Deborah Kaplan
29de9b2dc4
feat!: Legacy account, profile, order history removal ( #36219 )
...
* feat!: Legacy account, profile, order history removal
This removes the legacy account and profile applications, and the order
history page. This is primarily a reapplication of #31893 , which was
rolled back due to prior blockers.
FIXES: APER-3884
FIXES : openedx/public-engineering#71
Co-authored-by: Muhammad Abdullah Waheed <42172960+abdullahwaheed@users.noreply.github.com >
Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com >
2025-02-10 14:39:13 -05:00
Zachary Hancock
c34ccffc7f
feat: rework idv cert trigger ( #35580 )
...
* feat: rework idv cert trigger
* feat: separate PhotoVerification events
2024-10-04 12:58:15 -04:00
Zachary Hancock
0196def99d
feat: use idv approved event ( #35470 )
...
* feat: replace LEARNER_NOW_VERIFIED signal with new openedx-event
2024-09-19 09:24:20 -04:00
Muhammad Abdullah Waheed
caf8e456e2
Revert "feat: Account and profile MFE legacy removal - redeployment ( #31893 )" ( #33542 )
...
This reverts commit 08f5e7e563 .
2023-10-19 12:26:29 +05:00
Muhammad Abdullah Waheed
08f5e7e563
feat: Account and profile MFE legacy removal - redeployment ( #31893 )
...
feat: Account and profile MFE legacy removal - redeployment
* Revert "Revert "FC-0001: Account pages -> micro-frontend (#30336 )" (#31888 )"
This reverts commit 90c4ca6e47 .
* refactor: removed filters test from user_api accounts
---------
Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com >
2023-10-19 10:43:15 +05:00
Feanil Patel
7202c22e1d
Merge pull request #33373 from openedx/feanil/update_password_length_default
...
feat: Update the minimum password length.
2023-10-17 10:08:15 -04:00
Feanil Patel
64e91d4080
test: Update to an even longer password.
2023-10-12 10:31:13 -04:00
Feanil Patel
1e2ea85372
test: Update more tests that had short passwords.
2023-10-10 16:36:26 -04:00
Navin Karkera
565b34e4e0
feat: allow oauth configuration per site and backend ( #32656 )
...
Allows admins to configure same oauth backend for multiple sites.
This change includes site_id in KEY_FIELDS for oauth configuration
provider allowing a backend configuration for each site.
2023-10-10 11:33:23 -04:00
John Nagro
2ca5b01099
fix: better username lookup in tpa pipeline ( #33145 )
2023-08-31 11:47:01 -04:00
Usama Sadiq
7710e60328
fix: fix middleware get_response parameter deprecation warning ( #33067 )
2023-08-22 15:52:30 +05:00
John Nagro
74e3bb9fd4
fix: correct bug in sapsf country to code mapping ( #32675 )
2023-07-06 20:28:38 +00:00
John Nagro
6d5dcdf77a
fix: improve username generation ( #32613 )
2023-06-30 09:47:02 -04:00
Diana Huang
373d3d58b6
feat: Add wrapper to saml auth_complete. ( #31933 )
...
We would like to catch an error in SAML auth so that
we can handle it better in our observability. This
catches the original generic error and raises it as a more
specific one.
https://github.com/edx/edx-arch-experiments/issues/154
2023-03-20 12:04:16 -04:00
Moeez Zahid
5b1eb3777e
feat: Support Apple team Migration ( #31861 )
...
* feat: LEARNER-8790 Support Apple team migration
2023-03-10 13:06:31 +05:00
Muhammad Abdullah Waheed
90c4ca6e47
Revert "FC-0001: Account pages -> micro-frontend ( #30336 )" ( #31888 )
...
This reverts commit 0f02c7b3d9 .
2023-03-07 17:41:56 -05:00
Sagirov Evgeniy
0f02c7b3d9
FC-0001: Account pages -> micro-frontend ( #30336 )
...
