Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sync commits with original repository #2

Open
wants to merge 196 commits into
base: master
Choose a base branch
from

Conversation

soee
Copy link

@soee soee commented Jan 4, 2021

No description provided.

markuspoerschke and others added 30 commits August 13, 2020 14:59
* fix: deprecated use of non-static method

* upd: replace SaltFactory with PasswordHashFactory
…d list (#53)

Co-authored-by: Philipp Seßner <philipp.sessner@gmail.com>
Co-authored-by: Cyril Janody <cyril.janody@fsg.ulaval.ca>
* [FEATURE] Add PKCE Proof of Key for Code Exchange

enableCodeVerifier switch in extension configuration is used to enable
the PKCE flow. No further configuration is needed. Implemented
for authentication without password only.

* [FEATURE] Make redirect URI configurable

You can now configure the URI that will be called back by the
authorization server (oidcRedirectUri). If left blank the standard
callback script is used.
…rs (#64)

* [FEATURE] Login plugin: Allow to configure authorization URL parameters

Allow to add query parameters to the authorization redirect URL via
TypoScript.

* [TASK] Add authorizationUrlOptions sample
[BUGFIX] Respect usersStoragePid
[BUGFIX] Use makeInstance for creating hook objects
If the extbased version of felogin is used, this ViewHelper can be used to retrieve the link
[FEATURE] LinkViewHelper for felogin based on extbase
xperseguers and others added 30 commits May 30, 2024 17:25
[BUGFIX] Cope with missing TSFE
The underlying provider may throw arbitrary errors.
Make sure those do not propagate to Frontend.
[TASK] Catch any error that may occur during auth url generation
Instead of always generating an authentication url
for every rendering of the oidc button,
create a dedicated route, which will create
the authentication URL on demand and
redirect the user there.

Related #158
[TASK] Use dedicated route for authorization url
* Add auth service instance
* Align event class
* Add CHANGELOG entry
The frontend login process is protected against CSRF beginning with TYPO3 12.
For now we fake the request token when the GET variable tx_oidc is set.
I doubt connect action‘s redirect is still necessary. This should still be
checked.
[FEATURE] Add event to modify where-conditions for fe_users
Ignore hash validation for authentication url
if neither login nor redirect url are provided.
[BUGFIX] No hash validation for authentication url
If some weird arbitrary URLs are called
for a website, the language may not be
identified at all.

Adjust the authentication request detection
to cope with this situation.
[BUGFIX] Handle missing language request attribute
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.