Sertonix
8c8df11250
cargo: Update wasm-bindgen and lettre
2026-02-24 14:17:17 +01:00
lyzstrik
6f94134fdc
refactor(server): migrate to rustls 0.23 and centralize TLS logic ( #1389 )
...
This commit upgrades the TLS stack to Rustls 0.23
Key changes:
- Dependencies: Updated 'rustls' (v0.23), 'tokio-rustls' (v0.26), and 'actix-web' (v4.12.1).
- Build Fix: Configured 'rustls' to use the 'ring' provider (disabling default 'aws-lc-rs') to ensure ARMv7 compatibility.
- Refactor: Created 'server/src/tls.rs' to handle certificate loading (DRY).
- LDAP: Updated 'ldap_server.rs' to use the new TLS module and Rustls APIs.
- Healthcheck: Updated 'healthcheck.rs' to use Rustls 0.23 types.
2026-01-31 09:47:11 +01:00
Valentin Tolmer
469f35c12c
cargo: Update dependencies
2025-12-24 15:33:30 +01:00
Kumpelinus
176c49c78d
chore: upgrade Rust toolchain to 1.89 and modernize code with let-chains
2025-09-16 00:48:16 +02:00
psentee
4590463cdf
auth: serialize exp and iat claims as NumericDate to comply with RFC7519 ( #1289 )
...
Add `jti` claim to the JWT to avoid hashing collisions
2025-09-15 17:24:59 +02:00
Valentin Tolmer
5e83ed8eb0
release: v0.6.2
2025-08-18 00:06:44 +02:00
Valentin Tolmer
74dbba0bdc
server: dependency cleanup
2025-04-09 09:30:39 +09:00
Valentin Tolmer
d38a2cd08b
server: extract graphql crate
2025-04-09 09:30:39 +09:00
Valentin Tolmer
3d61c209d2
server: small dependency cleanup
2025-04-09 09:30:39 +09:00
Valentin Tolmer
55de3ac329
server: extract the sql backend handler to a separate crate
2025-04-09 09:30:39 +09:00
Valentin Tolmer
ee21d83056
server: extract ldap operations to a crate
2025-04-09 09:30:39 +09:00
Valentin Tolmer
a49ddeaa02
server: extract opaque_handler to a separate crate
2025-04-09 09:30:39 +09:00
Valentin Tolmer
dbba4c4e26
server: extract access_control to a separate crate
2025-04-09 09:30:39 +09:00
Valentin Tolmer
ba9bcb3894
chore: Migrate all the crates to edition 2024
2025-03-30 21:32:46 -05:00
Valentin Tolmer
e18f2af54f
cargo: Migrate metadata to workspace
2025-03-30 20:56:16 -05:00
Valentin Tolmer
5afcdbda65
app, server: Add an endpoint to fetch the frontend settings
2025-03-30 20:52:39 -05:00
Valentin Tolmer
e4044b7415
dependencies: Upgrade sea-orm to 1.1.8
2025-03-30 23:00:50 +02:00
Simon Broeng Jensen
2a226963ee
auth: move Permission and ValidationResults to auth crate
2025-02-22 23:18:06 +01:00
Simon Broeng Jensen
ca1c6ff645
domain-handlers: move backend handler traits to separate crate
2025-02-21 20:41:20 +01:00
Simon Broeng Jensen
f34fa1d701
cargo,server: update ldap3_proto to version 0.6.0
2025-02-21 11:27:13 +01:00
Simon Broeng Jensen
d854ace89f
domain-model: move domain::model module to separate crate
2025-02-21 10:25:07 +01:00
Simon Broeng Jensen
37a683dcb2
validation: move validation crate to crates folder
2025-02-03 23:32:42 +01:00
Simon Broeng Jensen
b5e87c7226
auth: move auth crate to crates folder
2025-02-03 23:32:42 +01:00
Simon Broeng Jensen
1b26859141
server: move domain::types to separate domain crate ( #1086 )
...
Preparation for using basic type definitions in other upcoming
modules, in particular for plugins.
2025-02-03 23:00:27 +01:00
Simon Broeng Jensen
f5fbb31e6e
server, app: Add validation for attribute names ( #1075 )
...
This commit adds support for basic validation of attribute
names at creation, and also in the schema overview. Both
user and group attributes are validated with the same rules.
