File python-django-oauth-toolkit.changes of Package python-django-oauth-toolkit

-------------------------------------------------------------------
Fri May 16 08:06:40 UTC 2025 - Steve Kowalik <steven.kowalik@suse.com>

- Update to 3.0.1:
  * Security
    + Add a new setting REFRESH_TOKEN_REUSE_PROTECTION.
    + Bump oauthlib version required to 3.2.2 and above.
  * Added
    + Added compatibility with LoginRequiredMiddleware introduced in Django
      5.1.
    + Add OAuth2ExtraTokenMiddleware for adding access token to request.
    + Add option to disable client_secret hashing to allow verifying JWTs'
      signatures when using HS256 keys.
    + Support Python 3.12 and Django 5.0
    + Adds the ability to define how to store a user profile.
    + implement OIDC RP-Initiated Logout
    + Allow Authorization Code flow without a client_secret.
    + Support Django 4.2.
    + Support prompt=login for the OIDC Authorization Code Flow end user
      Authentication Request.
    + Add "scopes_supported" to the ConnectDiscoveryInfoView.
  * Changed
    + createapplication management command enhanced to display an
      auto-generated secret before it gets hashed.
    + Changed default value of PKCE_REQUIRED to True.
    + Changed to implement hashed client_secret values.
    + Add default configurable OIDC standard scopes that determine which
      claims are returned.
    + Make the access_token available to get_oidc_claims when called from
      get_userinfo_claims.
    + Added --algorithm argument to createapplication management command
  * Fixed
    + Fix migration error when there are pre-existing Access Tokens.
    + Interpret EXP in AccessToken always as UTC instead of (possibly) local
      timezone.
    + Fix a 500 error when trying to logout with no id_token_hint even if the
      browser session already expired.
    + Fix prompt=none redirects to login screen
    + Fix AttributeError in OAuth2ExtraTokenMiddleware when a custom
      AccessToken model is used.
    + Handle oauthlib errors on create token requests
    + Fix validate_bearer_token() to properly set request.scopes to the list
      of granted scopes.
    + Fixed help text for --skip-authorization argument of the
      createapplication management command.
  * Removed
    + Remove support for Python 3.7 and Django 2.2
    + Removes support for insecure urn:ietf:wg:oauth:2.0:oob and
      urn:ietf:wg:oauth:2.0:oob:auto which are replaced by RFC 8252
      "OAuth 2.0 for Native Apps" BCP.
- Switch to pyproject macros.
- No more greedy globs in %files.
- Drop patch stop-using-pk-to-reference-tokens.patch, no longer required.

-------------------------------------------------------------------
Sat Jan 18 15:20:48 UTC 2025 - ecsos <ecsos@opensuse.org>

- Add %{?sle15_python_module_pythons}
- Add missing build require python-pytz.

-------------------------------------------------------------------
Thu Feb  3 05:55:13 UTC 2022 - Steve Kowalik <steven.kowalik@suse.com>

- Update to 1.7.0:
  * #969 Add batching of expired token deletions in cleartokens management command and models.clear_expired() to improve performance for removal of large numers of expired tokens.
  * #1070 Add a Celery task for clearing expired tokens, e.g. to be scheduled as a periodic task.
  * #1062 Add Brazilian Portuguese (pt-BR) translations.
  * #1069 OIDC: Add an alternate form of get_additional_claims()
  * #1012 Return 200 status code with {"active": false} when introspecting a nonexistent token per RFC 7662. It had been incorrectly returning 401.
  * #1085 Fix for #1083 admin UI search for idtoken results in django.core.exceptions.FieldError: Cannot resolve keyword 'token' into field.
  * #1085 Add admin UI search fields for additional models.
  * #1056 Add missing migration triggered by Django 4.0 changes to the migrations autodetector.
  * #1068 Revert #967 which incorrectly changed an API. See #1066.
  * #949 Provide django.contrib.auth.authenticate() with a request for compatibiity with more backends (like django-axes).
  * #968, #1039 Add support for Django 3.2 and 4.0.
  * #953 Allow loopback redirect URIs using random ports as described in RFC8252 section 7.3.
  * #972 Add Farsi/fa language support.
  * #978 OIDC: Add support for rotating multiple RSA private keys.
  * #978 OIDC: Add new OIDC_JWKS_MAX_AGE_SECONDS to improve jwks_uri caching.
  * #967 OIDC: Add additional claims beyond sub to the id_token.
  * #1041 Add a search field to the Admin UI (e.g. for search for tokens by email address).
  * #981 Require redirect_uri if multiple URIs are registered per RFC6749 section 3.1.2.3
  * #991 Update documentation of REFRESH_TOKEN_EXPIRE_SECONDS to indicate it may be int or datetime.timedelta.
  * #977 Update Tutorial to show required include.
  * #968 Remove support for Django 3.0 & 3.1 and Python 3.6
  * #1035 Removes default_app_config for Django Deprecation Warning
  * #1023 six should be dropped
  * #963 Fix handling invalid hex values in client query strings with a 400 error rather than 500.
  * #973 Tutorial updated to use django-cors-headers.
  * #956 OIDC: Update documentation of get_userinfo_claims to add the missing argument.
  * Adding support for OPENID 
- Add patch stop-using-pk-to-reference-tokens.patch:
  * Use direct object references to fix a truculent test.

