head 1.26; access; symbols pkgsrc-2023Q4:1.26.0.10 pkgsrc-2023Q4-base:1.26 pkgsrc-2023Q3:1.26.0.8 pkgsrc-2023Q3-base:1.26 pkgsrc-2023Q2:1.26.0.6 pkgsrc-2023Q2-base:1.26 pkgsrc-2023Q1:1.26.0.4 pkgsrc-2023Q1-base:1.26 pkgsrc-2022Q4:1.26.0.2 pkgsrc-2022Q4-base:1.26 pkgsrc-2022Q3:1.24.0.2 pkgsrc-2022Q3-base:1.24 pkgsrc-2022Q2:1.23.0.4 pkgsrc-2022Q2-base:1.23 pkgsrc-2022Q1:1.23.0.2 pkgsrc-2022Q1-base:1.23 pkgsrc-2021Q4:1.21.0.4 pkgsrc-2021Q4-base:1.21 pkgsrc-2021Q3:1.21.0.2 pkgsrc-2021Q3-base:1.21 pkgsrc-2021Q2:1.20.0.4 pkgsrc-2021Q2-base:1.20 pkgsrc-2021Q1:1.20.0.2 pkgsrc-2021Q1-base:1.20 pkgsrc-2020Q4:1.19.0.12 pkgsrc-2020Q4-base:1.19 pkgsrc-2020Q3:1.19.0.10 pkgsrc-2020Q3-base:1.19 pkgsrc-2020Q2:1.19.0.8 pkgsrc-2020Q2-base:1.19 pkgsrc-2020Q1:1.19.0.4 pkgsrc-2020Q1-base:1.19 pkgsrc-2019Q4:1.19.0.6 pkgsrc-2019Q4-base:1.19 pkgsrc-2019Q3:1.19.0.2 pkgsrc-2019Q3-base:1.19 pkgsrc-2019Q2:1.17.0.4 pkgsrc-2019Q2-base:1.17 pkgsrc-2019Q1:1.17.0.2 pkgsrc-2019Q1-base:1.17 pkgsrc-2018Q4:1.15.0.6 pkgsrc-2018Q4-base:1.15 pkgsrc-2018Q3:1.15.0.4 pkgsrc-2018Q3-base:1.15 pkgsrc-2018Q2:1.15.0.2 pkgsrc-2018Q2-base:1.15 pkgsrc-2018Q1:1.12.0.4 pkgsrc-2018Q1-base:1.12 pkgsrc-2017Q4:1.12.0.2 pkgsrc-2017Q4-base:1.12 pkgsrc-2017Q3:1.9.0.4 pkgsrc-2017Q3-base:1.9 pkgsrc-2017Q2:1.8.0.2 pkgsrc-2017Q2-base:1.8 pkgsrc-2017Q1:1.7.0.4 pkgsrc-2017Q1-base:1.7 pkgsrc-2016Q4:1.7.0.2 pkgsrc-2016Q4-base:1.7 pkgsrc-2016Q3:1.6.0.2 pkgsrc-2016Q3-base:1.6 pkgsrc-2016Q2:1.5.0.2 pkgsrc-2016Q2-base:1.5 pkgsrc-2016Q1:1.3.0.4 pkgsrc-2016Q1-base:1.3 pkgsrc-2015Q4:1.3.0.2 pkgsrc-2015Q4-base:1.3 pkgsrc-2015Q3:1.2.0.12 pkgsrc-2015Q3-base:1.2 pkgsrc-2015Q2:1.2.0.10 pkgsrc-2015Q2-base:1.2 pkgsrc-2015Q1:1.2.0.8 pkgsrc-2015Q1-base:1.2 pkgsrc-2014Q4:1.2.0.6 pkgsrc-2014Q4-base:1.2 pkgsrc-2014Q3:1.2.0.4 pkgsrc-2014Q3-base:1.2 pkgsrc-2014Q2:1.2.0.2 pkgsrc-2014Q2-base:1.2; locks; strict; comment @# @; 1.26 date 2022.10.25.07.26.58; author adam; state Exp; branches; next 1.25; commitid hwMI4jMwRfNfq4ZD; 1.25 date 2022.10.19.13.56.33; author nia; state Exp; branches; next 1.24; commitid SJILZksUbr0GLkYD; 1.24 date 2022.09.13.12.32.55; author adam; state Exp; branches; next 1.23; commitid 3K2MM3m4tR1QsHTD; 1.23 date 2022.02.06.19.00.51; author adam; state Exp; branches; next 1.22; commitid uIKDHIu8ttZlEArD; 1.22 date 2022.01.04.20.54.43; author wiz; state Exp; branches; next 1.21; commitid CYyhdK9qtoffkmnD; 1.21 date 2021.06.25.21.00.12; author adam; state Exp; branches; next 1.20; commitid 8IIfgvVq1LcGzyYC; 1.20 date 2021.03.07.17.16.19; author adam; state Exp; branches; next 1.19; commitid sGfNplyVxy1fSoKC; 1.19 date 2019.08.12.07.45.23; author adam; state Exp; branches; next 1.18; commitid QWlRFusbSbfN7IyB; 1.18 date 2019.07.06.22.44.47; author adam; state Exp; branches; next 1.17; commitid ChoTmZ5OrCisi2uB; 1.17 date 2019.01.25.12.28.32; author adam; state Exp; branches; next 1.16; commitid HQWmKb5t9YkW5a9B; 1.16 date 2019.01.16.09.36.21; author adam; state Exp; branches; next 1.15; commitid 5EZsyXJ8s3RwqZ7B; 1.15 date 2018.05.27.12.24.56; author wiz; state Exp; branches; next 1.14; commitid 90vjq0pxasI3TVDA; 1.14 date 2018.04.03.11.00.16; author adam; state Exp; branches; next 1.13; commitid O5VKFX94TTZD9ZwA; 1.13 date 2018.04.03.10.02.49; author adam; state Exp; branches; next 1.12; commitid pFtz9sn9HVTIPYwA; 1.12 date 2017.10.22.20.29.56; author adam; state Exp; branches; next 1.11; commitid XhVFVZSb8jYPx5cA; 1.11 date 