- Jun 30, 2020
-
-
Saleem Latif authored
-
- Jun 10, 2020
-
-
Waheed Ahmed authored
PROD-1506
-
- May 01, 2020
-
-
Aarif authored
-
- Apr 23, 2020
-
-
Robert Raposa authored
* fix old migrations * fix a test * fix enable-migrations cmd argument * enhance verbose logging to log migrations * update testing doc with help
-
- Apr 09, 2020
-
-
M Zulqarnain authored
-
- Apr 08, 2020
-
-
zia.fazal@arbisoft.com authored
Change to map first name to edx username by default oauth SSO with `identityserver3` backend ENT-2709 Addressed reviewer's feedback
-
- Mar 04, 2020
-
-
Manjinder Singh authored
Part of removal of OpenID Connect
-
Manjinder Singh authored
* Removing all settings that have OIDC in name * Removing ENABLE_DOP_ADAPTER * changes JWT_ISSUER value in devstack
-
- Feb 21, 2020
-
-
David Joy authored
-
- Feb 19, 2020
-
-
Diana Huang authored
-
- Jan 26, 2020
-
-
Aarif authored
Updating the django-rate-limit requirement. updated the django-ratelimit to use unreleased version that supports Django 2.2
-
- Dec 30, 2019
-
-
Feanil Patel authored
This will remove imports from __future__ that are no longer needed. https://docs.python.org/3.5/library/2to3.html#2to3fixer-future
-
- Dec 20, 2019
-
-
Braden MacDonald authored
Implementation details: * Anonymous users are assigned a unique ID (like `anon42c08f9996194e2a9339`) which gets stored in the django session. `block.scope_ids.user_id` and `block.runtime.anonymous_student_id` will both return this value. * User state for anonymous users is stored in the django cache and automatically expires as the cache gets pruned. Because user state is stored, anonymous users can use interactive blocks like capa problems. * There is no mechanism for upgrading to a registered account and keeping user state since the user state store for anonymous users (EphemeralKeyValueStore) is completely different than the one for registered users (DjangoKeyValueStore/"CSM"), and has no "list all keys" functionality. * "User State Summary" field values are shared among [recently active] anonymous users but are not shared with registered users. * Anonymous users can only access the `public_view` of XBlocks, not the regular `student_view`.
-
- Dec 19, 2019
-
-
Calen Pennington authored
-
- Dec 04, 2019
-
-
Robert Raposa authored
This completes the work started in https://github.com/edx/edx-platform/pull/19453 to use the LMS login and registration for Studio, rather than Studio providing its own implementation. LMS login/registration are being used for the following reasons: 1. LMS logistration properly handles all SSO integrations. 2. A single logistration is simpler to maintain and understand. 3. Allows Studio to work more like all other IDAs that use LMS logistration. The original switch to use LMS logistration for Studio also added the toggle `DISABLE_STUDIO_SSO_OVER_LMS` to provide the community some additional time for switching. This commit removes this toggle, which at this point means all deployments will use the LMS logistration. This change requires sharing cookies across LMS and Studio. Should that prove to be a problem for certain Open edX instances, there are discussions of possible alternative solutions. See https://github.com/edx/edx-platform/pull/19845#issuecomment-559154256 Detailed changes: * Fix some Studio links that still went to old Studio signin and signup. * Remove DISABLE_STUDIO_SSO_OVER_LMS feature toggle. * Remove old studio signin and signup pages and templates. * Fix url name "login", which had different meanings for Studio and LMS. * Use the following settings: LOGIN_URL, FRONTEND_LOGIN_URL, FRONTEND_LOGOUT_URL, and FRONTEND_REGISTER_URL. * Redirect /signin and /signup to the LMS logistration. * Add custom metric `uses_pattern_library`. * Add custom metric `student_activate_account`. * Add Django Settings to allow /signin, /signup, and /login_post to be disabled once ready. This work also relates to ARCH-218 and DEPR-6. ARCH-1253
-
- Oct 29, 2019
-
-
Nimisha Asthagiri authored
-
- Sep 25, 2019
-
-
Cory Lee authored
* Always run CSMHE migrations for every application in all contexts
-
- Sep 18, 2019
-
-
Braden MacDonald authored
This commit introduces the changes needed for XBlocks in Blockstore to save their user state into CSM. Before this commit, all student state for Blockstore blocks was ephemeral (in-process dict store). Notes: * The main risk factor of this PR is that it adds non-course keys to the course_id field in CSM. If any code (like analytics?) reads course keys directly out of CSM and doesn't have graceful handling for key types it doesn't recognize, it could cause an issue. With the included changes to opaque-keys, calling CourseKey.from_string(...) on these values will raise InvalidKeyError since they're not CourseKeys. (But calling LearningContextKey.from_string(...) will work for both course and library keys.) * This commit introduces a slight regression for the Studio view of XBlocks in Blockstore content libraries: their state is now lost from request to request. I have a follow up PR to give them a proper studio-appropriate state store, but I want to review it separately so it doesn't hold up this PR and we can test this PR on its own.
