Emmanuel Cazenave
f71dfaf15d
allow redirect after user edition ( #28779 )
2019-01-15 16:37:06 +01:00
Emmanuel Cazenave
0ad3bf4dfe
cancel user add: set correct location ( #29181 )
2019-01-15 16:32:03 +01:00
Emmanuel Cazenave
93c52a940c
custom attributes prefetching ( #29531 )
2019-01-15 16:11:36 +01:00
Benjamin Dauvergne
29eb8217f8
views: thread ?next= through pre-registration views ( fixes #29242 )
2019-01-14 10:33:45 +01:00
Benjamin Dauvergne
5095f90afc
utils: use iri_to_uri/uri_to_iri to manipulate URLs in make_url ( fixes #28935 )
...
This patch add non-ASCII characters to URLs in OIDC and CAS tests to
check make_url() works correctly.
2019-01-14 10:32:19 +01:00
Frédéric Péters
3fe0a9f826
misc: add support for passwords hashed by Plone ( #29430 )
2019-01-03 17:01:07 +01:00
Benjamin Dauvergne
5cb0cb54c3
api: manage verified attributes ( fixes #28962 )
2018-12-18 17:39:18 +01:00
Benjamin Dauvergne
506de394f9
manager: dont require username or email for passwordless accounts ( fixes #28916 )
2018-12-18 17:27:56 +01:00
Benjamin Dauvergne
b4110b3b3c
auth_oidc: verify and store id_token nonce ( fixes #29009 )
2018-12-18 17:15:51 +01:00
Paul Marillonnet
0e34001537
manager: keep querystring while performing default ou user creation ( #28897 )
2018-12-17 16:34:36 +01:00
Paul Marillonnet
f48147b471
user post-creation redirect based on 'next' keyword ( #28931 )
2018-12-17 16:16:10 +01:00
Benjamin Dauvergne
b610880f07
data_transfer: check that import is a dictionnary
2018-12-07 15:04:02 +01:00
Benjamin Dauvergne
f95cf05508
tests: use a certificate for localhost.entrouvert.org
...
I had to create an alias for localhost as libldap from OpenLDAP is
automatically aliasing localhost to the local FQDN when checking
certificate of a connection to ldap(s)://localhost. See
http://www.openldap.org/its/index.cgi/Incoming?id=6838;expression=rhafer@suse.de;statetype=-1
2018-12-05 18:03:51 +01:00
Benjamin Dauvergne
00d8d00a63
tests: set CN to localhost in cert.pem
2018-12-05 16:56:29 +01:00
Benjamin Dauvergne
e86a87a2e7
tests: add missing TLS certificate
2018-12-04 18:48:07 +01:00
Benjamin Dauvergne
acb2822992
ldap: fix setting client TLS certificate ( fixes #28570 )
...
New tests depends upon ldaptools 0.15.
2018-12-04 15:35:04 +01:00
Emmanuel Cazenave
0876d25dbd
api: free text search on users ( #15736 )
2018-11-27 10:56:05 +01:00
Paul Marillonnet
ceb683ee3c
backoffice: support next url after user creation ( #26652 )
2018-11-27 09:26:36 +01:00
Benjamin Dauvergne
4c45876e0a
idp_oidc: never use an invalid redirect_uri ( fixes #28029 )
...
Check of "redirect_uri" move earlier during authorization request
processing. For any redirect_uri check failure errors are only shown to
the end user and redirect_uri is never used to redirect to the
requesting RP.
2018-11-19 11:12:50 +01:00
Frédéric Péters
f9a5a31deb
manager: redirect users/add to user creation in default OU ( #28106 )
2018-11-19 10:06:40 +01:00
Serghei Mihai
4db66981f0
ldap: don't crash on duplicated users ( #27697 )
...
Keep roles on the more recently used user, then delete the other ones'.
2018-11-07 13:57:14 +01:00
Frédéric Péters
c4bf1137af
misc: set profile image file selector to suggest image files ( #27646 )
2018-10-30 10:23:11 +01:00
Frédéric Péters
ace8072025
misc: give profile images a .jpeg extension ( #27645 )
...
This makes sure nginx will serve them with a correct MIME type.
2018-10-30 10:23:11 +01:00
Frédéric Péters
90ff2d46ab
misc: automatically resize profile image ( #27644 )
2018-10-30 10:23:11 +01:00
Paul Marillonnet
a5d652ce81
support avatar picture in user profile ( #26022 )
2018-10-30 10:23:11 +01:00
Serghei Mihai
d90e060069
ldap: add external_id's case-insensitive comparison ( #27147 )
2018-10-26 13:26:12 +02:00
Benjamin Dauvergne
68f87021c2
auth_oidc: add support for "claims" parameter ( fixes #26565 )
...
