Django-pyoidc

Latest version: v0.0.13

Safety actively analyzes 681866 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 4

4.0.1

==================

* Update configuration for readthedocs.
* Point HEAD to main branch.
* Update project's README file.

4.0.0

==================

* Added PKCE support in the authorization code flow.
Thanks `themooer1 <https://github.com/themooer1>`_ and `escattone <https://github.com/escattone/>`_
* Added support for Elliptic Curve JWT signing algorithms
Thanks `atanunq <https://github.com/atanunq>`_
* Replace mock with unittest.mock
Thanks `traylenator <https://github.com/traylenator>`_
* Add pre-commit hooks
* Add support for Python 3.11 and 3.12
* Add support for Django 4.2
* Document OIDC_USERNAME_ALGO
Thanks `polyccon <https://github.com/polyccon>`_
* Add claims to custom username algorithm
Thanks `EduardRosert <https://github.com/EduardRosert>`_
* Formatting fixes in the Documentation
Thanks `EduardRosert <https://github.com/EduardRosert>`_
* Update token error response handling
Thanks `dopry <https://github.com/dopry>`

Backwards-incompatible changes:

* Drop Python 3.7 support
* Drop Django 4.1 support

3.0.0

==================
* Gracefully handle ``www-authenticate`` header with missing ``error_description``.
Thanks `vinitsharswat <https://github.com/vinitsharswat>`_ and `adamj9431 <https://github.com/adamj9431>`_
* Lint project with ``black``.
* Add support for Django 4
* Document OIDC_OP_JWKS_ENDPOINT.
Thanks `yoctozepto <https://github.com/yoctozepto>`_
* Update typo in comments.
Thanks `rabbit-aaron <https://github.com/rabbit-aaron>`_
* LOGIN_REDIRECT_URL now accepts a named url pattern.
Thanks `dispiste <https://github.com/dispiste>`_
* Pass `OIDC_AUTH_REQUEST_EXTRA_PARAMS` to SessionRefresh
Thanks `melanger <https://github.com/melanger>`_
* Remove state from from session after failed authentication attempts
Thanks `cfra <https://github.com/cfra>`_
* Do not call auth.login() on session refresh.
Thanks `crgwbr <https://github.com/crgwbr>`_

Backwards-incompatible changes:

* Drop Python 3.6 support
* Drop Django 2.x Support
* Drop Django 3.1 support

2.0.0

==================

* Make `get_or_create_user` compatible with custom scope configuration
by moving scope specific code to `describe_user_by_claims`
Thanks `cfra <https://github.com/cfra>`_
* Add support for Django 3.2
Thanks `jannh <https://github.com/jannh>`_
* Add configuration to opt in logout using GET
* Fix url encoding using escaped space characters
* Pass email as named argument in create_user
* Do not fail if JWK does not have a key ID
Thanks `cfra <https://github.com/cfra>`_
* Update middleware init to configure settings
Thanks `dreynolds <https://github.com/dreynolds>`_
* Add SessionAuthentication to DRF auth class
Thanks `SpyTec <https://github.com/SpyTec>`_

Backwards-incompatible changes:

* Drop Django 1.x support
* Drop Python2 support

1.2.4

==================

* Fix error in README.rst
Thanks `der-gabe <https://github.com/der-gabe>`_
* Fix JWKS handling when the same `kid` value is used across JWKs with
different `alg` specified
Thanks `davidjb <https://github.com/davidjb>`_
* Support regex patterns in ``OIDC_EXEMPT_URLS``, to allow exempting session refreshes in
``SessionMiddleware`` for URLs matching the pattern
Thanks `jwhitlock <https://github.com/jwhitlock>`_
* Move nonce outside of add_state_and_noce_to_session method.
* Change log level to info for the add_state_and_verifier_and_nonce_to_session.
* Session save/load management
Thanks `Flor1an-dev <https://github.com/Flor1an-dev>`_
* Allow multiple parallel login sessions
Thanks `istreeter <https://github.com/istreeter>`_

.. _`jwhitlock`: https://github.com/jwhitlock

1.2.3

===================

* Add support for Django 3.x
Thanks `jaap3 <https://github.com/jaap3>`_
* Use new E2E testing images from mozilla namespace
* Remove support for EOL'ed Django versions

Page 1 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.