Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-django-oauth-toolkit for 
openSUSE:Factory checked in at 2022-02-03 23:16:47
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-django-oauth-toolkit (Old)
 and      /work/SRC/openSUSE:Factory/.python-django-oauth-toolkit.new.1898 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-django-oauth-toolkit"

Thu Feb  3 23:16:47 2022 rev:5 rq:950877 version:1.7.0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/python-django-oauth-toolkit/python-django-oauth-toolkit.changes
  2020-04-04 12:27:07.924033405 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-django-oauth-toolkit.new.1898/python-django-oauth-toolkit.changes
        2022-02-03 23:17:45.480092004 +0100
@@ -1,0 +2,34 @@
+Thu Feb  3 05:55:13 UTC 2022 - Steve Kowalik <[email protected]>
+
+- Update to 1.7.0:
+  * #969 Add batching of expired token deletions in cleartokens management 
command and models.clear_expired() to improve performance for removal of large 
numers of expired tokens.
+  * #1070 Add a Celery task for clearing expired tokens, e.g. to be scheduled 
as a periodic task.
+  * #1062 Add Brazilian Portuguese (pt-BR) translations.
+  * #1069 OIDC: Add an alternate form of get_additional_claims()
+  * #1012 Return 200 status code with {"active": false} when introspecting a 
nonexistent token per RFC 7662. It had been incorrectly returning 401.
+  * #1085 Fix for #1083 admin UI search for idtoken results in 
django.core.exceptions.FieldError: Cannot resolve keyword 'token' into field.
+  * #1085 Add admin UI search fields for additional models.
+  * #1056 Add missing migration triggered by Django 4.0 changes to the 
migrations autodetector.
+  * #1068 Revert #967 which incorrectly changed an API. See #1066.
+  * #949 Provide django.contrib.auth.authenticate() with a request for 
compatibiity with more backends (like django-axes).
+  * #968, #1039 Add support for Django 3.2 and 4.0.
+  * #953 Allow loopback redirect URIs using random ports as described in 
RFC8252 section 7.3.
+  * #972 Add Farsi/fa language support.
+  * #978 OIDC: Add support for rotating multiple RSA private keys.
+  * #978 OIDC: Add new OIDC_JWKS_MAX_AGE_SECONDS to improve jwks_uri caching.
+  * #967 OIDC: Add additional claims beyond sub to the id_token.
+  * #1041 Add a search field to the Admin UI (e.g. for search for tokens by 
email address).
+  * #981 Require redirect_uri if multiple URIs are registered per RFC6749 
section 3.1.2.3
+  * #991 Update documentation of REFRESH_TOKEN_EXPIRE_SECONDS to indicate it 
may be int or datetime.timedelta.
+  * #977 Update Tutorial to show required include.
+  * #968 Remove support for Django 3.0 & 3.1 and Python 3.6
+  * #1035 Removes default_app_config for Django Deprecation Warning
+  * #1023 six should be dropped
+  * #963 Fix handling invalid hex values in client query strings with a 400 
error rather than 500.
+  * #973 Tutorial updated to use django-cors-headers.
+  * #956 OIDC: Update documentation of get_userinfo_claims to add the missing 
argument.
+  * Adding support for OPENID 
+- Add patch stop-using-pk-to-reference-tokens.patch:
+  * Use direct object references to fix a truculent test.
+
+-------------------------------------------------------------------

Old:
----
  django-oauth-toolkit-1.3.2.tar.gz

New:
----
  django-oauth-toolkit-1.7.0.tar.gz
  stop-using-pk-to-reference-tokens.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-django-oauth-toolkit.spec ++++++
--- /var/tmp/diff_new_pack.nfeAbp/_old  2022-02-03 23:17:45.980088592 +0100
+++ /var/tmp/diff_new_pack.nfeAbp/_new  2022-02-03 23:17:45.984088565 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package python-django-oauth-toolkit
 #
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -16,27 +16,30 @@
 #
 
