Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

requirement: bump django-oauth-toolkit from 2.3.0 to 2.4.0 #488

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github May 27, 2024

Bumps django-oauth-toolkit from 2.3.0 to 2.4.0.

Release notes

Sourced from django-oauth-toolkit's releases.

Release 2.4.0

[2.4.0] - 2024-05-13

WARNING

Issues caused by Release 2.0.0 breaking changes continue to be logged. Please make sure to carefully read these release notes before performing a MAJOR upgrade to 2.x.

These issues both result in {"error": "invalid_client"}:

  1. The application client secret is now hashed upon save. You must copy it before it is saved. Using the hashed value will fail.

  2. PKCE_REQUIRED is now True by default. You should use PKCE with your client or set PKCE_REQUIRED=False if you are unable to fix the client.

If you are going to revert migration 0006 make note that previously hashed client_secret cannot be reverted!

Added

Fixed

  • #1292 Interpret EXP in AccessToken always as UTC instead of (possibly) local timezone. Use setting AUTHENTICATION_SERVER_EXP_TIME_ZONE to enable different time zone in case the remote authentication server does not provide EXP in UTC.
  • #1323 Fix instructions in documentation on how to create a code challenge and code verifier
  • #1284 Fix a 500 error when trying to logout with no id_token_hint even if the browser session already expired.
  • #1296 Added reverse function in migration 0006_alter_application_client_secret. Note that reversing this migration cannot undo a hashed client_secret.
  • #1345 Fix encapsulation for Redirect URI scheme validation. Deprecates RedirectURIValidator in favor of AllowedURIValidator.
  • #1357 Move import of setting_changed signal from test to django core modules.
  • #1361 Fix prompt=none redirects to login screen
  • #1380 Fix AttributeError in OAuth2ExtraTokenMiddleware when a custom AccessToken model is used.
  • #1288 Fix #1276 which attempted to resolve #1092 for requests that don't have a client_secret per RFC 6749 4.1.1
  • #1337 Gracefully handle expired or deleted refresh tokens, in validate_user.
  • Various documentation improvements: #1410, #1408, #1405, #1399, #1401, #1396, #1375, #1162, #1315, #1307

Removed

  • #1350 Remove support for Python 3.7 and Django 2.2
Changelog

Sourced from django-oauth-toolkit's changelog.

[2.4.0] - 2024-05-13

WARNING

Issues caused by Release 2.0.0 breaking changes continue to be logged. Please make sure to carefully read these release notes before performing a MAJOR upgrade to 2.x.

These issues both result in {"error": "invalid_client"}:

  1. The application client secret is now hashed upon save. You must copy it before it is saved. Using the hashed value will fail.

  2. PKCE_REQUIRED is now True by default. You should use PKCE with your client or set PKCE_REQUIRED=False if you are unable to fix the client.

If you are going to revert migration 0006 make note that previously hashed client_secret cannot be reverted!

Added

Fixed

  • #1292 Interpret EXP in AccessToken always as UTC instead of (possibly) local timezone. Use setting AUTHENTICATION_SERVER_EXP_TIME_ZONE to enable different time zone in case the remote authentication server does not provide EXP in UTC.
  • #1323 Fix instructions in documentation on how to create a code challenge and code verifier
  • #1284 Fix a 500 error when trying to logout with no id_token_hint even if the browser session already expired.
  • #1296 Added reverse function in migration 0006_alter_application_client_secret. Note that reversing this migration cannot undo a hashed client_secret.
  • #1345 Fix encapsulation for Redirect URI scheme validation. Deprecates RedirectURIValidator in favor of AllowedURIValidator.
  • #1357 Move import of setting_changed signal from test to django core modules.
  • #1361 Fix prompt=none redirects to login screen
  • #1380 Fix AttributeError in OAuth2ExtraTokenMiddleware when a custom AccessToken model is used.
  • #1288 Fix #1276 which attempted to resolve #1092 for requests that don't have a client_secret per RFC 6749 4.1.1
  • #1337 Gracefully handle expired or deleted refresh tokens, in validate_user.
  • Various documentation improvements: #1410, #1408, #1405, #1399, #1401, #1396, #1375, #1162, #1315, #1307

Removed

  • #1350 Remove support for Python 3.7 and Django 2.2
Commits
  • f34ba7c Release 2 4 0 (#1420)
  • a34be99 Adds the ability to define how to store a user (#1328)
  • 2ef14c5 Update urls.py (#1410)
  • 1c33bfc Document OIDC_ENABLED in settings.rst (#1408)
  • bdc578f Update url for RP initiated logout (#1405)
  • b1a2bb3 Add codespell support: config + workflow to catch new typos, let it fix some ...
  • 30efd79 Expect the remote exp to be defined in time zone UTC conform rfc (Fix… (#1292)
  • 6ae8197 Fix the invalid_client error when request token without the client_secret fie...
  • 0aa27a0 Remove duplicate OAuthLibMixin from base classes (#1191)
  • ea51411 Update middleware.py (#1380)
  • Additional commits viewable in compare view

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels May 27, 2024
@dependabot dependabot bot force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch 3 times, most recently from 21d4f2a to 64088d0 Compare May 27, 2024 07:11
@tonial
Copy link
Collaborator

tonial commented May 27, 2024

@dependabot rebase

Copy link
Contributor Author

dependabot bot commented on behalf of github May 27, 2024

Looks like this PR is already up-to-date with main! If you'd still like to recreate it from scratch, overwriting any edits, you can request @dependabot recreate.

@dependabot dependabot bot force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch 2 times, most recently from bcbfe01 to fea0049 Compare May 27, 2024 07:17
@tonial
Copy link
Collaborator

tonial commented May 27, 2024

@dependabot rebase

@dependabot dependabot bot force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch from fea0049 to 93ccfe6 Compare May 27, 2024 07:21
@tonial tonial force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch 2 times, most recently from 3c3f361 to d4e0a6d Compare May 27, 2024 13:22
@tonial tonial force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch from d4e0a6d to 022fba0 Compare June 3, 2024 09:10
@tonial tonial force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch from 022fba0 to 3384675 Compare July 27, 2024 07:22
Bumps
[django-oauth-toolkit](https://github.com/jazzband/django-oauth-toolkit)
from 2.3.0 to 2.4.0.
- [Release
notes](https://github.com/jazzband/django-oauth-toolkit/releases)
-
[Changelog](https://github.com/jazzband/django-oauth-toolkit/blob/master/CHANGELOG.md)
-
[Commits](jazzband/django-oauth-toolkit@2.3.0...2.4.0)

    ---
    updated-dependencies:
    - dependency-name: django-oauth-toolkit
      dependency-type: direct:production
      update-type: version-update:semver-minor
    ...
@tonial tonial force-pushed the dependabot/pip/django-oauth-toolkit-2.4.0 branch from 3384675 to 465484c Compare August 8, 2024 09:11
Copy link
Contributor Author

dependabot bot commented on behalf of github Sep 9, 2024

A newer version of django-oauth-toolkit exists, but since this PR has been edited by someone other than Dependabot I haven't updated it. You'll get a PR for the updated version as normal once this PR is merged.

@tonial
Copy link
Collaborator

tonial commented Oct 12, 2024

Repris dans #563

@tonial tonial closed this Oct 12, 2024
Copy link
Contributor Author

dependabot bot commented on behalf of github Oct 12, 2024

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

@dependabot dependabot bot deleted the dependabot/pip/django-oauth-toolkit-2.4.0 branch October 12, 2024 07:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant