<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/oauthlib.git/docs/oauth1, branch 2.x</title>
<subtitle>github.com: idan/oauthlib.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/'/>
<entry>
<title>Use secrets module in Python 3.6 and later (#533)</title>
<updated>2018-04-23T20:47:12+00:00</updated>
<author>
<name>Olaf Conradi</name>
<email>olaf@conradi.org</email>
</author>
<published>2018-04-13T08:32:01+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=28bc7e2140fea893c5d23e1893b5f25e36f5d4e7'/>
<id>28bc7e2140fea893c5d23e1893b5f25e36f5d4e7</id>
<content type='text'>
The secrets module should be used for generating cryptographically
strong random numbers suitable for managing data such as passwords,
account authentication, security tokens, and related secrets.

In particularly, secrets should be used in preference to the default
pseudo-random number generator in the random module, which is
designed for modelling and simulation, not security or cryptography.

(cherry picked from commit d21fd53)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The secrets module should be used for generating cryptographically
strong random numbers suitable for managing data such as passwords,
account authentication, security tokens, and related secrets.

In particularly, secrets should be used in preference to the default
pseudo-random number generator in the random module, which is
designed for modelling and simulation, not security or cryptography.

(cherry picked from commit d21fd53)
</pre>
</div>
</content>
</entry>
<entry>
<title>Rtd docs fix (#515)</title>
<updated>2018-03-09T21:18:10+00:00</updated>
<author>
<name>Jonathan Huot</name>
<email>jonathanhuot@users.noreply.github.com</email>
</author>
<published>2018-02-28T14:00:08+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=871446f8c9c14f80497b257dc809500efc4e8c45'/>
<id>871446f8c9c14f80497b257dc809500efc4e8c45</id>
<content type='text'>
* Added sphinx build for developers

Rationale is to build docs locally to prevent RTD to break later.

* Replace manual sphinx into make

* Renamed idan URL to oauthlib community

* Renamed http into https URLs since http is returning 302

* python requests library renamed its home URL

* Add ignore list for "make linkcheck"

linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account

* virtualenv changed its homepage and website.

* Fixed broken link

(cherry picked from commit 32e5ad1)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Added sphinx build for developers

Rationale is to build docs locally to prevent RTD to break later.

* Replace manual sphinx into make

* Renamed idan URL to oauthlib community

* Renamed http into https URLs since http is returning 302

* python requests library renamed its home URL

* Add ignore list for "make linkcheck"

linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account

* virtualenv changed its homepage and website.

* Fixed broken link

(cherry picked from commit 32e5ad1)
</pre>
</div>
</content>
</entry>
<entry>
<title>Documented PyJWT dependency for RSA-SHA1 signatures.</title>
<updated>2017-08-01T12:24:06+00:00</updated>
<author>
<name>Hoylen Sue</name>
<email>hoylen@hoylen.com</email>
</author>
<published>2017-01-16T00:01:32+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=9628f3d24a2e9777bccf24115b123eea3e9eb74c'/>
<id>9628f3d24a2e9777bccf24115b123eea3e9eb74c</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed client.rst</title>
<updated>2017-03-06T18:11:16+00:00</updated>
<author>
<name>Aj</name>
<email>ajayplsingh@gmail.com</email>
</author>
<published>2017-03-06T18:11:16+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=92a269aac7b5772e8b5860930f8edb3e0741b91c'/>
<id>92a269aac7b5772e8b5860930f8edb3e0741b91c</id>
<content type='text'>
Fixed grammar on line 7.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fixed grammar on line 7.</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #326 from CoolGoose/patch-2</title>
<updated>2015-07-19T08:32:45+00:00</updated>
<author>
<name>Omer Katz</name>
<email>omer.drow@gmail.com</email>
</author>
<published>2015-07-19T08:32:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=3df94af950989b4594fde7df509723d77d0df2bf'/>
<id>3df94af950989b4594fde7df509723d77d0df2bf</id>
<content type='text'>
fix method params and clarify oauth_protected</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
fix method params and clarify oauth_protected</pre>
</div>
</content>
</entry>
<entry>
<title>Support newer PyJWT (1.0.0). remove PyCrypto completely for cryptography and PyJWT helpers. Reformat some test certificates to be easier to maintain. Update documentation to match use of cryptography instead of PyCrypto</title>
<updated>2015-04-14T16:30:44+00:00</updated>
<author>
<name>Joseph Tate</name>
<email>joseph@crunch.io</email>
</author>
<published>2015-04-14T16:30:44+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=fc2d1218e015adcf65ba01965884430c47895cd0'/>
<id>fc2d1218e015adcf65ba01965884430c47895cd0</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>precise oauth1 client workflow</title>
<updated>2015-03-26T18:09:22+00:00</updated>
<author>
<name>st4lk</name>
<email>myhappydo@gmail.com</email>
</author>
<published>2015-03-26T18:09:22+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=4cc868b45ef7291dba89162551754c0be8a2baf9'/>
<id>4cc868b45ef7291dba89162551754c0be8a2baf9</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>fix method params and clarify oauth_protected</title>
<updated>2015-03-01T10:09:01+00:00</updated>
<author>
<name>Alexandru Bucur</name>
<email>melipse@gmail.com</email>
</author>
<published>2015-03-01T10:09:01+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=4f913c6a6568c815e207435f1f12c72bdb1d7547'/>
<id>4f913c6a6568c815e207435f1f12c72bdb1d7547</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Create Signature Only OAuth1 Endpoint</title>
<updated>2014-09-11T16:31:58+00:00</updated>
<author>
<name>Ryan Hiebert</name>
<email>ryan@ryanhiebert.com</email>
</author>
<published>2014-09-04T03:57:14+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=988d08284989226577d30ae07550278dbf50d751'/>
<id>988d08284989226577d30ae07550278dbf50d751</id>
<content type='text'>
In certain cases a provider may wish to verify the signature of an
oauth request without doing anything more with it. Learning Tools
Interoperability (LTI), for example, uses "0-legged OAuth" for it's
signature verification process.

http://www.imsglobal.org/lti/
http://andyfmiller.com/2013/02/10/does-lti-use-oauth/

This adds a new ``SignatureOnlyEndpoint`` that implements only the
client validation and signature verification, and leaves off the other
parts that would need to be validated.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In certain cases a provider may wish to verify the signature of an
oauth request without doing anything more with it. Learning Tools
Interoperability (LTI), for example, uses "0-legged OAuth" for it's
signature verification process.

http://www.imsglobal.org/lti/
http://andyfmiller.com/2013/02/10/does-lti-use-oauth/

This adds a new ``SignatureOnlyEndpoint`` that implements only the
client validation and signature verification, and leaves off the other
parts that would need to be validated.
</pre>
</div>
</content>
</entry>
<entry>
<title>Removed mention of django-oauth-toolkit from oauth1 server docs.</title>
<updated>2014-04-15T13:11:34+00:00</updated>
<author>
<name>Kirill Spitsin</name>
<email>tn@0x746e.org.ua</email>
</author>
<published>2014-04-15T13:11:34+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=f46f5063567a8152a6fbb851a0f809f83157ba19'/>
<id>f46f5063567a8152a6fbb851a0f809f83157ba19</id>
<content type='text'>
django-oauth-tools doesn't seem to support oauth1.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
django-oauth-tools doesn't seem to support oauth1.</pre>
</div>
</content>
</entry>
</feed>
