8000 Comparing v3.4.0...master · IdentityPython/pyop · GitHub
[go: up one dir, main page]

Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: IdentityPython/pyop
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v3.4.0
Choose a base ref
...
head repository: IdentityPython/pyop
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Choose a head ref
  • 16 commits
  • 6 files changed
  • 6 contributors

Commits on May 31, 2022

  1. Fix typo in method name

    Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
    c00kiemon5ter committed May 31, 2022
    Configuration menu
    Copy the full SHA
    837045e View commit details
    Browse the repository at this point in the history

Commits on Nov 8, 2022

  1. fix: ValueError should be raised, not returned

    Fix an issue where invalid config might lead to an ValueError object
    being used as a databasse object, leading to application errors later.
    
    Rather fail fast by properly raising the exception.
    vladimir-mencl-eresearch committed Nov 8, 2022
    Configuration menu
    Copy the full SHA
    58a7c15 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #44 from REANNZ/fix-raise-invalid-uri

    fix: ValueError should be raised, not returned
    c00kiemon5ter authored Nov 8, 2022
    Configuration menu
    Copy the full SHA
    970abcb View commit details
    Browse the repository at this point in the history

Commits on Nov 9, 2022

  1. fix: auth_state: update db when marking code as used

    Store the updated `authz_info` info back into the database
    after marking the code as used.
    
    Otherwise, the change would be discarded when using a DB
    (would hold only with in-memory dict)
    vladimir-mencl-eresearch committed Nov 9, 2022
    Configuration menu
    Copy the full SHA
    b4c32ec View commit details
    Browse the repository at this point in the history
  2. Merge pull request #45 from REANNZ/fix-exchange-code-update-db

    fix: auth_state: update db when marking code as used
    c00kiemon5ter authored Nov 9, 2022
    Configuration menu
    Copy the full SHA
    28964c5 View commit details
    Browse the repository at this point in the history

Commits on Nov 15, 2022

  1. fix: userinfo: avoid indexing by None user_id in stateless mode (#46)

    In stateless mode, `user_id` passed to `get_claims_for` is always `None`.
    
    When no claims are available and userinfo is thus also `None`, `user_id`
    is used as index to self._db, but that triggers a `KeyError: None`.
    
    As `create_access_token` populates `user_info` field in `authz_info`
    only of `user_info` is pythonically `True`, `user_info` passed here ends
    up being `None`, not empty dict `{}`.
    
    As the `Userinfo` class does not have access to `Provider.stateless`,
    the easiest fix is to make the db lookup conditional on user_id being
    pythonically True - which corresponds with not being in stateltess mode.
    vladimir-mencl-eresearch authored Nov 15, 2022
    Configuration menu
    Copy the full SHA
    e2f7d88 View commit details
    Browse the repository at this point in the history
  2. fix: example/requirements.txt to reduce vulnerabilities

    The following vulnerabilities are fixed by pinning transitive dependencies:
    - https://snyk.io/vuln/SNYK-PYTHON-SETUPTOOLS-3113904
    snyk-bot authored and c00kiemon5ter committed Nov 15, 2022
    Configuration menu
    Copy the full SHA
    c7b9ff6 View commit details
    Browse the repository at this point in the history

Commits on Jun 30, 2023

  1. Add configurable subject_identifier_uri to clients

    According to the [OIDC
    Documentation](https://openid.net/specs/openid-connect-core-1_0.html#PairwiseAlg),
    the client must configure a `subject_identifier_uri`, if multiple
    `redirect_uri` are configured.
    
    This patch adds the possibility to do this as described in #49.
    
    Signed-off-by: Sven Haardiek <sven@haardiek.de>
    shaardie authored and c00kiemon5ter committed Jun 30, 2023
    Configuration menu
    Copy the full SHA
    8cbd697 View commit details
    Browse the repository at this point in the history

Commits on Sep 29, 2023

  1. Start migration to PyMongo 4

    Pin pyop to the latest version of PyMongo 3.x until it has completely
    migrated to PyMongo 4.  Most of the key new methods and options from
    PyMongo 4.0 are backported in PyMongo 3.12, making migration much
    easier.
    
    Closes #51
    niheconomoum authored and c00kiemon5ter committed Sep 29, 2023
    Configuration menu
    Copy the full SHA
    8bc8d0a View commit details
    Browse the repository at this point in the history

Commits on Oct 11, 2023

  1. Bump version to 3.4.1

    - Fix support of PyMongo 4
    - Add configurable subject_identifier_uri to clients
    - fix: example/requirements.txt to reduce vulnerabilities
    - fix: userinfo: avoid indexing by None user_id in stateless mode
    
    Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
    c00kiemon5ter committed Oct 11, 2023
    Configuration menu
    Copy the full SHA
    a6cbe40 View commit details
    Browse the repository at this point in the history

Commits on Oct 26, 2023

  1. fix: example/requirements.txt to reduce vulnerabilities

    The following vulnerabilities are fixed by pinning transitive dependencies:
    - https://snyk.io/vuln/SNYK-PYTHON-WERKZEUG-6035177
    snyk-bot authored and c00kiemon5ter committed Oct 26, 2023
    Configuration menu
    Copy the full SHA
    1c98f84 View commit details
    Browse the repository at this point in the history

Commits on Oct 1, 2024

  1. fix: example/requirements.txt to reduce vulnerabilities

    The following vulnerabilities are fixed by pinning transitive dependencies:
    - https://snyk.io/vuln/SNYK-PYTHON-REQUESTS-6928867
    snyk-bot authored and c00kiemon5ter committed Oct 1, 2024
    Configuration menu
    Copy the full SHA
    38d5fbd View commit details
    Browse the repository at this point in the history
  2. fix: example/requirements.txt to reduce vulnerabilities

    The following vulnerabilities are fixed by pinning transitive dependencies:
    - https://snyk.io/vuln/SNYK-PYTHON-REQUESTS-6928867
    - https://snyk.io/vuln/SNYK-PYTHON-URLLIB3-7267250
    snyk-bot authored and c00kiemon5ter committed Oct 1, 2024
    Configuration menu
    Copy the full SHA
    5d222af View commit details
    Browse the repository at this point in the history
  3. fix: example/requirements.txt to reduce vulnerabilities

    The following vulnerabilities are fixed by pinning transitive dependencies:
    - https://snyk.io/vuln/SNYK-PYTHON-SETUPTOOLS-7448482
    snyk-bot authored and c00kiemon5ter committed Oct 1, 2024
    Configuration menu
    Copy the full SHA
    edb7397 View commit details
    Browse the repository at this point in the history

Commits on Nov 6, 2024

  1. Configuration menu
    Copy the full SHA
    de52a30 View commit details
    Browse the repository at this point in the history
  2. Bump version to v3.4.2

    For the stateless flow, retrieve the extra_id_token_claims from the auth_code in the request
    
    Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
    c00kiemon5ter committed Nov 6, 2024
    Configuration menu
    Copy the full SHA
    fab87f9 View commit details
    Browse the repository at this point in the history
Loading
0