pkgsrc/security/py-oauth2client/PLIST

106 lines
4.9 KiB
Text
Raw Normal View History

@comment $NetBSD: PLIST,v 1.5 2017/05/11 09:24:06 adam Exp $
${PYSITELIB}/${EGG_INFODIR}/PKG-INFO
${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt
${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt
${PYSITELIB}/${EGG_INFODIR}/requires.txt
${PYSITELIB}/${EGG_INFODIR}/top_level.txt
${PYSITELIB}/oauth2client/__init__.py
${PYSITELIB}/oauth2client/__init__.pyc
${PYSITELIB}/oauth2client/__init__.pyo
Update py-oauth2client to 1.5.2. Needed by py-google-api-python-client-1.4.2. ## v1.5.2 * Add access token refresh error class that includes HTTP status (#310) * Python3 compatibility fixes for Django (#316, #318) * Fix incremental auth in flask_util (#322) * Fall back to credential refresh on EDEADLK in multistore_file (#336) ## v1.5.1 * Fix bad indent in `tools.run_flow()` (#301, bug was introduced when switching from 2 space indents to 4) ## v1.5.0 * Fix (more like clarify) `bytes` / `str` handling in crypto methods. (#203, #250, #272) * Replacing `webapp` with `webapp2` in `oauth2client.appengine` (#217) * Added optional `state` parameter to `step1_get_authorize_url`. (#219 and #222) * Added `flask_util` module that provides a Flask extension to aid with using OAuth2 web server flow. This provides the same functionality as the `appengine.webapp2` OAuth2Decorator, but will work with any Flask application regardless of hosting environment. (#226, #273) * Track scopes used on credentials objects (#230) * Moving docs to [readthedocs.org][1] (#237, #238, #244) * Removing `old_run` module. Was deprecated July 2, 2013. (#285) * Avoid proxies when querying for GCE metadata (to check if running on GCE) (#114, #293) [1]: https://readthedocs.org/ ## v1.4.12 * Fix OS X flaky test failure (#189). * Fix broken OpenSSL import (#191). * Remove `@util.positional` from wrapped request in `Credentials.authorize()` (#196, #197). * Changing pinned dependencies to `>=` (#200, #204). * Support client authentication using `Authorization` header (#206). * Clarify environment check in case where GAE imports succeed but GAE services aren't available (#208). ## v1.4.11 * Better environment detection with Managed VMs. * Better OpenSSL detection in exotic environments. ## v1.4.10 * Update the `OpenSSL` check to be less strict about finding `crypto.py` in the `OpenSSL` directory. * `tox` updates for new environment handling in `tox`. ## v1.4.9 * Ensure that the ADC fails if we try to *write* the well-known file to a directory that doesn't exist, but not if we try to *read* from one. ## v1.4.8 * Better handling of `body` during token refresh when `body` is a stream. * Better handling of expired tokens in storage. * Cleanup around `openSSL` import. * Allow custom directory for the `well_known_file`. * Integration tests for python2 and python3. (!!!) * Stricter file permissions when saving the `well_known_file`. * Test cleanup around config file locations. ## v1.4.7 * Add support for Google Developer Shell credentials. * Better handling of filesystem errors in credential refresh. * python3 fixes * Add `NO_GCE_CHECK` for skipping GCE detection. * Better error messages on `InvalidClientSecretsError`. * Comment cleanup on `run_flow`. ## v1.4.6 * Add utility function to convert PKCS12 key to PEM. (#115) * Change GCE detection logic. (#93) * Add a tox env for doc generation. ## v1.4.5 * Set a shorter timeout for an Application Default Credentials issue on some networks. (#93, #101) * Test cleanup, switch from mox to mock. (#103) * Switch docs to sphinx from epydoc. ## v1.4.4 * Fix a bug in bytes/string encoding of headers. ## v1.4.3 * Big thanks to @dhermes for spotting and fixing a mess in our test setup. * Fix a serious issue with tests not being run. (#86, #87, #89) * Start credentials cleanup for single 2LO/3LO call. (#83, #84) * Clean up stack traces when re-raising in some places. (#79) * Clean up doc building. (#81, #82) * Fixed minimum version for `six` dependency. (#75)