2017.10.19.06.28.40; author adam; state Exp; branches; next 1.10; commitid 4UL9o6Lozh5aZCbA; 1.10 date 2017.10.03.12.46.52; author wiz; state Exp; branches; next 1.9; commitid iHLWSOn6if7SAB9A; 1.9 date 2017.09.08.06.58.35; author adam; state Exp; branches; next 1.8; commitid e1bFM5Z7OD2ctm6A; 1.8 date 2017.04.05.15.55.38; author wiz; state Exp; branches; next 1.7; commitid gjMex0Qa2hDnsmMz; 1.7 date 2016.11.28.13.35.47; author wiz; state Exp; branches; next 1.6; commitid braWzgSBj38vNTvz; 1.6 date 2016.09.04.09.33.28; author wiz; state Exp; branches; next 1.5; commitid go7yIup4pyP9bXkz; 1.5 date 2016.06.06.12.03.26; author wiz; state Exp; branches; next 1.4; commitid Hd0G3VLlUN1vUo9z; 1.4 date 2016.05.05.11.43.06; author wiz; state Exp; branches; next 1.3; commitid g9BRLAwJoUfnPh5z; 1.3 date 2015.11.06.10.50.30; author wiz; state Exp; branches; next 1.2; commitid 139C5k6K76BDl1Iy; 1.2 date 2014.05.13.17.08.44; author joerg; state Exp; branches; next 1.1; commitid GvX7naEQL9iTRoAx; 1.1 date 2014.05.08.15.18.10; author imil; state Exp; branches; next ; commitid 921GyFnnOvYOpKzx; desc @@ 1.26 log @py-oauthlib: updated to 3.2.2 3.2.2 (2022-10-17) ------------------ OAuth2.0 Provider: * CVE-2022-36087 @ text @# $NetBSD: Makefile,v 1.25 2022/10/19 13:56:33 nia Exp $ DISTNAME= oauthlib-3.2.2 PKGNAME= ${PYPKGPREFIX}-${DISTNAME} CATEGORIES= security python MASTER_SITES= ${MASTER_SITE_PYPI:=o/oauthlib/} MAINTAINER= imil@@NetBSD.org HOMEPAGE= https://github.com/oauthlib/oauthlib COMMENT= Generic implementation of the OAuth request-signing logic LICENSE= modified-bsd DEPENDS+= ${PYPKGPREFIX}-JWT>=2.0.0:../../textproc/py-JWT DEPENDS+= ${PYPKGPREFIX}-blinker>=1.4.0:../../devel/py-blinker USE_LANGUAGES= # none PYTHON_VERSIONS_INCOMPATIBLE= 27 .include "../../lang/python/egg.mk" PYTHON_VERSIONED_DEPENDENCIES+= cryptography .include "../../lang/python/versioned_dependencies.mk" .include "../../mk/bsd.pkg.mk" @ 1.25 log @fighting a losing battle against py-cryptography rustification, part 2 Switch users to versioned_dependencies.mk. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.24 2022/09/13 12:32:55 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.2.1 @ 1.24 log @py-oauthlib: updated to 3.2.1 3.2.1 (2022-09-09) ------------------ OAuth2.0 Provider: * Metadata endpoint support of non-HTTPS * CVE-2022-36087 OAuth1.0: * Allow IPv6 being parsed by signature General: * Improved and fixed documentation warnings. * Cosmetic changes based on isort @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.23 2022/02/06 19:00:51 adam Exp $ a14 1 DEPENDS+= ${PYPKGPREFIX}-cryptography>=3.0.0:../../security/py-cryptography d21 2 @ 1.23 log @py-oauthlib: updated to 3.2.0 3.2.0 (2022-01-29) ------------------ OAuth2.0 Client: * Add Device Authorization Flow for Web Application * Add PKCE support for Client * Fallback to none in case of wrong expires_at format. OAuth2.0 Provider: * Add support for CORS to metadata endpoint. * Add support for CORS to token endpoint. * Remove comma after Bearer in WWW-Authenticate OAuth2.0 Provider - OIDC: * Call save_token in Hybrid code flow * OIDC add support of refreshing ID Tokens with `refresh_id_token` * The RefreshTokenGrant modifiers now take the same arguments as the AuthorizationCodeGrant modifiers (`token`, `token_handler`, `request`). General: * Added Python 3.9, 3.10, 3.11 * Improve Travis & Coverage @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.22 