Changelog#
For detailed changes from the prior release, click on the version number, and
its link will bring up a GitHub listing of changes. Use git log on the
command line for details.
Unreleased#
17.4#
17.4.0 2026-03-26#
Important
This release includes a security patch for Auth0OAuthenticator, fixing CVE-2026-33175
The advisory will be published 7 days after release (2026-04-02).
17.4.0 is a small release, but it bumps the required Python to 3.10. To use Python 3.9 or 3.8, use oauthenticator 17.3.
API and Breaking Changes#
migrate to pyproject.toml, hatchling, require python 3.10 #810 (@minrk, @consideRatio, @manics)
CILogon: Rename allowed_idps to idps (deprecation, not removal) #685 (@consideRatio, @GeorgianaElena, @minrk)
Bugs fixed#
AzureAD: Updated to use variable graph_url for different national clouds #805 (@yauchinlam, @GeorgianaElena)
auth_state_groups_key: errors may be in value as well as key name #798 (@manics, @minrk)
Documentation improvements#
Google Group doc updates #806 (@jrdnbradford, @consideRatio)
Remove confusing piece about post_auth_hook #792 (@yuvipanda, @consideRatio)
Fix contributor link #785 (@jrdnbradford, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@belfhi (activity) | @cobotrifork (activity) | @consideRatio (activity) | @GeorgianaElena (activity) | @jabbera (activity) | @Jaynornj (activity) | @jrdnbradford (activity) | @manics (activity) | @minrk (activity) | @weisdd (activity) | @yauchinlam (activity) | @yuvipanda (activity)
17.3#
17.3.0 - 2024-12-11#
17.3.0 is a tiny release, adding a refresh_user_hook for easier customization such as partial opt-out of the refresh_user behavior introduced in 17.2.
New features added#
add refresh_user_hook #780 (@minrk, @GeorgianaElena)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
17.2#
17.2.0 - 2024-12-03#
17.2.0 introduces support for refreshing user authentication info, including refresh tokens. See more about how refreshing auth works, including how to disable it, in the docs.
New features added#
Implement
OAuthenticator.refresh_user#579 (@Wykiki, @minrk, @GeorgianaElena, @johnpmayer, @manics, @yuvipanda, @epstein6, @YStrauchP4)
Maintenance and upkeep improvements#
Documentation improvements#
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@epstein6 (activity) | @GeorgianaElena (activity) | @johnpmayer (activity) | @jrdnbradford (activity) | @kkaraivanov1 (activity) | @manics (activity) | @minrk (activity) | @peter1357908 (activity) | @Wykiki (activity) | @YStrauchP4 (activity) | @yuvipanda (activity)
17.1#
17.1.0 - 2024-10-11#
New features added#
[All] Add
enable_pkceconfig, True by default #765 (@renan-r-santos, @minrk, @consideRatio, @manics)[Google] Add
include_nested_groupsconfig #763 (@jrdnbradford, @consideRatio)
Maintenance and upkeep improvements#
[Google] Handle pagination in group API calls #768 (@jrdnbradford, @minrk)
[Google] Make looking up google groups far less blocking #764 (@jrdnbradford, @consideRatio, @manics)
Documentation improvements#
[Google] google groups config docs: properties are dictionaries #766 (@manics, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @jrdnbradford (activity) | @manics (activity) | @minrk (activity) | @renan-r-santos (activity)
17.0#
17.0.0 - 2024-09-04#
This release includes minor breaking changes, deprecations, and the following new config options available in all authenticator classes:
Breaking Changes#
[Generic, OpenShift]
OAuthenticator.allowed_groupsandOAuthenticator.admin_groupsnow requireOAuthenticator.manage_groupsto be set to True, and will otherwise raise an error.
Deprecations#
[AzureAd]
AzureAdOAuthenticator.user_groups_claimis deprecated in favor ofOAuthenticator.auth_state_groups_key[Generic]
GenericOAuthenticator.claim_groups_keyis deprecated in favor ofOAuthenticator.auth_state_groups_key
New features added#
[All] Move group management from generic to base oauthenticator (
allowed_groups,admin_groups,auth_state_groups_key) #735 (@yuvipanda, @manics, @consideRatio, @minrk, @benjimin)[All] add OAuthenticator.modify_auth_state_hook, allow get_user_groups / auth_state_groups_key to be async #751 (@minrk, @yuvipanda)
[Google] Add switch to strip domain from username #748 (@0mar, @GeorgianaElena, @manics)
Maintenance and upkeep improvements#
Various fixes for allowed_groups and admin_groups #758 (@consideRatio, @minrk)
Update references from unreleased v16.4 to upcoming v17.0 #755 (@consideRatio, @minrk)
Documentation improvements#
update docstrings on relationship between
allowed_groupsandallow_[provider_group_equivalents]#757 (@minrk, @consideRatio)Make headings etc in changelog consistent #754 (@consideRatio, @minrk)
Add changelog for v16.3.1 #744 (@yuvipanda, @minrk)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@0mar (activity) | @benjimin (activity) | @consideRatio (activity) | @GeorgianaElena (activity) | @manics (activity) | @minrk (activity) | @yuvipanda (activity)
16.3#
16.3.1 - 2024-06-11#
Important
This release includes a security patch for GlobusOAuthenticator.