2016-02-15 11:45:40 +01:00
${PYSITELIB}/oauth2client/_helpers.py
${PYSITELIB}/oauth2client/_helpers.pyc
${PYSITELIB}/oauth2client/_helpers.pyo
${PYSITELIB}/oauth2client/_openssl_crypt.py
${PYSITELIB}/oauth2client/_openssl_crypt.pyc
${PYSITELIB}/oauth2client/_openssl_crypt.pyo
Updated py-oauth2client to 4.0.0. ## v4.0.0 New features: * New Django samples. (#636) * Add support for RFC7636 PKCE. (#588) * Release as a universal wheel. (#665) Bug fixes: * Fix django authorization redirect by correctly checking validity of credentials. (#651) * Correct query loss when using parse_qsl to dict. (#622) * Switch django models from pickle to jsonpickle. (#614) * Support new MIDDLEWARE Django 1.10 aetting. (#623) * Remove usage of os.environ.setdefault. (#621) * Handle missing storage files correctly. (#576) * Try to revoke token with POST when getting a 405. (#662) Internal changes: * Use transport module for GCE environment check. (#612) * Remove __author__ lines and add contributors.md. (#627) * Clean up imports. (#625) * Use transport.request in tests. (#607) * Drop unittest2 dependency (#610) * Remove backslash line continuations. (#608) * Use transport helpers in system tests. (#606) * Clean up usage of HTTP mocks in tests. (#605) * Remove all uses of MagicMock. (#598) * Migrate test runner to pytest. (#569) * Merge util.py and _helpers.py. (#579) * Remove httplib2 imports from non-transport modules. (#577) Breaking changes: * Drop Python 3.3 support. (#603) * Drop Python 2.6 support. (#590) * Remove multistore_file. (#589) ## v3.0.0 * Populate `token_expiry` for GCE credentials. (#473) * Move GCE metadata interface to a separate module. (#520) * Populate `scopes` for GCE credentials. (#524) * Fix Python 3.5 compatibility. (#531) * Add `oauth2client.contrib.sqlalchemy`, a SQLAlchemy-based credential store. (#527) * Improve error when an invalid client secret is provided. (#530) * Add `oauth2client.contrib.multiprocess_storage`. This supersedes the functionality in `oauth2client.contrib.multistore_file`. (#504) * Pull httplib2 usage into a separate transport module. (#559, #561) * Refactor all django-related code into `oauth2client.contrib.django_util`. Add `DjangoORMStorage`, remove `FlowField`. (#546) * Fix application default credentials resolution order. (#570) * Add configurable timeout for GCE metadata server check. (#571) * Add warnings when using deprecated `approval_prompt='force'`. (#572) * Add deprecation warning to `oauth2client.contrib.multistore_file`. (#574) * (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562) * (Hygiene) Remove duplicated exception classes in `oauth2client.contrib.appengine`. (#533) NOTE: The next major release of oauth2client (v4.0.0) will remove the `oauth2client.contrib.multistore_file` module. ## v2.2.0 * Added support to override `token_uri` and `revoke_uri` in `oauth2client.service_account.ServiceAccountCredentials`. (#510) * `oauth2client.contrib.multistore_file` now handles `OSError` in addition to `IOError` because Windows may raise `OSError` where other platforms will raise `IOError`. * `oauth2client.contrib.django_util` and `oauth2client.contrib.django_orm` have been updated to support Django 1.8 - 1.10. Versions of Django below 1.8 will not work with these modules. ## v2.1.0 * Add basic support for JWT access credentials. (#503) * Fix `oauth2client.client.DeviceFlowInfo` to use UTC instead of the system timezone when calculating code expiration. ## v2.0.2 * Fix issue where `flask_util.UserOAuth2.required` would accept expired credentials (#452). * Fix issue where `flask_util` would