Commit Graph

157 Commits

Author SHA1 Message Date
Khanh Ngo
ea53ae340f Fix LDAP password checking issue due to indention level 2018-11-12 16:30:18 +07:00
Khanh Ngo
e273921195 Merge remote-tracking branch 'chriscpritchard/master' 2018-10-25 15:26:42 +07:00
Khanh Ngo
a39f5c622c
Avoid searching for AD user's memberOf while it is missing and LDAP_GROUP_SECURITY_ENABLED is ON 2018-10-24 13:30:19 +07:00
Khanh Ngo
4a0d580e32 Merge branch 'recursive_activedirectory' 2018-10-24 11:28:43 +07:00
Chris Pritchard
8a20d3f2d8
migrated to authlib 2018-10-22 02:33:46 +01:00
Chris Pritchard
396ce14b9f
OIDC (#1)
Implemented OIDC using authlib
2018-10-21 23:38:12 +01:00
odumasFR
de3d1b3665
Merge branch 'master' into activedirectory_authent 2018-10-09 08:31:18 +02:00
Khanh Ngo
4540d9a293
Merge pull request #379 from jsoref/spelling
Spelling
2018-10-02 14:56:25 +07:00
Josh Soref
5158cf93db spelling: using 2018-10-02 07:29:32 +00:00
Josh Soref
3c7da371d2 spelling: privilege 2018-10-02 07:23:41 +00:00
odumasFR
3f2d14327c
better exception handling for ldap errors 2018-10-01 23:08:45 +02:00
Olivier DUMAS
51043837f0 Recursively find ActiveDirectory groups to check whether user is in LDAP_ADMIN_GROUP or LDAP_OPERATOR_GROUP 2018-10-01 19:27:52 +02:00
Olivier DUMAS
4cd422ee54 Added a session_timeout setting to manage session lifetime 2018-10-01 19:15:09 +02:00
Olivier DUMAS
bee6d1560f Do not use service login/password for AD authentication 2018-09-12 17:28:05 +02:00
Khanh Ngo
ccd2d8c31a Code adjustment as LGTM.com 2018-09-06 11:35:54 +07:00
Khanh Ngo
c8d72f5bba
Merge pull request #345 from ngoduykhanh/user_role_adjustment
Adding Operator role and Code adjustment
2018-09-04 17:42:55 +07:00
Khanh Ngo
902e63a64e
Fixing typo 2018-09-04 13:10:55 +07:00
Khanh Ngo
0081adff36
Sort record list alphabetically if python version < 3.6 2018-09-04 08:57:41 +07:00
Khanh Ngo
26c2b5e169
Adjustment in setting handler to work without initial DB. Discussed in #350 2018-09-03 17:27:09 +07:00
Khanh Ngo
d3c6a9fdb7
Merge pull request #352 from tmuncks/cname-shortcut
Allow CNAMEs to point to '@'
2018-09-02 21:31:39 +07:00
Thomas M Steenholdt
3a5eaaeeb5 Allow CNAMEs to point to '@'
If a CNAME records is specified to point to '@' or '', replace record data with the base domain name.
2018-09-02 11:22:31 -02:00
Khanh Ngo
615413ae90
Add record_quick_edit config to DB 2018-09-02 08:03:01 +07:00
Khanh Ngo
3481af149b
Add option to allow user to create domain 2018-09-01 17:53:05 +07:00
Khanh Ngo
38d1d85a18
Fixing string format 2018-08-31 22:30:08 +07:00
Khanh Ngo
e6f82160c1
Fix python code as suggestion from LGTM 2018-08-31 18:00:41 +07:00
Khanh Ngo
3457d9214a Adding Operator role 2018-08-31 11:57:06 +07:00
Khanh Ngo
07e1bcdc47
Bug fixes. Adjustment in user input validation 2018-08-25 14:53:10 +07:00
Khanh Ngo
66e9be8c7a
Update .travis.yml to use mysql for db. Fix RECORDS_ALLOW_EDIT config key 2018-08-22 21:48:57 +07:00
Khanh Ngo
24aaf7d746
Fix AD group based authentication 2018-08-22 16:55:44 +07:00
Khanh Ngo
9506315a46 manage records_allow_to_edit setting in DB 2018-08-22 08:36:53 +07:00
Khanh Ngo
74a7b5a3b7 Migrate more config values to db 2018-08-21 13:26:27 +07:00
Khanh Ngo
0b7580c82f
Read powerdns api setting from DB 2018-08-20 09:59:19 +07:00
Khanh Ngo
babf62bae0
Fix Github/Google oAuth 2018-08-19 15:29:50 +07:00
Khanh Ngo
ada6f844ff
Read LDAP config from DB instead of file. Adjustment in site titles 2018-08-18 22:42:18 +07:00
Khanh Ngo
4b9349c83e
Create DB config for pdns and authentication setting 2018-08-18 18:41:59 +07:00
Thomas M Steenholdt
0ac33aa3c4 Add option to edit users from the comfort of the UI
Update user management feature to allow editing user details directly in the admin user interface.

