0.34.0 (2017-10-29)#
Security notice#
The “Set Password” view did not properly check whether or not the user already had a usable password set. This allowed an attacker to set the password without providing the current password, but only in case the attacker already gained control over the victim’s session.
Note worthy changes#
New provider: Meetup.
0.33.0 (2017-08-20)#
Note worthy changes#
Security: password reset tokens are now prevented from being leaked through the password reset URL.
New providers: Patreon, Authentiq, Dataporten.
Dropbox has been upgraded to API V2.
New translation: Norwegian.
Backwards incompatible changes#
Dropped support for Django 1.9.
0.32.0 (2017-04-27)#
Note worthy changes#
Improved AJAX support: the account management views (change/set password, manage email addresses and social connections) now support AJAX GET requests. These views hand over all the required data for you to build your frontend application upon.
New providers: Dwolla, Trello.
Shopify: support for per-user access mode.
Backwards incompatible changes#
In previous versions, the views only responded with JSON responses when issuing AJAX requests of type POST. Now, the views also respond in JSON when making AJAX GET requests.
The structure of the response for AJAX requests has changed. Previously, it contained a
form_errors
key containing all form validation errors, if any. Now, it contains aform
key that describes the complete form, including the fields. Field specific errors are placed inform.fields['some_field'].errors
, non-field errors inform.errors
.The parameters passed to the Facebook JS SDK
FB.init()
method used to containcookie
,status
, andxfbml
, all set totrue
. These parameters are no longer explicitly passed. You can use the newly introducedINIT_PARAMS
provider setting to provide your own values.
0.31.0 (2017-02-28)#
Note worthy changes#
Added a new
user_logged_out
signal.OpenId: Added support for requesting additional data.
New providers: Auth0, Box, Line, Naver, Kakao, Daum, MailChimp, Eventbrite.
Backwards incompatible changes#
Django 1.7 / Python 3.2 compatibility has been dropped.
Due to providers being registered in the same file as their definition it was impossible to subclass a provider without having the parent be registered. This has been addressed. If you have implemented a custom provider, you will need to change
providers.registry.register(CustomProvider)
intoprovider_classes = [CustomProvider]
.
0.30.0 (2017-01-01)#
Note worthy changes#
Changed the algorithm that generates unique usernames. Previously, in case the provider did not hand over any information to base the username on, the username “user” extended with an ever increasing numeric suffix would be attempted until a free username was found. In case of a large number of existing users, this could result in many queries being executed before a free username would be found, potentially resulting in a denial of service. The new algorithm uses a random suffix and only one query to determine the final username.
Added a new setting:
ACCOUNT_PRESERVE_USERNAME_CASING
. This setting determines whether the username is stored in lowercase (False
) or whether its casing is to be preserved (True
). Note that when casing is preserved, potentially expensive__iexact
lookups are performed when filter on username. For now, the default is set toTrue
to maintain backwards compatibility.The OAuth2Adapter class has gained a
get_callback_url
method for when customizing the callback URL is desired.The Battle.net login backend now accepts the
region
GET parameter.New providers: 500px, Discord.
Backwards incompatible changes#
In previous versions, the
DefaultAccountAdapter
contained ausername_regex
property and accompanyingerror_messages['invalid_username']
validation error message. These have been removed in favor of using the regex validation already defined at the user model level. Alternatively, you can use the newly introducedACCOUNT_USERNAME_VALIDATORS
setting.The Battle.net backend no longer overrides username regex validation. In order to use battletags as usernames, you are expected to override either the
username
field on your User model, or to pass a custom validator which will accept the#
character using the newACCOUNT_USERNAME_VALIDATORS
setting. Such a validator is available insocialaccount.providers.battlenet.validators.BattletagUsernameValidator
.