Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump django-allauth from 0.54.0 to 0.63.4 in /{{cookiecutter.repo_name}} #919

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 10, 2024

Bumps django-allauth from 0.54.0 to 0.63.4.

Changelog

Sourced from django-allauth's changelog.

0.63.4 (2024-07-10)


Security notice

  • The __str__() method of the SocialToken model returned the access token. As a consequence, logging or printing tokens otherwise would expose the access token. Now, the method no longer returns the token. If you want to log/print tokens, you will now have to explicitly log the token field of the SocialToken instance.

  • Enumeration prevention: the behavior on the outside of an actual signup versus a signup where the user already existed was not fully identical, fixed.

0.63.3 (2024-05-31)


Note worthy changes

  • In HEADLESS_ONLY mode, the /accounts/<provider>/login/ URLs were still available, fixed.

  • The few remaining OAuth 1.0 providers were not compatible with headless mode, fixed.

  • Depending on where you placed the secure_admin_login(admin.site.login) protection you could run into circular import errors, fixed.

Backwards incompatible changes

  • SAML: IdP initiated SSO is disabled by default, see security notice below.

Security notice

  • SAML: RelayState was used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it is not signed and thereby making the SAML login flow vulnerable to CSRF/replay attacks. Now, InResponseTo is used instead, addressing the issue for SP initiated SSO flows. IdP initiated SSO remains inherently insecure, by design. For that reason, it is now disabled by default. If you need to support IdP initiated SSO, you will need to opt-in to that by adding "reject_idp_initiated_sso": False to your advanced SAML provider settings.

... (truncated)

Commits
  • a41085c chore: Release 0.63.4
  • a671ca6 fix(account): Prevent enumeration vs messages
  • 663c7df fix(socialaccount): Don't return access token in str
  • aa33e2f chore: Opening 0.63.4-dev
  • f6577fa chore: Release 0.63.3
  • 1f631a1 fix(saml): Secure SP initiated SSO, disable IdP initiated SSO
  • 165abe0 docs: Don't rely on test settings
  • 73efc84 docs: Added examples section
  • c5d4d54 refactor(account/forms): Move email2 lower to clean()
  • 11a5964 fix(account): Ignore casing differences in email2
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Jul 10, 2024
Bumps [django-allauth](https://github.com/pennersr/django-allauth) from 0.54.0 to 0.63.4.
- [Changelog](https://github.com/pennersr/django-allauth/blob/main/ChangeLog.rst)
- [Commits](pennersr/django-allauth@0.54.0...0.63.4)

---
updated-dependencies:
- dependency-name: django-allauth
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/pip/{{cookiecutter.repo_name}}/develop/django-allauth-0.63.4 branch from a75843e to b97baf6 Compare July 18, 2024 18:29
Copy link
Contributor Author

dependabot bot commented on behalf of github Aug 5, 2024

Superseded by #937.

@dependabot dependabot bot closed this Aug 5, 2024
@dependabot dependabot bot deleted the dependabot/pip/{{cookiecutter.repo_name}}/develop/django-allauth-0.63.4 branch August 5, 2024 23:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants