Commit Graph

492 Commits

Author SHA1 Message Date
Eugene Dyudyunov
3d86f8d8de fix: registration form population with unicode through tpa (#30935)
Fixes the registration form username field prefilling with the
third party auth data when unicode usernames are allowed.
2022-09-07 11:59:58 -04:00
Zainab Amir
c962583304 fix: remove legacy error messages (#30937) 2022-09-06 14:26:27 +05:00
Alexander Sheehan
9b1e8dc515 chore: rolling back unique entity ID validation on saml provider configs 2022-07-21 13:55:27 -04:00
Alexander J Sheehan
0b28141b9e fix: sso api validator fix (#30732) 2022-07-15 10:51:38 -04:00
Alexander Sheehan
605a328f24 fix: accounting for only current configs when checking for uniqueness 2022-06-27 16:56:37 -04:00
Alexander Sheehan
fd6b726a68 fix: accounting for non-unique entity ID on idp configs + fixing provider data bulk update bug 2022-06-22 11:02:08 -04:00
Alexander J Sheehan
6f496af369 Merge pull request #30538 from openedx/asheehan-edx/saml-api-related-improvements
fix: allowing for multiple idp data configs
2022-06-06 12:00:37 -04:00
Alexander Sheehan
8d6e041d7e fix: allowing for multiple idp data configs 2022-06-06 09:58:33 -04:00
Alexander J Sheehan
e0a976ac47 Merge pull request #30453 from openedx/asheehan-edx/saml-api-related-improvements
fix: allowing for provider config fields to be provided on create
2022-05-27 13:16:37 -04:00
Alexander Sheehan
47693769e0 fix: allowing for provider config fields to be provided on create/updates 2022-05-27 12:59:03 -04:00
Alexander J Sheehan
baf1cbc6fb Merge pull request #30357 from openedx/asheehan-edx/saml-api-related-improvements
fix: improvments to the saml config and data endpoints
2022-05-09 11:48:14 -04:00
Alexander Sheehan
ccb635733e fix: improvments to the saml config and data endpoints 2022-05-09 09:22:03 -04:00
ansabgillani
55df11b489 fix: remove sso history model 2022-04-27 23:52:22 +05:00
ansabgillani
8c7059c5bb fix: reverting SSO History changes to unblock stage 2022-04-27 21:09:44 +05:00
ansabgillani
4af3d58b39 feat: Add SSO History for Support 2022-04-27 11:44:25 +05:00
Mubbshar Anwar
0ed58f32e7 feat: email linking for SSO (#30258)
Make email linking for SSO as default behavior.
VAN-331
2022-04-26 12:13:43 +05:00
Kira Miller
4975051d6f Merge pull request #30297 from openedx/kiram15/ENT-5498
fix: allow for multiple customer idps
2022-04-23 12:25:54 -04:00
Kira
392c8fdba8 fix: quality fixes 2022-04-22 10:05:36 -04:00
Kira
2cbba5b4c8 fix: PR requests 2022-04-21 16:33:56 -04:00
Kira
5d7f340b5f fix: formatting fix 2022-04-21 16:02:44 -04:00
Kira
6abe831d7a fix: allow for multiple customer idps 2022-04-21 15:38:19 -04:00
edx-pipeline-bot
afceb27231 fix: Make SAMLConfiguration viewset readonly (#247) (#30259)
The ony use is a GET request in admin portal so this view need not be post/put friendly right now.
It may actually get removed in an upcoming iteration, or stay readonly.

Fixes: SEC-1418

Co-authored-by: Binod Pant <bpant@edx.org>
2022-04-15 18:03:50 +00:00
Rebecca Graber
f9b6dda145 fix: pylint 2022-03-31 09:48:44 -04:00
Rebecca Graber
b7aca5e5f5 fix: verify redirect in inactive_user_view 2022-03-31 09:31:55 -04:00
Binod Pant
21d57ed0ab feat: post handler to sync provider_data (#30107)
* feat: post handler to sync provider_data

this allows us to read provider_data metadata from a remote metadata url. reuses code from the task that currently processes all proiderconfigs in a batch

