Davi Arnaut
5a686c5f4c
feat(auth): improve authentication flow logging ( #10428 )
2024-05-03 11:54:51 -07:00
Davi Arnaut
15d0a0c8d2
fix(oidc settings): use correct path for preferredJwsAlgorithm ( #10302 )
2024-04-16 13:45:44 -07:00
david-leifker
f36a597b17
fix(spring): refactor spring configuration ( #10290 )
2024-04-16 13:50:41 -05:00
david-leifker
731c29e675
feat(graph-retriever): implement graph retriever ( #10241 )
2024-04-16 10:12:48 -05:00
david-leifker
f9e64d03cc
feat(auth): view authorization ( #10066 )
2024-03-23 06:15:36 -05:00
david-leifker
ed10a8d8cc
feat(search): search access controls ( #9892 )
...
Co-authored-by: Chris Collins <chriscollins3456@gmail.com>
2024-02-28 16:57:26 -06:00
Davi Arnaut
23277f8dc4
fix(oidc settings): effective JWS algorithm setting ( #9712 )
2024-01-24 17:36:30 -08:00
david-leifker
943bb57cbc
feat(backend): structured properties and forms ( #9626 )
...
Co-authored-by: Chris Collins <chriscollins3456@gmail.com>
Co-authored-by: RyanHolstien <RyanHolstien@users.noreply.github.com>
2024-01-22 11:46:04 -06:00
RyanHolstien
2270a6d5f9
fix(frontend): restrict redirect uri domain ( #9592 )
2024-01-09 14:15:50 -06:00
RyanHolstien
651998de44
feat(frontend): align frontend sso code with refactors ( #9506 )
2023-12-26 14:34:10 -06:00
ethan-cartwright
1e64a75339
fix(frontend): Add JSON list oidc group extraction logic ( #9495 )
...
Co-authored-by: Ethan Cartwright <ethan.cartwright@acryl.io>
2023-12-26 19:34:05 +05:30
Aseem Bansal
e14474176f
feat(lint): add spotless for java lint ( #9373 )
2023-12-06 11:02:42 +05:30
RyanHolstien
486e394cb8
fix(signup): prevent invalid email signup ( #9234 )
2023-11-14 14:06:33 -06:00
david-leifker
3f4ab44a91
feat(kafka): increase kafka message size and enable compression ( #9038 )
...
Co-authored-by: Pedro Silva <pedro@acryl.io>
2023-10-29 16:26:05 -05:00
RyanHolstien
60c1aab587
fix(frontend): update cookie module ( #8862 )
2023-10-17 15:50:32 -05:00
david-leifker
aef49b8fb2
feat(entity-client): enable client side cache for entity-client and usage-client ( #8877 )
2023-09-21 22:00:14 -05:00
Ne Enot
d30898637d
fix(frontend): Fix"Logout with OIDC not working" ( #8773 )
2023-09-02 20:37:26 -05:00
Xuelei Li
352a54a7bf
fix(auth): ignore case when comparing http headers ( #8356 )
2023-07-31 09:58:02 +05:30
david-leifker
81fdf9df55
fix(vulnerabilities)/vulnerabilities_fixes_datahub ( #8075 ) ( #8189 )
...
Co-authored-by: Sejal-NucleusTeq <109514187+Sejal-NucleusTeq@users.noreply.github.com>
2023-06-07 18:42:19 -05:00
Jorrick Sleijster
593fec5071
refactor: Return original exception as caused by ( #7722 )
...
Co-authored-by: Aditya Radhakrishnan <aditya.radhakrish@gmail.com>
2023-06-07 10:28:39 -07:00
John Joyce
633119965d
fix(frontend proxy): Disable unnecessary URL encoding at the proxy layer ( #7532 )
2023-03-09 20:32:00 -08:00
lutongzero
8820c4bee9
fix(frontend) support utf-8 charset ( #7405 )
2023-02-23 11:14:30 -05:00
Chris Collins
fd89047ee2
fix(sso) Retrieve cookie configs separately from SSO configs ( #7330 )
2023-02-14 13:36:47 -05:00
david-leifker
fcc9dbb7bc
feat(oidc): add options for preferred jws algorithm ( #7245 )
2023-02-07 19:21:21 -08:00
Aseem Bansal
0f8f186bd0
chore(logs): clean logs scanning location ( #7261 )
2023-02-07 16:41:39 +05:30
John Joyce
5859576231
fix(frontend logs): Silencing harmless log messages (and adding path for future) ( #7254 )
2023-02-06 15:18:32 +05:30
Aditya Radhakrishnan
3e34cf3475
fix(sso): Clear cookies on SSO redirect error ( #7088 )
2023-01-19 16:58:25 -08:00
Chris Collins
0337110928
feat(auth) Update auth cookies to have same-site none for chrome extension ( #6976 )
2023-01-11 17:31:20 -05:00
John Joyce
12b199f6c4
fix(SSO): Correctly redirect to originally requested URL in SSO ( #7011 )
2023-01-11 10:45:18 -08:00
Peter Szalai
b48e50343b
fix(frontend): sasl.client.callback.handler.class ( #6962 )
2023-01-05 13:57:19 -08:00
david-leifker
10ea10ce85
fix(security): require signed/encrypted jwt tokens ( #6565 )
...
