Marcelo Moreira de Mello
9588ff3b4f
Merge pull request #10965 from tchellomello/fix_ldap_dn
...
Associates ldap_dn on a first User() login
2021-08-31 14:25:26 -04:00
Marcelo Moreira de Mello
e23e634974
Associate ldap_dn on a first User() login
...
To avoid calling the user.save() on every single login (PR#9703)
we can check if the user.profile is available. For new users,
accessing the user.profile throws an ValueError exception which
is capture on this fix.
Example:
----
>>> _ = user.profile
*** ValueError: save() prohibited to prevent data loss due to unsaved related object 'user'.
>>> User.objects.filter(username=user.username).count()
0
This way, the user.save() gets called for brand users and will get the
ldap_dn associated as expected.
2021-08-29 22:02:00 -04:00
nixocio
f85b2b6352
Merge ui and ui_next in one dir
...
Merge ui and ui_next in one dir
See: https://github.com/ansible/awx/issues/10676
Update django .po files
Update django .po files
Run `awx-manage makemessages`.
2021-08-02 10:40:24 -04:00
Shane McDonald
cd33db037d
Merge pull request #9703 from tchellomello/double_ldap
...
Avoid double LDAP updates
2021-07-22 15:54:29 -04:00
Christian M. Adams
06b04007a0
Rename managed_by_tower to managed
2021-06-22 10:49:36 -04:00
Jeff Bradberry
5c664eadf9
Write a thin wrapper around the standard Django auth backend
2021-05-13 13:55:44 -04:00
Bill Nottingham
c8cf28f266
Assorted renaming and string changes
2021-04-30 14:32:05 -04:00
Ryan Petrello
8ea247123a
automatically setup default Galaxy credentials on SAML login
2021-04-07 10:19:19 -04:00
Marcelo Moreira de Mello
fd3475a813
Only update LDAP user when necessary
2021-03-25 11:10:11 -04:00
Ryan Petrello
c2ef0a6500
move code linting to a stricter pep8-esque auto-formatting tool, black
2021-03-23 09:39:58 -04:00
fedora
29520f1ca6
fix for issue 4696(tower) , Upstream commit for tower PR 4840
2021-02-17 10:14:06 -05:00
Egor Margineanu
b8790db84a
[PATCH] Rebase and update the Settings options file. Source: 65b4811
...
Fixed Github Enterprise labels
2021-01-29 23:41:12 +01:00
Egor Margineanu
604b42929d
Improved labels and help text for Github Enterprise SSO configuration fields.
...
Signed-off-by: Egor Margineanu <egor.margineanu@gmail.com >
2021-01-29 13:09:40 +01:00
Egor Margineanu
a90ff45e98
Added changes from 645701a and 4692e2f
2021-01-29 13:09:40 +01:00
mabashian
d461090415
Adds support for github enterprise auth methods in ui_next
2021-01-29 13:09:27 +01:00
Egor Margineanu
9ccee200f3
Removed GHE forms from ui folder
...
Fixed org/team field names based on @constreference feedback
Added support for Github Enteprise for authentication
2021-01-29 13:01:08 +01:00
Jake McDermott
b2341408b9
Fix 500 on unhandled group param type
2020-12-16 16:06:29 -05:00
mabashian
889eb2331c
Adds support for GitHub, Azure AD, Google and SAML auth to the UI
2020-12-08 17:28:03 -05:00
Bill Nottingham
bc22fa56dc
Fix 500 when required LDAP group parameters aren't set.
2020-10-05 22:15:20 -07:00
Marliana Lara
558dfb685e
Add a new key "unit" to api setting fields
...
* Add detail popover
* Fix broken redirects
* Add additional id and data-cy attributes to Detail components
* Remove galaxy fields from job settings
2020-09-25 14:00:27 -04:00
Marliana Lara
0732b047b5
Replace setting term with inclusive language
2020-09-22 15:09:55 -04:00
Ryan Petrello
a6d26d7dab
add the ability to prevent SAML auto-population behavior
2020-09-03 11:21:14 -04:00
Marcelo Moreira de Mello
3f8bc0d7c8
Adds SAML Attribute Mapping to Teams and Orgs
...
Signed-off-by: Marcelo Moreira de Mello <tchello.mello@gmail.com >
2020-06-08 12:40:33 -04:00
Ryan Petrello
b1f56df930
fix linting failures
2020-01-13 15:58:19 -05:00
Seth Foster
7873d08311
Update pip and setuptools in requirements txt
...
Versions selected to be pre-19 pip
due to unresolved issues with the build systems
Upgrade everything, party on
document new process
rotate license files
fix Swagger schema generation target
Remove --ignore-installed flag
2020-01-07 17:14:32 -06:00
Nikhil Jain
93dda04fd0
fix the saml_admin_attr not working
2019-12-13 15:11:23 +05:30
Seth Foster
7e83ddc968
Fix URLField to allow numbers in top level domain
...
