Éloi Rivard
309511e91c
feat: generic blueprint HTTP 404 error handler
...
This allows blueprint to handle 404 errors. This is not supported
directly in Flask.
https://flask.palletsprojects.com/en/stable/errorhandling/#handling
However, the blueprint cannot handle 404 routing errors because the
404 occurs at the routing level before the blueprint can be determined.
2024-12-11 23:19:22 +01:00
Éloi Rivard
92214d932d
wip
2024-12-11 17:46:14 +01:00
Éloi Rivard
a299bb92ba
feat: basic SCIM server implementation
2024-12-11 17:35:16 +01:00
Félix Rohrlich
e1d70ef8cd
feat : Added sms OTP authentication and multi-factor authentication methods chaining
2024-12-10 11:27:18 +01:00
Félix Rohrlich
6d48ce9043
feat: Added email OTP authentication
2024-12-10 11:27:18 +01:00
Félix Rohrlich
b01e8323d8
feat : Added HOTP authentication and CLI Multi-factor authentication reset
2024-12-10 11:27:18 +01:00
Félix Rohrlich
74e0c8d635
feat : Added time one-time password (TOTP) authentication
2024-12-10 11:27:18 +01:00
Éloi Rivard
13a98fda2c
doc: ACL permissions wording
2024-12-08 12:22:41 +01:00
Stéphane
9172a4adab
doc: fix: spellcheck some words
2024-12-07 15:56:17 +01:00
Éloi Rivard
aa57daf7ce
chore: bump to zxcvbn-py-rs 0.2.0
2024-12-06 15:22:40 +01:00
Éloi Rivard
21464e952a
fix: do not automatically load .env files
2024-12-05 15:14:12 +01:00
Éloi Rivard
6d8799d052
refactor: use the Features class to know if a feature is available
...
instead of simply looking at the configuration
2024-12-05 12:20:30 +01:00
Éloi Rivard
eb955ad5dc
chore: make converters work with model ids
2024-12-02 17:45:28 +01:00
Éloi Rivard
91c82dad4d
fix: do not attempt to configure email_validator if absent
2024-11-22 15:21:18 +01:00
Éloi Rivard
3ecda0ceab
doc: password compromission details
2024-11-21 10:43:31 +01:00
Éloi Rivard
77667c6f52
refactor: all domains used in the unit test suite are now .test
...
this ensures they will never be valid, and will never generate real
world requests
2024-11-20 23:30:48 +01:00
Éloi Rivard
6fa86cb5b2
refactor: PEP20 flat is better than nested
2024-11-20 14:27:18 +01:00
Éloi Rivard
b0e38b6f71
refactor: PEP20 flat is better than nested
2024-11-20 14:26:05 +01:00
sebastien
0fc5afb0bd
changes flash message category to info because, informing the admin is not a success but an information for the user
2024-11-19 16:11:23 +01:00
sebastien
aaa17c2545
hotfix update previous commit
2024-11-19 14:48:56 +01:00
sebastien
bfff1bcdc1
refacto form test: separating htmx request and form submit
2024-11-19 14:46:38 +01:00
sebastien
b49f1df395
Adds configuration variable for hibp api url
2024-11-19 11:20:25 +01:00
sebastien
d18b555204
adds new log when HIBP API call fails
2024-11-19 09:11:02 +01:00
sebastien
9b8f8e9cd4
updates configuration and config.sample and demo config files toinclude new parameters. adds new tests for configuration condition.
2024-11-15 16:28:21 +01:00
sebastien
d6dfd439f3
adds tests for ENABLE_PASSWORD_COMPROMISSION_CHECK config
2024-11-14 16:10:43 +01:00
sebastien
ec43d9157f
avoids api call from tests
2024-11-14 15:32:31 +01:00
sebastien
2787252d81
the only receiver of mail when the request on HIBP api have failed is current_app.config[CANAILLE][ADMIN_EMAIL] defined in config.
2024-11-13 16:24:35 +01:00
sebastien
4c146cc970
changes flash message when the password is compromised.
2024-11-13 16:21:52 +01:00
sebastien
2a57a05155
adds configuration option set by default False to check password compromise
2024-11-13 16:12:50 +01:00
sebastien
62ceadb64f
refacto : isolate function to avoid import loops and clarify the role of the function (not in core because 'utils', not in mail to ovaid loop, not in form because not form)
2024-11-12 16:48:15 +01:00
sebastien yaal
7b7ec74b9f
Merge branch 'main' into '179-check-passwords-on-compromised-password-databases'
...
# Conflicts:
# CHANGES.rst
2024-11-12 08:34:10 +00:00
sebastien
8284a41234
refacto for tests
2024-11-12 09:17:22 +01:00
sebastien
8104bbf03e
adds new condition to help with tests and inform correctly the user with sending mail to admins if compromise password check failed
2024-11-08 15:19:11 +01:00
sebastien
f173a66793
adds new tests for compromised_password_check_failure situation.
2024-11-07 15:51:21 +01:00
Éloi Rivard
a012814eca
chore: enable flake8-bugbear ruff rules
2024-11-07 11:44:29 +01:00
sebastien
9844818280
Merge branch '179-check-passwords-on-compromised-password-databases' of gitlab.com:yaal/canaille into 179-check-passwords-on-compromised-password-databases
2024-11-07 10:34:12 +01:00
sebastien
e6a9f2dcc6
Merge branch 'main' of gitlab.com:yaal/canaille into 179-check-passwords-on-compromised-password-databases
2024-11-07 09:15:29 +01:00
sebastien
56f0c9b51b
hotfix api url following manual failed request tests
2024-11-06 13:51:50 +01:00
sebastien
025da08fd3
adds flash message for user when password compromise investigation failed.
2024-11-06 13:05:32 +01:00
sebastien
fa3a5f6616
gets the emails of each admin to send them the compromised_password_check_failure_mail
2024-11-06 12:56:35 +01:00
Éloi Rivard
fe8e1160ab
refactor: move session related methods in a dedicated file
2024-11-06 09:10:43 +01:00
sebastien
9708809714
updates file names, variable names to be clearer.
2024-11-05 16:18:45 +01:00
sebastien
ca7f718353
adds mail sending to admin if failure of api HIBP request to check if password is compromised
2024-11-05 15:43:15 +01:00
sebastien
093397256b
fix url typo
2024-11-04 11:15:32 +01:00
sebastien
0acbb40ecd
consumes haveibeenpwned API directly
2024-11-04 08:55:55 +01:00
sebastien yaal
a4bd03f71c
feat: password strength indicator
2024-10-28 21:17:47 +00:00
Éloi Rivard
0b51b01031
refactor: apply ruff migrations for python 3.10+
2024-10-28 09:13:00 +01:00
Éloi Rivard
3a3cd304b8
tests: refactor logging tests
...
add restaure 100% coverage
2024-10-27 21:46:47 +01:00
Éloi Rivard
52031dd2c4
refactor: move logging machinery in its own dedicated file
2024-10-27 13:54:14 +01:00
Éloi Rivard
c28a1e9351
fix: display a 500 error when SMTP configuration is defined but null
...
this improves tests coverage
2024-09-15 17:58:03 +02:00