- 21 Jun, 2024 23 commits
-
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
This allows the administrator set caucase url and invoke bootstrap to set the credentials (user/key to CAU api)
-
Rafael Monnerat authored
Ensure it has a new between the 2
-
Rafael Monnerat authored
While generate the first certificate include more typical information for the CSR, like city, company, email, state, country. Reuse the values from User Certificate to generate the next CSR, in case this API is called by the Certificate Login. This is consistent with the previous legacy API (portal_certificate_authority) that will rely on openssl.cnf defined versions.
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
The connector is mostly tests via Person/Certificate Login tests, this tests aims to cover the extra portion.
-
Rafael Monnerat authored
-
Rafael Monnerat authored
Use specific reference reduces the confusion on what default means, since we can have multiple connectors for multiple purposes one day.
-
Rafael Monnerat authored
-
Rafael Monnerat authored
Change the property used to clearly identify if this document used caucase or some previous legacy implementation not supported anymore. In such case, invalidate the Certificate Login is enough to prevent access.
-
Rafael Monnerat authored
This TestCase allows to start a Caucase Server to be used on tests. The code is inspired on Kedifa tests.
-
Rafael Monnerat authored
-
Rafael Monnerat authored
-
Rafael Monnerat authored
This is simpler to manage and include extra methods
-
Rafael Monnerat authored
This tool will be replaced by caucase implementation and drop related code that is not needed anymore
-
Rafael Monnerat authored
Rather them use filesystem openssl CA, contact Caucase Service for sign certificates.
-
- 20 Jun, 2024 1 commit
-
-
Romain Courteaud authored
Prevent potential errors to be returned with 201 status
-
- 19 Jun, 2024 4 commits
-
-
Romain Courteaud authored
Follow nexedi/erp5@a659b01c
-
Romain Courteaud authored
-
Romain Courteaud authored
-
Romain Courteaud authored
Same behaviour than File/Image
-
- 18 Jun, 2024 3 commits
-
-
Romain Courteaud authored
-
Romain Courteaud authored
-
Romain Courteaud authored
It is needed if a module contains multiple object's portal types.
-
- 17 Jun, 2024 1 commit
-
- 11 Jun, 2024 2 commits
-
-
Kazuhiko Shiozaki authored
Fix po_import behavior in Python 2. Newer versions of polib accept only unicode strings in the `pofile` function (because they check if they start by the decoded version of the BOM). I changed the `data` that is passed to `pofile` to be a unicode string in Python 2 too. This seems to work locally in my old version of polib, so that at least the old behavior should be kept the same. Co-authored-by: Carlos Ramos Carreño <carlos.ramos@nexedi.com> Co-authored-by: Jérome Perrin <jerome@nexedi.com>
-
Jérome Perrin authored
See merge request nexedi/erp5!1953
-
- 09 Jun, 2024 2 commits
-
-
Jérome Perrin authored
-
Jérome Perrin authored
Because the librairies used here were never ported to python3. Notable changes: - ERP5Site_createGoogleUserToOAuth is dropped - internal API changed radically, so customizations made by overriding scripts are broken. - the core logic is now implemented in a connector class (still in portal_oauth for simplicity, but it would be simpler to move it to portal_web_services) No changes required in the google console, the redirect uri is still ERP5Site_receiveGoogleCallback
-
- 06 Jun, 2024 3 commits
-
-
Kazuhiko Shiozaki authored
-
Jérome Perrin authored
See merge request nexedi/erp5!1949
-
Jérome Perrin authored
-
- 05 Jun, 2024 1 commit
-
-
Jérome Perrin authored
-