Commit Graph

2875 Commits

Author SHA1 Message Date
Clément OUDOT
bac2eb564c Remove antiframe protection in portal javascript (#1696) 2019-04-02 15:05:41 +02:00
Clément OUDOT
c4b4e95e9d Display password or login template after password modification (#1654) 2019-04-02 11:12:33 +02:00
Clément OUDOT
4af47ad6a4 Allow iframe from portal to be able to load saml SLO return page (#1671) 2019-04-01 18:09:31 +02:00
Clément OUDOT
5a30a82fa6 Add SLO Termination endpoint (#1671) 2019-04-01 18:02:38 +02:00
Clément OUDOT
59bc0642fc Always display info (#1693) 2019-04-01 17:18:28 +02:00
Clément OUDOT
502a32e257 Add unit test and fix code for ppolicy grace (#1691) 2019-04-01 09:58:56 +02:00
Xavier
01ab88ba57 Fix for #1691 2019-04-01 06:52:21 +02:00
Clément OUDOT
a1f5fb5170 Test return of getUser (#1654) 2019-03-29 11:53:52 +01:00
Xavier
906db8daa6 Merge branch 'antoinerosier/lemonldap-ng-logs' into v2.0 2019-03-27 21:44:25 +01:00
Antoine ROSIER
b79c9659cb Add user logs informations (#1687) 2019-03-27 16:00:39 +01:00
Clément OUDOT
4bab684e2d Refresh entry after password modification (#1654) 2019-03-27 09:59:22 +01:00
Xavier
5a5572ec1f Fix WSDL generation (Closes: #1686) 2019-03-26 21:47:14 +01:00
Xavier Guimard
d1bf4efc4d Update translations 2019-03-26 19:02:50 +01:00
Clément OUDOT
39020e003e Fix server error on SAML SLO (#1671) 2019-03-26 17:15:01 +01:00
Clément OUDOT
aa139df89d Change criticity of password must be reset message (#1654) 2019-03-26 16:45:19 +01:00
Xavier Guimard
af4f123916 Fix cspScrip (Closes: #1683) 2019-03-26 09:56:46 +01:00
Xavier Guimard
99afd7243a Fix #1675 2019-03-26 08:06:55 +01:00
Xavier
f226bded41 Partial fix for /logout (#1675) 2019-03-26 07:30:36 +01:00
Xavier
774707ad65 Add cache to avoid parsing and compiling JSON files at each request (#1595) 2019-03-26 06:49:39 +01:00
Xavier
81c88216b0 Fix forced french display (Fixes: #1657) 2019-03-25 21:46:17 +01:00
Xavier Guimard
3c0a9d7ecc Second fix for #1673 2019-03-25 19:34:29 +01:00
Xavier Guimard
4138b7edae Fix menu app cache (#1673) 2019-03-25 16:48:57 +01:00
Maxime Besson
3575e0ef23 Clear url pdata on CDA redirection
Fixes #1650
2019-03-19 19:15:47 +01:00
Clément OUDOT
8a9a5b0b3a New method to override messages with JSON files (#1595) 2019-03-19 17:39:13 +01:00
Clément OUDOT
8ab1eb54bf Update MANIFEST 2019-03-19 15:39:13 +01:00
Clément OUDOT
447c09c0a2 Remove old translation file (#1595) 2019-03-19 15:38:36 +01:00
Clément OUDOT
438d5bcbaf Revert patch on GrantSession plugin (#1666) 2019-03-18 21:35:02 +01:00
Clément OUDOT
4166ae6d90 Merge branch 'v2.0' of gitlab.ow2.org:lemonldap-ng/lemonldap-ng into v2.0 2019-03-18 21:29:31 +01:00
Clément OUDOT
9798c78068 Remove userData if authentication fails (#1666) 2019-03-18 21:29:15 +01:00
Christophe Maudoux
d412f3d807 Update version (#1666) 2019-03-18 17:14:22 +01:00
Clément OUDOT
4366488fb6 Adapt GrantSession plugin to display authentication error on login form (#1666) 2019-03-18 11:53:30 +01:00
Clément OUDOT
627548e95d Display authentication error on login form (#1666) 2019-03-18 11:41:41 +01:00
Xavier Guimard
b7a78b500e Merge remote-tracking branch 'maxbes/proverc' into v2.0 2019-03-14 17:27:31 +01:00
Maxime Besson
7c16a2f7ad Exclude .proverc from manifests 2019-03-14 16:57:08 +01:00
Maxime Besson
f46260204c Provide configuration for manual launching of unit tests
This commit adds a .proverc configuration in lemonldap-* subdirectories

It allows you to run unit tests easily during development

    make clean && make
    cd lemonldap-ng-portal
    prove t/my-unit-test.t
    prove -v t/my-unit-test.t
    prove t/*.t

You'll get a nice colored output, plenty of details with '-v' (great is
you set logLevel to "debug" in the test), etc.
2019-03-14 16:38:40 +01:00
Clément OUDOT
d620ae2e8b Merge branch 'maxbes/lemonldap-ng-saml-issuer-entityid-override' into v2.0 2019-03-13 10:30:16 +01:00
Clément OUDOT
dee4818f0c Merge branch 'issue1543' into 'v2.0'
Save Urldc when using SAML Discovery

See merge request lemonldap-ng/lemonldap-ng!62
2019-03-13 10:19:14 +01:00
Maxime Besson
8f5fbb077e When logout-initiating SP has no known SLO endpoint, fallback to portal
In some federations, SLO endpoints are not published, yet SP are still
able to initiate logouts.

This used to cause an error on the portal, this commit changes the error
into a warning in logs. The user remains on the portal and sees a normal
logout message.
2019-03-12 17:58:41 +01:00
Clément OUDOT
f6a3b527c8 Process SAML request to get current SP in env (#1672) 2019-03-12 16:52:01 +01:00
Christophe Maudoux
83603ebee9 Typo 2019-03-12 16:29:38 +01:00
Christophe Maudoux
27d3d165ec Improve unit test (#1658) 2019-03-12 10:24:31 +01:00
Christophe Maudoux
e1aa654bbb Display session at first access (#1658) 2019-03-12 10:00:23 +01:00
Christophe Maudoux
772b82cd94 Improve unit test (#1664) 2019-03-11 22:53:58 +01:00
Christophe Maudoux
d39078f29b Fix specific use cases with rules (#1664) 2019-03-11 22:07:38 +01:00
Maxime Besson
257d329151 Fix display of ok/nok image during multi-sp saml logout 2019-03-11 18:13:06 +01:00
Clément OUDOT
8cd579f19f Add a waiting message for Kerberos/SSL workflow (#1670) 2019-03-11 16:36:32 +01:00
Clément OUDOT
145db1cf60 Fix regexp for portal default condition (#1669) 2019-03-11 12:01:16 +01:00
Christophe Maudoux
58ec712481 Fix debug mode (#1658) 2019-03-10 22:58:23 +01:00
Christophe Maudoux
4ae85e2c97 Tidy 2019-03-10 22:55:21 +01:00
Christophe Maudoux
bb79385a84 Improve unit test (#1664) 2019-03-10 22:53:41 +01:00