* fix(security): require unsigned/encrypted jwt tokens
* Add import
Co-authored-by: Pedro Silva <pedro@acryl.io>
2022-12-26 19:45:32 +00:00
david-leifker
ecc01b9a46
refactor(restli-mce-consumer) ( #6744 )
...
* fix(security): commons-text in frontend
* refactor(restli): set threads based on cpu cores
feat(mce-consumers): hit local restli endpoint
* testing docker build
* Add retry configuration options for entity client
* Kafka debugging
* fix(kafka-setup): parallelize topic creation
* Adjust docker build
* Docker build updates
* WIP
* fix(lint): metadata-ingestion lint
* fix(gradle-docker): fix docker frontend dep
* fix(elastic): fix race condition between gms and mae for index creation
* Revert "fix(elastic): fix race condition between gms and mae for index creation"
This reverts commit 9629d12c3bdb3c0dab87604d409ca4c642c9c6d3.
* fix(test): fix datahub frontend test for clean/test cycle
* fix(test): datahub-frontend missing assets in test
* fix(security): set protobuf lib datahub-upgrade & mce/mae-consumer
* gitingore update
* fix(docker): remove platform on docker base image, set by buildx
* refactor(kafka-producer): update kafka producer tracking/logging
* updates per PR feedback
* Add documentation around mce standalone consumer
Kafka consumer concurrency to follow thread count for restli & sql connection pool
Co-authored-by: leifker <dleifker@gmail.com>
Co-authored-by: Pedro Silva <pedro@acryl.io>
2022-12-26 16:09:08 +00:00
david-leifker
bacc2f957b
fix(oidc): fix oidc authentication loop ( #6848 )
...
* fix(oidc): fix oidc authentication loop
2022-12-22 16:12:51 -06:00
david-leifker
2a182f4846
fix(pac4j-oidc): add verifier parameter ( #6835 )
...
* fix(pac4j-oidc): add verifier parameter
2022-12-21 20:11:11 -06:00
david-leifker
27ea3bf125
fix(security): play framework upgrade ( #6626 )
...
* fix(security): play framework upgrade
2022-12-08 20:27:51 -06:00
david-leifker
a2dc229c62
fix(tests): Misc updates for tests, auth log level, and quickstart ( #6491 )
2022-11-29 08:44:55 -08:00
Aditya Radhakrishnan
4b3120478d
feat(auth): add sso frontend endpoint ( #6273 )
2022-10-31 16:39:26 -07:00
Aditya Radhakrishnan
d905cdffc1
fix(oidc): change default oidc username claim to be email ( #6220 )
2022-10-23 21:09:46 -07:00
John Joyce
1bcc9df853
fix(oidc): Avoid storing Pac4j profile in cookie ( #6260 )
2022-10-21 10:58:27 -07:00
Aditya Radhakrishnan
73a3aa3a3d
fix(auth): fix login endpoint to respect session expiration env var ( #6151 )
2022-10-07 14:08:43 -07:00
Aditya Radhakrishnan
e8259788a3
feat(tracking): add telemetry for frontend events ( #6129 )
2022-10-06 18:56:32 -07:00
Aditya Radhakrishnan
325b959ea6
feat(roles): add ability to invite users into a role ( #6015 )
2022-09-23 16:48:23 -07:00
Aditya Radhakrishnan
011421dfaa
fix(frontend): fix authenticate endpoint to create new session on redirect ( #6036 )
2022-09-23 12:05:53 -07:00
Aditya Radhakrishnan
d13145e32d
fix(frontend): refactoring AuthServiceClient ( #6029 )
2022-09-22 18:26:42 -07:00
John Joyce
2d29d0b121
refactor(frontend): Addressing minor issues ( #6012 )
2022-09-21 14:21:55 -07:00
Patrick Marx
de547a9af9
fix(frontend): forward Host header as X-Forwarded-Host ( #5816 )
2022-09-09 14:13:30 -07:00
John Joyce
5974721697
fix(ui): Long overdue - Fix red error screens during OIDC login, logout exception scenarios ( #5708 )
2022-08-23 09:54:34 -07:00
neojunjie
8d4b7cf8a1
fix(PlayCookie) PLAY_TOKEN cookie rejected because userprofile exceeds 4096 chars ( #5114 )
2022-07-14 09:52:51 -07:00
Alexey Kravtsov
8dd7dfceab
fix(jaas): fix auth.jaas.enabled option parsing ( #5179 )
2022-06-16 12:07:49 -07:00
chen4119
7bf27336ef
feat(frontend): Parse JWT access token claims ( #5138 )
2022-06-13 07:12:06 -07:00