fastapi-sso 0.18.0__tar.gz → 0.20.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/PKG-INFO +15 -2
  2. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/README.md +11 -0
  3. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/__init__.py +2 -0
  4. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/base.py +10 -0
  5. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/kakao.py +4 -0
  6. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/naver.py +4 -0
  7. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/seznam.py +4 -0
  8. fastapi_sso-0.20.0/fastapi_sso/sso/soundcloud.py +38 -0
  9. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/pyproject.toml +8 -8
  10. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/LICENSE.md +0 -0
  11. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/pkce.py +0 -0
  12. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/py.typed +0 -0
  13. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/__init__.py +0 -0
  14. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/bitbucket.py +0 -0
  15. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/discord.py +0 -0
  16. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/facebook.py +0 -0
  17. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/fitbit.py +0 -0
  18. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/generic.py +0 -0
  19. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/github.py +0 -0
  20. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/gitlab.py +0 -0
  21. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/google.py +0 -0
  22. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/line.py +0 -0
  23. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/linkedin.py +0 -0
  24. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/microsoft.py +0 -0
  25. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/notion.py +0 -0
  26. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/spotify.py +0 -0
  27. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/twitter.py +0 -0
  28. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/yandex.py +0 -0
  29. {fastapi_sso-0.18.0 → fastapi_sso-0.20.0}/fastapi_sso/state.py +0 -0
@@ -1,8 +1,9 @@
1
- Metadata-Version: 2.3
1
+ Metadata-Version: 2.4
2
2
  Name: fastapi-sso
3
- Version: 0.18.0
3
+ Version: 0.20.0
4
4
  Summary: FastAPI plugin to enable SSO to most common providers (such as Facebook login, Google login and login via Microsoft Office 365 Account)
5
5
  License: MIT
6
+ License-File: LICENSE.md
6
7
  Keywords: fastapi,sso,oauth,google,facebook,spotify,linkedin
7
8
  Author: Tomas Votava
8
9
  Author-email: info@tomasvotava.eu
@@ -14,6 +15,7 @@ Classifier: Programming Language :: Python :: 3.10
14
15
  Classifier: Programming Language :: Python :: 3.11
15
16
  Classifier: Programming Language :: Python :: 3.12
16
17
  Classifier: Programming Language :: Python :: 3.13
18
+ Classifier: Programming Language :: Python :: 3.14
17
19
  Requires-Dist: fastapi (>=0.80)
18
20
  Requires-Dist: httpx (>=0.23.0)
19
21
  Requires-Dist: oauthlib (>=3.1.0)
@@ -65,6 +67,16 @@ Quick links for the eager ones:
65
67
 
66
68
  ## Security Notice
67
69
 
70
+ ### Version `0.19.0` Update: OAuth `state` Validation Fix
71
+
72
+ A critical OAuth login CSRF vulnerability caused by missing `state` validation was
73
+ reported by [@davidbors-snyk](https://github.com/davidbors-snyk) (Snyk Security Labs)
74
+ in [#266](https://github.com/tomasvotava/fastapi-sso/issues/266) and has been resolved
75
+ in version `0.19.0`.
76
+
77
+ Starting with `fastapi-sso==1.0.0`, OAuth `state` will be backed by a pluggable server-side store
78
+ (in-memory by default, with support for external stores such as `Redis`).
79
+
68
80
  ### Version `0.16.0` Update: Race Condition Bug Fix & Context Manager Change
69
81
 
70
82
  A race condition bug in the login flow that could, in rare cases, allow one user
@@ -145,6 +157,7 @@ I tend to process Pull Requests faster when properly caffeinated 😉.
145
157
  - Seznam (by Tomas Koutek) - [TomasKoutek](https://github.com/TomasKoutek)
146
158
  - Discord (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
147
159
  - Bitbucket (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
160
+ - Soundcloud (by John) - [john-9474](https://github.com/john-9474)
148
161
 
149
162
  See [Contributing](#contributing) for a guide on how to contribute your own login provider.
150
163
 
