Commit ad9d922 1 parent 044b07e commit ad9d922 Copy full SHA for ad9d922
File tree 4 files changed +7
-5
lines changed
4 files changed +7
-5
lines changed Original file line number Diff line number Diff line change @@ -26,6 +26,7 @@ addon | version | maintainers | summary
26
26
[ auth_api_key_group] ( auth_api_key_group/ ) | 18.0.1.0.0 | [ ![ simahawk] ( https://github.com/simahawk.png?size=30px )] ( https://github.com/simahawk ) | Allow grouping API keys together. Grouping per se does nothing. This feature is supposed to be used by other modules to limit access to services or records based on groups of keys.
27
27
[ auth_api_key_server_env] ( auth_api_key_server_env/ ) | 18.0.1.0.0 | | Configure api keys via server env. This can be very useful to avoid mixing your keys between your various environments when restoring databases. All you have to do is to add a new section to your configuration file according to the following convention:
28
28
[ auth_oidc] ( auth_oidc/ ) | 18.0.1.0.0 | [ ![ sbidoul] ( https://github.com/sbidoul.png?size=30px )] ( https://github.com/sbidoul ) | Allow users to login through OpenID Connect Provider
29
+ [ auth_oidc_environment] ( auth_oidc_environment/ ) | 18.0.1.0.0 | | This module allows to use server env for OIDC configuration
29
30
[ auth_saml] ( auth_saml/ ) | 18.0.1.0.0 | [ ![ vincent-hatakeyama] ( https://github.com/vincent-hatakeyama.png?size=30px )] ( https://github.com/vincent-hatakeyama ) | SAML2 Authentication
30
31
[ base_user_empty_password] ( base_user_empty_password/ ) | 18.0.1.0.0 | [ ![ grindtildeath] ( https://github.com/grindtildeath.png?size=30px )] ( https://github.com/grindtildeath ) | Allows to empty password of users
31
32
[ base_user_show_email] ( base_user_show_email/ ) | 18.0.1.0.0 | | Untangle user login and email
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ Auth Oidc Environment
7
7
!! This file is generated by oca-gen-addon-readme !!
8
8
!! changes will be overwritten. !!
9
9
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
10
- !! source digest: sha256:18aa5a39b1804e3212b277bcc74b32f2297dca10bf1d3192c5fd659082b81150
10
+ !! source digest: sha256:187d3de5c2f18bdaa56b4a217732ca633e79fe8cbdcf764f3db75e2d6f47dd84
11
11
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
12
12
13
13
.. |badge1 | image :: https://img.shields.io/badge/maturity-Beta-yellow.png
@@ -81,8 +81,8 @@ Authors
81
81
Contributors
82
82
------------
83
83
84
- - Adrien PEIFFER <adrien.peiffer@acsone.eu> (ACSONE SA/NV)
85
- - Raphaël Reverdy <raphael.reverdy@akretion.com> (Akretion)
84
+ - Adrien PEIFFER <adrien.peiffer@acsone.eu> (ACSONE SA/NV)
85
+ - Raphaël Reverdy <raphael.reverdy@akretion.com> (Akretion)
86
86
87
87
Maintainers
88
88
-----------
Original file line number Diff line number Diff line change @@ -367,7 +367,7 @@ <h1 class="title">Auth Oidc Environment</h1>
367
367
!! This file is generated by oca-gen-addon-readme !!
368
368
!! changes will be overwritten. !!
369
369
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
370
- !! source digest: sha256:18aa5a39b1804e3212b277bcc74b32f2297dca10bf1d3192c5fd659082b81150
370
+ !! source digest: sha256:187d3de5c2f18bdaa56b4a217732ca633e79fe8cbdcf764f3db75e2d6f47dd84
371
371
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -->
372
372
< p > < a class ="reference external image-reference " href ="https://odoo-community.org/page/development-status "> < img alt ="Beta " src ="https://img.shields.io/badge/maturity-Beta-yellow.png " /> </ a > < a class ="reference external image-reference " href ="http://www.gnu.org/licenses/agpl-3.0-standalone.html "> < img alt ="License: AGPL-3 " src ="https://img.shields.io/badge/licence-AGPL--3-blue.png " /> </ a > < a class ="reference external image-reference " href ="https://github.com/OCA/server-auth/tree/18.0/auth_oidc_environment "> < img alt ="OCA/server-auth " src ="https://img.shields.io/badge/github-OCA%2Fserver--auth-lightgray.png?logo=github " /> </ a > < a class ="reference external image-reference " href ="https://translation.odoo-community.org/projects/server-auth-18-0/server-auth-18-0-auth_oidc_environment "> < img alt ="Translate me on Weblate " src ="https://img.shields.io/badge/weblate-Translate%20me-F47D42.png " /> </ a > < a class ="reference external image-reference " href ="https://runboat.odoo-community.org/builds?repo=OCA/server-auth&target_branch=18.0 "> < img alt ="Try me on Runboat " src ="https://img.shields.io/badge/runboat-Try%20me-875A7B.png " /> </ a > </ p >
373
373
< p > this module allows to use server env for OIDC configuration</ p >
Original file line number Diff line number Diff line change 1
1
[project ]
2
2
name = " odoo-addons-oca-server-auth"
3
- version = " 18.0.20250115 .0"
3
+ version = " 18.0.20250120 .0"
4
4
dependencies = [
5
5
" odoo-addon-auth_admin_passkey==18.0.*" ,
6
6
" odoo-addon-auth_api_key==18.0.*" ,
7
7
" odoo-addon-auth_api_key_group==18.0.*" ,
8
8
" odoo-addon-auth_api_key_server_env==18.0.*" ,
9
9
" odoo-addon-auth_oidc==18.0.*" ,
10
+ " odoo-addon-auth_oidc_environment==18.0.*" ,
10
11
" odoo-addon-auth_saml==18.0.*" ,
11
12
" odoo-addon-base_user_empty_password==18.0.*" ,
12
13
" odoo-addon-base_user_show_email==18.0.*" ,
You can’t perform that action at this time.
0 commit comments