<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/oauthlib.git/tests/oauth1, branch python-3.7</title>
<subtitle>github.com: idan/oauthlib.git
</subtitle>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/'/>
<entry>
<title>Fix OIDC tests (#565)</title>
<updated>2018-09-20T22:10:17+00:00</updated>
<author>
<name>Pieter Ennes</name>
<email>pieter@ennes.nl</email>
</author>
<published>2018-09-20T22:10:17+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=326456cb78eb6b50e6f44f01cb0eaccc7652cf1f'/>
<id>326456cb78eb6b50e6f44f01cb0eaccc7652cf1f</id>
<content type='text'>
* Unmute ignored OIDC tests.

* Fix more import errors.

* Remove recently invalidated test for id_token_hint.

* Fix tested grants.

* Fix import on py27.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Unmute ignored OIDC tests.

* Fix more import errors.

* Remove recently invalidated test for id_token_hint.

* Fix tested grants.

* Fix import on py27.
</pre>
</div>
</content>
</entry>
<entry>
<title>Correct recent merge (#596)</title>
<updated>2018-09-14T19:58:16+00:00</updated>
<author>
<name>Jon Dufresne</name>
<email>jon.dufresne@gmail.com</email>
</author>
<published>2018-09-14T19:58:16+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=a0f38f71cb8764bbff8dd2cdac5031a09086665e'/>
<id>a0f38f71cb8764bbff8dd2cdac5031a09086665e</id>
<content type='text'>
Merge c8a7cb199a8d448c2934100a5bb06598be402939 mistakenly reverted a
line from aef9a3e944f41c3afaaf22ba20f86a267a7d3bb3.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Merge c8a7cb199a8d448c2934100a5bb06598be402939 mistakenly reverted a
line from aef9a3e944f41c3afaaf22ba20f86a267a7d3bb3.</pre>
</div>
</content>
</entry>
<entry>
<title>Remove unnecessary workaround for bytes type</title>
<updated>2018-09-14T12:18:10+00:00</updated>
<author>
<name>Jon Dufresne</name>
<email>jon.dufresne@gmail.com</email>
</author>
<published>2018-09-14T12:07:46+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=8aa89569f14b493ba2672d7a64c7c1c138c82c3b'/>
<id>8aa89569f14b493ba2672d7a64c7c1c138c82c3b</id>
<content type='text'>
The type 'bytes' is available on all supported Pythons. Likewise the
byte literal b'...' is available on all supported Pythons. Use idiomatic
Python and remove workaround for an issue that no longer exists. Makes
the code more forward compatible with Python 3.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The type 'bytes' is available on all supported Pythons. Likewise the
byte literal b'...' is available on all supported Pythons. Use idiomatic
Python and remove workaround for an issue that no longer exists. Makes
the code more forward compatible with Python 3.
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for HMAC-SHA256 (builds on PR#388) (#498)</title>
<updated>2017-11-14T15:44:44+00:00</updated>
<author>
<name>Viktor Haag</name>
<email>ViktorHaag@users.noreply.github.com</email>
</author>
<published>2017-11-14T15:44:44+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=cfb82feb03fcd60b3b66ac09bf1b478cd5f11b7d'/>
<id>cfb82feb03fcd60b3b66ac09bf1b478cd5f11b7d</id>
<content type='text'>
* Add support for HMAC-SHA256

* Add explicit declaration of HMAC-SHA1 and point HMAC at it

To avoid confusion, HMAC constant name should explicitly state which SHA variant is used, but for backwards compatibility, SIGNATURE_HMAC is still needed

* add support for HMAC-SHA256 including tests and comments

* constructor tests verify client built with correct signer method
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Add support for HMAC-SHA256

* Add explicit declaration of HMAC-SHA1 and point HMAC at it

To avoid confusion, HMAC constant name should explicitly state which SHA variant is used, but for backwards compatibility, SIGNATURE_HMAC is still needed

