summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJonathan Huot <JonathanHuot@users.noreply.github.com>2019-10-23 17:43:47 +0200
committerGitHub <noreply@github.com>2019-10-23 17:43:47 +0200
commit0c632d8f2955e34818346e96587f9124da449fe1 (patch)
treed096ac391d6ed13a93056e379cff652734c1aa26
parent2063ac37d63502f4db7ade95078cac6c28787215 (diff)
parentb2061f33b01d180ecff868e967587aa7081b99b9 (diff)
downloadoauthlib-0c632d8f2955e34818346e96587f9124da449fe1.tar.gz
Merge pull request #703 from IvanAnishchuk/pre_configured_server_grant_public_attributes
Make grants public attributes of pre_configured server class (#613)
-rw-r--r--oauthlib/oauth2/rfc6749/endpoints/pre_configured.py84
-rw-r--r--oauthlib/openid/connect/core/endpoints/pre_configured.py56
2 files changed, 70 insertions, 70 deletions
diff --git a/oauthlib/oauth2/rfc6749/endpoints/pre_configured.py b/oauthlib/oauth2/rfc6749/endpoints/pre_configured.py
index 1855973..7b17dc4 100644
--- a/oauthlib/oauth2/rfc6749/endpoints/pre_configured.py
+++ b/oauthlib/oauth2/rfc6749/endpoints/pre_configured.py
@@ -40,34 +40,34 @@ class Server(AuthorizationEndpoint, IntrospectEndpoint, TokenEndpoint,
:param kwargs: Extra parameters to pass to authorization-,
token-, resource-, and revocation-endpoint constructors.
"""
- auth_grant = AuthorizationCodeGrant(request_validator)
- implicit_grant = ImplicitGrant(request_validator)
- password_grant = ResourceOwnerPasswordCredentialsGrant(
+ self.auth_grant = AuthorizationCodeGrant(request_validator)
+ self.implicit_grant = ImplicitGrant(request_validator)
+ self.password_grant = ResourceOwnerPasswordCredentialsGrant(
request_validator)
- credentials_grant = ClientCredentialsGrant(request_validator)
- refresh_grant = RefreshTokenGrant(request_validator)
+ self.credentials_grant = ClientCredentialsGrant(request_validator)
+ self.refresh_grant = RefreshTokenGrant(request_validator)
- bearer = BearerToken(request_validator, token_generator,
+ self.bearer = BearerToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
AuthorizationEndpoint.__init__(self, default_response_type='code',
response_types={
- 'code': auth_grant,
- 'token': implicit_grant,
- 'none': auth_grant
+ 'code': self.auth_grant,
+ 'token': self.implicit_grant,
+ 'none': self.auth_grant
},
- default_token_type=bearer)
+ default_token_type=self.bearer)
TokenEndpoint.__init__(self, default_grant_type='authorization_code',
grant_types={
- 'authorization_code': auth_grant,
- 'password': password_grant,
- 'client_credentials': credentials_grant,
- 'refresh_token': refresh_grant,
+ 'authorization_code': self.auth_grant,
+ 'password': self.password_grant,
+ 'client_credentials': self.credentials_grant,
+ 'refresh_token': self.refresh_grant,
},
- default_token_type=bearer)
+ default_token_type=self.bearer)
ResourceEndpoint.__init__(self, default_token='Bearer',
- token_types={'Bearer': bearer})
+ token_types={'Bearer': self.bearer})
RevocationEndpoint.__init__(self, request_validator)
IntrospectEndpoint.__init__(self, request_validator)
@@ -92,21 +92,21 @@ class WebApplicationServer(AuthorizationEndpoint, IntrospectEndpoint, TokenEndpo
:param kwargs: Extra parameters to pass to authorization-,
token-, resource-, and revocation-endpoint constructors.
