Skip to content
Snippets Groups Projects
  1. Apr 24, 2023
  2. Apr 17, 2023
  3. Apr 12, 2023
  4. Apr 11, 2023
  5. Apr 10, 2023
  6. Apr 09, 2023
  7. Apr 06, 2023
  8. Apr 02, 2023
  9. Mar 31, 2023
  10. Mar 30, 2023
    • Stefan Melmuk's avatar
      always return KdfMemory and KdfParallelism · 0daaa9b1
      Stefan Melmuk authored
      the client will ignore the value of theses fields in case of `PBKDF2`
      (whether they are unset or left from trying out `Argon2id` as KDF).
      
      with `Argon2id` those fields should never be `null` but always in a
      valid state. if they are `null` (how would that even happen?) the
      client still assumes default values for `Argon2id` (i.e. m=64 and p=4)
      and if they are set to something else login will fail anyway.
      Unverified
      0daaa9b1
    • Nikolay Nikolaev's avatar
      fmt · 0c085d21
      Nikolay Nikolaev authored
      0c085d21
    • Nikolay Nikolaev's avatar
      dcaaa430
    • BlackDex's avatar
      Fix password reset issues · 2cda54ce
      BlackDex authored
      
      There was used a wrong macro to produce an error message when mailing
      the user his password was reset failed. It was using `error!()` which
      does not return an `Err` and aborts the rest of the code.
      
      This resulted in the users password still being resetted, but not being
      notified. This PR fixes this by using `err!()`. Also, do not set the
      user object as mutable until it really is needed.
      
      Second, when a user was using the new Argon2id KDF with custom values
      like memory and parallelism, that would have rendered the password
      incorrect. The endpoint which should return all the data did not
      returned all the new Argon2id values.
      
      Fixes #3388
      
      Co-authored-by: default avatarStefan Melmuk <509385+stefan0xC@users.noreply.github.com>
      Unverified
      2cda54ce
  11. Mar 27, 2023
  12. Mar 26, 2023
  13. Mar 25, 2023
  14. Mar 24, 2023
  15. Mar 23, 2023
    • BlackDex's avatar
      Add support for Quay.io and GHCR.io as registries · 467ecfdc
      BlackDex authored
      - Added support for Quay.io
      - Added support for GHCR.io
      
      To enable support for these container image registries the following needs to be added.
      
      As `Actions secrets and variables` - `Secrets`
      - `DOCKERHUB_TOKEN` and `DOCKERHUB_USERNAME`
      - `QUAY_TOKEN` and `QUAY_USERNAME`
      
      As `Actions secrets and variables` - `Variables` - `Repository Variables`
      - `DOCKERHUB_REPO`
      - `GHCR_REPO`
      - `QUAY_REPO`
      
      The `DOCKERHUB_REPO` currently configured in `Secrets` can be removed if wanted, probably best after this PR has been merged.
      
      If one of the vars/secrets are not configured it will skip that specific registry!
      Unverified
      467ecfdc
  16. Mar 22, 2023
  17. Mar 15, 2023
Loading