77e27ec9f7Fix looking up organization name in metadata
Erick Tryzelaar
2014-10-23 17:22:49 -07:00
6a85250075Fixed a couple of tests
Roland Hedberg
2014-10-20 10:29:31 +02:00
9af755597dMerge branch 'master' of github.com:rohe/pysaml2
Roland Hedberg
2014-10-19 16:21:07 +02:00
d14411a2e2Merge pull request #152 from rhoerbe/20140922-add-xmlsec-debug-opt
Roland Hedberg
2014-10-19 16:18:41 +02:00
627bf2b6c7added code to keep temporary certificate and xml files for xmlsec processing (controlled by setting ENV var PYSAML2_KEEP_XMLSEC_TMP)
rhoerbe
2014-10-19 16:07:01 +02:00
d62dcd5daarefactoring xmlstr argument to enc_request (to remove defense against outside code reviewers ;-)
rhoerbe
2014-10-19 16:00:42 +02:00
49bd1a8032Merge pull request #148 from geops/master
Roland Hedberg
2014-10-08 16:20:03 +02:00
1fce6d1e19use NAME_FORMAT_URI as default fallback nameFormat for better compatibility with ADFS
Patrick Brosi
2014-10-08 12:28:14 +02:00
4c9b91ee36Merge pull request #146 from julienp/patch-1
Roland Hedberg
2014-10-08 08:21:18 +02:00
801427ada4Merge branch 'master' of github.com:rohe/pysaml2
Roland Hedberg
2014-08-14 09:43:45 +02:00
cc486e83cfAs Rainer Hörbe pointed out: "A principal is a user, not an entity in SAML. The UnknownPrincipal exception in mdstore.py should be renamed as suggested in the title to avoid confusion. Unfortunately the OASIS SAML glossary is using the X-811 definition of principal, but contradicts itself otherwise by redefining the term implicitly in other definitions such as Account, Affiliation, IDP, Persistent Pseudonym, etc"
Roland Hedberg
2014-08-14 09:43:01 +02:00
5ba68ca562Merge pull request #134 from Runscope/master
Roland Hedberg
2014-08-12 09:28:45 +02:00
10158d5531added utility to read and cache remote metadata feeds.
rhoerbe
2014-08-11 23:13:44 +02:00
c1caa0398cFixing location of 'allow_unknown_attributes' in args lists
Stephen Huenneke
2014-08-11 13:44:54 -07:00
361f862950extended API with lists for supported NameID formats, AttributeName formats, digest and sig algs
rhoerbe
2014-08-11 19:36:05 +02:00
95ffb58b5badded new tests category between "pre" and "post: "mid". added new test cases
rhoerbe
2014-08-11 14:52:14 +02:00
b16009dc69added init code for idp cert for sp-04
rhoerbe
2014-08-11 14:47:14 +02:00
622df268a6added option to write response content to separate files outside log files.
rhoerbe
2014-08-11 14:42:40 +02:00
32c82580a1More changes (missed a prev. commit) Error reporting clarified: CRITICAL level for unexpected conditions in saml2test; ERROR and lower for conditions in the test target; various documentation improvements
rhoerbe
2014-08-11 14:38:11 +02:00
a2a4698936Error reporting clarified: CRITICAL level for unexpected conditions in saml2test; ERROR and lower for conditions in the test target; various documentation improvements
rhoerbe
2014-08-11 14:33:40 +02:00
781fbe4393clarified helptext on options -H, -i, etc.
rhoerbe
2014-07-31 15:41:09 +02:00
5ee6ebc897shortened "name" values; added "desrc" keys in some cases (used to improve GUI in STHREP)
rhoerbe
2014-07-30 16:10:58 +02:00
707a941252shortened "name" values; added "desrc" keys in some cases (used to improve GUI in STHREP)
rhoerbe
2014-07-30 16:10:43 +02:00
4fdbd3b9dcraise CheckError instead of FatalError from severity >= 4
rhoerbe
2014-07-18 10:41:07 +02:00
3c3f1c1a85added support for md5 as digest algorithm (used to test that this is rejected); added support for redirect signature algorithm check
rhoerbe
2014-07-18 08:59:07 +02:00
9d75552d12renamed Conversation.idp_constraints to msg_constraints (namefmt, sigalg pertaining to SAML message) (+ adding upstream stuff - should merge there w/o issue)
rhoerbe
2014-07-17 14:31:40 +02:00
4642a5b262Merge pull request #129 from tpazderka/Fixed_attribute_maps
Roland Hedberg
2014-07-16 21:47:02 +02:00
8ecdb8b70dMerge pull request #128 from puiterwijk/fix-certificate-extraction
Roland Hedberg
2014-07-16 21:46:24 +02:00
c42cb80c6achange "name" values in test cases to a single string, because output formatting is more difficult with lists. reordered sp-08
rhoerbe
2014-07-16 11:04:04 +02:00
d6b58798acchange options "sign_asertion" and "sign_response" to be dependent on their value, not just on their existence (previously "sign_response=False" would still generate a response signature). Change from boolean to string, to allow for future optional signatures (e.g. like in shibboleth: sing on front channel, but not over https/soap) make dsgi algorithms configurable (config args.AuthnResponse.sign_signature_alg etc.)
rhoerbe
2014-07-16 11:01:50 +02:00