fill the session with `Flow` objects (#498). * Fix issue with Python 3 binary strings in `Flow.step2_exchange` (#446). * Improve test coverage to 100%. ## v2.0.1 * Making scopes optional on Google Compute Engine `AppAssertionCredentials` and adding a warning that GCE won't honor scopes (#419) * Adding common `sign_blob()` to service account types and a `service_account_email` property. (#421) * Improving error message in P12 factory `ServiceAccountCredentials.from_p12_keyfile` when pyOpenSSL is missing. (#424) * Allowing default flags in `oauth2client.tools.run_flow()` rather than forcing users to create a dummy argparser (#426) * Removing `oauth2client.util.dict_to_tuple_key()` from public interface (#429) * Adding `oauth2client.contrib._appengine_ndb` helper module for `oauth2client.contrib.appengine` and moving most code that uses the `ndb` library into the helper (#434) * Fix error in `django_util` sample code (#438) ## v2.0.0-post1 * Fix Google Compute Engine breakage (#411, breakage introduced in #387) that made it impossible to obtain access tokens * Implement `ServiceAccountCredentials.from_p12_keyfile_buffer()` to allow passing a file-like object in addition to the factory constructor that uses a filename directly (#413) * Implement `ServiceAccountCredentials.create_delegated()` to allow upgrading a credential to one that acts on behalf of a given subject (#420)
2016-10-19 15:02:48 +02:00
${PYSITELIB}/oauth2client/_pkce.py
${PYSITELIB}/oauth2client/_pkce.pyc
${PYSITELIB}/oauth2client/_pkce.pyo
Update py-oauth2client to 2.0.0. ## v2.0.0 * Add django_util (#332) * Avoid OAuth2Credentials `id_token` going out of sync after a token refresh (#337) * Move to a `contrib` sub-package code not considered a core part of the library (#346, #353, #370, #375, #376, #382) * Add `token_expiry` to `devshell` credentials (#372) * Move `Storage` locking into a base class (#379) * Added dictionary storage (#380) * Added `to_json` and `from_json` methods to all `Credentials` classes (#385) * Fall back to read-only credentials on EACCES errors (#389) * Coalesced the two `ServiceAccountCredentials` classes (#395, #396, #397, #398, #400) ### Special Note About `ServiceAccountCredentials`: ------------------------------------------------- For JSON keys, you can create a credential via ```py from oauth2client.service_account import ServiceAccountCredentials credentials = ServiceAccountCredentials.from_json_keyfile_name( key_file_name, scopes=[...]) ``` You can still rely on ```py from oauth2client.client import GoogleCredentials credentials = GoogleCredentials.get_application_default() ``` returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS` environment variable. For `.p12` keys, construct via ```py credentials = ServiceAccountCredentials.from_p12_keyfil( service_account_email, key_file_name, scopes=[...]) ``` though we urge you to use JSON keys (rather than `.p12` keys) if you can. This is equivalent to the previous method ```py # PRE-oauth2client 2.0.0 EXAMPLE CODE! from oauth2client.client import SignedJwtAssertionCredentials with open(key_file_name, 'rb') as key_file: private_key = key_file.read() credentials = SignedJwtAssertionCredentials( service_account_email, private_key, scope=[...]) ```
2016-03-03 13:59:55 +01:00
${PYSITELIB}/oauth2client/_pure_python_crypt.py
${PYSITELIB}/oauth2client/_pure_python_crypt.pyc
${PYSITELIB}/oauth2client/_pure_python_crypt.pyo