* add support for HMAC-SHA256 including tests and comments

* constructor tests verify client built with correct signer method
</pre>
</div>
</content>
</entry>
<entry>
<title>Sorted imports.</title>
<updated>2017-09-17T11:14:31+00:00</updated>
<author>
<name>Omer Katz</name>
<email>omerk@checkpoint.com</email>
</author>
<published>2017-09-17T11:14:31+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=0218f8da4f6405c6a38ea7e01feacf73b35dd698'/>
<id>0218f8da4f6405c6a38ea7e01feacf73b35dd698</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Replace all uses of assertEquals with assertEqual</title>
<updated>2017-04-16T20:57:30+00:00</updated>
<author>
<name>Jon Dufresne</name>
<email>jon.dufresne@gmail.com</email>
</author>
<published>2017-04-16T20:57:30+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=e3626c4f0e09728f336acc32c5a1f61c4fed9418'/>
<id>e3626c4f0e09728f336acc32c5a1f61c4fed9418</id>
<content type='text'>
assertEquals is deprecated in favor of assertEqual.

When running tests, fixes warnings of the form:

  DeprecationWarning: Please use assertEqual instead.

For more information, see:

https://docs.python.org/3/library/unittest.html#deprecated-aliases
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
assertEquals is deprecated in favor of assertEqual.

When running tests, fixes warnings of the form:

  DeprecationWarning: Please use assertEqual instead.

For more information, see:

https://docs.python.org/3/library/unittest.html#deprecated-aliases
</pre>
</div>
</content>
</entry>
<entry>
<title>adding validator_log to store what the endpoint computed</title>
<updated>2015-08-12T16:37:21+00:00</updated>
<author>
<name>jonathan vanasco</name>
<email>jonathan@2xlp.com</email>
</author>
<published>2015-08-12T16:37:21+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=58a2a735ac329f890c5dd4a042b35ee544084db0'/>
<id>58a2a735ac329f890c5dd4a042b35ee544084db0</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Check for rsa_key when it's actually needed</title>
<updated>2015-05-07T03:12:47+00:00</updated>
<author>
<name>David Baumgold</name>
<email>david@davidbaumgold.com</email>
</author>
<published>2015-02-10T22:57:06+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=96caa4991fed3ff376ee15214607d05385ff9d7d'/>
<id>96caa4991fed3ff376ee15214607d05385ff9d7d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Support newer PyJWT (1.0.0). remove PyCrypto completely for cryptography and PyJWT helpers. Reformat some test certificates to be easier to maintain. Update documentation to match use of cryptography instead of PyCrypto</title>
<updated>2015-04-14T16:30:44+00:00</updated>
<author>
<name>Joseph Tate</name>
<email>joseph@crunch.io</email>
</author>
<published>2015-04-14T16:30:44+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=fc2d1218e015adcf65ba01965884430c47895cd0'/>
<id>fc2d1218e015adcf65ba01965884430c47895cd0</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Create Signature Only OAuth1 Endpoint</title>
<updated>2014-09-11T16:31:58+00:00</updated>
<author>
<name>Ryan Hiebert</name>
<email>ryan@ryanhiebert.com</email>
</author>
<published>2014-09-04T03:57:14+00:00</published>
<link rel='alternate' type='text/html' href='http://trove.baserock.org/cgit/delta/python-packages/oauthlib.git/commit/?id=988d08284989226577d30ae07550278dbf50d751'/>
<id>988d08284989226577d30ae07550278dbf50d751</id>
<content type='text'>
In certain cases a provider may wish to verify the signature of an
oauth request without doing anything more with it. Learning Tools
Interoperability (LTI), for example, uses "0-legged OAuth" for it's
signature verification process.

http://www.imsglobal.org/lti/
http://andyfmiller.com/2013/02/10/does-lti-use-oauth/

This adds a new ``SignatureOnlyEndpoint`` that implements only the
client validation and signature verification, and leaves off the other
parts that would need to be validated.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In certain cases a provider may wish to verify the signature of an
oauth request without doing anything more with it. Learning Tools
Interoperability (LTI), for example, uses "0-legged OAuth" for it's
signature verification process.

http://www.imsglobal.org/lti/
http://andyfmiller.com/2013/02/10/does-lti-use-oauth/

This adds a new ``SignatureOnlyEndpoint`` that implements only the
client validation and signature verification, and leaves off the other
parts that would need to be validated.
</pre>
</div>
</content>
</entry>
</feed>
