Commit Graph

555 Commits

Author SHA1 Message Date
Serghei Mihai a5e11c247f http basic authentication while retreiving the jwt 2015-02-18 10:20:59 +01:00
Serghei Mihai 14b9aa7fa9 store the JWT token in current object if available 2015-02-10 10:08:19 +01:00
Serghei Mihai 905ae5234f basic HTTP authentication used to request the server 2015-02-10 10:07:20 +01:00
Serghei Mihai dc12665fbb storing retreived access_token in current client object 2015-02-10 10:04:36 +01:00
Serghei Mihai be4cb35915 using directly requests to retreive user information 2015-02-10 10:03:55 +01:00
Roland Hedberg c2ef2eecb3 Make sure I have the necessary keys available.
Added some tests.
2015-01-10 13:28:24 +01:00
Roland Hedberg 8493602411 Exception needs message string. 2015-01-10 10:15:40 +01:00
Roland Hedberg 3a5d8d4222 Make all exceptions thrown by pyoidc code have a common ancestor.
Also, a missing key for verifying a signature is not the same thing as a faulty signature.
2015-01-10 10:10:12 +01:00
Roland Hedberg 35229fead4 Make all exceptions thrown by pyoidc code have a common ancestor. 2014-12-28 16:56:04 +01:00
Roland Hedberg 7645ac70fd More error info 2014-12-28 16:51:35 +01:00
Roland Hedberg a40240a7f5 Only one OP per Client instance. 2014-12-17 10:24:26 +01:00
Roland Hedberg b4d82db3a1 When the authorization request is faulty in some way return a error response. Code flow or implicit depending on response_type. If the error has something to do with the return_uri return the response to the user not the RP. 2014-12-16 11:23:40 +01:00
Roland Hedberg f25dc0ec1d Minor changes 2014-12-16 11:14:44 +01:00
Roland Hedberg 68908be4f5 Merge branch 'ci_testing' of https://github.com/maennel/pyoidc into maennel-ci_testing
Conflicts:
	.travis.yml
	README.rst
	setup.py
	src/oic/oic/message.py
	src/oic/oic/provider.py
	src/oic/utils/authn/user.py
	tests/test_oic_provider.py
2014-12-15 21:28:57 +01:00
Roland Hedberg 59cb4481e5 Allow extra claims to be added to the idtoken by Rebecka Gulliksson. 2014-12-15 16:20:44 +01:00
Roland Hedberg 863b4a35e3 Use the newly added method. 2014-12-15 08:47:11 +01:00
Roland Hedberg bce5e69b4e Added a new method which allows me to find a issuer given an endpoint and the endpoint url. 2014-12-15 08:45:03 +01:00
Roland Hedberg 7eeaabeb0e Use the OP key when verifying signature on a received JWT. 2014-12-13 15:21:58 +01:00
Tom Hunger 03222f2c2b Set encoding of message.py to utf8.
The file contains an integral sign which breaks compilation on python2.7+
when no encoding is set.
2014-12-12 17:36:52 +00:00
Roland Hedberg b1ebfd3f41 Path may not be specified in kwargs in verify method of UsernamePasswordMako. 2014-12-12 09:40:14 +01:00
Roland Hedberg 263d5f9302 Fixed bug in claims_match method 2014-12-12 09:39:10 +01:00
Roland Hedberg a0a1d5a756 Changed how the string representation of a message is done. 2014-12-12 09:38:10 +01:00
Roland Hedberg 07f1fde2c2 401 among reasonable error codes. 2014-12-09 14:14:46 +01:00
Roland Hedberg ad5eb40dc6 A couple of spelling errors in text.
Allow for 'none' algorithm for signing IDToken.
2014-12-09 10:39:37 +01:00
Roland Hedberg 1f932e0b45 Made the provider sync the client DB to disc everytime a new client is registered. 2014-11-28 11:49:09 +01:00
Roland Hedberg 19573f36b7 If a JWKS is imported from somewhere on the net keep the original data for later reference. 2014-11-27 17:53:18 +01:00
Roland Hedberg 48de8bed9e Allow the choice of user interface language for the login page. 2014-11-27 11:23:59 +01:00
Roland Hedberg c320a94b77 The reuired_user method didn't do the right thing. 2014-11-25 16:46:51 +01:00
Manuel Jeckelmann 7bd5fed021 Merge remote-tracking branch 'rohe/master' into ci_testing
Conflicts:
	setup.py
	src/oic/oauth2/provider.py
	src/oic/oic/provider.py
	src/oic/utils/sdb.py
2014-11-24 16:10:23 +01:00
Roland Hedberg 049e64c99b Deal with the fact that input may contain a dictionary that has keys with no values. 2014-11-24 10:46:44 +01:00
Roland Hedberg 2f22b2f37f Refactored the sdb module. 2014-11-24 10:45:37 +01:00
Manuel Jeckelmann 7d4b4f4467 Merge remote-tracking branch 'rohe/master' into ci_testing
Conflicts:
	oidc_example/rp3/modules/opchoice.mako.py
	src/oic/oic/provider.py
	src/oic/utils/http_util.py
	src/oic/utils/keyio.py
2014-11-23 21:19:21 +01:00
Roland Hedberg b9fd3f676c Fixed things the changes in pyjwkest broke. 2014-11-16 09:21:12 +01:00
Roland Hedberg 86cc495567 Fixes as consequence of changes in pyjwkest.
Added .travis.yml file
2014-11-13 22:46:14 +01:00
Roland Hedberg 1306a7ecde Added support for rotating keys. 2014-11-12 15:12:47 +01:00
Roland Hedberg f2eb2a22e8 Refactored the initial OP/RP key setup
Worked on the support for elliptic curves.
2014-11-10 16:16:26 +01:00
Roland Hedberg 5e14dd4c06 Allow inactive keys to be kept in key jar. 2014-11-09 13:45:56 +01:00
Manuel Jeckelmann 69242ed4a3 Another PEP8 iteration 2014-11-07 15:02:53 +01:00
Manuel Jeckelmann 334986f7b7 Merge remote-tracking branch 'rohe/master' into maennel_master
Conflicts:
	src/oic/oauth2/__init__.py
2014-11-07 14:59:07 +01:00
Manuel Jeckelmann 57cd46ad23 Refactored according to PEP8 and optimized imports 2014-11-07 14:49:22 +01:00
Roland Hedberg 85cba0aceb Added a __delitem__ method
Proposed by M. Jeckelmann
2014-11-06 12:26:22 +01:00
Roland Hedberg 4845fac868 Added verfication_endpoints parameter ro LDAPAuthn __init__
Proposed by M. Jeckelmann
2014-11-06 12:25:50 +01:00
Roland Hedberg 6ed39b6e9c Logout acr support, more debug logging.
Proposed by M. Jeckelmann
2014-11-06 12:24:26 +01:00
Roland Hedberg f6dc157eff Class variable should be defined in __init__ 2014-11-06 12:23:07 +01:00
Roland Hedberg f768bf7cab Refactored.
Added support for encrypting request JWT.
2014-11-06 12:21:23 +01:00
Roland Hedberg f3a5066cff Interesting to know which HTTP method that failed. 2014-11-06 12:20:10 +01:00
Roland Hedberg d7c2e1b773 More error logging 2014-10-25 08:15:42 -05:00
Roland Hedberg ee24e041d2 More error logging 2014-10-25 08:08:59 -05:00
Tomas Pazderka 764abc57de Fixed error when _str is None 2014-10-20 13:16:51 +02:00
Roland Hedberg cfacd5cdc0 Add information about where it broke. 2014-10-16 14:43:47 +02:00