-
- Sep 17, 2019
-
-
Ned Batchelder authored
API docs are now always available, no more toggle to enable them.
-
- Sep 06, 2019
-
-
Feanil Patel authored
The proctoring app assumes that this setting exists and so we get an attribute error at runtime if it doesn't. In python 2 this was not an issue but because of the change in how exceptions are handle for getting attributes, it's a problem in python 3. The correct thing to do would be to fix this in the proctoring app so that it checks for the existence of its value before using it but that's a longer cycle to make/deploy that change so doing this as a stopgap to get past it.
-
- Aug 30, 2019
-
-
Braden MacDonald authored
https://github.com/edx/edx-platform/pull/20645 This introduces: * A new XBlock runtime that can read and write XBlocks that are persisted using Blockstore instead of Modulestore. The new runtime is currently isolated so that it can be tested without risk to the current courseware/runtime. * Content Libraries v2, which store XBlocks in Blockstore not modulestore * An API Client for Blockstore * "Learning Context" plugin API. A learning context is a more abstract concept than a course; it's a collection of XBlocks that serves some learning purpose.
-
- Aug 16, 2019
-
-
Diana Huang authored
-
- Aug 02, 2019
-
-
usama sadiq authored
Added check to only apply the changes for edx.org help center pages.
-
- Jul 19, 2019
-
-
Feanil Patel authored
Use `ascii_letters` instead which is a reasonable alternative for our usecases.
-
- Jul 02, 2019
-
-
Amit authored
* reword INCR-483: Make compatible with Python 3.x without breaking Python 2.7 support pick INCR-483: Re-run isort for lms/envs/test.py INCR-483: change import order INCR-483: PyLint fixes * INCR-483: Fixes useless suppression * INCR-483: Remove unused get_swagger_view
-
- Jun 28, 2019
-
-
adeelehsan authored
Dashboard is set to load 250 courses instead of all the courses. A flag is also added to change the number the courses to load. PROD-204
-
Michael Youngstrom authored
-
- Jun 25, 2019
-
-
nadeemshahzad authored
-
- May 09, 2019
-
-
Christopher Pappas authored
ENT-1887 | Adding logic for new business marketing footer url construction, while maintaining backwards compatibility Fixing quality test Testsing out a default value for the sake of jenkins tests. will revert Fix footer test from being flaky Moving an import statement ran isort. adding a test. fixing 1 quality issue Quality cleanups Attempting more quality fixes adding back in config variable name for default value Adding ENTERPRISE_MARKETING_FOOTER_QUERY_PARAMS to common settings Changing marketing_url logic to only concatenate enterprise url to root if the enterprise url is relative (starts with a /) quality fixes
-
- May 07, 2019
-
-
Jeremy Bowman authored
-
- Apr 18, 2019
-
-
Michael Youngstrom authored
-
- Mar 28, 2019
-
-
Christopher Pappas authored
Adding logic that adds roles to jwt Quality fixes
-
- Mar 14, 2019
-
-
Felipe Montoya authored
-
- Mar 02, 2019
-
-
Mike Dikan authored
Removing the Deprecated the 'external_auth' package in favor of 'third_party_auth' which is the current recommendation.
-
- Feb 13, 2019
-
-
Matthew Piatetsky authored
-
- Dec 21, 2018
-
-
Dave St.Germain authored
-
Michael Roytman authored
-
Michael Roytman authored
-
- Dec 13, 2018
-
-
Michael Terry authored
This is a feature that has been deprecated and can be safely removed. DEPR-7
-
- Nov 05, 2018
-
-
Shadi Naif authored
-