ENT-5482

* feat: lint fixes

* test: add test for sync_provider_data

* test: add case for update

* fix: lint fix

* fix: lint fix

* feat: use exc_info to report error better

* feat: update log message
2022-03-29 13:08:56 -04:00
Alexander Sheehan
f4c3471a9b fix: adding was_valid_at to all provider configs 2022-03-24 12:02:14 -04:00
Alexander Sheehan
d852e38cba feat: new is_valid field for provider configs 2022-03-21 10:56:15 -04:00
Kira
0ba94409bd fix: lengthening display name 2022-03-15 10:14:54 -04:00
Kira
6d51428e4a fix: duplicate entry fixes 2022-03-14 17:06:52 -04:00
Kira
97f05b4e4a fix: lint errors 2022-03-14 13:30:52 -04:00
Kira
5dc39666e4 feat: add display name and make saml config draft 2022-03-14 12:34:19 -04:00
Binod Pant
3e53771878 feat: super trivial log change to help see entity_id (#29935)
to better log which changes we are making to which entity_id samlproviderdata
2022-02-18 12:18:42 -05:00
Zainab Amir
a717dfd50e fix: ensure redirect url is whitelisted 2022-02-01 15:10:23 +05:00
Maria Grimaldi
07f88fab4b fix: avoid raising error when auth_entry is None (#29787)
This commit avoids raising AuthEntryError when auth_entry is None.
At some point of the authentication flow, when the auth_entry is
missing from the auth URL (eg. auth/login/tpa-saml/?idp=idp), the
request session stores auth_entry: None causing this edited line to fail
which stops the login from completing.
2022-01-31 14:36:44 -05:00
Kira
4d1275a521 feat: associate name to username in saml config 2022-01-11 09:19:37 -05:00
Jawayria
7f5b4a6a47 chore: removed 'wrong-import-order' from disabled imports (#29365)
* chore: removed 'wrong-import-order' from disabled imports
2022-01-06 19:14:51 +05:00
Binod Pant
33437e7fef feat: choose signing cert explicitly in saml metadata ENT-677 (#29704)
* feat: choose signing cert explicitly in saml metadata

when parsing, we want to explicitly choose the use='signing' cert instead of accidentally choosing the encryption one

ENT-677

* test: test for parse_metadata_xml

* feat: also address case when signing key is absent

in this case we consider the 'use'-less keydescriptior as if it's for both signing and encryption

* test: test case for missing use=signing attribute

* test: fix test failure
2022-01-05 16:18:01 -05:00
Jawayria
833ce7d586 Merge pull request #29570 from edx/jawayria/fix-url-common
fix: fixed RemovedInDjango40 warnings in common
2021-12-15 13:55:37 +05:00
Jawayria
bd5e00b725 fix: fixed RemovedInDjango40 warnings in common 2021-12-14 19:55:01 +05:00
John Nagro
3873ff7de9 feat: avoid certain strings in the suffix appended to edX usernames (#29524)
ENT-2824
2021-12-13 15:32:51 -05:00
Jawayria
ce26c8476d chore: Applied lint-amnesty on common/djangoapps 2021-12-13 20:53:36 +05:00
edX requirements bot
bb20b17428 Python Requirements Update (#29516)
* chore: Updating Python Requirements

* fix: fix pylint issues

Co-authored-by: Mohammad Ahtasham ul Hassan <mohammad.ahtasham@arbisoft.com>
2021-12-08 14:13:27 +05:00
Usama Sadiq
780a6f3c2d Revert "chore: install codejail from pypi (#29481)" (#29501)
This reverts commit 21551095ac.
2021-12-02 22:19:15 +05:00
Mohammad Ahtasham ul Hassan
21551095ac chore: install codejail from pypi (#29481)
* chore: install codejail from pypi

* chore: Updating Python Requirements

* chore: Updating Python Requirements

* fix: fixed failing tests

* fix: fixed pytest failures

* fix: fixed failing test bug

* Update mocks.py

Co-authored-by: edX requirements bot <testeng+edx-requirements-bot@edx.org>
2021-12-02 17:07:29 +05:00
Usama Sadiq
95427251dc fix: fixed pylint warnings 2021-10-21 09:54:22 -04:00
Kyle McCormick
9bf266f717 fix: add missing __init__.py files 2021-10-21 09:54:22 -04:00
M. Zulqarnain
ba75bb6569 feat: django codemods changes for common folder (#28775) 2021-10-21 13:52:19 +05:00
Usama Sadiq
9ee8df0980 fix: Remove pylint constraint and fix warnings (#28646) 2021-10-20 23:00:13 +05:00
Kshitij Sobti
9e787a09bc chore: remove dependency on rest_condition (#28663)
rest-condition has not been updated for a while, and with DRF 3.9 it is no longer needed since the ability to combine Permission classes using boolean operators is now provided by DRF directly.
2021-10-04 15:38:17 -04:00
Usama Sadiq
484cd536e2 fix: Fixed new pylint warnings (#28724) 2021-09-23 17:54:04 +05:00