Moeez Zahid
6ab9e497fc
refactor: Add logging, exception handling to Apple migration commands ( #32390 )
...
* refactor: Add logging, exception handling to Apple migration commands
* refactor: pylint fixes
2023-06-07 17:07:13 +05:00
Diana Huang
373d3d58b6
feat: Add wrapper to saml auth_complete. ( #31933 )
...
We would like to catch an error in SAML auth so that
we can handle it better in our observability. This
catches the original generic error and raises it as a more
specific one.
https://github.com/edx/edx-arch-experiments/issues/154
2023-03-20 12:04:16 -04:00
Moeez Zahid
a0eeb35151
refactor: Resume-able Apple migration mgmt cmds ( #31954 )
2023-03-20 13:02:59 +05:00
Moeez Zahid
5b1eb3777e
feat: Support Apple team Migration ( #31861 )
...
* feat: LEARNER-8790 Support Apple team migration
2023-03-10 13:06:31 +05:00
Muhammad Abdullah Waheed
90c4ca6e47
Revert "FC-0001: Account pages -> micro-frontend ( #30336 )" ( #31888 )
...
This reverts commit 0f02c7b3d9 .
2023-03-07 17:41:56 -05:00
Sagirov Evgeniy
0f02c7b3d9
FC-0001: Account pages -> micro-frontend ( #30336 )
...
* feat: Account pages. Learner Profile page
* feat: Account pages. Account Settings page
* feat: Account pages. Removed unused styles
* feat: Account pages. Removed unused toggles
* feat: fixed tests and pylint errors
* feat: update redirect to account settings for student_dashboard
* feat: fix pylint errors
2023-03-07 17:41:52 +05:00
John Nagro
b1880cb549
fix: properly handle SAML Index and Key errors ( #31882 )
2023-03-06 15:31:13 -05:00
Ned Batchelder
12765a7a59
refactor(test): use @skip_unless_lms uniformly
2023-02-01 13:52:26 -08:00
John Nagro
b68ea9194d
fix: tweak namespace for SSO username generation ( #31631 )
2023-01-20 11:47:15 -05:00
John Nagro
0c4efc6ef2
fix: increase namespace for SSO username generation ( #31619 )
2023-01-19 16:22:10 -05:00
Eugene Dyudyunov
3d86f8d8de
fix: registration form population with unicode through tpa ( #30935 )
...
Fixes the registration form username field prefilling with the
third party auth data when unicode usernames are allowed.
2022-09-07 11:59:58 -04:00
Zainab Amir
c962583304
fix: remove legacy error messages ( #30937 )
2022-09-06 14:26:27 +05:00
Alexander Sheehan
9b1e8dc515
chore: rolling back unique entity ID validation on saml provider configs
2022-07-21 13:55:27 -04:00
Alexander J Sheehan
0b28141b9e
fix: sso api validator fix ( #30732 )
2022-07-15 10:51:38 -04:00
Alexander Sheehan
605a328f24
fix: accounting for only current configs when checking for uniqueness
2022-06-27 16:56:37 -04:00
Alexander Sheehan
fd6b726a68
fix: accounting for non-unique entity ID on idp configs + fixing provider data bulk update bug
2022-06-22 11:02:08 -04:00
Alexander J Sheehan
6f496af369
Merge pull request #30538 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for multiple idp data configs
2022-06-06 12:00:37 -04:00
Alexander Sheehan
8d6e041d7e
fix: allowing for multiple idp data configs
2022-06-06 09:58:33 -04:00
Alexander J Sheehan
e0a976ac47
Merge pull request #30453 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for provider config fields to be provided on create
2022-05-27 13:16:37 -04:00
Alexander Sheehan
47693769e0
fix: allowing for provider config fields to be provided on create/updates
2022-05-27 12:59:03 -04:00
Alexander J Sheehan
baf1cbc6fb
Merge pull request #30357 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: improvments to the saml config and data endpoints
2022-05-09 11:48:14 -04:00
Alexander Sheehan
ccb635733e
fix: improvments to the saml config and data endpoints
2022-05-09 09:22:03 -04:00
ansabgillani
55df11b489
fix: remove sso history model
2022-04-27 23:52:22 +05:00
ansabgillani
8c7059c5bb
fix: reverting SSO History changes to unblock stage
2022-04-27 21:09:44 +05:00
ansabgillani
4af3d58b39
feat: Add SSO History for Support
2022-04-27 11:44:25 +05:00
Mubbshar Anwar
0ed58f32e7
feat: email linking for SSO ( #30258 )
...
Make email linking for SSO as default behavior.
