Eugene Dyudyunov
3d86f8d8de
fix: registration form population with unicode through tpa ( #30935 )
...
Fixes the registration form username field prefilling with the
third party auth data when unicode usernames are allowed.
2022-09-07 11:59:58 -04:00
Zainab Amir
c962583304
fix: remove legacy error messages ( #30937 )
2022-09-06 14:26:27 +05:00
Alexander Sheehan
9b1e8dc515
chore: rolling back unique entity ID validation on saml provider configs
2022-07-21 13:55:27 -04:00
Alexander J Sheehan
0b28141b9e
fix: sso api validator fix ( #30732 )
2022-07-15 10:51:38 -04:00
Alexander Sheehan
605a328f24
fix: accounting for only current configs when checking for uniqueness
2022-06-27 16:56:37 -04:00
Alexander Sheehan
fd6b726a68
fix: accounting for non-unique entity ID on idp configs + fixing provider data bulk update bug
2022-06-22 11:02:08 -04:00
Alexander J Sheehan
6f496af369
Merge pull request #30538 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for multiple idp data configs
2022-06-06 12:00:37 -04:00
Alexander Sheehan
8d6e041d7e
fix: allowing for multiple idp data configs
2022-06-06 09:58:33 -04:00
Alexander J Sheehan
e0a976ac47
Merge pull request #30453 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for provider config fields to be provided on create
2022-05-27 13:16:37 -04:00
Alexander Sheehan
47693769e0
fix: allowing for provider config fields to be provided on create/updates
2022-05-27 12:59:03 -04:00
Alexander J Sheehan
baf1cbc6fb
Merge pull request #30357 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: improvments to the saml config and data endpoints
2022-05-09 11:48:14 -04:00
Alexander Sheehan
ccb635733e
fix: improvments to the saml config and data endpoints
2022-05-09 09:22:03 -04:00
ansabgillani
55df11b489
fix: remove sso history model
2022-04-27 23:52:22 +05:00
ansabgillani
8c7059c5bb
fix: reverting SSO History changes to unblock stage
2022-04-27 21:09:44 +05:00
ansabgillani
4af3d58b39
feat: Add SSO History for Support
2022-04-27 11:44:25 +05:00
Mubbshar Anwar
0ed58f32e7
feat: email linking for SSO ( #30258 )
...
Make email linking for SSO as default behavior.
VAN-331
2022-04-26 12:13:43 +05:00
Kira Miller
4975051d6f
Merge pull request #30297 from openedx/kiram15/ENT-5498
...
fix: allow for multiple customer idps
2022-04-23 12:25:54 -04:00
Kira
392c8fdba8
fix: quality fixes
2022-04-22 10:05:36 -04:00
Kira
2cbba5b4c8
fix: PR requests
2022-04-21 16:33:56 -04:00
Kira
5d7f340b5f
fix: formatting fix
2022-04-21 16:02:44 -04:00
Kira
6abe831d7a
fix: allow for multiple customer idps
2022-04-21 15:38:19 -04:00
edx-pipeline-bot
afceb27231
fix: Make SAMLConfiguration viewset readonly ( #247 ) ( #30259 )
...
The ony use is a GET request in admin portal so this view need not be post/put friendly right now.
It may actually get removed in an upcoming iteration, or stay readonly.
Fixes: SEC-1418
Co-authored-by: Binod Pant <bpant@edx.org >
2022-04-15 18:03:50 +00:00
Rebecca Graber
f9b6dda145
fix: pylint
2022-03-31 09:48:44 -04:00
Rebecca Graber
b7aca5e5f5
fix: verify redirect in inactive_user_view
2022-03-31 09:31:55 -04:00
Binod Pant
21d57ed0ab
feat: post handler to sync provider_data ( #30107 )
...
* feat: post handler to sync provider_data
this allows us to read provider_data metadata from a remote metadata url. reuses code from the task that currently processes all proiderconfigs in a batch
ENT-5482
* feat: lint fixes
* test: add test for sync_provider_data
* test: add case for update
* fix: lint fix
* fix: lint fix
* feat: use exc_info to report error better
* feat: update log message
2022-03-29 13:08:56 -04:00
Alexander Sheehan
f4c3471a9b
fix: adding was_valid_at to all provider configs
2022-03-24 12:02:14 -04:00
Alexander Sheehan
d852e38cba
feat: new is_valid field for provider configs
2022-03-21 10:56:15 -04:00
Kira
0ba94409bd
fix: lengthening display name
2022-03-15 10:14:54 -04:00
Kira
6d51428e4a
fix: duplicate entry fixes
2022-03-14 17:06:52 -04:00
Kira
97f05b4e4a
fix: lint errors
2022-03-14 13:30:52 -04:00
Kira
5dc39666e4
feat: add display name and make saml config draft
2022-03-14 12:34:19 -04:00
Binod Pant
3e53771878
feat: super trivial log change to help see entity_id ( #29935 )
...