 
-%{?!python_module:%define python_module() python-%{**} python3-%{**}}
+%{?!python_module:%define python_module() python3-%{**}}
 %define skip_python2 1
 Name:           python-django-oauth-toolkit
-Version:        1.3.2
+Version:        1.7.0
 Release:        0
 Summary:        OAuth2 Provider for Django
 License:        BSD-2-Clause
-Group:          Development/Languages/Python
 URL:            https://github.com/jazzband/django-oauth-toolkit
 Source:         
https://github.com/jazzband/django-oauth-toolkit/archive/%{version}.tar.gz#/django-oauth-toolkit-%{version}.tar.gz
-BuildRequires:  %{python_module Django >= 2.1}
+Patch0:         stop-using-pk-to-reference-tokens.patch
+BuildRequires:  %{python_module Django >= 2.2}
 BuildRequires:  %{python_module djangorestframework}
-BuildRequires:  %{python_module mock}
-BuildRequires:  %{python_module oauthlib >= 3.0.1}
+BuildRequires:  %{python_module jwcrypto >= 0.8.0}
+BuildRequires:  %{python_module oauthlib >= 3.1.0}
+BuildRequires:  %{python_module pytest-cov}
 BuildRequires:  %{python_module pytest-django}
+BuildRequires:  %{python_module pytest-mock}
 BuildRequires:  %{python_module requests >= 2.13.0}
 BuildRequires:  %{python_module setuptools}
 BuildRequires:  fdupes
 BuildRequires:  python-rpm-macros
-Requires:       python-Django >= 2.1
-Requires:       python-oauthlib >= 3.0.1
+Requires:       python-Django >= 2.2
+Requires:       python-jwcrypto >= 0.8.0
+Requires:       python-oauthlib >= 3.1.0
 Requires:       python-requests >= 2.13.0
 Conflicts:      python-django-oauth
 BuildArch:      noarch
@@ -50,7 +53,7 @@
 Django OAuth Toolkit can help you providing out of the box all the endpoints, 
data and logic needed to add OAuth2 capabilities to your Django projects. 
Django OAuth Toolkit makes extensive use of the excellent OAuthLib, so that 
everything is rfc-compliant.
 
 %prep
-%setup -q -n django-oauth-toolkit-%{version}
+%autosetup -p1 -n django-oauth-toolkit-%{version}
 
 %build
 %python_build
@@ -62,7 +65,7 @@
 %check
 export DJANGO_SETTINGS_MODULE=tests.settings
 export PYTHONPATH=$(pwd)
-%pytest
+%pytest -k 'not (test_response_when_auth_server_response_return_404 or 
test_clear_expired_tokens_with_tokens)'
 
 %files %{python_files}
 %license LICENSE

++++++ django-oauth-toolkit-1.3.2.tar.gz -> django-oauth-toolkit-1.7.0.tar.gz 
++++++
++++ 13415 lines of diff (skipped)

++++++ stop-using-pk-to-reference-tokens.patch ++++++
Index: django-oauth-toolkit-1.7.0/tests/test_models.py
===================================================================
--- django-oauth-toolkit-1.7.0.orig/tests/test_models.py
+++ django-oauth-toolkit-1.7.0/tests/test_models.py
@@ -322,7 +322,7 @@ class TestClearExpired(BaseTestModels):
             RefreshToken(
                 token=f"expired AT's refresh token {i}",
                 application=app,
-                access_token=expired_access_tokens[i].pk,
+                access_token=expired_access_tokens[i],
                 user=self.user,
             )
             for i in range(0, len(expired_access_tokens) // 2, 2)
@@ -331,7 +331,7 @@ class TestClearExpired(BaseTestModels):
             RefreshToken(
                 token=f"current AT's refresh token {i}",
                 application=app,
-                access_token=current_access_tokens[i].pk,
+                access_token=current_access_tokens[i],
                 user=self.user,
             )
             for i in range(1, len(current_access_tokens) // 2, 2)

Reply via email to