-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add WebView support for SAML registration/login flows #4
base: saml
Are you sure you want to change the base?
Conversation
Have added WebView support and test |
selfservice/strategy/saml/strategy/test/strategy_helper_test.go
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In order to better follow Ory's design pattern, we have reorganized the files concerning our part of the code. The SAML handler is now in the strategy package, no longer in flow.
Could you please follow this new file architecture in your PR?
Thanks again! :)
Yes, will update my branch. |
1e09eea
to
dceaea1
Compare
The branch has been updated. Please review and merge. |
Have added validation error for unknown provider. We need this when the provider discovery is based on a user input. |
Hey @splaunov! Sorry we've been very busy lately. We had to force-push to rebase on the ory/kratos master. The changes are not major and should not generate too many conflicts. Can you please rebase to our SAML branch? Sorry for the inconvenience. We will finally have time to take care of the merge of this PR :) |
* fix: don't return password cred type if empty * fix: better index for config.user_handle on identity_credentials
Signed-off-by: guoguangwu <[email protected]>
Signed-off-by: camcui <[email protected]> Co-authored-by: Jonas Hungershausen <[email protected]>
* test: resolve flaky code registration tests * chore: don't fail logout if cookie is not found * chore: remove .only * chore: reduce wait * chore: u * chore: u * chore: u
feat(saml): api flow support (PS-35) all commits before Jan 2024 fix(saml): applied recent changes from ovh/saml branch (PS-35) fix(saml): fixed compilation errors after rebase (PS-35) feat: extend admin api to read SAML providers configs (CORE-966) (cherry picked from commit a55dee2) ignore: add test to check token is valid in webview flow (CORE-2202) (cherry picked from commit 2cee177) feat(saml): add “provider id” parameter to kratos session (CORE-2073) (cherry picked from commit ffa32d7) feat(oidc): add “provider id” parameter to kratos session (CORE-2073) (cherry picked from commit ddea269) feat: link credentials when second login is OIDC (CORE-2041) (cherry picked from commit 2a0b706) feat: extend SAML cookie lifetime and set SameSite to None (CORE-2024) (cherry picked from commit ef9918f) feat: extend SAML cookie lifetime and set SameSite to None (CORE-2024) (cherry picked from commit 7c6352a) fix: panic when linked flow does not exist (CORE-2017) (cherry picked from commit 98597ef) feat(saml): return flow id when doing sso webview first login and email already exists (CORE-1986) (cherry picked from commit 10690c8) feat(saml): return error in webview redirect url when provider is not found (CORE-1982) (cherry picked from commit 58be1df) fix(saml): missed CSRF token when login with Google SAML and email is already used (CORE-1975) (cherry picked from commit d808af6) feat: link credentials when login - add LoginAndLinkCredentials method to login and registrations flows (cherry picked from commit a6b8ad1) feat: link credentials when login (cherry picked from commit 9ea2707) fix(saml): saml settings link redirect path (cherry picked from commit 514b47b) feat(saml): saml link/unlink (cherry picked from commit 2cf82e8) fix(saml): forward to registration flow when user with email is found (cherry picked from commit 8f145c8) fix(saml): forward to registration flow when user with email is found (cherry picked from commit 58165d5) fix(saml): An error occurred while retrieving the middeware, it is null (cherry picked from commit c00246a) fix(saml): saml creates identity with wrong default schema id (cherry picked from commit 995d429) fix(saml): add debug info to errors (cherry picked from commit ef7fab2) fix(saml): add debug info to errors (cherry picked from commit e836c74) feat(saml): set login flow error code and message if provider not found (cherry picked from commit 2ac84f4) feat(saml): support WebView flow for saml strategy (cherry picked from commit dceaea1) feat(saml): relaystate continuity fix + unit tests Signed-off-by: sebferrer <[email protected]> Co-authored-by: ThibaultHerard <[email protected]> (cherry picked from commit aeb172c) feat(saml): improved error handling Signed-off-by: ThibaultHerard <[email protected]> Co-authored-by: sebferrer <[email protected]> (cherry picked from commit 37f7bbe) feat(saml): use ory/x fetcher Signed-off-by: ThibaultHerard <[email protected]> Co-authored-by: sebferrer <[email protected]> (cherry picked from commit b26f11d) feat(saml): saml 2.0 implementation Signed-off-by: ThibaultHerard <[email protected]> Co-authored-by: sebferrer <[email protected]> Co-authored-by: psauvage <[email protected]> Co-authored-by: alexGNX <[email protected]> Co-authored-by: Stoakes <[email protected]> (cherry picked from commit 3f5480f)
The registration/login flow should end with special redirect if used in WebView on mobile platform
Related issue(s)
ory#2653
Checklist
If this pull request addresses a security. vulnerability,
I confirm that I got green light (please contact [email protected]) from the maintainers to push the changes.
Further Comments