Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Commits on Sep 7, 2012
  1. @daleolds

    Revert previous 4 commits: 2 merges, 2 small changes

    daleolds authored
    Change-Id: I6232b2331ef87767016111bfd6a7311574bc2ead
  2. @joeldsa

    Merge "Revert "Fixed the gem to set the target correctly and only whe…

    joeldsa authored Gerrit Code Review committed
    …n requested.""
  3. @joeldsa

    Revert "Fixed the gem to set the target correctly and only when reque…

    joeldsa authored Gerrit Code Review committed
    …sted."
    
    This was supposed to go on the develop branch.
    
    This reverts commit 63ce889
  4. Merge "Fixed the gem to set the target correctly and only when reques…

    Dale Olds authored Gerrit Code Review committed
    …ted."
Commits on Sep 6, 2012
  1. @joeldsa

    Fixed the gem to set the target correctly and only when requested.

    joeldsa authored
    [#35638855]
    
    Change-Id: I13973d233b92474319ca190c504a62eed019de8d
  2. @joeldsa

    Fixed breaking tests

    joeldsa authored
    Change-Id: I8393f1e998f3c8018a9b03a2f87cc588dcee85e1
  3. @dsyer

    [#35598249] Conflicts uncommitted in gem (635ac69)

    dsyer authored
    Change-Id: Ia50239f5510abe57a5b6550e333bf4c044b31152
  4. @dsyer

    CFID-402: add docs for /Groups/{group}/Users

    dsyer authored
    [Fixes #35352703] user id/name translation api
    
    Change-Id: I583cee73bc13122177ac8e61f636a2f9738ed2fa
  5. @joeldsa

    Added support for a distinct token target

    joeldsa authored
    Refactored to remove target from the http module
    
    This enables the gem to support multiple targets, one for the authorize
    and the other for the token endpoint
    
    uaac target now supports a token target in addition to an authorize
    target
    
    Change-Id: I6c1d191e7073d8f2b33a2b689e57fb3da7b2230b
Commits on Sep 5, 2012
  1. @daleolds

    start support for groups and general queries in uaa gem

    daleolds authored
    Change-Id: Ica2371209d529db132c34d7a00030f6a3f48fd37
  2. @dsyer

    Merge "CFID-402: /Groups/{group}/Users endpoint" into develop

    dsyer authored Gerrit Code Review committed
  3. @tekul

    Fix minor rst error in zxcvbn link

    tekul authored
    Change-Id: I8f41e6329ed0b98f5e2b9a157619b500442debf0
Commits on Sep 4, 2012
  1. @dsyer

    CFID-402: /Groups/{group}/Users endpoint

    dsyer authored
    A special purpose endpoint for use as a user id/name
    translation api.  It will be used by vmc so it has
    to be quite restricted in function (i.e. it's not
    a general purpose groups or users endpoint).  You
    can only query it, as a user, for usernames and user
    ids in the same group as you.  Otherwise the API
    is the same as /Users.
    
    [Fixes #35352703]
    
    Change-Id: Ia592eb3bcf77b8afaef7e7b1f6bf9a3bc548ce62
  2. @dsyer

    CFID-405: one of the 401 that should be 302 is fixed

    dsyer authored
    Change-Id: Ie6f3a547cecd47152b11614fa463c3fe175878b7
  3. @dsyer

    Update tests for changes to SECOAUTH

    dsyer authored
    Change-Id: Ie0f6ce2157a2c679289fcef31c10990248ecfc38
Commits on Aug 31, 2012
  1. @dsyer

    CFID-402: add groups.display support to SCIM /Users

    dsyer authored
    Change-Id: I18c60e119ed6c3b898ff150176f08ff73f0aee79
  2. @dsyer

    CFID-403: enable login server to autoadd new account by default

    dsyer authored
    Change-Id: Iddb1e553619da96e52aba6fe352f90a18dc0e826
  3. @dsyer

    CFID-419: update httpcomponents so that login sample works

    dsyer authored
    Change-Id: I269f16a502f7743ea69ab4cb68f009ec6b8a2954
  4. @dsyer