2022/01/04 20:54:43 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.2.0 @ 1.22 log @*: bump PKGREVISION for egg.mk users They now have a tool dependency on py-setuptools instead of a DEPENDS @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.21 2021/06/25 21:00:12 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.1.1 a4 1 PKGREVISION= 1 d14 2 a15 2 DEPENDS+= ${PYPKGPREFIX}-blinker-[0-9]*:../../devel/py-blinker DEPENDS+= ${PYPKGPREFIX}-cryptography-[0-9]*:../../security/py-cryptography @ 1.21 log @py-oauthlib: updated to 3.1.1 3.1.1 (2021-05-31) ------------------ OAuth2.0 Provider - Bugfixes * Fix acceptance of valid IPv6 addresses in URI validation OAuth2.0 Client - Bugfixes * Base OAuth2 Client now has a consistent way of managing the `scope`: it consistently relies on the `scope` provided in the constructor if any, except if overridden temporarily in a method call. Note that in particular providing a non-None `scope` in `prepare_authorization_request` or `prepare_refresh_token` does not override anymore `self.scope` forever, it is just used temporarily. * MobileApplicationClient.prepare_request_uri and MobileApplicationClient.parse_request_uri_response, ServiceApplicationClient.prepare_request_body, and WebApplicationClient.prepare_request_uri now correctly use the default `scope` provided in constructor. * LegacyApplicationClient.prepare_request_body now correctly uses the default `scope` provided in constructor OAuth2.0 Provider - Bugfixes * client_credentials grant: fix log message * OpenID Connect Hybrid - fix nonce not passed to add_id_token * Different prompt values are now handled according to spec (e.g. prompt=none) * OpenID Connect - fix Authorization: Basic parsing General * improved skeleton validator for public vs private client * replace mock library with standard unittest.mock * build isort integration * python2 code removal * add python3.8 support * bump minimum versions of pyjwt and cryptography @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.20 2021/03/07 17:16:19 adam Exp $ d5 1 @ 1.20 log @py-oauthlib: mark as incompatible with Python 2.7 @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.19 2019/08/12 07:45:23 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.1.0 d13 1 a13 1 DEPENDS+= ${PYPKGPREFIX}-JWT>=1.0.0:../../textproc/py-JWT a15 2 TEST_DEPENDS+= ${PYPKGPREFIX}-mock-[0-9]*:../../devel/py-mock TEST_DEPENDS+= ${PYPKGPREFIX}-nose-[0-9]*:../../devel/py-nose d19 1 a19 1 PYTHON_VERSIONS_INCOMPATIBLE= 27 # py-JWT @ 1.19 log @py-oauthlib: updated to 3.1.0 3.1.0: OAuth2.0 Provider - Features OIDC add support of nonce, c_hash, at_hash fields New RequestValidator.fill_id_token method Deprecated RequestValidator.get_id_token method OIDC add UserInfo endpoint New RequestValidator.get_userinfo_claims method OAuth2.0 Provider - Security Enhance data leak to logs New default to not expose request content in logs New function oauthlib.set_debug(True) Disabling query parameters for POST requests OAuth2.0 Provider - Bugfixes Fix validate_authorization_request to return the new PKCE fields Fix token_type to be case-insensitive (bearer and Bearer) OAuth2.0 Client - Bugfixes Fix Authorization Code's errors processing BackendApplication.Client.prepare_request_body use the "scope" argument as intended. Fix edge case when expires_in=Null OAuth1.0 Client Add case-insensitive headers to oauth1 BaseEndpoint @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.18 