Also added an option to reset the two factor authentication data of a user, for when that's needed (lost device, technical issues etc).

(cherry picked from commit 3139616282a18c11463c6ecf78888417b2ac1c35)
2018-08-12 07:47:37 -02:00
Khanh Ngo
9ed09e92fc
Fix ldap authentication 2018-08-09 16:21:42 +07:00
Dennis Schubert
20dcdbbb66
Decode passwords as UTF-8 on profile updates as well
Resolves #324
2018-08-08 04:23:20 +02:00
Khanh Ngo
47d5858fc6 Merge branch 'fix-saml' 2018-08-07 09:09:34 +07:00
Thomas M Steenholdt
0979d9fca0 Tolerate pdns 3.x API deficiencies
PowerDNS 3.x API does not support setting or getting account info.

This patch lets PowerDNS 3.x users use the rest of the interface without problems.
Account stuff still does not work.

A message is logged in debug mode, to help with troubleshooting on newer versions
of PowerDNS.
2018-07-30 09:15:55 -02:00
Khanh Ngo
96a9c12300 Log user's ip address when they login 2018-07-05 14:25:05 +07:00
Ian Bobbitt
480989e86a Manage Account memebership for SAML Users 2018-06-25 12:18:42 +00:00
Thomas M Steenholdt
31305a3048 Add setting to allow/disallow quick editing of records
Adds an `allow_quick_edit` setting, using the improved setting handling logic from PR #287 to toggle whether records are editable by simply clicking the row or not.

Aims to fix #288
2018-06-24 00:25:33 -02:00
Thomas M Steenholdt
4597e55379 Fix typo in function set_maintenance
Fix a simple typo in the `set_maintenance` function in the `Setting` class.

The function does not seem to be actually used anywhere.
2018-06-21 22:10:50 -02:00
Thomas M Steenholdt
6c8a3ac36c Move setting definitions into code (rather than database).
For a setting to be useful, the code has to be able to make sense of it anyway. For this reason it makes sense, that the available settings are defined within the code, rather than in the database, where a missing row has previously caused problems. Instead, settings are now written to the database, when they are changed.

So instead of relying on the database initialization process to create all available settings for us in the database, the supported settings and their defaults are now in a `defaults` dict in the Setting class. With this in place, we can stop populating the `setting` table as a part of database initialization and it will be much easier to support new settings in the future (we no longer need to do anything to the database, to achieve that).

Another benefit is that any changes to default values will take effect automatically, unless the admin has already modified that setting to his/her liking.

To make it easier to get the value of a setting, falling back to defaults etc, a new function `get` has been added to the Setting class. Call it as `Setting().get('setting_name'), and it will take care of returning a setting from the database or return the default value for that setting, if nothing was found.

The `get` function returns `None`, if the setting passed to the function, does not exist in the `Setting.defaults` dict - Indicating that we don't know of a setting by that name.
2018-06-21 22:06:38 -02:00
Khanh Ngo
8a22e030cd
Merge and resolve the conflicts from master 2018-06-13 09:35:19 +07:00
Khanh Ngo
aa6909065d Merge remote-tracking branch 'tmuncks/initial-accounts' 2018-06-12 16:17:55 +07:00
Khanh Ngo
003310665c Merge branch 'master' into flask_migrate 2018-06-11 17:05:01 +07:00
Khanh Ngo
a6f0bf26d4
Use Flask-Migrate for db migration 2018-06-11 10:58:47 +07:00
Thomas M Steenholdt
0a670845fa Automatically rectify DNSSEC enabled zones
For DNSSEC enabled zones to function correctly, they need to be rectified on update.

This changes the DNSSEC enable/disable code to set API-RECTIFY:

To `true` when activating DNSSEC on a domain
To `false` when deactivating DNSSEC on a domain

With this, PowerDNS promises to handle the needed rectifications.

(cherry picked from commit 5d15d8899cc03a4a7d433d33c2c4b1da09b5eb2d)
2018-06-10 21:47:19 -02:00