Tags give the ability to mark specific points in history as being important
  • v2.0.1 protected
    Minor bug and regression fixes for v2.0.0
    
    Value formatting of OAuth2 logout URIs in the service admin interface did
    not add separating newlines. The service overview page returned 404
    (Not Found) in cases it previously did not. The behavior was changed for
    consistency with other pages.
    
  • v2.0.0 protected
    e00ea70d · Release preparations ·
    Major release removing LDAP support
    
    Added:
    
    * Service and non-service users may use the same Unix UID range
    * CLI commands for managing users, groups and roles
    * 2FA status of users is visible in admin interface
    * Database-stored service objects that group OAuth2 and API clients
      together
    
    Removed:
    
    * Support for old invite, selfservice and signup links (deprecated in
      v1.1.1)
    * ENABLE_INVITE, ENABLE_PASSWORDRESET, ENABLE_ROLESELFSERVICE config
      options
    
    Changed:
    
    * User, group and mail alias data is stored in the database instead
      of an LDAP server. Existing objects are imported. All LDAP support
      is removed.
    * Receive addresses of mail aliases are subject to alphabet
      constraints and converted to lower-case on import
    * Group names are subject to alphabet and length constraints
    * OAuth2 clients
      * Removed parameter "login_message"
      * Parameter "group_required" no longer supports AND/OR conjunctions
        of multiple groups, only a single group name
      * Clients defined with OAUTH2_CLIENTS config option moved to
        database. Existing clients are imported.
      * Service name is displayed in place of the client_id during device
        login
      * OAuth2 userinfo endpoint no longer exposes "ldap_dn"
    * API clients
      * Removed API_CLIENTS config option (deprecated in v1.2.0)
      * Clients defined with API_CLIENTS_2 config option moved to
        database. Existing clients are imported.
    * Argon2 replaces salted SHA256 for hashing user passwords. Existing
      passwords are gradually migrated on login. Argon2 has a significant
      impact on CPU and memory utilization.
    * Default UWSGI config uses multiple workers
    * Enabled foreign key support for SQLite
    * Expired objects are no longer deleted during request processing.
      Instead the CLI command "cleanup" must be run at least daily. The
      Debian package includes a cron job for this.
    * Environment variable CONFIG_PATH superseds CONFIG_FILENAME
    * The default value of config option ACL_ACCESS_GROUP changed
    
    See UPGRADE.md for detailed upgrade instructions.
    
  • v1.2.0 protected
    New API auth mechanism, deprecation of old one
    
    The old Bearer-based authentication (config key API_CLIENTS) is deprecated
    and will be removed in v2.0.0. The new auth mechanism uses config key
    API_CLIENTS_2.
    
  • v1.1.2 protected
    Minor bugfix
    
  • v1.1.1 protected
    c5b46c6c · Release v1.1.1 ·
    Security and regression fixes for v1.1.0
    
  • v1.0.2 protected
    Security fixes for v1.0.1
    
  • v1.1.0 protected
    c07193c6 · Release v1.1.0 ·
    Support for Debian Bullseye and MySQL, bug fixes and new features
    
  • v1.0.1 protected
    Security fixes for v1.0.x
    
  • v1.0.0 protected
    3abcbf20 · v1.0.0 release ·
    First stable release
    
  • v0.3.0 protected
  • v0.2.0 protected
  • v0.1.5 protected
    980ba3b2 · package uffd for apt ·
  • v0.1.4 protected
    43c09a8c · package uffd for apt ·
  • v0.1.2 protected
    05df7091 · package uffd for pip ·