summaryrefslogtreecommitdiff
path: root/oauthlib/oauth1/rfc5849
Commit message (Collapse)AuthorAgeFilesLines
* OAuth 1.0a signature methods: RSA-SHA256, RSA-SHA512 and HMAC-SHA512 (#723)Hoylen Sue2020-06-033-404/+581
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Adding support for RSA-SHA256. * Added support for HMAC-SHA512, RSA-SHA256 and RSA-SHA512 signature methods. * Made version dependencies consistent. * Updated OAuth1 signature tests. * Fixed parsing of netloc/host. Deprecated old functions. * Refactored and expanded tests to include signature validate. * Update docs for HMAC-SHA512, RSA-SHA256 and RSA-SHA512 signature methods. * Updated code comments in oauth1 signatures module. * Updated changelog. * Update docs/feature_matrix.rst Co-Authored-By: Omer Katz <omer.drow@gmail.com> * Used parenthesis instead of backslash to break lines. * Fixed typo Co-authored-by: Omer Katz <omer.drow@gmail.com> Co-authored-by: Omer Katz <omer.drow@gmail.com>
* Remove Python 2 codes (#734)Asif Saif Uddin2020-05-126-6/+0
| | | | | | | | | * Update setup.py * remove un needed python 2 codes * remove un needed python 2 codes * remove un needed python 2 codes
* Fixed sorted import for < py37Anton Ruhlov2020-04-102-2/+3
|
* Sorted oauthlib imports per isort 4.3.21Anton Ruhlov2020-04-109-21/+26
|
* Merge branch 'master' into rm-2.7Omer Katz2019-08-291-2/+2
|\
| * Fix tests for OAuth1 signature basestring generation, to better align with ↵Ashley Sommer2019-08-141-2/+2
| | | | | | | | | | | | examples and expected results set out in the RFC doc. Fixes https://github.com/oauthlib/oauthlib/issues/695
* | The future is nowHugo2019-08-1514-27/+0
| |
* | Drop support for legacy Python 2.7Hugo2019-08-155-22/+5
| |
* | Upgrade Python syntax with pyupgradeHugo2019-08-158-21/+21
| |
* | Drop support for legacy Python 2.7Hugo2019-08-152-7/+6
|/
* add HMAC-SHA256 signature validationHamish Moffatt2019-07-252-2/+35
|
* Add case-insensitive headers to oauth1 BaseEndpointJordan Gardner2019-05-011-2/+2
|
* Renamed construct_base_string to signature_base_string.Hoylen Sue2019-02-222-10/+15
|
* Renamed normalize_base_string_uri to base_string_uri.Hoylen Sue2019-02-211-2/+1
|
* Fixed space encoding in base string URI used in the signature base string.Hoylen Sue2019-02-191-7/+31
|
* Update comments regarding OAuth Request Body Hash. (#628)Omer Katz2018-12-131-1/+3
|
* Remove unnecessary workaround for bytes typeJon Dufresne2018-09-143-8/+3
| | | | | | | The type 'bytes' is available on all supported Pythons. Likewise the byte literal b'...' is available on all supported Pythons. Use idiomatic Python and remove workaround for an issue that no longer exists. Makes the code more forward compatible with Python 3.