It allows A2 to signal to OIDC OP that some claims are required,
see :
https://openid.net/specs/openid-connect-core-1_0.html#ClaimsParameter
2018-10-22 12:11:48 +02:00
Frédéric Péters
cc8ec18ea4
misc: don't display password reset view when disabled ( #27318 )
2018-10-14 20:16:00 +02:00
Benjamin Dauvergne
75e9bcac9a
enforce birthdate > 1900 through UI and API (fixes @26867)
2018-10-02 19:37:51 +02:00
Benjamin Dauvergne
e1d73640b9
api: fix case of boolean user's attributs ( fixes #26113 )
...
As NullBooleanField does not support the allow_null init attribute, we
must special case it and remember to never use BooleanField.
2018-09-06 11:31:41 +02:00
Benjamin Dauvergne
dffc87ae12
allow custom authentication method in registration view ( fixes #25623 )
2018-09-03 23:47:46 +02:00
Josue Kouka
d4d4aa65c5
idp oidc: set user identifier as preferred username claim ( #23900 )
2018-08-16 09:41:02 +02:00
Emmanuel Cazenave
54eb9e5dd2
django 1.11: update redirect location checks ( #21489 )
...
https://code.djangoproject.com/ticket/23960
2018-08-12 20:11:31 +02:00
Emmanuel Cazenave
89b7740e04
django 1.11: update ALLOWED_HOSTS in test settings ( #21489 )
2018-08-12 20:11:31 +02:00
Frédéric Péters
620d514cea
api: expose boolean user attributes as booleans ( #25632 )
2018-08-10 17:27:29 +02:00
Benjamin Dauvergne
99a7b14bf0
add a remember me button ( fixes #25579 )
...
It simply use session.set_expiry() to augment the session duration.
2018-08-03 18:52:22 +02:00
Benjamin Dauvergne
7cdda30e99
fix warning in test_clean_unused_account
2018-08-03 18:52:22 +02:00
Benjamin Dauvergne
6c3740b75d
return to manager after logout ( fixes #25581 )
2018-08-03 17:50:21 +02:00
Benjamin Dauvergne
6c1def8a88
use new password widget in manager ( #25045 )
2018-08-03 14:30:48 +02:00
Frédéric Péters
8754e9b2b0
tests: add proper fix for test of validation error message ( #25403 )
2018-07-23 12:17:54 +02:00
Benjamin Dauvergne
9705aef9a6
tests: fix test folowing change in validation error message ( #25403 )
2018-07-23 11:44:11 +02:00
Benjamin Dauvergne
c46822af58
use new password fields in registration form ( fixes #24439 )
2018-07-20 17:07:18 +02:00
Benjamin Dauvergne
773b9c8333
tests: fix NameError (introduced by #25182 )
2018-07-18 11:08:04 +02:00
Benjamin Dauvergne
291dc5e2f9
convert password validation code to new API ( #24833 )
2018-07-18 10:54:22 +02:00
Benjamin Dauvergne
35b3136ef4
add new API to validate passwords ( fixes #24833 )
...
POST /api/validate-password/ HTTP/1.1
Conten-Type: application/json
{"password": "whatever"}
200 Ok
Content-Type: application/json
{
"result": 1,
"ok": false,
"checks": [
{"label": "at least 1 digit", "result": false}
]
}
This API is public.
2018-07-18 10:54:22 +02:00
Benjamin Dauvergne
38298c3192
api: add parameters to filter users by allowed services ( fixes #22377 )
2018-07-17 16:38:35 +02:00
Elias Showk
835e0cf940
replace django.utils.timezone.UTC by utc ( #25313 )
2018-07-17 16:26:10 +02:00
Benjamin Dauvergne
2f0ae6bacf
idp_oidc: fix synchronization API calls when OIDC client use UUID identifier policy ( fixes #25182 )
2018-07-17 16:15:55 +02:00
Emmanuel Cazenave
7d53bfcb3c
delete some django < 1.8 compatiblity code ( #25097 )
2018-07-17 15:56:52 +02:00
Emmanuel Cazenave
30708c0c7c
test custom fields using SubfieldBase ( #24869 )
2018-07-17 15:52:49 +02:00