From 7d2ff9cd3ffffc8ba2a06ae8869dd74e739c66a9 Mon Sep 17 00:00:00 2001
From: Manjinder Singh <49171515+jinder1s@users.noreply.github.com>
Date: Wed, 4 Mar 2020 09:06:29 -0500
Subject: [PATCH] Removing all settings that have OIDC in name (#23251)

* Removing all settings that have OIDC in name

* Removing ENABLE_DOP_ADAPTER

* changes JWT_ISSUER value in devstack
---
 cms/envs/bok_choy.env.json                                | 1 -
 cms/envs/bok_choy.yml                                     | 1 -
 cms/envs/bok_choy_docker.env.json                         | 1 -
 cms/envs/bok_choy_docker.yml                              | 1 -
 cms/envs/common.py                                        | 2 --
 cms/envs/devstack.py                                      | 2 --
 cms/envs/devstack_docker.py                               | 4 +---
 cms/envs/production.py                                    | 3 ---
 lms/envs/common.py                                        | 8 --------
 lms/envs/devstack.py                                      | 4 +---
 lms/envs/devstack_docker.py                               | 4 +---
 lms/envs/production.py                                    | 1 -
 lms/envs/test.py                                          | 2 --
 .../core/djangoapps/oauth_dispatch/tests/test_views.py    | 5 -----
 14 files changed, 3 insertions(+), 36 deletions(-)

diff --git a/cms/envs/bok_choy.env.json b/cms/envs/bok_choy.env.json
index cdb25a8fcb3..835bba51aed 100644
--- a/cms/envs/bok_choy.env.json
+++ b/cms/envs/bok_choy.env.json
@@ -99,5 +99,4 @@
     "TECH_SUPPORT_EMAIL": "technical@example.com",
     "TIME_ZONE": "America/New_York",
     "WIKI_ENABLED": true,
-    "OAUTH_OIDC_ISSUER": "https://www.example.com/oauth2"
 }
diff --git a/cms/envs/bok_choy.yml b/cms/envs/bok_choy.yml
index 8c44975e970..741918ef783 100644
--- a/cms/envs/bok_choy.yml
+++ b/cms/envs/bok_choy.yml
@@ -112,7 +112,6 @@ MODULESTORE:
       - ENGINE: xmodule.modulestore.xml.XMLModuleStore
         NAME: xml
         OPTIONS: {data_dir: '** OVERRIDDEN **', default_class: xmodule.hidden_module.HiddenDescriptor}
-OAUTH_OIDC_ISSUER: https://www.example.com/oauth2
 SECRET_KEY: ''
 SERVER_EMAIL: devops@example.com
 SESSION_COOKIE_DOMAIN: null
diff --git a/cms/envs/bok_choy_docker.env.json b/cms/envs/bok_choy_docker.env.json
index a1515c97f11..cc8b9daa53f 100644
--- a/cms/envs/bok_choy_docker.env.json
+++ b/cms/envs/bok_choy_docker.env.json
@@ -98,5 +98,4 @@
     "TECH_SUPPORT_EMAIL": "technical@example.com",
     "TIME_ZONE": "America/New_York",
     "WIKI_ENABLED": true,
-    "OAUTH_OIDC_ISSUER": "https://www.example.com/oauth2"
 }
diff --git a/cms/envs/bok_choy_docker.yml b/cms/envs/bok_choy_docker.yml
index cd2da8f7f28..2a162460a43 100644
--- a/cms/envs/bok_choy_docker.yml
+++ b/cms/envs/bok_choy_docker.yml
@@ -112,7 +112,6 @@ MODULESTORE:
       - ENGINE: xmodule.modulestore.xml.XMLModuleStore
         NAME: xml
         OPTIONS: {data_dir: '** OVERRIDDEN **', default_class: xmodule.hidden_module.HiddenDescriptor}
-OAUTH_OIDC_ISSUER: https://www.example.com/oauth2
 SECRET_KEY: ''
 SERVER_EMAIL: devops@example.com
 SESSION_COOKIE_DOMAIN: null
diff --git a/cms/envs/common.py b/cms/envs/common.py
index 6157e6e4083..696fee419b4 100644
--- a/cms/envs/common.py
+++ b/cms/envs/common.py
@@ -1826,8 +1826,6 @@ CACHES = {
 