    Hack on integration profile for login sample

    dsyer authored
    Change-Id: I4c3bbc5f9e7cceb47df56e716c49660a25c5ce34
  5. @dsyer

    Fix scala version in gatling pom

    dsyer authored
    Change-Id: Ica00b07eb330bb06e3b45aff079f04b662df83db
Commits on Aug 30, 2012
  1. @dsyer

    Merge branch hotfix/1.1.2

    dsyer authored
    Change-Id: I6130a64f8c5cf06d6217e421f90c8c82b1dcddea
  2. @dsyer

    Merge branch hotfix/1.1.2

    dsyer authored
    Change-Id: Iec5be50678ad2621e5184b2118ddfd4795308795
  3. @dsyer

    CFID-389: add extra validation and default scopes and authorities

    dsyer authored
    Change-Id: I8773398954c847ea0a1fb41dfd25649a2ca40447
  4. @dsyer

    CFID-419: tidy up maven dependencies

    dsyer authored
    Change-Id: Ia98cb0ea46315e83c4cd050ccb90936ef0063e35
  5. @dsyer

    CFID-417: Use display instead of externalId

    dsyer authored
    Change-Id: Ic83af0cfc76a379c6cb5b4abb056304d296ee703
Commits on Aug 29, 2012
  1. @dsyer

    CFID-410: add test for client override with Yaml input

    dsyer authored
    Change-Id: I7347d26c0e3f600700ce4d4b59da159f07bbf2eb
  2. @dsyer

    Fix profiles in top-level POM to use postgres with -P vcap

    dsyer authored
    Change-Id: Ifb07f11f08871df4bdcc1685cdff1159471e0535
  3. @dsyer

    CFID-399: change comment to reflect reason for catch

    dsyer authored
    Change-Id: I8baefe869a15206f6ea5b761441bcf06c6a79e27
Commits on Aug 28, 2012
  1. @dsyer

    CFID-406: add UAA-specific authentication key generator

    dsyer authored
    It shares a single implementation of another strategy
    UserTokenConverter for extracting token data from a
    user authentication.  So the token contents and the
    key should match if the user account changes.
    
    Change-Id: I0b2adeb8029484d1d57ddcc6b37947074933980d
  2. @daleolds @dsyer

    Added support for --vmc option to uaac

    daleolds authored dsyer committed
    Change-Id: I9b57ecbb87dce1fa067ec6c5575a9fa431c8cdca
  3. @dsyer

    CFID-410: move override flag to client config map

    dsyer authored
    Change-Id: I24cd2c9b2ca66d53311bbbde3edae0b6d63bbc64
Commits on Aug 24, 2012
  1. @dsyer

    CFID-407,CFID-411: Token admin endpoints updates

    dsyer authored
    * Fix not found response to render JSON if requested
    * Be defensive about bug in SECOAUTH-325 when listing tokens
    for client
    
    The fix for SECOAUTH-325 should be adopted as well since
    otherwise you get misleading results from the clients
    token endpoint, and there is a memory leak if revoking
    clients through that endpoint (the users/*/tokens/* works
    fine).
    
    Change-Id: I5f5d7cdc5ee9241dd4333f6aa8067cb3512db47f
  2. @dsyer

    CFID-405: Tighten up Login Server authentication

    dsyer authored
    In particular it should not be possible to authenticate without
    a username.  Also the default now is to check for the existence
    of the authenticated user if they are not being added automatically.
    
    Change-Id: I4e588b93eab6e53df0c1b5883fb0cd9427ef0b6f
  3. @dsyer

    Updates for IE

    Chloe Jackson authored dsyer committed
    Change-Id: I9bc073dc9ba1b3b504f1851a12031045900ead54
  4. @dsyer

    CFID-410: remove clients to override config for bootstrap

    dsyer authored
    Change-Id: I0e4d67080d4f2d66765ff16601d284bf04abf970
Something went wrong with that request. Please try again.