Tuomas Suutari
65538b0f7d
utils.token: Use time.time to generate the timestamps
...
Use `time.time()` rather than `timezone.now()` for generating the unix
timestamps. This avoids conversion between year-month-day-hh-mm-ss
formatted timestamp vs. unix timestamp and is therefore simpler and more
robust.
Add a test case for this too and amend test_token_endpoint, since it
used to mock timezone.now, but now it needs to mock time.time.
2016-12-07 14:22:20 +02:00
Tuomas Suutari
5e3876f0c6
Revert "Fix timestamps computing in tokens"
...
This reverts commit 975eb0163f
.
2016-12-07 14:22:20 +02:00
Brice Gelineau
975eb0163f
Fix timestamps computing in tokens
...
The timestamp of timezone-aware datetimes was offset by the value of their timezone.
2016-11-30 15:23:11 +01:00
Brice Gelineau
8666990f69
Fix translations handling
...
Fix a missing _lazy.
Fix locale inclusion in the sdist package.
Fix French locale compiling.
2016-11-24 13:09:19 +01:00
hpool
acc5b408d1
Fix a bug that the value of STANDARD_CLAIMS is updated
2016-11-09 19:31:37 +09:00
Ignacio Fiorentino
53166fb9ea
Fix TypeError Unicode when using hashlib.
2016-11-04 15:56:51 -03:00
Ignacio Fiorentino
59db79b65c
Fix tests for end session endpoint.
2016-11-01 16:01:03 -03:00
Ignacio Fiorentino
e458542be2
Fix urls and names.
2016-11-01 12:15:48 -03:00
Ignacio Fiorentino
5d07111a18
Implementing end_session_endpoint feature with post_logout_redirect_uri.
2016-10-31 17:07:06 -03:00
Ignacio Fiorentino
ecba16ed36
Fix bug with id_token without openid scope.
2016-10-31 16:37:51 -03:00
Ignacio Fiorentino
50e5287b48
Initial Session Management version.
2016-10-28 15:25:52 -03:00
Ignacio Fiorentino
3711d6c5ab
Fallback user claims (email, first_name, etc).
2016-10-26 16:46:14 -03:00
David Montano
99d7194ab1
Make Client available when using OIDC_EXTRA_SCOPE_CLAIMS
...
Now it's passed the Token to the ScopeClaims constructor so that it can make Client avaialble to implementors
2016-10-12 14:23:57 -05:00
Ignacio Fiorentino
2cedde5e3f
Remove spaces.
2016-10-11 13:18:06 -03:00
Ignacio Fiorentino
38e37e7c47
Merge branch 'v0.4.x' of https://github.com/wojtek-fliposports/django-oidc-provider into wojtek-fliposports-v0.4.x
2016-10-11 11:52:31 -03:00
Ignacio Fiorentino
74b5390daa
Merge branch 'redirect_uri_query' of https://github.com/jerrykan/django-oidc-provider into jerrykan-redirect_uri_query
2016-10-05 12:33:05 -03:00
Wojciech Bartosiak
59312bf811
redirect URI clean up moved to utils module
2016-10-04 19:32:54 +02:00
Ignacio Fiorentino
6ed2c200a7
Update pyjwkest to version 1.3.0.
2016-10-03 12:54:54 -03:00
yasserisa
1c3bd7579b
FIX id_token, field iss set to type str
2016-09-21 10:20:03 -03:00
Ignacio Fiorentino
c14d2f055a
Remove Params() object from endpoints classes.
2016-09-09 14:49:41 -03:00
Ignacio Fiorentino
8a63c83514
Refactoring create_id_token function.
2016-09-09 13:10:12 -03:00
Ignacio Fiorentino
5836774f6b
Add user email into id_token. Fix missing OIDC_TOKEN_EXPIRE setting.
2016-09-09 11:43:28 -03:00
Ignacio Fiorentino
f8dbfa5c04
Add Hybrid flow login in view and models.
