summaryrefslogtreecommitdiff
path: root/internal/handlers/handler_user_info.go
AgeCommit message (Collapse)Author
2025-03-06feat(web): change password (#7676)Brynn Crowley
Add the ability for users to change their password from their user settings, without requiring them to use the reset password workflow. User's are required to create a elevated session in order to change their password. Users may not change their password to their current password. The user's current password is required for the password change. Users must follow any established password policies. Administrators are able to turn this feature off. Closes #3548
2024-05-29fix(handlers): disabling 2fa methods may result in a bad ux (#7360)James Elliott
This fixes an issue where disabled 2FA methods may appear to users as available. Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2024-03-04test(suites): add and fix tests for coverageJames Elliott
Add tests and adjust tests and code as appropriate. This also ensures we have thorough coverage of the code. Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-10-08refactor: misc (#6102)James Elliott
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
2023-01-25feat(server): customizable authz endpoints (#4296)James Elliott
This allows users to customize the authz endpoints. Closes #2753, Fixes #3716 Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2022-10-20feat(oidc): implicit consent (#4080)James Elliott
This adds multiple consent modes to OpenID Connect clients. Specifically it allows configuration of a new consent mode called implicit which never asks for user consent.
2022-04-18feat(configuration): configurable default second factor method (#3081)James Elliott
This allows configuring the default second factor method.
2022-04-08fix(server): incorrect remote ip logged in error handler (#3139)James Elliott
This fixes edge cases where the remote IP was not correctly logged. Generally this is not an issue as most errors do not hit this handler, but in instances where a transport error occurs this is important.
2022-03-28fix(web): show appropriate default and available methods (#2999)James Elliott
This ensures that; the method set when a user does not have a preference is a method that is available, that if a user has a preferred method that is not available it is changed to an enabled method with preference put on methods the user has configured, that the frontend does not show the method selection option when only one method is available.
2021-12-01feat(totp): algorithm and digits config (#2634)James Elliott
Allow users to configure the TOTP Algorithm and Digits. This should be used with caution as many TOTP applications do not support it. Some will also fail to notify the user that there is an issue. i.e. if the algorithm in the QR code is sha512, they continue to generate one time passwords with sha1. In addition this drastically refactors TOTP in general to be more user friendly by not forcing them to register a new device if the administrator changes the period (or algorithm). Fixes #1226.
2021-11-23feat(storage): primary key for all tables and general qol refactoring (#2431)James Elliott
This is a massive overhaul to the SQL Storage for Authelia. It facilitates a whole heap of utility commands to help manage the database, primary keys, ensures all database requests use a context for cancellations, and paves the way for a few other PR's which improve the database. Fixes #1337
2021-09-17refactor(handlers): lower case error messages (#2289)Clément Michaud
* refactor(handlers): lower case error messages also refactor verifyAuth function to detect malicious activity both with session cookie and authorization header. * refacto(handlers): simplify error construction * fix(handlers): check prefix in authorization header to determine auth method * fix(handlers): determining the method should be done with headers instead of query arg * refacto(handlers): rollback changes of verifyAuth * don't lowercase log messages * Apply suggestions from code review Make sure logger errors are not lowercased. * fix: uppercase logger errors and remove unused param * Do not lowercase logger errors * Remove unused param targetURL * Rename url variable to not conflict with imported package Co-authored-by: Amir Zarrinkafsh <nightah@me.com>
2021-08-11fix: include major in go.mod module directive (#2278)James Elliott
* build: include major in go.mod module directive * fix: xflags * revert: cobra changes * fix: mock doc
2021-07-22fix(handlers): handle xhr requests to /api/verify with 401 (#2189)James Elliott
This changes the way XML HTTP requests are handled on the verify endpoint so that they are redirected using a 401 instead of a 302/303.
2020-12-16[MISC] Refactor and address most errcheck linter ignores (#1511)Amir Zarrinkafsh
* [MISC] Refactor and address most errcheck linter ignores This is mostly a quality of life change. When we first implemented the errcheck linter we ignored a number of items in our legacy codebase with intent to revisit down the track. * Handle errors for regulation marks and remove unnecessary logging
2020-06-21[MISC] Template global config and refactor some /api endpoints (#1135)Amir Zarrinkafsh
* [MISC] Template global config and refactor some /api endpoints * /api/configuration has been removed in favour of templating said global config * /api/configuration/extended has been renamed to /api/configuration and display_name has been removed * /api/user/info has been modified to include display_name Co-authored-by: Clement Michaud <clement.michaud34@gmail.com>
2020-05-05[CI] Add wsl linter (#980)Amir Zarrinkafsh
* [CI] Add wsl linter * Implement wsl recommendations Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
2020-04-22[MISC] Ignore errcheck recommendations for legacy code (#893)Amir Zarrinkafsh
* [MISC] Ignore errcheck recommendations for legacy code Some of this is likely intended to stay how it is, some could use refactoring, for now we will mark is and ignore it from the linter to be potentially addressed in the future. * [MISC] Ensure files are gofmt-ed
2020-04-20[MISC] Implement golint recommendations (#885)Amir Zarrinkafsh
Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
2020-04-05[MISC] Update durations to notation format and housekeeping (#824)James Elliott
* added regulation validator * made regulations find_time and ban_time values duration notation strings * added DefaultRegulationConfiguration for the validator * made session expiration and inactivity values duration notation strings * TOTP period does not need to be converted because adjustment should be discouraged * moved TOTP defaults to DefaultTOTPConfiguration and removed the consts * arranged the root config validator in configuration file order * adjusted tests for the changes * moved duration notation docs to root of configuration * added references to duration notation where applicable * project wide gofmt and goimports: * run gofmt * run goimports -local github.com/authelia/authelia -w on all files * Make jwt_secret error uniform and add tests * now at 100% coverage for internal/configuration/validator/configuration.go
2020-01-21Misc Spelling CorrectionsJames Elliott
- Mostly changes to spelling of comments/docs/displayed text - A few changes to test function names
2020-01-10Fix spelling errorsAmir Zarrinkafsh
2019-12-24Rename org from clems4ever to autheliaAmir Zarrinkafsh
Also fix references from config.yml to configuration.yml
2019-12-08Fix backend unit tests.Clement Michaud
2019-12-08Introduce hasU2F and hasTOTP in user info.Clement Michaud