Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Task/update from main library #2

Merged
merged 88 commits into from
Mar 1, 2024
Merged

Conversation

freddygcala
Copy link
Collaborator

No description provided.

juanifioren and others added 30 commits December 3, 2018 10:31
Since `_()` is evaluated at import time the translation would always be the default translation of the Django installation as of process startup time. With `ugettext_lazy` evaluation is delayed until the translated strings are forced to strings in the template, so the current language of the request will be used.
Co-authored-by: Eirik Martiniussen Sylliaas <eirik@sylliaas.no>
Co-authored-by: Stefan Foulis <stefan@foulis.ch>
Fix example in docs for translatable scopes
…e-models

Add OIDC_CLIENT_MODEL setting to enable client model swapping (rebased)
support Django 2.1 in an exmaple project
Consistently use the *_endpoint_class pattern on AuthorizeView,
TokenView and TokenInstrospectionView.
…nt-view-endpoint-class

Consistently use endpoint class set on views
This means we don't need to specify the Tox environments in two places anymore.
…e/swappable-models

Revert "Add OIDC_CLIENT_MODEL setting to enable client model swapping (rebased)"
…l-scope-support

Extended scope support for grant_type=client_credentials and password
juanifioren and others added 25 commits May 15, 2023 21:27
This enables subclasses to customize the token and code creation.
If oidc provider is used in a multi database setup it may not be used on
the default database alone. And when used in a database mirror setup the
migration could be executed on a different db alias/transaction.

This can cause migration failures because the ReponseType table is
created on the database passed to the migrate command while the data is
inserted in the database returned from the database router.
Depending on the configuration the ResponseType table may not exist for
that database yet or the ResponseType data was already migrated
resulting in a DatabaseError and IntegrityError respectively.
Before this change the PKCE secret would be verified only if it was sent
by the client. This defeats the point of PKCE as a malicious actor which
intercepted the code returned from the authorization endpoint would be
able to send a request to the token endpoint without the code_verifier.

This only affects public clients and is subject to the preconditions
described by: https://tools.ietf.org/html/rfc7636#section-1
@freddygcala freddygcala requested a review from a team as a code owner March 1, 2024 00:05
@freddygcala freddygcala merged commit aeafbc7 into develop Mar 1, 2024
@freddygcala freddygcala deleted the task/update-from-main-library branch March 1, 2024 19:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.