- Apr 08, 2020
-
-
zia.fazal@arbisoft.com authored
-
- Mar 17, 2020
-
-
Matt Hughes authored
We sometimes update preexisting SAML SSO providers to configure them to automatically create SSO identity verification (IdV) records when a learner links an account via that provider. Turning that configuration from off to on does make it such that when learners log back in via their linked account, a new IdV record will be created for them. But it's possible we'd want this process to happen more automatically and seamlessly, for which this management command will be helpful. Note that this does not help with removing SSO verification records for a provider for which this configuration has been turned off. JIRA:EDUCATOR-4947
-
- Mar 02, 2020
-
-
Manjinder Singh authored
the patched toggle was removed from edx-drf-extensions recently
-
- Feb 27, 2020
-
-
Manjinder Singh authored
* Remove ThirdPartyAuthProviderApiPermission Also removed ProviderApiPermissions and ApiPermissionsAdminForm and removal of DOP for third_party_auth * Removing model * Replaced long_token with default_token_generator * Adding skip to test_migrations_are_in_sync
-
Robert Raposa authored
-
Robert Raposa authored
The oauth2.enforce_jwt_scopes waffle switch was added temporarily for the rollout of jwt scopes. This removes the toggle and replacing code with the equivalent of `oauth2.enforce_jwt_scopes` as True.
-
- Feb 21, 2020
-
-
Robert Raposa authored
* WIP: add third-party-auth scope and usage BOM-1264 * Fix tests now that we do permissions in a more standard way. Rather than manually setting the permission class we previously explicitly raised a PermissionDenied exception. The way DRF permissoning logic works, if we use the WWW-Authenticate header in the highest priority auth class, it will return a 401 instead of a 403. * Added test to make sure having permissions gives access to user mapping api * Test new filters logic. Ensure that the filters we add to the application access model make it into the JWT correctly. * quality fix * quality fix * disable pylint warning * quality fix * fix indent prob Co-authored-by:
Feanil Patel <feanil@edx.org> Co-authored-by:
Manjinder Singh <49171515+jinder1s@users.noreply.github.com>
-
- Feb 18, 2020
-
-
Manjinder Singh authored
* Renamed OAuth2Authentication to BearerAuthentication * Added back OAuth2Authentication name -there are libraries such as edx-enterprise that still import OAuth2Authentication. The OAuth2Authentication class should be fully removed when everything is importing BearerAuthentication correctly
-
- Feb 11, 2020
-
-
Manjinder Singh authored
- Removing deprecated auth classes - Replacing OAuth2AuthenticationAllowInactiveUserDeprecated with OAuth2AuthenticationAllowInactiveUser - the old class was a child class of a deprecated class that we are removing and replacing.
-
- Feb 06, 2020
-
-
Manjinder Singh authored
* Added new auth class - Created new class called OAuth2AuthenticationAllowInactiveUser, which replaces old class with same name - Renames previous OAuth2AuthenticationAllowInactiveUser to OAuth2AuthenticationAllowInactiveUserDeprecated - Replaced all imports of OAuth2AuthenticationAllowInactiveUser to call deprecated class instead - testing new class in discussion(added flag based on django setting)
-
- Feb 04, 2020
-
-
Robert Raposa authored
BOM-897
-
- Jan 30, 2020
-
-
Manjinder Singh authored
Currently, we are working on removing the rest_framework_auth library from edx-platform. For this push, we need to remove the oauth2Authentication class. This PR creates a new class oauth2AuthenticationDeprecated that adds additional new relic metrics. The metrics would allow us to see how often this class is used and its success rate. The hope is that this information will help us with transitioning to a different authentication class.
-
- Dec 30, 2019
-
-
Feanil Patel authored
-
Feanil Patel authored
This will remove imports from __future__ that are no longer needed. https://docs.python.org/3.5/library/2to3.html#2to3fixer-future
-
- Aug 21, 2019
-
-
Ayub khan authored
assertItemsEqual with six.assertCountEqual
-
- Aug 20, 2019
-
-
Feanil Patel authored
This reverts commit 3d261798. The change was not quite right because the method six provides needs to have `self` be passed in as well. See the docs here: https://six.readthedocs.io/#unittest-assertions Reverting for now and we can fix it in smaller chunks later.
-
- Aug 19, 2019
-
-
Dave St.Germain authored
-
- Jul 11, 2019
-
-
arbisoft authored
-
- Apr 02, 2019
-
-
Douglas Hall authored
-
- Feb 05, 2019
-
-
Matthew Piatetsky authored
-
- Oct 18, 2018
-
-
J. Cliff Dyer authored
View is combined with user SSO views. Includes a new version of the view that takes explicit "username" or "email". OC-4285
-
- Oct 17, 2018
-
-
Robert Raposa authored
Note: this version update is backward incompatible. ARCH-255
-
- Oct 01, 2018
-
-
Ahsan Ulhaq authored
LEARNER-6469
-
- Aug 20, 2018
-
-
Jeremy Bowman authored
-
- Jun 05, 2018
-
-
Eric Fischer authored
Django 1.10 deprecation fix for Hackathon XIX Addresses PLAT-1397
-
- Apr 05, 2018
-
-
Brittney Exline authored
-
- Nov 07, 2017
-
-
bmedx authored
- Remove usage of django.urls.patterns - Change urls tuples to lists - Make all string view names callables
-
- Jun 27, 2017
-
-
Omar Al-Ithawi authored
Refactoring: Use format with named variables
-
- Jun 20, 2017
-
-
Uman Shahzad authored
PSA was monolothic, now split, with new features, like a DB-backed partial pipeline. FB OAuth2 version also upped. Partial pipelines don't get cleared except when necessary. They persist for special cases like change of browser while still mid-pipeline (i.e. email validation step). Refactor, cleanup, and update of a lot of small things as well. PLEASE NOTE the new `social_auth_partial` table.
-
- May 30, 2017
-
-
Andy Armstrong authored
-
- Sep 08, 2016
-
-
Jesse Shapiro authored
-
- Nov 10, 2015
-
-
Usman Khalid authored
Please note that this is a squshed commit and the work of: Symbolist, macdiesel, nedbat, doctoryes, muzaffaryousaf and muhammad-ammar
-
- Oct 27, 2015
-
-
Pan Luo authored
This mapping API enables the mapping between the edX user ID and the ID provided by identity provider (IdP). For details, please see https://github.com/edx/edx-platform/pull/9842
-
- Sep 10, 2015
-
-
Braden MacDonald authored
-