2019/07/06 22:44:47 adam Exp $ d21 2 @ 1.18 log @py-oauthlib: updated to 3.0.2 3.0.2: * Fixed space encoding in base string URI used in the signature base string. * Fixed OIDC /token response which wrongly returned "&state=None" * Doc: The value `state` must not be stored by the AS, only returned in /authorize response. * Fixed OIDC "nonce" checks: raise errors when it's mandatory @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.17 2019/01/25 12:28:32 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.0.2 @ 1.17 log @py-oauthlib: updated to 3.0.1 3.0.1: Fixed Revocation & Introspection Endpoints when using Client Authentication with HTTP Basic Auth. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.16 2019/01/16 09:36:21 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.0.1 @ 1.16 log @py-oauthlib: updated to 3.0.0 3.0.0 (2019-01-01) OAuth2.0 Provider - outstanding Features OpenID Connect Core support RFC7662 Introspect support RFC8414 OAuth2.0 Authorization Server Metadata support RFC7636 PKCE support OAuth2.0 Provider - API/Breaking Changes Add "request" to confirm_redirect_uri confirm_redirect_uri/get_default_redirect_uri has a bit changed invalid_client is now a FatalError Changed errors status code from 401 to 400: invalid_grant: invalid_scope: access_denied/unauthorized_client/consent_required/login_required 401 must have WWW-Authenticate HTTP Header set OAuth2.0 Provider - Bugfixes empty scopes no longer raise exceptions for implicit and authorization_code OAuth2.0 Client - Bugfixes / Changes: expires_in in Implicit flow is now an integer expires is no longer overriding expires_in parse_request_uri_response is now required Unknown error=xxx raised by OAuth2 providers was not understood OAuth2's prepare_token_request supports sending an empty string for client_id OAuth2's WebApplicationClient.prepare_request_body was refactored to better support sending or omitting the client_id via a new include_client_id kwarg. By default this is included. The method will also emit a DeprecationWarning if a client_id parameter is submitted; the already configured self.client_id is the preferred option. OAuth1.0 Client: Support for HMAC-SHA256 General fixes: $ and ' are allowed to be unencoded in query strings Request attributes are no longer overriden by HTTP Headers Removed unnecessary code for handling python2.6 Add support of python3.7 Several minors updates to setup.py and tox Set pytest as the default unittest framework @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.15 2018/05/27 12:24:56 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-3.0.0 @ 1.15 log @py-oauthlib: update to 2.1.0. 2.1.0 (2018-05-21) ------------------ * Fixed some copy and paste typos (#535) * Use secrets module in Python 3.6 and later (#533) * Add request argument to confirm_redirect_uri (#504) * Avoid populating spurious token credentials (#542) * Make populate attributes API public (#546) @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.14 2018/04/03 11:00:16 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.1.0 @ 1.14 log @py-oauthlib: changed LICENSE to modified-bsd @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.13 2018/04/03 10:02:49 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.7 @ 1.13 log @py-oauthlib: updated to 2.0.7 2.0.7: Moved oauthlib into new organization on GitHub. Include license file in the generated wheel package. When deploying a release to PyPI, include the wheel distribution. Check access token in self.token dict. Added bottle-oauthlib to docs. Update repository location in Travis. Updated docs for organization change. Replace G+ with Gitter. Update requirements. Add shields for Python versions, license and RTD. Fix ReadTheDocs build Fixed "make" command to test upstream with local oauthlib. Replace IRC notification with Gitter Hook. Added Github Releases deploy provider. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.12 2017/10/22 20:29:56 adam Exp $ d11 1 a11 1 LICENSE= original-bsd @ 1.12 log @py-oauthlib: update to 2.0.6 2.0.6: * 2.0.5 contains breaking changes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.11 2017/10/19 06:28:40 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.6 d9 1 a9 1 HOMEPAGE= https://pypi.python.org/pypi/oauthlib d13 2 d16 2 a17 4 DEPENDS+= ${PYPKGPREFIX}-blinker-[0-9]*:../../devel/py-blinker DEPENDS+= ${PYPKGPREFIX}-JWT>=1.0.0:../../textproc/py-JWT BUILD_DEPENDS+= ${PYPKGPREFIX}-nose-[0-9]*:../../devel/py-nose BUILD_DEPENDS+= ${PYPKGPREFIX}-mock-[0-9]*:../../devel/py-mock @ 1.11 log @py-oauthlib: update to 2.0.5 2.0.5: * Fix OAuth2Error.response_mode * Documentation improvement @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.10 2017/10/03 12:46:52 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.5 @ 1.10 log @py-oauthlib: update to 2.0.4. 2.0.4 (2017-09-17) ------------------ * Fixed typo that caused OAuthlib to crash because of the fix in "Address missing OIDC errors and fix a typo in the AccountSelectionRequired exception". @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.9 2017/09/08 06:58:35 adam Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.4 d5 1 a5 1 CATEGORIES= security @ 1.9 log @2.0.3: * Address missing OIDC errors and fix a typo in the AccountSelectionRequired exception. * Update proxy keys on CaseInsensitiveDict.update(). * Redirect errors according to OIDC's response_mode. * Added universal wheel support. * Added log statements to except clauses. * According to RC7009 Section 2.1, a client should include authentication credentials when revoking its tokens. As discussed in 339, this is not make sense for public clients. However, in that case, the public client should still be checked that is infact a public client (authenticate_client_id). * Improved prompt parameter validation. * Added two error codes from RFC 6750. * Hybrid response types are now be fragment-encoded. * Added Python 3.6 to Travis CI testing and trove classifiers. * Fixed BytesWarning issued when using a string placeholder for bytes object. * Documented PyJWT dependency and improved logging and exception messages. * Documentation improvements and fixes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.8 2017/04/05 15:55:38 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.3 @ 1.8 log @Updated py-oauthlib to 2.0.2. 2.0.2 (2017-03-19) ------------------ * Dropped support for Python 2.6, 3.2 & 3.3. * (FIX) `OpenIDConnector` will no longer raise an AttributeError when calling `openid_authorization_validator()` twice. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.7 2016/11/28 13:35:47 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.2 @ 1.7 log @Updated py-oauthlib to 2.0.1. 