Commit Graph

2988 Commits

Author SHA1 Message Date
Xavier
0385422d69 Improve #1700 test 2019-04-09 07:16:05 +02:00
Xavier
577d4d0469 Improve #1700 test 2019-04-08 22:30:35 +02:00
Xavier
0ea69bb87d Improve #1700 test 2019-04-08 21:56:35 +02:00
Xavier
ce00317db8 Add AuthBasic test (#1700) 2019-04-08 21:52:59 +02:00
maudoux
046d740109 Fix regex unit tests (#1664) 2019-04-06 21:45:07 +02:00
maudoux
2fabde045b Fix RexExp in unit test (#1694) 2019-04-06 14:09:58 +02:00
maudoux
1bc519d11d Fix warning (#1694) 2019-04-06 14:09:58 +02:00
Maxime Besson
666e59ad6e Fix #1698 by clearing saml request token on unauth issuer flow
Add some unit tests to make sure relevant pdata is cleared after authentication
2019-04-05 23:27:21 +02:00
maudoux
c573ec9625 Typo & upadte version 2019-04-05 22:58:48 +02:00
maudoux
956d934a93 Append GPG authentication level (#1699) 2019-04-05 22:38:20 +02:00
maudoux
85551ba5e1 Append REST authentication level (#1699) 2019-04-05 22:38:01 +02:00
Christophe Maudoux
cf36b44162 Cleaning code (#1664) 2019-04-05 20:04:17 +02:00
Christophe Maudoux
dc1f36daf0 Use OTT rule (#1664) 2019-04-05 20:03:42 +02:00
Christophe Maudoux
f4801f3587 Use OTT rule (#1664) 2019-04-05 20:03:37 +02:00
Christophe Maudoux
01006fc984 Use OTT rule (#1664) 2019-04-05 20:03:25 +02:00
Christophe Maudoux
64952d670e Improve unit test (#1664) 2019-04-05 20:02:24 +02:00
Christophe Maudoux
cb53973881 Use OTT rule (#1694) 2019-04-05 17:24:16 +02:00
Christophe Maudoux
5a8a7d483f Use OTT rule (#1694) 2019-04-05 17:24:07 +02:00
Christophe Maudoux
2b818a9c02 Append specific ottRule dependency (#1694) 2019-04-05 17:23:09 +02:00
Xavier Guimard
10e8d51449 Fix Perl::Critic changes 2019-04-05 10:46:43 +02:00
Xavier Guimard
01b5951b73 Merge branch 'v2.0' 2019-04-05 10:10:40 +02:00
Xavier Guimard
2159957c34 Update versions 2019-04-05 09:54:43 +02:00
maudoux
5b67f1f743 Use rule to enable OTT (#1694) 2019-04-03 23:28:45 +02:00
maudoux
72bee11c2a Improve unit test (#1694) 2019-04-03 23:27:45 +02:00
Clément OUDOT
8859fe342b Fix setHiddenFormValue (#1692) 2019-04-03 17:54:58 +02:00
Clément OUDOT
8be0817363 Send optional SAML attributes if they have a value (#1681) 2019-04-03 16:40:41 +02:00
Xavier Guimard
ece9b21219 Remove trailing whitespaces 2019-04-03 14:15:16 +02:00
Xavier Guimard
141ba96c92 Update version 2019-04-03 13:53:56 +02:00
Clément OUDOT
9a454fbb7a Manage SLO termination if there is no RelayState (#1671) 2019-04-03 12:26:01 +02:00
Maxime Besson
4b0994af35 Add unit test for #1668 with multiple SP 2019-04-03 11:20:24 +02:00
Maxime Besson
730da67c44 Add HTTP-Redirect unit test for #1671 2019-04-03 11:20:24 +02:00
Maxime Besson
d44a042fd5 Revert 8f5fbb077e and change the way logout errors are handled
Relating to issue #1668, the proposed fix works when there is only one
service provider to logout of.

Now that multiple service provider logout is starting to work again on
2.0, we cannot read the remote_ProviderID from the logout object because
it is only filled by lasso when actually building the response.

