| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | Fixed isort imports | Dariusz Smigiel | 2022-06-16 | 1 | -1/+2 |
| | | | | | | tox runs isort, whicn pointed multiple errors. Fixed them in this PR | ||||
| * | chore: s/bode_code_verifier/body_code_verifier/g | kohki yamagiwa | 2022-05-15 | 1 | -2/+2 |
| | | |||||
| * | Allow non-HTTPS issuer when OAUTHLIB_INSECURE_TRANSPORT. (#803) | Theron Luhn | 2022-03-06 | 1 | -0/+10 |
| | | | | | | * Allow non-HTTPS issuer when OAUTHLIB_INSECURE_TRANSPORT. * Add unit test for validating issuer. | ||||
| * | Add CORS support for Refresh Token Grant. | Theron Luhn | 2022-02-15 | 1 | -0/+41 |
| | | |||||
| * | Add support for device authorization flow (RFC8628) (#795) | Mike Kelly | 2022-01-18 | 3 | -0/+63 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | * rfc8628: Add client implementation for token retrieval This change adds an implementation of the Device Authorization flow client from RFC8628. The initial structure is derived from the existing BackendApplicationClient with the addition of the device_code in the client. This change does not provide the support necessary for querying the device code endpoint in order to generate the initial device_code and URL that is required for completing the full end to end device authorization process. * Add device token fetch URI generator In order to perform the full device authorization flow it's necessary to first generate the device code and get the authorization flow URL. prepare_request_uri() allows us to do this while providing scopes and additional parameters. * Remove encoding lines These lines are not required for python3 | ||||
| * | PKCE (#786) | Jon Velando | 2021-12-13 | 3 | -0/+68 |
| | | | | | | | | | | | | | | | | | | | | * Added pkce on client side for authorization grant flow. Test cases added * added new args before kwargs * updating docstrings with clarification on PKCE params * adding additional clarification on PKCE parameters * adding initial function to create code_verifier and tests * using re.compile for code_verifier allowed characters * adding initial function to create code_challenge with tests * replacing appropriate chars for base64 URL Co-authored-by: Aman Singh Solanki <amans330@gmail.com> | ||||
| * | Add `Access-Control-Allow-Origin` header to metadata endpoint. | Theron Luhn | 2021-12-13 | 1 | -0/+15 |
| | | |||||
| * | Add support for CORS in the token endpoint. | Theron Luhn | 2021-12-13 | 2 | -0/+44 |
| | | |||||
| * | rm comma after Bearer in WWW-Authenticate header | kamenev | 2021-11-14 | 2 | -4/+4 |
| | | |||||
| * | Bug expires at (#783) | Scott Gifford | 2021-10-22 | 1 | -0/+24 |
| | | | | | | | | * verify that expires_at is an int before casting it as such. * casting expires_at as int within try catch with test. Co-authored-by: Scott Gifford <sgifford@activecampaign.com> | ||||
| * | Replace deprecated unittest aliases | Hugo van Kemenade | 2021-08-18 | 1 | -4/+4 |
| | | |||||
| * | fix #755: ensure save_token is called for hybrid code flow | Karim Kanso | 2021-08-18 | 1 | -0/+15 |
| | | |||||
| * | Sorted tests import per isort 4.3.21 | Anton Ruhlov | 2020-04-10 | 26 | -92/+88 |
| | | |||||
| * | Use unittest.mock instead of external mock | Michał Górny | 2020-03-16 | 21 | -21/+21 |
| | | | | | | | Replace the use of external 'mock' package with built-in Python unittest.mock (present since py3.3). This also fixes all test failures for me. | ||||
| * | The future is now | Hugo | 2019-08-15 | 26 | -53/+0 |
| | | |||||
| * | Upgrade unit tests to use more useful asserts | Hugo | 2019-08-15 | 1 | -2/+2 |
| | | |||||
| * | Drop support for legacy Python 2.7 | Hugo | 2019-08-15 | 3 | -14/+3 |
| | | |||||
| * | Upgrade Python syntax with pyupgrade | Hugo | 2019-08-15 | 4 | -11/+11 |
| | | |||||
| * | Drop support for legacy Python 2.7 | Hugo | 2019-08-15 | 2 | -10/+5 |
| | | |||||
| * | Merge branch 'master' into 672-fix-null-expires-in | Omer Katz | 2019-06-29 | 7 | -9/+201 |
| |\ | |||||
| | * | Check for authorization response errors | Mark Gregson | 2019-06-06 | 1 | -3/+6 |
| | | | |||||
| | * | Enforce POST HTTP method on TokenEndpoint, IntrospectEndpoint and ↵ | Abhishek Patel | 2019-05-14 | 4 | -19/+79 |
| | | | | | | | | | | | | | | | | | RevocationEndpoint - Add validation checks for HTTP method in TokenEndpoint, IntrospectEndpoint and RevocationEndpoint. - CHANGE DEFAULT HTTP method for TokenEndpoint from 'GET' to 'POST'. - Add tests + Fix an old test in . It used to send query params to TokenEndpoint which is not allowed anymore. Fixed it so payload is sent as POST body. | ||||
