summaryrefslogtreecommitdiff
path: root/README.md (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Update README.mdMax Wu2018-01-181-1/+1
| | | To show "Community Edition" on title.
* [ci skip] Add CodeTriage badgeschneems2018-01-031-1/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | [CodeTriage](https://www.codetriage.com/) is an app I have maintained for the past 4-5 years with the goal of getting people involved in Open Source projects like this one. The app sends subscribers a random open issue for them to help "triage". For some languages you can also suggested areas to add documentation. The initial approach was inspired by seeing the work of the small core team spending countless hours asking "what version was this in" and "can you give us an example app". The idea is to outsource these small interactions to a huge team of volunteers and let the core team focus on their work. I want to add a badge to the README of this project. The idea is to provide an easy link for people to get started contributing to this project. A badge indicates the number of people currently subscribed to help the repo. The color is based off of open issues in the project. Here are some examples of other projects that have a badge in their README: - https://github.com/crystal-lang/crystal - https://github.com/rails/rails - https://github.com/codetriage/codetriage Thanks for building open source software, I would love to help you find some helpers.
* Merge branch 'master' into ldap-username-fieldChristoph (Sheogorath) Kern2017-12-121-2/+2
|\
| * parse HMD_LDAP_SEARCHATTRIBUTES env var as a comma-separated arrayalecdwm2017-12-091-1/+1
| | | | | | | | Signed-off-by: Alec WM <firstcontact@owls.io>
| * Update README.mdChristoph (Sheogorath) Kern2017-12-091-1/+1
| |
* | Add setting `ldap.usernameField`Lukas Kalbertodt2017-12-091-0/+1
|/ | | | | | | | This determines which ldap field is used as the username on HackMD. By default, the "id" is used as username, too. The id is taken from the fields `uidNumber`, `uid` or `sAMAccountName`. To give the user more flexibility, they can now choose the field used for the username instead.
* added guide for SAML settingsNorihito Nakae2017-12-041-2/+1
|
* added environment variables for SAMLNorihito Nakae2017-11-291-0/+10
|
* Initial support for SAML authenticationNorihito Nakae2017-11-281-1/+3
|
* added auth docs and images for GitHub and TwitterDevon Jue2017-11-081-1/+1
|
* [README] Add icons to browser version support listPeter Dave Hello2017-10-311-5/+5
|
* Merge pull request #606 from DoubleMalt/feature/MattermostAuthSheogorath2017-10-311-9/+13
|\ | | | | Add Mattermost authentication strategy
| * Add mattermost authenticationChristoph Witzany2017-10-311-9/+13
| |
* | Extend docker sectionSheogorath2017-10-301-3/+18
|/
* Merge pull request #574 from PeterDaveHello/README.md-Table-of-ContentsSheogorath2017-10-271-59/+83
|\ | | | | Add "Table of Contents" in README.md
| * Integrate npm package "doctoc" to update README.mdPeter Dave Hello2017-10-131-0/+4
| |
| * Add "Table of Contents" in README.mdPeter Dave Hello2017-10-131-0/+21
| |
| * Reorganize README.md structure, cc #574Peter Dave Hello2017-10-131-59/+58
| |
* | Adds HMD_ALLOW_PDF_EXPORT to readmegeekyd2017-10-251-1/+2
| |
* | Fix a typo in README.mdFelix Yan2017-10-171-1/+1
| |
* | Add env vars for extra HSTS optionsLiterallie2017-10-131-0/+3
| |
* | Add on/off env var for HSTSLiterallie2017-10-131-0/+1
| |
* | Make HSTS behaviour configurable; Fixes #584Literallie2017-10-131-0/+1
|/
* Add version badge in README.mdPeter Dave Hello2017-10-101-0/+3
|
* Correct documentation of S3 bucketJohannes Weißl2017-09-231-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Documentation added in aaf034b on Nov 17th 2016 says the S3 bucket can be specified with `s3.bucket`, but commit c8bcc4c (#285) on Dec 18th 2016 used `s3bucket`. Instead of fixing the code (#552) to match the documentation this commit changes just the documentation so that existing configurations are not broken. Also, the `s3` object is passed as is to `AWS.S3()`, which does not know the option `bucket` (but silently ignores it in my test). http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/S3.html#constructor-property Following the old documentation leads to this exception: 2017-09-23T09:42:38.079Z - error: MissingRequiredParameter: Missing required key 'Bucket' in params at