Releases: CGI-FR/IoT-Hub-Portal
v2.8.0-rc0
What's Changed
Breaking changes
N/A
New Features
- Feature/907 alway send confirmed property on command by @hocinehacherouf in #1037
- Add Cache Control when uploading devices models images by @hocinehacherouf in #1044
- Feature/1018 update unit test project layout by @hocinehacherouf in #1042
- Add ci job to deploy docs with new version on release #1067 by @hocinehacherouf in #1068
- Merge Hotfix from 2.7.1 by @kbeaugrand in #1065
- Add deploy docs with stable version on release and update broken urls in README by @hocinehacherouf in #1074
Bug fixes
- Fix #811 - Add available frequency plans from API and remove hardcode… by @kbeaugrand in #1038
- Fix #1060 - use npm ci during CI phase only by @kbeaugrand in #1061
- Clean node packages in the solution by @kbeaugrand in #1070
- Fix/loading authentication service by @kbeaugrand in #1076
Minor Changes
- Fix #969 - Refactor LoRa Device model and LoRaDevice classes by @kbeaugrand in #1056
- Bump FluentValidation from 11.1.0 to 11.1.1 in /src by @dependabot in #1041
- Bump Hellang.Middleware.ProblemDetails from 6.4.2 to 6.5.0 in /src by @dependabot in #1047
- Bump Microsoft.AspNetCore.Components.WebAssembly.Authentication from 6.0.7 to 6.0.8 in /src by @dependabot in #1052
- Bump FluentValidation from 11.1.1 to 11.2.0 in /src by @dependabot in #1051
- Bump Microsoft.AspNetCore.Components.WebAssembly.Server from 6.0.7 to 6.0.8 in /src by @dependabot in #1053
- Bump Microsoft.AspNetCore.Authentication.OpenIdConnect from 6.0.7 to 6.0.8 in /src by @dependabot in #1050
- Bump Hellang.Middleware.ProblemDetails from 6.5.0 to 6.5.1 in /src by @dependabot in #1057
- Bump Microsoft.Extensions.Http.Polly from 6.0.7 to 6.0.8 in /src by @dependabot in #1055
- Bump Microsoft.AspNetCore.Mvc.Testing from 6.0.7 to 6.0.8 in /src by @dependabot in #1054
- Bump Microsoft.AspNetCore.Authentication.JwtBearer from 6.0.7 to 6.0.8 in /src by @dependabot in #1058
- Bump Microsoft.AspNetCore.Components.WebAssembly from 6.0.7 to 6.0.8 in /src by @dependabot in #1049
- Bump Microsoft.AspNetCore.Components.WebAssembly.DevServer from 6.0.7 to 6.0.8 in /src by @dependabot in #1048
- Bump Microsoft.NET.Test.Sdk from 17.2.0 to 17.3.0 in /src by @dependabot in #1071
- Bump actions/setup-python from 2 to 4 by @dependabot in #1072
Full Changelog: v2.7.0...v2.8.0-rc0
v2.7.1
What's Changed
Breaking changes
N/A
New Features
- Add configurable API version support for LoRaWAN Management function by @kbeaugrand in 622db99
Minor changes
- Update global.json to build with 6.0.400 .NET SDK by @kbeaugrand 3581b19
- Make IDE0220 issue as a warning by @kbeaugrand 89ffaae
Full Changelog: main...hotfix/2.7
v2.7.0
What's Changed
Breaking changes
N/A
New Features
- New documentation portal
- Show device id on devices list page #998 by @hocinehacherouf in #1007
- Add Awesome-Ideas configuration on arm templates by @hocinehacherouf in #1008
- Fix #812 Add support for AS923 by @kbeaugrand in #1036.