to better log which changes we are making to which entity_id samlproviderdata
2022-02-18 12:18:42 -05:00
Zainab Amir
a717dfd50e
fix: ensure redirect url is whitelisted
2022-02-01 15:10:23 +05:00
Maria Grimaldi
07f88fab4b
fix: avoid raising error when auth_entry is None ( #29787 )
...
This commit avoids raising AuthEntryError when auth_entry is None.
At some point of the authentication flow, when the auth_entry is
missing from the auth URL (eg. auth/login/tpa-saml/?idp=idp), the
request session stores auth_entry: None causing this edited line to fail
which stops the login from completing.
2022-01-31 14:36:44 -05:00
Kira
4d1275a521
feat: associate name to username in saml config
2022-01-11 09:19:37 -05:00
Jawayria
7f5b4a6a47
chore: removed 'wrong-import-order' from disabled imports ( #29365 )
...
* chore: removed 'wrong-import-order' from disabled imports
2022-01-06 19:14:51 +05:00
Binod Pant
33437e7fef
feat: choose signing cert explicitly in saml metadata ENT-677 ( #29704 )
...
* feat: choose signing cert explicitly in saml metadata
when parsing, we want to explicitly choose the use='signing' cert instead of accidentally choosing the encryption one
ENT-677
* test: test for parse_metadata_xml
* feat: also address case when signing key is absent
in this case we consider the 'use'-less keydescriptior as if it's for both signing and encryption
* test: test case for missing use=signing attribute
* test: fix test failure
2022-01-05 16:18:01 -05:00
Jawayria
833ce7d586
Merge pull request #29570 from edx/jawayria/fix-url-common
...
fix: fixed RemovedInDjango40 warnings in common
2021-12-15 13:55:37 +05:00
Jawayria
bd5e00b725
fix: fixed RemovedInDjango40 warnings in common
2021-12-14 19:55:01 +05:00
John Nagro
3873ff7de9
feat: avoid certain strings in the suffix appended to edX usernames ( #29524 )
...
ENT-2824
2021-12-13 15:32:51 -05:00
Jawayria
ce26c8476d
chore: Applied lint-amnesty on common/djangoapps
2021-12-13 20:53:36 +05:00
edX requirements bot
bb20b17428
Python Requirements Update ( #29516 )
...
* chore: Updating Python Requirements
* fix: fix pylint issues
Co-authored-by: Mohammad Ahtasham ul Hassan <mohammad.ahtasham@arbisoft.com >
2021-12-08 14:13:27 +05:00
Usama Sadiq
780a6f3c2d
Revert "chore: install codejail from pypi ( #29481 )" ( #29501 )
...
This reverts commit 21551095ac .
2021-12-02 22:19:15 +05:00
Mohammad Ahtasham ul Hassan
21551095ac
chore: install codejail from pypi ( #29481 )
...
* chore: install codejail from pypi
* chore: Updating Python Requirements
* chore: Updating Python Requirements
* fix: fixed failing tests
* fix: fixed pytest failures
* fix: fixed failing test bug
* Update mocks.py
Co-authored-by: edX requirements bot <testeng+edx-requirements-bot@edx.org >
2021-12-02 17:07:29 +05:00
Usama Sadiq
95427251dc
fix: fixed pylint warnings
2021-10-21 09:54:22 -04:00
Kyle McCormick
9bf266f717
fix: add missing __init__.py files
2021-10-21 09:54:22 -04:00
M. Zulqarnain
ba75bb6569
feat: django codemods changes for common folder ( #28775 )
2021-10-21 13:52:19 +05:00
Usama Sadiq
9ee8df0980
fix: Remove pylint constraint and fix warnings ( #28646 )
2021-10-20 23:00:13 +05:00
Kshitij Sobti
9e787a09bc
chore: remove dependency on rest_condition ( #28663 )
...
rest-condition has not been updated for a while, and with DRF 3.9 it is no longer needed since the ability to combine Permission classes using boolean operators is now provided by DRF directly.
2021-10-04 15:38:17 -04:00
Usama Sadiq
484cd536e2
fix: Fixed new pylint warnings ( #28724 )
2021-09-23 17:54:04 +05:00