mirror of https://github.com/docusealco/docuseal
master
0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.1.0
1.1.1
1.1.10
1.1.11
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7
1.1.8
1.1.9
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.2.9
1.3.0
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.4.0
1.4.1
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.4.9
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8
1.5.9
1.6.0
1.6.1
1.6.2
1.6.3
1.6.4
1.6.5
1.6.6
1.6.7
1.6.8
1.6.9
1.7.0
1.7.1
1.7.2
1.7.3
1.7.4
1.7.5
1.7.6
1.7.7
1.7.8
1.7.9
1.8.0
1.8.1
1.8.2
1.8.3
1.8.4
1.8.5
1.8.6
1.8.7
1.8.8
1.8.9
1.9.0
1.9.1
1.9.10
1.9.2
1.9.3
1.9.4
1.9.5
1.9.6
1.9.7
1.9.8
1.9.9
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.0.9
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.1.8
2.2.0
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.2.8
2.2.9
2.3.0
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.4.0
2.4.1
2.4.2
2.4.3
2.4.4
2.5.0
2.5.1
2.5.2
${ noResults }
2 Commits (104684f163c48dc24d16bc051b86054ba433b8d7)
| Author | SHA1 | Message | Date |
|---|---|---|---|
|
|
104684f163 |
fix(oauth): plaintext_token in specs, allow loopback redirect, fix throttle test
Three issues surfaced running the suite in docker: - hash_token_secrets stores the access token hashed; specs must use access_token.plaintext_token (not .token) when posing as a client - Doorkeeper's Application model rejects non-HTTPS redirect_uri by default; add force_ssl_in_redirect_uri to allow loopback per OAuth 2.1 - test env uses :null_store, so Rails.cache.increment returned nil and the DCR throttle never fired — stub a real MemoryStore in that spec Also slim Dockerfile.test: drop chromium + chromium-chromedriver (unused by OAuth specs, added ~4min to the build). Add a comment pointing at the apk line to re-enable them for system specs. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com> |
2 weeks ago |
|
|
21d0b6bf3e |
feat(mcp): OAuth 2.1 authorization for the /mcp endpoint
Adds Doorkeeper-backed OAuth 2.1 (PKCE, public clients, RFC 7591 DCR) so Claude connectors can authorize against DocuSeal without a pre-shared token. The existing McpToken bearer stays as a fallback. - Mount Doorkeeper at /oauth/* plus root aliases (/authorize, /token, /register) for clients that strip paths - Serve RFC 8414 + RFC 9728 discovery at /.well-known/oauth-* - /register implements RFC 7591 DCR for public clients with an IP throttle; redirect_uri restricted to https + loopback - McpController now resolves current_user from a Doorkeeper access token first, emits the RFC 9728 WWW-Authenticate header on 401 - Weekly sweeper for abandoned DCR applications (external cron) - Link Connected apps from MCP settings Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com> |
2 weeks ago |