Commit Graph

312 Commits

Author SHA1 Message Date
Emmanuel Cazenave f71dfaf15d allow redirect after user edition (#28779) 2019-01-15 16:37:06 +01:00
Emmanuel Cazenave 0ad3bf4dfe cancel user add: set correct location (#29181) 2019-01-15 16:32:03 +01:00
Emmanuel Cazenave 93c52a940c custom attributes prefetching (#29531) 2019-01-15 16:11:36 +01:00
Benjamin Dauvergne 29eb8217f8 views: thread ?next= through pre-registration views (fixes #29242) 2019-01-14 10:33:45 +01:00
Benjamin Dauvergne 5095f90afc utils: use iri_to_uri/uri_to_iri to manipulate URLs in make_url (fixes #28935)
This patch add non-ASCII characters to URLs in OIDC and CAS tests to
check make_url() works correctly.
2019-01-14 10:32:19 +01:00
Frédéric Péters 3fe0a9f826 misc: add support for passwords hashed by Plone (#29430) 2019-01-03 17:01:07 +01:00
Benjamin Dauvergne 5cb0cb54c3 api: manage verified attributes (fixes #28962) 2018-12-18 17:39:18 +01:00
Benjamin Dauvergne 506de394f9 manager: dont require username or email for passwordless accounts (fixes #28916) 2018-12-18 17:27:56 +01:00
Benjamin Dauvergne b4110b3b3c auth_oidc: verify and store id_token nonce (fixes #29009) 2018-12-18 17:15:51 +01:00
Paul Marillonnet 0e34001537 manager: keep querystring while performing default ou user creation (#28897) 2018-12-17 16:34:36 +01:00
Paul Marillonnet f48147b471 user post-creation redirect based on 'next' keyword (#28931) 2018-12-17 16:16:10 +01:00
Benjamin Dauvergne b610880f07 data_transfer: check that import is a dictionnary 2018-12-07 15:04:02 +01:00
Benjamin Dauvergne f95cf05508 tests: use a certificate for localhost.entrouvert.org
I had to create an alias for localhost as libldap from OpenLDAP is
automatically aliasing localhost to the local FQDN when checking
certificate of a connection to ldap(s)://localhost. See
http://www.openldap.org/its/index.cgi/Incoming?id=6838;expression=rhafer@suse.de;statetype=-1
2018-12-05 18:03:51 +01:00
Benjamin Dauvergne 00d8d00a63 tests: set CN to localhost in cert.pem 2018-12-05 16:56:29 +01:00
Benjamin Dauvergne e86a87a2e7 tests: add missing TLS certificate 2018-12-04 18:48:07 +01:00
Benjamin Dauvergne acb2822992 ldap: fix setting client TLS certificate (fixes #28570)
New tests depends upon ldaptools 0.15.
2018-12-04 15:35:04 +01:00
Emmanuel Cazenave 0876d25dbd api: free text search on users (#15736) 2018-11-27 10:56:05 +01:00
Paul Marillonnet ceb683ee3c backoffice: support next url after user creation (#26652) 2018-11-27 09:26:36 +01:00
Benjamin Dauvergne 4c45876e0a idp_oidc: never use an invalid redirect_uri (fixes #28029)
Check of "redirect_uri" move earlier during authorization request
processing. For any redirect_uri check failure errors are only shown to
the end user and redirect_uri is never used to redirect to the
requesting RP.
2018-11-19 11:12:50 +01:00
Frédéric Péters f9a5a31deb manager: redirect users/add to user creation in default OU (#28106) 2018-11-19 10:06:40 +01:00
Serghei Mihai 4db66981f0 ldap: don't crash on duplicated users (#27697)
Keep roles on the more recently used user, then delete the other ones'.
2018-11-07 13:57:14 +01:00
Frédéric Péters c4bf1137af misc: set profile image file selector to suggest image files (#27646) 2018-10-30 10:23:11 +01:00
Frédéric Péters ace8072025 misc: give profile images a .jpeg extension (#27645)
This makes sure nginx will serve them with a correct MIME type.
2018-10-30 10:23:11 +01:00
Frédéric Péters 90ff2d46ab misc: automatically resize profile image (#27644) 2018-10-30 10:23:11 +01:00
Paul Marillonnet a5d652ce81 support avatar picture in user profile (#26022) 2018-10-30 10:23:11 +01:00
Serghei Mihai d90e060069 ldap: add external_id's case-insensitive comparison (#27147) 2018-10-26 13:26:12 +02:00
Benjamin Dauvergne 68f87021c2 auth_oidc: add support for "claims" parameter (fixes #26565)
It allows A2 to signal to OIDC OP that some claims are required,
see :

