zitadel
Team
zitadel/zitadel
Sign in / Sign up
Open main menu
zitadel/zitadel
GitHub
Overview
Runs
Analytics
Loading workspace stats
Loading workspace insights...
Statistics interval
7 days
30 days
Latest CI Pipeline Executions
Status
Fix filter
Filter
Fuzzy
Filter range
Sort by
Sort by
Start time
Sort ascending
Sort descending
Succeeded
saml-session-time
10b4d6a1 feat(relational): implement session repository (#11109) # Which Problems Are Solved As part of going to a relation storage model, we need to implement the repository for handling sessions and their events. # How the Problems Are Solved - Adds a migration step to create the necessary tables and types in the database. - Adds the repository implementation for sessions. - Implements a projection handler for session events to handle the events written by the old command handlers. - Updates the `Session` type and `SessionRepository` interface: - added `CreatorID` - Adjusted `Delete` method to return amount of affected columns - Removed sub-repository clumns from the main interface - Added `CreatorIDCondition`, `ExpirationCondition`, `ExistsFactor` and `ExistsMetadata` - Removed `SetUserAgent` - Methods of `SessionFactor` and `SessionChallenge` have been made public - fixed enumer on `SessionFactorType` - Adds a `JSON` type to the repository package to easy can JSON columns, resp. jsonb object inside a property of a `JSONArray` object. - Adds a `NoChange` interface, which can be implemented to signal that a `Change` interface implementation is not writing any changes to the statement builder, e.g. `CTEChange` # Additional Changes - Fixes the operators enums. `TextOperations` had wrong comments and `NumberOperations` additionally also had from comparisons. - Fixes downgrade of migration step 008. # Additional Context - closes https://github.com/zitadel/zitadel/issues/10212
5 days ago
by adlerhurst
a
Succeeded
saml-session-time
10b4d6a1 Merge d8677af4c2687da6134497ba230bb086bf53011f into 4e6f68c5114890326e6dfddcf6b42cd0160a457c
5 days ago
by adlerhurst
a
Succeeded
saml-session-time
5 days ago
Succeeded
saml-session-time
a51f52a5 fix(login): delete custom request headers when their value is empty (#11263) # Which Problems Are Solved The application automatically appends the x-zitadel-public-host header when a public host is configured. In some deployment scenarios where the host is determined by default or via other means, sending this header allows for improper routing or is simply redundant. The existing CUSTOM_REQUEST_HEADERS configuration only supported adding or overwriting headers, offering no way to remove headers that were set by default logic. # How the Problems Are Solved Extended the `CUSTOM_REQUEST_HEADERS` handling in `src/lib/zitadel.ts`. The logic now checks for empty header values. If a header is defined in `CUSTOM_REQUEST_HEADERS` with an empty value (e.g., x-zitadel-public-host:), the interceptor will delete that header from the request instead of setting it to an empty string. This allows users to opt-out of default headers via configuration.
6 days ago
by livio-a
l
Succeeded
saml-session-time
a51f52a5 Merge 38cb57af2ff9d58eb13ac729f9bd18b4aa834d3f into 072755f85a1fa093f8027c53a1c8e1ab5dd1b7ad
6 days ago
by livio-a
l
Succeeded
saml-session-time
6 days ago
Succeeded
saml-session-time
fdaef04d test: fix SAML idp unit tests
6 days ago
by livio-a
l
Succeeded
saml-session-time
fdaef04d Merge a144d77716c821238341fd8fd49e6efb2f61eae0 into ce85d8e8ed6a49db79fc100389e9cfc2e726a23c
6 days ago
by livio-a
l
Succeeded
saml-session-time
6 days ago
Succeeded
saml-session-time
6 days ago
Previous page
Previous
Next
Next page