See GHSA-gprj-3p75-f996
for details.
New features added#
[All] Add
allowed_scopesto all authenticators to allow some users based on granted scopes #719 (@yuvipanda, @consideRatio, @manics, [@minrk])
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @manics (activity) | @minrk (activity) | @yuvipanda (activity)
16.3.0 - 2024-03-20#
Important
This release includes a security patch for GoogleOAuthenticator.hosted_domain,
see GHSA-55m3-44xf-hg4h for details.
OAuthenticator now requires JupyterHub >=2.2.
New features added#
[All] Add
userdata_from_id_tokenas alternative touserdata_url#725 (@benjimin, @minrk, @consideRatio, @manics)[All] Make
username_claimcallable (except for CILogon), like it has been in Generic #717 (@yuvipanda, @consideRatio, @GeorgianaElena, @manics)[AzureAD] Support
manage_groups#710 (@minrk, @yuvipanda, @GeorgianaElena)[Generic] Add support for
manage_groups#708 (@benjimin, @manics, @minrk, @yuvipanda)[AzureAD] Add an implementation for
Authenticator.manage_groups=True#573 (@thomafred, @yuvipanda, @GeorgianaElena)
Maintenance and upkeep improvements#
test: simplify by removing
token_request_styleparameter for mock function #734 (@consideRatio, @manics)Require jupyterhub>=2.2 #720 (@manics, @yuvipanda, @consideRatio)
temporary pin for pytest-asyncio #715 (@minrk, @consideRatio)
Documentation improvements#
add example for deploying with mock-oauth2-server #730 (@minrk, @consideRatio)
add dedicated doc on details of allowing access #729 (@minrk, @GeorgianaElena, @consideRatio, @manics)
clarify what claim_groups_key is used for #707 (@minrk, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@benjimin (activity) | @consideRatio (activity) | @GeorgianaElena (activity) | @krassowski (activity) | @manics (activity) | @minrk (activity) | @thomafred (activity) | @yuvipanda (activity)
16.2#
16.2.1 - 2023-11-27#
Bugs fixed#
[CILogon] Fix missing schema entry for default under allowed_idps #704 (@consideRatio)
16.2.0 - 2023-11-23#
New features added#
[CILogon] Add idp config
allowed_domains_claimfor use withallowed_domains#702 (@consideRatio, @GeorgianaElena)[CILogon] allow fnmatch based expressions in
allowed_domains, such as*.jupyter.org#701 (@consideRatio, @GeorgianaElena, @minrk)[CILogon] add config to specify default idp under allowed_idps #699 (@consideRatio, @GeorgianaElena)
Bugs fixed#
[All] Correcting Bearer Authorization header #698 (@yaleman, @GeorgianaElena, @manics, @consideRatio)
Continuous integration improvements#
ci: add test of python 3.12 #700 (@consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @GeorgianaElena (activity) | @manics (activity) | @minrk (activity) | @yaleman (activity)
16.1#
16.1.1 - 2023-10-18#
Note
The OkpyOAuthenticator was removed in this patch release as its believed to have no users. If you were an active user, please re-configure to use GenericOAuthenticator like described in this comment and let us know in another comment.
Bugs fixed#
[OpenShift] Fix fetching of default openshift_auth_api_url #694 (@consideRatio, @manics, @minrk)
Maintenance and upkeep improvements#
[Okpy] Remove the authenticator as it is no longer used #691 (@yuvipanda, @GeorgianaElena, @minrk, @consideRatio, @manics)
Continuous integration improvements#
Bump actions/checkout from 3 to 4 #687 (@consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @do-it-tim (activity) | @GeorgianaElena (activity) | @manics (activity) | @minrk (activity) | @yuvipanda (activity)
16.1.0 - 2023-09-28#
New features added#
[CILogon] Add allow_all as a idp specific config #684 (@consideRatio, @GeorgianaElena)
Enhancements made#
Drop next_url from authorize_redirect state param #671 (@johnpmayer, @consideRatio, @minrk)
Bugs fixed#
Documentation improvements#
docs: fix
"generic"renamed to"generic-oauth"#680 (@mehalter, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @GeorgianaElena (activity) | @johnpmayer (activity) | @jorado (activity) | @manics (activity) | @mehalter (activity) | @minrk (activity)
16.0#
16.0.7 - 2023-08-21#
Bugs fixed#
[Google] admin_users should like before v16 list final usernames #673 (@consideRatio, @jinserk, @GeorgianaElena)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @jinserk (activity) | @GeorgianaElena (activity)
16.0.6 - 2023-08-17#
16.0.6 is a bugfix release, fixing a crash on startup when combining enable_auth_state with Google, Globus, or Bitbucket. The group membership fields are lists, which were switched to sets in 16.0, but that is not allowed by JupyterHub’s JSON serialization of auth_state.