Bug Fixes
- Use npm ci to restore npm packages during build #793 by @hocinehacherouf in #1004
- Bugfix/975 fix refresh on pagination by @hocinehacherouf in #1005
- Disable the edition of existing tags names on Device Tags Settings page #1002 by @hocinehacherouf in #1017
- Disable swagger "Try It Out" feature #1011 by @hocinehacherouf in #1012
- Feature/Remove swagger to markdown on CI #1013 by @hocinehacherouf in #1014
Minor Changes
- Bump MudBlazor from 6.0.13 to 6.0.14 in /src by @dependabot in #1003
- Bump xunit.extensibility.core from 2.4.1 to 2.4.2 in /src by @dependabot in #1015
- Bump xunit.extensibility.execution from 2.4.1 to 2.4.2 in /src by @dependabot in #1016
- Bump Moq from 4.18.1 to 4.18.2 in /src by @dependabot in #1024
- Bump Microsoft.Azure.Devices.Shared from 1.30.1 to 1.30.2 in /src by @dependabot in #1026
- Bump Microsoft.Azure.Devices from 1.37.1 to 1.38.0 in /src by @dependabot in #1025
- Bump Microsoft.Azure.Devices.Provisioning.Service from 1.18.1 to 1.18.2 in /src by @dependabot in #1023
- Bump docker/build-push-action from 3.1.0 to 3.1.1 by @dependabot in #1034
Full Changelog: v2.6.0...v2.7.0
v2.6.0
What's Changed
Breaking Changes
N/A
New Features
- Add missing pagination on concentrators #899 by @hocinehacherouf in #974
- Add save and duplicate device #616 by @hocinehacherouf in #997
- Modification device tag setting by @ChristopheRib63 in #972
Bug Fixes
- Fix blazor-error-ui text and links color in dark mode #963 by @hocinehacherouf in #966
- Fix issue when adding a new command in LoRaDeviceModel edition/creation pages by @audserraCGI in #1000
Minor Changes
- Remove unused settings in the portal by @kbeaugrand in #961
- Reorganize LoRaDeviceBase and LoRaDeviceDetails models by @audserraCGI in #967
- Reorganize LoRaDeviceModelBase and LoRaDeviceModel models by @audserraCGI in #971
- Fix missing dispose on MultipartFormDataContent #965 by @hocinehacherouf in #973
- Remove unused variables on LoRaWANConcentratorsControllerTest #977 by @hocinehacherouf in #978
- Refactor LoraWanCommandsController by @audserraCGI in #996
- Bump MudBlazor from 6.0.12 to 6.0.13 in /src by @dependabot in #989
Full Changelog: v2.5.0...v2.6.0
v2.5.0
What's Changed
Braking Changes
- App EUI field has been moved from LoRaWAN Device model to LoRa WAN device (API changes)
New features
- Update favicon #888 by @hocinehacherouf in #897
- Add global loading bar when http events are fired by @hocinehacherouf in #901
- Add Ideas feature #787 by @hocinehacherouf in #910
- Standardize loading screens #848 by @hocinehacherouf in #916
- Feature/879 Add a creation/modification dialog for edge modules by @audserraCGI in #896
- AppEUI moved from DeviceModel to DeviceDetails by @audserraCGI in #957
Bug fixes
- Fix loading of LoraWAN device commands #904 by @hocinehacherouf in #905
- Update loading bar height and color #918 by @hocinehacherouf in #927
- Fix validation issue on DeviceID when creating a new LoRa Device by @ChristopheRib63 in #917
- Update submit idea API by @kbeaugrand in #943
- Add a RegexMask on command frame to prevent non-hexadecimal characters by @audserraCGI in #949
- Fix #958 - Failed to update Avatar on device models #958 by @kbeaugrand in #960
Refactoring
- Move http calls from UI layer to dedicated client services by @hocinehacherouf in #898
Minor Changes
- Bump MudBlazor from 6.0.10 to 6.0.11 in /src by @dependabot in #902
- Bump Microsoft.Graph from 4.33.0 to 4.34.0 in /src by @dependabot in #903
- Bump Azure.Data.Tables from 12.6.0 to 12.6.1 in /src by @dependabot in #909
- Bump Azure.Storage.Blobs from 12.12.0 to 12.13.0 in /src by @dependabot in #908
- Bump Microsoft.AspNetCore.Components.WebAssembly from 6.0.6 to 6.0.7 in /src by @dependabot in #922
- Bump Microsoft.Extensions.Http.Polly from 6.0.6 to 6.0.7 in /src by @dependabot in #921
- Bump Microsoft.AspNetCore.Components.WebAssembly.Server from 6.0.6 to 6.0.7 in /src by @dependabot in #920
- Bump Microsoft.AspNetCore.Mvc.Testing from 6.0.6 to 6.0.7 in /src by @dependabot in #923
- Bump Microsoft.AspNetCore.Components.WebAssembly.DevServer from 6.0.6 to 6.0.7 in /src by @dependabot in #925
- Bump Microsoft.AspNetCore.Components.WebAssembly.Authentication from 6.0.6 to 6.0.7 in /src by @dependabot in #919
- Bump Microsoft.AspNetCore.Authentication.JwtBearer from 6.0.6 to 6.0.7 in /src by @dependabot in #924
- Bump Microsoft.AspNetCore.Authentication.OpenIdConnect from 6.0.6 to 6.0.7 in /src by @dependabot in #926
- Bump Swashbuckle.AspNetCore from 6.3.1 to 6.3.2 in /src by @dependabot in #928
- Bump MudBlazor from 6.0.11 to 6.0.12 in /src by @dependabot in #933
- Bump terser from 5.13.1 to 5.14.2 in /src/AzureIoTHub.Portal/Client/assets by @dependabot in #944
- Bump docker/build-push-action from 3.0.0 to 3.1.0 by @dependabot in #952
- Bump Swashbuckle.AspNetCore from 6.3.2 to 6.4.0 in /src by @dependabot in #951
- Bump Microsoft.ApplicationInsights.AspNetCore from 2.20.0 to 2.21.0 in /src by @dependabot in #954
- Bump Microsoft.Graph from 4.34.0 to 4.35.0 in /src by @dependabot in #955
Full Changelog: v2.4.0...v2.5.0
v2.4.0
What's Changed
Breaking changes
N/A
New features
- Deploy portal with and without lorawan by @hocinehacherouf in #869
Bug fixings
- Merge Hotfixes from 2.3 by @kbeaugrand in #883
- Fix #843 - Issue when creating a new device if the DeviceID already exists by @ChristopheRib63 in #891
- #893 Research in the device list by @ChristopheRib63 in #894
- Set DashboardController.GetPortalMetrics endpoint name #863 by @hocinehacherouf in #866
Minor changes
- Add refresh button on device tags #794 by @hocinehacherouf in #887
- Feature/750 auto update copyright year by @hocinehacherouf in #889
- Feature/868 blazor base unit test wrapper by @hocinehacherouf in #882
- Change menu to add Feature Edge Device models by @Sben65 in #877
- Bump Microsoft.OpenApi from 1.3.1 to 1.3.2 in /src by @dependabot in #865
- Bump Microsoft.Graph from 4.32.0 to 4.33.0 in /src by @dependabot in #885
- Bump NetEscapades.AspNetCore.SecurityHeaders from 0.16.1 to 0.17.0 in /src by @dependabot in #884
v2.3.4
What's new?
