549 Commits

Author SHA1 Message Date
Alexander Dusenbery
2fcce121e9 feat: make marketing email and research opt-in checkboxs selectively ignorable
We want to support a flow for SSO-enabled Enterprise customers who have
agreed off-platform that none of their learners will opt-in to marketing emails
or sharing research data. This change proposes to do so by
adding an optional field that, when enabled, disables the presence of
the two checkboxes on this registration form and sets their values to false.

ENT-11401
2026-03-02 12:47:21 -05:00
Felipe Bermúdez-Mendoza
b367336d60 feat: make ACCOUNT_MICROFRONTEND_URL site aware. 2026-03-02 08:18:12 -05:00
Tarun Tak
f9d65aa23f chore: use zoneinfo instead of pytz 2026-01-09 12:22:23 -05:00
Krish Tyagi
1ffa136d45 fix: removal of temporary saml toggle (#37651)
Removes temporary rollout toggle ENABLE_SAML_CONFIG_SIGNAL_HANDLERS. The
toggle was used to rollout a fix, and now the fix that uses the signal handlers is
enabled by default.

The only follow-up needed by anyone is to no longer set this toggle, which will no
longer do anything.
2026-01-06 16:38:41 -05:00
Sameen Fatima
8ca34141a6 feat: look up remote_id by remote_id_field_name (#37228) 2025-11-13 09:20:26 +05:00
Ahtisham Shahid
dc7db1d3ad feat: unpinned social-auth-core (#37550)
* feat: unpinned social-auth-core

feat: unpinned social-auth-core

* fix: updated to resolve failing tests

* fix: resolved linter errors and failing tests

* fix: updated get_attr signature according to new version
2025-10-29 13:16:34 -04:00
Krish Tyagi
b86e203249 fix: Improve SAML configuration checks and update warning messages (#37377)
- Removes custom attributes for report. Uses report output only.
- Adds a count for disabled SAML configs.
- Displays disabled status of provider.
- Slug mismatch now informational only (rather than warning)
* Cleans up unit tests.
2025-10-25 00:43:35 +00:00
Sameen Fatima
3a97ff2d5e fix: do not autogenerate username if coming through SSO (#37522)
Co-authored-by: Sameen Fatima <sameen.fatima@A006-01036.local>
2025-10-23 14:47:14 +05:00
usamasadiq
8a2c451439 fix: replace deprecated assertDictContainsSubset() 2025-10-12 11:10:36 +05:00
Krish Tyagi
1eb387b11b feat: update saml management command (#37330)
The SAML management command has been refactored from
an auto-update tool to a comprehensive report-only audit system.
The changes introduce a new --run-checks option that provides
detailed reporting on SAML configuration issues without making
any automatic changes.
2025-09-17 13:02:55 +00:00
wgu-jesse-stewart
254dd2f689 Fix: CORS issues in third-party auth disconnect by adding JSON endpoint (#37100)
Add a json auth endpoint where previously there was only an HTML redirect version. This will make it easier to work with MFEs.

---------

Co-authored-by: Feanil Patel <feanil@axim.org>
2025-09-15 10:07:49 -04:00
Krish Tyagi
af3553db7a fix: Update SAMLProviderConfig for site-specific configurations (#37294)
Fixes minor bugs in new SAMLProviderConfig signal
handlers.
2025-09-03 17:44:46 -04:00
Krish Tyagi
14cdbc855d fix: SAML provider config references to use current SAML configuration versions (#36954)
Introduces temporary rollout toggle ENABLE_SAML_CONFIG_SIGNAL_HANDLERS
which controls whether SAML configuration signal handlers are active.
When enabled (True), signal handlers will automatically update SAMLProviderConfig
references when the associated SAMLConfiguration is updated.
When disabled (False), SAMLProviderConfigs point to outdated SAMLConfiguration.

Warning: Disabling this toggle may result in SAMLProviderConfig instances
pointing to outdated SAMLConfiguration records.

