pushed authorization requests (#4546)
This implements RFC9126 OAuth 2.0 Pushed Authorization Requests. See https://datatracker.ietf.org/doc/html/rfc9126 for the specification details.
2023-03-06 14:58:50 +11:00
James Elliott 42671d3edb
feat(oidc): client_secret_jwt client auth (#5031)
This theoretically adds support for client_secret_jwt.
2023-03-06 13:35:58 +11:00
renovate[bot] 0fd3cf841b
build(deps): update ghcr.io/k3d-io/k3d docker tag to v5.4.8 (#5026)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-03-05 08:48:49 +11:00
James Elliott fca8e2130a
docs: update integration docs (#4986) 2023-03-04 15:53:48 +11:00
renovate[bot] 6b1d7fab70
build(deps): update envoyproxy/envoy docker tag to v1.25.2 (#5012)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-03-02 13:57:14 +11:00
James Elliott b9a6856ff5
fix(logging): injected time format inconsistent (#5004)
This fixes an issue where the injected log time format is inconsistent with a normalized time format. This adjusts it to use a RFC3339 format.
2023-02-28 20:40:04 +11:00
James Elliott a345490826
feat(server): handle head method (#5003)
This implements some HEAD method handlers for various static resources and the /api/health endpoint.
2023-02-28 20:01:09 +11:00
James Elliott ac72ee494c
ci: fix misc and refactorings (#4994)
* ci: fix misc and refactorings

* ci: additional fix
2023-02-26 13:22:22 +11:00
James Elliott f44700c352
fix(commands): internal services not cleaned up properly (#4966)
This fixes a race condition which in some circumstances (seemed to only affect a deliberately under provisioned VM in testing, however it could still theoretically occur on any system) can cause the process to hang during a shutdown. While unrelated this also adds additional trace logging to the shutdown process to better capture each stage to better facilitate debugging in the future specifically when one particular service is taking time to stop.

Fixes #4963
2023-02-20 16:37:22 +11:00
renovate[bot] eab09efc0c
build(deps): update module github.com/knadh/koanf to v2 (#4952)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-02-19 11:49:08 +11:00
James Elliott ab01fa6bca
fix(handlers): legacy authz failure on nginx (#4956)
Since nginx doesn't do portal URL detection we have to skip returning an error on the legacy authz implementation when the portal URL isn't detected. This issue only exists in unreleased versions.
2023-02-18 16:56:53 +11:00
renovate[bot] 913a882b8b
build(deps): update mariadb docker tag to v10.11.2 (#4955)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-18 10:10:00 +11:00
Amir Zarrinkafsh 51096c5e70
refactor(suites): utilise pki certs in haproxy suite (#4945)
This utilises the certs provided within the pki section of the repo for the HAProxy suite.
2023-02-17 15:05:48 +11:00
James Elliott 891f1de9f2
refactor(commands): x509 bundling (#4942)
This adds another bundling mode to the certificate command.
2023-02-17 14:29:07 +11:00
renovate[bot] 98e6fdc69f
build(deps): update traefik docker tag to v2.9.8 (#4939)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-16 11:14:38 +11:00
renovate[bot] 9116bcf00f
build(deps): update caddy docker tag to v2.6.4 (#4938)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-16 11:00:12 +11:00
renovate[bot] 4598932155
build(deps): update traefik docker tag to v2.9.7 (#4936)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-15 20:29:27 +11:00
renovate[bot] ccaa6b9fd2
build(deps): update golang docker tag to v1.20.1 (#4930)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-15 10:56:48 +11:00
renovate[bot] 16eedfd1b4
build(deps): update haproxy docker tag to v2.7.3 (#4931)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-15 08:57:57 +11:00
Amir Zarrinkafsh 59e82e786c
refactor: collect backend coverage via go build -cover (#4921)
* refactor: collect backend coverage via go build -cover

* refactor: print percentage coverage collected
2023-02-14 14:44:08 +11:00
renovate[bot] 6499dcf210
build(deps): update module github.com/go-webauthn/webauthn to v0.7.1 (#4920)
* build(deps): update module github.com/go-webauthn/webauthn to v0.7.1

