Oidcop

Latest version: v2.4.3

Safety actively analyzes 675368 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 3

2.3.2

Release notes

- Use configuration classes from oidcmsg. rohe (166)

2.3.1

Release notes

- Check if token exists nsklikas (163)



**Full Changelog**: https://github.com/IdentityPython/oidc-op/compare/v2.3.0...v2.3.1

2.3.0

Release notes

- OIDC Certification and FAPI profile peppelinux rohe nsklikas (158)
- README: PAR peppelinux (152)
- docs: add prompt to refresh token requirements melanger (148)
- feat: add RawID to session manager melanger (149)
- chore: README badges peppelinux (146)

Changes that this PR accomplish:

- If response_type == id_token return userinfo that normally would be returned from the userinfo endpoint in the id_token.
- Don't run parse_cookie twice. One after the other.
- Allow for different claims release policies to be in effect simultaneously (typically id_token+userinfo).
- Error response when response_mode == form_post not handled correctly. return_uri needed.
- Use extra info in ValueError exception instance to return correct error code.
- Allow endpoints to have their own request verification error handler.
- Having session ID in ID Token instance simplifies things.
- Finding the last issued token of a specific type is useful.
- Should check if client session is revoked.
- Revoked all grants issued to a user/client pair.
- Merged the two ClaimsInterface versions.
- Removed tests using method that was removed and incomplete test.
- Client registration endpoint should return a 201 HTTP response code on successful registration.
- Default token lifetime should not be 0 (zero). Changed to be 30 minutes (1800 seconds).
- Authorization error response MUST contain 'state' if it is present in the request.
- Check cookie age.
- Revoke tokens that has been minted using a code that then is used once more.
- prompt==login forces re-authentication.
- prompt attribute is a list.
- FAPI OP example project

**Full Changelog**: https://github.com/IdentityPython/oidc-op/compare/v2.2.1...v2.3.0

2.2.1

Release notes

- v2.2.1 peppelinux (145)
- fix Add claims by scope configuration option name melanger (143)
- chore: warning message on unknown configuration params (https://github.com/IdentityPython/oidc-op/commit/f361dc5f6d79067eafccba24bbae06f4c7381beb)
- fix: session_params (https://github.com/IdentityPython/oidc-op/commit/8690a2b83e4bd04f59465e463abf3f1169d60994)
- chore: unit tests speed up with default http timeout + warning on unknow conf param (https://github.com/IdentityPython/oidc-op/commit/0123d25953e8b7f45932bd5e6945b518d66a3b04 )

What's Changed
* fix Add claims by scope configuration option name by melanger in https://github.com/IdentityPython/oidc-op/pull/143
* v2.2.1 by peppelinux in https://github.com/IdentityPython/oidc-op/pull/145

New Contributors
* melanger made their first contribution in https://github.com/IdentityPython/oidc-op/pull/143

**Full Changelog**: https://github.com/IdentityPython/oidc-op/compare/v2.2.0...v2.2.1

2.2.0

Release notes

- v2.2.0 peppelinux (139)
- Add client configuration documentation nsklikas (129)
- Use filter\_scopes in check\_unknown\_scopes\_policy nsklikas (138)
- Add parameter to revoke old refresh token upon issuing new ctriant (137)
- Don't issue refresh token if not configured nsklikas (128)
- Rename scopes config nsklikas (133)
- Catch unhandled exception nsklikas (132)
- Fix form post bug nsklikas (131)
- BREAKING CHANGE: Refactor scopes configuration nsklikas (130)
- BREAKING CHANGE: Certification testing - bug fixes rohe (125) - see extended note related to `prompt=consent`
- Add grant\_types\_supported per client nsklikas (124)

Extended release notes

- A RP to obtain an offline_access must have in its authz request `prompt=consent`
- See oidcop official documentation for the changes in the scopes configuration

2.1.1

Release notes

- v2.1.1 peppelinux (122)
- Fix JWT access token lifetime nsklikas (117)
- Add pkce essential per client nsklikas (115)
- WIP: Introduce add\_claims\_by\_scope per client configuration ctriant (113)
- Missing userinfo in Configuration now raises an exception peppelinux (120)
- Handle exception raised from expired JWT access token nsklikas (118)
- Fix refresh tokens nsklikas (116)
- Don't create a new client session every time nsklikas (114)
- For debugging purpose nice to know what was put in the ID Token and a… rohe (112)
- feat: added pypi gh action CD peppelinux (110)

Page 2 of 3

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.