* wip
* add logout action according to logic (SAML - logoutAll) + add modal to prompt user to select SLO logout type when logging out of Dashboard
* update authProvidersInfo method to allow for a getter usage in order to make it store reactive
* wip - missing final plumbing for the finalRedirectUrl
* bug fix for non-reactive header logout when auth provider is enabled
* adjust slo UI elements to match expected UI/UX
* minor adjustments + pr cleanup
* cleanup
* handle promise rejection for standard users (apparently they cannot get the schema)
* Updates
- Tweaked text (to be reviewed)
- Removed some code smells
- Ensure rancher logout via modal uses same process as normal logout
- Use async buttons in logout modal
- Add cancel to log out modal
- Fix logout on fail-whale page
* Add error handling (WIP with Andreas, does not currently reach final redirct / verify route)
* Fix check for IS_SLO
* Only allow optional auth provider log out if logged in auth provider
* Fix error message (SLO failures still result in rancher log out)
* check complete slo flow + add special copy when doing a slo logout
* Update shell/dialog/SloDialog.vue
Co-authored-by: Phillip Rak <rak.phillip@gmail.com>
* Update shell/edit/auth/saml.vue
Co-authored-by: Phillip Rak <rak.phillip@gmail.com>
* update syntax from phil pr review
* Fix logout modal on diangostics, about, etc pages that use plain template
* Remove PromptRemove from diagnostic page
- it uses the plain template which now contains it
- caused x2 modals to show
---------
Co-authored-by: Richard Cox <richard.cox@suse.com>
Co-authored-by: Phillip Rak <rak.phillip@gmail.com>
* Add support for individual banners
* Fixes
* Add tags to e2e tests
* Update e2e tests
* Revert changed
* Fix lint issues with trailing spaces
* Update e2e tests for login consent banner
* Update test for re-factor
* Fix lint
* Fix e2e banner tests
* Don't run individual banner tests for the standard user
* Ensure after hook runs after the standard tests, not the individual banner tests
* Fix updating existing ui-banners setting
- The from/to routes were transposed so I flipped them
- Load initial settings wasn't receiving the store and the error was swallowed.
- Fixed some error reporting instead of just swallowing exceptions
* e2e to test server-url validation
* refactor po and test
* e2e test for server-url validation in setup page
---------
Co-authored-by: Mo Mesgin <mmesgin@Mos-M2-MacBook-Pro.local>
* add logic to change copy of logout screen when logging out with an auth provider different than local
* fex e2e test
---------
Co-authored-by: Alexandre Alves <aalves@Alexandres-MacBook-Pro.local>
- Test count of settings requests
- during setup flow
- login page
- home page
- login page --> home page
In addition
- Fix issue where now populated fromHeader can be `false`
- Don't mix up CATTLE_BOOTSTRAP_PASSWORD and TEST_PASSWORD, this causes issues in the setup flow when they're different
- Refactor setup test, re-enable check at end
- when findAll runs we cache running results with key `JSON.stringify(headers) + method + opt.url`
- if a request is made with a matching key we return the first result as the second result (avoiding duplicate requests)
- when mgmt settings were fetched with a hardcoded url ... url contains singular `setting`
- when mgmt settings are fetched without hardcoded url ... url contains plural `settings`
- therefore the second request was not using the cached first request
Also
- replaced findBy with .find
* added more validations for server-url on Setup and Global Settings pages
* handling server-url 'use default value' case
* consistent error messages
---------
Co-authored-by: Mo Mesgin <mmesgin@Mos-M2-MacBook-Pro.local>
- When configuring a SAML auth provider a popup window is shown
- The popup window allows the user to log in to the SAML provider
- It then redirects to auth/verify to check response of log in
- If OIDC there will be a state. Code was added to error if htis was missing
- However for SAML there is no state, so we would incorrectly return user to log in page with an error
- Note - the auth provider was enabled, so closing the popup and refreshing the core page would continue as normal