@manyos/smileconnect-api 1.47.0 → 1.48.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/app.js +2 -1
- package/docs/configuration/config.md +54 -0
- package/docs/openapi.json +6 -2
- package/docs/releases.md +28 -0
- package/package.json +1 -1
package/app.js
CHANGED
|
@@ -50,6 +50,7 @@ const https = require('https');
|
|
|
50
50
|
const maxHTTPSockets = process.env.MAX_HTTP_SOCKETS || 10;
|
|
51
51
|
|
|
52
52
|
const SSO_CLIENTNAME_ATTRIBUTE = process.env.SSO_CLIENTNAME_ATTRIBUTE || 'azp';
|
|
53
|
+
const SSO_USERNAME_ATTRIBUTE = process.env.SSO_USERNAME_ATTRIBUTE || 'preferred_username';
|
|
53
54
|
|
|
54
55
|
http.globalAgent.maxSockets = maxHTTPSockets;
|
|
55
56
|
https.globalAgent.maxSockets = maxHTTPSockets;
|
|
@@ -157,7 +158,7 @@ passport.use(
|
|
|
157
158
|
'scope': jwt_payload.scope,
|
|
158
159
|
'exp': jwt_payload.exp,
|
|
159
160
|
'config': clientConfig,
|
|
160
|
-
'username': jwt_payload
|
|
161
|
+
'username': jwt_payload[SSO_USERNAME_ATTRIBUTE]
|
|
161
162
|
}
|
|
162
163
|
log.debug('Passport User', jwt_payload);
|
|
163
164
|
const resource_access = jwt_payload.resource_access;
|
|
@@ -86,6 +86,16 @@ Sample:
|
|
|
86
86
|
|
|
87
87
|
*SSO_CLIENTNAME_ATTRIBUTE = "preferred_username"*
|
|
88
88
|
|
|
89
|
+
### SSO_USERNAME_ATTRIBUTE
|
|
90
|
+
|
|
91
|
+
The attribute that contains the user name in the token. User name is used to identify admins. It is only needed for configuration.
|
|
92
|
+
|
|
93
|
+
Default: *preferred_username*
|
|
94
|
+
|
|
95
|
+
Sample:
|
|
96
|
+
|
|
97
|
+
*SSO_CLIENTNAME_ATTRIBUTE = "email"*
|
|
98
|
+
|
|
89
99
|
### ADMIN_USERS
|
|
90
100
|
|
|
91
101
|
List of users who are allowed to access /v1/appconfig endpoints.
|
|
@@ -267,6 +277,34 @@ Sample:
|
|
|
267
277
|
|
|
268
278
|
*SSO_ISSUER=https://sso.mydomain.io/auth/realms/itsmproxy*
|
|
269
279
|
|
|
280
|
+
### SSO_CLIENTNAME_ATTRIBUTE
|
|
281
|
+
|
|
282
|
+
The attribute that contains the client name in the token.
|
|
283
|
+
|
|
284
|
+
Default: *azp*
|
|
285
|
+
|
|
286
|
+
Set this value if you only want to use a single client in the SSO and service accounts as clients in SMILEconnect. This can be used to manage your SMILEconnect clients via a directory service like LDAP/AD. [More Info](https://datatracker.ietf.org/doc/html/rfc6749#section-1.3.3)
|
|
287
|
+
|
|
288
|
+
Sample:
|
|
289
|
+
|
|
290
|
+
*SSO_CLIENTNAME_ATTRIBUTE = "preferred_username"*
|
|
291
|
+
|
|
292
|
+
### SSO_USERNAME_ATTRIBUTE
|
|
293
|
+
|
|
294
|
+
The attribute that contains the user name in the token. User name is used to identify admins. It is only needed for configuration.
|
|
295
|
+
|
|
296
|
+
Default: *preferred_username*
|
|
297
|
+
|
|
298
|
+
Sample:
|
|
299
|
+
|
|
300
|
+
*SSO_CLIENTNAME_ATTRIBUTE = "email"*
|
|
301
|
+
|
|
302
|
+
### ADMIN_USERS
|
|
303
|
+
|
|
304
|
+
List of users who are allowed to access /v1/appconfig endpoints.
|
|
305
|
+
|
|
306
|
+
Sample:
|
|
307
|
+
ADMIN_USERS=username1, username2
|
|
270
308
|
|
|
271
309
|
## Logging
|
|
272
310
|
|
|
@@ -306,6 +344,22 @@ The URL of the OIDC Provider for user authentication
|
|
|
306
344
|
Sample:
|
|
307
345
|
*REACT_APP_SSO_URL=https://sso.mydomain.io/auth/realms/itsmproxy*
|
|
308
346
|
|
|
347
|
+
since version 1.5.2:
|
|
348
|
+
For manual OICD endpoint configuration you must provide all of the following parameters:
|
|
349
|
+
*REACT_APP_OIDC_AUTHORIZATION_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/auth*
|
|
350
|
+
*REACT_APP_OIDC_USERINFO_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/userinfo*
|
|
351
|
+
*REACT_APP_OIDC_END_SESSION_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/logout*
|
|
352
|
+
*REACT_APP_OIDC_JWKS_URI=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/certs*
|
|
353
|
+
*REACT_APP_OIDC_TOKEN_ENDPOINT=https://sso.mydomain.io/auth/realms/itsmproxy/protocol/openid-connect/token*
|
|
354
|
+
|
|
355
|
+
To allow Authorization Flow with PKCE set
|
|
356
|
+
REACT_APP_OIDC_RESPONSE_TYPE=code
|
|
357
|
+
Default value is "token id_token", which uses Implicit Flow.
