David Montano
99d7194ab1
Make Client available when using OIDC_EXTRA_SCOPE_CLAIMS
...
Now it's passed the Token to the ScopeClaims constructor so that it can make Client avaialble to implementors
2016-10-12 14:23:57 -05:00
Ignacio Fiorentino
2cedde5e3f
Remove spaces.
2016-10-11 13:18:06 -03:00
Ignacio Fiorentino
38e37e7c47
Merge branch 'v0.4.x' of https://github.com/wojtek-fliposports/django-oidc-provider into wojtek-fliposports-v0.4.x
2016-10-11 11:52:31 -03:00
Ignacio Fiorentino
74b5390daa
Merge branch 'redirect_uri_query' of https://github.com/jerrykan/django-oidc-provider into jerrykan-redirect_uri_query
2016-10-05 12:33:05 -03:00
Wojciech Bartosiak
59312bf811
redirect URI clean up moved to utils module
2016-10-04 19:32:54 +02:00
Ignacio Fiorentino
6ed2c200a7
Update pyjwkest to version 1.3.0.
2016-10-03 12:54:54 -03:00
yasserisa
1c3bd7579b
FIX id_token, field iss set to type str
2016-09-21 10:20:03 -03:00
Ignacio Fiorentino
c14d2f055a
Remove Params() object from endpoints classes.
2016-09-09 14:49:41 -03:00
Ignacio Fiorentino
8a63c83514
Refactoring create_id_token function.
2016-09-09 13:10:12 -03:00
Ignacio Fiorentino
5836774f6b
Add user email into id_token. Fix missing OIDC_TOKEN_EXPIRE setting.
2016-09-09 11:43:28 -03:00
Ignacio Fiorentino
f8dbfa5c04
Add Hybrid flow login in view and models.
2016-09-08 16:21:48 -03:00
Florent Jouatte
2872d2e10b
#113 : tiny improvement
2016-08-17 12:24:00 +02:00
Florent Jouatte
2c1d582475
#113 : omit claim when empty
2016-08-17 12:13:33 +02:00
Graham Ullrich
ba4faee6ef
Fix global imports
...
Global imports ("from X import *") are discouraged in Python.
2016-08-11 16:05:13 -06:00
Graham Ullrich
ffddb69f80
Add tests for at_hash
...
Ensure at_hash is present in id_token when warranted.
2016-08-08 11:24:07 -06:00
Brian Rosner
afc3a60ee7
Added at_hash when access token is present
...
This is required by response type "id_token token", but can be
used by other flows if they choose.
2016-08-05 14:00:00 -06:00
Ignacio Fiorentino
dc9ec1863e
Change setting OIDC_USERINFO.
2016-07-07 12:50:27 -03:00
Ignacio Fiorentino
4cc7474c19
Add verbose name and description for scopes.
2016-06-16 17:18:39 -03:00
Ignacio Fiorentino
5255719700
Add date_given to UserConsent model. Add verbose names in models.
2016-06-13 12:15:10 -03:00
Ignacio Fiorentino
eea590e006
Modify scope claims class.
2016-05-30 13:28:07 -03:00
Si Feng
be5656bcf4
Make SITE_URL
optional.
2016-05-25 14:58:58 -07:00
Ignacio Fiorentino
497f2f3a68
Bump version v0.3.3.
2016-05-03 12:17:22 -03:00
Ignacio Fiorentino
9f9df355a3
Merge branch 'v0.3.x' of https://github.com/juanifioren/django-oidc-provider into feature-jwtalg
2016-04-25 14:55:30 -03:00
Ignacio Fiorentino
61f0c209af
Refactoring prompt=none logic.
2016-04-13 17:19:37 -03:00
John Kristensen
2f54e53766
Ensure client redirect URIs with query strings work
...
In some cases a client will provide a redirect URI with a query string.
In these cases the client redirect URI should still still match a
registered redirect URI and not result in a failure.