* feat: Account pages. Learner Profile page
* feat: Account pages. Account Settings page
* feat: Account pages. Removed unused styles
* feat: Account pages. Removed unused toggles
* feat: fixed tests and pylint errors
* feat: update redirect to account settings for student_dashboard
* feat: fix pylint errors
2023-03-07 17:41:52 +05:00
John Nagro
b1880cb549
fix: properly handle SAML Index and Key errors ( #31882 )
2023-03-06 15:31:13 -05:00
Ned Batchelder
12765a7a59
refactor(test): use @skip_unless_lms uniformly
2023-02-01 13:52:26 -08:00
John Nagro
b68ea9194d
fix: tweak namespace for SSO username generation ( #31631 )
2023-01-20 11:47:15 -05:00
John Nagro
0c4efc6ef2
fix: increase namespace for SSO username generation ( #31619 )
2023-01-19 16:22:10 -05:00
Eugene Dyudyunov
3d86f8d8de
fix: registration form population with unicode through tpa ( #30935 )
...
Fixes the registration form username field prefilling with the
third party auth data when unicode usernames are allowed.
2022-09-07 11:59:58 -04:00
Zainab Amir
c962583304
fix: remove legacy error messages ( #30937 )
2022-09-06 14:26:27 +05:00
Alexander Sheehan
9b1e8dc515
chore: rolling back unique entity ID validation on saml provider configs
2022-07-21 13:55:27 -04:00
Alexander Sheehan
605a328f24
fix: accounting for only current configs when checking for uniqueness
2022-06-27 16:56:37 -04:00
Alexander Sheehan
fd6b726a68
fix: accounting for non-unique entity ID on idp configs + fixing provider data bulk update bug
2022-06-22 11:02:08 -04:00
Alexander J Sheehan
6f496af369
Merge pull request #30538 from openedx/asheehan-edx/saml-api-related-improvements
...
fix: allowing for multiple idp data configs
2022-06-06 12:00:37 -04:00
Alexander Sheehan
8d6e041d7e
fix: allowing for multiple idp data configs
2022-06-06 09:58:33 -04:00
Mubbshar Anwar
0ed58f32e7
feat: email linking for SSO ( #30258 )
...
Make email linking for SSO as default behavior.
VAN-331
2022-04-26 12:13:43 +05:00
Rebecca Graber
f9b6dda145
fix: pylint
2022-03-31 09:48:44 -04:00
Rebecca Graber
b7aca5e5f5
fix: verify redirect in inactive_user_view
2022-03-31 09:31:55 -04:00
Alexander Sheehan
f4c3471a9b
fix: adding was_valid_at to all provider configs
2022-03-24 12:02:14 -04:00
Zainab Amir
a717dfd50e
fix: ensure redirect url is whitelisted
2022-02-01 15:10:23 +05:00
Maria Grimaldi
07f88fab4b
fix: avoid raising error when auth_entry is None ( #29787 )
...
This commit avoids raising AuthEntryError when auth_entry is None.
At some point of the authentication flow, when the auth_entry is
missing from the auth URL (eg. auth/login/tpa-saml/?idp=idp), the
request session stores auth_entry: None causing this edited line to fail
which stops the login from completing.
2022-01-31 14:36:44 -05:00
Binod Pant
33437e7fef
feat: choose signing cert explicitly in saml metadata ENT-677 ( #29704 )
...
* feat: choose signing cert explicitly in saml metadata
when parsing, we want to explicitly choose the use='signing' cert instead of accidentally choosing the encryption one
ENT-677
* test: test for parse_metadata_xml
* feat: also address case when signing key is absent
in this case we consider the 'use'-less keydescriptior as if it's for both signing and encryption
* test: test case for missing use=signing attribute
* test: fix test failure
2022-01-05 16:18:01 -05:00
John Nagro
3873ff7de9
feat: avoid certain strings in the suffix appended to edX usernames ( #29524 )
...
ENT-2824
2021-12-13 15:32:51 -05:00
edX requirements bot
bb20b17428
Python Requirements Update ( #29516 )
...
* chore: Updating Python Requirements
* fix: fix pylint issues
Co-authored-by: Mohammad Ahtasham ul Hassan <mohammad.ahtasham@arbisoft.com >
2021-12-08 14:13:27 +05:00
Usama Sadiq
780a6f3c2d
Revert "chore: install codejail from pypi ( #29481 )" ( #29501 )
...
This reverts commit 21551095ac .
2021-12-02 22:19:15 +05:00
Mohammad Ahtasham ul Hassan
21551095ac
chore: install codejail from pypi ( #29481 )
...
* chore: install codejail from pypi
* chore: Updating Python Requirements
* chore: Updating Python Requirements
* fix: fixed failing tests
* fix: fixed pytest failures
* fix: fixed failing test bug
* Update mocks.py
Co-authored-by: edX requirements bot <testeng+edx-requirements-bot@edx.org >
2021-12-02 17:07:29 +05:00
Waheed Ahmed
74e3b664eb
fix: clean accent characters from username ( #28157 )
...
Also cleaned username for Authn MFE while registering using SSO/SAML.
VAN-483
2021-07-13 20:33:22 +05:00
uzairr
ac054f92b1
upgrade login api
...
Modify the existing login api in a way that
it will allow the user to login via username as well.
currently it is only allowing email to log the user in.
VAN-445
2021-05-03 11:38:07 +05:00
Julia Eskew
4462ed37b2
Revert "update login api" ( #27416 )
...
This PR might be causing e2e tests to fail. Reverting and merging without waiting on tests.
2021-04-26 10:07:36 -04:00
uzairr
5103f59df9
upgrade login api
...
Modify the existing login api in a way that
it will allow the user to login via username as well.
currently it is only allowing email to log the user in.
VAN-445
2021-04-23 17:21:18 +05:00
Zaman Afzal
194f29ca55
ENT4134 Add the support for multiple IDPs ( #27073 )
...
* ENT4134 Add the support for multiple IDPs
2021-04-06 23:27:20 +05:00
Nizar Mahmoud
4cb4be6afe
feat: associates user by email for oauth when tpa is required
...
This change associates users signing in using oauth providers when tpa is required, verifying that only a single database user is associated with the email.
For more information as to why this was added in a separate pipeline, check edx-platform#25935.
2021-04-02 11:32:58 +05:00
Usama Sadiq
3e6b3e41f8
refactor: remove unused imports ( #27084 )
2021-03-24 17:55:04 +05:00
Awais Qureshi
9c30125e69
Merge pull request #27054 from edx/third-party-auth-3
...
Pyupgrade in common/djangoapps/third-party-modes part3
2021-03-19 16:14:49 +05:00
Awais Qureshi
81bab4d01a
Pyupgrade in common/djangoapps/third-party-auth/tests.
2021-03-19 15:39:48 +05:00
Awais Qureshi
a2f5a46a68
refactor: Pyupgrade in common/djangoapps/third-party-auth/tests.
2021-03-19 12:40:15 +05:00
Robert Raposa
40611bb915
ARCHBOM-1667: fix: remove authentication from auth exchange ( #26618 )
...
* Remove authentication, including SessionAuthentication, to fix CSRF
exemption by dropping CSRF check of SessionAuthentication.
* Several changes to make it more clear that only POST is supported and
clean up GET method testing.
* Removed the temporary 403 error logging that wasn't working.
* Removed test_single_access_token which was written for DOP, but
doesn't work with DOT. See
[MA-2122](https://openedx.atlassian.net/browse/MA-2122 ) for a ticket
about implementing this for DOT, although it doesn't seem to be a
priority. NOTE: A comment was added to the ticket explaining that this
test was removed.
* GET now returns default error for methods not allowed.
ARCHBOM-1667
2021-02-23 10:57:11 -05:00