1. 24 Jun, 2016 1 commit
  2. 02 Jun, 2016 1 commit
  3. 28 Oct, 2015 1 commit
  4. 23 Sep, 2015 1 commit
  5. 21 Sep, 2015 1 commit
  6. 28 Aug, 2015 2 commits
  7. 20 Aug, 2015 1 commit
    • In-course reverification access control · ec28a75f
      * Automatically create user partitions on course publish for each ICRV checkpoint.
      * Disable partitions for ICRV checkpoints that have been deleted.
      * Skip partitions that have been disabled when checking access.
      * Add verification access control UI to visibility settings.
      * Add verification access control UI to sequential and vertical settings.
      * Add partition scheme for verification partition groups.
      * Cache information used by verification partition scheme and invalidate the cache on update.
      * Add location parameter to UserPartition so the partition scheme can find the associated checkpoint.
      * Refactor GroupConfiguration to allow multiple user partitions.
      * Add special messaging to ICRV for students in the honor track.
      
      Authors: Zubair Arbi, Awais Qureshi, Aamir Khan, Will Daly
      zubair-arbi committed
  8. 03 Aug, 2015 1 commit
  9. 13 Jul, 2015 1 commit
  10. 01 Jul, 2015 1 commit
  11. 12 Jun, 2015 1 commit
    • This change cleans up the work in progress request at #8176 · c3106bc4
      This is an initial authentication implementation that allows LTI users to
      log in transparently to edX. The behavior is driven by pilot users at
      Harvard; this was the most requested feature.
      
      The patch creates a new database model that maps users' LTI identifiers
      to newly-created edX accounts. If an LTI launch comes in with a user_id
      field that is not in the database, a new edX account is created with a
      random user name and password. This account is then stored in the
      database, so that it is permanently associated with the LTI user ID.
      
      This patch takes a simplistic approach to session management. If a user
      is logged in with a different account when they perform an LTI launch,
      they will be logged out and then re-logged in using their LTI account.
      
      In order to keep the patch simple, I have split out some refactoring
      that needs to be done into a separate branch that I'll post once this
      has been merged. Since we no longer redirect to the login page, we don't
      need to maintain two separate LTI endpoints (one for the LTI launch and
      one for authenticated users), or deal with the session management that
      requires. There are also multiple fetches of the LtiConsumer object
      (one in the view, one in the signature validation) that the later
      patch will consolidate into one.
      
      This branch fixes the previous conflicts with the test refactoring
      carried out in PR 8240.
      Phil McGachey committed
  12. 09 Jun, 2015 1 commit
  13. 05 Jun, 2015 1 commit