New options are now present on the portal
-
OIDC__ValidateIssuer
Validation of the issuer mitigates forwarding attacks that can occur when an IdentityProvider represents multiple tenants and signs tokens with the same keys. It is possible that a token issued for the same audience could be from a different tenant. For example an application could accept users from contoso.onmicrosoft.com but not fabrikam.onmicrosoft.com, both valid tenants. An application that accepts tokens from fabrikam could forward them to the application that accepts tokens for contoso. This boolean only applies to default issuer validation. If IssuerValidator is set, it will be called regardless of whether this property is true or false. The default is true.
-
OIDC__ValidateAudience
Validation of the audience, mitigates forwarding attacks. For example, a site that receives a token, could not replay it to another side. A forwarded token would contain the audience of the original site. This boolean only applies to default audience validation. If AudienceValidator is set, it will be called regardless of whether this property is true or false. The default is true.
-
OIDC__ValidateLifetime
This boolean only applies to default lifetime validation. If LifetimeValidator is set, it will be called regardless of whether this property is true or false. The default is true.
-
OIDC__ValidateIssuerSigningKey
It is possible for tokens to contain the public key needed to check the signature. For example, X509Data can be hydrated into an X509Certificate, which can be used to validate the signature. In these cases it is important to validate the SigningKey that was used to validate the signature. This boolean only applies to default signing key validation. If IssuerSigningKeyValidator is set, it will be called regardless of whether this property is true or false. The default is false.
-
OIDC_ValidateActor
If an actor token is detected, whether it should be validated. The default is false.
-
OIDC_ValidateTokenReplay
This boolean only applies to default token replay validation. If TokenReplayValidator is set, it will be called regardless of whether this property is true or false. The default is false.
-
UseSecurityHeaders
This boolean adds the following headers to all responses :
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains
- only applied to HTTPS responses
X-Frame-Options: Deny
- only applied to text/html responses
X-XSS-Protection: 1; mode=block
- only applied to text/html responses
Referrer-Policy: strict-origin-when-cross-origin
- only applied to text/html responses
Content-Security-Policy: object-src 'none'; form-action 'self'; frame-ancestors 'none'
- only applied to text/html responses
Fix CSP restrictions
Add OIDC MetadataUrl to authorized frame ancestors.
Full Changelog: v2.3.0...v2.3.4
v2.3.3
Full Changelog: v2.3.2...v2.3.3
v2.3.2
What's Changed
Security constraints updates
CSP: Frame Ancessor changes
We added the OIDC endpoint to the authorized frame ancestors for the portal.
This is related to the issue #878
See CSP: frame-ancestors for more information about this setting
v2.3.1
What's Changed
Configuration changes
With this version you can now disable some OIDC token validations.
New options are now present on the portal:
- OIDC__ValidateIssuer
Validation of the issuer mitigates forwarding attacks that can occur when an IdentityProvider represents multiple tenants and signs tokens with the same keys. It is possible that a token issued for the same audience could be from a different tenant. For example an application could accept users from contoso.onmicrosoft.com but not fabrikam.onmicrosoft.com, both valid tenants. An application that accepts tokens from fabrikam could forward them to the application that accepts tokens for contoso. This boolean only applies to default issuer validation. If IssuerValidator is set, it will be called regardless of whether this property is true or false. The default is true.
- OIDC__ValidateAudience
Validation of the audience, mitigates forwarding attacks. For example, a site that receives a token, could not replay it to another side. A forwarded token would contain the audience of the original site. This boolean only applies to default audience validation. If AudienceValidator is set, it will be called regardless of whether this property is true or false. The default is true.
- OIDC__ValidateLifetime
This boolean only applies to default lifetime validation. If LifetimeValidator is set, it will be called regardless of whether this property is true or false. The default is true.
- OIDC__ValidateIssuerSigningKey
It is possible for tokens to contain the public key needed to check the signature. For example, X509Data can be hydrated into an X509Certificate, which can be used to validate the signature. In these cases it is important to validate the SigningKey that was used to validate the signature. This boolean only applies to default signing key validation. If IssuerSigningKeyValidator is set, it will be called regardless of whether this property is true or false. The default is false.