summaryrefslogtreecommitdiff
path: root/oauthlib/oauth2
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch 'master' into 431-customerrors431-customerrorsJonathan Huot2018-08-0214-561/+370
|\
| * Remove handling of nonstandard parameter "expires" (#506)Seth Davis2018-06-301-5/+2
| |
| * Update save_bearer_token docs to mention how the token is passed in as a ↵claweyenuk2018-06-301-1/+8
| | | | | | | | reference (#556)
| * OpenID Connect split (#525)Wiliam Souza2018-06-057-634/+37
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add command to clean up builds to makefile * Fix docs strings for endpoints pre_configured * Chnage grant_types.openid_connect to include a deprecation warning be a backward compatible * Fix doc string for rfc6749.request_validator * Remove unused import * Change import to be explicity * Move JWTTokenTestCase to openid.connect.core.test_token * Move JWTToken to oauthlib.openid.connect.core.tokens * Move to openid connect test * Move openid connect exceptions to its own file * Remove openid connect from oauth2 server * Remove JWTToken from oauth tokens * Remove grant_types.openid_connect file * Add oauthlib/openid estructure and tests
| * Merge branch 'master' into oauth2-introspectPieter Ennes2018-05-2619-128/+258
| |\
| | * Add missing NotImplementedError (#499)Grey Li2018-05-261-0/+1
| | |
| | * Check that the Bearer header is properly formatted (#491)Mattia Procopio2018-05-261-15/+25
| | |
| | * Backward compatibility fix for requests-oauthlib. (#546)Pieter Ennes2018-05-183-6/+12
| | |
| | * Avoid populating spurious token credentials (#542)Pieter Ennes2018-05-083-9/+14
| | |
| | * Fixed some copy and paste typos (#535)paulie42018-04-131-2/+2
| | | | | | | | | Fixed some copy and paste typos, see issue #532.
| | * Add request argument to confirm_redirect_uri (#504) (#504)Jimmy Thrasibule2018-04-132-2/+3
| | |
| | * Rtd docs fix (#515)Jonathan Huot2018-02-2817-103/+103
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Added sphinx build for developers Rationale is to build docs locally to prevent RTD to break later. * Replace manual sphinx into make * Renamed idan URL to oauthlib community * Renamed http into https URLs since http is returning 302 * python requests library renamed its home URL * Add ignore list for "make linkcheck" linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account * virtualenv changed its homepage and website. * Fixed broken link
| | * Openid connect jwt (#488)Wiliam Souza2018-01-304-6/+113
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add JWT token with it the server knows how to validate this new type of token in resource requests * Change find_token_type sorted function to reverse result and choose the valued estimated token handler * Add validate_id_token method to RequestValidator * Added unittest for JWTToken model * Updated version of Mock * Add get_jwt_bearer_token and validate_jwt_bearer_token oauthlib.oauth2.RequestValidator and change oauthlib.oauth2.tokens JWTToken to use it * Change to improve token type estimate test * Add a note in RequestValidator.validate_jwt_bearer_token about error 5xx rather 4xx
| | * Fix cliend_id in web request body (#505)Antoine Bertin2018-01-291-1/+1
| | | | | | | | | | | | | | | | | | Previously, cliend_id was always included in the request body in the Authorization Code flow and the client_id parameter was ignored in contradiction with the docs. Fixes #495
| * | Improved doc by adding links to RFC and list of claims.Jonathan Huot2017-12-191-5/+25
| | |
| * | Added default supported_token_types for MobileJonathan Huot2017-12-191-1/+2
| | |
| * | Added initial introspect supportJonathan Huot2017-12-186-11/+175
| |/
| * Check access token in self.token dict (#500)Grey Li2017-11-141-1/+1
| | | | | | | | | | | | * Check access token in self.token dict * fix typo
| * Refactor OAuth2ErrorHsiaoming Yang2017-10-181-6/+14
| |
| * OpenID connect improvements (#484)Wiliam Souza2017-10-015-24/+122
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Change create_token_response to only save access_token when it's present in request.response_type * Remove unused import, fix indentation and improve comment * Fix AuthorizationEndpoint response_type for OpenID Connect hybrid flow * Add new ImplicitTokenGrantDispatcher Changes AuthorizationEndpoint response_type `'token'`, `'id_token'` and `'id_token token'` to work with OpenID Connect and OAuth2 implicit flow in a transparent way * Add new AuthTokenGrantDispatcher Change AuthorizationEndpoint grant_types `'authorization_code'` to work with OpenID Connect and OAuth2 authorization flow in a transparent way * Change tests to include required client_id and redirect_uri * Remove AuthorizationEndpoint grant_types `'openid'` Now OpenID Connect and OAuth2 authorization flow can use `authorization_code` in a transparent way * Add sone blank lines and fix indentation * Change AuthorizationEndpoint grant type id_token and id_token token to use openid_connect_implicit direct * Change default empty value to None and fix a typo * Add assert called to AuthTokenGrantDispatcher tests * Add request to get_authorization_code_scopes
* | Fixed py27/pypy supportJonathan Huot2018-08-021-1/+1
| |
* | Add support of custom errors coming from providersJonathan Huot2018-08-021-0/+11
| | | | | | | | Fix #431. The inherent function "raise_from_error" is called when "error=" is found in the payload. So it MUST raise something, and until now, only RFC errors were raised.
