Zachary Hancock
0196def99d
feat: use idv approved event ( #35470 )
...
* feat: replace LEARNER_NOW_VERIFIED signal with new openedx-event
2024-09-19 09:24:20 -04:00
Syed Sajjad Hussain Shah
67a1401f8a
fix: should autogenerate username in tpa pipeline if feature is enabled ( #35101 )
2024-07-09 08:39:36 +00:00
Zaman Afzal
06264e7321
feat: Update social_user uid using csv from admin panel ( #35048 )
2024-07-02 14:08:27 +05:00
Kyle McCormick
ccf2b75204
fix: stabilize makemigrations when SITE_ID != 1 ( #34787 )
...
Some models in third_party_auth used settings.SITE_ID as a field
default, which caused Django to say migrations were out of sync whenever
settings.SITE_ID happened to be anything other than 1 for any developer:
Your models in app(s): 'third_party_auth' have changes that are not
yet reflected in a migration, and so won't be applied. Run
'manage.py makemigrations' to make new migrations, and then re-run
'manage.py migrate' to apply them.
This could easily happen if a developer is testing out site
configuration or site-specific theming and ends up with a SITE_ID other
than 1.
The fix, inspired by a StackOverflow answer [1], is to simply create
a wrapper function for the dynamic default value. The wrapper function,
rather than the current value of SITE_ID, will be serialized to the
migraiton file.
This commit includes a migration file, but from a database perspective,
the migration is a no-op.
[1] https://stackoverflow.com/a/12654998
2024-05-22 13:52:53 -04:00
salmannawaz
57b480b04f
Update all edx-platform REST endpoints to support JWT Auth ( #34152 )
...
* chore: update API endpoints to support default JWT auth
The default DRF Auth classes were recently updated to allow for both JWT and Session auth by default. Any endpoint that overrides the AUTHENTICATION_CLASSES but has just session, just JWT or just both of those should be updated to remove the override.
Details in https://github.com/openedx/edx-platform/issues/33662
2024-02-13 10:46:58 -05:00
Muhammad Abdullah Waheed
caf8e456e2
Revert "feat: Account and profile MFE legacy removal - redeployment ( #31893 )" ( #33542 )
...
This reverts commit 08f5e7e563 .
2023-10-19 12:26:29 +05:00
Muhammad Abdullah Waheed
08f5e7e563
feat: Account and profile MFE legacy removal - redeployment ( #31893 )
...
feat: Account and profile MFE legacy removal - redeployment
* Revert "Revert "FC-0001: Account pages -> micro-frontend (#30336 )" (#31888 )"
This reverts commit 90c4ca6e47 .
* refactor: removed filters test from user_api accounts
---------
Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com >
2023-10-19 10:43:15 +05:00
Feanil Patel
7202c22e1d
Merge pull request #33373 from openedx/feanil/update_password_length_default
...
feat: Update the minimum password length.
2023-10-17 10:08:15 -04:00
Feanil Patel
64e91d4080
test: Update to an even longer password.
2023-10-12 10:31:13 -04:00
Feanil Patel
1e2ea85372
test: Update more tests that had short passwords.
2023-10-10 16:36:26 -04:00
Navin Karkera
565b34e4e0
feat: allow oauth configuration per site and backend ( #32656 )
...
Allows admins to configure same oauth backend for multiple sites.
This change includes site_id in KEY_FIELDS for oauth configuration
provider allowing a backend configuration for each site.
2023-10-10 11:33:23 -04:00
Irtaza Akram
60bc0b43a0
feat: django 4.2 migrations ( #33344 )
2023-09-27 17:01:24 +05:00
John Nagro
2ca5b01099
fix: better username lookup in tpa pipeline ( #33145 )
2023-08-31 11:47:01 -04:00
Usama Sadiq
7710e60328
fix: fix middleware get_response parameter deprecation warning ( #33067 )
2023-08-22 15:52:30 +05:00
Awais Qureshi
64abfd126c
fix: upgrade oauthlib and django-oauth-toolkit to new versions. ( #32631 )
...
* chore: bump django-oauth-toolkit and oauthlib
---------
Co-authored-by: Muhammad Umar Khan <m.umarkhan999@gmail.com >
2023-08-18 14:21:25 +05:00
Usama Sadiq
9979017b69
fix: fix django4 deprecation warnings ( #32975 )
2023-08-16 16:20:54 +05:00
Moeez Zahid
9123602386
refactor: Log exceptions in apple user migration ( #32987 )
2023-08-11 14:52:04 +05:00
Moeez Zahid
df63305e24
fix: Fix Apple registration during migration ( #32893 )
2023-08-02 13:22:53 +05:00
John Nagro
74e3bb9fd4
fix: correct bug in sapsf country to code mapping ( #32675 )
2023-07-06 20:28:38 +00:00
John Nagro
6d5dcdf77a
fix: improve username generation ( #32613 )
2023-06-30 09:47:02 -04:00
Moeez Zahid
9a8f08f972
fix: Handle invalid_client error for Apple migration ( #32531 )
2023-06-21 14:20:39 +05:00
Moeez Zahid
2d1a6e27fc
refactor: Add exception handling to Apple migration commands ( #32500 )
...