|
|
358
|
+
|
|
359
|
+
Use REACT_APP_OIDC_TOKEN to choose the token to use. Default is access_token
|
|
360
|
+
|
|
361
|
+
Use REACT_APP_OIDC_SCOPE to choose the oidc scope
|
|
362
|
+
|
|
309
363
|
## GUI
|
|
310
364
|
|
|
311
365
|
### REACT_APP_GUI_URL
|
package/docs/openapi.json
CHANGED
|
@@ -4479,7 +4479,9 @@
|
|
|
4479
4479
|
"OIDC": [
|
|
4480
4480
|
]
|
|
4481
4481
|
}
|
|
4482
|
-
]
|
|
4482
|
+
],
|
|
4483
|
+
"summary": "Get a single record",
|
|
4484
|
+
"description": "Receive a single record from a custom form, identified by its id."
|
|
4483
4485
|
},
|
|
4484
4486
|
"put": {
|
|
4485
4487
|
"requestBody": {
|
|
@@ -4505,7 +4507,9 @@
|
|
|
4505
4507
|
"OIDC": [
|
|
4506
4508
|
]
|
|
4507
4509
|
}
|
|
4508
|
-
]
|
|
4510
|
+
],
|
|
4511
|
+
"summary": "Update a record",
|
|
4512
|
+
"description": "Update a single record on a custom form, identified by its id."
|
|
4509
4513
|
},
|
|
4510
4514
|
"parameters": [
|
|
4511
4515
|
{
|
package/docs/releases.md
CHANGED
|
@@ -2,8 +2,12 @@
|
|
|
2
2
|
|
|
3
3
|
## API
|
|
4
4
|
|
|
5
|
+
### 1.48.0 - 03.11.21
|
|
6
|
+
Add parameter SSO_USERNAME_ATTRIBUTE to config.
|
|
7
|
+
|
|
5
8
|
### 1.47.0 - 22.10.21
|
|
6
9
|
Add xmlParser to scripts.
|
|
10
|
+
|
|
7
11
|
See https://www.npmjs.com/package/fast-xml-parser
|
|
8
12
|
|
|
9
13
|
Add customForms
|
|
@@ -13,6 +17,7 @@ Fix known issue: Check for activation Task Phase and activate if reached
|
|
|
13
17
|
|
|
14
18
|
### 1.46.3 - 18.10.21
|
|
15
19
|
Fix issue: Task not activated when phase already active
|
|
20
|
+
|
|
16
21
|
Known issues: Tasks might get activated early
|
|
17
22
|
|
|
18
23
|
### 1.46.2 - 14.10.21
|
|
@@ -47,7 +52,9 @@ Allow also "isPublic": "true" instead of "isPublic": true for Ticket Worklogs
|
|
|
47
52
|
|
|
48
53
|
### 1.43.0 - 20.09.21
|
|
49
54
|
Allow bypassCache option in Remedy Adapter
|
|
55
|
+
|
|
50
56
|
Add support for Task Phasing
|
|
57
|
+
|
|
51
58
|
Regenrate Task Flow on Task Update
|
|
52
59
|
|
|
53
60
|
### 1.42.1 - 09.09.21
|
|
@@ -59,7 +66,9 @@ Add IDs to POST Actions for After Execution Scripts
|
|
|
59
66
|
### 1.41.4 - 10.08.21
|
|
60
67
|
|
|
61
68
|
Fix mapping for Ticket Worklogs
|
|
69
|
+
|
|
62
70
|
Fix mapping for Task Worklogs
|
|
71
|
+
|
|
63
72
|
Fix issue with sort in Remedy Adapter
|
|
64
73
|
|
|
65
74
|
### 1.41.0 - 03.08.21
|
|
@@ -78,6 +87,9 @@ e.g.
|
|
|
78
87
|
|
|
79
88
|
## Event Manager
|
|
80
89
|
|
|
90
|
+
### 1.18.0 - 03.11.21
|
|
91
|
+
Add parameter SSO_USERNAME_ATTRIBUTE to config.
|
|
92
|
+
|
|
81
93
|
### 1.17.1 - 01.10.21
|
|
82
94
|
Fix issue: TicketNumber3 added to Event Data
|
|
83
95
|
|
|
@@ -94,6 +106,22 @@ Update Record added to [Remedy Adapter](adapter#remedy).
|
|
|
94
106
|
The eventmanager will check all outbound webhooks for an event. If one fails, the whole Event will be set to error and the details will be added to the error message.
|
|
95
107
|
|
|
96
108
|
## GUI
|
|
109
|
+
### 1.5.5 - 03.11.21
|
|
110
|
+
Add Parameter REACT_APP_OIDC_SCOPE to choose the oicd scope
|
|
111
|
+
|
|
112
|
+
### 1.5.4 - 03.11.21
|
|
113
|
+
Add Parameter REACT_APP_OIDC_TOKEN to choose the token to use (access_token/id_token)
|
|
114
|
+
|
|
115
|
+
### 1.5.3 - 03.11.21
|
|
116
|
+
Allow Authorization Flow with PKCE. Added Parameter: REACT_APP_OIDC_RESPONSE_TYPE.
|
|
117
|
+
Default value is "token id_token". To use Authorization Flow with PKCE you need to set "REACT_APP_OIDC_RESPONSE_TYPE=code"
|
|
118
|
+
|
|
119
|
+
### 1.5.2 - 03.11.21
|
|
120
|
+
Fix: OIDC Endpoints URL are wrong for some OIDC Providers. Also added parameters for manual endpoint configuration
|
|
121
|
+
|
|
122
|
+
### 1.5.1 - 22.10.21
|
|
123
|
+
Custom Forms added
|
|
124
|
+
|
|
97
125
|
|
|
98
126
|
### 1.4.18 - 11.08.21
|
|
99
127
|
hovering on fields in mappingtable, destroys values in "new" mapping, in some situations
|