Instead, we ignore any error that could occur when building the
response, log a warning and show the portal instead. Still better than
an internal server error.
2019-04-03 11:20:24 +02:00
Xavier Guimard
0ca4d1a724 Add script to delete session (#1697) 2019-04-03 09:51:32 +02:00
maudoux
e4bc7c55d6 Improve unit test (#1664) 2019-04-02 22:08:15 +02:00
maudoux
ae28ea3169 Append Conf domain to url if missing - Fix port (#1664) 2019-04-02 22:08:15 +02:00
maudoux
ec214c75c2 Append Conf domain to url if missing (#1664) 2019-04-02 22:08:15 +02:00
Clément OUDOT
a805a5a00b Manage SLO responses (#1671) 2019-04-02 17:27:47 +02:00
Clément OUDOT
4e76ee9582 Avoid warning during SAML SLO (#1671) 2019-04-02 16:13:45 +02:00
Clément OUDOT
bac2eb564c Remove antiframe protection in portal javascript (#1696) 2019-04-02 15:05:41 +02:00
Clément OUDOT
c4b4e95e9d Display password or login template after password modification (#1654) 2019-04-02 11:12:33 +02:00
Xavier
4798683129 Merge branch 'v2.0' 2019-04-02 06:56:45 +02:00
Clément OUDOT
4af47ad6a4 Allow iframe from portal to be able to load saml SLO return page (#1671) 2019-04-01 18:09:31 +02:00
Clément OUDOT
5a30a82fa6 Add SLO Termination endpoint (#1671) 2019-04-01 18:02:38 +02:00
Clément OUDOT
59bc0642fc Always display info (#1693) 2019-04-01 17:18:28 +02:00
Clément OUDOT
502a32e257 Add unit test and fix code for ppolicy grace (#1691) 2019-04-01 09:58:56 +02:00
Xavier
01ab88ba57 Fix for #1691 2019-04-01 06:52:21 +02:00
Clément OUDOT
a1f5fb5170 Test return of getUser (#1654) 2019-03-29 11:53:52 +01:00
Xavier
906db8daa6 Merge branch 'antoinerosier/lemonldap-ng-logs' into v2.0 2019-03-27 21:44:25 +01:00
Antoine ROSIER
b79c9659cb Add user logs informations (#1687) 2019-03-27 16:00:39 +01:00
Xavier Guimard
b40f292d8a Merge branch 'v2.0' 2019-03-27 10:31:30 +01:00
Clément OUDOT
4bab684e2d Refresh entry after password modification (#1654) 2019-03-27 09:59:22 +01:00
Xavier
5a5572ec1f Fix WSDL generation (Closes: #1686) 2019-03-26 21:47:14 +01:00
Xavier Guimard
d1bf4efc4d Update translations 2019-03-26 19:02:50 +01:00
Clément OUDOT
39020e003e Fix server error on SAML SLO (#1671) 2019-03-26 17:15:01 +01:00
Clément OUDOT
aa139df89d Change criticity of password must be reset message (#1654) 2019-03-26 16:45:19 +01:00
Xavier Guimard
af4f123916 Fix cspScrip (Closes: #1683) 2019-03-26 09:56:46 +01:00
Xavier Guimard
6a13b4f40d Update META.* 2019-03-26 09:18:04 +01:00
Xavier Guimard
4cb497e5a2 Merge branch 'v2.0' 2019-03-26 08:09:56 +01:00
Xavier Guimard
99afd7243a Fix #1675 2019-03-26 08:06:55 +01:00
Xavier
f226bded41 Partial fix for /logout (#1675) 2019-03-26 07:30:36 +01:00
Xavier
774707ad65 Add cache to avoid parsing and compiling JSON files at each request (#1595) 2019-03-26 06:49:39 +01:00
Xavier
3cea903c79 Merge branch 'v2.0' 2019-03-25 22:14:10 +01:00
Xavier
81c88216b0 Fix forced french display (Fixes: #1657) 2019-03-25 21:46:17 +01:00
Xavier Guimard
3c0a9d7ecc Second fix for #1673 2019-03-25 19:34:29 +01:00
Xavier Guimard
4138b7edae Fix menu app cache (#1673) 2019-03-25 16:48:57 +01:00
Maxime Besson
3575e0ef23 Clear url pdata on CDA redirection
Fixes #1650
2019-03-19 19:15:47 +01:00
Clément OUDOT
8a9a5b0b3a New method to override messages with JSON files (#1595) 2019-03-19 17:39:13 +01:00
Clément OUDOT
8ab1eb54bf Update MANIFEST 2019-03-19 15:39:13 +01:00
Clément OUDOT
447c09c0a2 Remove old translation file (#1595) 2019-03-19 15:38:36 +01:00
Xavier
4fcf77e721 Merge branch 'v2.0' 2019-03-19 08:32:33 +01:00
Clément OUDOT
438d5bcbaf Revert patch on GrantSession plugin (#1666) 2019-03-18 21:35:02 +01:00
Clément OUDOT
4166ae6d90 Merge branch 'v2.0' of gitlab.ow2.org:lemonldap-ng/lemonldap-ng into v2.0 2019-03-18 21:29:31 +01:00
Clément OUDOT
9798c78068 Remove userData if authentication fails (#1666) 2019-03-18 21:29:15 +01:00
Christophe Maudoux
d412f3d807 Update version (#1666) 2019-03-18 17:14:22 +01:00
Clément OUDOT
4366488fb6 Adapt GrantSession plugin to display authentication error on login form (#1666) 2019-03-18 11:53:30 +01:00
Clément OUDOT
627548e95d Display authentication error on login form (#1666) 2019-03-18 11:41:41 +01:00
Xavier Guimard
b7a78b500e Merge remote-tracking branch 'maxbes/proverc' into v2.0 2019-03-14 17:27:31 +01:00
Maxime Besson
7c16a2f7ad Exclude .proverc from manifests 2019-03-14 16:57:08 +01:00
Maxime Besson
f46260204c Provide configuration for manual launching of unit tests
This commit adds a .proverc configuration in lemonldap-* subdirectories

It allows you to run unit tests easily during development

    make clean && make
    cd lemonldap-ng-portal
    prove t/my-unit-test.t
    prove -v t/my-unit-test.t
    prove t/*.t

You'll get a nice colored output, plenty of details with '-v' (great is
you set logLevel to "debug" in the test), etc.
2019-03-14 16:38:40 +01:00
Xavier Guimard
8941ee4dd5 Merge branch 'v2.0' 2019-03-14 14:57:39 +01:00
Clément OUDOT
d620ae2e8b Merge branch 'maxbes/lemonldap-ng-saml-issuer-entityid-override' into v2.0 2019-03-13 10:30:16 +01:00
Clément OUDOT
dee4818f0c Merge branch 'issue1543' into 'v2.0'
Save Urldc when using SAML Discovery

See merge request lemonldap-ng/lemonldap-ng!62
2019-03-13 10:19:14 +01:00
Maxime Besson
8f5fbb077e When logout-initiating SP has no known SLO endpoint, fallback to portal
In some federations, SLO endpoints are not published, yet SP are still
able to initiate logouts.

This used to cause an error on the portal, this commit changes the error
into a warning in logs. The user remains on the portal and sees a normal
logout message.
2019-03-12 17:58:41 +01:00
Clément OUDOT
f6a3b527c8 Process SAML request to get current SP in env (#1672) 2019-03-12 16:52:01 +01:00
Christophe Maudoux
83603ebee9 Typo 2019-03-12 16:29:38 +01:00
Christophe Maudoux
27d3d165ec Improve unit test (#1658) 2019-03-12 10:24:31 +01:00
Christophe Maudoux
e1aa654bbb Display session at first access (#1658) 2019-03-12 10:00:23 +01:00
Christophe Maudoux
772b82cd94 Improve unit test (#1664) 2019-03-11 22:53:58 +01:00
Christophe Maudoux
d39078f29b Fix specific use cases with rules (#1664) 2019-03-11 22:07:38 +01:00
Maxime Besson
257d329151 Fix display of ok/nok image during multi-sp saml logout 2019-03-11 18:13:06 +01:00
Clément OUDOT
8cd579f19f Add a waiting message for Kerberos/SSL workflow (#1670) 2019-03-11 16:36:32 +01:00
Clément OUDOT
145db1cf60 Fix regexp for portal default condition (#1669) 2019-03-11 12:01:16 +01:00
Christophe Maudoux
58ec712481 Fix debug mode (#1658) 2019-03-10 22:58:23 +01:00
Christophe Maudoux
4ae85e2c97 Tidy 2019-03-10 22:55:21 +01:00
Christophe Maudoux
bb79385a84 Improve unit test (#1664) 2019-03-10 22:53:41 +01:00
Christophe Maudoux
19c26e2cd0 Improve unit test (#1658) 2019-03-10 22:53:26 +01:00
Christophe Maudoux
c48fbf8beb Improve unit tests (#1669) 2019-03-10 22:23:12 +01:00
Christophe Maudoux
6dd9105d0a Improve unit tests (#1658) 2019-03-10 22:02:19 +01:00
Christophe Maudoux
30c0f2edf0 Improve code (#1658) 2019-03-10 22:01:55 +01:00
Christophe Maudoux
30081e9971 Fix unit test (#1658) 2019-03-09 23:52:25 +01:00