Update py-oauth2client to 1.5.2. Needed by py-google-api-python-client-1.4.2. ## v1.5.2 * Add access token refresh error class that includes HTTP status (#310) * Python3 compatibility fixes for Django (#316, #318) * Fix incremental auth in flask_util (#322) * Fall back to credential refresh on EDEADLK in multistore_file (#336) ## v1.5.1 * Fix bad indent in `tools.run_flow()` (#301, bug was introduced when switching from 2 space indents to 4) ## v1.5.0 * Fix (more like clarify) `bytes` / `str` handling in crypto methods. (#203, #250, #272) * Replacing `webapp` with `webapp2` in `oauth2client.appengine` (#217) * Added optional `state` parameter to `step1_get_authorize_url`. (#219 and #222) * Added `flask_util` module that provides a Flask extension to aid with using OAuth2 web server flow. This provides the same functionality as the `appengine.webapp2` OAuth2Decorator, but will work with any Flask application regardless of hosting environment. (#226, #273) * Track scopes used on credentials objects (#230) * Moving docs to [readthedocs.org][1] (#237, #238, #244) * Removing `old_run` module. Was deprecated July 2, 2013. (#285) * Avoid proxies when querying for GCE metadata (to check if running on GCE) (#114, #293) [1]: https://readthedocs.org/ ## v1.4.12 * Fix OS X flaky test failure (#189). * Fix broken OpenSSL import (#191). * Remove `@util.positional` from wrapped request in `Credentials.authorize()` (#196, #197). * Changing pinned dependencies to `>=` (#200, #204). * Support client authentication using `Authorization` header (#206). * Clarify environment check in case where GAE imports succeed but GAE services aren't available (#208). ## v1.4.11 * Better environment detection with Managed VMs. * Better OpenSSL detection in exotic environments. ## v1.4.10 * Update the `OpenSSL` check to be less strict about finding `crypto.py` in the `OpenSSL` directory. * `tox` updates for new environment handling in `tox`. ## v1.4.9 * Ensure that the ADC fails if we try to *write* the well-known file to a directory that doesn't exist, but not if we try to *read* from one. ## v1.4.8 * Better handling of `body` during token refresh when `body` is a stream. * Better handling of expired tokens in storage. * Cleanup around `openSSL` import. * Allow custom directory for the `well_known_file`. * Integration tests for python2 and python3. (!!!) * Stricter file permissions when saving the `well_known_file`. * Test cleanup around config file locations. ## v1.4.7 * Add support for Google Developer Shell credentials. * Better handling of filesystem errors in credential refresh. * python3 fixes * Add `NO_GCE_CHECK` for skipping GCE detection. * Better error messages on `InvalidClientSecretsError`. * Comment cleanup on `run_flow`. ## v1.4.6 * Add utility function to convert PKCS12 key to PEM. (#115) * Change GCE detection logic. (#93) * Add a tox env for doc generation. ## v1.4.5 * Set a shorter timeout for an Application Default Credentials issue on some networks. (#93, #101) * Test cleanup, switch from mox to mock. (#103) * Switch docs to sphinx from epydoc. ## v1.4.4 * Fix a bug in bytes/string encoding of headers. ## v1.4.3 * Big thanks to @dhermes for spotting and fixing a mess in our test setup. * Fix a serious issue with tests not being run. (#86, #87, #89) * Start credentials cleanup for single 2LO/3LO call. (#83, #84) * Clean up stack traces when re-raising in some places. (#79) * Clean up doc building. (#81, #82) * Fixed minimum version for `six` dependency. (#75)
2016-02-15 11:45:40 +01:00
${PYSITELIB}/oauth2client/_pycrypto_crypt.py
${PYSITELIB}/oauth2client/_pycrypto_crypt.pyc
${PYSITELIB}/oauth2client/_pycrypto_crypt.pyo
${PYSITELIB}/oauth2client/client.py
${PYSITELIB}/oauth2client/client.pyc
${PYSITELIB}/oauth2client/client.pyo
${PYSITELIB}/oauth2client/clientsecrets.py
${PYSITELIB}/oauth2client/clientsecrets.pyc
${PYSITELIB}/oauth2client/clientsecrets.pyo
