diff options
| author | martin f. krafft <madduck@madduck.net> | 2025-07-15 19:40:06 +0200 |
|---|---|---|
| committer | martin f. krafft <madduck@madduck.net> | 2025-07-15 19:40:06 +0200 |
| commit | 416c45f6fc4905cd96bf87879f7d0a427f87bfe3 (patch) | |
| tree | 1f1fa05233c4a352e0420278c05d7946c6874ce5 /inject | |
| parent | 41e571dce97b098cac7256d4e61f84854435c539 (diff) | |
Fix ?pwauth disabling SSO redirect
Diffstat (limited to 'inject')
| -rw-r--r-- | inject/disable-password-login.js | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/inject/disable-password-login.js b/inject/disable-password-login.js index 529e158..67ec68b 100644 --- a/inject/disable-password-login.js +++ b/inject/disable-password-login.js @@ -1,16 +1,13 @@ export function disablePasswordLogin() { - const queryString = new URLSearchParams(); - if (queryString.get("all") == null) { + const queryString = new URLSearchParams(window.location.search); + console.log(queryString); + if (queryString.get("pwauth") == null) { document.addEventListener("DOMContentLoaded", function () { const sso = document.querySelector(".o_auth_oauth_providers"); if (sso) { const link = sso.getElementsByTagName("a")[0]; - if (link.innerText.search("Authentik") > 0) { + if (link.innerText.search("Authentik") + link.innerText.search("TONI SSO") > 0) { console.info("Redirecting to SSO login:", link.href); - // Disable for now while we don't have a way to prevent redirection - // for e.g. admin login. One way would be to scan for presence of a - // query string parameter such as `pwauth`, but I could not get - // URLSearchParams to help me. window.location.replace(link.href); } } |
