Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tesorio-specific changes #5

Merged
merged 2 commits into from
Aug 6, 2019
Merged

Tesorio-specific changes #5

merged 2 commits into from
Aug 6, 2019

Conversation

caioariede
Copy link

No description provided.

@caioariede caioariede requested a review from FabioFleitas August 6, 2019 17:28
@caioariede caioariede merged commit 83d3a7f into fix/rebase_to_2.2.1_a Aug 6, 2019
@caioariede caioariede deleted the fix/fb8208 branch August 6, 2019 17:31
caioariede added a commit that referenced this pull request Aug 6, 2019
* Version 2.1.0, add DEFAULT_NEXT_URL

* Add optional ASSERTION_URL setting

We pass the result of `get_current_domain` to pysaml2 to validate
the source of the incoming StatusResponse (the scheme+host of the
request).

This is not viable in a reverse proxy scenario, in particular when the
host, port, and/or scheme of the django server changes with churn.

As a solution, alter `get_current_domain` to just use a setting
variable, `ASSERTION_URL`, instead of the scheme and host of the
incoming SAML request. If the setting is not present, use the
current behavior.

* Pythonic map value check

* Describe ASSERTION_URL in readme

* Update AUTHORS.rst

* release 2.1.1

* Import reverse from django.url for versions >= 2.0

* removed local temp file creation

see https://pysaml2.readthedocs.io/en/latest/howto/config.html#metadata

* update version 2.1.2

* Use Group.set() instead of assignment for Django 2.0 support

* unquoting the logout view method reference

* adding optional configuration for ADFS SAML compatibility

* Merged PRs and did some cleaning

* Allow pysaml2 to be a more recent version.

* fix django 2 compatibility

* Add name to AUTHORS as requested in docs, added djangorestframework-jwt dependency, made the User model come from get_user_model method

* Added JWT authentication to views.py through use of a settings file. New settings: USE_JWT and FRONTEND_URL. Added django-rest-auth to setup.py

* Better handling of accessing USE_JWT setting in views.py

* Added is True check to USE_JWT setting call

* Added support for local metadata file.

* Added new user creation setting.

* Update README.rst

* fixed is_safe_url in django 2.1

* Tesorio-specific changes (#5)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants