mozilla / fx-private-relay

Keep your email safe from hackers and trackers. Make an email alias with 1 click, and keep your address to yourself.
https://relay.firefox.com
Other
1.44k stars 166 forks source link

Bump django-allauth[socialaccount] from 0.63.2 to 0.63.3 #4759

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 1 month ago

Bumps django-allauth[socialaccount] from 0.63.2 to 0.63.3.

Changelog

Sourced from django-allauth[socialaccount]'s changelog.

0.63.3 (2024-05-31)


Note worthy changes

  • In HEADLESS_ONLY mode, the /accounts/<provider>/login/ URLs were still available, fixed.

  • The few remaining OAuth 1.0 providers were not compatible with headless mode, fixed.

  • Depending on where you placed the secure_admin_login(admin.site.login) protection you could run into circular import errors, fixed.

Backwards incompatible changes

  • SAML: IdP initiated SSO is disabled by default, see security notice below.

Security notice

  • SAML: RelayState was used to keep track of whether or not the login flow was IdP or SP initiated. As RelayState is a separate field, not part of the SAMLResponse payload, it is not signed and thereby making the SAML login flow vulnerable to CSRF/replay attacks. Now, InResponseTo is used instead, addressing the issue for SP initiated SSO flows. IdP initiated SSO remains inherently insecure, by design. For that reason, it is now disabled by default. If you need to support IdP initiated SSO, you will need to opt-in to that by adding "reject_idp_initiated_sso": False to your advanced SAML provider settings.
Commits
  • f6577fa chore: Release 0.63.3
  • 1f631a1 fix(saml): Secure SP initiated SSO, disable IdP initiated SSO
  • 165abe0 docs: Don't rely on test settings
  • 73efc84 docs: Added examples section
  • c5d4d54 refactor(account/forms): Move email2 lower to clean()
  • 11a5964 fix(account): Ignore casing differences in email2
  • 44d957b chore(manage): Pick up D_S_M from env, if set
  • 50bb3bd chore(tox): compile messages to use account_only
  • d6c7842 docs: Use account_only
  • ff2f362 fix(socialaccount): Don't swallow indirect import errors
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dependabot[bot] commented 1 month ago

Dependabot attempted to update this pull request, but because the branch dependabot/pip/django-allauth-socialaccount--0.63.3 is protected it was unable to do so.