Use the management command 'saml --fix-references' to fix outdated references.
2025-08-12 09:34:34 -04:00
jawad khan
f4d52e070b Fixed jwt scope issue (#37134)
* fix: Fixed jwt scope issue

* fix: fixed test cases
2025-08-08 11:01:21 +05:00
Muhammad Arslan
709ad82707 fix: find and match enterprise user only if enterprise is enabled (#36958)
Co-authored-by: Peter Pinch <pdpinch@mit.edu>
2025-07-31 08:58:14 -04:00
Kaustav Banerjee
aca3ba4fda test: add test for unprivileged user 2025-05-29 16:23:10 +05:30
Kaustav Banerjee
02344c5905 feat: API to delete given social auth record for user 2025-05-29 16:23:10 +05:30
sarina
1e3074a3f9 docs: Update edx.rtd.io links to docs.openedx.org 2025-04-02 12:10:56 -04:00
Deborah Kaplan
29de9b2dc4 feat!: Legacy account, profile, order history removal (#36219)
* feat!: Legacy account, profile, order history removal

This removes the legacy account and profile applications, and the order
history page. This is primarily a reapplication of #31893, which was
rolled back due to prior blockers.

FIXES: APER-3884
FIXES: openedx/public-engineering#71


Co-authored-by: Muhammad Abdullah Waheed <42172960+abdullahwaheed@users.noreply.github.com>
Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com>
2025-02-10 14:39:13 -05:00
Usama Sadiq
1a16073ad0 fix: enable pylint warnings (#36196) 2025-02-03 14:18:11 +05:00
Muhammad Adeel Tajamul
3d5f4983c5 feat: added anonymous id in edx.bi.user.account.authenticated event (#35934) 2024-12-02 13:22:27 +05:00
Diana Huang
3d637ebb04 docs: Add README for third_party_auth. (#35608) 2024-10-07 18:34:38 +00:00
Hamza Waleed
36a413a3cf Merge branch 'master' into hamza/ENT-9440-samlproviderconfig-history-tracking 2024-10-07 14:39:44 +05:00
Zachary Hancock
c34ccffc7f feat: rework idv cert trigger (#35580)
* feat: rework idv cert trigger
* feat: separate PhotoVerification events
2024-10-04 12:58:15 -04:00
hamzawaleed01
2a9e8b3ec6 feat: history tracking on SAMLProviderConfig model 2024-10-02 17:54:57 +05:00
Zachary Hancock
0196def99d feat: use idv approved event (#35470)
* feat: replace LEARNER_NOW_VERIFIED signal with new openedx-event
2024-09-19 09:24:20 -04:00
Syed Sajjad Hussain Shah
67a1401f8a fix: should autogenerate username in tpa pipeline if feature is enabled (#35101) 2024-07-09 08:39:36 +00:00
Zaman Afzal
06264e7321 feat: Update social_user uid using csv from admin panel (#35048) 2024-07-02 14:08:27 +05:00
Kyle McCormick
ccf2b75204 fix: stabilize makemigrations when SITE_ID != 1 (#34787)
Some models in third_party_auth used settings.SITE_ID as a field
default, which caused Django to say migrations were out of sync whenever
settings.SITE_ID happened to be anything other than 1 for any developer:

    Your models in app(s): 'third_party_auth' have changes that are not
    yet reflected in a migration, and so won't be applied. Run
    'manage.py makemigrations' to make new migrations, and then re-run
    'manage.py migrate' to apply them.

This could easily happen if a developer is testing out site
configuration or site-specific theming and ends up with a SITE_ID other
than 1.

The fix, inspired by a StackOverflow answer [1], is to simply create
a wrapper function for the dynamic default value. The wrapper function,
rather than the current value of SITE_ID, will be serialized to the
migraiton file.

This commit includes a migration file, but from a database perspective,
the migration is a no-op.

[1] https://stackoverflow.com/a/12654998
2024-05-22 13:52:53 -04:00
salmannawaz
57b480b04f Update all edx-platform REST endpoints to support JWT Auth (#34152)
* chore: update API endpoints to support default JWT auth

The default DRF Auth classes were recently updated to allow for both JWT and Session auth by default. Any endpoint that overrides the AUTHENTICATION_CLASSES but has just session, just JWT or just both of those should be updated to remove the override.

