summaryrefslogtreecommitdiff
path: root/oauthlib/common.py
Commit message (Collapse)AuthorAgeFilesLines
* Fixed isort importsDariusz Smigiel2022-06-161-4/+2
| | | | | tox runs isort, whicn pointed multiple errors. Fixed them in this PR
* Remove Python 2 codes (#734)Asif Saif Uddin2020-05-121-1/+0
| | | | | | | | | * Update setup.py * remove un needed python 2 codes * remove un needed python 2 codes * remove un needed python 2 codes
* Sorted oauthlib imports per isort 4.3.21Anton Ruhlov2020-04-101-3/+4
|
* The future is nowHugo2019-08-151-2/+0
|
* Drop support for legacy Python 2.7Hugo2019-08-151-13/+4
|
* Upgrade Python syntax with pyupgradeHugo2019-08-151-8/+8
|
* Drop support for legacy Python 2.7Hugo2019-08-151-32/+9
|
* refactor to get_debugAbhishek Patel2019-04-231-2/+2
| | | | - Oauthlib's debug mode can be checked with method
* Add method to get/set debug flagAbhishek Patel2019-04-211-0/+3
| | | | | | - By default debug mode is always off - Debug mode turned on automatically for tests - Complete requests sanitized in non debug mode
* Combine multiple isinstance() calls to oneJon Dufresne2019-03-021-1/+1
|
* Initial OAuth2.0/PKCE Provider supportJonathan Huot2018-11-291-0/+3
|
* Remove unnecessary workaround for bytes typeJon Dufresne2018-09-141-8/+6
| | | | | | | The type 'bytes' is available on all supported Pythons. Likewise the byte literal b'...' is available on all supported Pythons. Use idiomatic Python and remove workaround for an issue that no longer exists. Makes the code more forward compatible with Python 3.
* Remove headers from request attributesJonathan Huot2018-08-181-1/+0
|
* $ and ' are allowed to be unencoded in query strings (#564)Chris Utz2018-08-121-1/+1
|
* Use secrets module in Python 3.6 and later (#533)Olaf Conradi2018-04-131-3/+8
| | | | | | | | | The secrets module should be used for generating cryptographically strong random numbers suitable for managing data such as passwords, account authentication, security tokens, and related secrets. In particularly, secrets should be used in preference to the default pseudo-random number generator in the random module, which is designed for modelling and simulation, not security or cryptography.
* Rtd docs fix (#515)Jonathan Huot2018-02-281-5/+5
| | | | | | | | | | | | | | | | | | | | | | * Added sphinx build for developers Rationale is to build docs locally to prevent RTD to break later. * Replace manual sphinx into make * Renamed idan URL to oauthlib community * Renamed http into https URLs since http is returning 302 * python requests library renamed its home URL * Add ignore list for "make linkcheck" linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account * virtualenv changed its homepage and website. * Fixed broken link
* Update proxy keys on CaseInsensitiveDict.update()Kevin Vance2017-02-231-0/+5
|
* Merge pull request #416 from joelstevenson/openid_connectOmer Katz2016-08-281-0/+12
|\ | | | | Openid connect
| * More wiring to get OpenID Connect code fully integrated.Joel Stevenson2016-04-191-0/+1
| |
| * First pass attempt at updating openid_connect branchJoel Stevenson2016-04-151-0/+11
| |
* | Cast body to a string to ensure that we can perform a regex substitution on itJacob Parry2016-05-161-1/+1
| |
* | Fix #422: Query strings should be able to include colonsRafał Furmański2016-05-091-1/+1
| |
* | Merge pull request #417 from bjmc/sanitize-loggingOmer Katz2016-04-281-4/+7
|\ \ | |/ |/| Improves sanitizing sensitive data from Request.__repr__
| * Better sanitizing for common.Request.__repr__Brendan McCollam2016-04-251-4/+7
| |
* | Allow `/` and `?` characters per RFC 3986 section 3.4 specification.eofs2016-03-111-1/+1
| | | | | | | | Fixes #404
* | Add request token for OAuth 1Hsiaoming Yang2015-11-131-0/+1
| |
* | Add ( and ) in urlencoded safe charactersJulien Meyer2015-08-181-1/+1
| |
* | adding validator_log to store what the endpoint computedjonathan vanasco2015-08-121-0/+1
| |
* | Add client_secret for RequestHsiaoming Yang2015-07-281-0/+1
|/
* add token_type_hint to the list of default Request paramsMassimiliano Pippi2015-07-201-0/+1
|
* Merge pull request #305 from artooro/patch-1Omer Katz2015-07-191-1/+1
|\ | | | | Allow ! character in query string
| * Allow ! character in query stringArthur Wiebe2015-01-131-1/+1
| | | | | | My app broke because there was a ! character in the query string. This small change fixed it for me.
