52298f8289
Support login in through REMOTE_USER environment variable
...
Support redirecting remote users to logout URL and clearing remote login cookies
2020-05-22 15:31:24 +01:00
3476c8a9ec
SJS Sort rrset members by content before comparison to ensure correct compare. Also default comment to blank entry rather than missing entry, to allow sorting to work correctly.
2020-05-20 16:21:28 +12:00
fd0485d897
Merge remote-tracking branch 'keesbos/mgmt'
2020-05-17 19:43:45 +07:00
78245d339f
Merge pull request #717 from RoeiGanor/master
...
OIDC custom claims
2020-05-17 13:44:52 +07:00
2044ce4737
oidc custom claims
2020-05-04 07:12:48 +00:00
33eff6313f
Fix loading zone with Slave type
2020-05-02 09:41:01 +07:00
b03cbdea65
Azure oauth: Graph api calls it mail, not email
2020-04-30 12:15:19 +02:00
b8442c4c5c
Azure oauth: remove preferredName from query
2020-04-30 12:14:32 +02:00
02692c7759
Code formating
2020-04-30 10:17:08 +07:00
0e093d4eec
Support only having one auth method enabled (which isn't ldap/local)
2020-04-16 16:04:10 +08:00
e550b0a109
SAML debug attributes
2020-03-25 21:05:30 +00:00
31d19b19ab
Merge remote-tracking branch 'eht16/add_ssl_verify_setting'
2020-01-29 22:33:24 +07:00
dbb181d575
Merge pull request #647 from eht16/fix_typos
...
Fiy typos in logging messages
2020-01-29 22:21:29 +07:00
4d391ccb34
Extend api with account and user management
2020-01-27 14:04:15 +00:00
ccaf74646d
Fiy typos in logging messages
2020-01-27 00:05:28 +01:00
68843d9664
Add new setting to verify outgoing SSL connections
...
The new setting 'verify_ssl_connections' tells the requests library to
verify secured outgoing HTTP connections.
Usually verifying is desired and helps to reveal configuration
problems. It also disables an ugly warning when HTTPS connections
are made without verification.
2020-01-25 19:44:11 +01:00
b4b5673cf1
Merge branch 'master' of github.com:johnwarburton/PowerDNS-Admin into feat/groupofnames
...
Signed-off-by: mathieu.brunot <mathieu.brunot@monogramm.io >
2020-01-08 23:19:51 +01:00
cff4d0af53
Fix some formatting issues
2020-01-03 15:57:07 +13:00
765eab999a
Azure OAuth - add Group mappings to Roles
2020-01-03 15:36:38 +13:00
3bf6e6e9f1
Merge pull request #622 from ngoduykhanh/email_verification
...
Add user email verification
2019-12-22 10:06:43 +07:00
462190a913
Fix API key query
2019-12-22 10:06:02 +07:00
4bdd433079
Fix migration script and LGTM
2019-12-21 22:26:56 +07:00
7739bf7cfc
Add user email verification
2019-12-21 21:43:03 +07:00
5567886aa3
Fix #614 . Can not enable dnssec
2019-12-19 21:50:15 +07:00
93cd64ac75
Fix #613 . Create domain from template with SOA record enabled
2019-12-19 21:43:53 +07:00
7205b4a01b
User session improvement
...
- Add session handler on other blueprint's before request
- Adjustment in using jTimeout to close warning popup on
other tabs when we extend the session
2019-12-18 15:25:20 +07:00
9a1b92fbc2
Add session timeout warning
2019-12-17 23:46:34 +07:00
103bf176ed
Fix dashboard domain sorting
2019-12-17 13:34:52 +07:00
3e961d7b21
LGTM fixes
2019-12-16 16:27:18 +07:00
f5b88ebc73
Merge branch 'master' into record_adjustment
2019-12-16 15:54:38 +07:00
3196297f57
Fix domain template. Drop PDNS 3.x support
2019-12-16 14:23:17 +07:00
a891ed38e2
Add more log and history data
2019-12-16 11:01:16 +07:00
37f24f9fde
Correction of redirect URL after successful SAML login
...
From my perspective, if agreed, this change can be merged, because the basic SAM auth. functionality is now present
and was tested with "samlidp.io" iDP.
However, there are further improvements which I would like to integrate, but as a separate features in separate pull requests
2019-12-15 01:15:30 +01:00
cd3535dcd2
- Variable references inside SAML class were fixed
...
- Function signatures inside SAML class were fixed
- Redirect URL for /saml/login path was modified (saml_authorized -> index.saml_authorized)
Current status is that SAML metadata can be generated under /saml/metadata and communication to SAML iDP is working
Problems remaining:
- SAML Response doesn't contain any attributes (There is no AttributeStatement on the Response). It can be that problem is on iDP side
- Background thread in retrieve_idp_data() cannot be spawned, this part is currently commented out, old code needs to be revisited
2019-12-14 18:59:59 +01:00
5ac58d5503
Re-add pretty_ipv6_ptr. Bug fixes
2019-12-14 23:13:55 +07:00
14658d797e
Adjustment in domain's record applying
2019-12-14 14:47:21 +07:00
c0594b2c0b
Fix SAML
2019-12-13 21:55:11 +07:00
81869f4cd8
add history entries for rrsets delivered via zone api which is forwarded to pdns
2019-12-11 14:04:18 +01:00
242e31a490
Merge pull request #599 from ngoduykhanh/global_search
...
Add PDNS global search feature
2019-12-11 16:56:06 +07:00
1d973d1614
Allow update zone kind the domain setting page
2019-12-11 16:02:36 +07:00
2cc73abbe5
Add PDNS global search feature
...
Remove POST method in global search route
Edit form action
2019-12-11 10:26:17 +07:00
9904505867
Bug fixes
2019-12-10 10:36:51 +07:00
bca3c45e37
Add record comment
2019-12-09 17:50:48 +07:00
6af94df00a
LGTM fixes. Remove unused import and variables
2019-12-07 20:20:40 +07:00
80b6ca19ac
Resolve the conflicts and add adjustment to #591
2019-12-06 14:27:35 +07:00
8de6df4d3b
Fix the tests
...
Fix the tests
Fix the tests
2019-12-06 10:59:19 +07:00
840e2a4750
Update docker stuff and bug fixes
2019-12-04 11:50:46 +07:00
8ea00b9484
Refactoring the code
...
- Use Flask blueprint
- Split model and views into smaller parts
- Bug fixes
- API adjustment
2019-12-02 10:32:03 +07:00