Thomas NOËL
5011612815
admin/settings: fix last commit
2014-05-02 10:09:03 +02:00
Benjamin Dauvergne
21692220be
admin/settings: make qommon.admin.translations optional
2014-04-25 08:55:24 +02:00
Benjamin Dauvergne
d990bdc537
update qommon version
2014-01-13 22:53:17 +01:00
Benjamin Dauvergne
4d49671284
remove debugging statement
2014-01-13 22:52:45 +01:00
Benjamin Dauvergne
0c05f9e40c
publisher: add spanish to supported language, make utf-8 the default charset
2014-01-13 22:52:08 +01:00
Benjamin Dauvergne
f2674fb673
identities: translate the hint field of Field objects when building form widgets
2014-01-13 22:51:39 +01:00
Benjamin Dauvergne
ea976f0c11
update qommon version
2014-01-13 14:38:32 +01:00
Benjamin Dauvergne
41f338aa43
root: request.user is just the id of the user not the object, use session.get_user_object() for that
2014-01-13 14:38:17 +01:00
Benjamin Dauvergne
75a17288cf
identities: in the LDAP store ignore invalid syntax exception on save()
2014-01-13 14:37:53 +01:00
Benjamin Dauvergne
2047b39309
identities: for fields using a ChoiceWidget translate the options
2014-01-13 14:37:16 +01:00
Benjamin Dauvergne
6d7854d860
admin/settings: plug new custom translation setting page
2014-01-09 17:47:11 +01:00
Benjamin Dauvergne
1c2069a8cc
bump qommon version
2014-01-09 17:47:02 +01:00
Benjamin Dauvergne
e6a23bb924
update qommon version
2014-01-09 13:10:12 +01:00
Benjamin Dauvergne
9096426b18
root: if the user has a preferred language, use it instead of the one from the request or the settings
2014-01-09 13:09:32 +01:00
Benjamin Dauvergne
286222f7f6
identities: make BaseIdentitiesStore retrieve its identity class from a class variable
2014-01-09 13:09:19 +01:00
Benjamin Dauvergne
0cf57685fe
identities: add a get_preferred_language() method to Identity class
2014-01-09 12:12:35 +01:00
Benjamin Dauvergne
28e7914ee4
identities: use get_identity_class() in IdentitiesStoreLdap to instantiante identity objects
2014-01-09 12:12:12 +01:00
Benjamin Dauvergne
7c6cbb804d
po: add 3 new languages it, ro and lv
2014-01-08 23:41:57 +01:00
Benjamin Dauvergne
9e99858db4
use recent version of qommon-for-authentic1
2014-01-08 23:41:01 +01:00
Benjamin Dauvergne
4501628785
add translations for lv, ro and it languages
2014-01-08 22:44:48 +01:00
Benjamin Dauvergne
7056d33e5c
import qommon subdirectory as a subproject
2013-11-06 23:24:40 +01:00
Frédéric Péters
0ea869f0ba
Let get_html_text do the variable substitutions
2011-08-19 08:00:39 +00:00
Benjamin Dauvergne
829e5b605a
[idff12] make relay_state passing for idp initiated login similar to the way saml2 does it
2011-05-06 14:32:14 +00:00
Benjamin Dauvergne
e30716c66c
[saml2] fix relay_state passing for idp initiated login
2011-05-06 14:32:11 +00:00
Benjamin Dauvergne
69517f28ef
[saml2] properly encode and decode attribute whether they are of str or unicode type
2011-05-06 14:32:09 +00:00
Benjamin Dauvergne
ba7609030e
[root] mail to simple users should be synchronous
2011-05-06 14:32:01 +00:00
Benjamin Dauvergne
7aad678255
[publisher] add a DEFAULT_CHARSET variable which can be overriden from the Defaults module
...
This commit also work-around bugs consequent to the change of default
charset in quixote 2.7.
