Commit Graph

2001 Commits

Author SHA1 Message Date
Benjamin Dauvergne 7b43fa422b bump release to 2.1.11 2014-12-05 14:27:10 +01:00
Benjamin Dauvergne d697773c2d Override User.check_password() in LDAPUser
The check_password() method now directly verify the password agains the
LDAP server.
2014-12-05 14:22:27 +01:00
Benjamin Dauvergne 398e3a932e Override has_usable_password() in LDAPuser to let the LDAP configuration decide if an user can change its password 2014-12-05 14:04:41 +01:00
Benjamin Dauvergne 2a38747fa9 Log search for users when authenticating against LDAP, fix log of error during search, fix building DN from template and fix logs of errors during bind 2014-12-05 13:58:47 +01:00
Benjamin Dauvergne e97bca033e Fix bad use of set_password() and set_unusable_password() in commits 8546afda7 and f3e8a5db 2014-12-05 13:35:30 +01:00
Benjamin Dauvergne 8546afda7c In LDAP backend save user object after setting or reseting the password 2014-12-05 13:25:19 +01:00
Benjamin Dauvergne f3e8a5dbf7 Do not set default to keep LDAP password in Django user, only synchronize password on first login and on request by the user 2014-12-05 12:30:01 +01:00
Benjamin Dauvergne dd00cf8793 Fix grammar in french translations 2014-12-05 09:46:02 +01:00
Benjamin Dauvergne dd540f98fa Use SPOptionsIdPPolicy.authn_request_signed to remove signature check on logout requests (bis) 2014-12-05 09:45:54 +01:00
Benjamin Dauvergne df4dbb4bb3 Use SPOptionsIdPPolicy.authn_request_signed to remove signature check on logout requests 2014-12-05 02:33:28 +01:00
Benjamin Dauvergne 860c4650b2 Fix saml migration 0046, use get_sp_options_policy to get the default policy 2014-12-05 01:57:17 +01:00
Benjamin Dauvergne ea63f790c3 Fix documentation URL in README 2014-12-04 00:10:47 +01:00
Benjamin Dauvergne 8f81920319 Enlarge AuthenticationEvent.how attribute as it cannot hold the value password-on-https 2014-12-04 00:08:41 +01:00
Benjamin Dauvergne e5a1a975f4 Remove the LibertyProviderPolicy model and copy its defaults to existing SPOptionsIdPPolicy 2014-12-04 00:08:41 +01:00
Benjamin Dauvergne af6ddf3887 Migrate LibertyProviderPolicy.authn_request_signature_check_hint to SPOptionsIdPPolicy.authn_request_signed 2014-12-04 00:08:41 +01:00
Jocelyn Delalande f19b3082bb Fix UnboundLocalError when logging-in a ldap user belonging to no group
fixes #6046

License: MIT
2014-12-04 00:08:26 +01:00
Benjamin Dauvergne 4f5203d182 In refactored login view share cancel, can_reset_password and registration_authorized variable between templates 2014-12-03 18:44:50 +01:00
Benjamin Dauvergne d46a4c1791 bump release to 2.1.10 2014-12-03 18:17:00 +01:00
Benjamin Dauvergne a668167045 Make LDAP backend default to synchronize LDAP users with Django users 2014-12-03 18:10:51 +01:00
Benjamin Dauvergne 7f5a8945ec Refactor login view by using new authentication frontend API, sekizai and gadjo
- All templates for authentication frontends moved into
	templates/authentic2
- LoginPasswordBackend was rewrittent to use the new api using a simple
	login() method
- JQuery script files are loaded using sekizai
- Loading of JQuery and JQuery-UI use the xstatic template tag from
	gadjo
2014-12-03 18:10:51 +01:00
Benjamin Dauvergne 54f036b36c Use python-six when testing string types, start aiming for Python 3 compat 2014-12-03 18:10:51 +01:00
Mikaël Ates c3f8d5fea1 documentation: remove old documentation files (refs #5455) 2014-12-03 17:24:39 +01:00
Mikaël Ates cea7992a1e documentation: update README (#5455). 2014-12-03 17:24:39 +01:00
Mikaël Ates e5ebc66215 documentation: refactor documentation (refs #5455). 2014-12-03 17:24:38 +01:00
Benjamin Dauvergne 19d8120b92 Remove the default cache setting based on the FileBasedCache implementation 2014-12-02 15:55:55 +01:00
Benjamin Dauvergne cbbedcbc02 Set default level for root logger to WARNING and only activate DEBUG logging on authentic2 loggers when DEBUG is True 2014-12-02 15:55:55 +01:00
Benjamin Dauvergne c41c091d84 Add a lasso_required() view decorator and use it on SAML 2.0 IdP views 2014-12-02 15:55:55 +01:00
Benjamin Dauvergne 7d295e6f12 Add an unless() view decorator and rewrite the settings_enabled() decorator with it 2014-12-02 15:55:55 +01:00
Benjamin Dauvergne 18d355210b Load lasso through the authentic2.compat module and provide an mock object to allow authentic2 to launch 2014-12-02 15:31:39 +01:00
Benjamin Dauvergne c14ec484e2 Set default for DEBUG to True 2014-12-02 15:31:39 +01:00
Benjamin Dauvergne 9fc8c387dd Revert "Rename saml migration with an existing serial number"
South is perfectly happy to apply migrations with the same serial number
it just sort them alphabetically. If, as in most case, the two migration
do not touch the same models, it will work.