 ############################ OAUTH2 Provider ###################################
 
-# OpenID Connect issuer ID. Normally the URL of the authentication endpoint.
-OAUTH_OIDC_ISSUER = 'http://127.0.0.1:8000/oauth2'
 
 # 5 minute expiration time for JWT id tokens issued for external API requests.
 OAUTH_ID_TOKEN_EXPIRATION = 5 * 60
diff --git a/cms/envs/devstack.py b/cms/envs/devstack.py
index 47c2ac786fd..460b357ebd7 100644
--- a/cms/envs/devstack.py
+++ b/cms/envs/devstack.py
@@ -136,8 +136,6 @@ FEATURES['FRONTEND_APP_PUBLISHER_URL'] = 'http://localhost:18400'
 REQUIRE_DEBUG = DEBUG
 
 ########################### OAUTH2 #################################
-OAUTH_OIDC_ISSUER = 'http://127.0.0.1:8000/oauth2'
-
 JWT_AUTH.update({
     'JWT_SECRET_KEY': 'lms-secret',
     'JWT_ISSUER': 'http://127.0.0.1:8000/oauth2',
diff --git a/cms/envs/devstack_docker.py b/cms/envs/devstack_docker.py
index 407d44bd204..20a4f3346a4 100644
--- a/cms/envs/devstack_docker.py
+++ b/cms/envs/devstack_docker.py
@@ -21,10 +21,8 @@ FEATURES.update({
 
 CREDENTIALS_SERVICE_USERNAME = 'credentials_worker'
 
-OAUTH_OIDC_ISSUER = '{}/oauth2'.format(LMS_ROOT_URL)
-
 JWT_AUTH.update({
+    'JWT_ISSUER': '{}/oauth2'.format(LMS_ROOT_URL),
     'JWT_SECRET_KEY': 'lms-secret',
-    'JWT_ISSUER': OAUTH_OIDC_ISSUER,
     'JWT_AUDIENCE': 'lms-key',
 })
diff --git a/cms/envs/production.py b/cms/envs/production.py
index eb89b8bde45..aa254585e6d 100644
--- a/cms/envs/production.py
+++ b/cms/envs/production.py
@@ -545,9 +545,6 @@ XBLOCK_SETTINGS.setdefault("VideoBlock", {})['YOUTUBE_API_KEY'] = AUTH_TOKENS.ge
 
 ############################ OAUTH2 Provider ###################################
 
-# OpenID Connect issuer ID. Normally the URL of the authentication endpoint.
-OAUTH_OIDC_ISSUER = ENV_TOKENS['OAUTH_OIDC_ISSUER']
-
 #### JWT configuration ####
 JWT_AUTH.update(ENV_TOKENS.get('JWT_AUTH', {}))
 JWT_AUTH.update(AUTH_TOKENS.get('JWT_AUTH', {}))
diff --git a/lms/envs/common.py b/lms/envs/common.py
index f24110c04a9..936caa43dc4 100644
--- a/lms/envs/common.py
+++ b/lms/envs/common.py
@@ -551,15 +551,7 @@ CACHES = {
     },
 }
 
-############################ OpenID Provider  ##################################
-OPENID_PROVIDER_TRUSTED_ROOTS = ['cs50.net', '*.cs50.net']
-
 ############################ OAUTH2 Provider ###################################
-
-# OpenID Connect issuer ID. Normally the URL of the authentication endpoint.
-
-OAUTH_OIDC_ISSUER = 'http://127.0.0.1:8000/oauth2'
-
 OAUTH_EXPIRE_CONFIDENTIAL_CLIENT_DAYS = 365
 OAUTH_EXPIRE_PUBLIC_CLIENT_DAYS = 30
 
diff --git a/lms/envs/devstack.py b/lms/envs/devstack.py
index d544a9a4e7b..b440eb38410 100644
--- a/lms/envs/devstack.py
+++ b/lms/envs/devstack.py
@@ -140,10 +140,8 @@ CC_PROCESSOR = {
 
 ########################### External REST APIs #################################
 FEATURES['ENABLE_OAUTH2_PROVIDER'] = True
-OAUTH_OIDC_ISSUER = 'http://127.0.0.1:8000/oauth2'
 FEATURES['ENABLE_MOBILE_REST_API'] = True
 FEATURES['ENABLE_VIDEO_ABSTRACTION_LAYER_API'] = True
-ENABLE_DOP_ADAPTER = False
 