Bugs fixed#
[Google, Globus, Bitbucket] Ensure auth_state is JSON serializable (lists are, not sets) #668 (@consideRatio, @minrk)
Documentation improvements#
GitHub/GitLab typo #669 (@tico24, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @minrk (activity) | @tico24 (activity)
16.0.5 - 2023-08-15#
Bugs fixed#
[Google, Globus] handle auth_model is None in google, globus #665 (@minrk, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
16.0.4 - 2023-08-11#
Bugs fixed#
[Google] Fix regression in v16 of no longer stripping username’s domain if
hosted_domainhas a single entry #661 (@consideratio, @minrk, @taylorgibson)
Documentation improvements#
Add ORCID iD example configuration #657 (@matthewwiese, @manics)
Fix typo in authenticator class for google #653 (@stes, @consideRatio)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@consideRatio (activity) | @manics (activity) | @matthewwiese (activity) | @minrk (activity) | @NickolausDS (activity) | @stes (activity) | @taylorgibson (activity)
16.0.3 - 2023-07-08#
Documentation improvements#
docs: update v16 changelog to capture missed change about allow_all #651 (@consideRatio)
16.0.2 - 2023-07-06#
Bugs fixed#
[Generic] breaking fix: change basic_auth default to False #648 (@consideRatio)
Maintenance and upkeep improvements#
[Generic] Deprecate tls_verify in favor of validate_server_cert #647 (@consideRatio)
16.0.1 - 2023-07-05#
Bugs fixed#
Ensure login_service remain configurable #644 (@consideRatio)
Documentation improvements#
docs: fix redirection config typo for getting-started #642 (@consideRatio)
16.0.0 - 2023-07-05#
The project has been refactored greatly to make it easier to use, understand, and maintain its code and documentation. This release has several breaking changes and deprecations you should read through before upgrading.
Note
This changelog entry has been updated to capture previously undocumented changes and new changes in 16.0.2, please upgrade directly to 16.0.2 or higher.
Breaking changes#
Support for Python 3.7 has been dropped, Python 3.8+ is now required.
[All] If no configuration allows a user, then users are no longer allowed by default. The new config
OAuthenticator.allow_allcan be configured True to allow all users.[All] Users are now allowed based on either being part of:
OAuthenticator.admin_users,OAuthenticator.allowed_users, an Authenticator specific config allowing a group/team/organization, or by being an existing user if new configOAuthenticator.allow_existing_usersis configured.[All] Existing users (listed via
/hub/admin) will now only be allowed ifOAuthenticator.allow_existing_usersis True, while before existing users were allowed ifOAuthenticator.allowed_userswas configured.[Google] If
GoogleOAuthenticator.admin_google_groupsis configured, users logging in not explicitly there or inOAuthenticator.admin_userswill get their admin status revoked.[Generic, Google]
GenericOAuthenticator.allowed_groups,GenericOAuthenticator.allowed_groupsGoogleOAuthenticator.allowed_google_groups, andGoogleOAuthenticator.admin_google_groupsare now Set based configuration instead of List based configuration. It is still possible to set these with lists as as they are converted to sets automatically, but anyone reading and adding entries must now use set logic and not list logic.[Google] Authentication state’s(reverted in 16.0.6 as JupyterHub’s auth_state must be JSON-serializable and doesn’t allow sets)google_groupsis now a set, not a list.[CILogon]
CILogonOAuthenticator.allowed_idpsis now required config, andshown_idps,username_claim,additional_username_claimswere removed.[Okpy] The public functions
OkpyOAuthenticator.get_auth_requestandOkpyOAuthenticator.get_user_info_requestwere removed.[OpenShift] The config
ca_certswas removed. UseOAuthenticator.http_request_kwargswith aca_certskey instead. OpenShift’s defaultca_certsremains unchanged.[Generic]
GenericOAuthenticator.basic_authbehavior changed in 16.0.0 and defaults to False in version 16.0.2.
