17 Apr, 2013

1 commit


19 Mar, 2013

1 commit


18 Mar, 2013

1 commit


08 Mar, 2013

1 commit


07 Mar, 2013

2 commits


22 Feb, 2013

1 commit


31 Jan, 2013

1 commit


23 Jan, 2013

1 commit


22 Jan, 2013

2 commits


17 Jan, 2013

1 commit


15 Jan, 2013

1 commit


08 Jan, 2013

1 commit

  • OPENIDM-482 / CR-1155 - OpenIDM should be able to run as a windows service
    OPENIDM-749 / CR-1154 - Ability to set project directory at start-up 
    OPENIDM-1021 / CR-1154 - Wrong starting arguments during start could throw an error or warning.
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1867 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    Laszlo
     

04 Jan, 2013

1 commit

  • … try using add when replace fails
    
    These changes allow for the possibility of a non-existent password property on the managed/user object as a valid state.  This could arise when, for example, a record was create via recon from a source system which doesn't expose a cleartext password.  Code changes to policy and onCreate script to make this more sensible, and within the UI code to do an "add"-type of patch rather than a "replace" patch (which would fail, since the property doesn't exist).
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1864 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    jake.feasel
     

14 Dec, 2012

1 commit


13 Dec, 2012

2 commits


11 Dec, 2012

2 commits


09 Dec, 2012

1 commit


08 Dec, 2012

2 commits

  • Also included is an update to most recent changes to policy.js, fixing issue discovered with workflow testing.
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1740 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    jake.feasel
     
  • http://sources.forgerock.org/cru/CR-1057
    
    Calls to patch were failing now that validation is properly being applied to patch calls. The failure was due to the fact that the whole object was being validated, and some properties in the object were requiring reauth. So even if you were not changing a property which required reauth, the reauth validation rule was being raised. This fixed the problem by not raising the failure if the value being evaluated is the same as the current value for the object. 
    
    https://bugster.forgerock.org/jira/browse/OPENIDM-1011
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1739 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    jake.feasel
     

07 Dec, 2012

4 commits


06 Dec, 2012

1 commit

  • http://sources.forgerock.org/cru/CR-1020
    
    Fixing query used by task-managers to find users who qualify for task assignment 
    https://bugster.forgerock.org/jira/browse/OPENIDM-989 
    
    Allowing users with only the role openidm-admin to also see all of the processes 
    https://bugster.forgerock.org/jira/browse/OPENIDM-981 
    
    Lowercase usernames before checking them with OrientDB 
    https://bugster.forgerock.org/jira/browse/OPENIDM-985 
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1715 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    jake.feasel
     

05 Dec, 2012

2 commits


30 Nov, 2012

1 commit


29 Nov, 2012

2 commits


28 Nov, 2012

2 commits

  • https://bugster.forgerock.org/jira/browse/OPENIDM-936
     http://sources.forgerock.org/cru/CR-970
    
    For changes to router-authz.js:
     https://bugster.forgerock.org/jira/browse/OPENIDM-935
     http://sources.forgerock.org/cru/CR-969
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1663 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    jake.feasel
     
  • Using new validateOnlyIfPresent flag to solve https://bugster.forgerock.org/jira/browse/OPENIDM-934 
    
    Modifying apache configuration to reverse proxy for all requests to openidm/ rather than just to openidm/managed
    
    misc trivial cleanup
    
    git-svn-id: https://svn.forgerock.org/openidm/trunk@1656 d98387aa-ee2c-4292-a9e6-504d2a719fd3
    jake.feasel
     

22 Nov, 2012

1 commit


21 Nov, 2012

4 commits