-
Notifications
You must be signed in to change notification settings - Fork 80
Update backends.py #1259
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: dev_v4
Are you sure you want to change the base?
Update backends.py #1259
Conversation
* Upgrade securtity dependances * Remove deprecated django-tagging * Add new django-tagulous * Elasticsearch default version is Now 8 (remove compatibility with ES 6) * Replace deprecated ugettext_lazy by gettext_lazy * Add some temporary deprecations Hacks for cas-client & Chunked-upload * Replace deprecated url() by re_path() * Disable all Pods apps by default * Correct error handling for ElasticSearch
# Conflicts: # pod/settings.py
* Replace some re_path() by path()
* Replace remaining ugettext by gettext
* Replace admin.site.register() call by @admin.register decorator
* Replace HTTP_X_REQUESTED_WITH by `headers={"x-requested-with"`
* Replace request.META by headers
* Replace `assertQuerysetEqual` by `assertQuerySetEqual`
* Replace force_text by force_str
* Remove default_app_config in __init__.py
…select2 CSS calls) * Correct Enrichment form validation process
* Replace Django 3.2 by 4.2 in all links
# Conflicts: # pod/settings.py
Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
* Disable Shib Middleware tests as it seems deprecated
+ remove some ES deprecations
Badatos
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Bonjour Fred, Merci pour cette PR ;)
Est-ce que tu peux ajouter une explication dans le configuration.json sur nouveau paramètre OIDC_CLAIM_AFFILIATIONstp ?
|
... et au passage, si tu peux ajouter un test unitaire qui s'assure que ce parametre fait bien son job stp ? |
Ajout du paramètre OIDC_CLAIM_AFFILIATION permettant de récupérer les affiliations
Ajout du paramètre OIDC_CLAIM_AFFILIATION pour récupérer les affiliations
Ajout du paramètre OIDC_CLAIM_AFFILIATION
|
Désolé mais c'est bon j'ai modifié le fichier configuration.json. |
Merci ;) Pour les tests, ca se passe dans le dossier "tests" de l'appli à tester. Pour l'OIDC, je dirais qu'il faut ajouter une fonction dans la classe "PopulatedOIDCTestCase" de |
Ajout test test_OIDC_user_with_multiple_claim_access_groups pour tester l'affectation multiple d'un utilisateur à des accessgroup contenu dans un "claim" OIDC
| OIDC_OP_USER_ENDPOINT="https://auth.server.com/oauth/userinfo", | ||
| OIDC_DEFAULT_ACCESS_GROUP_CODE_NAMES=["specific"], | ||
| ) | ||
| def test_OIDC_user_with_default_access_group(self) -> None: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Attention, ici tu as perdu l'info OIDC_DEFAULT_ACCESS_GROUP_CODE_NAMES=["specific"] c'est voulu ?
Refactorisation du code suite aux remarques de flake8
|
Hello Fred ! |
# Conflicts: # .github/workflows/pod_dev.yml # pod/authentication/tests/test_populated.py # pod/authentication/tests/test_views.py # pod/authentication/urls.py # pod/authentication/views.py # pod/settings.py # pod/urls.py # requirements.txt
|
@FBrosset , si tu passes par là, peux-tu jeter un œil à cette PR stp ? |
|
Salut Olivier |
Affectation automatique des utilisateurs dans un accessgroup pour une authentification OIDC
Before sending your pull request, make sure the following are done
developbranch.[WIP]or[DONE].