Deprecations#
[Generic, Auth0]
username_keyis deprecated and is replaced byOAuthenticator.username_claim.[Generic]
GenericOAuthenticator.extra_paramsis deprecated and is replaced byOAuthenticator.token_params.[Generic, OpenShift]
GenericOAuthenticator.tls_verifyandOpenShiftOAuthenticator.validate_certare deprecated and are replaced byOAuthenticator.validate_server_cert.
A new structure#
The authenticators are no longer overriding the authenticate method, but
instead relying on the OAuthenticator base class authenticate method which
calls a few lower level methods that can be overridden if needed. Like this, a
lot of code has been absorbed into the OAuthenticator base class that was
previously duplicated across authenticators.
To learn more about this new structure the provider specific authenticator
classes rely on, please for now inspect the source code for the
OAuthenticator.authenticate and
OAuthenticator.check_allowed methods.
Plans on writing more thorough documentation about this new structure is tracked
in issue #634.
New features added#
[All] breaking: add allow_existing_users config defaulting to False #631 (@consideRatio, @minrk)
[All] breaking, add allow_all config defaulting to False (CILogon: require allowed_idps) #625 (@consideRatio, @GeorgianaElena)
[All] Add
http_request_kwargsconfig option #578 (@manics, @consideRatio, @minrk)
Enhancements made#
[All] Authorize
allowed_users,admin_users, or other allowed/admin groups #594 (@GeorgianaElena, @consideRatio, @minrk, @manics, @floriandeboissieu)
Bugs fixed#
Fix Content-Type header, should be x-www-form-urlencoded for token request, and not passed for other GET requests #599 (@jabbera, @GeorgianaElena, @consideRatio)
Adjust the params of the access token request when basic auth is enabled #568 (@GeorgianaElena, @consideRatio)
[OAuthLoginHandler] Fix tornado.auth.OAuth2Mixin.authorize_redirect
extra_paramsparameter’s name #551 (@GeorgianaElena, @consideRatio)
Maintenance and upkeep improvements#
[OpenShift] Remove ca_certs, deprecate validate_cert, fix unreleased regression #640 (@consideRatio, @manics)
maint: cleanup 0.7 workaround and adjust two non-exposed func names #630 (@consideRatio, @minrk)
refactor: separate deprecated config for readability #628 (@consideRatio, @minrk)
maint: remove unused file common.py #624 (@consideRatio, @GeorgianaElena)
maint: use tbump when making releases, update flake8/pytest/pytest-cov config #623 (@consideRatio, @minrk)
Don’t send POST params on query string also #610 (@jabbera, @manics, @consideRatio)
Reverts unreleased changes making scope, username_claim, …_url not configurable #608 (@GeorgianaElena, @consideRatio)
maint: import Callable traitlet from jupyterhub #603 (@consideRatio, @GeorgianaElena, @manics)
maint: cleanup already removed awscogito, azureadb2c, yandex #602 (@consideRatio, @GeorgianaElena)
Fix bug in implementation of not yet released basic_auth config #601 (@consideRatio, @GeorgianaElena)
[Maintainance] Remove dynamic defaults when not needed and rm the io_loop #595 (@GeorgianaElena, @minrk)
Drop support for Python 3.7 #593 (@consideRatio, @GeorgianaElena, @minrk)
maint: replace test-requirements.txt with opt. dependencies #590 (@consideRatio, @GeorgianaElena)
dependabot: monthly updates of github actions #588 (@consideRatio, @GeorgianaElena)
maint: declare optional dependencies for version constraints #581 (@consideRatio, @GeorgianaElena)
[CILogonOAuthenticator] Add profile to default scope, fix detail following recent refactoring #575 (@GeorgianaElena, @consideRatio)
maint: drop support for python 3.6 #559 (@consideRatio, @manics)
Update .gitignore #558 (@consideRatio, @minrk)
maint: add and run pre-commit hooks pyupgrade and autoflake #555 (@consideRatio, @GeorgianaElena, @manics)
use importlib-metadata to load entrypoints for docs #542 (@minrk, @consideRatio)
Refactor oauthenticators #526 (@GeorgianaElena, @minrk, @consideRatio, @yuvipanda)
Documentation improvements#
docs: coalesce v16 upgrade page into changelog, improve helpstrings #637 (@consideRatio, @manics)
docs: a major refresher of the documentation #627 (@consideRatio, @GeorgianaElena)
http_request_kwargs: link to TornadoHTTPRequestdoc #614 (@manics, @consideRatio)docs: update broken links #604 (@consideRatio)
docs: fix readme badge for tests #597 (@consideRatio)
Fix broken link about GCP service account keys #586 (@GeorgianaElena, @consideRatio)
Document the notable changes of the refactorization #569 (@GeorgianaElena, @consideRatio)
Refactor the documentation structure #561 (@GeorgianaElena, @consideRatio, @minrk)
All docs to MyST markdown 🚀 #554 (@GeorgianaElena, @consideRatio)
Continuous integration improvements#
ci: transition to use codecov github action #589 (@consideRatio)
ci: add dependabot for github actions and update misc versions in workflows #566 (@consideRatio, @GeorgianaElena, @Sheila-nk)
Contributors to this release#
The following people contributed discussions, new ideas, code and documentation contributions, and review. See our definition of contributors.
