forked from pool/python-oauthlib
Accepting request 676991 from home:jayvdb:django
- Update to version 3.0.1 * Fixed regression introduced in 3.0.0 + Fixed Revocation & Introspection Endpoints when using Client Authentication with HTTP Basic Auth. - from 3.0.0 * General fixes: + Add support of python3.7 + $ and ' are allowed to be unencoded in query strings + Request attributes are no longer overriden by HTTP Headers + Removed unnecessary code for handling python2.6 + Several minors updates to setup.py and tox + Set pytest as the default unittest framework * OAuth2.0 Provider - outstanding Features + OpenID Connect Core support + RFC7662 Introspect support + RFC8414 OAuth2.0 Authorization Server Metadata support + RFC7636 PKCE support * OAuth2.0 Provider - API/Breaking Changes + Add "request" to confirm_redirect_uri + confirm_redirect_uri/get_default_redirect_uri has a bit changed + invalid_client is now a FatalError + Changed errors status code from 401 to 400: - invalid_grant: - invalid_scope: - access_denied/unauthorized_client/consent_required/login_required - 401 must have WWW-Authenticate HTTP Header set. * OAuth2.0 Provider - Bugfixes + empty scopes no longer raise exceptions for implicit and authorization_code * OAuth2.0 Client - Bugfixes / Changes: + expires_in in Implicit flow is now an integer + expires is no longer overriding expires_in + parse_request_uri_response is now required + Unknown error=xxx raised by OAuth2 providers was not understood + OAuth2's `prepare_token_request` supports sending an empty string for `client_id` + OAuth2's `WebApplicationClient.prepare_request_body` was refactored to better support sending or omitting the `client_id` via a new `include_client_id` kwarg. By default this is included. The method will also emit a DeprecationWarning if a `client_id` parameter is submitted; the already configured `self.client_id` is the preferred option. * OAuth1.0 Client: + Support for HMAC-SHA256 - Removed remove_unittest2.patch made redundant by v3.0.1 - Set minumum version of python-PyJWT >= 1.0.0 OBS-URL: https://build.opensuse.org/request/show/676991 OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-oauthlib?expand=0&rev=40
This commit is contained in:
parent
3552ed62d1
commit
3a5e559532
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ac35665a61c1685c56336bda97d5eefa246f1202618a1d6f34fccb1bdd404162
|
||||
size 128807
|
3
oauthlib-3.0.1.tar.gz
Normal file
3
oauthlib-3.0.1.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0ce32c5d989a1827e3f1148f98b9085ed2370fc939bf524c9c851d8714797298
|
||||
size 149303
|
@ -1,3 +1,50 @@
|
||||
-------------------------------------------------------------------
|
||||
Sun Feb 17 00:40:20 UTC 2019 - John Vandenberg <jayvdb@gmail.com>
|
||||
|
||||
- Update to version 3.0.1
|
||||
* Fixed regression introduced in 3.0.0
|
||||
+ Fixed Revocation & Introspection Endpoints when using Client
|
||||
Authentication with HTTP Basic Auth.
|
||||
- from 3.0.0
|
||||
* General fixes:
|
||||
+ Add support of python3.7
|
||||
+ $ and ' are allowed to be unencoded in query strings
|
||||
+ Request attributes are no longer overriden by HTTP Headers
|
||||
+ Removed unnecessary code for handling python2.6
|
||||
+ Several minors updates to setup.py and tox
|
||||
+ Set pytest as the default unittest framework
|
||||
* OAuth2.0 Provider - outstanding Features
|
||||
+ OpenID Connect Core support
|
||||
+ RFC7662 Introspect support
|
||||
+ RFC8414 OAuth2.0 Authorization Server Metadata support
|
||||
+ RFC7636 PKCE support
|
||||
* OAuth2.0 Provider - API/Breaking Changes
|
||||
+ Add "request" to confirm_redirect_uri
|
||||
+ confirm_redirect_uri/get_default_redirect_uri has a bit changed
|
||||
+ invalid_client is now a FatalError
|
||||
+ Changed errors status code from 401 to 400:
|
||||
- invalid_grant:
|
||||
- invalid_scope:
|
||||
- access_denied/unauthorized_client/consent_required/login_required
|
||||
- 401 must have WWW-Authenticate HTTP Header set.
