Commit Graph

546 Commits

Author SHA1 Message Date
Muhammad Adeel Tajamul
47a920d5b9 feat: added a policy to prevent sending ace messages to disabled users (#36584) 2025-04-29 11:29:33 +05:00
Ahtisham Shahid
1608e8f9b6 Revert "Revert "Revert "Saml redirect mfe (#36197)" (#36550)" (#36554)" (#36569)
This reverts commit 51a48b42a9.
2025-04-22 09:34:20 +00:00
Ahtisham Shahid
51a48b42a9 Revert "Revert "Saml redirect mfe (#36197)" (#36550)" (#36554)
This reverts commit 447cd796b7.
2025-04-22 11:06:42 +05:00
Ahtisham Shahid
447cd796b7 Revert "Saml redirect mfe (#36197)" (#36550)
This reverts commit 0a05dc292b.
2025-04-18 15:12:22 +00:00
Tim McCormack
6c638572a7 test: Delete flaky test test_rate_limiting_registration_view (#36491)
Deleted out of `RegistrationViewTestV1` although the failure was observed
in `RegistrationViewTestV2` which inherits from it.

Deleted according to flaky test process:
https://openedx.atlassian.net/wiki/spaces/AC/pages/4306337795/Flaky+Test+Process

Flaky test ticket:
- https://github.com/openedx/edx-platform/issues/36490
2025-04-07 14:52:39 -04:00
Hassan Raza
033bcda99d Hraza/add embargo restricted country (#36398)
* feat: add country disabling feature in embargo app

* revert: disabled countries list in env

* fix: resolved linter issues

---------

Co-authored-by: Hassan Raza <h.raza@192.168.1.12>
2025-03-19 12:22:45 +05:00
Ahtisham Shahid
e7100d813f Revert "feat: refactor country disable logic into the Embargo app (#36202)" (#36393)
This reverts commit 72959ad9d5.
2025-03-17 23:55:59 +05:00
Hassan Raza
72959ad9d5 feat: refactor country disable logic into the Embargo app (#36202)
* feat: add country disabling feature in embargo app

* revert: disabled countries list in env

* fix: resolved linter issues

---------

Co-authored-by: Hassan Raza <h.raza@192.168.1.12>
2025-03-17 16:07:18 +05:00
Bryann Valderrama
f90e59e52a docs: add event_type inline code annotation for open edX events (#36355) 2025-03-14 09:55:50 +01:00
leoaulasneo98
0a05dc292b Saml redirect mfe (#36197)
* fix: Redirect non-enterprise SAML to authn MFE

The original request was that enterprise users with tpa hint and SAML should not be redirected to MFE. The current condition also excludes regular non-enterprise users with SAML authentication from the MFE.

* test: Add test for enterprise SAML authentication MFE redirection logic

This test validates the conditional redirection to the authentication
microfrontend (MFE) for enterprise and SAML authentication scenarios.

The test covers different combinations of:
- Enterprise customer presence
- Third-party authentication provider
- SAML provider status
- Redirection setting

Ensures that enterprise customers with SAML providers are not redirected
to the authentication MFE, while other scenarios follow the standard
redirection rules.

* fix: change spaced between line codes in test_logistration.py

---------

Co-authored-by: Andrés González <andres@aulasneo.com>
2025-03-11 12:27:51 -04:00
Emad Rad
40a4a718c0 chore: fixed typo 2025-03-06 10:46:43 -05:00
Emad Rad
1b1a8fa047 fix: Add username generation tests and utility functions
- Introduced `remove_special_characters_from_name` and `generate_username_suggestions` functions to enhance username handling.
- Added comprehensive test cases for username generation, including ASCII validation and uniqueness checks.
- Implemented tests for special character removal and suggestion generation based on various input scenarios, including edge cases.
2025-03-06 10:46:43 -05:00
Emad Rad
c544550a8d fix: Enhance username suggestion generation with ASCII validation and detailed docstring
- Updated `generate_username_suggestions` function to include validation for non-ASCII characters.
- Improved function documentation to clarify arguments, return types, and username generation logic.
- Added type hints for better code clarity and maintainability.
2025-03-06 10:46:43 -05:00
Deborah Kaplan
29de9b2dc4 feat!: Legacy account, profile, order history removal (#36219)
* feat!: Legacy account, profile, order history removal

This removes the legacy account and profile applications, and the order
history page. This is primarily a reapplication of #31893, which was
rolled back due to prior blockers.