-------------------------------------------------------------------
Fri Apr  3 10:35:36 UTC 2020 - Tomáš Chvátal <tchvatal@suse.com>

- Update to 1.3.2:
  * #725: HTTP Basic Auth support for introspection (Fix issue #709)
  * #812: Reverts #643 pass wrong request object to authenticate function.
  * Fix concurrency issue with refresh token requests (#810)
  * #817: Reverts #734 tutorial documentation error.
  * Add support for Python 3.7 & 3.8
  * Add support for Django>=2.1,<3.1
  * Add requirement for oauthlib>=3.0.1
  * Add support for Proof Key for Code Exchange (PKCE, RFC 7636).
  * Add support for custom token generators (e.g. to create JWT tokens).
  * Add new OAUTH2_PROVIDER settings:
    * ACCESS_TOKEN_GENERATOR to override the default access token generator.
    * REFRESH_TOKEN_GENERATOR to override the default refresh token generator.
    * EXTRA_SERVER_KWARGS options dictionary for oauthlib's Server class.
  * Add id in toolkit admin console applications list.
  * Add nonstandard Google support for [urn:ietf:wg:oauth:2.0:oob] redirect_uri
    for Google OAuth2 "manual copy/paste".
- Remove no longer needed test-response-401.patch

-------------------------------------------------------------------
Thu Oct  3 08:19:37 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>

- Skip tests that return 200 instead of 400, even in upstream git
  * recheck with the next release

-------------------------------------------------------------------
Mon Sep 16 09:24:25 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>

- Update to 1.2.0:
  * Compatibility: Python 3.4 is the new minimum required version.
  * Compatibility: Django 2.0 is the new minimum required version.
  * New feature: Added TokenMatchesOASRequirements Permissions.
  * validators.URIValidator has been updated to match URLValidator behaviour more closely.
  * Moved redirect_uris validation to the application clean() method.

-------------------------------------------------------------------
Tue Mar  5 07:50:55 UTC 2019 - John Vandenberg <jayvdb@gmail.com>

- Increase minimum Django to 1.11
- Add %doc and %license
- Add %check and use test-response-401.patch to workaround test failures
- Update URLs to new repository
- Drop unnecessary build dependency on devel
- Fix %fdupes
- Update to v1.1.3
  * Fix a concurrency issue with Refresh Tokens
  * Fix Refresh Token revocation when the Access Token does not exist
- from 1.1.2
  * Return state with Authorization Denied error (RFC6749 section 4.1.2.1)
  * Fix a crash with malformed base64 authentication headers
  * Fix a crash with malformed IPv6 redirect URIs
- from 1.1.1
  * **Critical**: v1.1.0 contained a migration that would revoke all
    existing RefreshTokens (`0006_auto_20171214_2232`). This release
    corrects the migration.   If you have already ran it in production,
    please see the following issue for more details:
    https://github.com/jazzband/django-oauth-toolkit/issues/589

-------------------------------------------------------------------
Thu Oct  5 11:40:07 UTC 2017 - chhuang@suse.de

- Add version 1.0.0 for python2 and 3 

-------------------------------------------------------------------
Mon Oct  2 13:50:45 UTC 2017 - cherry@localhost

- Add for #85: API authentication

-------------------------------------------------------------------
Mon Oct  2 10:14:48 UTC 2017 - cherry@localhost

- Add latest version 1.0.0 
openSUSE Build Service is sponsored by