Add a custom regex to URLField that allows numbers to be present in the
top level domain, e.g. https://towerhost.org42
Set by variable allow_numbers_in_top_level_domain in URLField __init__,
and is set to True by default. If set to False, it will use the regex
specified in the built-in django URLValidator class.
This solution was originally implemented in LDAPServerURIField, but is
now implemented in URLField to support this behavior more generally. The
changes in LDAPServerURIField are longer needed and have been removed in
this commit.
Adds unit testing to make sure URLField changes handle regex input
and settings correctly.
2019-10-28 13:47:01 -04:00
Bill Nottingham
36571a1275
Fix SAML login when only certain attributes are set.
...
The user may not set all of saml_{attr,admin_attr,auditor_attr},
so don't assume they all exist.
2019-09-20 15:28:38 -04:00
Seth Foster
ca5de6378a
Fix LDAPServerURIField number in domain
...
- Bug: API error if LDAPServerURIField contains a number in the top level domain
- Add custom regex in LDAPServerURIField class that is passed to django
URLValidator
- The custom regex allows for numbers to be present in the top level domain
- Unit tests check that valid URIs pass through URLValidator, and that
invalid URIs raise the correct exception
- Related to issue #3646
2019-09-20 10:36:47 -04:00
Bill Nottingham
bbf28f50bd
Allow mapping org auditors where we map org admins.
2019-08-13 11:32:35 -04:00
Jeff Bradberry
172864a3a1
Force the username and password to be strings under the Radius backend
...
The base Radius backend encodes them as utf-8 bytes, which causes the
User object that we create to get the repr of the username, including
the b prefix and single quotes, e.g. "b'foo'".
2019-07-12 15:11:22 -04:00
Jeff Bradberry
a691340986
Update authenticate method on auth backends to add required request param
...
This became mandatory in Django 2.1.
2019-07-12 15:11:22 -04:00
Jeff Bradberry
2d81923e22
Fix up changes in fields in the migrations
...
Particularly the now-required on_delete parameter for ForeignKey and
OneToOneField.
2019-07-12 15:11:22 -04:00
Jeff Bradberry
1093a662f1
Fix a problem with a change in results from User.has_usable_password
2019-07-12 15:11:22 -04:00
Jeff Bradberry
bcbb768dd3
Remove the use of the deprecated Field.rel attribute
...
Also, rename a number of variables named `rel` for ease of searching.
2019-07-12 15:11:21 -04:00
Jeff Bradberry
e0693d3746
is_anonymous and is_authenticated no longer support being called as methods
2019-07-12 15:11:21 -04:00
Jeff Bradberry
758ad164fe
Include defined fields from all parent classes of a HybridDictField
...
since our settings registry adds a mixin class when doing validation on these.
related #4099
2019-07-08 16:05:03 -04:00
Ryan Petrello
0dcbafaccb
fix a bug that breaks OPT_X_TLS_REQUIRE_CERT=0 for LDAP authentication
2019-07-05 10:24:18 -04:00
Ryan Petrello
11b36982cd
fix a bug that causes LDAP TLS connection flags to not be set properly
...
co-authored-by: Jim Ladd <jladd@redhat.com >
2019-06-28 22:15:35 -04:00
Ryan Petrello
d8bd72054d
work around a unit test that's periodically flaky
2019-06-14 10:05:41 -04:00
Jeff Bradberry
2a81643308
Refactor the SSO serializer fields to follow the DRF idioms more closely
...
and fix the tests to handle the newer nested validation checks properly.
2019-06-12 14:12:59 -04:00
Jeff Bradberry
76d4de24df
Handle a change in the error message for BooleanField
...
related encode/django-rest-framework#5881
2019-06-12 14:12:59 -04:00
beeankha
6fb173da8a
Remove redundant methods from SocialAuthMiddleware class
2019-05-15 12:54:00 -04:00
beeankha
68800d0e8e
Make custom middleware use new style vs old
2019-05-14 13:37:34 -04:00
AlanCoding
8c2b3e9b84
Fix Django 2.0 deprecation warnings
2019-04-22 14:17:14 -04:00
Ryan Petrello
85898fd708
remove more unnecessary feature flagging for AUTHENTICATION_BACKENDS
2019-04-12 11:28:27 -04:00
beeankha
de34a64115
Basic License feature gating changes
2019-04-12 11:28:27 -04:00
Ryan Petrello
9bebf3217e
remove usage of import * and enforce F405 in our linter
...
import * is a scourge upon the earth
2019-02-13 17:10:33 -05:00
Ryan Petrello
daeeaf413a
clean up unnecessary usage of the six library (awx only supports py3)
2019-01-25 00:19:48 -05:00
Ryan Petrello
8cb8e63db5
fix a py3 bug that breaks the SSO complete endpoint
2019-01-21 17:04:13 -05:00