Field validation in forms should be done on the client side

Bug #506345 reported by Stuart Metcalfe
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Canonical SSO provider
Fix Released
Low
Unassigned
Ubuntu
Invalid
Undecided
Unassigned

Bug Description

Based on the design team's guidelines, the form fields in the sso service should be validated on the client side using javascript wherever possible. This doesn't make sense for the login form itself but should be used for account management and account creation/password reminder where passwords are set. We shouldn't live-check the existence of email addresses in the system but we can check for email address validity.

This shouldn't replace server side validation, obviously!

visibility: public → private
Changed in canonical-identity-provider:
milestone: 2.1.1 → 2.2.0
Changed in canonical-identity-provider:
milestone: 2.2.0 → 2.3.0
Changed in canonical-identity-provider:
milestone: 2.3.0 → 2.4.0
visibility: private → public
Changed in canonical-identity-provider:
milestone: 2.4.0 → 2.5.0
Changed in canonical-identity-provider:
milestone: 2.5.0 → none
tags: added: meta618616
tags: added: proj-sso-bling
removed: meta618616
Revision history for this message
Michael Nelson (michael.nelson) wrote :

Just a note that this can be done *really* easily without any javascript for most modern browsers. Here's a branch for SCA which adds client side validation (with a 40sec video demo'ing it):

https://code.launchpad.net/~michael.nelson/software-center-agent/860507-basic-client-validation/+merge/77188

Changed in ubuntu:
status: New → Invalid
Revision history for this message
Daniel Manrique (roadmr) wrote :

I think they are: I tried a few invalid e-mail addresses and they pop up an "invalid" message which seems to be generated clientside, using newer browsers' validation for<input type="email">. Also the password is checked for length, strength and matching on the client. This is the case both on the new account form, and the existing account editing forms.

I'll close this report now, but if any of the existing behaviors needs tweaking per the design team's guidelines, it can be reopened.

Changed in canonical-identity-provider:
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.