openwisp / openwisp-users

Implementation of user management and multi-tenancy for OpenWISP
https://openwisp.io/docs/dev/users/
BSD 3-Clause "New" or "Revised" License
163 stars 74 forks source link

[deps] Update django-allauth[socialaccount] requirement from ~=0.63.6 to ~=64.2.0 #406

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 2 months ago

Updates the requirements on django-allauth[socialaccount] to permit the latest version.

Changelog

Sourced from django-allauth[socialaccount]'s changelog.

64.2.0 (2024-08-30)


Note worthy changes

  • Verifying email addresses by means of a code (instead of a link) is now supported. See settings.ACCOUNT_EMAIL_VERIFICATION_BY_CODE_ENABLED.

  • Added support for requiring logging in by code, so that every user logging in is required to input a login confirmation code sent by email. See settings.ACCOUNT_LOGIN_BY_CODE_REQUIRED.

Security notice

  • In case an ID token is used for authentication, the JTI is now respected to prevent the possibility of replays instead of solely relying on the expiration time.

64.1.0 (2024-08-15)


Note worthy changes

  • Headless: When trying to login while a user is already logged in, you now get a 409.

  • Limited the maximum allowed time for a login to go through the various login stages. This limits, for example, the time span that the 2FA stage remains available. See settings.ACCOUNT_LOGIN_TIMEOUT.

Security notice

  • Headless: When a user was not fully logged in, for example, because (s)he was in the process of completing the 2FA process, calling logout would not wipe the session containing the partially logged in user.

64.0.0 (2024-07-31)


Note worthy changes

... (truncated)

Commits
  • 87edc03 chore: Release 64.2.0
  • 1d7f9e9 chore(i18n): Sync .po
  • 58ba217 chore(i18n): Sync weblate
  • 58db2be fix(socialaccount): Pass email to populate_user()
  • 7e99f3e chore(i18n/cs): Fix misplaced characters in cs localization
  • 20ab03c docs: update CERN provider
  • dd1412e chore(i18n/ko): fix typo and translation
  • 0304b1b fix(socialaccount): JWT: Prevent replay using JTI
  • d30b641 tests(headless): Verify email of other user while signed in
  • 560cb24 refactor(account): Email verification login & stage
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
coveralls commented 2 months ago

Coverage Status

coverage: 97.787%. remained the same when pulling de7933ef512a3049a879cb7023be5bcf2c82b002 on dependabot/pip/django-allauth-socialaccount--approx-eq-64.2.0 into 2384fd29df3b873a69674369fa64519cd763242b on master.

dependabot[bot] commented 1 month ago

Superseded by #412.