Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: zitadel/zitadel
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v2.71.1
Choose a base ref
...
head repository: zitadel/zitadel
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v2.71.2
Choose a head ref
  • 4 commits
  • 18 files changed
  • 3 contributors

Commits on Mar 12, 2025

  1. fix(login): passkey setup when pressing "Enter" key on login form (#9485

    )
    
    # Which Problems Are Solved
    
    When registering passkeys or u2f methods as second factor, some users
    pressed the "Enter" key, rather than clicking the submit button. This
    method has bypassed the execution of the device registration and
    encoding scripts, resulting in the form being submitted without the
    necessary encoded values.
    
    # How the Problems Are Solved
    
    This PR ensures that device registration is always executed and the
    required information are submitted in the form regardless of pressing
    "Enter" or clicking the button.
    
    # Additional Changes
    
    None
    
    # Additional Context
    
    - closes #6592
    - closes #2910
    
    (cherry picked from commit 27b319b)
    peintnermax authored and livio-a committed Mar 12, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    6256908 View commit details
  2. fix(token exchange): properly return an error if membership is missing (

    #9468)
    
    # Which Problems Are Solved
    
    When requesting a JWT (`urn:ietf:params:oauth:token-type:jwt`) to be
    returned in a Token Exchange request, ZITADEL would panic if the `actor`
    was not granted the necessary permission.
    
    # How the Problems Are Solved
    
    Properly check the error and return it.
    
    # Additional Changes
    
    None
    
    # Additional Context
    
    - closes #9436
    
    (cherry picked from commit e6ce1af)
    livio-a committed Mar 12, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    5ad33e7 View commit details
  3. fix(OIDC): back channel logout work for custom UI (#9487)

    # Which Problems Are Solved
    
    When using a custom / new login UI and an OIDC application with
    registered BackChannelLogoutUI, no logout requests were sent to the URI
    when the user signed out.
    Additionally, as described in #9427, an error was logged:
    `level=error msg="event of type *session.TerminateEvent doesn't
    implement OriginEvent"
    caller="/home/runner/work/zitadel/zitadel/internal/notification/handlers/origin.go:24"`
    
    # How the Problems Are Solved
    
    - Properly pass `TriggerOrigin` information to session.TerminateEvent
    creation and implement `OriginEvent` interface.
    - Implemented `RegisterLogout` in `CreateOIDCSessionFromAuthRequest` and
    `CreateOIDCSessionFromDeviceAuth`, both used when interacting with the
    OIDC v2 API.
    - Both functions now receive the `BackChannelLogoutURI` of the client
    from the OIDC layer.
    
    # Additional Changes
    
    None
    
    # Additional Context
    
    - closes #9427
    
    (cherry picked from commit ed697bb)
    livio-a committed Mar 12, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    a47f4a3 View commit details
  4. fix(eventstore): optimise query hints for event filters (#9497)

    (cherry picked from commit b578137)
    adlerhurst authored and livio-a committed Mar 12, 2025

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    e770569 View commit details
Loading