Update py-oauth2client to 2.0.0. ## v2.0.0 * Add django_util (#332) * Avoid OAuth2Credentials `id_token` going out of sync after a token refresh (#337) * Move to a `contrib` sub-package code not considered a core part of the library (#346, #353, #370, #375, #376, #382) * Add `token_expiry` to `devshell` credentials (#372) * Move `Storage` locking into a base class (#379) * Added dictionary storage (#380) * Added `to_json` and `from_json` methods to all `Credentials` classes (#385) * Fall back to read-only credentials on EACCES errors (#389) * Coalesced the two `ServiceAccountCredentials` classes (#395, #396, #397, #398, #400) ### Special Note About `ServiceAccountCredentials`: ------------------------------------------------- For JSON keys, you can create a credential via ```py from oauth2client.service_account import ServiceAccountCredentials credentials = ServiceAccountCredentials.from_json_keyfile_name( key_file_name, scopes=[...]) ``` You can still rely on ```py from oauth2client.client import GoogleCredentials credentials = GoogleCredentials.get_application_default() ``` returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS` environment variable. For `.p12` keys, construct via ```py credentials = ServiceAccountCredentials.from_p12_keyfil( service_account_email, key_file_name, scopes=[...]) ``` though we urge you to use JSON keys (rather than `.p12` keys) if you can. This is equivalent to the previous method ```py # PRE-oauth2client 2.0.0 EXAMPLE CODE! from oauth2client.client import SignedJwtAssertionCredentials with open(key_file_name, 'rb') as key_file: private_key = key_file.read() credentials = SignedJwtAssertionCredentials( service_account_email, private_key, scope=[...]) ```
2016-03-03 13:59:55 +01:00
${PYSITELIB}/oauth2client/contrib/__init__.py
${PYSITELIB}/oauth2client/contrib/__init__.pyc
${PYSITELIB}/oauth2client/contrib/__init__.pyo
Updated py-oauth2client to 4.0.0. ## v4.0.0 New features: * New Django samples. (#636) * Add support for RFC7636 PKCE. (#588) * Release as a universal wheel. (#665) Bug fixes: * Fix django authorization redirect by correctly checking validity of credentials. (#651) * Correct query loss when using parse_qsl to dict. (#622) * Switch django models from pickle to jsonpickle. (#614) * Support new MIDDLEWARE Django 1.10 aetting. (#623) * Remove usage of os.environ.setdefault. (#621) * Handle missing storage files correctly. (#576) * Try to revoke token with POST when getting a 405. (#662) Internal changes: * Use transport module for GCE environment check. (#612) * Remove __author__ lines and add contributors.md. (#627) * Clean up imports. (#625) * Use transport.request in tests. (#607) * Drop unittest2 dependency (#610) * Remove backslash line continuations. (#608) * Use transport helpers in system tests. (#606) * Clean up usage of HTTP mocks in tests. (#605) * Remove all uses of MagicMock. (#598) * Migrate test runner to pytest. (#569) * Merge util.py and _helpers.py. (#579) * Remove httplib2 imports from non-transport modules. (#577) Breaking changes: * Drop Python 3.3 support. (#603) * Drop Python 2.6 support. (#590) * Remove multistore_file. (#589) ## v3.0.0 * Populate `token_expiry` for GCE credentials. (#473) * Move GCE metadata interface to a separate module. (#520) * Populate `scopes` for GCE credentials. (#524) * Fix Python 3.5 compatibility. (#531) * Add `oauth2client.contrib.sqlalchemy`, a SQLAlchemy-based credential store. (#527) * Improve error when an invalid client secret is provided. (#530) * Add `oauth2client.contrib.multiprocess_storage`. This supersedes the functionality in `oauth2client.contrib.multistore_file`. (#504) * Pull httplib2 usage into a separate transport module. (#559, #561) * Refactor all django-related code into `oauth2client.contrib.django_util`. Add `DjangoORMStorage`, remove `FlowField`. (#546) * Fix application default credentials resolution order. (#570) * Add configurable timeout for GCE metadata server check. (#571) * Add warnings when using deprecated `approval_prompt='force'`. (#572) * Add deprecation