* refactor: Add exception handling to Apple migration commands
* refactor: Remove extra import
2023-06-19 14:07:24 +05:00
Moeez Zahid
6ab9e497fc
refactor: Add logging, exception handling to Apple migration commands ( #32390 )
...
* refactor: Add logging, exception handling to Apple migration commands
* refactor: pylint fixes
2023-06-07 17:07:13 +05:00
Diana Huang
373d3d58b6
feat: Add wrapper to saml auth_complete. ( #31933 )
...
We would like to catch an error in SAML auth so that
we can handle it better in our observability. This
catches the original generic error and raises it as a more
specific one.
https://github.com/edx/edx-arch-experiments/issues/154
2023-03-20 12:04:16 -04:00
Moeez Zahid
a0eeb35151
refactor: Resume-able Apple migration mgmt cmds ( #31954 )
2023-03-20 13:02:59 +05:00
Moeez Zahid
5b1eb3777e
feat: Support Apple team Migration ( #31861 )
...
* feat: LEARNER-8790 Support Apple team migration
2023-03-10 13:06:31 +05:00
Muhammad Abdullah Waheed
90c4ca6e47
Revert "FC-0001: Account pages -> micro-frontend ( #30336 )" ( #31888 )
...
This reverts commit 0f02c7b3d9 .
2023-03-07 17:41:56 -05:00
Sagirov Evgeniy
0f02c7b3d9
FC-0001: Account pages -> micro-frontend ( #30336 )
...
* feat: Account pages. Learner Profile page
* feat: Account pages. Account Settings page
* feat: Account pages. Removed unused styles
* feat: Account pages. Removed unused toggles
* feat: fixed tests and pylint errors
* feat: update redirect to account settings for student_dashboard
* feat: fix pylint errors
2023-03-07 17:41:52 +05:00
John Nagro
b1880cb549
fix: properly handle SAML Index and Key errors ( #31882 )
2023-03-06 15:31:13 -05:00
Ned Batchelder
12765a7a59
refactor(test): use @skip_unless_lms uniformly
2023-02-01 13:52:26 -08:00
John Nagro
b68ea9194d
fix: tweak namespace for SSO username generation ( #31631 )
2023-01-20 11:47:15 -05:00
John Nagro
0c4efc6ef2
fix: increase namespace for SSO username generation ( #31619 )
2023-01-19 16:22:10 -05:00
Eugene Dyudyunov
3d86f8d8de
fix: registration form population with unicode through tpa ( #30935 )
...
Fixes the registration form username field prefilling with the
third party auth data when unicode usernames are allowed.
2022-09-07 11:59:58 -04:00
Zainab Amir
c962583304
fix: remove legacy error messages ( #30937 )
2022-09-06 14:26:27 +05:00
Alexander Sheehan
9b1e8dc515
chore: rolling back unique entity ID validation on saml provider configs
2022-07-21 13:55:27 -04:00
Alexander J Sheehan
0b28141b9e
fix: sso api validator fix ( #30732 )
2022-07-15 10:51:38 -04:00
Alexander Sheehan
605a328f24
fix: accounting for only current configs when checking for uniqueness
2022-06-27 16:56:37 -04:00
Alexander Sheehan
fd6b726a68
fix: accounting for non-unique entity ID on idp configs + fixing provider data bulk update bug
2022-06-22 11:02:08 -04:00
Alexander J Sheehan
6f496af369
Merge pull request #30538 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for multiple idp data configs
2022-06-06 12:00:37 -04:00
Alexander Sheehan
8d6e041d7e
fix: allowing for multiple idp data configs
2022-06-06 09:58:33 -04:00
Alexander J Sheehan
e0a976ac47
Merge pull request #30453 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for provider config fields to be provided on create
2022-05-27 13:16:37 -04:00
Alexander Sheehan
47693769e0
fix: allowing for provider config fields to be provided on create/updates
2022-05-27 12:59:03 -04:00
Alexander J Sheehan
baf1cbc6fb
Merge pull request #30357 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: improvments to the saml config and data endpoints
2022-05-09 11:48:14 -04:00
Alexander Sheehan
ccb635733e
fix: improvments to the saml config and data endpoints
2022-05-09 09:22:03 -04:00
ansabgillani
55df11b489
fix: remove sso history model
2022-04-27 23:52:22 +05:00
ansabgillani
8c7059c5bb
fix: reverting SSO History changes to unblock stage
2022-04-27 21:09:44 +05:00
ansabgillani
4af3d58b39
feat: Add SSO History for Support
2022-04-27 11:44:25 +05:00
Mubbshar Anwar
0ed58f32e7
feat: email linking for SSO ( #30258 )
...
Make email linking for SSO as default behavior.
VAN-331
2022-04-26 12:13:43 +05:00
Kira Miller
4975051d6f
Merge pull request #30297 from openedx/kiram15/ENT-5498
...
fix: allow for multiple customer idps
2022-04-23 12:25:54 -04:00
Kira
392c8fdba8
fix: quality fixes
2022-04-22 10:05:36 -04:00