Commit Graph

80 Commits (dc8832192d813662eeb2ae4ec8a4858ff4cfb8d8)

Author SHA1 Message Date
Yogesh Mahajan 0431cf7fc1
Ensure the user is able to log in if the specified OAUTH2_USERNAME_CLAIM is present in the OAuth2 profile. #6267 2023-05-10 14:39:35 +05:30
Yogesh Mahajan 39a0f46159
Ensure that internal users are able to login when auth sources are [ldap, internal]. #6151 2023-04-24 11:54:02 +05:30
Khushboo Vashi fa29ba9163 Fixed the LDAP authentication issue for the simultaneous login attempts. 2023-04-04 18:47:13 +05:30
Aditya Toshniwal 292d76b39e
Update SQLAlchemy, Flask, Flask-SQLAlchemy, and other packages to current versions. #5901
- Update Flask, Flask-SQLAlchemy, Flask-Babel, Flask-Security-Too, Flask-SocketIO, pytz, psutil, SQLAlchemy, bcrypt, cryptography, eventlet, Authlib, requests python packages
- Remove pinned dnspython, Werkzeug packages from requirements.txt
2023-03-15 11:57:16 +05:30
Akshay Joshi 3c56c0e4b7 Revert "Update SQLAlchemy, Flask, Flask-SQLAlchemy, and other packages to current versions. #5901"
This reverts commit 31818bb67a.
2023-03-09 16:53:43 +05:30
Aditya Toshniwal 31818bb67a
Update SQLAlchemy, Flask, Flask-SQLAlchemy, and other packages to current versions. #5901
Remove the python version check from the requirements.txt.
2023-03-08 18:26:51 +05:30
Paul Milbank 83ec0f3d90
Add additional logging for successful logins and user creation. #5842 2023-02-13 11:11:05 +05:30
Akshay Joshi 98184e5835 Update copyright notices for 2023 2023-01-02 11:53:55 +05:30
Yogesh Mahajan acc26744e3
Fixed a missing "jwks_uri" in metadata error that occurred when logging in with an oAuth2 provider like Azure or Google. #5666 2022-12-22 16:54:13 +05:30
Khushboo Vashi 213c9d683f
Fix the webserver and internal authentication setup issue. #5586 2022-12-20 11:26:47 +05:30
Mark Mayo 41508f7f67
python 3 updates
- Fix super() calls for python 3
- No need to inherit objects.
- No need for u at the start of strings
- Tidied up some brackets and f-strings too
2022-11-19 10:13:41 +05:30
Leon Maraite 6bc5808c53
Add the possibility to configure the OAuth2 claim which is used for the pgAdmin username. #5468
This feature provides the possibility to configure the Oauth2 claim
which should be used as a username. The key in the config.py is called
'OAUTH2_USERNAME_CLAIM'. If you don't provide a custom key, the email
is used as the username, like before. So it is completely backward
compatible.
2022-11-07 13:58:23 +05:30
Akshay Joshi e17c50d304
Added support for storing configurations of pgAdmin in an external database. #1832 2022-10-20 16:18:41 +05:30
Aditya Toshniwal 4fc0f288c7
Use SocketIO instead of REST for fetching database tables data in ERD. #5065 2022-10-17 15:24:22 +05:30
Bruno Almeida e3e0e3db19
Add support for multiple ways to bind to the LDAP server. #3541 2022-09-28 10:47:56 +05:30
Yogesh Mahajan 5fbb8b6204
Fixed error occurring while LDAP authentication for a user with multiple email attributes. #5352 2022-09-27 15:38:48 +05:30
Akshay Joshi 0b6b2e733a 1) Remove Python's 'Six' package completely. #5357
2) Replace deprecated @abstractproperty with @property, @abstractmethod.
2022-09-26 12:47:31 +05:30
Yogesh Mahajan f052ecffc0
Fixed intermittent error shown while OAuth2 login 2022-09-23 13:58:02 +05:30
Aditya Toshniwal e2b00dda1b Fixes a redirect vulnerability when the user opens the pgAdmin URL. Fixes #5343 2022-09-19 15:36:10 +05:30
Aditya Toshniwal 04b1e26041 Fixed an issue where server names with special characters are not displayed correctly in the process tab. Fixes #7695 2022-09-15 16:43:37 +05:30
Aditya Toshniwal 2de965d710 1. Use EDB's repo for react-data-grid instead of the personal repo.
2. Improved searching in the Search Objects.
3. Fixed react warnings in the query tool.
4. Fixed some SonarQube issues.
2022-09-13 19:13:33 +05:30
Akshay Joshi 7086719640 Fixed SonarQube issues. 2022-09-08 18:08:58 +05:30
Akshay Joshi f771d3a4bb Conditionally pin Flask version based on Python version. 2022-08-17 12:21:05 +05:30
Akshay Joshi d4fdd4601e 1) Pin Flask version 2.1.*
2) Fixed API test cases that failed due to a change in the Werkzeug version.
3) Change password issue is fixed.
2022-08-17 11:54:16 +05:30
Akshay Joshi 084203debc Fixed Securtiy Hotspot reported by SonarQube. 2022-08-12 17:10:26 +05:30
Akshay Joshi 352eb15dc7 Fixed PEP8 2022-08-01 22:06:34 +05:30
Aditya Toshniwal cb635f6706 Removing dynamic module loading and replacing it with static loading. Fixes #7492
Gets rid of all occurrences and usage of get_own_javascripts since it is no longer used.
2022-06-30 11:06:50 +05:30
Yogesh Mahajan f28e8126af Added support for Azure AD OAUTH2 authentication. Fixes #7325 2022-04-21 12:48:10 +05:30
Yogesh Mahajan 0957670d4e Adds a new LDAP authentication configuration parameter that indicates the case sensitivity of the LDAP schema/server. Fixes #5836 2022-03-29 14:46:57 +05:30
Yogesh Mahajan 7b6469bd35 Fixed an issue where the error is shown on logout when the authentication source is oauth2. Fixes #7059 2022-03-15 16:38:54 +05:30
Dave Page 39bfb575da Improve message wording. 2022-03-14 11:18:20 +00:00
Charlet, Christoph aca97d9f57 Fixed an issue where pgadmin cannot connect to LDAP when STARTTLS is required before bind. Fixes #6991 2022-02-16 18:01:39 +05:30
Yogesh Mahajan b539637426 Fixed an issue where a warning is flashed every time for an email address when
authentication sources are internal and ldap. Fixes #6999
2022-02-16 13:34:24 +05:30
Akshay Joshi 1013d7ccdd Fixed code smell reported by SonarQube. 2022-01-20 16:58:21 +05:30
Akshay Joshi e38c38cd58 Fixed following SonarQube code smells:
1) Remove this useless assignment to a variable.
2) Remove the unused local variable.
2022-01-12 14:53:19 +05:30
Akshay Joshi 2786f7ac5a Update copyright notices for 2022 2022-01-04 13:54:25 +05:30
Yogesh Mahajan 48dc4bacc4 Fixed Kerberos authentication issue which is broken due to 2FA.
refs #6543
2021-12-06 20:14:39 +05:30
Ashesh Vashi 36c9eb3dfd Added support for Two-factor authentication for improving security. Fixes #6543 2021-12-02 16:47:18 +05:30
Akshay Joshi d644b4f94e 1) Replace Flask-BabelEx with Flask-Babel. Fixes #6088
2) Upgrade Flask to version 2. Fixes #7010
2021-11-24 17:22:57 +05:30
Khushboo Vashi d4697e8f1c Ensure that users should be able to modify the REMOTE_USER environment
variable as per their environment by introducing the new config parameter
WEBSERVER_REMOTE_USER.

Fixes #6953
2021-11-10 15:38:41 +05:30
Khushboo Vashi a726635290 1) Added support for authentication via the web server (REMOTE_USER). Fixes #6657
2) Fixed OAuth2 integration redirect issue. Fixes #6719

Initial patch for 6657 sent by: Tom Schreiber
2021-10-12 14:52:30 +05:30
Akshay Joshi 7d07770244 Reverting 'Two-factor authentication' support as it cause OSX and docker build failures.
This reverts commit 787a441343.
2021-09-29 13:24:18 +05:30
Ashesh Vashi 787a441343 Added support for Two-factor authentication for improving security. Fixes #6543 2021-09-28 17:47:00 +05:30
Khushboo Vashi 3786954a65 Added support for OAuth 2 authentication. Fixes #5940
Initial patch sent by: Florian Sabonchi
2021-09-09 12:40:53 +05:30
Nico Rikken d13d2c6dda Introduced OAUTH2_SCOPE variable for the Oauth2 scope configuration. Fixes #6627 2021-08-31 14:36:14 +05:30
Akshay Joshi 7798584e1c Fixed an issue where columns with sequences get altered unnecessarily with a schema diff tool. Fixes #6564 2021-08-18 19:33:01 +05:30
Rahul Shirsat ab04b30726 1. Unverified email id is getting locked.
2. Admin should be able to lock the user, as currently it only unlocks it via
   user management dialog.
3. There were some indefinite login page loading issues when trying to log in
   with invalid password, where it should redirect to the login page again instead.

refs #6337 (Initial patch by Khushboo Vashi)
2021-08-09 21:04:49 +05:30
Khushboo Vashi 78b041465e Fixed an issue where even if the user is locked, he can reset the password and can login into pgAdmin. Fixes #6664 2021-08-09 14:24:26 +05:30
Akshay Joshi 025c98ced8 1) Flash warning message of N no of attempts left for the unsuccessful login attempt.
2) Updated some strings in the Preferences for the "Maximum column width" option.
2021-08-03 17:06:06 +05:30
Florian Sabonchi a3d3c74e67 Ensure that the login account should be locked after N number of attempts. N is configurable using the 'MAX_LOGIN_ATTEMPTS' parameter. Fixes #6337 2021-07-22 12:24:43 +05:30