For detailed changes from the prior release, click on the version number, and its link will bring up a GitHub listing of changes. Use git log on the command line for details.
git log
GenericOAuthenticator.username_key
AzureAdOAuthenticator.username_claim
AWSCognitoAuthenticator
GenericOAuthenticator.userdata_token_method
GenericOAuthenticator.basic_auth
GitHubOAuthenticator
org_whitelist
GitLabOAuthenticator
project_id_whitelist
GoogleOAuthenticator
hosted_domain
jupyterhub-authenticator
azuread.AzureADOAuthenticator
CILogonOAuthenticator.idp_whitelist
CILogonOAuthenticator.strip_idp_domain
GenericOAuthenticator.tls_verify
GenericOAuthenticator.extra_params
https://
0.7.3 is a security fix for CVE-2018-7206. It fixes handling of gitlab_group_whitelist when using GitLabOAuthenticator. The same fix is backported to 0.6.2.
gitlab_group_whitelist
CILogonOAuthenticator.username_claim
GenericOAuthenticator.login_service
GlobusOAuthenticator.revoke_tokens_on_logout
GlobusOAuthenticator.logout_redirect_url
0.7.0 adds significant new functionality to all authenticators.
CILogon now uses OAuth 2 instead of OAuth 1, to be more consistent with the rest.
All OAuthenticators support auth_state when used with JupyterHub 0.8. In every case, the auth_state is a dict with two keys: access_token and the user-info reply identifying the user. For instance, GitHubOAuthenticator auth_state looks like:
auth_state
access_token
{ 'acces_token': 'abc123', 'github_user': { 'username': 'fake-user', 'email': 'fake@email.com', ... } }
auth_state can be passed to Spawners by defining a .pre_spawn_start method. See examples/auth_state for an example.
.pre_spawn_start
All OAuthenticators have a .scope trait, which is a list of string scopes to request. See your OAuth provider’s documentation for what scopes you may want. This is useful in conjunction with auth_state, which may be used to pass access tokens to Spawners via environment variables. .scope can control what permissions those tokens will have. In general, OAuthenticator default scopes should only have read-only access to identify users.
.scope
GITHUB_HTTP environment variable can be used to talk to HTTP-only GitHub Enterprise deployments.
0.6.2 is a security fix for CVE-2018-7206. It fixes handling of gitlab_group_whitelist when using GitLabOAuthenticator.
0.6.1 has bugfixes for new behaviors in 0.6.0
.login_url
next_url
GitHubOAuthenticator.username_map
.username_map