guillotina oauth support
Project description
.. contents::
GUILLOTINA_OAUTH
================
WARNING: this package requires a working plone.oauth server...
Features
--------
* There is no persistence information about the user
* The configuration is global for all application
Configuration
-------------
Generic global configuration on guillotina utilities section:
{
"applicatoins": ["guillotina_oauth"],
"auth_token_validators": [
"guillotina.auth.validators.SaltedHashPasswordValidator",
"guillotina_oauth.oauth.OAuthJWTValidator"
],
"oauth_settings": {
"server": "http://localhost/",
"jwt_secret": "secret",
"jwt_algorithm": "HS256",
"client_id": 11,
"client_password": "secret"
}
}
1.0.8 (2017-08-04)
------------------
- Handle errors better on renewing service tokens
[vangheem]
1.0.7 (2017-07-24)
------------------
- Allow user to validate without any roles from api
[vangheem]
1.0.6 (2017-07-24)
------------------
- Fix use of OPTIONS for oauth endpoint
[vangheem]
- make sure POST request pushes variables to oauth endpoint as json data
[vangheem]
1.0.5 (2017-07-24)
------------------
- @oauthgetcode now works on application root as well as container
[vangheem]
1.0.4 (2017-06-25)
------------------
- User id on oauth may not be mail
[bloodbare]
1.0.3 (2017-06-16)
------------------
- Handle oauth errors on connecting to invalid server
[vangheem]
1.0.2 (2017-06-16)
------------------
- Handle errors when no config is provided
[vangheem]
1.0.1 (2017-06-15)
------------------
- Do not raise KeyError if user is not found, raise Unauthorized
[vangheem]
1.0.0 (2017-04-24)
------------------
- initial release
GUILLOTINA_OAUTH
================
WARNING: this package requires a working plone.oauth server...
Features
--------
* There is no persistence information about the user
* The configuration is global for all application
Configuration
-------------
Generic global configuration on guillotina utilities section:
{
"applicatoins": ["guillotina_oauth"],
"auth_token_validators": [
"guillotina.auth.validators.SaltedHashPasswordValidator",
"guillotina_oauth.oauth.OAuthJWTValidator"
],
"oauth_settings": {
"server": "http://localhost/",
"jwt_secret": "secret",
"jwt_algorithm": "HS256",
"client_id": 11,
"client_password": "secret"
}
}
1.0.8 (2017-08-04)
------------------
- Handle errors better on renewing service tokens
[vangheem]
1.0.7 (2017-07-24)
------------------
- Allow user to validate without any roles from api
[vangheem]
1.0.6 (2017-07-24)
------------------
- Fix use of OPTIONS for oauth endpoint
[vangheem]
- make sure POST request pushes variables to oauth endpoint as json data
[vangheem]
1.0.5 (2017-07-24)
------------------
- @oauthgetcode now works on application root as well as container
[vangheem]
1.0.4 (2017-06-25)
------------------
- User id on oauth may not be mail
[bloodbare]
1.0.3 (2017-06-16)
------------------
- Handle oauth errors on connecting to invalid server
[vangheem]
1.0.2 (2017-06-16)
------------------
- Handle errors when no config is provided
[vangheem]
1.0.1 (2017-06-15)
------------------
- Do not raise KeyError if user is not found, raise Unauthorized
[vangheem]
1.0.0 (2017-04-24)
------------------
- initial release
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
guillotina_oauth-1.0.8.tar.gz
(6.2 kB
view hashes)
Built Distribution
Close
Hashes for guillotina_oauth-1.0.8-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | c27a902296520834802995c90e5a6ee43af68f7d04c062de701a7d685587f3b9 |
|
MD5 | 5adef3fdf8b4c56103c3a266ecf9ecaa |
|
BLAKE2b-256 | 2f1e6e53f7347b1a8e90980df749349158f20c1bc3f8f68ea249feae15a5525c |