summaryrefslogtreecommitdiff
path: root/oauthlib/oauth1/__init__.py
Commit message (Collapse)AuthorAgeFilesLines
* Fixed isort importsDariusz Smigiel2022-06-161-20/+15
| | | | | tox runs isort, whicn pointed multiple errors. Fixed them in this PR
* OAuth 1.0a signature methods: RSA-SHA256, RSA-SHA512 and HMAC-SHA512 (#723)Hoylen Sue2020-06-031-13/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Adding support for RSA-SHA256. * Added support for HMAC-SHA512, RSA-SHA256 and RSA-SHA512 signature methods. * Made version dependencies consistent. * Updated OAuth1 signature tests. * Fixed parsing of netloc/host. Deprecated old functions. * Refactored and expanded tests to include signature validate. * Update docs for HMAC-SHA512, RSA-SHA256 and RSA-SHA512 signature methods. * Updated code comments in oauth1 signatures module. * Updated changelog. * Update docs/feature_matrix.rst Co-Authored-By: Omer Katz <omer.drow@gmail.com> * Used parenthesis instead of backslash to break lines. * Fixed typo Co-authored-by: Omer Katz <omer.drow@gmail.com> Co-authored-by: Omer Katz <omer.drow@gmail.com>
* Remove Python 2 codes (#734)Asif Saif Uddin2020-05-121-1/+0
| | | | | | | | | * Update setup.py * remove un needed python 2 codes * remove un needed python 2 codes * remove un needed python 2 codes
* Sorted oauthlib imports per isort 4.3.21Anton Ruhlov2020-04-101-8/+13
|
* The future is nowHugo2019-08-151-2/+0
|
* Add support for HMAC-SHA256 (builds on PR#388) (#498)Viktor Haag2017-11-141-1/+1
| | | | | | | | | | | | * Add support for HMAC-SHA256 * Add explicit declaration of HMAC-SHA1 and point HMAC at it To avoid confusion, HMAC constant name should explicitly state which SHA variant is used, but for backwards compatibility, SIGNATURE_HMAC is still needed * add support for HMAC-SHA256 including tests and comments * constructor tests verify client built with correct signer method
* Changed all implicit imports * with explicit classes importsTiziano Perrucci2017-03-081-1/+1
|
* Create Signature Only OAuth1 EndpointRyan Hiebert2014-09-111-1/+1
| | | | | | | | | | | | | | In certain cases a provider may wish to verify the signature of an oauth request without doing anything more with it. Learning Tools Interoperability (LTI), for example, uses "0-legged OAuth" for it's signature verification process. http://www.imsglobal.org/lti/ http://andyfmiller.com/2013/02/10/does-lti-use-oauth/ This adds a new ``SignatureOnlyEndpoint`` that implements only the client validation and signature verification, and leaves off the other parts that would need to be validated.
* enable convinient import for oauth1 errorsIlya Verbitskiy2014-08-041-0/+1
|
* Move docstrings above `from __future__` imports.Kirill Spitsin2014-04-151-2/+1
| | | | | | Docstrings are considered as such by python only if they are the first statement in the file/block. Even if they are preceded by a `from __future__` import they are interpreted as just a string.
* Convenience imports for the new OAuth 1 provider.Ib Lundgren2013-06-181-1/+5
|
* Import constants in oauth1 from rfcIb Lundgren2012-11-181-1/+3
|
* Support Python 3Michael Terry2012-08-311-1/+1
| | | | | | These are mostly unicode string related changes and a few syntax ones. https://github.com/idan/oauthlib/issues/55
* Restructuring to provide parity between code/tests, oauth1/oauth2.David Gouldin2012-04-071-0/+13