@@ -38,6 +38,16 @@ Quick links for the eager ones:
38
38
 
39
39
  ## Security Notice
40
40
 
41
+ ### Version `0.19.0` Update: OAuth `state` Validation Fix
42
+
43
+ A critical OAuth login CSRF vulnerability caused by missing `state` validation was
44
+ reported by [@davidbors-snyk](https://github.com/davidbors-snyk) (Snyk Security Labs)
45
+ in [#266](https://github.com/tomasvotava/fastapi-sso/issues/266) and has been resolved
46
+ in version `0.19.0`.
47
+
48
+ Starting with `fastapi-sso==1.0.0`, OAuth `state` will be backed by a pluggable server-side store
49
+ (in-memory by default, with support for external stores such as `Redis`).
50
+
41
51
  ### Version `0.16.0` Update: Race Condition Bug Fix & Context Manager Change
42
52
 
43
53
  A race condition bug in the login flow that could, in rare cases, allow one user
@@ -118,6 +128,7 @@ I tend to process Pull Requests faster when properly caffeinated 😉.
118
128
  - Seznam (by Tomas Koutek) - [TomasKoutek](https://github.com/TomasKoutek)
119
129
  - Discord (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
120
130
  - Bitbucket (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
131
+ - Soundcloud (by John) - [john-9474](https://github.com/john-9474)
121
132
 
122
133
  See [Contributing](#contributing) for a guide on how to contribute your own login provider.
123
134
 
@@ -18,6 +18,7 @@ from .sso.linkedin import LinkedInSSO
18
18
  from .sso.microsoft import MicrosoftSSO
19
19
  from .sso.naver import NaverSSO
20
20
  from .sso.notion import NotionSSO
21
+ from .sso.soundcloud import SoundcloudSSO
21
22
  from .sso.spotify import SpotifySSO
22
23
  from .sso.twitter import TwitterSSO
23
24
 
@@ -38,6 +39,7 @@ __all__ = [
38
39
  "OpenID",
39
40
  "SSOBase",
40
41
  "SSOLoginError",
42
+ "SoundcloudSSO",
41
43
  "SpotifySSO",
42
44
  "TwitterSSO",
43
45
  "create_provider",
@@ -341,6 +341,8 @@ class SSOBase:
341
341
  response = RedirectResponse(login_uri, 303)
342
342
  if self.uses_pkce:
343
343
  response.set_cookie("pkce_code_verifier", str(self._pkce_code_verifier))
344
+ if state is not None:
345
+ response.set_cookie("sso_state", state)
344
346
  return response
345
347
 
346
348
  @overload
@@ -402,6 +404,14 @@ class SSOBase:
402
404
  )
403
405
  raise SSOLoginError(400, "'code' parameter was not found in callback request")
404
406
  self._state = request.query_params.get("state")
407
+ if self._state is None and self.requires_state:
408
+ raise SSOLoginError(400, "'state' parameter was not found in callback request")
409
+ if self._state is not None:
410
+ sso_state = request.cookies.get("sso_state")
411
+ if sso_state is None and self.requires_state:
412
+ raise SSOLoginError(401, "State cookie not found")
413
+ if sso_state is not None and sso_state != self._state:
414
+ raise SSOLoginError(401, "Invalid state")
405
415
  pkce_code_verifier: Optional[str] = None
406
416
  if self.uses_pkce:
407
417
  pkce_code_verifier = request.cookies.get("pkce_code_verifier")
@@ -15,6 +15,10 @@ class KakaoSSO(SSOBase):
15
15
  scop: ClassVar = ["openid"]
16
16
  version = "v2"
17
17
 
18
+ @property
19
+ def _extra_query_params(self) -> dict:
20
+ return {"client_secret": self.client_secret}
21
+
18
22
  async def get_discovery_document(self) -> DiscoveryDocument:
19
23
  return {
20
24
  "authorization_endpoint": "https://kauth.kakao.com/oauth/authorize",
@@ -15,6 +15,10 @@ class NaverSSO(SSOBase):
15
15
  scope: ClassVar[list[str]] = []
16
16
  additional_headers: ClassVar = {"accept": "application/json"}
17
17
 