"""
- auth_grant = AuthorizationCodeGrant(request_validator)
- refresh_grant = RefreshTokenGrant(request_validator)
- bearer = BearerToken(request_validator, token_generator,
+ self.auth_grant = AuthorizationCodeGrant(request_validator)
+ self.refresh_grant = RefreshTokenGrant(request_validator)
+ self.bearer = BearerToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
AuthorizationEndpoint.__init__(self, default_response_type='code',
- response_types={'code': auth_grant},
- default_token_type=bearer)
+ response_types={'code': self.auth_grant},
+ default_token_type=self.bearer)
TokenEndpoint.__init__(self, default_grant_type='authorization_code',
grant_types={
- 'authorization_code': auth_grant,
- 'refresh_token': refresh_grant,
+ 'authorization_code': self.auth_grant,
+ 'refresh_token': self.refresh_grant,
},
- default_token_type=bearer)
+ default_token_type=self.bearer)
ResourceEndpoint.__init__(self, default_token='Bearer',
- token_types={'Bearer': bearer})
+ token_types={'Bearer': self.bearer})
RevocationEndpoint.__init__(self, request_validator)
IntrospectEndpoint.__init__(self, request_validator)
@@ -131,15 +131,15 @@ class MobileApplicationServer(AuthorizationEndpoint, IntrospectEndpoint,
:param kwargs: Extra parameters to pass to authorization-,
token-, resource-, and revocation-endpoint constructors.
"""
- implicit_grant = ImplicitGrant(request_validator)
- bearer = BearerToken(request_validator, token_generator,
+ self.implicit_grant = ImplicitGrant(request_validator)
+ self.bearer = BearerToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
AuthorizationEndpoint.__init__(self, default_response_type='token',
response_types={
- 'token': implicit_grant},
- default_token_type=bearer)
+ 'token': self.implicit_grant},
+ default_token_type=self.bearer)
ResourceEndpoint.__init__(self, default_token='Bearer',
- token_types={'Bearer': bearer})
+ token_types={'Bearer': self.bearer})
RevocationEndpoint.__init__(self, request_validator,
supported_token_types=['access_token'])
IntrospectEndpoint.__init__(self, request_validator,
@@ -166,19 +166,19 @@ class LegacyApplicationServer(TokenEndpoint, IntrospectEndpoint,
:param kwargs: Extra parameters to pass to authorization-,
token-, resource-, and revocation-endpoint constructors.
"""
- password_grant = ResourceOwnerPasswordCredentialsGrant(
+ self.password_grant = ResourceOwnerPasswordCredentialsGrant(
request_validator)
- refresh_grant = RefreshTokenGrant(request_validator)
- bearer = BearerToken(request_validator, token_generator,
+ self.refresh_grant = RefreshTokenGrant(request_validator)
+ self.bearer = BearerToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
TokenEndpoint.__init__(self, default_grant_type='password',
grant_types={
- 'password': password_grant,
- 'refresh_token': refresh_grant,
+ 'password': self.password_grant,
+ 'refresh_token': self.refresh_grant,
},
- default_token_type=bearer)
+ default_token_type=self.bearer)
ResourceEndpoint.__init__(self, default_token='Bearer',
- token_types={'Bearer': bearer})
+ token_types={'Bearer': self.bearer})
RevocationEndpoint.__init__(self, request_validator)
IntrospectEndpoint.__init__(self, request_validator)
@@ -203,15 +203,15 @@ class BackendApplicationServer(TokenEndpoint, IntrospectEndpoint,
:param kwargs: Extra parameters to pass to authorization-,
token-, resource-, and revocation-endpoint constructors.
"""
- credentials_grant = ClientCredentialsGrant(request_validator)
- bearer = BearerToken(request_validator, token_generator,
+ self.credentials_grant = ClientCredentialsGrant(request_validator)
+ self.bearer = BearerToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
TokenEndpoint.__init__(self, default_grant_type='client_credentials',
grant_types={
- 'client_credentials': credentials_grant},
- default_token_type=bearer)
+ 'client_credentials': self.credentials_grant},
+ default_token_type=self.bearer)
ResourceEndpoint.__init__(self, default_token='Bearer',
- token_types={'Bearer': bearer})
+ token_types={'Bearer': self.bearer})
RevocationEndpoint.__init__(self, request_validator,
supported_token_types=['access_token'])
IntrospectEndpoint.__init__(self, request_validator,
diff --git a/oauthlib/openid/connect/core/endpoints/pre_configured.py b/oauthlib/openid/connect/core/endpoints/pre_configured.py
index ad2faa7..ca8199d 100644
--- a/oauthlib/openid/connect/core/endpoints/pre_configured.py
+++ b/oauthlib/openid/connect/core/endpoints/pre_configured.py
@@ -56,52 +56,52 @@ class Server(AuthorizationEndpoint, IntrospectEndpoint, TokenEndpoint,
:param kwargs: Extra parameters to pass to authorization-,
token-, resource-, and revocation-endpoint constructors.