2011-05-06 14:31:56 +00:00
Benjamin Dauvergne
78d30c6efd
[saml2] keep a reference to the last logged user after slo (for pr@tic)
2011-05-06 14:31:54 +00:00
Benjamin Dauvergne
c9b29c5d25
[publisher] do not dump absent requests
2011-05-06 14:31:45 +00:00
Benjamin Dauvergne
bd7a7b3156
[session] do not clean the after_url session attribute
...
The attribute is still used by the AccessError exceptions to store the
continuation URL when redirecting to the login page.
2011-05-06 14:31:32 +00:00
Benjamin Dauvergne
5e731089ee
[lost_password] when a new password is generated state it in the lost password view
2011-02-01 12:58:34 +00:00
Benjamin Dauvergne
3a73f548e9
[sessions] when cleaning the session data, setup the ssl flag
2011-01-31 13:42:27 +00:00
Benjamin Dauvergne
8c65f982d0
[root] redirect user to homepage when trying to access the login page
...
To see the login page, one of theses conditions must be met:
- no user logged
- a LoginToken is present in the URL and the corresponding object
exists
2011-01-28 13:46:36 +00:00
Benjamin Dauvergne
1ac95186ed
Remove debugging print statement
2011-01-28 13:46:33 +00:00
Benjamin Dauvergne
d59a8349e7
[session] adapt session expiration to authentic
...
Allows to keep data from old sessions when expiring them. The session
object is kept, fields are reset or deleted. The session file is deleted
from storage. It allows the 'service' to survive logout, so that we can
keep the currently activated theme.
2011-01-27 13:41:00 +00:00
Benjamin Dauvergne
3f29e2430b
[root] expire session when logging in
...
This prevent session fixation attacks. To make it work we had to move
the call to the method init_session() from the identity store backend.
2011-01-27 13:40:57 +00:00
Benjamin Dauvergne
ab9e981d03
[saml2] set the service session variable on logout requests
2011-01-27 13:40:55 +00:00
Benjamin Dauvergne
9385fd3d3d
[root] add service to the field passed to email templates
...
Now you can personnalize email notifications with respect to the
requesting service.
2011-01-27 13:40:51 +00:00
Benjamin Dauvergne
57faf703cb
[session[ add a service field
...
Service will keep the reference to the last service the IdP interacted
with. It can be used to personalize themes and email content.
2011-01-27 13:40:48 +00:00
Benjamin Dauvergne
3b26ca2b0b
[ssl] fix error message in the login_ssl view
2011-01-14 21:46:28 +00:00
Benjamin Dauvergne
150b657a4e
[admin logger] use the new parser for logfiles
2011-01-13 10:15:58 +00:00
Benjamin Dauvergne
c73d4a2923
[admin setting] catch invalid provider id and return 404
2011-01-13 09:51:23 +00:00
Benjamin Dauvergne
b52f66596f
Fix double password generation
2011-01-01 09:25:28 +00:00
Benjamin Dauvergne
db97540f16
[saml2] move initialization of the NameID format before validateRequest
...
Validate request needs to know the name id format as it creates the
federation in the case of a persistent NameID.
2010-12-23 14:08:05 +00:00
Benjamin Dauvergne
1fa8c97910
[saml2] in build_assertion handle UNSPECIFIED NameID format as default
2010-12-23 13:11:07 +00:00
Benjamin Dauvergne
ce5574738b
[saml2] in build_assertion fix unexisting NameID format NONE
2010-12-23 13:11:03 +00:00
Benjamin Dauvergne
5ff334f367
[saml2] in SpUI does not make "persistent" the default NameID format, fix unexisting format NONE
2010-12-23 13:10:59 +00:00
Benjamin Dauvergne
79595a493c
[saml2] fix build_assertion when NameID format is email
2010-12-23 13:10:55 +00:00
Benjamin Dauvergne
c0f951eef5
[saml2] for AuthnRequest without a NameIDPolicy format use default from settings
2010-12-23 13:10:51 +00:00
Benjamin Dauvergne
83c247900c
[saml2] in SpUI() cache the providers settings in the constructor
2010-12-23 13:10:46 +00:00