18
+ @property
19
+ def _extra_query_params(self) -> dict:
20
+ return {"client_secret": self.client_secret}
21
+
18
22
  async def get_discovery_document(self) -> DiscoveryDocument:
19
23
  return {
20
24
  "authorization_endpoint": "https://nid.naver.com/oauth2.0/authorize",
@@ -18,6 +18,10 @@ class SeznamSSO(SSOBase):
18
18
  base_url = "https://login.szn.cz/api/v1"
19
19
  scope: ClassVar = ["identity", "avatar"] # + ["contact-phone", "adulthood", "birthday", "gender"]
20
20
 
21
+ @property
22
+ def _extra_query_params(self) -> dict:
23
+ return {"client_secret": self.client_secret}
24
+
21
25
  async def get_discovery_document(self) -> DiscoveryDocument:
22
26
  """Get document containing handy urls."""
23
27
  return {
@@ -0,0 +1,38 @@
1
+ """Soundcloud SSO Login Helper."""
2
+
3
+ from typing import TYPE_CHECKING, ClassVar, Optional
4
+
5
+ from fastapi_sso.sso.base import DiscoveryDocument, OpenID, SSOBase
6
+
7
+ if TYPE_CHECKING:
8
+ import httpx # pragma: no cover
9
+
10
+
11
+ class SoundcloudSSO(SSOBase):
12
+ """Class providing login via Soundcloud OAuth."""
13
+
14
+ provider = "soundcloud"
15
+ scope: ClassVar = ["openid"]
16
+
17
+ @property
18
+ def _extra_query_params(self) -> dict:
19
+ return {"client_secret": self.client_secret}
20
+
21
+ async def get_discovery_document(self) -> DiscoveryDocument:
22
+ """Get document containing handy urls."""
23
+ return {
24
+ "authorization_endpoint": "https://secure.soundcloud.com/authorize",
25
+ "token_endpoint": "https://secure.soundcloud.com/oauth/token",
26
+ "userinfo_endpoint": "https://api.soundcloud.com/me",
27
+ }
28
+
29
+ async def openid_from_response(self, response: dict, session: Optional["httpx.AsyncClient"] = None) -> OpenID:
30
+ """Return OpenID from user information provided by Soundcloud."""
31
+ return OpenID(
32
+ id=str(response.get("id")),
33
+ first_name=response.get("first_name"),
34
+ last_name=response.get("last_name"),
35
+ display_name=response.get("username"),
36
+ picture=response.get("avatar_url"),
37
+ provider=self.provider,
38
+ )
@@ -1,6 +1,6 @@
1
1
  [tool.poetry]
2
2
  name = "fastapi-sso"
3
- version = "0.18.0"
3
+ version = "0.20.0"
4
4
  description = "FastAPI plugin to enable SSO to most common providers (such as Facebook login, Google login and login via Microsoft Office 365 Account)"
5
5
  authors = ["Tomas Votava <info@tomasvotava.eu>"]
6
6
  readme = "README.md"
@@ -92,18 +92,18 @@ docs = "mkdocs build --clean"
92
92
 
93
93
  [tool.poetry.group.dev.dependencies]
94
94
  black = ">=23.7.0"
95
- isort = "^5"
95
+ isort = ">=5,<7"
96
96
  markdown-include = "^0.8.1"
97
97
  mkdocs-material = { extras = ["imaging"], version = "^9.3.2" }
98
- mkdocstrings = { extras = ["python"], version = ">=0.23,<0.27" }
98
+ mkdocstrings = { extras = ["python"], version = ">=0.23,<0.31" }
99
99
  mypy = "^1"
100
- poethepoet = ">=0.21.1,<0.31.0"
101
- pre-commit = "^3"
100
+ poethepoet = ">=0.21.1,<0.38.0"
101
+ pre-commit = ">=3,<5"
102
102
  pytest = ">=7,<9"
103
- pytest-asyncio = "^0.24"
104
- pytest-cov = ">=4,<6"
103
+ pytest-asyncio = ">=0.24,<1.3"
104
+ pytest-cov = ">=4,<8"
105
105
  uvicorn = ">=0.23.1"
106
- ruff = ">=0.4.2,<0.12.0"
106
+ ruff = ">=0.4.2,<0.15.0"
107
107
 
108
108
  [tool.poetry.dependencies]
109
109
  fastapi = ">=0.80"
File without changes