warning to `oauth2client.contrib.multistore_file`. (#574) * (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562) * (Hygiene) Remove duplicated exception classes in `oauth2client.contrib.appengine`. (#533) NOTE: The next major release of oauth2client (v4.0.0) will remove the `oauth2client.contrib.multistore_file` module. ## v2.2.0 * Added support to override `token_uri` and `revoke_uri` in `oauth2client.service_account.ServiceAccountCredentials`. (#510) * `oauth2client.contrib.multistore_file` now handles `OSError` in addition to `IOError` because Windows may raise `OSError` where other platforms will raise `IOError`. * `oauth2client.contrib.django_util` and `oauth2client.contrib.django_orm` have been updated to support Django 1.8 - 1.10. Versions of Django below 1.8 will not work with these modules. ## v2.1.0 * Add basic support for JWT access credentials. (#503) * Fix `oauth2client.client.DeviceFlowInfo` to use UTC instead of the system timezone when calculating code expiration. ## v2.0.2 * Fix issue where `flask_util.UserOAuth2.required` would accept expired credentials (#452). * Fix issue where `flask_util` would fill the session with `Flow` objects (#498). * Fix issue with Python 3 binary strings in `Flow.step2_exchange` (#446). * Improve test coverage to 100%. ## v2.0.1 * Making scopes optional on Google Compute Engine `AppAssertionCredentials` and adding a warning that GCE won't honor scopes (#419) * Adding common `sign_blob()` to service account types and a `service_account_email` property. (#421) * Improving error message in P12 factory `ServiceAccountCredentials.from_p12_keyfile` when pyOpenSSL is missing. (#424) * Allowing default flags in `oauth2client.tools.run_flow()` rather than forcing users to create a dummy argparser (#426) * Removing `oauth2client.util.dict_to_tuple_key()` from public interface (#429) * Adding `oauth2client.contrib._appengine_ndb` helper module for `oauth2client.contrib.appengine` and moving most code that uses the `ndb` library into the helper (#434) * Fix error in `django_util` sample code (#438) ## v2.0.0-post1 * Fix Google Compute Engine breakage (#411, breakage introduced in #387) that made it impossible to obtain access tokens * Implement `ServiceAccountCredentials.from_p12_keyfile_buffer()` to allow passing a file-like object in addition to the factory constructor that uses a filename directly (#413) * Implement `ServiceAccountCredentials.create_delegated()` to allow upgrading a credential to one that acts on behalf of a given subject (#420)
2016-10-19 15:02:48 +02:00
${PYSITELIB}/oauth2client/contrib/_appengine_ndb.py
${PYSITELIB}/oauth2client/contrib/_appengine_ndb.pyc
${PYSITELIB}/oauth2client/contrib/_appengine_ndb.pyo
${PYSITELIB}/oauth2client/contrib/_metadata.py
${PYSITELIB}/oauth2client/contrib/_metadata.pyc
${PYSITELIB}/oauth2client/contrib/_metadata.pyo
Update py-oauth2client to 2.0.0. ## v2.0.0 * Add django_util (#332) * Avoid OAuth2Credentials `id_token` going out of sync after a token refresh (#337) * Move to a `contrib` sub-package code not considered a core part of the library (#346, #353, #370, #375, #376, #382) * Add `token_expiry` to `devshell` credentials (#372) * Move `Storage` locking into a base class (#379) * Added dictionary storage (#380) * Added `to_json` and `from_json` methods to all `Credentials` classes (#385) * Fall back to read-only credentials on EACCES errors (#389) * Coalesced the two `ServiceAccountCredentials` classes (#395, #396, #397, #398, #400) ### Special Note About `ServiceAccountCredentials`: ------------------------------------------------- For JSON keys, you can create a credential via ```py from oauth2client.service_account import ServiceAccountCredentials credentials = ServiceAccountCredentials.from_json_keyfile_name( key_file_name, scopes=[...]) ``` You