News

django-allauth 0.37.1 released

Posted by Raymond Penners on 2018-08-27

Backwards incompatible changes Dropped the x-li-src: msdk headers from the linkedin_oauth2 handshake. This header is only required for mobile tokens, and breaks the regular flow. Use the HEADERS setting to add this header if you need it.


django-allauth 0.37.0 released

Posted by Raymond Penners on 2018-08-27

Note worthy changes The Battle.net login backend now recognizes apac as a valid region. User model using a UUIDField as it's primary key can now be logged in upon email confirmation (if using ACCOUNT_LOGIN_ON_EMAIL_CONFIRMATION). New providers: Agave, Cern, Disqus, Globus.

Read more

django-allauth 0.36.0 released

Posted by Raymond Penners on 2018-05-08

Note worthy changes New providers: Telegram, QuickBooks. The Facebook API version now defaults to v2.12. ORCID upgraded to use API v2.1. Security notice In previous versions, the authentication backend did not invoke the user_can_authenticate() method, potentially allowing users with is_active=False to authenticate when the allauth authentication backend was used in a non allauth context.

Read more

django-allauth 0.35.0 released

Posted by Raymond Penners on 2018-02-02

Note worthy changes Add support for Django 2.0 Security notice As an extra security measure on top of what the standard Django password reset token generator is already facilitating, allauth now adds the user email address to the hash such that whenever the user's email address changes the token is invalidated.

Read more

django-allauth 0.34.0 released

Posted by Raymond Penners on 2017-10-29

Security notice The "Set Password" view did not properly check whether or not the user already had a usable password set. This allowed an attacker to set the password without providing the current password, but only in case the attacker already gained control over the victim's session.

Read more

Page 15 of 24

Archives