* test: fix for upstream changes

---------

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-02-13 06:30:19 +11:00
James Elliott fab2b0d497
test(suites): fix missing sans (#4917) 2023-02-12 02:54:44 +11:00
James Elliott 2888ee7f41
refactor(commands): services (#4914)
Misc refactoring of the services logic to simplify the
2023-02-11 21:45:26 +11:00
renovate[bot] 1a5178a8a5
build(deps): update alpine docker tag to v3.17.2 (#4910)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-11 16:35:53 +11:00
James Elliott a0758bb4ba
refactor(suites): use pki for oidc (#4913) 2023-02-11 15:37:54 +11:00
James Elliott 8e4b660f15
refactor: certs (#4912)
This refactors the suites to use a Enterprise Root CA PKI signed certificate so the CA public certificate can be trusted. This is particularly useful for webauthn in Chrome.
2023-02-11 14:11:40 +11:00
renovate[bot] dbafa26ec3
build(deps): update caddy docker tag to v2.6.3 (#4906)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-09 15:04:46 +11:00
James Elliott 2e6d17ba8a
feat(configuration): rfc2307bis implementation (#4900)
This adds configuration defaults for RFC2307bis LDAP implementations such as OpenLDAP with the RFC2307bis LDIF which should service most user needs.
2023-02-08 13:35:57 +11:00
renovate[bot] 436a78525c
build(deps): update envoyproxy/envoy docker tag to v1.25.1 (#4899)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-08 09:22:17 +11:00
James Elliott 726850fe43
refactor: add some more useful templating funcs (#4891) 2023-02-08 01:28:09 +11:00
renovate[bot] 9bf0ce212a
build(deps): update mariadb docker tag to v10.10.3 (#4889)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-07 15:13:12 +11:00
James Elliott a7ccf3652f
docs: fix rfc references and fix misc issues (#4879) 2023-02-05 18:11:30 +11:00
James Elliott a2ce9e0573
test: add test for 2329 expand-env (#4870)
This adds a test for https://github.com/authelia/authelia/issues/2329#issuecomment-1414201785
2023-02-03 10:36:38 +11:00
renovate[bot] 790139fd48
build(deps): update ghcr.io/k3d-io/k3d docker tag to v5.4.7 (#4867)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-02-03 02:43:34 +11:00
James Elliott e408cb19b1
test: adjust tests and docs to be similar (#4856) 2023-02-02 18:13:18 +11:00
James Elliott 598ea2bb19
feat(configuration): disallow public suffix domains (#4855)
This adds a check to the domains configuration to ensure the domain value is not part of the public suffix list at https://publicsuffix.org. These domains are special and users cannot write cookies with this domain value, this makes them unusable with Authelia and this more readily makes that apparent.
2023-02-02 16:34:49 +11:00
renovate[bot] 30aaa8a245
build(deps): update golang docker tag to v1.20.0 (#4864)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-02-02 14:23:09 +11:00
James Elliott f382ba040e
i18n: update translations (#4850) 2023-01-30 10:16:52 +11:00
James Elliott 65705a646d
feat(server): customizable authz endpoints (#4296)
This allows users to customize the authz endpoints.

Closes #2753, Fixes #3716

Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2023-01-25 20:36:40 +11:00
James Elliott 36e817df92
test(suites): load environment into suites (#4762)
* test(suites): load environment into suites

* test(suites): default setup suite

* test(suites): create base suite

* test(suites): fix nil ptr

* test(suites): add logging

* test: fix missing devworkflow path

* refactor: apply suggestions

* refactor: log

* fix: dev workflow requires env file to trigger vite hmr

* fix(suites): fix dynamic configuration in dev workflow for all proxies

* refactor: apply final suggestions

* fix: pass log level to suites

* fix(suites): include pathprefix to prevent react router basename issues

* fix: missing setup logging calls

* fix: gate suite setup funcs

* test: fix lint

* test: fix tmp dir

* fix(suites): fix gitignore of .env.development with vite hmr

Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2023-01-25 15:11:05 +11:00
James Elliott a566c16d08
feat(web): privacy policy url (#4625)
This allows users to customize a privacy policy URL at the bottom of the login view.

Closes #2639
2023-01-22 19:58:07 +11:00
James Elliott 8cbd9cb30a
test: make suite browser detection more robust and extensible (#4807) 2023-01-21 16:02:27 +11:00
renovate[bot] 309c355026
build(deps): update haproxy docker tag to v2.7.2 (#4805)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-01-21 14:21:48 +11:00
renovate[bot] 530bf72f42
build(deps): update envoyproxy/envoy docker tag to v1.25.0 (#4796)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-01-19 16:11:30 +11:00
James Elliott b815521384
fix(ntp): version 4 encoded incorrectly (#4773)
This fixes an issue where version 4 was actually serialized as version 5 due to some binary math issues. It also fixes the fact the leap value was incorrect, it should have been set to unknown.
2023-01-17 22:54:17 +11:00
Manuel Nuñez 56f028294b
fix(utils): fix suite setup timeout (#4771)
After PR #4751 the suites times out if takes more of 60 seconds
This PR honors the timeout configured at waitUntilAutheliaBackendIsReady (90s)
2023-01-16 10:58:13 +11:00
Manuel Nuñez 1cf9e6f3ef
test(utils): add additional coverage (#4751) 2023-01-12 22:30:16 +11:00
Manuel Nuñez 8b29cf7ee8
feat(session): multiple session cookie domains (#3754)
This adds support to configure multiple session cookie domains.

Closes #1198

Co-authored-by: James Elliott <james-d-elliott@users.noreply.github.com>
Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2023-01-12 21:57:44 +11:00
renovate[bot] 81ffe9d616
build(deps): update golang docker tag to v1.19.5 (#4752)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
2023-01-11 14:48:33 +11:00