-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Explicitly allow access on some (public) routes also without 2FA #29752
Conversation
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's the best approach, but we should document properly that this is only supposed to be used by twofactor apps?
In an ideal world we would be able to load |
Well not sure I agree here. Without the context how should the 2fa apps know it? |
/backport to stable23 |
/backport to stable22 |
/backport to stable21 |
/backport to stable20 |
The backport to stable23 failed. Please do this backport manually. |
The backport to stable21 failed. Please do this backport manually. |
The backport to stable20 failed. Please do this backport manually. |
The backport to stable22 failed. Please do this backport manually. |
Fixes nextcloud/twofactor_totp#1147 and many similar bugs in 2FA apps.
This is kind of a revert of #28725, or another revision. The problem is that we have some public routes (
@PublicPage
) that should be accessible during the 2FA setup. That is after the login (user context exists) but before completing any 2FA challenge or setting up a 2FA provider (other routes have to remain blocked).This new annotation will allow us to mark (public) routes to be accessible again.
This follows @nickvergessen's suggestion from #29056 (comment)
We will have to add this annotation to the 2FA provider routes.