FIXES: APER-3884
FIXES: openedx/public-engineering#71


Co-authored-by: Muhammad Abdullah Waheed <42172960+abdullahwaheed@users.noreply.github.com>
Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com>
2025-02-10 14:39:13 -05:00
Muhammad Adeel Tajamul
3d5f4983c5 feat: added anonymous id in edx.bi.user.account.authenticated event (#35934) 2024-12-02 13:22:27 +05:00
Muhammad Adeel Tajamul
0682493b6a chore: added anonymous id in user registered event (#35875) 2024-11-22 06:51:31 +05:00
Dima Alipov
15aa04b858 fix: registering new user with a name longer than 255 characters 2024-11-13 19:28:06 +05:30
Deborah Kaplan
97449ef54f feat: add more authentication information to swagger (#35674)
* feat: add more authentication information to swagger
* updates the `docs-settings` to make the generated swagger
  `securityDefinitions` include both JWT and CSRF methods, as well as
  basic. A few linter fixes happened as a side effect.
* Put in wordier descriptions for all three, since we don't have great
  shared documentation about authn/authz.
* Added CSRF to `login_session`, which also serves as a proof of concept
  for other endpoits
* Also regenerated the swagger doc, which picked up some extra changes.

Generated swagger now has help and allows extra auth methods so some
preveiously unusable endpoints can be hit.

FIXES: APER-3554
2024-10-28 16:34:15 -04:00
Ahtisham Shahid
b50c42318c feat: added country disabling feature (#35451)
* feat: added country disabling feature
2024-09-25 14:40:08 +05:00
Robert Raposa
311da82ff9 feat: DEPR USE-JWT-COOKIE header - Part 1 (#35401)
This repo is no longer using USE-JWT-COOKIE header,
since it has the required edx-drf-extensions>10.2.0,
where it was fully removed.

This removes all uses of the header, except updating
CORS_ALLOW_HEADERS, which can't be done before all
MFEs and other callers stop sending the header.

See "[DEPR]: USE-JWT-COOKIE header" for more details:
- https://github.com/openedx/edx-drf-extensions/issues/371
2024-08-30 10:40:21 -04:00
Robert Raposa
01c718dfb2 Revert "feat: DEPR USE-JWT-COOKIE header (#35393)" (#35397)
This reverts commit 1c2b804ef7.
2024-08-29 11:23:05 -04:00
Robert Raposa
1c2b804ef7 feat: DEPR USE-JWT-COOKIE header (#35393)
This repo is no longer using USE-JWT-COOKIE header,
since it has the required edx-drf-extensions>10.2.0,
where it was fully removed.

This is final clean-up for this repo.

See "[DEPR]: USE-JWT-COOKIE header" for more details:
- https://github.com/openedx/edx-drf-extensions/issues/371
2024-08-29 08:27:47 -04:00
Blue
ea596d6a25 fix: convert totalRegistrationTime to snake case (#35333)
* fix: convert totalRegistrationTime to snake case
Description:
Convert totalRegistrationTime to snake case
VAN-1816

* fix: link issue

---------

Co-authored-by: Ahtesham Quraish <ahtesham.quraish@192.168.1.4>
Co-authored-by: Syed Sajjad  Hussain Shah <ssajjad@2u.com>
2024-08-28 14:58:14 +05:00
Awais Ansari
1fb20b3598 feat: update account verification email context (#35165) 2024-07-24 14:40:58 +05:00
Attiya Ishaque
57dd2135a6 fix: update autogenerated username functionality (#35052) 2024-07-05 14:23:22 +05:00
Muhammad Abdullah Waheed
3aaf35e7ab chore: added app_name identifier for registration segment event (#35063) 2024-07-02 15:31:47 +05:00
Syed Sajjad Hussain Shah
5e3181ce61 Revert "feat: add register intent prop for login segement call (#34891)" (#35021)
This reverts commit a2aa6bd2db.
2024-06-24 12:58:31 +05:00
Deborah Kaplan
68b052620a Merge branch 'master' into bleach#33209 2024-06-10 11:27:12 -04:00
Blue
a2aa6bd2db feat: add register intent prop for login segement call (#34891)
Description:
Add register intent property for login successful segement call
VAN-1929
2024-06-04 18:43:22 +05:00
sohailfatima
17f48adb49 feat: remove unnecessary PII 2024-06-04 12:08:52 +05:00
sohailfatima
582b41694f fix: failing password reset tests 2024-06-04 12:08:52 +05:00
sohailfatima
8e7a5f18c7 feat: added tracking events for password reset initiation 2024-06-04 12:08:52 +05:00
Irtaza Akram
f7229e0aad chore: replace bleach with nh3 2024-05-28 13:02:16 +05:00
Syed Sajjad Hussain Shah
2ce25b3eb6 feat: autogenerate username on registration (#34562)
* feat: autogenerate username on registration