2.0.1 (2016-11-23) ------------------ * (FIX) Normalize handling of request.scopes list @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.6 2016/09/04 09:33:28 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.1 @ 1.6 log @Updated py-oauthlib to 2.0.0. 2.0.0 (2016-09-03) ------------------ * (New Feature) **OpenID** support. * Documentation improvements and fixes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.5 2016/06/06 12:03:26 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-2.0.0 @ 1.5 log @Updated py-oauthlib to 1.1.2. 1.1.2 (2016-06-01) ------------------ * (Fix) Query strings should be able to include colons. * (Fix) Cast body to a string to ensure that we can perform a regex substitution on it. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.4 2016/05/05 11:43:06 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-1.1.2 @ 1.4 log @Updated py35-oauthlib to 1.1.1. 1.1.1 (2016-05-01) (Enhancement) Better sanitisation of Request objects __repr__. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.3 2015/11/06 10:50:30 wiz Exp $ d3 1 a3 1 DISTNAME= oauthlib-1.1.1 d6 1 a6 1 MASTER_SITES= https://pypi.python.org/packages/79/56/cb4c1ff3244f68605a1042a7f257f96815246b0625e28991d268554adb16/ @ 1.3 log @Update to 1.0.3. Add missing dependencies. 1.0.3 (2015-08-16) (Fix) Changed the documented return type of the `invalidate_request_token()` method from the RSA key to None since nobody is using the return type. (Enhancement) Added a validator log that will store what the endpoint has computed for debugging and logging purposes (OAuth 1 only for now). 1.0.2 (2015-08-10) (Fix) Allow client secret to be null for public applications that do not mandate it's specification in the query parameters. (Fix) Encode request body before hashing in order to prevent encoding errors in Python 3. 1.0.1 (2015-07-27) (Fix) Added token_type_hint to the list of default Request parameters. 1.0.0 (2015-07-19) (Breaking Change) Replace pycrypto with cryptography from https://cryptography.io (Breaking Change) Update jwt to 1.0.0 (which is backwards incompatible) no oauthlib api changes were made. (Breaking Change) Raise attribute error for non-existing attributes in the Request object. (Fix) Strip whitespace off of scope string. (Change) Don't require to return the state in the access token response. (Change) Hide password in logs. (Fix) Fix incorrect invocation of prepare_refresh_body in the OAuth2 client. (Fix) Handle empty/non-parsable query strings. (Fix) Check if an RSA key is actually needed before requiring it. (Change) Allow tuples for list_to_scope as well as sets and lists. (Change) Add code to determine if client authentication is required for OAuth2. (Fix) Fix error message on invalid Content-Type header for OAtuh1 signing. (Fix) Allow ! character in query strings. (Fix) OAuth1 now includes the body hash for requests that specify any content-type that isn't x-www-form-urlencoded. (Fix) Fixed error description in oauth1 endpoint. (Fix) Revocation endpoint for oauth2 will now return an empty string in the response body instead of 'None'. Increased test coverage. Performance improvements. Documentation improvements and fixes. 