Ralph Bean
452cf47392
Make ldap3 optional, to workaround packaging issues.
2017-09-15 12:50:51 -04:00
mprahl
0f6d7a55c5
Add Kerberos + LDAP authentication support
2017-09-15 12:02:57 -04:00
Filip Valder
7ef2975984
PEP8 fixes
2017-07-17 18:29:10 +02:00
Jakub Kadlčík
05bdece65a
Don't allow NO_AUTH to be anything
2017-03-30 11:21:39 +02:00
Jakub Kadlčík
8626f974cf
Set anonymous owner when NO_AUTH
2017-03-30 11:01:13 +02:00
Jan Kaluza
34c8cc833a
Fix tests and change two places where Forbidden is more accurate than Unauthorized.
2017-03-14 13:40:53 +01:00
Patrick Uiterwijk
a4763ee316
Use the 403 Forbidden result in case the user is unauthorized
...
The difference between 401 Unauthorized and 403 Forbidden is that 403 Forbidden is "permanent":
it indicates that the user was authenticated correctly, but was not allowed to access this endpoint.
In contrast, 401 Unauthorized means that the request as posted was not allowed, but if the user
were to try again with (new) authorization tokens, it might actually succeed.
Signed-off-by: Patrick Uiterwijk <puiterwijk@redhat.com >
2017-03-13 07:34:36 +00:00
Jan Kaluza
b11ea14358
Add OIDC_REQUIRED_SCOPE and fix the test_auth.py to use Authorization header.
2017-03-06 14:56:09 +01:00
Jan Kaluza
0dbc1f8205
Handle None returned by _get_token_info
2017-02-21 09:24:36 +01:00
Ralph Bean
43ebe6d943
Merge #343 Use an authorization header instead of cookie for OIDC authn.
2017-02-21 02:13:30 +00:00
Ralph Bean
64fb5e9a1d
Be nice. Kill whitespace.
2017-02-20 21:12:30 -05:00
Ralph Bean
1bd421e9c2
Merge #340 allow to explicitly disable client authentication
2017-02-21 02:09:48 +00:00
Matt Jia
143effcd15
Error out if OIDC_CLIENT_SECRETS is not set in server config
2017-02-21 11:08:42 +10:00
Matt Jia
be65a0ff81
allow to explicitly disable client authentication
2017-02-21 11:08:37 +10:00
Ralph Bean
61b7b6f47d
Use an authorization header instead of cookie for oidc token.
...
Fixes #330 .
2017-02-20 13:12:00 -05:00
Ralph Bean
0dec5f2d3c
Remove unused import.
2017-02-20 13:07:27 -05:00
Ralph Bean
ef14008927
Split this string, at @puiterwijk's suggestion.
2017-02-20 08:41:36 -05:00
Ralph Bean
54770cdc23
Check that our required OIDC scopes are present.
2017-02-17 10:55:37 -05:00
Matt Prahl
b30a6a8e05
Merge #322 Use requests instead of httplib2 in auth.py
2017-02-17 00:27:42 +00:00
Jakub Kadlčík
47924a2688
Use requests instead of httplib2
2017-02-16 21:52:24 +01:00
Ralph Bean
30daab024e
Handle odd response from OIDC UserInfo.
...
By surprise, ipsilon handed me back a response with no groups one time.
Not sure why. But logging here can hopefully help us catch it next
time.
2017-02-16 14:28:43 -05:00
Ralph Bean
2887e71b29
Mark these functions as "private".
2017-02-10 15:53:36 -05:00
Ralph Bean
88aca055ce
Replace query to FAS with OIDC groups scope check.
...
This removes our query to FAS and fixes #304 .
It is more flexible too, where we can now configure production to only
allow in members of the `modularity-wg` group, and then later open it up
to all packagers after F26 is out (as was agreed with FESCo).
In the process of working on this, I discovered that #305 is not
necessary. We don't need our own scope; we can just use the `groups`
scope as done here.
2017-02-10 15:50:41 -05:00
Jan Kaluza
8b3244405f
Make the OIDC error messages more verbose and include non-secret client-secrets.json
2016-12-05 11:40:00 +01:00
Jan Kaluza
8cb4e0de5d
Use OIDC to auth the users, replace submit-build.sh by submit-build.py which does hackish way of OIDC just to test things.
2016-12-02 14:52:04 +01:00
Matt Prahl
b4082dc551
Rename module from rida to module_build_service
...
Rename routes from /rida/1/module-builds/ to /module-build-service/1/module-builds/
2016-10-24 10:30:23 -04:00