This lets the authorize api key screen redirect to the defined url and provide it with the user id, permissions granted and the key.
This also allows apps to match existing api keys generated for it specifically using the application identifier, and if matched, presented with a confirmation page before redirection.
* GreenField: Cross-implemenation Lightning Node API
* switch to hard unrsstricted check
* fix
* set LightningPrivateRouteHints in swagger + stores api
* add priv route hint
* rename models and add swagger defs to models
* GreenField: Payment Requests CRUD
* fixes
* fix swagger
* fix swag
* rebase fixes
* Add new permissions for payment requests
* Adapt PR to archive
* fix tst
* add to contains policxy
* make decimals returned as string due to avoid shitty language parsing issues
* do not register decimal json converter as global
* fix cultureinfo for json covnerter
* pr changes
* add json convertet test
* fix json test
* fix rebase
When the `ServerManagement` permission is granted, you should be able to do everything in the system.
Maybe I should rename it to GodMode as a permission to not have any confusion with managing server settings (currently `ServerManagement`)?
Builds on #1368
This PR adds a new endpoint: Get current user.. It only returns the current user's id and email for now( let's extend later)
It also adds a new permission: `ProfileManagement` which is needed for this endpoint (and for update endpoints later)
* Part 1 & Part 2 squashed commits
pr changes
pr fixes
remove config for openid -- no need for it for now
Part 1: OpenIddict - Minor Changes & Config prep
Part2: Openiddict: Init OpenIddict & Database Migration & Auth Policies
pr changes
fix merge
fix compile
fix compile #2
Part 1: OpenIddict - Minor Changes & Config prep
add missing nuget
Part2: Openiddict: Init OpenIddict & Database Migration & Auth Policies
* Part3: OpenIddict: Add Flows Event Handlers
* pr changes
* fix merge
* fix rebase
* fix imports
* cleanup
* do not allow u2f enabled accounts to log in
* start better tests for flows
* add tests
* fixes
* reintroduce dynamic policy as policies on jwt do not work without it
* reduce logs
* fix incorrect endpoint definitions
* Add implicit flow e2e test
* add code flow and refresh flow
* do not allow jwt bearer auth for all requests( only those under /api)
* remove commentedt code
* make sure authorize attr is marked with scheme
* remove dynamic policy and set claims in jwt handler
* cleanup
* change serversettings policy to not need a claim
* Add test to checkadmin verification
* revert server setting claim removal
* fix test
* switch back to claim
* unit test fixes
* try fix build with weird references to csprojes
* start fixing rebase
* remove https requirement to handle tor
* reformat tests correctly
* fix csproj
* fix ut formatting
* PR Changes
* do not show selenium browser