Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[deps] Update django-allauth requirement from ~=0.54.0 to ~=64.1.0 #403

Merged
merged 6 commits into from
Aug 23, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Aug 19, 2024

Updates the requirements on django-allauth to permit the latest version.

Changelog

Sourced from django-allauth's changelog.

64.1.0 (2024-08-15)


Note worthy changes

  • Headless: When trying to login while a user is already logged in, you now get a 409.

  • Limited the maximum allowed time for a login to go through the various login stages. This limits, for example, the time span that the 2FA stage remains available. See settings.ACCOUNT_LOGIN_TIMEOUT.

Security notice

  • Headless: When a user was not fully logged in, for example, because (s)he was in the process of completing the 2FA process, calling logout would not wipe the session containing the partially logged in user.

64.0.0 (2024-07-31)


Note worthy changes

  • The 0.x.y version numbers really did not do justice to the state of the project, and we are way past the point where a version 1.0 would be applicable. Additionally, 64 is a nice round number. Therefore, the version numbering is changed from 0.x.y to x.y.z. We will use a loose form of semantic versioning. However, please be aware that feature releases may occasionally include minor documented backwards incompatibilities. Always read the release notes before upgrading.

  • Added support for WebAuthn based security keys and passkey login. Note that this is currently disabled by default.

  • Headless: The TOTP URI is now available in the MFA activation response.

  • Headless: When trying to sign up while a user is already logged in, you now get a 409.

  • Headless: You can now alter the user data payload by overriding the newly introduced serialize_user() adapter method.

  • Headless: The token strategy now allows for exposing refresh tokens and any other information you may need (such as e.g. expires_in).

... (truncated)

Commits
  • d6e07b2 feat: Django 5.1
  • b7eaefd chore: Release 64.1.0
  • 4b13c66 feat(mfa): AuthenticateView to use form class from setting
  • bd3ae52 chore(i18n): Sync translations
  • 63bc165 feat(account): Login timeout
  • 4303cbe fix(headless): Logout should remove partial login
  • 20d1334 chore(mfa): add tags to submit button
  • c970b33 tests(socialaccount): Test storing tokens vs email authentication
  • 907ffe6 chore(i18n): korean translations
  • ef8743c fix(socialaccount): OAuth 1.0 vs storing tokens without app instance
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Blockers

@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Aug 19, 2024
Copy link
Member

@nemesifier nemesifier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pandafy can you add an OR run tests without the parallel flag to the test line? I am still not sure why some times errors are shown correctly even in parallel mode and some times not.

@pandafy pandafy force-pushed the dependabot/pip/django-allauth-approx-eq-64.1.0 branch from a759675 to a8f5e98 Compare August 20, 2024 18:28
dependabot bot and others added 2 commits August 21, 2024 00:44
Updates the requirements on [django-allauth](https://github.com/pennersr/django-allauth) to permit the latest version.
- [Changelog](https://github.com/pennersr/django-allauth/blob/main/ChangeLog.rst)
- [Commits](pennersr/django-allauth@0.54.0...64.1.0)

---
updated-dependencies:
- dependency-name: django-allauth
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
@pandafy pandafy force-pushed the dependabot/pip/django-allauth-approx-eq-64.1.0 branch from 7ab5aaf to c748586 Compare August 20, 2024 19:15
django-allauth>0.63.6 dropped support for Django 3.2
@pandafy pandafy force-pushed the dependabot/pip/django-allauth-approx-eq-64.1.0 branch from c748586 to 9cfdf85 Compare August 20, 2024 19:20
@coveralls
Copy link

coveralls commented Aug 20, 2024

Coverage Status

coverage: 97.787% (+0.003%) from 97.784%
when pulling b103de7 on dependabot/pip/django-allauth-approx-eq-64.1.0
into d4d90b6 on master.

data = {'email': '[email protected]', 'primary': True}
with self.assertNumQueries(7):
data = {'email': '[email protected]'}
expected_queries = 7 if django.VERSION < (4, 0) else 9
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The extra queries are added because of validation of constraints.

@@ -1,6 +1,6 @@
django-organizations~=2.4.1
django-extensions~=3.2.3
django-allauth~=0.54.0
django-allauth~=0.63.6
Copy link
Member

@pandafy pandafy Aug 20, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

>=64 drops support for Django 3.2

@@ -67,6 +67,7 @@
'django.middleware.common.CommonMiddleware',
'django.middleware.csrf.CsrfViewMiddleware',
'django.contrib.auth.middleware.AuthenticationMiddleware',
'allauth.account.middleware.AccountMiddleware',
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We will need to port this change to ansible-openwisp2 after merging this PR.

@pandafy
Copy link
Member

pandafy commented Aug 21, 2024

@nemesifier there are two UI changes in the new version of django-allauth:

The new version adds help text to the new password field in password change/reset form. The help text shows requirements from the password validators.
Screenshot from 2024-08-21 17-16-25

It also adds password reset URL in help text for password field in the login form.
Screenshot from 2024-08-21 16-57-14
Shall we hide this URL? Or, shall we remove the button?

Copy link
Member

@nemesifier nemesifier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@nemesifier there are two UI changes in the new version of django-allauth:

The new version adds help text to the new password field in password change/reset form. The help text shows requirements from the password validators. Screenshot from 2024-08-21 17-16-25

I would adjust text size and spacing here: the text size could be consistent with the rest of the page and there shouldn't be as much space below.

It also adds password reset URL in help text for password field in the login form. Screenshot from 2024-08-21 16-57-14 Shall we hide this URL? Or, shall we remove the button?

I think we can hide it since it's redundant with the button below.

nemesifier
nemesifier previously approved these changes Aug 21, 2024
Copy link
Member

@nemesifier nemesifier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Please remember to send a PR to pin openwisp-utils.

@pandafy
Copy link
Member

pandafy commented Aug 21, 2024

I have made it consistent with the password change page of the Django admin.

Left window: Password change page of allauth.accounts in local environment
Right window: Password change page of Django admin in demo.openwisp.io
Screenshot from 2024-08-21 23-36-31
Screenshot from 2024-08-21 23-36-11

@pandafy
Copy link
Member

pandafy commented Aug 21, 2024

The "Forgot password" URL is hidden in the login form now

Screenshot from 2024-08-21 23-40-01

@nemesifier nemesifier merged commit 17a6f00 into master Aug 23, 2024
15 checks passed
@nemesifier nemesifier deleted the dependabot/pip/django-allauth-approx-eq-64.1.0 branch August 23, 2024 14:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file python Pull requests that update Python code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants