summaryrefslogtreecommitdiff
path: root/lib/web/auth (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-11-27Fix typoCloudYu2-4/+4
Signed-off-by: CloudYu <cloudyu322@gmail.com>
2018-11-14InternalOAuthError is not part of passport, but of passport-oauth2Claudius Coenen1-4/+4
This fixes part of #1056: an error while obtaining the profile would have `502`-crashed the server. Signed-off-by: Claudius Coenen <opensource@amenthes.de>
2018-10-05Add OpenID to CodiMDSheogorath2-0/+62
With OpenID every OpenID capable provider can provide authentication for users of a CodiMD instance. This means we have federated authentication. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
2018-06-30Update passport-ldapSheogorath1-1/+1
Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
2018-04-27Fix typo of "grouptAttribute" in saml auth moduleMax Wu1-2/+2
Signed-off-by: Max Wu <jackymaxj@gmail.com>
2018-03-26Add support for generic OAuth2 providersPedro Ferreira2-0/+107
Signed-off-by: Pedro Ferreira <pedro.ferreira@cern.ch>
2018-03-25Change config to camel case with backwards compatibilitySheogorath11-35/+35
This refactors the configs a bit to now use camel case everywhere. This change should help to clean up the config interface and make it better understandable. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
2018-03-18Add check for undefined UUIDSheogorath1-1/+8
This check is needed at there are tons of LDAP implementations out there and none has at least one guaranteed unique field. As we currently check three fields and added an option to select one yourself, it's still not said that any of these fields is set. This will now create an error and fail the authentication instead of letting people may get access to other people's notes which are stored under a this way deterministic wrong userid named `LDAP-undefined`. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
2018-03-09Multiple emails from LDAP are already an ArrayFelix Schäfer1-1/+1
Signed-off-by: Felix Schäfer <felix@thegcat.net>
2018-03-01Introduce ldap.useridFieldDustin Frisch1-1/+4
Signed-off-by: Dustin Frisch <fooker@lab.sh>
2018-01-30Fix uncaught exception for non-existent userSheogorath1-0/+5
Since we added user management it's possible to get non-existent users which can cause a crash of the Backend server. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
2017-12-09Add setting `ldap.usernameField`Lukas Kalbertodt1-1/+7
This determines which ldap field is used as the username on HackMD. By default, the "id" is used as username, too. The id is taken from the fields `uidNumber`, `uid` or `sAMAccountName`. To give the user more flexibility, they can now choose the field used for the username instead.
2017-12-04added guide for SAML settingsNorihito Nakae1-1/+0
2017-11-29fixed the SAML callback URL to unconfigurable.Norihito Nakae1-1/+1
2017-11-28Initial support for SAML authenticationNorihito Nakae2-0/+97
2017-10-31Add mattermost authenticationChristoph Witzany2-0/+50
2017-10-12Fix LDAP problem about missing uidNumberSheogorath1-2/+3
Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
2017-09-04Give google the correct name.Kaiyu Shi1-3/+3
2017-05-17fix: export to gist occurred 404 not foundMax Wu1-0/+4
2017-05-08refactor(config.js): Extract config fileBoHong Li1-8/+8
* Separate different config source to each files * Freeze config object
2017-05-08refactor(auth.js): Remove base pathBoHong Li1-8/+8
2017-05-08refactor(app.js): Move passport serialize and deserialize to auth moduleBoHong Li1-0/+22
2017-05-08refactor(app.js, auth.js): Extract all auth method to individual modulesBoHong Li10-0/+405