-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* fix/TEN-100-further-logging-restrictions (#67) * TEN-123: fixed tests and getaddress (#83) * TEN-123: updated versions and dependencies * TEN-123: updated package-lock * fix/TEN-125-memory-leak (#85) * TEN-125: updated container package RELEASES * feat/TEN-31-on-behalf-of-as (#76) Co-authored-by: [email protected] <[email protected]> Co-authored-by: JustinErenJaeger <[email protected]> * fix/TEN-130-init-startup-defer-sync-methods-callback (#96) * TEN-130: added package-lock * fix/TEN-126-reconnect-on-error (#88) Co-authored-by: [email protected] <[email protected]> Co-authored-by: JustinErenJaeger <[email protected]> * feat/SMCCT-640-change-default-nic-get-address (#93) * fix/TEN-65-bad-options-data-get (#98) * TEN-65, TEN-126, TEN-123: updated dependencies, added documentation for happn client reconnect settings * TEN-65, TEN-126, TEN-123: fixed documentation typo * fix/TEN-138-api-client-fails-auth-delegation-on (#103) * feat/TEN-132-authorization-cache-key-regex-masking (#100) * TEN-132, TEN-138: updated dependencies and versions * TEN-132, TEN-138: fixed bad version in container repo RELEASES * chore/TEN-143-TEN-101-websocket-update-remove-elasticsearch (#105) * test/TEN-129-security-unit-tests (#94) * fix/TEN-141-fatal-security-generate-session (#108) * feat/TEN-144-rest-array-arguments (#109) * fix/TEN-146-remove-preserve-criteria (#115) * release/TEN-129-TEN-141-TEN-144-TEN-146 updated versions * fix/TEN-135-do-not-insert-path-default-sort (#119) Co-authored-by: cordellcalitz <[email protected]> * fix/TEN-140-outdated-pem-module (#125) * doc/TEN-148-post-array-http-rpc (#122) * feat/TEN-4-productionize-summon (#127) * release: v12.2.0 * TEN-4: updated README * feat/sqlite-db-provider (#128) Co-authored-by: Aaron Marais <[email protected]> * dep: updated RELEASES and dependencies * fix/aec#862hyd2pk-blank-space-in-loki-journal-causes-restore-fail (#138) * feat/loki-data-provider-archiving (#136) Co-authored-by: Simon Bishop <[email protected]> * TEN-4-summon-productionize-extended (#134) Co-authored-by: Aaron Marais <[email protected]> * TEN-4: fixed conflict in base RELEASES * fix/TEN-152-getuser-without-params (#145) * feat/TEN-159-switch-off-file-watching-packager (#143) * doc/TEN-127-configurable-payload-limit-ws (#146) * fix/TEN-144-allow-for-as-on-array-parameters (#147) * TEN-164: updated dependencies * feat/TEN-167-logout (#149) * release/v2.7.0 * fix/SMCCT-1142 rest payload stringify (#155) * fix/SMCCT-1142 rest payload stringify * fix/SMCCT-1142 rest payload stringify * release/v2.7.1 * SMCCT-862 add ability to reset and change password (#157) * SMCCT-862 add abitilty to reset and change password * SMCCT-862 review items * SMCCT-862 Code review items. Wrapping client functions in a maybePromisify. * SMCCT-862 Code review items. * SMCCT-862 Remove the only. * SMCCT-862 Upping code coverage * SMCCT-862 Fix code lint. * chore(#SMCCT-862): lint fixed, modifications to happn-client * SMCCT-862 Prettier, code review items. * SMCCT-862 Adding back sanity on Happn Client, to ensure arguments are correct. This will be replaced when we move away from Callback to promises. * SMCCT-862 Version for Release - 13.11.0 --------- Co-authored-by: Simon Bishop <[email protected]> * dep(#SMCCT-862): updated dependencies * dep(#SMCCT-862): updated master version and releases --------- Co-authored-by: [email protected] <[email protected]> Co-authored-by: JustinErenJaeger <[email protected]> Co-authored-by: Justin Creighton (SoulCali Drago) <[email protected]> Co-authored-by: cordellcalitz <[email protected]> Co-authored-by: Aaron Marais <[email protected]> Co-authored-by: Aaron Marais <[email protected]> Co-authored-by: Jacques Erasmus <[email protected]> Co-authored-by: Craig Sampson <[email protected]>
- Loading branch information
1 parent
e14d701
commit b39a41c
Showing
29 changed files
with
876 additions
and
558 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,6 @@ | ||
module.exports = class TestAuthProvider extends require('../../../../../..').providers.SecurityBaseAuthProvider { | ||
module.exports = class TestAuthProvider extends ( | ||
require('../../../../../..').providers.SecurityBaseAuthProvider | ||
) { | ||
constructor(securityFacade, happnConfig, providerOptions) { | ||
super(securityFacade, happnConfig, providerOptions); | ||
} | ||
|
@@ -7,25 +9,32 @@ module.exports = class TestAuthProvider extends require('../../../../../..').pro | |
return new TestAuthProvider(securityFacade, config, providerOptions); | ||
} | ||
|
||
async providerCredsLogin(credentials, sessionId) { | ||
if (credentials.username === "[email protected]" && credentials.password === "secondPass") { | ||
let user = {username: "[email protected]", groups:[]} | ||
async providerCredsLogin(credentials, sessionId) { | ||
if ( | ||
credentials.username === '[email protected]' && | ||
credentials.password === 'secondPass' | ||
) { | ||
let user = { username: '[email protected]', groups: [] }; | ||
return this.loginOK(credentials, user, sessionId); | ||
} | ||
return this.loginFailed(credentials.username, 'Invalid credentials'); | ||
} | ||
|
||
async providerTokenLogin(credentials, decodedToken, sessionId) { | ||
if (decodedToken.username === "[email protected]" && credentials.token != null) { | ||
let user = {username: "[email protected]", groups:[]} | ||
async providerTokenLogin(credentials, decodedToken, sessionId) { | ||
if (decodedToken.username === '[email protected]' && credentials.token != null) { | ||
let user = { username: '[email protected]', groups: [] }; | ||
return this.loginOK(credentials, user, sessionId); | ||
} | ||
return this.loginFailed(credentials.username, 'Invalid credentials'); | ||
} | ||
|
||
async providerResetPassword(credentials) { | ||
throw new Error(`Works !! Password reset ${credentials.username}`); | ||
} | ||
|
||
defaults(options) { | ||
return { | ||
test: (options?.test || 0) + 1, | ||
} | ||
}; | ||
} | ||
}; |
Oops, something went wrong.