summaryrefslogtreecommitdiff
path: root/app/assets/javascripts/u2f
Commit message (Collapse)AuthorAgeFilesLines
* Prettify additional modules (I through Z)Mike Greiling2018-10-163-12/+20
|
* Resolve "2FA should not attempt to use U2F in unsupported browsers"Jan Beckmann2018-06-251-7/+1
|
* require jQuery to be explicitly importedremove-jquery-globalsMike Greiling2018-03-092-0/+2
|
* Remove u2f webpack bundleMike Greiling2018-03-013-29/+66
|
* Remove u2f from globalnamespace38869-u2fFilipa Lacerda2017-10-094-214/+183
|
* Resolve "Specific Async Script Loading by using a Page Variable"Tim Zallmann2017-08-032-0/+4
|
* remove bind polyfill from u2f/register.jsMike Greiling2017-05-081-10/+8
|
* remove bind polyfill from u2f/error.jsMike Greiling2017-05-081-3/+1
|
* remove bind polyfill from u2f/authenticate.jsMike Greiling2017-05-081-9/+7
|
* Remove .es6 from file extensions (!9241)winniehell2017-03-051-0/+0
|
* replace implicit this == window with explicit bindingMike Greiling2017-02-173-3/+3
|
* Merge branch '26066-wrong-messsage-for-unregistered-u2f-device-on-sign-in' ↵Fatih Acet2017-01-193-10/+10
|\ | | | | | | | | | | | | | | | | | | into 'master' New U2F ineligible message Closes #26066 See merge request !8392
| * Added isAuthenticate to differentiate between ineligible messages26066-wrong-messsage-for-unregistered-u2f-device-on-sign-inLuke "Jared" Bennett2017-01-043-10/+10
| |
* | resolve all x-spacing and no-spaced-x eslint violationsMike Greiling2017-01-183-6/+6
| |
* | resolve all padded-blocks eslint violationsMike Greiling2017-01-184-12/+4
|/
* Improved the u2f flow18556-polish-up-the-u2f-flowLuke "Jared" Bennett2016-12-271-14/+21
| | | | Added tests
* Merge branch 'remove-u2f-error-logging' into 'master' Alfredo Sumaran2016-12-213-3/+4
|\ | | | | | | | | Display error code for U2F errors See merge request !7305
| * Display error code for U2F errors (!7305)winniehell2016-11-073-3/+4
| |
* | resolve all instances of no-undef eslint rule violationsclean-no-undefMike Greiling2016-12-143-3/+13
| |
* | explicitly disable eslint inlineexplicitly-disable-eslint-inlineLuke "Jared" Bennett2016-11-154-4/+4
|/
* disable ESLint for all JavaScript fileswinniehell2016-10-264-0/+4
|
* Restore comments lost when converting CoffeeScript to JavaScriptJared Deckard2016-09-082-0/+25
|
* ES6ify all the things!Fatih Acet2016-07-248-154/+216
|
* Add a U2F feature spec for multiple devices owned by the same user.17341-firefox-u2fTimothy Andrew2016-07-142-6/+9
| | | | | 1. This scenario was previously tested for the registration flow, but not authentication.
* Use a single challenge for U2F authentication.Timothy Andrew2016-07-141-3/+12
| | | | | | | | | | | | | | | | | | | | 1. According to the spec, either we have a single challenge with a number of `signRequests`, or a number of `signRequests`, each with it's own challenge. 2. Previously, we had both these - per-request challenges, as well as a single extra challenge. 3. This commit changes this so that the per-request challenges are removed, leaving only a single challenge, as per the v1.1 U2F API. 4. The existing implementation didn't work in Firefox, because the Firefox (extension) implementation is less flexible with regard to the inputs. 5. Fix teaspoon specs. 6. References: https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-javascript-api.html#h2_background
* Load Javascript U2F library selectively.Timothy Andrew2016-07-141-13/+1
| | | | | | | | | | 1. Only on supported Chrome versions 2. Mainly, this lets us simplify the javascript-based U2F check to `window.u2f`, where `window.u2f` can either be loaded from the GitLab server (for Chrome) or from the Firefox extension. 3. This is a better way to provide browser detection for U2F.
* Implement authentication (login) using a U2F device.Timothy Andrew2016-06-061-0/+63
| | | | | | - Move the `authenticate_with_two_factor` method from `ApplicationController` to the `AuthenticatesWithTwoFactor` module, where it should be.
* Implement U2F registration.Timothy Andrew2016-06-063-0/+91
- Move the `TwoFactorAuthsController`'s `new` action to `show`, since the page is not used to create a single "two factor auth" anymore. We can have a single 2FA authenticator app, along with any number of U2F devices, in any combination, so the page will be accessed after the first "two factor auth" is created. - Add the `u2f` javascript library, which provides an API to the browser's U2F implementation. - Add tests for the JS components