Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump authlib from 0.15.5 to 1.2.1 #3455

Closed
wants to merge 1 commit into from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 1, 2023

Bumps authlib from 0.15.5 to 1.2.1.

Release notes

Sourced from authlib's releases.

Version 1.2.0

  • Not passing request.body to ResourceProtector, #485.
  • Use flask.g instead of _app_ctx_stack, #482.
  • Add headers parameter back to ClientSecretJWT, #457.
  • Always passing realm parameter in OAuth 1 clients, #339.
  • Implemented RFC7592 Dynamic Client Registration Management Protocol, #505`
  • Add default_timeout for requests OAuth2Session and AssertionSession.
  • Deprecate jwk.loads and jwk.dumps

Version 1.1.0

This release contains breaking changes and security fixes.

Breaking changes:

  • Raise InvalidGrantError for invalid code, redirect_uri and no user errors in OAuth 2.0 server.
  • The default authlib.jose.jwt would only work with JSON Web Signature algorithms, if you would like to use JWT with JWE algorithms, please pass the algorithms parameter:
jwt = JsonWebToken(['A128KW', 'A128GCM', 'DEF'])

Security fixes for JOSE module

  • CVE-2022-39175
  • CVE-2022-39174

Version 1.0.1

  • Fix authenticate_none method, via #438.
  • Allow to pass in alternative signing algorithm to RFC7523 authentication methods via #447.
  • Fix missing_token for Flask OAuth client, via #448.
  • Allow openid in any place of the scope, via #449.
  • Security fix for validating essential value on blank value in JWT, via #445.

Version 1.0.0

We have dropped support for Python 2 in this release. We have removed built-in SQLAlchemy integration.

OAuth Client Changes:

The whole framework client integrations have been restructured, if you are using the client properly, e.g. oauth.register(...), it would work as before.

OAuth Provider Changes:

In Flask OAuth 2.0 provider, we have removed the deprecated

... (truncated)

Changelog

Sourced from authlib's changelog.

Version 1.2.1

Released on Jun 25, 2023

  • Apply headers in ClientSecretJWT.sign method, via :PR:552
  • Allow falsy but non-None grant uri params, via :PR:544
  • Fixed authorize_redirect for Starlette v0.26.0, via :PR:533
  • Removed has_client_secret method and documentation, via :PR:513
  • Removed request_invalid and token_revoked remaining occurences and documentation. :PR:514
  • Fixed RFC7591 grant_types and response_types default values, via :PR:509.
  • Add support for python 3.12, via :PR:590.

Version 1.2.0

Released on Dec 6, 2022

  • Not passing request.body to ResourceProtector, via :issue:485.
  • Use flask.g instead of _app_ctx_stack, via :issue:482.
  • Add headers parameter back to ClientSecretJWT, via :issue:457.
  • Always passing realm parameter in OAuth 1 clients, via :issue:339.
  • Implemented RFC7592 Dynamic Client Registration Management Protocol, via :PR:505.
  • Add default_timeout for requests OAuth2Session and AssertionSession.
  • Deprecate jwk.loads and jwk.dumps

Version 1.1.0

Released on Sep 13, 2022

This release contains breaking changes and security fixes.

  • Allow to pass claims_options to Framework OpenID Connect clients, via :PR:446.
  • Fix .stream with context for HTTPX OAuth clients, via :PR:465.
  • Fix Starlette OAuth client for cache store, via :PR:478.

Breaking changes:

  • Raise InvalidGrantError for invalid code, redirect_uri and no user errors in OAuth 2.0 server.

  • The default authlib.jose.jwt would only work with JSON Web Signature algorithms, if you would like to use JWT with JWE algorithms, please pass the algorithms parameter::

    jwt = JsonWebToken(['A128KW', 'A128GCM', 'DEF'])
    

Security fixes: CVE-2022-39175 and CVE-2022-39174, both related to JOSE.

Version 1.0.1

... (truncated)

Commits
  • a18d0a5 chore: release 1.2.1
  • b9f5224 chore: update docs for shibuya theme
  • dd78bbe Fix typo in docstring (#555)
  • 61b686c Merge pull request #552 from dhallam/bug/515-rfc7523-apply-headers-while-signing
  • f506882 515 RFC7523 apply headers while signing
  • cadc55d Merge pull request #544 from schnerd/uri-none-check
  • 6cbab3a allow falsey but non-None grant uri params
  • 70a6bfa Merge pull request #534 from LudvigHz/docs-openid-userinfo
  • 90ebb19 docs: Update openID client userinfo usage
  • acde1e9 Merge pull request #533 from vicchi/gg-starlette-url-fix
  • Additional commits viewable in compare view

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

Bumps [authlib](https://github.com/lepture/authlib) from 0.15.5 to 1.2.1.
- [Release notes](https://github.com/lepture/authlib/releases)
- [Changelog](https://github.com/lepture/authlib/blob/master/docs/changelog.rst)
- [Commits](lepture/authlib@v0.15.5...v1.2.1)

---
updated-dependencies:
- dependency-name: authlib
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Nov 1, 2023
Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 21, 2023

Superseded by #3541.

@dependabot dependabot bot closed this Dec 21, 2023
@dependabot dependabot bot deleted the dependabot/pip/develop/authlib-1.2.1 branch December 21, 2023 18:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants