Django-oauth2-authcodeflow

Latest version: v1.2.2

Safety actively analyzes 700638 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 4

1.2.2

Fixed
- 'Origin' header should NOT be present if the Azure app is not a SPA.
Added
- Explicit compatibility with django 5.1

1.2.1

Fixed
- Fix a migration error from version `1.1.0` on a non-empty database (gitlab 26).
Added
- Explicit compatibility with django 5.1

1.2.0

Security
- Security package upgrades
Fixed
- Azure tenant PKCE public app fix (Origin header was missing)
- Final fix for mysql on InnoDB with max key of 3072 by having the constraint as a lonely migration (github 21). Thanks Jurymax99 for the suggested merge request.
- Allow to logout even when using the Django `ModelBackend` (github 25)
Changed
- Do not send the client secret, even if defined, with `PKCE` by default (github 18)
This can be overriden with the `OIDC_RP_FORCE_SECRET_WITH_PKCE` parameter.
- Gitlab CI upgrades

1.1.0

Fixed
- redirect after total logout could happen with a GET (10)
- allow empty client secret (QE-625, gitlab 9)
Added
- User logged in signal doc example, thanks pinoatrome (github 16)
- Drop python 3.7, support python 3.12 and django 5

1.0.1

Fixed
- Fix timestamp-awareness inside `RefreshSession` and `RefreshAccessToken` middlewares

1.0.0

Changed
- Each log (debug, warning, error) is now correctly bound to the module name.
- Mypy 1.0
Added
- Added documentation and changelog urls for PyPI

Page 1 of 4

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.