Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Fixed isort imports | Dariusz Smigiel | 2022-06-16 | 1 | -4/+2 |
| | | | | | tox runs isort, whicn pointed multiple errors. Fixed them in this PR | ||||
* | Remove Python 2 codes (#734) | Asif Saif Uddin | 2020-05-12 | 1 | -1/+0 |
| | | | | | | | | | * Update setup.py * remove un needed python 2 codes * remove un needed python 2 codes * remove un needed python 2 codes | ||||
* | Sorted oauthlib imports per isort 4.3.21 | Anton Ruhlov | 2020-04-10 | 1 | -3/+4 |
| | |||||
* | The future is now | Hugo | 2019-08-15 | 1 | -2/+0 |
| | |||||
* | Drop support for legacy Python 2.7 | Hugo | 2019-08-15 | 1 | -13/+4 |
| | |||||
* | Upgrade Python syntax with pyupgrade | Hugo | 2019-08-15 | 1 | -8/+8 |
| | |||||
* | Drop support for legacy Python 2.7 | Hugo | 2019-08-15 | 1 | -32/+9 |
| | |||||
* | refactor to get_debug | Abhishek Patel | 2019-04-23 | 1 | -2/+2 |
| | | | | - Oauthlib's debug mode can be checked with method | ||||
* | Add method to get/set debug flag | Abhishek Patel | 2019-04-21 | 1 | -0/+3 |
| | | | | | | - By default debug mode is always off - Debug mode turned on automatically for tests - Complete requests sanitized in non debug mode | ||||
* | Combine multiple isinstance() calls to one | Jon Dufresne | 2019-03-02 | 1 | -1/+1 |
| | |||||
* | Initial OAuth2.0/PKCE Provider support | Jonathan Huot | 2018-11-29 | 1 | -0/+3 |
| | |||||
* | Remove unnecessary workaround for bytes type | Jon Dufresne | 2018-09-14 | 1 | -8/+6 |
| | | | | | | | The type 'bytes' is available on all supported Pythons. Likewise the byte literal b'...' is available on all supported Pythons. Use idiomatic Python and remove workaround for an issue that no longer exists. Makes the code more forward compatible with Python 3. | ||||
* | Remove headers from request attributes | Jonathan Huot | 2018-08-18 | 1 | -1/+0 |
| | |||||
* | $ and ' are allowed to be unencoded in query strings (#564) | Chris Utz | 2018-08-12 | 1 | -1/+1 |
| | |||||
* | Use secrets module in Python 3.6 and later (#533) | Olaf Conradi | 2018-04-13 | 1 | -3/+8 |
| | | | | | | | | | The secrets module should be used for generating cryptographically strong random numbers suitable for managing data such as passwords, account authentication, security tokens, and related secrets. In particularly, secrets should be used in preference to the default pseudo-random number generator in the random module, which is designed for modelling and simulation, not security or cryptography. | ||||
* | Rtd docs fix (#515) | Jonathan Huot | 2018-02-28 | 1 | -5/+5 |
| | | | | | | | | | | | | | | | | | | | | | | * Added sphinx build for developers Rationale is to build docs locally to prevent RTD to break later. * Replace manual sphinx into make * Renamed idan URL to oauthlib community * Renamed http into https URLs since http is returning 302 * python requests library renamed its home URL * Add ignore list for "make linkcheck" linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account * virtualenv changed its homepage and website. * Fixed broken link | ||||
* | Update proxy keys on CaseInsensitiveDict.update() | Kevin Vance | 2017-02-23 | 1 | -0/+5 |
| | |||||
* | Merge pull request #416 from joelstevenson/openid_connect | Omer Katz | 2016-08-28 | 1 | -0/+12 |
|\ | | | | | Openid connect | ||||
| * | More wiring to get OpenID Connect code fully integrated. | Joel Stevenson | 2016-04-19 | 1 | -0/+1 |
| | | |||||
| * | First pass attempt at updating openid_connect branch | Joel Stevenson | 2016-04-15 | 1 | -0/+11 |
| | | |||||
* | | Cast body to a string to ensure that we can perform a regex substitution on it | Jacob Parry | 2016-05-16 | 1 | -1/+1 |
| | | |||||
* | | Fix #422: Query strings should be able to include colons | Rafał Furmański | 2016-05-09 | 1 | -1/+1 |
| | | |||||
* | | Merge pull request #417 from bjmc/sanitize-logging | Omer Katz | 2016-04-28 | 1 | -4/+7 |
|\ \ | |/ |/| | Improves sanitizing sensitive data from Request.__repr__ | ||||
| * | Better sanitizing for common.Request.__repr__ | Brendan McCollam | 2016-04-25 | 1 | -4/+7 |
| | | |||||
* | | Allow `/` and `?` characters per RFC 3986 section 3.4 specification. | eofs | 2016-03-11 | 1 | -1/+1 |
