| Commit message (Collapse) | Author | Age | Files | Lines |
| |\ |
|
| | |
| |
| |
| | |
See https://github.com/oauthlib/oauthlib/pull/605#discussion_r234438151
|
| | | |
|
| |/ |
|
| |\ |
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* Unmute ignored OIDC tests.
* Fix more import errors.
* Remove recently invalidated test for id_token_hint.
* Fix tested grants.
* Fix import on py27.
|
| | |\ |
|
| | |\ \ |
|
| | |\ \ \ |
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
According to section 5.2 of rfc 6749
(https://tools.ietf.org/html/rfc6749#section-5.2)
A server should respond with 400 in case of an invalid grant. The
given grant is invalid and the client should give other data.
A 401 is not applicable here because the client is required to give
a suitable Authorization header field which doesn't make any sense if
you are trying to acquire a grant authentication.
According to sections 10.4.1 and 10.4.2 of rfc 2616
(https://tools.ietf.org/html/rfc2616#section-10.4.1)
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
* fixed some formatting issues in `prepare_token_request` docstring
* slightly altered `prepare_token_request` in handling nontruthy values for `client_secret`.
|
| |\ \ \ \ \
| | | | | |
| | | | | |
| | | | | | |
fix-585_client_id
|
| | |\ \ \ \ \
| | | |_|_|/
| | |/| | | |
|
| | | |\ \ \ \ |
|
| | | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Merge c8a7cb199a8d448c2934100a5bb06598be402939 mistakenly reverted a
line from aef9a3e944f41c3afaaf22ba20f86a267a7d3bb3.
|
| | | | |\ \ \ \ |
|
| | | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
It is a more explicit assert with a more information message in case of
failure. For a full list of available assert methods, see:
https://docs.python.org/3/library/unittest.html#assert-methods
|
| | | | |/ / / /
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
The type 'bytes' is available on all supported Pythons. Likewise the
byte literal b'...' is available on all supported Pythons. Use idiomatic
Python and remove workaround for an issue that no longer exists. Makes
the code more forward compatible with Python 3.
|
| | | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Python 2.6 support was removed in
91152df142bdde134d84ed27963cda8e6b878416.
Drop unittest2 dependency. All necessary testing features are included
in the stdlib unittest.
|
| | | |/ / / /
| | | | | |
| | | | | |
| | | | | | |
Fix #431. The inherent function "raise_from_error" is called when "error=" is found in the payload. So it MUST raise something, and until now, only RFC errors were raised.
|
| |/ / / / / |
|
| | | | | |
| | | | |
| | | | |
| | | | | |
* added LegacyApplicationClient tests to ensure the grant supports a variety of allowed methods
|
| | | | | |
| | | | |
| | | | |
| | | | | |
integrated against requests_oauthlib idea
|
| | | | | | |
|
| |/ / / /
| | | |
| | | |
| | | |
| | | |
| | | | |
* `prepare_request_body` client_id is deprecated in favor of include_client_id
* a new unit test `test_prepare_request_body` is added to ensure conformity of several use cases
* the docstrings for the `body` param have been consolidated and standardized across multiple functions linked to `prepare_request_body` for clarity
|
| | | | | |
|
| | | | | |
|
| |\ \ \ \ |
|
| | | |_|/
| |/| | |
|
| |\ \ \ \
| |/ / / |
|
| | |\ \ \ |
|
| | | |\ \ \
| | | | |/
| | | |/| |
|
| | | | |/ |
|
| | | |/ |
|
| | |/
| |
| |
| | |
Authorization Code was missing this check, whereas Implicit was checking it.
|
| | | |
|
| | | |
|
| | | |
|
| |/ |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Add command to clean up builds to makefile
* Fix docs strings for endpoints pre_configured
* Chnage grant_types.openid_connect to include a deprecation warning be a backward compatible
* Fix doc string for rfc6749.request_validator
* Remove unused import
* Change import to be explicity
* Move JWTTokenTestCase to openid.connect.core.test_token
* Move JWTToken to oauthlib.openid.connect.core.tokens
* Move to openid connect test
* Move openid connect exceptions to its own file
* Remove openid connect from oauth2 server
* Remove JWTToken from oauth tokens
* Remove grant_types.openid_connect file
* Add oauthlib/openid estructure and tests
|
| |\ |
|
| | | |
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* Add testcase for prepare_token_request()
* Add testcase for InsecureTransportError in add_token()
* Fix typo in testcase of add_token() for MAC token type
* Add testcase for TokenExpiredError in add_token()
* Add testcase for prepare_request_body without private key
* Add testcase for optional kwargs in prepare_request_body()
|
| | | |
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
* Add JWT token with it the server knows how to validate this new type of token in resource requests
* Change find_token_type sorted function to reverse result and choose the valued estimated token handler
* Add validate_id_token method to RequestValidator
* Added unittest for JWTToken model
* Updated version of Mock
* Add get_jwt_bearer_token and validate_jwt_bearer_token oauthlib.oauth2.RequestValidator and change oauthlib.oauth2.tokens JWTToken to use it
* Change to improve token type estimate test
* Add a note in RequestValidator.validate_jwt_bearer_token about error 5xx rather 4xx
|
| | |
| |
| |
| |
| |
| | |
Previously, cliend_id was always included in the request body
in the Authorization Code flow and the client_id parameter
was ignored in contradiction with the docs.
Fixes #495
|
| |/ |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* Add support for HMAC-SHA256
* Add explicit declaration of HMAC-SHA1 and point HMAC at it
To avoid confusion, HMAC constant name should explicitly state which SHA variant is used, but for backwards compatibility, SIGNATURE_HMAC is still needed
* add support for HMAC-SHA256 including tests and comments
* constructor tests verify client built with correct signer method
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Change create_token_response to only save access_token when it's present in request.response_type
* Remove unused import, fix indentation and improve comment
* Fix AuthorizationEndpoint response_type for OpenID Connect hybrid flow
* Add new ImplicitTokenGrantDispatcher
Changes AuthorizationEndpoint response_type `'token'`, `'id_token'` and
`'id_token token'` to work with OpenID Connect and OAuth2 implicit flow
in a transparent way
* Add new AuthTokenGrantDispatcher
Change AuthorizationEndpoint grant_types `'authorization_code'` to work with
OpenID Connect and OAuth2 authorization flow in a transparent way
* Change tests to include required client_id and redirect_uri
* Remove AuthorizationEndpoint grant_types `'openid'`
Now OpenID Connect and OAuth2 authorization flow can use `authorization_code`
in a transparent way
* Add sone blank lines and fix indentation
* Change AuthorizationEndpoint grant type id_token and id_token token to use openid_connect_implicit direct
* Change default empty value to None and fix a typo
* Add assert called to AuthTokenGrantDispatcher tests
* Add request to get_authorization_code_scopes
|