For now, attribute names will be considered valid, if they
only contain alphanumeric characters and dashes.
Validation has been added the following places:
- In graphql API, for creation of both user and group attributes.
Request will be rejected, if attribute name is invalid.
- In frontend, before submitting a request to create a new user
or group attribute. Rejection here will show an error message
including a list of the invalid characters used.
As this change adds stricter validation to attributes, and, since
the rationale for this is partly compatibility with other LDAP
systems, this change also adds a warning in the schema overviews
to any attribute using invalid characters.
2025-01-22 09:57:47 +01:00
Valentin Tolmer
8397d536d9
chore: bump version to 0.6.2-alpha
2024-11-22 22:55:53 +01:00
Valentin Tolmer
acd39d20b1
release: 0.6.1
2024-11-22 22:47:49 +01:00
Jan Düpmeier
e982908768
cargo,auth,server: update opaque-ke => 0.7
2024-11-17 13:34:01 +01:00
Valentin Tolmer
b8c06ebd75
chore: bump version to 0.6.1-alpha
2024-11-09 22:25:13 +01:00
Valentin Tolmer
098745ebc9
release: 0.6.0
2024-11-09 21:46:49 +01:00
Valentin Tolmer
65e2103365
server: Simplify the debug print of various structs
...
And use derive_more more liberally to simplify the impls
2024-09-08 00:43:58 +02:00
Valentin Tolmer
ee7f9c9f41
server: Update ldap3_proto dependency
2024-08-16 23:47:06 +02:00
Valentin Tolmer
6f905b1ca9
server: update ldap3_proto dependency
...
This will fix the issue with some unhandled controls, this time for sure
2024-01-16 17:52:15 +01:00
Valentin Tolmer
2ea17c04ba
server: Move the definition of UserId down to lldap_auth
2024-01-15 23:48:59 +01:00
Valentin Tolmer
337101edea
server: update ldap3_proto dependency
...
This will fix the issue with some unhandled controls
2024-01-08 16:10:11 +01:00
Valentin Tolmer
f2b1e73929
server: Add a check for a changing private key
...
This checks that the private key used to encode the passwords has not
changed since last successful startup, leading to a corruption of all
the passwords. Lots of common scenario are covered, with various
combinations of key in a file or from a seed, set in the config file or
in an env variable or through CLI, and so on.
2023-12-29 15:37:52 +01:00
Valentin Tolmer
8e1515c27b
version: bump to 0.5.1-alpha
2023-09-15 00:52:33 +02:00
Valentin Tolmer
6f04530700
release: 0.5.0
2023-09-14 20:36:32 +02:00
Valentin Tolmer
caf67fdf2b
server: Ensure uuid version is at least 1
2023-09-14 20:36:32 +02:00
Valentin Tolmer
08d3aef177
server: Update sea-orm, strum
2023-09-11 17:09:49 +02:00
Valentin Tolmer
134796aa9f
server: Switch tests to pretty_assertions
2023-09-10 22:29:32 +02:00
Valentin Tolmer
1598f096e9
server: Upgrade ldap3_proto
2023-09-10 22:29:32 +02:00
Valentin Tolmer
99ed6eface
server: Update tracing-forest and take advantage of the span fields
2023-09-10 22:29:32 +02:00
Valentin Tolmer
d0cdfa97c7
server: Add a message ID to sent emails
...
Fixes #608
2023-08-02 15:34:13 +02:00
Valentin Tolmer
3140af63de
server: Use schema to populate attributes
2023-06-29 11:11:20 +02:00
Valentin Tolmer
70146e0b70
server: prepare DB schema for user attributes
...
First step of #67 .
2023-06-14 23:20:37 +02:00
nitnelave
d720a7812a
cargo: set metadata for publishing crates ( #577 )
2023-05-12 18:06:06 +07:00
Austin Alvarado
4283d27da6
server: Initial stab at e2e tests ( #534 )
...
Initial end to end testing. generates unique names for user and groups, and all tests run serially
2023-04-14 11:45:15 -06:00
Valentin Tolmer
4576cf9f2c
bump: bump the version to 0.5-alpha, since we have a breaking change
2023-04-14 17:36:04 +02:00
Valentin Tolmer
da364746c4
server: Derive the server key from a seed
...
Fixes #504 .
2023-04-13 09:17:05 +02:00