- Rebased on
1.32.5
fromdani-garcia/vaultwarden
- Rebased on
1.32.4
fromdani-garcia/vaultwarden
- Rebased on
1.32.3
fromdani-garcia/vaultwarden
- Rebased on
1.32.2
fromdani-garcia/vaultwarden
- Fix result ordering when searching sso_user on login
- Rebased on
1.32.1
fromdani-garcia/vaultwarden
- Org invitation now redirect to SSO login if
SSO_ONLY=true
is set. - Upgrade oidc_web_builds version to
v2024.6.2-4
- Add
ORGANIZATION_INVITE_AUTO_ACCEPT
⚠️ Breaking change⚠️ SSO_PKCE
is now on by default, if you are running Zitadel you'll probably need to set it tofalse
since it's incompatible withCLIENT_SECRET
- On first SSO login if the provider does not return the email verification status log in will be blocked. Check the documentation for more details.
- Based on
1.32.0
fromdani-garcia/vaultwarden
- Upgrade oidc_web_builds version to
v2024.6.2-2
Org invitation was lost when creating the master password post SSO loogin.
- Rebased on
1.32.0
fromdani-garcia/vaultwarden
- Upgrade oidc_web_builds version to
v2024.6.2-1
- Removed
LOG_LEVEL_OVERRIDE
sinceLOG_LEVEL=info,vaultwarden::sso=debug
is now available
- Rebased on
1.32.0
fromdani-garcia/vaultwarden
- Upgrade oidc_web_builds version to
v2024.6.2-1
- Removed
LOG_LEVEL_OVERRIDE
sinceLOG_LEVEL=info,vaultwarden::sso=debug
is now available
- Rebased on
1.31.0
fromdani-garcia/vaultwarden
- Upgrade oidc_web_builds version to
v2024.5.1-3
- Use
WEB_VAULT_FOLDER
to switch front-end without modifying the FS
- Fix organization invitation when SMTP is disabled.
- Add
SSO_ORGANIZATIONS_ALL_COLLECTIONS
config to allow to grant or not access to all collections (defaulttrue
)
- Rebased on top dani-garcia/vaultwarden latest
main
. - Update oidc_web_builds version to
v2024.3.1-1
which introduce new layout. - Stop rolling the device token (too many issues with refresh token calls in parallel).
- Fix mysql sso_users.identifier key creation error.
- Fix lower case issue which generated invalid "your email has changed" (thx @tribut).
- Add
SSO_ORGANIZATIONS_ID_MAPPING
to map a Provider groupid
to a Vaultwarden organizationuuid
.
- Rebased on latest from dani-garcia:main
- Move docker release to timshel
- Split the
experimental
version to a separate repository.
- Fix
ForeignKeyViolation
when trying to delete sso user.
- Store SSO identifier to prevent account takeover
- Rebased on latest from
dani-garcia/vaultwarden
- Add
SSO_CLIENT_CACHE_EXPIRATION
config, to optionally cache the calls to the OpenID discovery endpoint. - Add a
scope
andiss
in the oidc redirection to try to fix the IOS login failure.
- Add
SSO_PKCE
config, disabled for now will probably be activated by defaut in next release.
- Reduce default
refresh_validity
to 7 days (reset with eachaccess_token
refresh, so act as an idle timer). Apply to non sso login and SSO which return a non JWT token with no expiration information. - Roll the already present
Device.refresh_token
which will invalidate pastrefresh_token
(SSO and non SSO login). - Remove the
openidconnect
cache since it's not recommended.
- Add
SSO_AUDIENCE_TRUSTED
config to allow to trust additionnal audience.
- Fix mysql migration
2024-02-14-170000_add_state_to_sso_nonce
- Upgrade oidc_web_builds version to
v2024.1.2-6
- Use
openidconnect
to validate Id Token claims - Remove
SSO_KEY_FILEPATH
should not be useful now - Add
SSO_DEBUG_TOKENS
to log Id/Access/Refresh token to debug - Hardcoded redircetion url
- Switch to reading the roles and groups Claims from the Id Token
- Add
SSO_AUTHORIZE_EXTRA_PARAMS
to add extra parameter to the authorize redirection (needed to obtain arefresh_token
with Google Auth).
- Fix non jwt
acess_token
check when there is norefresh_token
- Add
SSO_AUTH_ONLY_NOT_SESSION
to use SSO only for auth not the session lifecycle.
- Update oidc_web_builds version to
v2024.1.2-4
which move the org invite patch to thebutton
release (which is expected to be merged in VW). - Remove the
sso_acceptall_invites
setting - Allow to override log level for specific target
- Encode redirect url parameters and add
debug
logging.
- Keep old prevalidate endpoint for Mobile apps
- Add non jwt access_token support
- Prevalidate endpoint change in Bitwarden WebVault web-v2024.1.2
- Add support for
experimental
front-end which stop sending the Master password hash to the server - Fix the in docker images
- Switch user invitation status to
Confirmed
on when user login not before (cf #17) - Return a 404 when user has no
public_key
, will prevent confirming the user in case previous fix is insufficient.
- Ensure the token endpoint always return a
refresh_token
(cf #16)