Skip to content

Releases: Colin-b/httpx_auth

0.13.0 (2021-11-16)

16 Nov 01:57
1a266e1
Compare
Choose a tag to compare

Changed

0.12.0 (2021-11-01)

01 Nov 17:05
Compare
Choose a tag to compare

Changed

  • Requires httpx==0.20.*
  • OAuth2ResourceOwnerPasswordCredentials.client attribute is now set to None in case it was not provided as parameter.
  • OAuth2ClientCredentials.client attribute is now set to None in case it was not provided as parameter.
  • OktaClientCredentials.client attribute is now set to None in case it was not provided as parameter.
  • OAuth2AuthorizationCode.client attribute is now set to None in case it was not provided as parameter.
  • OktaAuthorizationCode.client attribute is now set to None in case it was not provided as parameter.
  • OAuth2AuthorizationCodePKCE.client attribute is now set to None in case it was not provided as parameter.
  • OktaAuthorizationCodePKCE.client attribute is now set to None in case it was not provided as parameter.
  • httpx.Client provided as client parameter to OAuth2ResourceOwnerPasswordCredentials is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
  • httpx.Client provided as client parameter to OAuth2ClientCredentials is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
  • httpx.Client provided as client parameter to OktaClientCredentials is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
  • httpx.Client provided as client parameter to OAuth2AuthorizationCode is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
  • httpx.Client provided as client parameter to OktaAuthorizationCode is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
  • httpx.Client provided as client parameter to OAuth2AuthorizationCodePKCE is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
  • httpx.Client provided as client parameter to OktaAuthorizationCodePKCE is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.

Fixed

  • A new client is created (if not provided as client parameter) upon request of a new token for OAuth2ResourceOwnerPasswordCredentials flow. Re-using previously closed client was raising an issue upon token expiry.
  • A new client is created (if not provided as client parameter) upon request of a new token for OAuth2ClientCredentials flow. Re-using previously closed client was raising an issue upon token expiry.
  • A new client is created (if not provided as client parameter) upon request of a new token for OktaClientCredentials flow. Re-using previously closed client was raising an issue upon token expiry.
  • A new client is created (if not provided as client parameter) upon request of a new token for OAuth2AuthorizationCode flow. Re-using previously closed client was raising an issue upon token expiry.
  • A new client is created (if not provided as client parameter) upon request of a new token for OktaAuthorizationCode flow. Re-using previously closed client was raising an issue upon token expiry.
  • A new client is created (if not provided as client parameter) upon request of a new token for OAuth2AuthorizationCodePKCE flow. Re-using previously closed client was raising an issue upon token expiry.
  • A new client is created (if not provided as client parameter) upon request of a new token for OktaAuthorizationCodePKCE flow. Re-using previously closed client was raising an issue upon token expiry.

0.11.0 (2021-08-19)

19 Aug 14:04
797c4db
Compare
Choose a tag to compare

Changed

Fixed

  • Tild character (~) is not URL encoded anymore.

0.10.0 (2021-04-27)

27 Apr 20:23
db8ff73
Compare
Choose a tag to compare

Changed

0.9.0 (2021-03-01)

01 Mar 01:49
d71a448
Compare
Choose a tag to compare

Changed

0.8.0 (2020-11-15)

15 Nov 14:38
371d2ae
Compare
Choose a tag to compare

Removed

  • Do not expose httpx_auth.oauth2_tokens.decode_base64 function anymore as it supposed to be used internally only.
  • Do not expose add_bearer_token token cache method anymore as it supposed to be used internally only.
  • Do not expose add_access_token token cache method anymore as it supposed to be used internally only.

Changed

  • get_token cache method now requires on_missing_token function args to be provided as kwargs instead of args.
  • get_token cache method now requires on_missing_token parameter to be provided as a non positional argument.
  • get_token cache method now expose early_expiry parameter, defaulting to 30 seconds.

Fixed

  • OAuth2 token will now be considered as expired 30 seconds before actual expiry. To ensure it is still valid when received by the actual server.

Added

  • httpx_auth.OAuth2ResourceOwnerPasswordCredentials contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OAuth2ClientCredentials contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OktaClientCredentials contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OAuth2AuthorizationCode contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OktaAuthorizationCode contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OAuth2AuthorizationCodePKCE contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OktaAuthorizationCodePKCE contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OAuth2Implicit contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.AzureActiveDirectoryImplicit contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.AzureActiveDirectoryImplicitIdToken contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OktaImplicit contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
  • httpx_auth.OktaImplicitIdToken contains a new early_expiry parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.

0.7.0 (2020-10-06)

06 Oct 20:55
94dd888
Compare
Choose a tag to compare

Added

  • Explicit support for Python 3.9
  • Document httpx_auth.AWS4Auth authentication class.

Changed

  • Requires httpx==0.16.*
  • Code now follow black==20.8b1 formatting instead of the git master version.

0.6.0 (2020-09-22)

22 Sep 14:55
c4dd944
Compare
Choose a tag to compare

Changed

0.5.1 (2020-08-31)

31 Aug 20:36
4770d94
Compare
Choose a tag to compare

Fixed

  • AWSAuth authentication class now handles empty path. Thanks to Michael E. Martinka. This class is still considered as under development and subject to breaking changes without notice.

Changed

  • All methods within AWSAuth are now private. They were never meant to be exposed anyway.

0.5.0 (2020-08-19)

19 Aug 14:43
4774b1d
Compare
Choose a tag to compare

Added

  • Allow to provide an httpx.Client instance for *AuthorizationCode flows (even PKCE), *ClientCredentials and *ResourceOwnerPasswordCredentials flows.