Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package python-django-allauth for
openSUSE:Factory checked in at 2021-12-25 20:16:42
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-django-allauth (Old)
and /work/SRC/openSUSE:Factory/.python-django-allauth.new.2520 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-django-allauth"
Sat Dec 25 20:16:42 2021 rev:6 rq:942392 version:0.47.0
Changes:
--------
---
/work/SRC/openSUSE:Factory/python-django-allauth/python-django-allauth.changes
2020-06-16 13:47:35.758498285 +0200
+++
/work/SRC/openSUSE:Factory/.python-django-allauth.new.2520/python-django-allauth.changes
2021-12-25 20:17:07.117272702 +0100
@@ -1,0 +2,44 @@
+Fri Dec 24 23:57:39 UTC 2021 - John Vandenberg <[email protected]>
+
+- Update to v0.47.0
+ * Better compatibility with Django 4.0
+ * New providers: Gumroad.
+ * Added a new setting SOCIALACCOUNT_LOGIN_ON_GET that controls
+ whether or not the endpoints for initiating a social login
+ (for example, "/accounts/google/login/") require a POST request
+ to initiate the handshake. As requiring a POST is more secure,
+ the default of this new setting is False.
+- from v0.46.0
+ * New providers: Gitea, MediaWiki.
+ * New translations: Georgian, Mongolian.
+ * Django 3.2 compatibility.
+- from v0.45.0
+ * New providers: Feishu, NetIQ, Frontier, CILogin.
+- from v0.44.0
+ * In previous versions, the mechanism to prevent too many failed login
+ attempts (ACCOUNT_LOGIN_ATTEMPTS_LIMIT) could be bypassed by
+ changing the casing of the login.
+ * The certificate key part of the SOCIALACCOUNT_PROVIDERS
+ configuration has been renamed to certificate_key. This is done
+ to prevent the key from being displayed without being masked
+ in Django debug pages.
+ * Better compatibility with Django 3.2
+- from v0.43.0
+ * New translation: Slovenian.
+ * If ACCOUNT_LOGIN_ATTEMPTS_LIMIT is set and the user successfully
+ resets their password, the timeout is cleared to allow immediate
+ login.
+ * You can now limit the amount of email addresses a user can
+ associate to his account by setting ACCOUNT_MAX_EMAIL_ADDRESSES.
+ * New providers: Apple, Okta, Stocktwits, Zoho, Zoom.
+ * If email verification is set to mandatory, the email address you use
+ to login with must now be verified as well.
+ In previous versions, it was sufficient if the account had at least
+ one verified email address, not necessarily the one used to login with.
+ * Added a new setting: ACCOUNT_SIGNUP_REDIRECT_URL -- the URL
+ (or URL name) to redirect to directly after signing up.
+ * In previous versions, the allauth app included a base.html template.
+ This template could conflict with an equally named template at project
+ level. Therefore, base.html has now been moved to account/base.html
+
+-------------------------------------------------------------------
@@ -13,2 +57,2 @@
- * Fixes CVE-2019-19844: Potential account hijack via password reset form
- bsc#1159447
+ * Fixes CVE-2019-19844: Potential account hijack via password
+ reset form bsc#1159447
Old:
----
django-allauth-0.42.0.tar.gz
New:
----
django-allauth-0.47.0.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-django-allauth.spec ++++++
--- /var/tmp/diff_new_pack.cQJr7M/_old 2021-12-25 20:17:07.537273043 +0100
+++ /var/tmp/diff_new_pack.cQJr7M/_new 2021-12-25 20:17:07.545273049 +0100
@@ -19,7 +19,7 @@
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
%define skip_python2 1
Name: python-django-allauth
-Version: 0.42.0
+Version: 0.47.0
Release: 0
Summary: Django authentication, registration, account management
License: MIT
++++++ django-allauth-0.42.0.tar.gz -> django-allauth-0.47.0.tar.gz ++++++
++++ 52738 lines of diff (skipped)