---------

Co-authored-by: Attiya Ishaque <atiya.ishaq@arbisoft.com>
Co-authored-by: Blue <ahtesham-quraish@users.noreply.github.com>
2024-05-02 08:58:37 +05:00
Syed Sajjad Hussain Shah
4d4f8f457d Revert "chore: moved user_authn all urls in urls.py (#34396)" (#34431)
This reverts commit fc63719ceb.
2024-03-27 11:33:38 +05:00
Syed Sajjad Hussain Shah
fc63719ceb chore: moved user_authn all urls in urls.py (#34396) 2024-03-25 22:05:55 +05:00
Blue
e11474db6b fix: add country field error message (#34316)
Description: Add country field error message in api response
VAN-1862
2024-03-01 12:09:51 +05:00
Mubbshar Anwar
b6d89bcd59 fix: fir segment event (#34279)
fire segment event for PWNED_PASSWORD on registration page password validation

VAN-1830
2024-03-01 10:22:57 +05:00
Zainab Amir
383f5d636a feat: update account verification email context (#34294) 2024-02-27 03:20:15 -08:00
Mubbshar Anwar
9fd5157577 fix: update activation email (#34136)
update account activation email message copy in body

VAN-1800
2024-02-20 11:48:50 +05:00
Blue
4bd0981e68 fix: update registration api response and replace username with name (#34226)
Update api registration api response and add full_name in response
2024-02-14 13:51:25 +05:00
Ben Lu
2de48c1177 fix: auth JWKS endpoint
The original implementation of the endpoint returned
a string instead of a JSON object. This fixes the
return value to be the JSON object.
2024-02-02 16:46:07 -06:00
Ben Lu
a189bdd9fb feat: add auth JWKS endpoint
Adds an endpoint to expose JWT_PUBLIC_SIGNING_JWK_SET to other services
2024-01-31 10:15:42 -06:00
Lewis M. Kabui
780e908bbb fix: Replace deprecated .warn method with .warning (#34057)
The `logging.Logger.warn` method has been deprecated since Python 3.3
and is due to be removed all together in Python 3.13. See
https://github.com/python/cpython/pull/105377

`logging.Logger.warning` is the preferred and recommended way to log
warnings.

Fixes https://github.com/openedx/public-engineering/issues/149

Co-authored-by: Lewis M. Kabui <lewisemm@users.noreply.github.com>
2024-01-16 14:27:06 +05:00
Attiya Ishaque
5b06de4b97 feat: add work experience field. (#34034) 2024-01-11 15:53:31 +05:00
Phillip Shiu
a964f637e7 fix: improve regex for contains_url (#33886)
This regex is used for checking if a field contains a URL. We did this because we didn't want URLs in a user's "full name".

The capturing groups on the current regex are not needed to capture a URL. This commit simplifies and makes the regex stricter by banning the character combination "://".
2023-12-08 10:25:48 -05:00
Muhammad Abdullah Waheed
caf8e456e2 Revert "feat: Account and profile MFE legacy removal - redeployment (#31893)" (#33542)
This reverts commit 08f5e7e563.
2023-10-19 12:26:29 +05:00
Muhammad Abdullah Waheed
08f5e7e563 feat: Account and profile MFE legacy removal - redeployment (#31893)
feat: Account and profile MFE legacy removal - redeployment

* Revert "Revert "FC-0001: Account pages -> micro-frontend (#30336)" (#31888)"

This reverts commit 90c4ca6e47.

* refactor: removed filters test from user_api accounts

---------

Co-authored-by: Bilal Qamar <59555732+BilalQamar95@users.noreply.github.com>
2023-10-19 10:43:15 +05:00
Feanil Patel
7202c22e1d Merge pull request #33373 from openedx/feanil/update_password_length_default
feat: Update the minimum password length.
2023-10-17 10:08:15 -04:00
Feanil Patel
64e91d4080 test: Update to an even longer password. 2023-10-12 10:31:13 -04:00