Commit Graph

532 Commits

Author SHA1 Message Date
Alexander J Sheehan
baf1cbc6fb Merge pull request #30357 from openedx/asheehan-edx/saml-api-related-improvements
fix: improvments to the saml config and data endpoints
2022-05-09 11:48:14 -04:00
Alexander Sheehan
ccb635733e fix: improvments to the saml config and data endpoints 2022-05-09 09:22:03 -04:00
ansabgillani
55df11b489 fix: remove sso history model 2022-04-27 23:52:22 +05:00
ansabgillani
8c7059c5bb fix: reverting SSO History changes to unblock stage 2022-04-27 21:09:44 +05:00
ansabgillani
4af3d58b39 feat: Add SSO History for Support 2022-04-27 11:44:25 +05:00
Mubbshar Anwar
0ed58f32e7 feat: email linking for SSO (#30258)
Make email linking for SSO as default behavior.
VAN-331
2022-04-26 12:13:43 +05:00
Kira Miller
4975051d6f Merge pull request #30297 from openedx/kiram15/ENT-5498
fix: allow for multiple customer idps
2022-04-23 12:25:54 -04:00
Kira
392c8fdba8 fix: quality fixes 2022-04-22 10:05:36 -04:00
Kira
2cbba5b4c8 fix: PR requests 2022-04-21 16:33:56 -04:00
Kira
5d7f340b5f fix: formatting fix 2022-04-21 16:02:44 -04:00
Kira
6abe831d7a fix: allow for multiple customer idps 2022-04-21 15:38:19 -04:00
edx-pipeline-bot
afceb27231 fix: Make SAMLConfiguration viewset readonly (#247) (#30259)
The ony use is a GET request in admin portal so this view need not be post/put friendly right now.
It may actually get removed in an upcoming iteration, or stay readonly.

Fixes: SEC-1418

Co-authored-by: Binod Pant <bpant@edx.org>
2022-04-15 18:03:50 +00:00
Rebecca Graber
f9b6dda145 fix: pylint 2022-03-31 09:48:44 -04:00
Rebecca Graber
b7aca5e5f5 fix: verify redirect in inactive_user_view 2022-03-31 09:31:55 -04:00
Binod Pant
21d57ed0ab feat: post handler to sync provider_data (#30107)
* feat: post handler to sync provider_data

this allows us to read provider_data metadata from a remote metadata url. reuses code from the task that currently processes all proiderconfigs in a batch

ENT-5482

* feat: lint fixes

* test: add test for sync_provider_data

* test: add case for update

* fix: lint fix

* fix: lint fix

* feat: use exc_info to report error better

* feat: update log message
2022-03-29 13:08:56 -04:00
Alexander Sheehan
f4c3471a9b fix: adding was_valid_at to all provider configs 2022-03-24 12:02:14 -04:00
Alexander Sheehan
d852e38cba feat: new is_valid field for provider configs 2022-03-21 10:56:15 -04:00
Kira
0ba94409bd fix: lengthening display name 2022-03-15 10:14:54 -04:00
Kira
6d51428e4a fix: duplicate entry fixes 2022-03-14 17:06:52 -04:00
Kira
97f05b4e4a fix: lint errors 2022-03-14 13:30:52 -04:00
Kira
5dc39666e4 feat: add display name and make saml config draft 2022-03-14 12:34:19 -04:00
Binod Pant
3e53771878 feat: super trivial log change to help see entity_id (#29935)
to better log which changes we are making to which entity_id samlproviderdata
2022-02-18 12:18:42 -05:00
Zainab Amir
a717dfd50e fix: ensure redirect url is whitelisted 2022-02-01 15:10:23 +05:00
Maria Grimaldi
07f88fab4b fix: avoid raising error when auth_entry is None (#29787)
This commit avoids raising AuthEntryError when auth_entry is None.
At some point of the authentication flow, when the auth_entry is
missing from the auth URL (eg. auth/login/tpa-saml/?idp=idp), the
request session stores auth_entry: None causing this edited line to fail
which stops the login from completing.
2022-01-31 14:36:44 -05:00
Kira
4d1275a521 feat: associate name to username in saml config 2022-01-11 09:19:37 -05:00
Jawayria
7f5b4a6a47 chore: removed 'wrong-import-order' from disabled imports (#29365)
* chore: removed 'wrong-import-order' from disabled imports
2022-01-06 19:14:51 +05:00
Binod Pant
33437e7fef feat: choose signing cert explicitly in saml metadata ENT-677 (#29704)
* feat: choose signing cert explicitly in saml metadata

when parsing, we want to explicitly choose the use='signing' cert instead of accidentally choosing the encryption one