(GitHub contributors page for this release)
@Bougakov (activity) | @consideRatio (activity) | @floriandeboissieu (activity) | @GeorgianaElena (activity) | @jabbera (activity) | @jimdigriz (activity) | @kianaf (activity) | @manics (activity) | @minrk (activity) | @Sheila-nk (activity) | @yuvipanda (activity)
15.0#
15.1.0 - 2022-09-08#
New features added#
[CILogon] Add allowed_domains to allowed_idps config for a possiblity to restrict access based on idp + domain #518 (@GeorgianaElena)
Enhancements made#
Documentation improvements#
Update documentation theme and fix autodoc #524 (@GeorgianaElena)
Contributors to this release#
(GitHub contributors page for this release)
@consideRatio | @dingobar | @drhagen | @GeorgianaElena | @manics | @minrk | @terrencegf | @yuvipanda
15.0.1 - 2022-06-09#
Bugs fixed#
[Bitbucket] Fix for changes to bitbucket API - /teams removed and /workspaces to be used #477 (@Marcalberga)
[CILogon] Don’t make action a required field of CILogonOAuthenticator.allowed_idps follow-up #517 (@GeorgianaElena)
[CILogon] Don’t make action a required field of CILogonOAuthenticator.allowed_idps #516 (@GeorgianaElena)
Contributors to this release#
15.0.0 - 2022-06-03#
If you are using AzureAD, MediaWiki, and CILogon authenticators, make sure to read about the breaking changes.
Breaking security change#
CILogonOAuthenticatorhas breaking changes and come with a migration guide. These changes resolve the known vulnerability GHSA-r7v4-jwx9-wx43. Your hub will fail to start if you do not follow the migration guide.
Other breaking changes#
pyjwtversion 2.4.0 or greater is now required when use with authentication classes that needs it:AzureAdOAuthenticator,MWOAuthenticator.
New features added#
[GitHub] Add populate_teams_in_auth_state option #498 (@yuvipanda, @consideRatio, @GeorgianaElena, @manics)
Enhancements made#
Allow and document custom 403 messages and pages #484 (@GeorgianaElena, @yuvipanda)
Bugs fixed#
[GitHub] fix implementation of populate_teams_in_auth_state #504 (@consideRatio, @yuvipanda)
[Auth0] Fix AUTH0_SUBDOMAIN default setting #502 (@alejandrosame, @yuvipanda)
Maintenance and upkeep improvements#
maint: unpin extras_require googlegroups dependencies #508 (@consideRatio, @missingcharacter)
breaking maint: require pyjwt>=2 and mwoauth>=0.3.8 (to reduce complexity) #506 (@consideRatio, @yuvipanda, @GeorgianaElena, @halfak)
Use isort for import formatting #497 (@yuvipanda, @consideRatio)
General maintenance and fix of pre-commit ci failure #479 (@consideRatio, @minrk, @GeorgianaElena)
Remove custom stylesheet and bump sphinx version #465 (@diego-plan9, @consideRatio)
Support pyjwt >= 2 in tests #461 (@diego-plan9, @minrk, @consideRatio)
Documentation improvements#
docs/ci: use myst, fix broken links, add linkcheck test, remove deprecated distutils, avoid 2x job triggers #511 (@consideRatio, @GeorgianaElena)
docs/source/getting-started: mention openid scope for AzureAD + MFA #478 (@rkdarst, @consideRatio)
Fix My Service authenticator class names in documentation #457 (@sgaist, @consideRatio)
Contributors to this release#
(GitHub contributors page for this release)
@alejandrosame | @brianaydemir | @consideRatio | @diego-plan9 | @GeorgianaElena | @halfak | @kkaraivanov1 | @manics | @minrk | @missingcharacter | @rkdarst | @sgaist | @yuvipanda
14.2#
14.2.0 - 2021-08-09#
Enhancements made#
[GitHub] Add syntax to allow specific teams in a GitHub organization #449 (@j0nnyr0berts)
Contributors to this release#
(GitHub contributors page for this release)
@consideRatio | @dhirschfeld | @j0nnyr0berts | @jabbera | @manics | @sgibson91
14.1#
14.1.0 - 2021-07-19#
New features added#
[Globus] Add config to manage: allowed, admin, and blocked users through Globus groups #441 (@rpwagner)
