From 210f9c6acefdf2f51d33baa1ed7a2c131729fb93 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?G=C3=A1bor=20Boros?= Date: Sat, 19 Sep 2020 11:57:24 +0200 Subject: [PATCH] refactor(lms): Update migrations to use lms.yml in the help text --- .../migrations/0004_auto_20200919_0955.py | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 common/djangoapps/third_party_auth/migrations/0004_auto_20200919_0955.py diff --git a/common/djangoapps/third_party_auth/migrations/0004_auto_20200919_0955.py b/common/djangoapps/third_party_auth/migrations/0004_auto_20200919_0955.py new file mode 100644 index 0000000000..a397de0177 --- /dev/null +++ b/common/djangoapps/third_party_auth/migrations/0004_auto_20200919_0955.py @@ -0,0 +1,34 @@ +# Generated by Django 2.2.16 on 2020-09-19 09:55 + +from django.db import migrations, models +import openedx.core.lib.hash_utils + + +class Migration(migrations.Migration): + + dependencies = [ + ('third_party_auth', '0003_samlconfiguration_is_public'), + ] + + operations = [ + migrations.AlterField( + model_name='ltiproviderconfig', + name='lti_consumer_secret', + field=models.CharField(blank=True, default=openedx.core.lib.hash_utils.create_hash256, help_text='The shared secret that the LTI Tool Consumer will use to authenticate requests. Only this edX instance and this tool consumer instance should know this value. For increased security, you can avoid storing this in your database by leaving this field blank and setting SOCIAL_AUTH_LTI_CONSUMER_SECRETS = {"consumer key": "secret", ...} in your instance\'s Django setttigs (or lms.yml)', max_length=255), + ), + migrations.AlterField( + model_name='oauth2providerconfig', + name='secret', + field=models.TextField(blank=True, help_text='For increased security, you can avoid storing this in your database by leaving this field blank and setting SOCIAL_AUTH_OAUTH_SECRETS = {"(backend name)": "secret", ...} in your instance\'s Django settings (or lms.yml)', verbose_name='Client Secret'), + ), + migrations.AlterField( + model_name='samlconfiguration', + name='private_key', + field=models.TextField(blank=True, help_text='To generate a key pair as two files, run "openssl req -new -x509 -days 3652 -nodes -out saml.crt -keyout saml.key". Paste the contents of saml.key here. For increased security, you can avoid storing this in your database by leaving this field blank and setting it via the SOCIAL_AUTH_SAML_SP_PRIVATE_KEY setting in your instance\'s Django settings (or lms.yml).'), + ), + migrations.AlterField( + model_name='samlconfiguration', + name='public_key', + field=models.TextField(blank=True, help_text="Public key certificate. For increased security, you can avoid storing this in your database by leaving this field blank and setting it via the SOCIAL_AUTH_SAML_SP_PUBLIC_CERT setting in your instance's Django settings (or lms.yml)."), + ), + ]