Details in https://github.com/openedx/edx-platform/issues/33662
2024-02-13 10:46:58 -05:00
Muhammad Abdullah Waheed
caf8e456e2 Revert "feat: Account and profile MFE legacy removal - redeployment (#31893)" (#33542)
This reverts commit 08f5e7e563.
2023-10-19 12:26:29 +05:00
Muhammad Abdullah Waheed
08f5e7e563 feat: Account and profile MFE legacy removal - redeployment (#31893)
feat: Account and profile MFE legacy removal - redeployment

* Revert "Revert "FC-0001: Account pages -> micro-frontend (#30336)" (#31888)"

This reverts commit 90c4ca6e47.

* refactor: removed filters test from user_api accounts

---------

Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com>
2023-10-19 10:43:15 +05:00
Feanil Patel
7202c22e1d Merge pull request #33373 from openedx/feanil/update_password_length_default
feat: Update the minimum password length.
2023-10-17 10:08:15 -04:00
Feanil Patel
64e91d4080 test: Update to an even longer password. 2023-10-12 10:31:13 -04:00
Feanil Patel
1e2ea85372 test: Update more tests that had short passwords. 2023-10-10 16:36:26 -04:00
Navin Karkera
565b34e4e0 feat: allow oauth configuration per site and backend (#32656)
Allows admins to configure same oauth backend for multiple sites.

This change includes site_id in KEY_FIELDS for oauth configuration
provider allowing a backend configuration for each site.
2023-10-10 11:33:23 -04:00
Irtaza Akram
60bc0b43a0 feat: django 4.2 migrations (#33344) 2023-09-27 17:01:24 +05:00
John Nagro
2ca5b01099 fix: better username lookup in tpa pipeline (#33145) 2023-08-31 11:47:01 -04:00
Usama Sadiq
7710e60328 fix: fix middleware get_response parameter deprecation warning (#33067) 2023-08-22 15:52:30 +05:00
Awais Qureshi
64abfd126c fix: upgrade oauthlib and django-oauth-toolkit to new versions. (#32631)
* chore: bump django-oauth-toolkit and oauthlib
---------

Co-authored-by: Muhammad Umar Khan <m.umarkhan999@gmail.com>
2023-08-18 14:21:25 +05:00
Usama Sadiq
9979017b69 fix: fix django4 deprecation warnings (#32975) 2023-08-16 16:20:54 +05:00
Moeez Zahid
9123602386 refactor: Log exceptions in apple user migration (#32987) 2023-08-11 14:52:04 +05:00
Moeez Zahid
df63305e24 fix: Fix Apple registration during migration (#32893) 2023-08-02 13:22:53 +05:00
John Nagro
74e3bb9fd4 fix: correct bug in sapsf country to code mapping (#32675) 2023-07-06 20:28:38 +00:00
John Nagro
6d5dcdf77a fix: improve username generation (#32613) 2023-06-30 09:47:02 -04:00
Moeez Zahid
9a8f08f972 fix: Handle invalid_client error for Apple migration (#32531) 2023-06-21 14:20:39 +05:00
Moeez Zahid
2d1a6e27fc refactor: Add exception handling to Apple migration commands (#32500)
* refactor: Add exception handling to Apple migration commands

* refactor: Remove extra import
2023-06-19 14:07:24 +05:00
Moeez Zahid
6ab9e497fc refactor: Add logging, exception handling to Apple migration commands (#32390)
* refactor: Add logging, exception handling to Apple migration commands
* refactor: pylint fixes
2023-06-07 17:07:13 +05:00
Diana Huang
373d3d58b6 feat: Add wrapper to saml auth_complete. (#31933)
We would like to catch an error in SAML auth so that
we can handle it better in our observability. This
catches the original generic error and raises it as a more
specific one.

https://github.com/edx/edx-arch-experiments/issues/154
2023-03-20 12:04:16 -04:00
Moeez Zahid
a0eeb35151 refactor: Resume-able Apple migration mgmt cmds (#31954) 2023-03-20 13:02:59 +05:00