| | | | | | | | | Fixes #404 | ||||
* | | Add request token for OAuth 1 | Hsiaoming Yang | 2015-11-13 | 1 | -0/+1 |
| | | |||||
* | | Add ( and ) in urlencoded safe characters | Julien Meyer | 2015-08-18 | 1 | -1/+1 |
| | | |||||
* | | adding validator_log to store what the endpoint computed | jonathan vanasco | 2015-08-12 | 1 | -0/+1 |
| | | |||||
* | | Add client_secret for Request | Hsiaoming Yang | 2015-07-28 | 1 | -0/+1 |
|/ | |||||
* | add token_type_hint to the list of default Request params | Massimiliano Pippi | 2015-07-20 | 1 | -0/+1 |
| | |||||
* | Merge pull request #305 from artooro/patch-1 | Omer Katz | 2015-07-19 | 1 | -1/+1 |
|\ | | | | | Allow ! character in query string | ||||
| * | Allow ! character in query string | Arthur Wiebe | 2015-01-13 | 1 | -1/+1 |
| | | | | | | My app broke because there was a ! character in the query string. This small change fixed it for me. | ||||
* | | Improve regex performance for invalid_hex | Hsiaoming Yang | 2015-07-03 | 1 | -2/+2 |
| | | |||||
* | | Don't encode body twice | Hsiaoming Yang | 2015-07-03 | 1 | -1/+1 |
| | | |||||
* | | Fix when body is None | Hsiaoming Yang | 2015-07-02 | 1 | -1/+1 |
| | | |||||
* | | Hide user password in repr of Request | Hsiaoming Yang | 2015-07-02 | 1 | -1/+5 |
| | | |||||
* | | #340 - add default param values to common.Request | Kyle | 2015-05-24 | 1 | -2/+9 |
| | | |||||
* | | #340 - provide default values for some params in common.Request | Kyle | 2015-05-09 | 1 | -1/+9 |
| | | |||||
* | | #340 - raise AttributeError from common.Request.__getattr__+ add tests | Kyle | 2015-05-09 | 1 | -1/+4 |
| | | |||||
* | | Support newer PyJWT (1.0.0). remove PyCrypto completely for cryptography and ↵ | Joseph Tate | 2015-04-14 | 1 | -13/+3 |
|/ | | | | PyJWT helpers. Reformat some test certificates to be easier to maintain. Update documentation to match use of cryptography instead of PyCrypto | ||||
* | Add old commmon.log back. | Ib Lundgren | 2014-10-27 | 1 | -0/+3 |
| | |||||
* | fix add_params_to_uri() fragment bug | djpnewton | 2014-10-09 | 1 | -1/+1 |
| | | | add_params_to_uri() ovewrites existing fragment when fragment parameter = true | ||||
* | Auto pep8 changes throughout the code base. | Ib Lundgren | 2014-09-24 | 1 | -7/+10 |
| | |||||
* | Fix error message init and add request details. | Ib Lundgren | 2014-09-24 | 1 | -0/+5 |
| | | | | | | Errors were not initialised and thus no message would be included. Changed to now include the error label, description and request details. | ||||
* | Change logging namespace to a tiered one. | Ib Lundgren | 2014-09-24 | 1 | -15/+0 |
| | | | | | | | Rather than have all logging under oauthlib we now have it per file using __name__. Users who wish to enable or disable all logging can still do so by enabling or disabling the oauthlib logging namespace. | ||||
* | Allow unescaped @ in urlencoded parameters | Ryan Hiebert | 2014-08-24 | 1 | -1/+1 |
| | | | | | | | | At least Internet Explorer does not url encode the @ symbol, such as when in an email address, in it's form uploading from HTML. Since the @ symbol doesn't have any special meaning in the querystring of a URL, not encoding it shouldn't present any problems. Thus, we should add @ to the list of allowed characters in form urlencoded data. | ||||
* | Set default encoding type to UTF-8 for to_unicode. | Ib Lundgren | 2014-05-28 | 1 | -1/+1 |
| | |||||
* | Improve urldecode error message on incorrectly encoded strings. CC #227. | Ib Lundgren | 2014-05-28 | 1 | -1/+6 |
| | |||||
* | Move docstrings above `from __future__` imports. | Kirill Spitsin | 2014-04-15 | 1 | -2/+1 |
| | | | | | | Docstrings are considered as such by python only if they are the first statement in the file/block. Even if they are preceded by a `from __future__` import they are interpreted as just a string. | ||||
* | Changes per PR comments | jturmel | 2014-03-29 | 1 | -2/+2 |
| | | | | | | | | * Rename methods from crypto to signed * Since generating a signed token to be used as a refresh token could be a bit overkill in terms of length/storage, allow setting of refresh token generator separately, or it defaults to whatever the other token generator was set to * Simplify tests per PR comments |