VAN-331
2022-04-26 12:13:43 +05:00
Kira Miller
4975051d6f
Merge pull request #30297 from openedx/kiram15/ENT-5498
...
fix: allow for multiple customer idps
2022-04-23 12:25:54 -04:00
Kira
392c8fdba8
fix: quality fixes
2022-04-22 10:05:36 -04:00
Kira
2cbba5b4c8
fix: PR requests
2022-04-21 16:33:56 -04:00
Kira
5d7f340b5f
fix: formatting fix
2022-04-21 16:02:44 -04:00
Kira
6abe831d7a
fix: allow for multiple customer idps
2022-04-21 15:38:19 -04:00
edx-pipeline-bot
afceb27231
fix: Make SAMLConfiguration viewset readonly ( #247 ) ( #30259 )
...
The ony use is a GET request in admin portal so this view need not be post/put friendly right now.
It may actually get removed in an upcoming iteration, or stay readonly.
Fixes: SEC-1418
Co-authored-by: Binod Pant <bpant@edx.org >
2022-04-15 18:03:50 +00:00
Rebecca Graber
f9b6dda145
fix: pylint
2022-03-31 09:48:44 -04:00
Rebecca Graber
b7aca5e5f5
fix: verify redirect in inactive_user_view
2022-03-31 09:31:55 -04:00
Binod Pant
21d57ed0ab
feat: post handler to sync provider_data ( #30107 )
...
* feat: post handler to sync provider_data
this allows us to read provider_data metadata from a remote metadata url. reuses code from the task that currently processes all proiderconfigs in a batch
ENT-5482
* feat: lint fixes
* test: add test for sync_provider_data
* test: add case for update
* fix: lint fix
* fix: lint fix
* feat: use exc_info to report error better
* feat: update log message
2022-03-29 13:08:56 -04:00
Alexander Sheehan
f4c3471a9b
fix: adding was_valid_at to all provider configs
2022-03-24 12:02:14 -04:00
Alexander Sheehan
d852e38cba
feat: new is_valid field for provider configs
2022-03-21 10:56:15 -04:00
Kira
0ba94409bd
fix: lengthening display name
2022-03-15 10:14:54 -04:00
Kira
6d51428e4a
fix: duplicate entry fixes
2022-03-14 17:06:52 -04:00
Kira
97f05b4e4a
fix: lint errors
2022-03-14 13:30:52 -04:00
Kira
5dc39666e4
feat: add display name and make saml config draft
2022-03-14 12:34:19 -04:00
Binod Pant
3e53771878
feat: super trivial log change to help see entity_id ( #29935 )
...
to better log which changes we are making to which entity_id samlproviderdata
2022-02-18 12:18:42 -05:00
Zainab Amir
a717dfd50e
fix: ensure redirect url is whitelisted
2022-02-01 15:10:23 +05:00
Maria Grimaldi
07f88fab4b
fix: avoid raising error when auth_entry is None ( #29787 )
...
This commit avoids raising AuthEntryError when auth_entry is None.
At some point of the authentication flow, when the auth_entry is
missing from the auth URL (eg. auth/login/tpa-saml/?idp=idp), the
request session stores auth_entry: None causing this edited line to fail
which stops the login from completing.
2022-01-31 14:36:44 -05:00
Kira
4d1275a521
feat: associate name to username in saml config
2022-01-11 09:19:37 -05:00
Jawayria
7f5b4a6a47
chore: removed 'wrong-import-order' from disabled imports ( #29365 )
...
* chore: removed 'wrong-import-order' from disabled imports
2022-01-06 19:14:51 +05:00
Binod Pant
33437e7fef
feat: choose signing cert explicitly in saml metadata ENT-677 ( #29704 )
...
* feat: choose signing cert explicitly in saml metadata
when parsing, we want to explicitly choose the use='signing' cert instead of accidentally choosing the encryption one
ENT-677
* test: test for parse_metadata_xml
* feat: also address case when signing key is absent
in this case we consider the 'use'-less keydescriptior as if it's for both signing and encryption
* test: test case for missing use=signing attribute
* test: fix test failure
2022-01-05 16:18:01 -05:00
Jawayria
833ce7d586
Merge pull request #29570 from edx/jawayria/fix-url-common
...
fix: fixed RemovedInDjango40 warnings in common
2021-12-15 13:55:37 +05:00
Jawayria
bd5e00b725
fix: fixed RemovedInDjango40 warnings in common
2021-12-14 19:55:01 +05:00
John Nagro
3873ff7de9
feat: avoid certain strings in the suffix appended to edX usernames ( #29524 )
...
ENT-2824
2021-12-13 15:32:51 -05:00