diff --git a/README.md b/README.md index 474ac6702a..3732818209 100644 --- a/README.md +++ b/README.md @@ -26,6 +26,7 @@ addon | version | maintainers | summary [auth_api_key_group](auth_api_key_group/) | 18.0.1.0.0 | [![simahawk](https://github.com/simahawk.png?size=30px)](https://github.com/simahawk) | Allow grouping API keys together. Grouping per se does nothing. This feature is supposed to be used by other modules to limit access to services or records based on groups of keys. [auth_api_key_server_env](auth_api_key_server_env/) | 18.0.1.0.0 | | Configure api keys via server env. This can be very useful to avoid mixing your keys between your various environments when restoring databases. All you have to do is to add a new section to your configuration file according to the following convention: [auth_oidc](auth_oidc/) | 18.0.1.0.0 | [![sbidoul](https://github.com/sbidoul.png?size=30px)](https://github.com/sbidoul) | Allow users to login through OpenID Connect Provider +[auth_oidc_environment](auth_oidc_environment/) | 18.0.1.0.0 | | This module allows to use server env for OIDC configuration [auth_saml](auth_saml/) | 18.0.1.0.0 | [![vincent-hatakeyama](https://github.com/vincent-hatakeyama.png?size=30px)](https://github.com/vincent-hatakeyama) | SAML2 Authentication [base_user_empty_password](base_user_empty_password/) | 18.0.1.0.0 | [![grindtildeath](https://github.com/grindtildeath.png?size=30px)](https://github.com/grindtildeath) | Allows to empty password of users [base_user_show_email](base_user_show_email/) | 18.0.1.0.0 | | Untangle user login and email diff --git a/auth_oidc_environment/README.rst b/auth_oidc_environment/README.rst index fb3a8a86db..d529c37ee4 100644 --- a/auth_oidc_environment/README.rst +++ b/auth_oidc_environment/README.rst @@ -7,7 +7,7 @@ Auth Oidc Environment !! This file is generated by oca-gen-addon-readme !! !! changes will be overwritten. !! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - !! source digest: sha256:18aa5a39b1804e3212b277bcc74b32f2297dca10bf1d3192c5fd659082b81150 + !! source digest: sha256:187d3de5c2f18bdaa56b4a217732ca633e79fe8cbdcf764f3db75e2d6f47dd84 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! .. |badge1| image:: https://img.shields.io/badge/maturity-Beta-yellow.png @@ -81,8 +81,8 @@ Authors Contributors ------------ -- Adrien PEIFFER (ACSONE SA/NV) -- Raphaël Reverdy (Akretion) +- Adrien PEIFFER (ACSONE SA/NV) +- Raphaël Reverdy (Akretion) Maintainers ----------- diff --git a/auth_oidc_environment/static/description/index.html b/auth_oidc_environment/static/description/index.html index fba4c280d0..473ce3c718 100644 --- a/auth_oidc_environment/static/description/index.html +++ b/auth_oidc_environment/static/description/index.html @@ -367,7 +367,7 @@

Auth Oidc Environment

!! This file is generated by oca-gen-addon-readme !! !! changes will be overwritten. !! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -!! source digest: sha256:18aa5a39b1804e3212b277bcc74b32f2297dca10bf1d3192c5fd659082b81150 +!! source digest: sha256:187d3de5c2f18bdaa56b4a217732ca633e79fe8cbdcf764f3db75e2d6f47dd84 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -->

Beta License: AGPL-3 OCA/server-auth Translate me on Weblate Try me on Runboat

this module allows to use server env for OIDC configuration

diff --git a/setup/_metapackage/pyproject.toml b/setup/_metapackage/pyproject.toml index 43998eaf93..f110704fed 100644 --- a/setup/_metapackage/pyproject.toml +++ b/setup/_metapackage/pyproject.toml @@ -1,12 +1,13 @@ [project] name = "odoo-addons-oca-server-auth" -version = "18.0.20250115.0" +version = "18.0.20250120.0" dependencies = [ "odoo-addon-auth_admin_passkey==18.0.*", "odoo-addon-auth_api_key==18.0.*", "odoo-addon-auth_api_key_group==18.0.*", "odoo-addon-auth_api_key_server_env==18.0.*", "odoo-addon-auth_oidc==18.0.*", + "odoo-addon-auth_oidc_environment==18.0.*", "odoo-addon-auth_saml==18.0.*", "odoo-addon-base_user_empty_password==18.0.*", "odoo-addon-base_user_show_email==18.0.*",