SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for python312-oauthlib-3.2.2-83.2.noarch.rpm :

* Tue Sep 24 2024 ecsos - Fix build error under Leap.
* Mon Sep 09 2024 John Paul Adrian Glaubitz - Cherry-pick upstream patch to make UtilsTests.test_filter_params Python 3.13+ compatible
* Make-UtilsTests.test_filter_params-Python-3.13-compatible.patch
* Mon Aug 12 2024 Daniel Garcia - Skip failing test with jwt 2.9.0 gh#oauthlib/oauthlib#877
* Fri Apr 21 2023 Dirk Müller - add sle15_python_module_pythons (jsc#PED-68)
* Thu Apr 13 2023 Matej Cepl - Make calling of %{sle15modernpython} optional.
* Sat Oct 22 2022 Arun Persaud - update to version 3.2.2:
* OAuth2.0 Provider:
* CVE-2022-36087- Also remove the conditional definition of python_module.
* Mon Sep 12 2022 Arun Persaud - specfile:
* update requirements- update to version 3.2.1:
* OAuth2.0 Provider:
* #803: Metadata endpoint support of non-HTTPS
* CVE-2022-36087, bugzilla # 1203333
* OAuth1.0:
* #818: Allow IPv6 being parsed by signature
* General:
* Improved and fixed documentation warnings.
* Cosmetic changes based on isort
* Thu Feb 03 2022 Arun Persaud - specfile:
* update copyright year- update to version 3.2.0:
* OAuth2.0 Client:
* #795: Add Device Authorization Flow for Web Application
* #786: Add PKCE support for Client
* #783: Fallback to none in case of wrong expires_at format.
* OAuth2.0 Provider:
* #790: Add support for CORS to metadata endpoint.
* #791: Add support for CORS to token endpoint.
* #787: Remove comma after Bearer in WWW-Authenticate
* OAuth2.0 Provider - OIDC: + #755: Call save_token in Hybrid code flow + #751: OIDC add support of refreshing ID Tokens with refresh_id_token + #751: The RefreshTokenGrant modifiers now take the same arguments as the AuthorizationCodeGrant modifiers (token, token_handler, request).
* General: + Added Python 3.9, 3.10, 3.11 + Improve Travis & Coverage
* Sun Jun 06 2021 Dirk Müller - update to 3.1.1:
* #753: Fix acceptance of valid IPv6 addresses in URI validation
* #730: Base OAuth2 Client now has a consistent way of managing the `scope`: it consistently relies on the `scope` provided in the constructor if any, except if overridden temporarily in a method call. Note that in particular providing a non-None `scope` in `prepare_authorization_request` or `prepare_refresh_token` does not override anymore `self.scope` forever, it is just used temporarily.
* #726: MobileApplicationClient.prepare_request_uri and MobileApplicationClient.parse_request_uri_response, ServiceApplicationClient.prepare_request_body, and WebApplicationClient.prepare_request_uri now correctly use the default `scope` provided in constructor.
* #725: LegacyApplicationClient.prepare_request_body now correctly uses the default `scope` provided in constructor
* #711: client_credentials grant: fix log message
* #746: OpenID Connect Hybrid - fix nonce not passed to add_id_token
* #756: Different prompt values are now handled according to spec (e.g. prompt=none)
* #759: OpenID Connect - fix Authorization: Basic parsing
* #716: improved skeleton validator for public vs private client
* #720: replace mock library with standard unittest.mock
* #727: build isort integration
* #734: python2 code removal
* #735, #750: add python3.8 support
* #749: bump minimum versions of pyjwt and cryptography- drop o_switch_to_unitest_mock.patch (upstream)
* Tue May 25 2021 pgajdosAATTsuse.com- %check: use %pyunittest rpm macro
 
ICM