* | Make populate attributes API public.Pieter Ennes2018-05-213-6/+12
| | | | | | | | (cherry picked from commit 0b6f7e2)
* | Avoid populating spurious token credentials (#542)Pieter Ennes2018-05-183-9/+14
| | | | | | | | (cherry picked from commit 657065d)
* | Fixed some copy and paste typos (#535)paulie42018-04-231-2/+2
| | | | | | | | | | | | Fixed some copy and paste typos, see issue #532. (cherry picked from commit 1b3498a)
* | Add request argument to confirm_redirect_uri (#504) (#504)Jimmy Thrasibule2018-04-232-2/+3
| | | | | | | | (cherry picked from commit d49b9f0)
* | Rtd docs fix (#515)Jonathan Huot2018-03-0917-103/+103
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Added sphinx build for developers Rationale is to build docs locally to prevent RTD to break later. * Replace manual sphinx into make * Renamed idan URL to oauthlib community * Renamed http into https URLs since http is returning 302 * python requests library renamed its home URL * Add ignore list for "make linkcheck" linkcheck is doing requests to github with anonymous access, however creating an issue require an logged-in account * virtualenv changed its homepage and website. * Fixed broken link (cherry picked from commit 32e5ad1)
* | Check access token in self.token dict (#500)Grey Li2018-03-091-1/+1
| | | | | | | | | | | | | | | | * Check access token in self.token dict * fix typo (cherry picked from commit fa0b63c)
* | Refactor OAuth2ErrorHsiaoming Yang2017-10-201-6/+14
|/
* if `in_uri` is called and `response_mode` is not initialized an exception is ↵Mathias Mitterdorfer2017-09-221-0/+1
| | | | raised (used by Flask_OAuthlib)
* Add nonce to docstring.Pieter Ennes2017-09-171-0/+7
|
* Pass through nonce in code flow.Pieter Ennes2017-09-171-3/+2
|
* Fixed typo in imports.Omer Katz2017-09-171-1/+1
|
* Sorted imports.Omer Katz2017-09-1723-67/+67
|
* Merge pull request #468 from ThePrudents/fix-explicit-importOmer Katz2017-09-112-2/+2
|\ | | | | Changed all implicit imports * with explicit classes imports
| * Fix base importsTiziano Perrucci2017-03-081-1/+1
| |
| * Changed all implicit imports * with explicit classes importsTiziano Perrucci2017-03-082-2/+2
| |
* | Hybrid response types should be fragment-encoded.Pieter Ennes2017-07-291-0/+2
| |
* | switch to sending the MismatchingRedirectURIError insteadOren Mazor2017-06-141-1/+1
| |
* | return a more descriptive error when a redirect url is provided and it is wrongOren Mazor2017-06-141-1/+1
| |
* | Merge pull request #461 from skion/rfc6750-errorsOmer Katz2017-04-032-31/+66
|\ \ | | | | | | Add two error codes from RFC 6750
| * | Add two error codes from RFC 6750.Pieter Ennes2017-04-022-31/+66
| | |
* | | Improve prompt parameter validation.Pieter Ennes2017-04-021-11/+18
|/ / | | | | | | | | | | - Strip leading and trailng spaces. - Disallow prompt=none with other values as per spec. - Pass to credentials as a set.
* | Merge pull request #453 from kippandrew/fix-revocation-public-clientsOmer Katz2017-03-311-0/+4
|\ \ | | | | | | Public clients should be validated when revoking tokens
| * | Authenticate public clients before revocationAndy Kipp2016-12-061-0/+4
| | |
* | | Merge pull request #463 from skion/fragment-errorsOmer Katz2017-03-312-2/+7
|\ \ \ | | | | | | | | Redirect errors according to OIDC's response_mode.
| * | | Redirect errors according to response_mode.Pieter Ennes2017-02-212-2/+7
| | |/ | |/|
* | | Merge pull request #462 from skion/oidc-errorsOmer Katz2017-03-311-1/+43
|\ \ \ | | | | | | | | Add remaining OIDC errors
| * | | Fix typo in account_selection_required exception name.Pieter Ennes2017-02-141-1/+1
| | | |
| * | | Add missing OpenID Connect error codes.Pieter Ennes2017-02-141-0/+42
| |/ /