summaryrefslogtreecommitdiff
path: root/oauthlib/oauth2/rfc6749/endpoints
Commit message (Expand)AuthorAgeFilesLines
* OAuth 1.0a signature methods: RSA-SHA256, RSA-SHA512 and HMAC-SHA512 (#723)Hoylen Sue2020-06-031-4/+4
* Remove Python 2 codes (#734)Asif Saif Uddin2020-05-129-9/+0
* Sorted oauthlib imports per isort 4.3.21Anton Ruhlov2020-04-106-22/+18
* Make grants public attributes of pre_configured server class (#613)Ivan Anishchuk2019-10-221-42/+42
* The future is nowHugo2019-08-159-18/+0
* Upgrade Python syntax with pyupgradeHugo2019-08-152-2/+2
* Drop support for legacy Python 2.7Hugo2019-08-151-2/+1
* Enforce POST HTTP method on TokenEndpoint, IntrospectEndpoint and RevocationE...Abhishek Patel2019-05-144-2/+28
* Ban all query parameters on Intropspection, Token and Revocation endpopointAbhishek Patel2019-05-141-8/+4
* Add tests + create a global variable for blacklisted query parametersAbhishek Patel2019-05-141-7/+9
* Add validation check for presence of forbidden query parameters in OAuth2 Tok...Abhishek Patel2019-05-144-1/+18
* Fix 644, Add tests for BasicAuth credentials for all endpoints (#645)Jonathan Huot2019-01-112-8/+8
* Merge branch 'master' into dry-up-codedry-up-codeJonathan Huot2018-12-201-9/+33
|\
| * Merge branch 'master' into add-metadata-docJonathan Huot2018-12-161-3/+28
| |\
| * | Add OAuth2.0 Authorization Server Metadata documentationJonathan Huot2018-12-131-9/+33
* | | Fix typo.Omer Katz2018-12-173-3/+3
* | | Merge branch 'master' into dry-up-codeOmer Katz2018-12-173-10/+42
|\ \ \ | | |/ | |/|
| * | Fixed OAuth2 Metadata when using PKCE and OIDC.Server601-pkce-supportJonathan Huot2018-12-141-1/+6
| * | Fixed typoJonathan Huot2018-12-131-1/+1
| * | Merge branch 'master' into 601-pkce-supportJonathan Huot2018-12-132-7/+14
| |\ \ | | |/
| | * Add Content-Type and Cache headers to introspect/revocation errorsJonathan Huot2018-12-132-7/+14
| | * Used WWW-Authenticate and auth-param values as RFC6750 described it.Jonathan Huot2018-12-122-6/+2
| | * Handle 401 with WWW-Authenticate. Moved wrong 401 into 400.Jonathan Huot2018-12-042-0/+4
| * | Add details on grant_type & implicit special case.Jonathan Huot2018-12-131-0/+12
| * | Replace temporary list by using clearer "extend" methodJonathan Huot2018-12-131-1/+1
| * | Add Server metadata test and fix metadata.Jonathan Huot2018-11-301-3/+9
| * | Add OAuth2 Provider Server Metadata for PKCE.Jonathan Huot2018-11-301-0/+2
| |/
* | Extract raising on unsupported token.Omer Katz2018-12-173-11/+10
* | Extract raising error on client auth failure.Omer Katz2018-12-173-21/+15
* | Raise error on missing token.Omer Katz2018-12-173-9/+11
|/
* Allow custom provider to override oauthlib valuesoauth-metadataJonathan Huot2018-11-211-6/+8
* Initial OAuth Authorization Server Metadata RFC8414Jonathan Huot2018-10-252-0/+192
* OpenID Connect split (#525)Wiliam Souza2018-06-051-32/+11
* Merge branch 'master' into oauth2-introspectPieter Ennes2018-05-265-11/+14
|\
| * Rtd docs fix (#515)Jonathan Huot2018-02-283-8/+8
| * Openid connect jwt (#488)Wiliam Souza2018-01-302-3/+6
* | Added default supported_token_types for MobileJonathan Huot2017-12-191-1/+2
* | Added initial introspect supportJonathan Huot2017-12-183-10/+153
|/
* OpenID connect improvements (#484)Wiliam Souza2017-10-011-8/+15
* Sorted imports.Omer Katz2017-09-175-15/+11
* Add two error codes from RFC 6750.Pieter Ennes2017-04-021-1/+1
* Authenticate public clients before revocationAndy Kipp2016-12-061-0/+4
* Normalize handling of request.scopes listJoel Stevenson2016-11-212-2/+12
* Test for membership should be "not in".Joel Stevenson2016-08-251-1/+1
* Move the claims handling into OpenIDConnectBase._inflate_claims() and a new A...Joel Stevenson2016-08-181-1/+4
* Reworking the handling of claims. @bjmc was quite right to question the hast...Joel Stevenson2016-05-062-16/+11
* Minor cleanupJoel Stevenson2016-05-021-2/+0
* Pairing with the previous commit, revert the change related to response_type ...Joel Stevenson2016-05-021-17/+5
* Use a single if statement in ResourceEndpoint.verify_request() claims checkJoel Stevenson2016-04-291-2/+1
* Parse request.claims in ResourceEndpoint.verify_request() when the token's sc...Joel Stevenson2016-04-291-1/+16