2016-04-13 22:29:21 +10:00
Ignacio Fiorentino
b05894bf6d
Add prompt parameter to authorize view.
2016-04-12 18:19:16 -03:00
Ignacio Fiorentino
e97c32acd1
Fix encoding problem when using Py34.
2016-04-08 13:22:05 -03:00
Ignacio Fiorentino
e495d6c41d
Remplace AES encryption with database. For saving PKCE parameters.
2016-04-07 16:18:47 -03:00
Ignacio
b1b8247cb0
Add hidden inputs for PKCE. Fix bug with AES.
2016-04-07 11:45:35 -03:00
Ignacio Fiorentino
6e8af74f76
First intent to implement PKCE.
2016-04-06 18:03:30 -03:00
Ignacio Fiorentino
dff76cd1ea
Add HS256 support for JWS.
2016-03-22 16:17:56 -03:00
Nick Mohoric
f8dce31fa2
Changed logging from error to debug
2016-03-17 14:31:41 -04:00
Wojciech Bartosiak
08033bb9ad
Fix missing verification of response type for client
2016-03-08 13:21:55 +00:00
Wojciech Bartosiak
7cb5b4d54e
str or list or tuple for OIDC_ID_TOKEN_PROCESSING_HOOK
2016-03-01 17:54:57 +00:00
Ignacio
a4d5f89536
Merge branch 'v0.2.x' of https://github.com/juanifioren/django-oidc-provider into v0.3.x
...
Conflicts:
oidc_provider/lib/utils/common.py
oidc_provider/lib/utils/token.py
2016-02-25 10:10:07 -03:00
Ilya
49e19e7493
ID_TOKEN_PROCESSING_HOOK gets user argument
2016-02-25 09:46:10 +00:00
Wojciech Bartosiak
a28db60d9e
added 'user' into default_idtoken_processing_hook
2016-02-17 22:24:02 +00:00
Wojciech Bartosiak
eb7686abba
added 'user' into default_idtoken_processing_hook
2016-02-17 22:23:10 +00:00
juanifioren
25a59c8344
Refactoring supporting OAuth2 flow.
2016-02-16 17:33:12 -03:00
juanifioren
8eb0877d89
Refactoring userinfo endpoint. Create decorator "oauth2.protected_resource_view".
2016-02-15 17:13:19 -03:00
juanifioren
782befd6ec
Rename setting.
2016-02-12 14:51:43 -03:00
Wojciech Bartosiak
7a357001b6
Added OIDC_ID_TOKEN_PROCESSING_HOOK functionality
2016-02-12 16:02:35 +00:00
juanifioren
998ea5fcd1
Implementation of RSA Keys using Models. Also providing DOC.
2016-01-25 17:52:24 -03:00
juanifioren
73ece1bf64
Make OIDC_AFTER_USERLOGIN_HOOK to be lazy imported by string.
2016-01-19 17:37:32 -03:00
juanifioren
c6534db693
Add nonce validation for Implicit Flow.
2016-01-19 16:05:34 -03:00
Pablo SEMINARIO
9204c478ed
Fix #72 get_issuer() returns a wrong value
2016-01-16 11:35:26 +01:00
juanifioren
ccd9836edb
Make OIDC_IDTOKEN_SUB_GENERATOR to be lazy imported by the location of the function.
2016-01-12 15:17:22 -03:00
juanifioren
8b0d869f7b
Replace django redirect with custom HttpResponse object.
2015-11-12 17:12:18 -03:00
juanifioren
9a685a7afa
Merge from ByteInternet:refresh-tokens
2015-09-30 12:59:08 -03:00
Maarten van Schaik
893a877b76
Upgrade pyjwkest to version > 1.0.3
...
There have been some issues in Python 3 where elements of the id_token
were left when encoding the token. Cause was incorrect encoding logic in
pyjwkest. Version 1.0.3 has improved encoding handling.
2015-09-30 17:31:49 +02:00