Benjamin Dauvergne
7b43fa422b
bump release to 2.1.11
2014-12-05 14:27:10 +01:00
Benjamin Dauvergne
d697773c2d
Override User.check_password() in LDAPUser
...
The check_password() method now directly verify the password agains the
LDAP server.
2014-12-05 14:22:27 +01:00
Benjamin Dauvergne
398e3a932e
Override has_usable_password() in LDAPuser to let the LDAP configuration decide if an user can change its password
2014-12-05 14:04:41 +01:00
Benjamin Dauvergne
2a38747fa9
Log search for users when authenticating against LDAP, fix log of error during search, fix building DN from template and fix logs of errors during bind
2014-12-05 13:58:47 +01:00
Benjamin Dauvergne
e97bca033e
Fix bad use of set_password() and set_unusable_password() in commits 8546afda7
and f3e8a5db
2014-12-05 13:35:30 +01:00
Benjamin Dauvergne
8546afda7c
In LDAP backend save user object after setting or reseting the password
2014-12-05 13:25:19 +01:00
Benjamin Dauvergne
f3e8a5dbf7
Do not set default to keep LDAP password in Django user, only synchronize password on first login and on request by the user
2014-12-05 12:30:01 +01:00
Benjamin Dauvergne
dd00cf8793
Fix grammar in french translations
2014-12-05 09:46:02 +01:00
Benjamin Dauvergne
dd540f98fa
Use SPOptionsIdPPolicy.authn_request_signed to remove signature check on logout requests (bis)
2014-12-05 09:45:54 +01:00
Benjamin Dauvergne
df4dbb4bb3
Use SPOptionsIdPPolicy.authn_request_signed to remove signature check on logout requests
2014-12-05 02:33:28 +01:00
Benjamin Dauvergne
860c4650b2
Fix saml migration 0046, use get_sp_options_policy to get the default policy
2014-12-05 01:57:17 +01:00
Benjamin Dauvergne
ea63f790c3
Fix documentation URL in README
2014-12-04 00:10:47 +01:00
Benjamin Dauvergne
8f81920319
Enlarge AuthenticationEvent.how attribute as it cannot hold the value password-on-https
2014-12-04 00:08:41 +01:00
Benjamin Dauvergne
e5a1a975f4
Remove the LibertyProviderPolicy model and copy its defaults to existing SPOptionsIdPPolicy
2014-12-04 00:08:41 +01:00
Benjamin Dauvergne
af6ddf3887
Migrate LibertyProviderPolicy.authn_request_signature_check_hint to SPOptionsIdPPolicy.authn_request_signed
2014-12-04 00:08:41 +01:00
Jocelyn Delalande
f19b3082bb
Fix UnboundLocalError when logging-in a ldap user belonging to no group
...
fixes #6046
License: MIT
2014-12-04 00:08:26 +01:00
Benjamin Dauvergne
4f5203d182
In refactored login view share cancel, can_reset_password and registration_authorized variable between templates
2014-12-03 18:44:50 +01:00
Benjamin Dauvergne
d46a4c1791
bump release to 2.1.10
2014-12-03 18:17:00 +01:00
Benjamin Dauvergne
a668167045
Make LDAP backend default to synchronize LDAP users with Django users
2014-12-03 18:10:51 +01:00
Benjamin Dauvergne
7f5a8945ec
Refactor login view by using new authentication frontend API, sekizai and gadjo
...
- All templates for authentication frontends moved into
templates/authentic2
- LoginPasswordBackend was rewrittent to use the new api using a simple
login() method
- JQuery script files are loaded using sekizai
- Loading of JQuery and JQuery-UI use the xstatic template tag from
gadjo
2014-12-03 18:10:51 +01:00
Benjamin Dauvergne
54f036b36c
Use python-six when testing string types, start aiming for Python 3 compat
2014-12-03 18:10:51 +01:00
Mikaël Ates
c3f8d5fea1
documentation: remove old documentation files (refs #5455 )
2014-12-03 17:24:39 +01:00
Mikaël Ates
cea7992a1e
documentation: update README ( #5455 ).
2014-12-03 17:24:39 +01:00
Mikaël Ates
e5ebc66215
documentation: refactor documentation (refs #5455 ).
