gctools-outilsgc / concierge

OAuth2 and OpenID microservice used for handling user registration, login and SAML2 SSO
https://account-compte.gccollab.ca
European Union Public License 1.1
11 stars 4 forks source link

Bump django-two-factor-auth from 1.8.0 to 1.12 #173

Closed dependabot[bot] closed 4 years ago

dependabot[bot] commented 4 years ago

Bumps django-two-factor-auth from 1.8.0 to 1.12.

Release notes

Sourced from django-two-factor-auth's releases.

1.12

Added

  • It is possible to set a timeout between a user authenticiating in the LoginView and them needing to re-authenticate. By default this is 10 minutes.

Removed

  • The final step in the LoginView no longer re-validates a user's credentials.
  • Django 1.11 support.

Changed

  • Security Fix: LoginView no longer stores credentials in plaintext in the session store.

1.11.0

Added

Nothing has been added for this version

Removed

  • MiddlewareMixin
  • Python 3.4 support
  • Django 2.1 support
  • mock dependency

Changed

  • extra_requires are now listed in lowercase. This is to workaround a bug in pip.
  • Use trimmed option on blocktrans to avoid garbage newlines in translations.
  • random_hex from django_otp 0.8.0 will always return a str, don't try to decode it.

1.10.0

Added

  • Support for Django 3.0.
  • Optionally install full or light phonenumbers library.

Removed

  • Python 2 support.

Changed

  • Updated translations.

1.9.1

No release notes provided.

1.9.0

Added

  • Support for Django 2.2.
  • Ability to create PhoneDevice from Django admin.
  • Support for Python 3.7.
Changelog

Sourced from django-two-factor-auth's changelog.

1.12 - 2020-07-08

Added

  • It is possible to set a timeout between a user authenticiating in the LoginView and them needing to re-authenticate. By default this is 10 minutes.

Removed

  • The final step in the LoginView no longer re-validates a user's credentials.
  • Django 1.11 support.

Changed

  • Security Fix: LoginView no longer stores credentials in plaintext in the session store.

1.11.0 - 2020-03-13

Added

Nothing has been added for this version

Removed

  • MiddlewareMixin
  • Python 3.4 support
  • Django 2.1 support
  • mock dependency

Changed

  • extra_requires are now listed in lowercase. This is to workaround a bug in pip.
  • Use trimmed option on blocktrans to avoid garbage newlines in translations.
  • random_hex from django_otp 0.8.0 will always return a str, don't try to decode it.

1.10.0 - 2019-12-13

Added

  • Support for Django 3.0.
  • Optionally install full or light phonenumbers library.

Removed

  • Python 2 support.

Changed

  • Updated translations.

1.9.1 - 2019-07-07

Changed

  • 1.9.0 got pushed with incorrect changelog, no other changes.

1.9.0 - 2019-07-07

Added

  • Support for Django 2.2.
  • Ability to create PhoneDevice from Django admin.
  • Support for Python 3.7.
Commits
  • e23e9bb Bump version: 1.11.0 → 1.12
  • af07ef1 Don't bump version of tagged release
  • 1234e43 Prepare for 1.12 release
  • 853a648 Drop EOL Django's
  • 09222ea Update translations
  • 92bd219 Resolve isort warning
  • 454fd98 Merge pull request from GHSA-vhr6-pvjm-9qwf
  • fb9ee19 Check that session doesn't contain password
  • 9988c50 Clear storage when going back to login
  • 35837cd Move authenticated user storage to specialised class
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/gctools-outilsgc/concierge/network/alerts).
dependabot[bot] commented 4 years ago

Looks like django-two-factor-auth is up-to-date now, so this is no longer needed.