Releases: Colin-b/httpx_auth
Releases · Colin-b/httpx_auth
0.14.1 (2022-02-05)
Fixed
- Type information is now provided following PEP 561
- Allow for users to run
mypy --strict
.
0.14.0 (2022-01-26)
0.13.0 (2021-11-16)
Changed
- Requires
httpx
==0.21.*
0.12.0 (2021-11-01)
Changed
- Requires
httpx
==0.20.* OAuth2ResourceOwnerPasswordCredentials.client
attribute is now set to None in case it was not provided as parameter.OAuth2ClientCredentials.client
attribute is now set to None in case it was not provided as parameter.OktaClientCredentials.client
attribute is now set to None in case it was not provided as parameter.OAuth2AuthorizationCode.client
attribute is now set to None in case it was not provided as parameter.OktaAuthorizationCode.client
attribute is now set to None in case it was not provided as parameter.OAuth2AuthorizationCodePKCE.client
attribute is now set to None in case it was not provided as parameter.OktaAuthorizationCodePKCE.client
attribute is now set to None in case it was not provided as parameter.httpx.Client
provided asclient
parameter toOAuth2ResourceOwnerPasswordCredentials
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.httpx.Client
provided asclient
parameter toOAuth2ClientCredentials
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.httpx.Client
provided asclient
parameter toOktaClientCredentials
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.httpx.Client
provided asclient
parameter toOAuth2AuthorizationCode
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.httpx.Client
provided asclient
parameter toOktaAuthorizationCode
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.httpx.Client
provided asclient
parameter toOAuth2AuthorizationCodePKCE
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.httpx.Client
provided asclient
parameter toOktaAuthorizationCodePKCE
is not closed anymore. You are now responsible for closing it when no more requests are expected to be issued.
Fixed
- A new client is created (if not provided as
client
parameter) upon request of a new token forOAuth2ResourceOwnerPasswordCredentials
flow. Re-using previously closed client was raising an issue upon token expiry. - A new client is created (if not provided as
client
parameter) upon request of a new token forOAuth2ClientCredentials
flow. Re-using previously closed client was raising an issue upon token expiry. - A new client is created (if not provided as
client
parameter) upon request of a new token forOktaClientCredentials
flow. Re-using previously closed client was raising an issue upon token expiry. - A new client is created (if not provided as
client
parameter) upon request of a new token forOAuth2AuthorizationCode
flow. Re-using previously closed client was raising an issue upon token expiry. - A new client is created (if not provided as
client
parameter) upon request of a new token forOktaAuthorizationCode
flow. Re-using previously closed client was raising an issue upon token expiry. - A new client is created (if not provided as
client
parameter) upon request of a new token forOAuth2AuthorizationCodePKCE
flow. Re-using previously closed client was raising an issue upon token expiry. - A new client is created (if not provided as
client
parameter) upon request of a new token forOktaAuthorizationCodePKCE
flow. Re-using previously closed client was raising an issue upon token expiry.
0.11.0 (2021-08-19)
0.10.0 (2021-04-27)
Changed
- Requires
httpx
==0.18.*
0.9.0 (2021-03-01)
Changed
- Requires
httpx
==0.17.*
0.8.0 (2020-11-15)
Removed
- Do not expose
httpx_auth.oauth2_tokens.decode_base64
function anymore as it supposed to be used internally only. - Do not expose
add_bearer_token
token cache method anymore as it supposed to be used internally only. - Do not expose
add_access_token
token cache method anymore as it supposed to be used internally only.
Changed
get_token
cache method now requireson_missing_token
function args to be provided as kwargs instead of args.get_token
cache method now requireson_missing_token
parameter to be provided as a non positional argument.get_token
cache method now exposeearly_expiry
parameter, defaulting to 30 seconds.
Fixed
- OAuth2 token will now be considered as expired 30 seconds before actual expiry. To ensure it is still valid when received by the actual server.
Added
httpx_auth.OAuth2ResourceOwnerPasswordCredentials
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OAuth2ClientCredentials
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OktaClientCredentials
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OAuth2AuthorizationCode
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OktaAuthorizationCode
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OAuth2AuthorizationCodePKCE
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OktaAuthorizationCodePKCE
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OAuth2Implicit
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.AzureActiveDirectoryImplicit
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.AzureActiveDirectoryImplicitIdToken
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OktaImplicit
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.httpx_auth.OktaImplicitIdToken
contains a newearly_expiry
parameter allowing to tweak the number of seconds before actual token expiry where the token will be considered as already expired. Default to 30s.
0.7.0 (2020-10-06)
Added
- Explicit support for Python 3.9
- Document
httpx_auth.AWS4Auth
authentication class.
Changed
- Requires
httpx
==0.16.* - Code now follow
black==20.8b1
formatting instead of the git master version.
0.6.0 (2020-09-22)
Changed
- Requires
httpx
==0.15.*