|
||||
* OAuth2.0 Provider - Bugfixes
|
||||
+ empty scopes no longer raise exceptions for implicit and authorization_code
|
||||
* OAuth2.0 Client - Bugfixes / Changes:
|
||||
+ expires_in in Implicit flow is now an integer
|
||||
+ expires is no longer overriding expires_in
|
||||
+ parse_request_uri_response is now required
|
||||
+ Unknown error=xxx raised by OAuth2 providers was not understood
|
||||
+ OAuth2's `prepare_token_request` supports sending an empty string for `client_id`
|
||||
+ OAuth2's `WebApplicationClient.prepare_request_body` was refactored to better
|
||||
support sending or omitting the `client_id` via a new `include_client_id` kwarg.
|
||||
By default this is included. The method will also emit a DeprecationWarning if
|
||||
a `client_id` parameter is submitted; the already configured `self.client_id`
|
||||
is the preferred option.
|
||||
* OAuth1.0 Client:
|
||||
+ Support for HMAC-SHA256
|
||||
- Removed remove_unittest2.patch made redundant by v3.0.1
|
||||
- Set minumum version of python-PyJWT >= 1.0.0
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Dec 4 12:50:57 UTC 2018 - Matej Cepl <mcepl@suse.com>
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package python-oauthlib
|
||||
#
|
||||
# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@ -18,24 +18,22 @@
|
||||
|
||||
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
|
||||
Name: python-oauthlib
|
||||
Version: 2.1.0
|
||||
Version: 3.0.1
|
||||
Release: 0
|
||||
Summary: A Generic Implementation of the OAuth Request-Signing Logic
|
||||
License: BSD-3-Clause
|
||||
Group: Development/Languages/Python
|
||||
URL: https://github.com/oauthlib/oauthlib
|
||||
Source: https://files.pythonhosted.org/packages/source/o/oauthlib/oauthlib-%{version}.tar.gz
|
||||
Patch0: remove_unittest2.patch
|
||||
BuildRequires: %{python_module PyJWT}
|
||||
BuildRequires: %{python_module PyJWT >= 1.0.0}
|
||||
BuildRequires: %{python_module blinker}
|
||||
BuildRequires: %{python_module cryptography}
|
||||
BuildRequires: %{python_module mock}
|
||||
BuildRequires: %{python_module nose}
|
||||
BuildRequires: %{python_module pyasn1}
|
||||
BuildRequires: %{python_module setuptools}
|
||||
BuildRequires: fdupes
|
||||
BuildRequires: python-rpm-macros
|
||||
Requires: python-PyJWT
|
||||
Requires: python-PyJWT >= 1.0.0
|
||||
Requires: python-blinker
|
||||
Requires: python-cryptography
|
||||
BuildArch: noarch
|
||||
@ -60,7 +58,6 @@ veneer on top of OAuthLib and get OAuth support for very little effort.
|
||||
|
||||
%prep
|
||||
%setup -q -n oauthlib-%{version}
|
||||
%autopatch -p1
|
||||
|
||||
%build
|
||||
%python_build
|
||||
|
@ -1,11 +0,0 @@
|
||||
--- a/setup.py
|
||||
+++ b/setup.py
|
||||
@@ -21,7 +21,7 @@ def fread(fn):
|
||||
if sys.version_info[0] == 3:
|
||||
tests_require = ['nose', 'cryptography', 'pyjwt>=1.0.0', 'blinker']
|
||||
else:
|
||||
- tests_require = ['nose', 'unittest2', 'cryptography', 'mock', 'pyjwt>=1.0.0', 'blinker']
|
||||
+ tests_require = ['nose', 'cryptography', 'mock', 'pyjwt>=1.0.0', 'blinker']
|
||||
rsa_require = ['cryptography']
|
||||
signedtoken_require = ['cryptography', 'pyjwt>=1.0.0']
|
||||
signals_require = ['blinker']
|
Loading…
Reference in New Issue
Block a user