0.7.2 (2014-11-13) (Quick fix) Unpushed locally modified files got included in the PyPI 0.7.1 release. Doing a new clean release to address this. Please upgrade quickly and report any issues you are running into. 0.7.1 (2014-10-27) (Quick fix) Add oauthlib.common.log object back in for libraries using it. 0.7.0 (2014-10-27) (Change) OAuth2 clients will not raise a Warning on scope change if the environment variable OAUTHLIB_RELAX_TOKEN_SCOPE is set. The token will now be available as an attribute on the error, error.token. Token changes will now also be announced using blinker. (Fix/Feature) Automatic fixes of non-compliant OAuth2 provider responses (e.g. Facebook). (Fix) Logging is now tiered (per file) as opposed to logging all under oauthlib. (Fix) Error messages should now include a description in their message. (Fix/Feature) Optional support for jsonp callbacks after token revocation. (Feature) Client side preparation of OAuth 2 token revocation requests. (Feature) New OAuth2 client API methods for preparing full requests. (Feature) OAuth1 SignatureOnlyEndpoint that only verifies signatures and client IDs. (Fix/Feature) Refresh token grant now allow optional refresh tokens. (Fix) add missing state param to OAuth2 errors. (Fix) add_params_to_uri now properly parse fragment. (Fix/Feature) All OAuth1 errors can now be imported from oauthlib.oauth1. (Fix/Security) OAuth2 logs will now strip client provided password, if present. Allow unescaped @@ in urlencoded parameters. 0.6.3 (2014-06-10) Quick fix. OAuth 1 client repr in 0.6.2 overwrote secrets when scrubbing for print. 0.6.2 (2014-06-06) Numerous OAuth2 provider errors now suggest a status code of 401 instead of 400 (#247. Added support for JSON web tokens with oauthlib.common.generate_signed_token. Install extra dependency with oauthlib[signedtoken] (#237). OAuth2 scopes can be arbitrary objects with __str__ defined (#240). OAuth 1 Clients can now register custom signature methods (#239). Exposed new method oauthlib.oauth2.is_secure_transport that checks whether the given URL is HTTPS. Checks using this method can be disabled by setting the environment variable OAUTHLIB_INSECURE_TRANSPORT (#249). OAuth1 clients now has __repr__ and will be printed with secrets scrubbed. OAuth1 Client.get_oauth_params now takes an oauthlib.Request as an argument. urldecode will now raise a much more informative error message on incorrectly encoded strings. Plenty of typo and other doc fixes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.2 2014/05/13 17:08:44 joerg Exp $ d3 1 a3 1 DISTNAME= oauthlib-1.0.3 d6 1 a6 1 MASTER_SITES= ${MASTER_SITE_PYPI:=o/oauthlib/} @ 1.2 log @Correctly build as Python Egg. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.1 2014/05/08 15:18:10 imil Exp $ d3 1 a3 1 DISTNAME= oauthlib-0.6.1 d6 1 a6 1 MASTER_SITES= https://pypi.python.org/packages/source/o/oauthlib/ d13 6 @ 1.1 log @Initial import of py-oauthlib, version 0.6.1, into the NetBSD Packages Collection. OAuth often seems complicated and difficult-to-implement. There are several prominent libraries for handling OAuth requests, but they all suffer from one or both of the following: * They predate the OAuth 1.0 spec, AKA RFC 5849. * They predate the OAuth 2.0 spec, AKA RFC 6749. * They assume the usage of a specific HTTP request library. OAuthLib is a generic utility which implements the logic of OAuth without assuming a specific HTTP request object or web framework. Use it to graft OAuth client support onto your favorite HTTP library, or provider support onto your favourite web framework. If you're a maintainer of such a library, write a thin veneer on top of OAuthLib and get OAuth support for very little effort. @ text @d1 1 a1 1 # $NetBSD$ d15 1 a15 1 .include "../../lang/python/distutils.mk" @