Commit Graph

30 Commits

Author SHA1 Message Date
Maksim Eltyshev
d792e4064b fix: Handle markdown-to-text errors gracefully 2025-08-30 17:28:23 +02:00
Maksim Eltyshev
4c5c7799f2 ref: Little refactoring 2025-08-30 17:09:17 +02:00
Maksim Eltyshev
6515877eb6 fix: Improve mentions behavior 2025-08-11 13:52:17 +02:00
Maksim Eltyshev
63de346b0e ref: Little refactoring 2025-06-06 12:34:09 +02:00
Roman Zavarnitsyn
c0b0436851 feat: Add ability to mention users in comments (#1162) 2025-05-30 22:01:29 +02:00
Maksim Eltyshev
2ee1166747 feat: Version 2
Closes #627, closes #1047
2025-05-10 02:09:06 +02:00
Maksim Eltyshev
3eb488ce61 fix: Format-agnostic time parsing
Closes #916
2024-10-21 14:11:26 +02:00
Maksim Eltyshev
309c2ed762 feat: Ability to upload multiple attachments at once
Closes #908
2024-10-09 12:38:18 +02:00
HannesOberreiter
c0b694039e fix: Focus end of field when editing (#779) 2024-06-06 20:06:16 +02:00
Yu Inoue
db9e877506 fix: Display year when date is outside of current year (#567) 2023-12-20 12:26:01 +01:00
Maksim Eltyshev
22aa3c4adf chore: Update dependencies 2023-11-17 14:34:10 +01:00
Lorenz Brun
9011ee61da feat: Improve OIDC SSO (#524)
The OIDC implementation merged in https://github.com/plankanban/planka/pull/491 is flawed for multiple reasons.

It assumes that the access_token returned by the IDP has to be a JWT parseable by the RP which is not the case [1].
Many major IDPs do issue tokens which are not JWTs and RPs should not rely on the contents of these at all.
The only signed token which has a standardized format for direct RP consumption is the OIDC ID token (id_token), but this by default doesn't contain many claims, especially role claims are omitted from them by default for size reasons. To get these additional claims into the ID token, one needs an IDP with support for the "claims" parameter.

It requires manual specification of the JWKS URL which is mandatory in any OIDC discovery document and thus never needs to be manually specified.

It also makes the questionable decision to use a client-side code flow with PKCE where a normal code flow would be much more appropriate as all user data is processed in the backend which can securely hold a client secret (confidential client). This has far wider IDP support, is safer (due to direct involvement of the IDP in obtaining user information) and doesn't require working with ID tokens and claim parameters.

By using a server-side code flow we can also offload most complexity to the server alone, no longer requiring an additional OIDC library on the web client.

Also silent logout doesn't work on most IDPs for security reasons, one needs to actually redirect the user over to the IDP, which then prompts them once more if they actually want to log out.

This implementation should work with any OIDC-compliant IDP and even OAuth 2.0-only IDPs as long as they serve and OIDC discovery document.

[1] rfc-editor.org/rfc/rfc6749#section-5.1
2023-10-19 17:39:21 +05:00
Maksim Eltyshev
b9716c6e3a fix: OIDC finalization and refactoring 2023-10-17 19:18:19 +02:00
Maksim Eltyshev
22ec8707ac fix: Rename timer to stopwatch
Closes #392
2023-02-27 19:09:51 +01:00
Maksim Eltyshev
fa8afd7b6e chore: Update dependencies 2022-11-21 00:54:05 +01:00
Maksim Eltyshev
d0283aa89c fix: Use password strength estimator
Closes #294
2022-09-03 22:47:06 +05:00
Maksim Eltyshev
79e5f7f6f3 fix: Fix password length validation 2022-08-30 15:13:17 +02:00
Maksim Eltyshev
799f34ab68 feat: Stronger password policy 2022-08-26 18:59:44 +02:00
SimonTagne
2b4c2b0f49 feat: Improve security of access tokens (#279)
Closes #275
2022-08-09 21:03:21 +05:00
Maksim Eltyshev
3f8216dca8 ref: Refactoring 2022-08-04 13:31:14 +02:00
Maksim Eltyshev
7ef55ec578 feat: Store accessToken in cookies instead of localStorage 2022-04-26 18:01:55 +05:00
Maksim Eltyshev
fe91b5241e Project managers, board members, auto-update after reconnection, refactoring 2021-06-24 01:05:22 +05:00
Maksim Eltyshev
253bdcda7a Allow dots in username. Closes #116 2021-04-13 18:59:02 +05:00
Maksim Eltyshev
16acd1b49c Add test libs, update dependencies 2020-08-20 15:35:46 +05:00
Maksim Eltyshev
ce1e1f741d Add username to user 2020-04-03 00:35:25 +05:00
Maksim Eltyshev
de61d94a98 Update dependencies 2020-03-25 00:15:47 +05:00
Maksim Eltyshev
45bde7e7c0 Move from prettier-eslint to eslint-plugin-prettier, update dependencies 2020-02-03 18:42:31 +05:00
Maksim Eltyshev
3848cc194a Change id generation algorithm, display notifications total on the main page 2019-10-10 14:51:59 +05:00
Maksim Eltyshev
2398199740 Mute socket messages in production, fix max-len, update dependencies 2019-09-25 02:26:31 +05:00
Maksim Eltyshev
36fe34e8e1 Initial commit 2019-08-31 04:07:25 +05:00