 ########################## SECURITY #######################
 FEATURES['ENABLE_MAX_FAILED_LOGIN_ATTEMPTS'] = False
@@ -246,7 +244,7 @@ LOGIN_REDIRECT_WHITELIST = [CMS_BASE]
 ###################### JWTs ######################
 # pylint: disable=unicode-format-string
 JWT_AUTH.update({
-    'JWT_ISSUER': OAUTH_OIDC_ISSUER,
+    'JWT_ISSUER': 'http://127.0.0.1:8000/oauth2',
     'JWT_AUDIENCE': 'lms-key',
     'JWT_SECRET_KEY': 'lms-secret',
     'JWT_SIGNING_ALGORITHM': 'RS512',
diff --git a/lms/envs/devstack_docker.py b/lms/envs/devstack_docker.py
index 19bada8af3a..71182550fad 100644
--- a/lms/envs/devstack_docker.py
+++ b/lms/envs/devstack_docker.py
@@ -25,10 +25,8 @@ ENTERPRISE_API_URL = '{}/enterprise/api/v1/'.format(LMS_INTERNAL_ROOT_URL)
 CREDENTIALS_INTERNAL_SERVICE_URL = 'http://edx.devstack.credentials:18150'
 CREDENTIALS_PUBLIC_SERVICE_URL = 'http://localhost:18150'
 
-OAUTH_OIDC_ISSUER = '{}/oauth2'.format(LMS_ROOT_URL)
-
 JWT_AUTH.update({
-    'JWT_ISSUER': OAUTH_OIDC_ISSUER,
+    'JWT_ISSUER': '{}/oauth2'.format(LMS_ROOT_URL),
 })
 
 FEATURES.update({
diff --git a/lms/envs/production.py b/lms/envs/production.py
index f5219148732..fcff4a9b0b1 100644
--- a/lms/envs/production.py
+++ b/lms/envs/production.py
@@ -756,7 +756,6 @@ if FEATURES.get('ENABLE_THIRD_PARTY_AUTH'):
 
 ##### OAUTH2 Provider ##############
 if FEATURES.get('ENABLE_OAUTH2_PROVIDER'):
-    OAUTH_OIDC_ISSUER = ENV_TOKENS['OAUTH_OIDC_ISSUER']
     OAUTH_ENFORCE_SECURE = ENV_TOKENS.get('OAUTH_ENFORCE_SECURE', True)
     OAUTH_ENFORCE_CLIENT_SECURE = ENV_TOKENS.get('OAUTH_ENFORCE_CLIENT_SECURE', True)
     # Defaults for the following are defined in lms.envs.common
diff --git a/lms/envs/test.py b/lms/envs/test.py
index ff3cd29a94a..cc10e2a0a89 100644
--- a/lms/envs/test.py
+++ b/lms/envs/test.py
@@ -281,8 +281,6 @@ OPENID_PROVIDER_TRUSTED_ROOTS = ['*']
 
 ############################## OAUTH2 Provider ################################
 FEATURES['ENABLE_OAUTH2_PROVIDER'] = True
-# don't cache courses for testing
-OIDC_COURSE_HANDLER_CACHE_TIMEOUT = 0
 OAUTH_ENFORCE_SECURE = False
 
 ########################### External REST APIs #################################
diff --git a/openedx/core/djangoapps/oauth_dispatch/tests/test_views.py b/openedx/core/djangoapps/oauth_dispatch/tests/test_views.py
index 269fa89af9e..acc463ddbee 100644
--- a/openedx/core/djangoapps/oauth_dispatch/tests/test_views.py
+++ b/openedx/core/djangoapps/oauth_dispatch/tests/test_views.py
@@ -557,11 +557,6 @@ class TestViewDispatch(TestCase):
         view_object = views.AccessTokenView()
         self.assertRaises(KeyError, view_object.get_view_for_backend, None)
 
-    def test_dop_toggle_enforced(self):
-        with self.settings(ENABLE_DOP_ADAPTER=False):
-            request = self._get_request('dop-id')
-            self.assertEqual(self.view.select_backend(request), self.dot_adapter.backend)
-
 
 class TestRevokeTokenView(AccessTokenLoginMixin, _DispatchingViewTestCase):  # pylint: disable=abstract-method
     """
-- 
GitLab