summaryrefslogtreecommitdiff
path: root/oauthlib
Commit message (Collapse)AuthorAgeFilesLines
* Merge branch 'master' into 613-oidc-dispatcher613-oidc-dispatcherJonathan Huot2018-11-233-0/+195
|\
| * Allow custom provider to override oauthlib valuesoauth-metadataJonathan Huot2018-11-211-6/+8
| | | | | | | | See https://github.com/oauthlib/oauthlib/pull/605#discussion_r234438151
| * Merge branch 'master' into oauth-metadataOmer Katz2018-11-011-1/+1
| |\
| * | Initial OAuth Authorization Server Metadata RFC8414Jonathan Huot2018-10-253-0/+193
| | |
* | | Replaced distinct classes by a more unified one.Jonathan Huot2018-11-202-25/+30
| | | | | | | | | | | | "default_grant" and "oidc_grant" must be two generic attributes of OpenID Connect Dispatcher. We should not leave each Dispatcher implementation have this own attributes names.
* | | Import OIDC main classes identically than OAuth2Jonathan Huot2018-11-202-0/+20
| |/ |/| | | | | import oauthlib.oauth2.Server must be replaced with oauthlib.openid.Server
* | Wrong Client is also a FatalClientError (#608)Jonathan Huot2018-11-011-1/+1
|/ | | FatalClientError is it SHOULD NOT be redirected to client (redirect_uri), but MUST be redirected to USERS (error_uri).
* Bump version to prepare 3.0.0Jonathan Huot2018-10-051-1/+1
|
* Merge branch 'master' into fix-585_client_idJonathan Huot2018-09-214-18/+22
|\
| * Fix OIDC tests (#565)Pieter Ennes2018-09-213-17/+19
| | | | | | | | | | | | | | | | | | | | | | | | * Unmute ignored OIDC tests. * Fix more import errors. * Remove recently invalidated test for id_token_hint. * Fix tested grants. * Fix import on py27.
| * fixup! `invalid_grant` status code should be 400Free Duerinckx2018-09-201-0/+2
| |
| * Merge branch 'master' into invalid-grant-should-respond-with-400Omer Katz2018-09-2020-176/+398
| |\
| * \ Merge branch 'master' into invalid-grant-should-respond-with-400Jonathan Huot2018-08-132-0/+6
| |\ \
| * \ \ Merge branch 'master' into invalid-grant-should-respond-with-400Jonathan Huot2018-08-122-2/+2
| |\ \ \
| * | | | `invalid_grant` status code should be 400Free Duerinckx2018-07-041-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | According to section 5.2 of rfc 6749 (https://tools.ietf.org/html/rfc6749#section-5.2) A server should respond with 400 in case of an invalid grant. The given grant is invalid and the client should give other data. A 401 is not applicable here because the client is required to give a suitable Authorization header field which doesn't make any sense if you are trying to acquire a grant authentication. According to sections 10.4.1 and 10.4.2 of rfc 2616 (https://tools.ietf.org/html/rfc2616#section-10.4.1)
* | | | | * changed "function definition" to "function signature" in two docstringsjonathan vanasco2018-09-202-14/+21
| | | | | | | | | | | | | | | | | | | | | | | | | * fixed some formatting issues in `prepare_token_request` docstring * slightly altered `prepare_token_request` in handling nontruthy values for `client_secret`.
* | | | | Merge branch 'fix-585_client_id' of github.com:jvanasco/oauthlib into ↵jonathan vanasco2018-09-175-16/+21
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | fix-585_client_id
| * \ \ \ \ Merge branch 'master' into fix-585_client_idJonathan Huot2018-09-175-16/+21
| |\ \ \ \ \ | | | |_|_|/ | | |/| | |
| | * | | | Merge branch 'master' into 431-customexceptionJonathan Huot2018-09-1520-157/+375
| | |\ \ \ \
| | | * | | | Remove unnecessary workaround for bytes typeJon Dufresne2018-09-144-16/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The type 'bytes' is available on all supported Pythons. Likewise the byte literal b'...' is available on all supported Pythons. Use idiomatic Python and remove workaround for an issue that no longer exists. Makes the code more forward compatible with Python 3.
| | * | | | | Fixed py27/pypy supportJonathan Huot2018-09-101-1/+1
| | | | | | |
| | * | | | | Add support of custom errors coming from providersJonathan Huot2018-09-101-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Fix #431. The inherent function "raise_from_error" is called when "error=" is found in the payload. So it MUST raise something, and until now, only RFC errors were raised.
* | | | | | | migrated `include_client_id` to `prepare_request_token`jonathan vanasco2018-09-175-11/+70
|/ / / / / /
* | | | | | * added support for empty strings of `client_secret`jonathan vanasco2018-09-172-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | * added LegacyApplicationClient tests to ensure the grant supports a variety of allowed methods
* | | | | | standardized some test valuesjonathan vanasco2018-09-141-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | integrated against requests_oauthlib idea
* | | | | | * addresing ticket #585jonathan vanasco2018-09-136-15/+42
| |/ / / / |/| | | | | | | | | | | | | | | | | | | | | | | | * `prepare_request_body` client_id is deprecated in favor of include_client_id * a new unit test `test_prepare_request_body` is added to ensure conformity of several use cases * the docstrings for the `body` param have been consolidated and standardized across multiple functions linked to `prepare_request_body` for clarity
* | | | | fixed spacingjonathan vanasco2018-09-111-1/+1
| | | | |
* | | | | cleanup on docs fixesjonathan vanasco2018-09-1111-44/+53
| | | | |
* | | | | redid the docstring fixesjonathan vanasco2018-09-1014-115/+331
|/ / / /
* | | | Merge branch 'master' into masterJonathan Huot2018-09-073-14/+11
|\ \ \ \
| * | | | Make scope optional for authorization code grant.Theron Luhn2018-09-021-12/+0
| | | | |
| * | | | Merge branch 'master' into 445_confirm_redirectJonathan Huot2018-08-201-1/+0
| |\ \ \ \
| | * | | | Remove headers from request attributesJonathan Huot2018-08-181-1/+0
| | | | | |
| * | | | | Merge branch 'master' into 445_confirm_redirect445_confirm_redirectJonathan Huot2018-08-201-1/+0
| |\ \ \ \ \ | | |/ / / /
| | * | | | client_id is not passed to save_bearer_token234-fixdocJonathan Huot2018-08-161-1/+0
| | | |_|/ | | |/| |
| * | | | Merge branch 'master' into 445_confirm_redirectJonathan Huot2018-08-154-2/+8
| |\ \ \ \ | | |/ / /
| * | | | Call get_default_redirect_uri if no redirect_uri in token reqJonathan Huot2018-07-301-0/+11
| | |/ / | |/| |
* | | | Merge branch 'master' into masterJonathan Huot2018-08-122-0/+6
|\ \ \ \ | | |/ / | |/| |
| * | | Merge branch 'master' into get_default_redirJonathan Huot2018-08-123-2/+6
| |\ \ \
| | * \ \ Merge branch 'master' into 569_expires_in_implicitJonathan Huot2018-08-122-2/+2
| | |\ \ \ | | | | |/ | | | |/|
| | * | | Implicit was not converting expires_in into integersJonathan Huot2018-08-061-0/+4
| | | |/ | | |/|
| * | | Add syntax check of get_default_redirect_uriJonathan Huot2018-07-301-0/+2
| |/ / | | | | | | | | | Authorization Code was missing this check, whereas Implicit was checking it.
* | | Merge branch 'master' into masterPieter Ennes2018-08-125-14/+12
|\ \ \ | | |/ | |/|
| * | $ and ' are allowed to be unencoded in query strings (#564)Chris Utz2018-08-121-1/+1
| | |
| * | Added credits to Idan & team.Jonathan Huot2018-08-101-1/+1
| |/
| * The id_token_hint parameter isn't required by the OIDC spec. (#559)Pieter Ennes2018-07-021-6/+0
| |
| * Remove handling of nonstandard parameter "expires" (#506)Seth Davis2018-06-301-5/+2
| |
| * Update save_bearer_token docs to mention how the token is passed in as a ↵claweyenuk2018-06-301-1/+8
| | | | | | | | reference (#556)
* | Merge branch 'master' into masterJonathan Huot2018-06-2624-387/+981
|\ \ | |/
| * OpenID Connect split (#525)Wiliam Souza2018-06-0520-355/+761
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add command to clean up builds to makefile * Fix docs strings for endpoints pre_configured * Chnage grant_types.openid_connect to include a deprecation warning be a backward compatible * Fix doc string for rfc6749.request_validator * Remove unused import * Change import to be explicity * Move JWTTokenTestCase to openid.connect.core.test_token * Move JWTToken to oauthlib.openid.connect.core.tokens * Move to openid connect test * Move openid connect exceptions to its own file * Remove openid connect from oauth2 server * Remove JWTToken from oauth tokens * Remove grant_types.openid_connect file * Add oauthlib/openid estructure and tests