fastapi-sso 0.19.0__tar.gz → 0.20.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (29) hide show
  1. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/PKG-INFO +10 -9
  2. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/README.md +9 -8
  3. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/__init__.py +2 -0
  4. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/kakao.py +4 -0
  5. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/naver.py +4 -0
  6. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/seznam.py +4 -0
  7. fastapi_sso-0.20.0/fastapi_sso/sso/soundcloud.py +38 -0
  8. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/pyproject.toml +1 -1
  9. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/LICENSE.md +0 -0
  10. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/pkce.py +0 -0
  11. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/py.typed +0 -0
  12. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/__init__.py +0 -0
  13. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/base.py +0 -0
  14. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/bitbucket.py +0 -0
  15. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/discord.py +0 -0
  16. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/facebook.py +0 -0
  17. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/fitbit.py +0 -0
  18. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/generic.py +0 -0
  19. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/github.py +0 -0
  20. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/gitlab.py +0 -0
  21. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/google.py +0 -0
  22. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/line.py +0 -0
  23. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/linkedin.py +0 -0
  24. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/microsoft.py +0 -0
  25. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/notion.py +0 -0
  26. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/spotify.py +0 -0
  27. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/twitter.py +0 -0
  28. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/sso/yandex.py +0 -0
  29. {fastapi_sso-0.19.0 → fastapi_sso-0.20.0}/fastapi_sso/state.py +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: fastapi-sso
3
- Version: 0.19.0
3
+ Version: 0.20.0
4
4
  Summary: FastAPI plugin to enable SSO to most common providers (such as Facebook login, Google login and login via Microsoft Office 365 Account)
5
5
  License: MIT
6
6
  License-File: LICENSE.md
@@ -67,14 +67,6 @@ Quick links for the eager ones:
67
67
 
68
68
  ## Security Notice
69
69
 
70
- ### Version `0.16.0` Update: Race Condition Bug Fix & Context Manager Change
71
-
72
- A race condition bug in the login flow that could, in rare cases, allow one user
73
- to assume the identity of another due to concurrent login requests was recently discovered
74
- by [@parikls](https://github.com/parikls).
75
- This issue was reported in [#186](https://github.com/tomasvotava/fastapi-sso/issues/186) and has been resolved
76
- in version `0.16.0`.
77
-
78
70
  ### Version `0.19.0` Update: OAuth `state` Validation Fix
79
71
 
80
72
  A critical OAuth login CSRF vulnerability caused by missing `state` validation was
@@ -85,6 +77,14 @@ in version `0.19.0`.
85
77
  Starting with `fastapi-sso==1.0.0`, OAuth `state` will be backed by a pluggable server-side store
86
78
  (in-memory by default, with support for external stores such as `Redis`).
87
79
 
80
+ ### Version `0.16.0` Update: Race Condition Bug Fix & Context Manager Change
81
+
82
+ A race condition bug in the login flow that could, in rare cases, allow one user
83
+ to assume the identity of another due to concurrent login requests was recently discovered
84
+ by [@parikls](https://github.com/parikls).
85
+ This issue was reported in [#186](https://github.com/tomasvotava/fastapi-sso/issues/186) and has been resolved
86
+ in version `0.16.0`.
87
+
88
88
  **Details of the Fix:**
89
89
 
90
90
  The bug was mitigated by introducing an async lock mechanism that ensures only one user can attempt the login
@@ -157,6 +157,7 @@ I tend to process Pull Requests faster when properly caffeinated 😉.
157
157
  - Seznam (by Tomas Koutek) - [TomasKoutek](https://github.com/TomasKoutek)
158
158
  - Discord (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
159
159
  - Bitbucket (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
160
+ - Soundcloud (by John) - [john-9474](https://github.com/john-9474)
160
161
 
161
162
  See [Contributing](#contributing) for a guide on how to contribute your own login provider.
162
163
 
@@ -38,14 +38,6 @@ Quick links for the eager ones:
38
38
 
39
39
  ## Security Notice
40
40
 
41
- ### Version `0.16.0` Update: Race Condition Bug Fix & Context Manager Change
42
-
43
- A race condition bug in the login flow that could, in rare cases, allow one user
44
- to assume the identity of another due to concurrent login requests was recently discovered
45
- by [@parikls](https://github.com/parikls).
46
- This issue was reported in [#186](https://github.com/tomasvotava/fastapi-sso/issues/186) and has been resolved
47
- in version `0.16.0`.
48
-
49
41
  ### Version `0.19.0` Update: OAuth `state` Validation Fix
50
42
 
51
43
  A critical OAuth login CSRF vulnerability caused by missing `state` validation was
@@ -56,6 +48,14 @@ in version `0.19.0`.
56
48
  Starting with `fastapi-sso==1.0.0`, OAuth `state` will be backed by a pluggable server-side store
57
49
  (in-memory by default, with support for external stores such as `Redis`).
58
50
 
51
+ ### Version `0.16.0` Update: Race Condition Bug Fix & Context Manager Change
52
+
53
+ A race condition bug in the login flow that could, in rare cases, allow one user
54
+ to assume the identity of another due to concurrent login requests was recently discovered
55
+ by [@parikls](https://github.com/parikls).
56
+ This issue was reported in [#186](https://github.com/tomasvotava/fastapi-sso/issues/186) and has been resolved
57
+ in version `0.16.0`.
58
+
59
59
  **Details of the Fix:**
60
60
 
61
61
  The bug was mitigated by introducing an async lock mechanism that ensures only one user can attempt the login
@@ -128,6 +128,7 @@ I tend to process Pull Requests faster when properly caffeinated 😉.
128
128
  - Seznam (by Tomas Koutek) - [TomasKoutek](https://github.com/TomasKoutek)
129
129
  - Discord (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
130
130
  - Bitbucket (by Kaelian Baudelet) - [afi-dev](https://github.com/afi-dev)
131
+ - Soundcloud (by John) - [john-9474](https://github.com/john-9474)
131
132
 
132
133
  See [Contributing](#contributing) for a guide on how to contribute your own login provider.
133
134
 
@@ -18,6 +18,7 @@ from .sso.linkedin import LinkedInSSO
18
18
  from .sso.microsoft import MicrosoftSSO
19
19
  from .sso.naver import NaverSSO
20
20
  from .sso.notion import NotionSSO
21
+ from .sso.soundcloud import SoundcloudSSO
21
22
  from .sso.spotify import SpotifySSO
22
23
  from .sso.twitter import TwitterSSO
23
24
 
@@ -38,6 +39,7 @@ __all__ = [
38
39
  "OpenID",
39
40
  "SSOBase",
40
41
  "SSOLoginError",
42
+ "SoundcloudSSO",
41
43
  "SpotifySSO",
42
44
  "TwitterSSO",
43
45
  "create_provider",
@@ -15,6 +15,10 @@ class KakaoSSO(SSOBase):
15
15
  scop: ClassVar = ["openid"]
16
16
  version = "v2"
17
17
 
18
+ @property
19
+ def _extra_query_params(self) -> dict:
20
+ return {"client_secret": self.client_secret}
21
+
18
22
  async def get_discovery_document(self) -> DiscoveryDocument:
19
23
  return {
20
24
  "authorization_endpoint": "https://kauth.kakao.com/oauth/authorize",
@@ -15,6 +15,10 @@ class NaverSSO(SSOBase):
15
15
  scope: ClassVar[list[str]] = []
16
16
  additional_headers: ClassVar = {"accept": "application/json"}
17
17
 
18
+ @property
19
+ def _extra_query_params(self) -> dict:
20
+ return {"client_secret": self.client_secret}
21
+
18
22
  async def get_discovery_document(self) -> DiscoveryDocument:
19
23
  return {
20
24
  "authorization_endpoint": "https://nid.naver.com/oauth2.0/authorize",
@@ -18,6 +18,10 @@ class SeznamSSO(SSOBase):
18
18
  base_url = "https://login.szn.cz/api/v1"
19
19
  scope: ClassVar = ["identity", "avatar"] # + ["contact-phone", "adulthood", "birthday", "gender"]
20
20
 
21
+ @property
22
+ def _extra_query_params(self) -> dict:
23
+ return {"client_secret": self.client_secret}
24
+
21
25
  async def get_discovery_document(self) -> DiscoveryDocument:
22
26
  """Get document containing handy urls."""
23
27
  return {
@@ -0,0 +1,38 @@
1
+ """Soundcloud SSO Login Helper."""
2
+
3
+ from typing import TYPE_CHECKING, ClassVar, Optional
4
+
5
+ from fastapi_sso.sso.base import DiscoveryDocument, OpenID, SSOBase
6
+
7
+ if TYPE_CHECKING:
8
+ import httpx # pragma: no cover
9
+
10
+
11
+ class SoundcloudSSO(SSOBase):
12
+ """Class providing login via Soundcloud OAuth."""
13
+
14
+ provider = "soundcloud"
15
+ scope: ClassVar = ["openid"]
16
+
17
+ @property
18
+ def _extra_query_params(self) -> dict:
19
+ return {"client_secret": self.client_secret}
20
+
21
+ async def get_discovery_document(self) -> DiscoveryDocument:
22
+ """Get document containing handy urls."""
23
+ return {
24
+ "authorization_endpoint": "https://secure.soundcloud.com/authorize",
25
+ "token_endpoint": "https://secure.soundcloud.com/oauth/token",
26
+ "userinfo_endpoint": "https://api.soundcloud.com/me",
27
+ }
28
+
29
+ async def openid_from_response(self, response: dict, session: Optional["httpx.AsyncClient"] = None) -> OpenID:
30
+ """Return OpenID from user information provided by Soundcloud."""
31
+ return OpenID(
32
+ id=str(response.get("id")),
33
+ first_name=response.get("first_name"),
34
+ last_name=response.get("last_name"),
35
+ display_name=response.get("username"),
36
+ picture=response.get("avatar_url"),
37
+ provider=self.provider,
38
+ )
@@ -1,6 +1,6 @@
1
1
  [tool.poetry]
2
2
  name = "fastapi-sso"
3
- version = "0.19.0"
3
+ version = "0.20.0"
4
4
  description = "FastAPI plugin to enable SSO to most common providers (such as Facebook login, Google login and login via Microsoft Office 365 Account)"
5
5
  authors = ["Tomas Votava <info@tomasvotava.eu>"]
6
6
  readme = "README.md"
File without changes