summaryrefslogtreecommitdiff
path: root/oauthlib/oauth2/__init__.py
Commit message (Collapse)AuthorAgeFilesLines
* Add support for device authorization flow (RFC8628) (#795)Mike Kelly2022-01-181-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | * rfc8628: Add client implementation for token retrieval This change adds an implementation of the Device Authorization flow client from RFC8628. The initial structure is derived from the existing BackendApplicationClient with the addition of the device_code in the client. This change does not provide the support necessary for querying the device code endpoint in order to generate the initial device_code and URL that is required for completing the full end to end device authorization process. * Add device token fetch URI generator In order to perform the full device authorization flow it's necessary to first generate the device code and get the authorization flow URL. prepare_request_uri() allows us to do this while providing scopes and additional parameters. * Remove encoding lines These lines are not required for python3
* Remove Python 2 codes (#734)Asif Saif Uddin2020-05-121-1/+0
| | | | | | | | | * Update setup.py * remove un needed python 2 codes * remove un needed python 2 codes * remove un needed python 2 codes
* Sorted oauthlib imports per isort 4.3.21Anton Ruhlov2020-04-101-23/+25
|
* The future is nowHugo2019-08-151-2/+0
|
* Initial OAuth Authorization Server Metadata RFC8414Jonathan Huot2018-10-251-0/+1
|
* OpenID Connect split (#525)Wiliam Souza2018-06-051-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add command to clean up builds to makefile * Fix docs strings for endpoints pre_configured * Chnage grant_types.openid_connect to include a deprecation warning be a backward compatible * Fix doc string for rfc6749.request_validator * Remove unused import * Change import to be explicity * Move JWTTokenTestCase to openid.connect.core.test_token * Move JWTToken to oauthlib.openid.connect.core.tokens * Move to openid connect test * Move openid connect exceptions to its own file * Remove openid connect from oauth2 server * Remove JWTToken from oauth tokens * Remove grant_types.openid_connect file * Add oauthlib/openid estructure and tests
* Added initial introspect supportJonathan Huot2017-12-181-0/+1
|
* Fixed typo in imports.Omer Katz2017-09-171-1/+1
|
* Changed all implicit imports * with explicit classes importsTiziano Perrucci2017-03-081-1/+1
|
* Convenience import of OAuth2TokenIb Lundgren2014-10-241-1/+1
|
* First step towards supporting JWT bearer grants.ibl2014-10-161-0/+1
| | | | | | | Initial support is only for clients and need more unit tests as well as real service tests. Server support to come later.
* Expose is_secure_transport publicly via ouathlib.oauth2.Ib Lundgren2014-06-041-0/+1
|
* Move docstrings above `from __future__` imports.Kirill Spitsin2014-04-151-2/+1
| | | | | | Docstrings are considered as such by python only if they are the first statement in the file/block. Even if they are preceded by a `from __future__` import they are interpreted as just a string.
* Draft 11 Token Revocation Endpoint.Ib Lundgren2013-09-171-0/+1
|
* Split OAuth2 large modules into smaller ones. #168.Ib Lundgren2013-05-301-9/+20
|
* Rename draft to rfc. Fix #75.Ib Lundgren2013-05-301-10/+10
|
* Wreaking havoc in the world of documentationIb Lundgren2013-03-021-1/+2
|
* Convenince import, new names previewIb Lundgren2013-02-231-1/+5
|
* OAuth 2 provider convenience importsIb Lundgren2013-02-051-1/+3
|
* OAuth2 provider endpointsIb Lundgren2012-11-171-1/+2
|
* Post merge fixIb Lundgren2012-10-231-1/+1
|\
| * Support Python 3Michael Terry2012-08-311-1/+1
| | | | | | | | | | | | These are mostly unicode string related changes and a few syntax ones. https://github.com/idan/oauthlib/issues/55
* | Adding initial set of authorization server tests against redirect uri ↵David Gouldin2012-09-071-1/+1
|/ | | | construction. Actual implementation is yet to be done so tests fail.
* Restructuring to provide parity between code/tests, oauth1/oauth2.David Gouldin2012-04-071-0/+13