2016-09-08 16:21:48 -03:00
Florent Jouatte
2872d2e10b
#113 : tiny improvement
2016-08-17 12:24:00 +02:00
Florent Jouatte
2c1d582475
#113 : omit claim when empty
2016-08-17 12:13:33 +02:00
Graham Ullrich
ba4faee6ef
Fix global imports
...
Global imports ("from X import *") are discouraged in Python.
2016-08-11 16:05:13 -06:00
Graham Ullrich
ffddb69f80
Add tests for at_hash
...
Ensure at_hash is present in id_token when warranted.
2016-08-08 11:24:07 -06:00
Brian Rosner
afc3a60ee7
Added at_hash when access token is present
...
This is required by response type "id_token token", but can be
used by other flows if they choose.
2016-08-05 14:00:00 -06:00
Ignacio Fiorentino
dc9ec1863e
Change setting OIDC_USERINFO.
2016-07-07 12:50:27 -03:00
Ignacio Fiorentino
4cc7474c19
Add verbose name and description for scopes.
2016-06-16 17:18:39 -03:00
Ignacio Fiorentino
5255719700
Add date_given to UserConsent model. Add verbose names in models.
2016-06-13 12:15:10 -03:00
Ignacio Fiorentino
eea590e006
Modify scope claims class.
2016-05-30 13:28:07 -03:00
Si Feng
be5656bcf4
Make SITE_URL
optional.
2016-05-25 14:58:58 -07:00
Ignacio Fiorentino
497f2f3a68
Bump version v0.3.3.
2016-05-03 12:17:22 -03:00
Ignacio Fiorentino
9f9df355a3
Merge branch 'v0.3.x' of https://github.com/juanifioren/django-oidc-provider into feature-jwtalg
2016-04-25 14:55:30 -03:00
Ignacio Fiorentino
61f0c209af
Refactoring prompt=none logic.
2016-04-13 17:19:37 -03:00
John Kristensen
2f54e53766
Ensure client redirect URIs with query strings work
...
In some cases a client will provide a redirect URI with a query string.
In these cases the client redirect URI should still still match a
registered redirect URI and not result in a failure.
2016-04-13 22:29:21 +10:00
Ignacio Fiorentino
b05894bf6d
Add prompt parameter to authorize view.
2016-04-12 18:19:16 -03:00
Ignacio Fiorentino
e97c32acd1
Fix encoding problem when using Py34.
2016-04-08 13:22:05 -03:00
Ignacio Fiorentino
e495d6c41d
Remplace AES encryption with database. For saving PKCE parameters.
2016-04-07 16:18:47 -03:00
Ignacio
b1b8247cb0
Add hidden inputs for PKCE. Fix bug with AES.
2016-04-07 11:45:35 -03:00
Ignacio Fiorentino
6e8af74f76
First intent to implement PKCE.
2016-04-06 18:03:30 -03:00
Ignacio Fiorentino
dff76cd1ea
Add HS256 support for JWS.
2016-03-22 16:17:56 -03:00
Nick Mohoric
f8dce31fa2
Changed logging from error to debug
2016-03-17 14:31:41 -04:00
Wojciech Bartosiak
08033bb9ad
Fix missing verification of response type for client
2016-03-08 13:21:55 +00:00
Wojciech Bartosiak
7cb5b4d54e
str or list or tuple for OIDC_ID_TOKEN_PROCESSING_HOOK
2016-03-01 17:54:57 +00:00
Ignacio
a4d5f89536
Merge branch 'v0.2.x' of https://github.com/juanifioren/django-oidc-provider into v0.3.x
...
Conflicts:
oidc_provider/lib/utils/common.py
oidc_provider/lib/utils/token.py
2016-02-25 10:10:07 -03:00
Ilya
49e19e7493
ID_TOKEN_PROCESSING_HOOK gets user argument
2016-02-25 09:46:10 +00:00
Wojciech Bartosiak
a28db60d9e
added 'user' into default_idtoken_processing_hook
2016-02-17 22:24:02 +00:00
Wojciech Bartosiak
eb7686abba
added 'user' into default_idtoken_processing_hook
2016-02-17 22:23:10 +00:00