| | * | Ban all query parameters on Intropspection, Token and Revocation endpopoint | Abhishek Patel | 2019-05-14 | 3 | -18/+11 |
| | | | |||||
| | * | Add tests + create a global variable for blacklisted query parameters | Abhishek Patel | 2019-05-14 | 3 | -0/+59 |
| | | | |||||
| | * | Merge branch 'master' into 670-pkce-requestinfo | Jonathan Huot | 2019-05-07 | 1 | -2/+77 |
| | |\ | |||||
| | | * | Add valid testcase | Y.Umezaki | 2019-05-07 | 1 | -0/+28 |
| | | | | |||||
| | | * | Add token tests from #491 | Y.Umezaki | 2019-05-07 | 1 | -2/+49 |
| | | | | |||||
| | * | | Fix 670. AuthCode API must return the new PKCE attribute670-pkce-requestinfo | Jonathan Huot | 2019-04-26 | 1 | -2/+4 |
| | |/ | |||||
| * | | Handle null value in expires_in field in JSON handler | Josh Holmer | 2019-04-30 | 1 | -0/+18 |
| |/ | | | | Closes #672 | ||||
| * | Removed useless set_state internal function | Jonathan Huot | 2019-02-21 | 1 | -7/+1 |
| | | | | | Does not have purpose for /token request | ||||
| * | Add authorization "state" preservation back for AuthCode | Jonathan Huot | 2019-02-21 | 1 | -0/+7 |
| | | |||||
| * | Fix 652: removed "state" from /token response. | Jonathan Huot | 2019-02-20 | 2 | -24/+27 |
| | | | | | | | Fix OIDC /token flow where &state=None was always returned, and fix OAuth2.0 /token flow where &state=foobar was returned if &state=foobar was present in the token request. Remove "save_token" from create_token() signature cuz it was not used internally. Deprecated the option to let upstream libraries have a chance to remove it, if ever used. | ||||
| * | Fix 644, Add tests for BasicAuth credentials for all endpoints (#645) | Jonathan Huot | 2019-01-11 | 2 | -2/+57 |
| | | | | Test Introspect, Revoke, Token (web, legacy, backend) endpoints with authenticate_client and HTTP Basic Auth. | ||||
| * | Fix issue when using Metadata Endpoint with OIDC PreConfigured server. | Jonathan Huot | 2018-12-14 | 1 | -0/+27 |
| | | |||||
| * | Merge branch 'master' into 601-pkce-support | Jonathan Huot | 2018-12-13 | 2 | -8/+33 |
| |\ | |||||
| | * | Add Content-Type and Cache headers to introspect/revocation errors | Jonathan Huot | 2018-12-13 | 2 | -8/+33 |
| | | | |||||
| | * | Add double-quotes to the key/values in WWW-Authenticate264-status401 | Jonathan Huot | 2018-12-12 | 2 | -4/+4 |
| | | | |||||
| | * | Used WWW-Authenticate and auth-param values as RFC6750 described it. | Jonathan Huot | 2018-12-12 | 2 | -4/+4 |
| | | | | | | | | | It misses the possibility to add scope= and realm= at the moment, but it should be a step forward into the right direction. | ||||
| | * | Handle 401 with WWW-Authenticate. Moved wrong 401 into 400. | Jonathan Huot | 2018-12-04 | 2 | -4/+4 |
| | | | | | | | | | access_denied/unauthorized_client/consent_required/login_required MUST be 400, and not 401. Also, 401 MUST have WWW-Authenticate when set. It could have an impact of processing those in webframeworks. | ||||
| * | | Merge pull request #624 from oauthlib/preconf-server-metadata | Jonathan Huot | 2018-12-11 | 1 | -0/+61 |
| |\ \ | | | | | | | Preconf server metadata | ||||
| | * | | Sort dict and list in dict values for py27/36 compatpreconf-server-metadata | Jonathan Huot | 2018-11-30 | 1 | -2/+10 |
| | | | | |||||
| | * | | Add Server metadata test and fix metadata. | Jonathan Huot | 2018-11-30 | 1 | -0/+53 |
| | | | | | | | | | | | | | Fix grant_types_supported which must include "implicit" even if it is not a grant_type in oauthlib sense. Removed internal "none" field value from the list of response_types. | ||||
| * | | | Merge branch 'master' into 601-pkce-support | Jonathan Huot | 2018-12-11 | 1 | -1/+1 |
| |\ \ \ | |/ / |/| / | |/ | |||||
| | * | `invalid_scope` status code should be 400 | Benjamin Pereto | 2018-12-03 | 1 | -1/+1 |
| | | | |||||
| * | | Initial OAuth2.0/PKCE Provider support | Jonathan Huot | 2018-11-29 | 7 | -0/+133 |
| |/ | |||||
| * | Allow custom provider to override oauthlib valuesoauth-metadata | Jonathan Huot | 2018-11-21 | 1 | -0/+10 |
| | | | | | See https://github.com/oauthlib/oauthlib/pull/605#discussion_r234438151 | ||||
| * | Initial OAuth Authorization Server Metadata RFC8414 | Jonathan Huot | 2018-10-25 | 1 | -0/+28 |
| | | |||||
| * | Merge branch 'master' into fix-585_client_id | Jonathan Huot | 2018-09-21 | 1 | -1/+1 |
| |\ | |||||
| | * | Merge branch 'master' into invalid-grant-should-respond-with-400 | Omer Katz | 2018-09-20 | 5 | -1/+44 |
| | |\ | |||||
| | * \ | Merge branch 'master' into invalid-grant-should-respond-with-400 | Jonathan Huot | 2018-08-13 | 3 | -2/+18 |
| | |\ \ | |||||
