Explicitly allow access on some (public) routes also without 2FA#29752
Explicitly allow access on some (public) routes also without 2FA#29752nickvergessen merged 1 commit intomasterfrom
Conversation
Signed-off-by: Christoph Wurst <christoph@winzerhof-wurst.at>
nickvergessen
left a comment
There was a problem hiding this comment.
I think it's the best approach, but we should document properly that this is only supposed to be used by twofactor apps?
In an ideal world we would be able to load |
Well not sure I agree here. Without the context how should the 2fa apps know it? |
|
/backport to stable23 |
|
/backport to stable22 |
|
/backport to stable21 |
|
/backport to stable20 |
|
The backport to stable23 failed. Please do this backport manually. |
|
The backport to stable21 failed. Please do this backport manually. |
|
The backport to stable20 failed. Please do this backport manually. |
|
The backport to stable22 failed. Please do this backport manually. |
Fixes nextcloud/twofactor_totp#1147 and many similar bugs in 2FA apps.
This is kind of a revert of #28725, or another revision. The problem is that we have some public routes (
@PublicPage) that should be accessible during the 2FA setup. That is after the login (user context exists) but before completing any 2FA challenge or setting up a 2FA provider (other routes have to remain blocked).This new annotation will allow us to mark (public) routes to be accessible again.
This follows @nickvergessen's suggestion from #29056 (comment)
We will have to add this annotation to the 2FA provider routes.