Spid-cie-oidc

Latest version: v1.4.5

Safety actively analyzes 682361 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 12

1.1.1

What's Changed
* fix: Access Token audience by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/273


**Full Changelog**: https://github.com/italia/spid-cie-oidc-django/compare/v1.1.0...v1.1.1

1.1.0

What's Changed
* fix: create settingslocal.py.example in TA example by rglauco in https://github.com/italia/spid-cie-oidc-django/pull/268
* fix: example project by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/267
* feat: unique jti for each JWT, different RT behaviour between SPID and CIE providers by rglauco in https://github.com/italia/spid-cie-oidc-django/pull/269
* fixes for httpd connections parameters and jwks evaluation and added openid_credential_issuer by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/270
* Refresh Token, custom entities with policy loader, trust marked endpoint by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/272

- [feat: different jti for every token type](https://github.com/italia/spid-cie-oidc-django/commit/c701ecbb3e2104d16c9ac3210f12cd1cc544bc52)
- [feat: refresh tokens renewal based on user consent timeframe validity](https://github.com/italia/spid-cie-oidc-django/commit/b973dabbdc1f7873337493066be21a7ac5bb98b5)
- [fix: error in user_attributes](https://github.com/italia/spid-cie-oidc-django/commit/cf3c4bb01225c0ff0b45f4586e5dfdbf700b1010)
- [fix: [RP] differentiate refresh token tests CIE/SPID](https://github.com/italia/spid-cie-oidc-django/commit/b59219d40016ea4f485c903685edc122da22f695)
- [fix: entity statement construct with missing jwks](https://github.com/italia/spid-cie-oidc-django/commit/49bb356fa19ccb0d52435bc53e1fbd1e1888abc8)
- [fix: added openid_credential_issuer](https://github.com/italia/spid-cie-oidc-django/commit/adac5e3d1495823ee80a143b09bd877d9f365427)
- [feat: trust marked listing endpoint](https://github.com/italia/spid-cie-oidc-django/commit/3aba70954aa6ab4ac968a2e348f3c29a27e0b4c1)
- [fix: policy loading on missing profiles](https://github.com/italia/spid-cie-oidc-django/commit/edde4ca212cdd836d29634694efe9351c8366910)
- [feat: OIDCFED_PROVIDER_MAX_CONSENT_TIMEFRAME and resolve html form error](https://github.com/italia/spid-cie-oidc-django/commit/9b64cd50b006537455d10e4097209b195becfaa4)



**Full Changelog**: https://github.com/italia/spid-cie-oidc-django/compare/v1.0.0...v1.1.0

1.0.0

What's Changed

* Wallet TA by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/265
* Wallet Trust Anchor example project (without trailing slash in the web urls, finally)
* federation historical key registry endpoint
* [feat: source_endpoint claim in ES](https://github.com/italia/spid-cie-oidc-django/pull/265/commits/3cc7351f20597369bb72845203bfae92cf6ec370)
* [feat: Federation Historical Key Registry wk endpoint and admin](https://github.com/italia/spid-cie-oidc-django/pull/265/commits/2ebd2f37613798010b39f93a4654757eecea9ae2)
* [fix: oidc core jwks not mandatory in EC since we have pure fed entities](https://github.com/italia/spid-cie-oidc-django/pull/265/commits/4e1415d616242a43545bb94dc5a55e7540f0b73c)

**Full Changelog**: https://github.com/italia/spid-cie-oidc-django/compare/v0.9.0...v1.0.0

0.9.0

What's Changed

* fix: userinfo response - encrypt only with a key that has a kid! by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/259
* [update pydantic version](https://github.com/italia/spid-cie-oidc-django/commit/e397fce435539f96696b390ea5befb20cdd1e68a)
* added python 3.11
* feat: RP userinfo page with token introspection and token lifetime counter rglauco
* feat: long-lived token lifetime according to the national specs rglauco
* feat: at_hash checks rglauco
* feat: added optional/custom protected header parameter in JWS creation utilities
* [fix: added code_verifier min/max length](https://github.com/italia/spid-cie-oidc-django/commit/288eca4c31da6c7f69fabd7b5511daebd236ccb7) rglauco

New Contributors
* rglauco


**Full Changelog**: https://github.com/italia/spid-cie-oidc-django/compare/v0.8.14...v0.8.15

0.8.14

What's Changed
* Fixing issue 256 - Open Redirect vulnerability by voidz0r in https://github.com/italia/spid-cie-oidc-django/pull/257
* Userinfo encryption also with EC by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/255

New Contributors
* voidz0r made their first contribution in https://github.com/italia/spid-cie-oidc-django/pull/257

**Full Changelog**: https://github.com/italia/spid-cie-oidc-django/compare/v0.8.13...v0.8.14

0.8.13

Not secure
What's Changed
* feat: [authz request] user attributes aligned to technical specs by peppelinux in https://github.com/italia/spid-cie-oidc-django/pull/254


**Full Changelog**: https://github.com/italia/spid-cie-oidc-django/compare/v0.8.12...v0.8.13

Page 3 of 12

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.