[Auth0] Add config username_key - maps identity providers response to a JH username #439 (@GeorgianaElena)
[All] Support custom logout url (logout_redirect_url) #437 (@GeorgianaElena)
Bugs fixed#
Maintenance and upkeep improvements#
pre-commit configured and executed #434 (@consideRatio)
ci: unpin pyjwt in test-requirements.txt #431 (@consideRatio)
Documentation improvements#
docs: update to async/await in example #435 (@consideRatio)
Add reference to external FeiShuAuthenticator #427 (@harrywang)
Note that whitelist should be used if not in 1.2 #422 (@mafloh)
Contributors to this release#
(GitHub contributors page for this release)
@consideRatio | @GeorgianaElena | @harrywang | @holdenk | @mafloh | @manics | @minrk | @NickolausDS | @rpwagner | @satra | @wOvAN
14.0#
14.0.0 - 2021-04-09#
New features added#
Support username_claim in Google OAuth #401 (@dtaniwaki)
added allowed_groups and admin_groups to generic.py #395 (@mcmartins)
[Google] Allow for checking of google_groups for admin only #358 (@dwilliams782)
Enhancements made#
Bugs fixed#
Maintenance and upkeep improvements#
Test oldest dependencies and bump jupyterhub required to 1.2 #413 (@consideRatio)
[Generic] Remove userdata_method configuration supposedly not relevant #376 (@consideRatio)
Documentation improvements#
docs: cleanup userdata_method from docs #416 (@consideRatio)
allowed_project_ids is the valid name #409 (@manning-ncsa)
Contributors to this release#
(GitHub contributors page for this release)
@consideRatio | @dhirschfeld | @dtaniwaki | @dwilliams782 | @holdenk | @manics | @manning-ncsa | @mcmartins | @minrk | @support | @welcome | @wseaton
0.13#
0.13.0 - 2021-02-04#
Enhancements made#
Auth0: Add refresh and id tokens to auth_state #393 (@biomath-vlad)
Bugs fixed#
PyJWT 2.0 compliant #402 (@rragundez)
Contributors to this release#
(GitHub contributors page for this release)
@biomath-vlad | @consideRatio | @kianaf | @manics | @rragundez | @yuvipanda
0.12#
[0.12.3] - 2020-12-04#
Bugs fixed#
Fix exception when enable_auth_state is enabled but user.encrypted_auth_state is None #391 (@rkevin-arch)
Maintenance and upkeep improvements#
Contributors to this release#
0.12.2 - 2020-11-30#
Security fix for GHSA-384w-5v3f-q499: Deprecated c.Authenticator.whitelist configuration was ignored instead of mapped to newer c.Authenticator.allowed_users when used with JupyterHub 1.2 and OAuthenticator 0.12.0-0.12.1.
0.12.1 - 2020-11-20#
Bugs fixed#
Maintenance and upkeep improvements#
Remove support for python 3.5 #384 (@consideRatio)
CI: Stop testing py35 and don’t test on tagged commits #379 (@consideRatio)
Contributors to this release#
0.12.0 - 2020-10-26#
Enhancements made#
[OpenShift] Enable cert verification for self-signed certs and auto-load auth api URL #363 (@vpavlin)
[Globus] Support custom username handling #357 (@NickolausDS)
[Google] Adding refresh_token #350 (@missingcharacter)
[Google] Added optional support for google groups #341 (@missingcharacter)
[All] Added extra_authorize_params to pass extra params in the initial request to the identity provider #338 (@NickolausDS)
Bugs fixed#
[All] Let auth cookie be influenced by JupyterHub’s cookie_options configuration #378 (@Wh1isper)
[GitHub] Respect validate_server_cert attribute #354 (@nvs-abhilash)
[Generic] tls verify not being honored at the httprequest level when internal_ssl is enabled #326 (@sstarcher)
Maintenance and upkeep improvements#
Rename OAuthenticator.whitelist to allow #366 (@GeorgianaElena)
Python package extra dependencies updated #343 (@missingcharacter)
[Generic] Fix failing GenericOAuthenticator tests #339 (@GeorgianaElena)
[Globus] Remove the need for globus_sdk as a python dependency #337 (@NickolausDS)
Documentation improvements#
Add changelog for 0.12.0 release #377 (@consideRatio)
[Globus] Docs: explain identity_provider better #362 (@NickolausDS)
