forked from pool/python-oauthlib
Accepting request 676991 from home:jayvdb:django
- Update to version 3.0.1
* Fixed regression introduced in 3.0.0
+ Fixed Revocation & Introspection Endpoints when using Client
Authentication with HTTP Basic Auth.
- from 3.0.0
* General fixes:
+ Add support of python3.7
+ $ and ' are allowed to be unencoded in query strings
+ Request attributes are no longer overriden by HTTP Headers
+ Removed unnecessary code for handling python2.6
+ Several minors updates to setup.py and tox
+ Set pytest as the default unittest framework
* OAuth2.0 Provider - outstanding Features
+ OpenID Connect Core support
+ RFC7662 Introspect support
+ RFC8414 OAuth2.0 Authorization Server Metadata support
+ RFC7636 PKCE support
* OAuth2.0 Provider - API/Breaking Changes
+ Add "request" to confirm_redirect_uri
+ confirm_redirect_uri/get_default_redirect_uri has a bit changed
+ invalid_client is now a FatalError
+ Changed errors status code from 401 to 400:
- invalid_grant:
- invalid_scope:
- access_denied/unauthorized_client/consent_required/login_required
- 401 must have WWW-Authenticate HTTP Header set.
* OAuth2.0 Provider - Bugfixes
+ empty scopes no longer raise exceptions for implicit and authorization_code
* OAuth2.0 Client - Bugfixes / Changes:
+ expires_in in Implicit flow is now an integer
+ expires is no longer overriding expires_in
+ parse_request_uri_response is now required
+ Unknown error=xxx raised by OAuth2 providers was not understood
+ OAuth2's `prepare_token_request` supports sending an empty string for `client_id`
+ OAuth2's `WebApplicationClient.prepare_request_body` was refactored to better
support sending or omitting the `client_id` via a new `include_client_id` kwarg.
By default this is included. The method will also emit a DeprecationWarning if
a `client_id` parameter is submitted; the already configured `self.client_id`
is the preferred option.
* OAuth1.0 Client:
+ Support for HMAC-SHA256
- Removed remove_unittest2.patch made redundant by v3.0.1
- Set minumum version of python-PyJWT >= 1.0.0
OBS-URL: https://build.opensuse.org/request/show/676991
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-oauthlib?expand=0&rev=40
This commit is contained in:
committed by
Git OBS Bridge
parent
3552ed62d1
commit
3a5e559532
@@ -1,3 +1,50 @@
|
||||
-------------------------------------------------------------------
|
||||
Sun Feb 17 00:40:20 UTC 2019 - John Vandenberg <jayvdb@gmail.com>
|
||||
|
||||
- Update to version 3.0.1
|
||||
* Fixed regression introduced in 3.0.0
|
||||
+ Fixed Revocation & Introspection Endpoints when using Client
|
||||
Authentication with HTTP Basic Auth.
|
||||
- from 3.0.0
|
||||
* General fixes:
|
||||
+ Add support of python3.7
|
||||
+ $ and ' are allowed to be unencoded in query strings
|
||||
+ Request attributes are no longer overriden by HTTP Headers
|
||||
+ Removed unnecessary code for handling python2.6
|
||||
+ Several minors updates to setup.py and tox
|
||||
+ Set pytest as the default unittest framework
|
||||
* OAuth2.0 Provider - outstanding Features
|
||||
+ OpenID Connect Core support
|
||||
+ RFC7662 Introspect support
|
||||
+ RFC8414 OAuth2.0 Authorization Server Metadata support
|
||||
+ RFC7636 PKCE support
|
||||
* OAuth2.0 Provider - API/Breaking Changes
|
||||
+ Add "request" to confirm_redirect_uri
|
||||
+ confirm_redirect_uri/get_default_redirect_uri has a bit changed
|
||||
+ invalid_client is now a FatalError
|
||||
+ Changed errors status code from 401 to 400:
|
||||
- invalid_grant:
|
||||
- invalid_scope:
|
||||
- access_denied/unauthorized_client/consent_required/login_required
|
||||
- 401 must have WWW-Authenticate HTTP Header set.
|
||||
* OAuth2.0 Provider - Bugfixes
|
||||
+ empty scopes no longer raise exceptions for implicit and authorization_code
|
||||
* OAuth2.0 Client - Bugfixes / Changes:
|
||||
+ expires_in in Implicit flow is now an integer
|
||||
+ expires is no longer overriding expires_in
|
||||
+ parse_request_uri_response is now required
|
||||
+ Unknown error=xxx raised by OAuth2 providers was not understood
|
||||
+ OAuth2's `prepare_token_request` supports sending an empty string for `client_id`
|
||||
+ OAuth2's `WebApplicationClient.prepare_request_body` was refactored to better
|
||||
support sending or omitting the `client_id` via a new `include_client_id` kwarg.
|
||||
By default this is included. The method will also emit a DeprecationWarning if
|
||||
a `client_id` parameter is submitted; the already configured `self.client_id`
|
||||
is the preferred option.
|
||||
* OAuth1.0 Client:
|
||||
+ Support for HMAC-SHA256
|
||||
- Removed remove_unittest2.patch made redundant by v3.0.1
|
||||
- Set minumum version of python-PyJWT >= 1.0.0
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Dec 4 12:50:57 UTC 2018 - Matej Cepl <mcepl@suse.com>
|
||||
|
||||
|
||||
Reference in New Issue
Block a user