2014-12-03 17:24:38 +01:00
Benjamin Dauvergne
19d8120b92
Remove the default cache setting based on the FileBasedCache implementation
2014-12-02 15:55:55 +01:00
Benjamin Dauvergne
cbbedcbc02
Set default level for root logger to WARNING and only activate DEBUG logging on authentic2 loggers when DEBUG is True
2014-12-02 15:55:55 +01:00
Benjamin Dauvergne
c41c091d84
Add a lasso_required() view decorator and use it on SAML 2.0 IdP views
2014-12-02 15:55:55 +01:00
Benjamin Dauvergne
7d295e6f12
Add an unless() view decorator and rewrite the settings_enabled() decorator with it
2014-12-02 15:55:55 +01:00
Benjamin Dauvergne
18d355210b
Load lasso through the authentic2.compat module and provide an mock object to allow authentic2 to launch
2014-12-02 15:31:39 +01:00
Benjamin Dauvergne
c14ec484e2
Set default for DEBUG to True
2014-12-02 15:31:39 +01:00
Benjamin Dauvergne
9fc8c387dd
Revert "Rename saml migration with an existing serial number"
...
South is perfectly happy to apply migrations with the same serial number
it just sort them alphabetically. If, as in most case, the two migration
do not touch the same models, it will work.
This reverts commit 54d26d1e18
.
2014-11-27 12:30:32 +01:00
Benjamin Dauvergne
7e35175bbd
Rewrite some migrations to support custom user models ( fixes #5640 )
2014-11-21 19:19:51 +01:00
Jocelyn Delalande
e3686c368e
bugfix : do not longer fail silently on importerror in local_settings.py
...
License: MIT
2014-11-21 19:15:28 +01:00
Benjamin Dauvergne
c8ec7f5be0
Update NEWS
2014-11-21 19:15:06 +01:00
Benjamin Dauvergne
1a4effe611
Share the same context instance when rendering frontends blocks on the profile page
...
Update SSL and login/password frontends with the API change.
2014-11-21 19:15:06 +01:00
Benjamin Dauvergne
2e8798e4be
Do not show login block if frontend is disabled (with new login() API)
2014-11-21 19:15:05 +01:00
Benjamin Dauvergne
044bef035b
Update french translations for SAML and SAML IdP
2014-11-21 19:15:05 +01:00
Benjamin Dauvergne
49cfc52b5c
Remove input field in name column of LibertyProvider listing page
2014-11-21 19:14:36 +01:00
Benjamin Dauvergne
0219bc39c6
Save metadata URL when creating a new SAML provider
2014-11-21 19:14:35 +01:00
Benjamin Dauvergne
55e1f85c78
Fix lenthening of the username field in User model related forms
...
It was enabled only when a new username regex was defined, it should
have been enabled at all times.
2014-11-21 19:14:35 +01:00
Benjamin Dauvergne
f3faa40020
Implement updating SAML metadata by URL on the LibertyProvider model
2014-11-21 19:14:35 +01:00
Benjamin Dauvergne
ad9c978a3f
Add data migration to copy entity_id of liberty provider to the new metadata_url field
2014-11-21 19:14:35 +01:00
Benjamin Dauvergne
65b7cd2770
Add field metadata_url to the LibertyProvider object
2014-11-21 19:14:34 +01:00
Benjamin Dauvergne
aff886e8d9
Share the same context during rendering of the login page
2014-11-20 23:25:25 +01:00
Benjamin Dauvergne
a7a34b1882
Install django-sekizai
2014-11-20 23:25:25 +01:00
Benjamin Dauvergne
e336b777c6
Make saml migration 0043 compatible with custom user model
2014-11-20 23:25:24 +01:00
Benjamin Dauvergne
edebb86d0e
Add a nonce parameter to ok.png URL to make logout URLs uncacheable
2014-11-20 12:08:34 +01:00
Benjamin Dauvergne
e0b49b5011
Allow frontends to handle completely their content
...
If a frontend has a method like:
def login(self, request, *args, **kwargs):
...
then normal handling through the form() and post() method is ignored and
this method is used instead. If it returns an HTTP response with a
status code of 200 the content is extracted and used in the login page.
If any other response is returned, it's taken as the login page result,
which allows a frontend to short-circuit the normal login workflow.
2014-11-19 15:12:22 +01:00
Benjamin Dauvergne
54d26d1e18
Rename saml migration with an existing serial number
2014-11-19 15:00:43 +01:00
Benjamin Dauvergne
136ad84a09
Remove debugging statements
2014-11-19 15:00:43 +01:00