* redid the docstring fixesjonathan vanasco2018-09-104-26/+52
|
* Ignore Python 2.7 fallback branch.Omer Katz2018-05-201-1/+1
|
* Rtd docs fix (#515)Jonathan Huot2018-02-289-66/+66
| | | | | | | | | | | | | | | | | | | | | | * Added sphinx build for developers Rationale is to build docs locally to prevent RTD to break later. * Replace manual sphinx into make * Renamed idan URL to oauthlib community * Renamed http into https URLs since http is returning 302 * python requests library renamed its home URL * Add ignore list for "make linkcheck" linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account * virtualenv changed its homepage and website. * Fixed broken link
* Add support for HMAC-SHA256 (builds on PR#388) (#498)Viktor Haag2017-11-142-4/+64
| | | | | | | | | | | | * Add support for HMAC-SHA256 * Add explicit declaration of HMAC-SHA1 and point HMAC at it To avoid confusion, HMAC constant name should explicitly state which SHA variant is used, but for backwards compatibility, SIGNATURE_HMAC is still needed * add support for HMAC-SHA256 including tests and comments * constructor tests verify client built with correct signer method
* Sorted imports.Omer Katz2017-09-1712-21/+25
|
* Fixed default get_default_realms to raise NotImplementedError.Hoylen Sue2017-08-011-1/+1
|
* Extra logging if verification fails because of timestamp/nonce.Hoylen Sue2017-08-011-1/+1
|
* Only log signature base string when verification fails.Hoylen Sue2017-08-011-5/+6
|
* Extra logging for verifying signatures.Hoylen Sue2017-08-012-4/+17
|
* Include function names for NotImplementedError exceptions.Hoylen Sue2017-08-011-24/+33
|
* Extra logging for verification failures.Hoylen Sue2017-08-011-0/+1
|
* Fix BytesWarning issued when using a string placeholder for bytes objectJon Dufresne2017-04-161-1/+1
| | | | | | When running tests, fixes warnings of the form: .../oauthlib/oauthlib/oauth1/rfc5849/utils.py:56: BytesWarning: str() on a bytes instance
* Use a more grep-able variable nameSteven Huwig2017-01-091-4/+4
|
* Add log statements to except clausesSteven Huwig2017-01-051-2/+6
|
* scrubbing rsa_key from __repr__Brian Weber2016-10-211-0/+1
|
* Merge pull request #376 from jvanasco/fix-docstring_invalidateOmer Katz2015-08-161-1/+1
|\ | | | | fixed docsting on `invalidate_request_token`
| * fixed docsting on `invalidate_request_token`jonathan vanasco2015-08-111-1/+1
| |
* | adding validator_log to store what the endpoint computedjonathan vanasco2015-08-124-0/+26
|/
* Python3 fix: encodes request body before hashingChris McGraw2015-08-041-2/+2
| | | | | In python 3 hashlib works on bytestrings, so we need to encode arguments to most, if not all, hashing functions.
* Merge pull request #316 from spronin/masterOmer Katz2015-07-191-1/+12
|\ | | | | Providing `oauth_body_hash` for bodies on non-form-encoded requests
| * Providing `oauth_body_hash` for bodies on non-form-encoded requestsSergey Pronin2015-02-141-1/+12
| |
* | Merge pull request #328 from bootandy/patch-1Omer Katz2015-07-191-1/+1
|\ \ | | | | | | Error description in InvalidRequestError should be oauth1 not oauth2
| * | InvalidRequestError is oauth1 not oauth2andy boot2015-03-031-1/+1
| |/
* | Check for rsa_key when it's actually neededDavid Baumgold2015-05-062-4/+2
| |
* | Support newer PyJWT (1.0.0). remove PyCrypto completely for cryptography and ↵Joseph Tate2015-04-141-17/+24
| | | | | | | | PyJWT helpers. Reformat some test certificates to be easier to maintain. Update documentation to match use of cryptography instead of PyCrypto
* | Merge pull request #298 from techtonik/patch-1Ib Lundgren2015-04-021-2/+0
|\ \ | | | | | | Fix docs - python-rsa is not used
| * | Fix docs - python-rsa is not usedanatoly techtonik2014-11-171-2/+0
| |/
* | Oauth1 signing: fix error message on invalid Content-Type headerBruno Cauet2015-03-111-1/+3
|/ | | | | | | | Content-Type should be application/x-www-form-urlencoded when the request to sign has a body. If it's not the case a ValueError was raised saying Content-Type was missing, while it actually could just be wrongly set (e.g. to application/json). Fix the error message to reflect the real problem: expected & given Content-Type.
* Auto pep8 changes throughout the code base.Ib Lundgren2014-09-2411-110/+135
|
* Fix error message init and add request details.Ib Lundgren2014-09-241-1/+7
| | | | | | Errors were not initialised and thus no message would be included. Changed to now include the error label, description and request details.
* Change logging namespace to a tiered one.Ib Lundgren2014-09-245-5/+17
| | | | | | | Rather than have all logging under oauthlib we now have it per file using __name__. Users who wish to enable or disable all logging can still do so by enabling or disabling the oauthlib logging namespace.
* Create Signature Only OAuth1 EndpointRyan Hiebert2014-09-113-0/+77
| | | | | | | | | | | | | | In certain cases a provider may wish to verify the signature of an oauth request without doing anything more with it. Learning Tools Interoperability (LTI), for example, uses "0-legged OAuth" for it's signature verification process. http://www.imsglobal.org/lti/ http://andyfmiller.com/2013/02/10/does-lti-use-oauth/ This adds a new ``SignatureOnlyEndpoint`` that implements only the client validation and signature verification, and leaves off the other parts that would need to be validated.
* enable convinient import for oauth1 errorsIlya Verbitskiy2014-08-041-2/+2
|