Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/shib-idp-conftree
base: 13f38e5
Choose a base ref
...
head repository: docker/shib-idp-conftree
compare: f8d3464
Choose a head ref
  • 8 commits
  • 64 files changed
  • 1 contributor

Commits on Oct 5, 2019

  1. InCommon customizations

    pcaskey committed Oct 5, 2019
    Copy the full SHA
    8bf9894 View commit details

Commits on Oct 22, 2019

  1. Update saml-nameid.properties

    pcaskey committed Oct 22, 2019
    Copy the full SHA
    2c76402 View commit details

Commits on Feb 6, 2020

  1. initial 4.0 default

    pcaskey committed Feb 6, 2020
    Copy the full SHA
    1f3d90b View commit details

Commits on Feb 19, 2020

  1. Copy the full SHA
    04c8a9c View commit details

Commits on Mar 10, 2020

  1. update to beta2

    pcaskey committed Mar 10, 2020
    Copy the full SHA
    5009381 View commit details
  2. Copy the full SHA
    4efc501 View commit details
  3. merge fix 2

    pcaskey committed Mar 10, 2020
    Copy the full SHA
    e0fcf67 View commit details

Commits on Mar 11, 2020

  1. update to 4.0.0 (release)

    pcaskey committed Mar 11, 2020
    Copy the full SHA
    f8d3464 View commit details
Showing with 1,827 additions and 1,325 deletions.
  1. +4 −0 conf/admin/metrics.xml
  2. +29 −0 conf/attribute-registry.xml
  3. +0 −319 conf/attribute-resolver-full.xml
  4. +53 −53 conf/attribute-resolver-ldap.xml
  5. +1 −11 conf/attribute-resolver.xml
  6. +9 −0 conf/attributes/custom/README
  7. +28 −0 conf/attributes/default-rules.xml
  8. +50 −0 conf/attributes/eduCourse.xml
  9. +266 −0 conf/attributes/eduPerson.xml
  10. +510 −0 conf/attributes/inetOrgPerson.xml
  11. +67 −0 conf/attributes/samlSubject.xml
  12. +21 −3 conf/audit.xml
  13. +69 −0 conf/authn/authn-comparison.xml
  14. +34 −0 conf/authn/discovery-config.xml
  15. +1 −1 conf/authn/external-authn-config.xml
  16. +23 −8 conf/authn/general-authn.xml
  17. +0 −2 conf/authn/jaas-authn-config.xml
  18. +0 −2 conf/authn/krb5-authn-config.xml
  19. +15 −118 conf/authn/ldap-authn-config.xml
  20. +3 −26 conf/authn/mfa-authn-config.xml
  21. +21 −4 conf/authn/password-authn-config.xml
  22. +35 −0 conf/authn/saml-authn-config.xml
  23. +54 −13 conf/c14n/subject-c14n.xml
  24. +2 −4 conf/cas-protocol.xml
  25. +3 −0 conf/errors.xml
  26. +35 −21 conf/idp.properties
  27. +2 −5 conf/intercept/consent-intercept-config.xml
  28. +25 −0 conf/intercept/external-intercept-config.xml
  29. +2 −0 conf/intercept/profile-intercept.xml
  30. +0 −3 conf/ldap.properties
  31. +5 −6 conf/logback.xml
  32. +5 −6 conf/logback.xml.dist
  33. +0 −192 conf/logback.xml.tmp3
  34. +31 −22 conf/metadata-providers.xml
  35. +5 −0 conf/relying-party.xml
  36. +1 −7 conf/saml-nameid.properties
  37. +22 −4 conf/services.properties
  38. +12 −43 conf/services.xml
  39. +22 −22 credentials/idp-backchannel.crt
  40. BIN credentials/idp-backchannel.p12
  41. +23 −23 credentials/idp-encryption.crt
  42. +37 −37 credentials/idp-encryption.key
  43. +22 −22 credentials/idp-signing.crt
  44. +37 −37 credentials/idp-signing.key
  45. BIN credentials/sealer.jks
  46. +1 −1 credentials/sealer.kver
  47. +13 −0 credentials/secrets.properties
  48. +11 −6 edit-webapp/css/logout.css
  49. +16 −0 flows/authn/conditions/account-locked/account-locked-flow.xml
  50. +35 −0 flows/authn/conditions/conditions-flow.xml
  51. +16 −0 flows/authn/conditions/expired-password/expired-password-flow.xml
  52. +33 −0 flows/authn/conditions/expiring-password/expiring-password-flow.xml
  53. +25 −0 flows/user/prefs/prefs-flow.xml
  54. +0 −251 metadata/idp-metadata.xml
  55. +5 −4 views/admin/unlock-keys.vm
  56. +2 −2 views/duo.vm
  57. +3 −2 views/intercept/attribute-release.vm
  58. +2 −2 views/intercept/impersonate.vm
  59. +2 −0 views/intercept/terms-of-use.vm
  60. +5 −3 views/login-error.vm
  61. +8 −8 views/login.vm
  62. +10 −2 views/logout-complete.vm
  63. +2 −2 views/logout-propagate.vm
  64. +54 −28 views/logout.vm
4 changes: 4 additions & 0 deletions conf/admin/metrics.xml
@@ -28,6 +28,8 @@
<ref bean="shibboleth.metrics.RelyingPartyGaugeSet" />
<ref bean="shibboleth.metrics.AttributeResolverGaugeSet" />
<ref bean="shibboleth.metrics.AttributeFilterGaugeSet" />
<ref bean="shibboleth.metrics.CASServiceRegistryGaugeSet" />
<ref bean="shibboleth.metrics.ManagedBeanGaugeSet" />

<!--
<bean class="com.codahale.metrics.jvm.CachedThreadStatesGaugeSet"
@@ -59,6 +61,8 @@
<entry key="relyingparty" value-ref="shibboleth.metrics.RelyingPartyGaugeSet" />
<entry key="resolver" value-ref="shibboleth.metrics.AttributeResolverGaugeSet" />
<entry key="filter" value-ref="shibboleth.metrics.AttributeFilterGaugeSet" />
<entry key="cas" value-ref="shibboleth.metrics.CASServiceRegistryGaugeSet" />
<entry key="bean" value-ref="shibboleth.metrics.ManagedBeanGaugeSet" />
</util:map>

<!-- If you don't specify an alternate access policy, this named policy will be enforced. -->
29 changes: 29 additions & 0 deletions conf/attribute-registry.xml
@@ -0,0 +1,29 @@
<?xml version="1.0" encoding="UTF-8"?>
<beans xmlns="http://www.springframework.org/schema/beans"
xmlns:context="http://www.springframework.org/schema/context"
xmlns:util="http://www.springframework.org/schema/util"
xmlns:p="http://www.springframework.org/schema/p"
xmlns:c="http://www.springframework.org/schema/c"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd
http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd
http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util.xsd"

default-init-method="initialize"
default-destroy-method="destroy">

<!--
The system comes preconfigured to load rules directly from resource files
configured in services.xml so they're monitored for changes.
You can add mappings here, add more XML resource files, or drop property
files into the directory noted below, but they won't be monitored for changes
themselves.
-->

<!-- Default directory for custom mappings. -->
<bean parent="shibboleth.TranscodingRuleLoader"
c:dir="%{idp.home}/conf/attributes/custom"
c:extensions="#{{'.txt', '.props', '.properties', '.rule'}}" />

</beans>