summaryrefslogtreecommitdiff
path: root/config.json.example (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Merge pull request #598 from xxyy/feature/cspChristoph (Sheogorath) Kern2018-01-221-3/+10
|\ | | | | Implement basic CSP support
| * Move CSP logic to new file, Fix boolean config examplesLiterallie2017-10-221-5/+5
| | | | | | | | Not sure why I was quoting these in the first place
| * Change CSP config format to be more intuitiveLiterallie2017-10-221-0/+7
| |
* | Fix config.json.example format errorXiaodong Xu2018-01-091-1/+1
| |
* | Merge branch 'master' into ldap-username-fieldChristoph (Sheogorath) Kern2017-12-121-1/+1
|\ \
| * | parse HMD_LDAP_SEARCHATTRIBUTES env var as a comma-separated arrayalecdwm2017-12-091-1/+1
| | | | | | | | | | | | Signed-off-by: Alec WM <firstcontact@owls.io>
* | | Add setting `ldap.usernameField`Lukas Kalbertodt2017-12-091-0/+1
|/ / | | | | | | | | | | | | | | This determines which ldap field is used as the username on HackMD. By default, the "id" is used as username, too. The id is taken from the fields `uidNumber`, `uid` or `sAMAccountName`. To give the user more flexibility, they can now choose the field used for the username instead.
* | added guide for SAML settingsNorihito Nakae2017-12-041-1/+0
| |
* | fixed the SAML callback URL to unconfigurable.Norihito Nakae2017-11-291-1/+0
| |
* | Initial support for SAML authenticationNorihito Nakae2017-11-281-0/+16
| |
* | added auth docs and images for GitHub and TwitterDevon Jue2017-11-081-1/+7
| |
* | Add mattermost authenticationChristoph Witzany2017-10-311-0/+5
|/
* Make HSTS behaviour configurable; Fixes #584Literallie2017-10-131-0/+9
|
* Add config option for gitlab api scope and auto adapt gitlab snippet feature ↵Wu Cheng-Han2017-03-141-1/+2
| | | | on it
* Change database config development to sqlite, test to memorybananaappletw2017-02-041-8/+3
|
* Merge branch 'frontend-next' into t216-refactor-commonYukai Huang2017-01-151-0/+12
|\
| * Merge pull request #279 from alecdwm/ldap-authMax Wu2017-01-091-0/+12
| |\ | | | | | | Support for LDAP server authentication
| | * Initial support for LDAP server authenticationalecdwm2016-12-131-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Limitations as of this commit: - tlsOptions can only be specified in config.json, not as env vars - authentication failures are not yet gracefully handled by the UI - instead the error message is shown on a blank page (/auth/ldap) - no email address is associated with the LDAP user's account - no picture/profile URL is associated with the LDAP user's account - we might have to generate our own access + refresh tokens, because we aren't using oauth. The currently generated tokens are just a placeholder. - 'LDAP Sign in' needs to be translated to each locale
* | | Add google apiKey & dropbox appKey to config.jsonYukai Huang2017-01-141-2/+4
|/ /
* | Fix config mistakebananaappletw2016-12-241-2/+4
| |
* | Add sqlite for test environmentbananaappletw2016-12-221-0/+4
|/
* Create example configYukai Huang2016-10-051-0/+52