[OpenShift] Docs: fix broken link for OpenShift OAuth service accounts #352 (@nscozzaro)
Docs: Updating sphinx and pandas_sphinx_theme references #345 (@missingcharacter)
[Google] Added optional support for google groups #341 (@missingcharacter)
[Globus] Remove the need for globus_sdk as a python dependency #337 (@NickolausDS)
Update docs #336 (@GeorgianaElena)
Contributors to this release#
(GitHub contributors page for this release)
@ablekh | @akhmerov | @Analect | @arneki | @bellackn | @betatim | @CJCShadowsan | @cmseal | @consideRatio | @d0m84 | @daniel-ciocirlan | @dmpe | @dmvieira | @GeorgianaElena | @ghezalsherdil | @guimou | @gweis | @hardik42 | @hbuttguavus | @jamescross91 | @linkcd | @louis-she | @manics | @meeseeksmachine | @michec81 | @minrk | @missingcharacter | @mransley | @NickolausDS | @nscozzaro | @nvs-abhilash | @patback66 | @PaulMazzuca | @RAbraham | @sampathkethineedi | @saurav-bhagat | @shivan10 | @SolarisYan | @sstarcher | @support | @umar-sik | @vpavlin | @welcome | @Wh1isper | @willingc | @yuvipanda | @zhiyuli
0.11#
0.11.0 - 2020-01-30#
The main change in 0.11 is a refactoring of classes to remove mixins, reducing the amount of boilerplate needed. In addition, there are some fixes to the Azure AD Authenticator. This should be a fully backward-compatible change, except in cases where some subclasses were importing these now-unneeded mixin classes, such as GitHubLoginHandler, GitHubMixin, etc.
All options should now be configurable via the standard jupyterhub config file. There should no longer be any options that are only configurable via environment variable.
This release also removes the latest Authenticators added in 0.10
(AzureAdB2COAuthenticator, AWSCognitoOAuthenticator, YandexOAuthenticator),
which were released without being fully supported and
which can be achieved through configuration of existing classes,
such as AzureAd and Generic.
We don’t plan to accept further contributions of new providers if they can be achieved through customization or configuration of existing classes. Rather, contributors are encouraged to provide example documentation for using new providers, or pull requests addressing gaps necessary to do so with the GenericOAuthenticator.
Merged PRs#
Contributors to this release#
(GitHub contributors page for this release)
@consideRatio | @craigminihan | @Dmitry1987 | @manics | @minrk | @NickolausDS | @zevaryx
0.10#
0.10.0 - 2019-11-27#
New#
Add support for
GenericOAuthenticator.username_keyto hold a callable value #305 (@eslavich)Add
AzureAdOAuthenticator.username_claimconfig field #280 (@jeff-sternberg)Add
AWSCognitoAuthenticator#269 (@jmartinc89)
Fixed#
mediawiki: utf-8 > binary strings, req. mwoauth>=0.3.7 #297 (@consideRatio)
Fixed Globus Logout Handler, added test #288 (@NickolausDS)
Include inherited members in GitLab auth checks, requires GitLab 12.4 or newer, but will fall back to previous behavior for older GitLab versions. #283 (@vindvaki)
Maintenance#
Fixed content index in readme, and fixed typo in comments #310 (@linkcd)
Add scopes documentation to auth0 example #303 (@jbradenbrown)
Add py3.8 for CI testing #302 (@consideRatio)
Disable MediaWiki’s mwoauth==0.3.5 due to a regression #295 (@consideRatio)
Add RELEASE.md #294 (@consideRatio)
Add PyPI/Travis build badges to README.md #293 (@consideRatio)
Use traitlet.default for Azure AD tenant_id #282 (@jeff-sternberg)
Add clarifying comment into README code block #279 (@raethlein)
0.9#
0.9.0 - 2019-07-30#
switch to asyncio coroutines from tornado coroutines (requires Python 3.5)
add
GenericOAuthenticator.userdata_token_methodconfigurableadd
GenericOAuthenticator.basic_authconfigurablesupport for OpenShift 4.0 API changes
0.8#
0.8.2 - 2019-04-16#
Validate login URL redirects to avoid Open Redirect issues.
