fix(deps): update dependency requests-auth to v8 - autoclosed
This MR contains the following updates:
| Package | Change | Age | Confidence |
|---|---|---|---|
| requests-auth (changelog) |
>=5.3.0,<5.4.0 -> >=8.0.0,<8.1.0
|
Release Notes
Colin-b/requests_auth (requests-auth)
v8.0.0
Added
- Adding explicit support for Python
3.12. - Publicly expose
requests_auth.SupportMultiAuth, allowing multiple authentication support for everyrequestsauthentication class that exists. - Publicly expose
requests_auth.TokenMemoryCache, allowing to create custom Oauth2 token cache based on this default implementation. - You can now provide your own HTML success (
success_html) and failure (failure_html) display via the newOAuth2.displayshared setting. Refer to documentation for more details. - Thanks to the new
redirect_uri_domainparameter on Authorization code (with and without PKCE) and Implicit flows, you can now provide the FQDN to use in theredirect_uriwhenlocalhost(the default) is not allowed. -
requests_auth.WakaTimeAuthorizationCodehandling access to the WakaTime API.
Changed
- Except for
requests_auth.testing, only direct access viarequests_auth.was considered publicly exposed. This is now explicit, as inner packages are now using private prefix (_). If you were relying on some classes or functions that are now internal, feel free to open an issue. -
requests_auth.JsonTokenFileCacheandrequests_auth.TokenMemoryCacheget_tokenmethod does not handle kwargs anymore, theon_missing_tokencallable does not expect any arguments anymore. -
requests_auth.JsonTokenFileCachedoes not exposetokens_pathorlast_save_timeattributes anymore and is also allowingpathlib.Pathinstances as cache location. -
requests_auth.TokenMemoryCachedoes not exposeforbid_concurrent_cache_accessorforbid_concurrent_missing_token_function_callattributes anymore. - Browser display settings have been moved to a shared setting, see documentation for more information on
requests_auth.OAuth2.display. The failure page will be displayed for 10 seconds by default instead of 5 seconds previously. As a result the following classes no longer exposesuccess_display_timeandfailure_display_timeparameters.-
requests_auth.OAuth2AuthorizationCode. -
requests_auth.OktaAuthorizationCode. -
requests_auth.WakaTimeAuthorizationCode. -
requests_auth.OAuth2AuthorizationCodePKCE. -
requests_auth.OktaAuthorizationCodePKCE. -
requests_auth.OAuth2Implicit. -
requests_auth.AzureActiveDirectoryImplicit. -
requests_auth.AzureActiveDirectoryImplicitIdToken. -
requests_auth.OktaImplicit. -
requests_auth.OktaImplicitIdToken.
-
- The authentication success and failure displayed in the browser were revamped to be more user-friendly.
requests_auth.testingwas modified to accommodate this change:-
tab.assert_successexpected_messageparameter was removed. -
tab.assert_failureexpected_messageparameter should not be prefixed withUnable to properly perform authentication:anymore and\nin the message should be replaced with<br>.
-
- Exceptions issued by
requests_authare now inheriting fromrequests_auth.RequestsAuthException, itself inheriting fromrequests.RequestException, instead ofException.
Fixed
- Type information is now provided following PEP 561.
- Remove deprecation warnings due to usage of
utcnowandutcfromtimestamp. -
requests_auth.OktaClientCredentialsscopeparameter is now mandatory and does not default toopenidanymore. -
requests_auth.OktaClientCredentialswill now display a more user-friendly error message in case Okta instance is not provided. - Tokens cache
DEBUGlogs will not display tokens anymore. - Handle
text/html; charset=utf-8content-type in token responses.
Removed
- Removing support for Python
3.7. - Deprecated
requests_auth.Authsclass has been removed.
v7.0.0
Changed
-
requests_auth.OAuth2ResourceOwnerPasswordCredentialsdoes not send basic authentication by default.
Added
-
session_authas a parameter ofrequests_auth.OAuth2ResourceOwnerPasswordCredentials. Allowing to provide any kind of optional authentication. -
requests_auth.OktaResourceOwnerPasswordCredentialsproviding Okta resource owner password credentials flow easy setup. - Explicit support for Python
3.11.
Removed
- Explicit support for Python
3.6.
v6.0.0
Changed
-
requests_auth.oauth2_tokens.TokenMemoryCache.get_tokenmethod now requires arguments to be named. -
requests_auth.oauth2_tokens.TokenMemoryCache.get_tokenmethodon_missing_tokenarguments must now be named (switched from args to kwargs). -
requests_auth.JsonTokenFileCache.get_tokenmethod now requires arguments to be named. -
requests_auth.JsonTokenFileCache.get_tokenmethodon_missing_tokenarguments must now be named (switched from args to kwargs). -
requests_auth.testingnow requirespyjwt==2.*.
Added
-
requests_auth.oauth2_tokens.TokenMemoryCache.get_tokennow allows to specify a customearly_expiryin seconds (default to 30). -
requests_auth.JsonTokenFileCache.get_tokennow allows to specify a customearly_expiryin seconds (default to 30). -
requests_auth.OAuth2ResourceOwnerPasswordCredentialscontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OAuth2ClientCredentialscontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OktaClientCredentialscontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OAuth2AuthorizationCodecontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OktaAuthorizationCodecontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OAuth2AuthorizationCodePKCEcontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OktaAuthorizationCodePKCEcontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OAuth2Implicitcontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.AzureActiveDirectoryImplicitcontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.AzureActiveDirectoryImplicitIdTokencontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OktaImplicitcontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s. -
requests_auth.OktaImplicitIdTokencontains a newearly_expiryparameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
Removed
-
requests_auth.oauth2_tokens.is_expiredis not available anymore. -
requests_auth.oauth2_tokens.decode_base64is not available anymore. -
requests_auth.oauth2_tokens.TokenMemoryCache.add_bearer_tokenis not available anymore. -
requests_auth.oauth2_tokens.TokenMemoryCache.add_access_tokenis not available anymore.
Fixed
- OAuth2 token will now be considered as expired 30 seconds before actual expiry. To ensure it is still valid when received by the actual server.
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.
Edited by uis-devops-renovatebot