Jens Langhammer
37a432267d
Squashed commit of the following:
...
commit 88029a4335
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 16:55:55 2020 +0200
admin: update to work with new form
commit 4040eb9619
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 16:43:30 2020 +0200
*: remove path-based import from all PropertyMappings
commit c9663a08da
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 16:33:34 2020 +0200
flows: update work with new stages
commit a3d92ebc0a
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 16:23:30 2020 +0200
stages/*: remove path-based import from all stages
commit 6fa825e372
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 16:03:55 2020 +0200
providers/*: remove path-based import from all providers
commit 6aefd072c8
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 15:58:48 2020 +0200
policies/*: remove path-based import from all policies
commit ac2dd3611f
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 15:11:27 2020 +0200
sources/*: remove path-based import from all sources
commit 74e628ce9c
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 14:43:38 2020 +0200
ui: allow overriding of verbose_name
commit d4ee18ee32
Author: Jens Langhammer <jens.langhammer@beryju.org>
Date: Mon Jul 20 14:08:27 2020 +0200
sources/oauth: migrate from discordapp.com to discord.com
2020-07-20 18:17:14 +02:00
Jens Langhammer
b452e751ea
flows: add SESSION_KEY_APPLICATION_PRE
...
whenever a user tries to access an application without being authenticated to passbook, we now show notice which application they are going to continue to.
2020-07-12 22:47:46 +02:00
Jens Langhammer
2dc1b65718
ui: fix modal layout
2020-07-06 20:50:14 +02:00
Jens Langhammer
2402cfe29d
providers/* use name for __str__
2020-07-05 23:00:40 +02:00
Jens Langhammer
bead19c64c
flows: cleanup denied view, use everywhere
2020-07-02 13:48:42 +02:00
Jens Langhammer
cc0b8164b0
providers/*: use PolicyAccessMixin to simplify
2020-07-01 23:18:10 +02:00
Jens Langhammer
d33f632203
flows: add CancelView to cancel current flow execution
2020-06-30 00:11:01 +02:00
Jens Langhammer
03b1a67b44
flows: change wording of consent on flows
2020-06-19 20:33:41 +02:00
Jens Langhammer
3a40e50fa0
providers/oidc: add template for consent
2020-06-19 20:19:31 +02:00
Jens Langhammer
73e7158178
e2e: add OIDC Provider test against grafana, more formatting, minor bug fixes
2020-06-19 19:45:27 +02:00
Jens Langhammer
8c6a4a4968
e2e: test against standalone chrome instance, start implementing oidc provider test
2020-06-19 18:19:20 +02:00
Jens L
4915205678
WIP Use Flows for Sources and Providers ( #32 )
...
* core: start migrating to flows for authorisation
* sources/oauth: start type-hinting
* core: create default user
* core: only show user delete button if an unenrollment flow exists
* flows: Correctly check initial policies on flow with context
* policies: add more verbosity to engine
* sources/oauth: migrate to flows
* sources/oauth: fix typing errors
* flows: add more tests
* sources/oauth: start implementing unittests
* sources/ldap: add option to disable user sync, move connection init to model
* sources/ldap: re-add default PropertyMappings
* providers/saml: re-add default PropertyMappings
* admin: fix missing stage count
* stages/identification: fix sources not being shown
* crypto: fix being unable to save with private key
* crypto: re-add default self-signed keypair
* policies: rewrite cache_key to prevent wrong cache
* sources/saml: migrate to flows for auth and enrollment
* stages/consent: add new stage
* admin: fix PropertyMapping widget not rendering properly
* core: provider.authorization_flow is mandatory
* flows: add support for "autosubmit" attribute on form
* flows: add InMemoryStage for dynamic stages
* flows: optionally allow empty flows from FlowPlanner
* providers/saml: update to authorization_flow
* sources/*: fix flow executor URL
* flows: fix pylint error
* flows: wrap responses in JSON object to easily handle redirects
* flow: dont cache plan's context
* providers/oauth: rewrite OAuth2 Provider to use flows
* providers/*: update docstrings of models
* core: fix forms not passing help_text through safe
* flows: fix HttpResponses not being converted to JSON
* providers/oidc: rewrite to use flows
* flows: fix linting
2020-06-07 16:35:08 +02:00
Jens L
df8995deed
policies/*: remove Policy.negate, order, timeout ( #39 )
...
policies: rewrite engine to use PolicyBinding for order/negate/timeout
policies: rewrite engine to use PolicyResult instead of tuple
2020-05-28 21:45:54 +02:00
Jens L
24a3e787dd
migrate to per-model UUID Primary key, remove UUIDModel ( #26 )
...
* *: migrate to per-model UUID Primary key, remove UUIDModel
* *: fix import order, fix unittests
2020-05-20 09:17:06 +02:00
Jens Langhammer
a5319fc2fe
*: rename templatetags to clearly identify
2020-05-15 10:54:31 +02:00
Jens Langhammer
80c3246333
policies/expression: add pb_flow_plan variable
2020-05-13 18:44:36 +02:00
Jens Langhammer
e12780f78f
flows: add invalidation designation, use as default logout action
2020-05-11 01:12:57 +02:00
Jens Langhammer
80d90b91e8
core: add general admin.py loader, remove individual files
2020-05-07 00:05:10 +02:00
Jens Langhammer
f6c322be27
providers/oidc: fix skip_authorization not being synced to oidc_client
2020-03-02 17:40:38 +01:00
Jens Langhammer
a144552059
providers/oidc: fill claims with userinfo
2020-03-01 22:55:56 +01:00
Jens Langhammer
484dd6de09
providers/oidc: add error template
2020-02-24 14:19:02 +01:00
Jens Langhammer
4daa70c894
core: fix saving of policy not correctly clearing it's cache
2020-02-24 13:15:52 +01:00
Jens Langhammer
155c9a4c3f
ui: update remaining forms, completely remove jQuery
2020-02-24 13:13:28 +01:00
Jens Langhammer
88c1ad4c1c
providers/saml: fix 500 when SAML Provider not assigned to application
2020-02-21 20:54:00 +01:00
Jens Langhammer
1147c4901b
ui: clean up some more remaining templates
2020-02-21 20:40:40 +01:00
Jens Langhammer
ea6a1422f7
ui: rewrite admin templates to pf4, add some helper scripts
2020-02-21 14:20:16 +01:00
Jens Langhammer
9267d0c1dd
all: general maintenance, prepare for pyright
2020-02-18 22:12:51 +01:00
Jens Langhammer
8142e3df45
providers/oidc: fix application property of wrong object being used
2020-01-02 20:19:53 +01:00
Jens Langhammer
86f16e2781
providers/oidc: fix incorrectly sorted imports
2020-01-02 16:42:52 +01:00
Jens Langhammer
edeed18ae8
providers/oidc: fix error when using with app_gw
2020-01-02 16:38:01 +01:00
Jens Langhammer
766518ee0e
audit: sanitize kwargs when creating audit event
2019-12-31 13:33:07 +01:00
Jens Langhammer
3bd1eadd51
all: implement black as code formatter
2019-12-31 12:51:16 +01:00
Jens Langhammer
31ea2e7139
audit: fix internal server error from passing models
2019-12-31 11:40:03 +01:00
Jens Langhammer
b428ec5237
providers/oidc: remove duplicate fields
2019-12-14 14:28:36 +01:00
Jens Langhammer
807cbbeaaf
audit: rewrite to be independent of django http requests, allow custom actions
2019-12-05 16:14:08 +01:00
Langhammer, Jens
08f0aca894
provider/oidc(minor): include claims in id_token
2019-11-11 13:19:54 +01:00
Langhammer, Jens
cffe09b02e
all(major): add most models to API
2019-10-28 17:40:57 +01:00
Langhammer, Jens
ffca957838
audit(major): AuditEntry -> Event
2019-10-28 14:26:34 +01:00
Langhammer, Jens
d4cb1a98c7
policy(major): simplify PolicyEngine API, add flag to ignore cache for debug purposes
2019-10-15 15:44:59 +02:00
Langhammer, Jens
b1e4e32b83
providers/oidc(minor): correctly create audit entry on authz
2019-10-08 14:34:59 +02:00
Langhammer, Jens
f2acc154cd
*(minor): small refactor
2019-10-07 16:33:48 +02:00