Draft: Update dependency Authlib to v1.3.0
This MR contains the following updates:
Package | Update | Change |
---|---|---|
Authlib | minor |
==1.0.1 -> ==1.3.0
|
Release Notes
lepture/authlib (Authlib)
v1.3.0
: Version 1.3.0
Bug fixes
- Restore AuthorizationServer.create_authorization_response behavior, via #558 by @TurnrDev
- Include leeway in validate_iat() for JWT, via #565 by @dhallam
- Fix encode_client_secret_basic, via #594 by @Prilkop
- Use single key in JWK if JWS does not specify kid, via #596 by @dklimpel
- Fix error when RFC9068 JWS has no scope field, via #598 by @tanguilp
- Get werkzeug version using importlib, via #591 by @Sparrow0hawk
Breaking changes
v1.2.1
: Version 1.2.1
- Apply headers in
ClientSecretJWT.sign
method, via #552 - Allow falsy but non-None grant uri params, via #544
- Fixed
authorize_redirect
for Starlette v0.26.0, via #533 - Removed
has_client_secret
method and documentation, via #513 - Removed
request_invalid
andtoken_revoked
remaining occurences and documentation. #514 - Fixed RFC7591
grant_types
andresponse_types
default values, via #509 - Add support for python 3.12, via #590
v1.2.0
: Version 1.2.0
- Not passing
request.body
toResourceProtector
, #485. - Use
flask.g
instead of_app_ctx_stack
, #482. - Add
headers
parameter back toClientSecretJWT
, #457. - Always passing
realm
parameter in OAuth 1 clients, #339. - Implemented RFC7592 Dynamic Client Registration Management Protocol, #505`
- Add
default_timeout
for requestsOAuth2Session
andAssertionSession
. - Deprecate
jwk.loads
andjwk.dumps
v1.1.0
: Version 1.1.0
This release contains breaking changes and security fixes.
- Allow to pass
claims_options
to Framework OpenID Connect clients, via #446 by @Galaxy102 - Fix
.stream
with context for HTTPX OAuth clients, via #465 by @bjoernmeier - Fix Starlette OAuth client for cache store, via #478 by @haggen
Breaking changes:
- Raise
InvalidGrantError
for invalid code, redirect_uri and no user errors in OAuth 2.0 server. - The default
authlib.jose.jwt
would only work with JSON Web Signature algorithms, if you would like to use JWT with JWE algorithms, please pass the algorithms parameter:
jwt = JsonWebToken(['A128KW', 'A128GCM', 'DEF'])
Security fixes for JOSE module
- CVE-2022-39175
- CVE-2022-39174
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.