ENT-677

* test: test for parse_metadata_xml

* feat: also address case when signing key is absent

in this case we consider the 'use'-less keydescriptior as if it's for both signing and encryption

* test: test case for missing use=signing attribute

* test: fix test failure
2022-01-05 16:18:01 -05:00
Jawayria
833ce7d586 Merge pull request #29570 from edx/jawayria/fix-url-common
fix: fixed RemovedInDjango40 warnings in common
2021-12-15 13:55:37 +05:00
Jawayria
bd5e00b725 fix: fixed RemovedInDjango40 warnings in common 2021-12-14 19:55:01 +05:00
John Nagro
3873ff7de9 feat: avoid certain strings in the suffix appended to edX usernames (#29524)
ENT-2824
2021-12-13 15:32:51 -05:00
Jawayria
ce26c8476d chore: Applied lint-amnesty on common/djangoapps 2021-12-13 20:53:36 +05:00
edX requirements bot
bb20b17428 Python Requirements Update (#29516)
* chore: Updating Python Requirements

* fix: fix pylint issues

Co-authored-by: Mohammad Ahtasham ul Hassan <mohammad.ahtasham@arbisoft.com>
2021-12-08 14:13:27 +05:00
Usama Sadiq
780a6f3c2d Revert "chore: install codejail from pypi (#29481)" (#29501)
This reverts commit 21551095ac.
2021-12-02 22:19:15 +05:00
Mohammad Ahtasham ul Hassan
21551095ac chore: install codejail from pypi (#29481)
* chore: install codejail from pypi

* chore: Updating Python Requirements

* chore: Updating Python Requirements

* fix: fixed failing tests

* fix: fixed pytest failures

* fix: fixed failing test bug

* Update mocks.py

Co-authored-by: edX requirements bot <testeng+edx-requirements-bot@edx.org>
2021-12-02 17:07:29 +05:00
Usama Sadiq
95427251dc fix: fixed pylint warnings 2021-10-21 09:54:22 -04:00
Kyle McCormick
9bf266f717 fix: add missing __init__.py files 2021-10-21 09:54:22 -04:00
M. Zulqarnain
ba75bb6569 feat: django codemods changes for common folder (#28775) 2021-10-21 13:52:19 +05:00
Usama Sadiq
9ee8df0980 fix: Remove pylint constraint and fix warnings (#28646) 2021-10-20 23:00:13 +05:00
Kshitij Sobti
9e787a09bc chore: remove dependency on rest_condition (#28663)
rest-condition has not been updated for a while, and with DRF 3.9 it is no longer needed since the ability to combine Permission classes using boolean operators is now provided by DRF directly.
2021-10-04 15:38:17 -04:00
Usama Sadiq
484cd536e2 fix: Fixed new pylint warnings (#28724) 2021-09-23 17:54:04 +05:00
Jawayria
506d61101f chore: Removed django.utils.six as not supported in Django3 2021-09-03 19:18:36 +05:00
Usama Sadiq
fe20509d4e fix: Remove deprecated django.utils.decorator.available_attrs (#28597) 2021-09-02 12:12:01 +05:00
Maria Grimaldi
2ee52ea96c refactor: replace some create_user with UserFactory to avoid non-existent profile errors 2021-08-24 15:49:21 -04:00
Talia
45772158bc feat: add boolean field to third_party_auth to be used to remove providers from enterprise selection 2021-07-23 14:17:33 -04:00
Waheed Ahmed
74e3b664eb fix: clean accent characters from username (#28157)
Also cleaned username for Authn MFE while registering using SSO/SAML.

VAN-483
2021-07-13 20:33:22 +05:00
Diana Huang
451e4a23b6 refactor: Remove squashed third_party_auth migrations.
We squashed migrations in this djangoapp a while back.
This is the followup work to remove the migrations that were
squashed and to convert the squashed migration into a 'normal'
migration.

https://openedx.atlassian.net/browse/ARCHBOM-1177
2021-05-12 12:36:44 -04:00
Usama Sadiq
2409ea22be refactor: pyupgrade second iteration (#27453) 2021-05-10 13:48:34 +05:00
uzairr
ac054f92b1 upgrade login api
Modify the existing login api in a way that
it will allow the user to login via username as well.
currently it is only allowing email to log the user in.

VAN-445
2021-05-03 11:38:07 +05:00
Usama Sadiq
588f11b100 refactor: apply lint-amnesty to pylint violations 2021-04-27 14:43:31 +05:00
Julia Eskew
4462ed37b2 Revert "update login api" (#27416)
This PR might be causing e2e tests to fail. Reverting and merging without waiting on tests.
2021-04-26 10:07:36 -04:00