"""
- auth_grant = OAuth2AuthorizationCodeGrant(request_validator)
- implicit_grant = OAuth2ImplicitGrant(request_validator)
- password_grant = ResourceOwnerPasswordCredentialsGrant(
+ self.auth_grant = OAuth2AuthorizationCodeGrant(request_validator)
+ self.implicit_grant = OAuth2ImplicitGrant(request_validator)
+ self.password_grant = ResourceOwnerPasswordCredentialsGrant(
request_validator)
- credentials_grant = ClientCredentialsGrant(request_validator)
- refresh_grant = RefreshTokenGrant(request_validator)
- openid_connect_auth = AuthorizationCodeGrant(request_validator)
- openid_connect_implicit = ImplicitGrant(request_validator)
- openid_connect_hybrid = HybridGrant(request_validator)
+ self.credentials_grant = ClientCredentialsGrant(request_validator)
+ self.refresh_grant = RefreshTokenGrant(request_validator)
+ self.openid_connect_auth = AuthorizationCodeGrant(request_validator)
+ self.openid_connect_implicit = ImplicitGrant(request_validator)
+ self.openid_connect_hybrid = HybridGrant(request_validator)
- bearer = BearerToken(request_validator, token_generator,
+ self.bearer = BearerToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
- jwt = JWTToken(request_validator, token_generator,
+ self.jwt = JWTToken(request_validator, token_generator,
token_expires_in, refresh_token_generator)
- auth_grant_choice = AuthorizationCodeGrantDispatcher(default_grant=auth_grant, oidc_grant=openid_connect_auth)
- implicit_grant_choice = ImplicitTokenGrantDispatcher(default_grant=implicit_grant, oidc_grant=openid_connect_implicit)
+ self.auth_grant_choice = AuthorizationCodeGrantDispatcher(default_grant=self.auth_grant, oidc_grant=self.openid_connect_auth)
+ self.implicit_grant_choice = ImplicitTokenGrantDispatcher(default_grant=self.implicit_grant, oidc_grant=self.openid_connect_implicit)
# See http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html#Combinations for valid combinations
# internally our AuthorizationEndpoint will ensure they can appear in any order for any valid combination
AuthorizationEndpoint.__init__(self, default_response_type='code',
response_types={
- 'code': auth_grant_choice,
- 'token': implicit_grant_choice,
- 'id_token': openid_connect_implicit,
- 'id_token token': openid_connect_implicit,
- 'code token': openid_connect_hybrid,
- 'code id_token': openid_connect_hybrid,
- 'code id_token token': openid_connect_hybrid,
- 'none': auth_grant
+ 'code': self.auth_grant_choice,
+ 'token': self.implicit_grant_choice,
+ 'id_token': self.openid_connect_implicit,
+ 'id_token token': self.openid_connect_implicit,
+ 'code token': self.openid_connect_hybrid,
+ 'code id_token': self.openid_connect_hybrid,
+ 'code id_token token': self.openid_connect_hybrid,
+ 'none': self.auth_grant
},
- default_token_type=bearer)
+ default_token_type=self.bearer)
- token_grant_choice = AuthorizationTokenGrantDispatcher(request_validator, default_grant=auth_grant, oidc_grant=openid_connect_auth)
+ self.token_grant_choice = AuthorizationTokenGrantDispatcher(request_validator, default_grant=self.auth_grant, oidc_grant=self.openid_connect_auth)
TokenEndpoint.__init__(self, default_grant_type='authorization_code',
grant_types={
- 'authorization_code': token_grant_choice,
- 'password': password_grant,
- 'client_credentials': credentials_grant,
- 'refresh_token': refresh_grant,
+ 'authorization_code': self.token_grant_choice,
+ 'password': self.password_grant,
+ 'client_credentials': self.credentials_grant,
+ 'refresh_token': self.refresh_grant,
},
- default_token_type=bearer)
+ default_token_type=self.bearer)
ResourceEndpoint.__init__(self, default_token='Bearer',
- token_types={'Bearer': bearer, 'JWT': jwt})
+ token_types={'Bearer': self.bearer, 'JWT': self.jwt})
RevocationEndpoint.__init__(self, request_validator)
IntrospectEndpoint.__init__(self, request_validator)
UserInfoEndpoint.__init__(self, request_validator)