0.8.1 - 2019-02-28#
Provide better error messages
Allow auth scope to be array or strings
GitHubOAuthenticator: More efficientorg_whitelistcheckUse pytest-asyncio instead of pytest-tornado
CILogon: New additional_username_claims config for linked identities, fallback to the primary username claim
GitLabOAuthenticator: Newproject_id_whitelistconfig to whitelist users who have Developer+ access to the projectGoogleOAuthenticator: Allow email domains (hosted_domain) to be a listAdd
jupyterhub-authenticatorentrypoints for jupyterhub 1.0.Cleanup & bugfixes
0.8.0 - 2018-08-10#
Add
azuread.AzureADOAuthenticatorAdd
CILogonOAuthenticator.idp_whitelistandCILogonOAuthenticator.strip_idp_domainoptionsAdd
GenericOAuthenticator.tls_verifyandGenericOAuthenticator.extra_paramsoptionsAdd refresh token and scope to generic oauthenticator auth state
Better error messages when GitHub oauth fails
Stop normalizing mediawiki usernames, which can be case-sensitive
Fixes for group-membership checks with GitLab
Bugfixes in various authenticators
Deprecate GITLAB_HOST in favor of GITLAB_URL, since we expect
https://in the url, not just the host.
0.7#
0.7.3 - 2018-02-16#
0.7.3 is a security fix for CVE-2018-7206.
It fixes handling of gitlab_group_whitelist when using GitLabOAuthenticator.
The same fix is backported to 0.6.2.
0.7.2 - 2017-10-27#
Fix CILogon OAuth 2 implementation. ePPN claim is used for default username (typically institutional email).
CILogonOAuthenticator.username_claimcan be used to change which field is used for JupyterHub usernames.GenericOAuthenticator.login_serviceis now configurable.default to GitLab API version 4 and allow v3 via GITLAB_API_VERSION=3 environment variable.
Add
GlobusOAuthenticator.revoke_tokens_on_logoutandGlobusOAuthenticator.logout_redirect_urlconfig for further clearing of credentials on JupyterHub logout.
0.7.1 - 2017-10-04#
fix regression in 0.7.0 preventing authentication via providers other than GitHub, MediaWiki
0.7.0 - 2017-10-02#
0.7.0 adds significant new functionality to all authenticators.
CILogon now uses OAuth 2 instead of OAuth 1, to be more consistent with the rest.
All OAuthenticators support
auth_statewhen used with JupyterHub 0.8. In every case, the auth_state is a dict with two keys:access_tokenand the user-info reply identifying the user. For instance, GitHubOAuthenticator auth_state looks like:{ 'acces_token': 'abc123', 'github_user': { 'username': 'fake-user', 'email': 'fake@email.com', ... } }
auth_state can be passed to Spawners by defining a
.pre_spawn_startmethod. See examples/auth_state for an example.All OAuthenticators have a
.scopetrait, which is a list of string scopes to request. See your OAuth provider’s documentation for what scopes you may want. This is useful in conjunction withauth_state, which may be used to pass access tokens to Spawners via environment variables..scopecan control what permissions those tokens will have. In general, OAuthenticator default scopes should only have read-only access to identify users.GITHUB_HTTP environment variable can be used to talk to HTTP-only GitHub Enterprise deployments.
0.6#
0.6.2 - 2018-02-16#
0.6.2 is a security fix for CVE-2018-7206.
It fixes handling of gitlab_group_whitelist when using GitLabOAuthenticator.
0.6.1 - 2017-08-11#
0.6.1 has bugfixes for new behaviors in 0.6.0
Use
.login_urlandnext_urlfrom JupyterHub if defined (JupyterHub 0.8)Fix empty login_url where final login redirect could be omitted
Fix mediawiki authenticator, which broke in 0.6.0
Encode state as base64 instead of JSON, for easier passing in URLs
0.6.0 - 2017-07-25#
Support for changes in upcoming JupyterHub 0.8
Refactor to share more code across providers
Deprecated GITHUB_CLIENT_ID and other provider-specific environment variables for common options. All OAuthenticators support the same OAUTH_CLIENT_ID, OAUTH_CLIENT_SECRET, and OAUTH_CALLBACK_URL environment variables.
New authenticators:
auth0
globus
okpy
openshift
generic - a generic implementation that can work with any OAuth2 provider
0.5#
0.5.1 - 2016-10-05#
Fixes in BitbucketOAuthenticator.check_whitelist
0.5.0 - 2016-09-02#
Add GitLabOAuthenticator
0.4#
0.4.1 - 2016-05-18#
Fix typo preventing Google OAuth from working in 0.4.0
0.4.0 - 2016-05-11#
Enable username normalization (for mixed-case names on GitHub, requires JupyterHub 0.5). This removes
GitHubOAuthenticator.username_mapintroduced in 0.3, because the oauth2 Authenticator has.username_mapas of 0.5.
0.3 - 2016-04-20#
Add Google authenticator
Allow specifying OAuth scope
Add
GitHubOAuthenticator.username_mapfor mapping GitHub usernames to system usernames.
0.2 - 2016-01-04#
Add mediawiki authenticator
0.1 - 2015-12-22#
First release