* | Improve regex performance for invalid_hexHsiaoming Yang2015-07-031-2/+2
| |
* | Don't encode body twiceHsiaoming Yang2015-07-031-1/+1
| |
* | Fix when body is NoneHsiaoming Yang2015-07-021-1/+1
| |
* | Hide user password in repr of RequestHsiaoming Yang2015-07-021-1/+5
| |
* | #340 - add default param values to common.RequestKyle2015-05-241-2/+9
| |
* | #340 - provide default values for some params in common.RequestKyle2015-05-091-1/+9
| |
* | #340 - raise AttributeError from common.Request.__getattr__+ add testsKyle2015-05-091-1/+4
| |
* | Support newer PyJWT (1.0.0). remove PyCrypto completely for cryptography and ↵Joseph Tate2015-04-141-13/+3
|/ | | | PyJWT helpers. Reformat some test certificates to be easier to maintain. Update documentation to match use of cryptography instead of PyCrypto
* Add old commmon.log back.Ib Lundgren2014-10-271-0/+3
|
* fix add_params_to_uri() fragment bugdjpnewton2014-10-091-1/+1
| | | add_params_to_uri() ovewrites existing fragment when fragment parameter = true
* Auto pep8 changes throughout the code base.Ib Lundgren2014-09-241-7/+10
|
* Fix error message init and add request details.Ib Lundgren2014-09-241-0/+5
| | | | | | Errors were not initialised and thus no message would be included. Changed to now include the error label, description and request details.
* Change logging namespace to a tiered one.Ib Lundgren2014-09-241-15/+0
| | | | | | | Rather than have all logging under oauthlib we now have it per file using __name__. Users who wish to enable or disable all logging can still do so by enabling or disabling the oauthlib logging namespace.
* Allow unescaped @ in urlencoded parametersRyan Hiebert2014-08-241-1/+1
| | | | | | | | At least Internet Explorer does not url encode the @ symbol, such as when in an email address, in it's form uploading from HTML. Since the @ symbol doesn't have any special meaning in the querystring of a URL, not encoding it shouldn't present any problems. Thus, we should add @ to the list of allowed characters in form urlencoded data.
* Set default encoding type to UTF-8 for to_unicode.Ib Lundgren2014-05-281-1/+1
|
* Improve urldecode error message on incorrectly encoded strings. CC #227.Ib Lundgren2014-05-281-1/+6
|
* Move docstrings above `from __future__` imports.Kirill Spitsin2014-04-151-2/+1
| | | | | | Docstrings are considered as such by python only if they are the first statement in the file/block. Even if they are preceded by a `from __future__` import they are interpreted as just a string.
* Changes per PR commentsjturmel2014-03-291-2/+2
| | | | | | | | * Rename methods from crypto to signed * Since generating a signed token to be used as a refresh token could be a bit overkill in terms of length/storage, allow setting of refresh token generator separately, or it defaults to whatever the other token generator was set to * Simplify tests per PR comments