  https://openid.net/specs/openid-connect-core-1_0.html#ClaimsParameter
2018-10-22 12:11:48 +02:00
Frédéric Péters cc8ec18ea4 misc: don't display password reset view when disabled (#27318) 2018-10-14 20:16:00 +02:00
Benjamin Dauvergne 75e9bcac9a enforce birthdate > 1900 through UI and API (fixes @26867) 2018-10-02 19:37:51 +02:00
Benjamin Dauvergne e1d73640b9 api: fix case of boolean user's attributs (fixes #26113)
As NullBooleanField does not support the allow_null init attribute, we
must special case it and remember to never use BooleanField.
2018-09-06 11:31:41 +02:00
Benjamin Dauvergne dffc87ae12 allow custom authentication method in registration view (fixes #25623) 2018-09-03 23:47:46 +02:00
Josue Kouka d4d4aa65c5 idp oidc: set user identifier as preferred username claim (#23900) 2018-08-16 09:41:02 +02:00
Emmanuel Cazenave 54eb9e5dd2 django 1.11: update redirect location checks (#21489)
https://code.djangoproject.com/ticket/23960
2018-08-12 20:11:31 +02:00
Emmanuel Cazenave 89b7740e04 django 1.11: update ALLOWED_HOSTS in test settings (#21489) 2018-08-12 20:11:31 +02:00
Frédéric Péters 620d514cea api: expose boolean user attributes as booleans (#25632) 2018-08-10 17:27:29 +02:00
Benjamin Dauvergne 99a7b14bf0 add a remember me button (fixes #25579)
It simply use session.set_expiry() to augment the session duration.
2018-08-03 18:52:22 +02:00
Benjamin Dauvergne 7cdda30e99 fix warning in test_clean_unused_account 2018-08-03 18:52:22 +02:00
Benjamin Dauvergne 6c3740b75d return to manager after logout (fixes #25581) 2018-08-03 17:50:21 +02:00
Benjamin Dauvergne 6c1def8a88 use new password widget in manager (#25045) 2018-08-03 14:30:48 +02:00
Frédéric Péters 8754e9b2b0 tests: add proper fix for test of validation error message (#25403) 2018-07-23 12:17:54 +02:00
Benjamin Dauvergne 9705aef9a6 tests: fix test folowing change in validation error message (#25403) 2018-07-23 11:44:11 +02:00
Benjamin Dauvergne c46822af58 use new password fields in registration form (fixes #24439) 2018-07-20 17:07:18 +02:00
Benjamin Dauvergne 773b9c8333 tests: fix NameError (introduced by #25182) 2018-07-18 11:08:04 +02:00
Benjamin Dauvergne 291dc5e2f9 convert password validation code to new API (#24833) 2018-07-18 10:54:22 +02:00
Benjamin Dauvergne 35b3136ef4 add new API to validate passwords (fixes #24833)
POST /api/validate-password/ HTTP/1.1
Conten-Type: application/json

{"password": "whatever"}
200 Ok
Content-Type: application/json

{
  "result": 1,
  "ok": false,
  "checks": [
    {"label": "at least 1 digit", "result": false}
  ]
}

This API is public.
2018-07-18 10:54:22 +02:00
Benjamin Dauvergne 38298c3192 api: add parameters to filter users by allowed services (fixes #22377) 2018-07-17 16:38:35 +02:00
Elias Showk 835e0cf940 replace django.utils.timezone.UTC by utc (#25313) 2018-07-17 16:26:10 +02:00
Benjamin Dauvergne 2f0ae6bacf idp_oidc: fix synchronization API calls when OIDC client use UUID identifier policy (fixes #25182) 2018-07-17 16:15:55 +02:00
Emmanuel Cazenave 7d53bfcb3c delete some django < 1.8 compatiblity code (#25097) 2018-07-17 15:56:52 +02:00
Emmanuel Cazenave 30708c0c7c test custom fields using SubfieldBase (#24869) 2018-07-17 15:52:49 +02:00