This reverts commit 54d26d1e18.
2014-11-27 12:30:32 +01:00
Benjamin Dauvergne 7e35175bbd Rewrite some migrations to support custom user models (fixes #5640) 2014-11-21 19:19:51 +01:00
Jocelyn Delalande e3686c368e bugfix : do not longer fail silently on importerror in local_settings.py
License: MIT
2014-11-21 19:15:28 +01:00
Benjamin Dauvergne c8ec7f5be0 Update NEWS 2014-11-21 19:15:06 +01:00
Benjamin Dauvergne 1a4effe611 Share the same context instance when rendering frontends blocks on the profile page
Update SSL and login/password frontends with the API change.
2014-11-21 19:15:06 +01:00
Benjamin Dauvergne 2e8798e4be Do not show login block if frontend is disabled (with new login() API) 2014-11-21 19:15:05 +01:00
Benjamin Dauvergne 044bef035b Update french translations for SAML and SAML IdP 2014-11-21 19:15:05 +01:00
Benjamin Dauvergne 49cfc52b5c Remove input field in name column of LibertyProvider listing page 2014-11-21 19:14:36 +01:00
Benjamin Dauvergne 0219bc39c6 Save metadata URL when creating a new SAML provider 2014-11-21 19:14:35 +01:00
Benjamin Dauvergne 55e1f85c78 Fix lenthening of the username field in User model related forms
It was enabled only when a new username regex was defined, it should
have been enabled at all times.
2014-11-21 19:14:35 +01:00
Benjamin Dauvergne f3faa40020 Implement updating SAML metadata by URL on the LibertyProvider model 2014-11-21 19:14:35 +01:00
Benjamin Dauvergne ad9c978a3f Add data migration to copy entity_id of liberty provider to the new metadata_url field 2014-11-21 19:14:35 +01:00
Benjamin Dauvergne 65b7cd2770 Add field metadata_url to the LibertyProvider object 2014-11-21 19:14:34 +01:00
Benjamin Dauvergne aff886e8d9 Share the same context during rendering of the login page 2014-11-20 23:25:25 +01:00
Benjamin Dauvergne a7a34b1882 Install django-sekizai 2014-11-20 23:25:25 +01:00
Benjamin Dauvergne e336b777c6 Make saml migration 0043 compatible with custom user model 2014-11-20 23:25:24 +01:00
Benjamin Dauvergne edebb86d0e Add a nonce parameter to ok.png URL to make logout URLs uncacheable 2014-11-20 12:08:34 +01:00
Benjamin Dauvergne e0b49b5011 Allow frontends to handle completely their content
If a frontend has a method like:

		def login(self, request, *args, **kwargs):
			...

then normal handling through the form() and post() method is ignored and
this method is used instead. If it returns an HTTP response with a
status code of 200 the content is extracted and used in the login page.

If any other response is returned, it's taken as the login page result,
which allows a frontend to short-circuit the normal login workflow.
2014-11-19 15:12:22 +01:00
Benjamin Dauvergne 54d26d1e18 Rename saml migration with an existing serial number 2014-11-19 15:00:43 +01:00
Benjamin Dauvergne 136ad84a09 Remove debugging statements 2014-11-19 15:00:43 +01:00