Update changelog

This commit is contained in:
Eugene Burmakin 2025-11-14 19:09:57 +01:00
parent 8ecd75429b
commit bb574f5aa3
3 changed files with 15 additions and 13 deletions

View file

View file

@ -6,6 +6,17 @@ and this project adheres to [Semantic Versioning](http://semver.org/).
## Unreleased ## Unreleased
# OIDC and KML support release
To configure your OIDC provider, set the following environment variables:
```
OIDC_CLIENT_ID=client_id_example
OIDC_CLIENT_SECRET=client_secret_example
OIDC_ISSUER=https://authentik.yourdomain.com/application/o/dawarich/
OIDC_REDIRECT_URI=https://your-dawarich-url.com/users/auth/openid_connect/callback
```
## Added ## Added
- Support for KML file uploads. #350 - Support for KML file uploads. #350
@ -15,21 +26,12 @@ and this project adheres to [Semantic Versioning](http://semver.org/).
- The map settings panel is now scrollable - The map settings panel is now scrollable
---
## Changed ## Changed
- Internal redis settings updated to implement support for connecting to Redis via unix socket. #1706 - Internal redis settings updated to implement support for connecting to Redis via unix socket. #1706
- Implemented authentication via GitHub and Google for Dawarich Cloud. - Implemented authentication via GitHub and Google for Dawarich Cloud.
- Implemented OpenID Connect authentication for self-hosted Dawarich instances. #66 - Implemented OpenID Connect authentication for self-hosted Dawarich instances. #66
## TODO:
- [ ] Disable OIDC authentication for Dawarich Cloud
- [ ] Disable GitHub and Google authentication for self-hosted Dawarich
- [ ] In selfhosted env, no registrations are allowed, we need to account OIDC into that
# [0.35.1] - 2025-11-09 # [0.35.1] - 2025-11-09

View file

@ -149,10 +149,10 @@ APP_MEMORY_LIMIT=4G
# Option 1: Using OIDC Discovery (Recommended) # Option 1: Using OIDC Discovery (Recommended)
# Set OIDC_ISSUER to your provider's issuer URL (e.g., https://auth.example.com) # Set OIDC_ISSUER to your provider's issuer URL (e.g., https://auth.example.com)
# The provider must support OpenID Connect Discovery (.well-known/openid-configuration) # The provider must support OpenID Connect Discovery (.well-known/openid-configuration)
OIDC_CLIENT_ID= OIDC_CLIENT_ID=client_id_example
OIDC_CLIENT_SECRET= OIDC_CLIENT_SECRET=client_secret_example
OIDC_ISSUER= OIDC_ISSUER=https://authentik.yourdomain.com/application/o/dawarich/
OIDC_REDIRECT_URI= OIDC_REDIRECT_URI=https://your-dawarich-url.com/users/auth/openid_connect/callback
# Option 2: Manual Endpoint Configuration (if discovery is not supported) # Option 2: Manual Endpoint Configuration (if discovery is not supported)
# Use this if your provider doesn't support OIDC discovery # Use this if your provider doesn't support OIDC discovery