Commit graph

20 commits

Author SHA1 Message Date
Iha Shin (신의하)
0d354066b6
feat: allow customizing oidc scope per integration (#7441)
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Co-authored-by: Laurin Quast <laurinquast@googlemail.com>
2025-12-22 19:57:07 +09:00
Laurin Quast
717b5aa6e8
feat: email invite and default oidc resources assignments (#7252)
Co-authored-by: jdolle <1841898+jdolle@users.noreply.github.com>
2025-11-13 11:55:10 +01:00
Dotan Simha
8aea66bcbd
Revert "OIDC default resource assignments" (#7159) 2025-10-23 17:57:34 +03:00
jdolle
29fefc6eeb
OIDC default resource assignments (#7135) 2025-10-23 17:53:57 +03:00
Laurin Quast
aab6e7c2cf
feat: user management public api (#6722)
Co-authored-by: jdolle <1841898+jdolle@users.noreply.github.com>
2025-05-16 09:19:59 +02:00
Laurin Quast
799eb03df9
feat(api): refactor Query.organization + expose via public API (#6653) 2025-03-25 15:20:37 +01:00
Laurin Quast
2623356e49
fix: members page with member:modify (#6561) 2025-02-28 10:33:41 +08:00
Laurin Quast
ff60d049d6
feat(api): new permission system (#5674) 2024-11-05 10:36:10 +01:00
Kamil Kisiela
7edd150e63
Deprecate cleanId, use slug instead (#5684) 2024-10-21 13:06:29 +02:00
Kamil Kisiela
ac7e01c730
Allow to limit organization access to OIDC accounts only (#5235) 2024-07-17 09:35:34 +00:00
Dotan Simha
1ca63a758b
run integration tests locally against local running services (#5096) 2024-07-15 11:21:23 +00:00
Kamil Kisiela
79c0b4139e
Enable graphql-jit for GraphQL requests made by @hive/app (#3254) 2023-11-03 12:48:07 +01:00
Laurin Quast
1e2ab08f95
replace tag-operations with client preset (#1441) 2023-02-24 15:39:44 +01:00
Dimitri POSTOLOV
de7ba835e4
migrate to vitest (#921)
Co-authored-by: Kamil Kisiela <kamil.kisiela@gmail.com>
2023-02-10 11:11:23 +01:00
Laurin Quast
a9087915d8
chore: move integration-tests to use the client preset (#1180) 2023-01-30 11:09:44 +01:00
Dimitri POSTOLOV
bd5496ebff
[🔧 ESLint] several different rules fixes (#737) 2022-12-28 21:38:03 +01:00
Dotan Simha
34b80e9492
Drop dockest, refactor integration testkit, and run all integration tests in parallel (#883)
Co-authored-by: Kamil Kisiela <kamil.kisiela@gmail.com>
2022-12-28 10:37:23 +01:00
Laurin Quast
72b036a308
feat: more granular configuration of OIDC endpoints (#835) 2022-12-20 13:18:05 +01:00
renovate[bot]
1afe0ec73a
Update dependency @theguild/prettier-config to v1 (#676)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Kamil Kisiela <kamil.kisiela@gmail.com>
2022-11-24 10:00:41 +00:00
Laurin Quast
991c82693b
feat: OIDC organisation integration (#524)
* feat: support login via okta

* add deployment config

* feat: automatically start okta login when visiting /auth with okta provider query parameter

* remove trailing slash from base url

* laurin pls

* ...

* adjust deployment url

* we dont need this

* docs: document how to enabled Google and GitHub social login (#511)

* docs: document how to enabled Google and GitHub social login

* Apply suggestions from code review

* Apply suggestions from code review

* docs: add Okta instructions

* fix typo

* add database migration

* feat: env decoding

* auto generate id

* add generates types for the postgres table

* implement crud graphql fields for the oidc integration entites

* add unique constraint for the oidc domain column

* use correct sql query for updating an oidc integration

* return organization from deleteOIDCIntegration ok result

* add crud forms to the settings page

* update integration test fixture value

* drop unique constraint for oidc_integrations.domain as this would allow a malicous user to block another account from using a domain

* move notice to isolated component

* apply url normalization in a central place

* implement supertokens provider and overrides for dynamic oidc provider integrations

* relocate code to correct files

* prettify oidc crud forms

* replace Query.isOIDCIntegrationFeatureEnabled with the Organization.viewerCanManageOIDCIntegration field

* do not show oidc integrations for personal organizations + disable crud endpoints if the feature is disabled

* load oidc integration for the supertokens flow via trpc from the server

* prepare encryption secret within constructor

* add user to organization upon oidc login

* login via oidc does not create a personal organization

* redirect oidc user to oidc organization

* disallow oidc users to create an organization

* disallow oidc accounts joining another organization

* add test for updating an oidc integration

* enhance ui

* add documentation for OIDC SSO

* add more tests

* import Callout component

* update snapshots

* rename field User.isLinkedToOIDCIntegration to User.canSwitchOrganization to be more decriptive

* add traling new line

* gracefully handle unique constraint

* upgrade supertokens-auth-react and adjust the code in order to remove the global preApiHook

* sync image versions with tests

* remove obsolete comment

* rename database column

* bruv

* add test for oidc user deletion
2022-11-03 16:45:17 +01:00