ParamValidator.fail (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/param_validator.js:50:37) at ParamValidator.validateStructure (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/param_validator.js:61:14) at ParamValidator.validateMember (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/param_validator.js:88:21) at ParamValidator.validate (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/param_validator.js:34:10) at Request.VALIDATE_PARAMETERS (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/event_listeners.js:125:42) at Request.callListeners (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/sequential_executor.js:105:20) at callNextListener (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/sequential_executor.js:95:12) at /srv/hackmd/hackmd/node_modules/aws-sdk/lib/event_listeners.js:85:9 at finish (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/config.js:315:7) at /srv/hackmd/hackmd/node_modules/aws-sdk/lib/config.js:333:9 at Credentials.get (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/credentials.js:126:7) at getAsyncCredentials (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/config.js:327:24) at Config.getCredentials (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/config.js:347:9) at Request.VALIDATE_CREDENTIALS (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/event_listeners.js:80:26) at Request.callListeners (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/sequential_executor.js:101:18) at Request.emit (/srv/hackmd/hackmd/node_modules/aws-sdk/lib/sequential_executor.js:77:10)
* Add defaultpermission protected example valueWonder Chang2017-03-251-1/+1
|
* Fix badges and links in README.mdMax Wu2017-03-141-1/+4
|
* Add config option for gitlab api scope and auto adapt gitlab snippet feature ↵Wu Cheng-Han2017-03-141-0/+1
| | | | on it
* Add JavaScript Standard Style badge in READMEBoHong Li2017-03-131-0/+2
| | | | add badge to let people know that code is using the standard style
* Test up to 7.5.0bananaappletw2017-02-151-1/+1
|
* Add travis cibananaappletw2017-02-151-2/+8
|
* simplified descriptionNV2017-02-101-2/+2
|
* Update READMENV2017-02-091-0/+2
|
* Merge pull request #343 from sakajunquality/feature/fix-read-me-for-gccMax Wu2017-02-081-1/+1
|\ | | | | Add additional comment about Prerequisite to README
| * add reference to packages, instead of writing down solutions for specific osJun SAKATA2017-02-081-3/+1
| |
| * add sudoJun SAKATA2017-02-061-1/+1
| |
| * Add additional comment about Prerequisite to READMEJun SAKATA2017-02-061-0/+2
| |
* | Fix HMD_LDAP_TLS_CA not passing correctly and update README.mdWu Cheng-Han2017-02-071-6/+6
|/
* Merge branch 't216-refactor-common' into 'frontend-next' Yukai Huang2017-01-151-13/+3
|\ | | | | | | | | T216 refactor common See merge request !5
| * Merge branch 'frontend-next' into t216-refactor-commonYukai Huang2017-01-151-3/+14
| |\
| * | Update READMEYukai Huang2017-01-141-13/+3
| | |
* | | Update README.md for npm scriptbananaappletw2017-01-141-1/+1
| |/ |/|
* | Merge branch 'master' into frontend-nextYukai Huang2017-01-131-3/+14
|\ \ | |/ |/|
| * Update README.md to describe allowemailregister config more clearWu Cheng-Han2017-01-131-2/+2
| |
| * Add `allowemailregister` optionSheogorath2017-01-121-2/+4
| |
| * Allow displaying LDAP provider name on sign-in modalneopostmodern2017-01-091-0/+1
| |
| * Merge pull request #279 from alecdwm/ldap-authMax Wu2017-01-091-1/+9
| |\ | | | | | | Support for LDAP server authentication
| | * Added HMD_LDAP_TLS_CA env variablealecdwm2016-12-141-0/+1
| | |
| | * Initial support for LDAP server authenticationalecdwm2016-12-131-1/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Limitations as of this commit: - tlsOptions can only be specified in config.json, not as env vars - authentication failures are not yet gracefully handled by the UI - instead the error message is shown on a blank page (/auth/ldap) - no email address is associated with the LDAP user's account - no picture/profile URL is associated with the LDAP user's account - we might have to generate our own access + refresh tokens, because we aren't using oauth. The currently generated tokens are just a placeholder. - 'LDAP Sign in' needs to be translated to each locale
* | | Revert "Rename npm script"bananaappletw2017-01-041-1/+1
|/ / | | | | | | This reverts commit ed83dfc862768572eab0c2aed629b1700ac9e224.