can still rely on ```py from oauth2client.client import GoogleCredentials credentials = GoogleCredentials.get_application_default() ``` returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS` environment variable. For `.p12` keys, construct via ```py credentials = ServiceAccountCredentials.from_p12_keyfil( service_account_email, key_file_name, scopes=[...]) ``` though we urge you to use JSON keys (rather than `.p12` keys) if you can. This is equivalent to the previous method ```py # PRE-oauth2client 2.0.0 EXAMPLE CODE! from oauth2client.client import SignedJwtAssertionCredentials with open(key_file_name, 'rb') as key_file: private_key = key_file.read() credentials = SignedJwtAssertionCredentials( service_account_email, private_key, scope=[...]) ```
2016-03-03 13:59:55 +01:00
${PYSITELIB}/oauth2client/contrib/appengine.py
${PYSITELIB}/oauth2client/contrib/appengine.pyc
${PYSITELIB}/oauth2client/contrib/appengine.pyo
${PYSITELIB}/oauth2client/contrib/devshell.py
${PYSITELIB}/oauth2client/contrib/devshell.pyc
${PYSITELIB}/oauth2client/contrib/devshell.pyo
${PYSITELIB}/oauth2client/contrib/dictionary_storage.py
${PYSITELIB}/oauth2client/contrib/dictionary_storage.pyc
${PYSITELIB}/oauth2client/contrib/dictionary_storage.pyo
${PYSITELIB}/oauth2client/contrib/django_util/__init__.py
${PYSITELIB}/oauth2client/contrib/django_util/__init__.pyc
${PYSITELIB}/oauth2client/contrib/django_util/__init__.pyo
${PYSITELIB}/oauth2client/contrib/django_util/apps.py
${PYSITELIB}/oauth2client/contrib/django_util/apps.pyc
${PYSITELIB}/oauth2client/contrib/django_util/apps.pyo
${PYSITELIB}/oauth2client/contrib/django_util/decorators.py
${PYSITELIB}/oauth2client/contrib/django_util/decorators.pyc
${PYSITELIB}/oauth2client/contrib/django_util/decorators.pyo
Updated py-oauth2client to 4.0.0. ## v4.0.0 New features: * New Django samples. (#636) * Add support for RFC7636 PKCE. (#588) * Release as a universal wheel. (#665) Bug fixes: * Fix django authorization redirect by correctly checking validity of credentials. (#651) * Correct query loss when using parse_qsl to dict. (#622) * Switch django models from pickle to jsonpickle. (#614) * Support new MIDDLEWARE Django 1.10 aetting. (#623) * Remove usage of os.environ.setdefault. (#621) * Handle missing storage files correctly. (#576) * Try to revoke token with POST when getting a 405. (#662) Internal changes: * Use transport module for GCE environment check. (#612) * Remove __author__ lines and add contributors.md. (#627) * Clean up imports. (#625) * Use transport.request in tests. (#607) * Drop unittest2 dependency (#610) * Remove backslash line continuations. (#608) * Use transport helpers in system tests. (#606) * Clean up usage of HTTP mocks in tests. (#605) * Remove all uses of MagicMock. (#598) * Migrate test runner to pytest. (#569) * Merge util.py and _helpers.py. (#579) * Remove httplib2 imports from non-transport modules. (#577) Breaking changes: * Drop Python 3.3 support. (#603) * Drop Python 2.6 support. (#590) * Remove multistore_file. (#589) ## v3.0.0 * Populate `token_expiry` for GCE credentials. (#473) * Move GCE metadata interface to a separate module. (#520) * Populate `scopes` for GCE credentials. (#524) * Fix Python 3.5 compatibility. (#531) * Add `oauth2client.contrib.sqlalchemy`, a SQLAlchemy-based credential store. (#527) * Improve error when an invalid client secret is provided. (#530) * Add `oauth2client.contrib.multiprocess_storage`. This supersedes the functionality in `oauth2client.contrib.multistore_file`. (#504) * Pull httplib2 usage into a separate transport module. (#559, #561) * Refactor all django-related code into `oauth2client.contrib.django_util`. Add `DjangoORMStorage`, remove `FlowField`. (#546) * Fix application default credentials resolution order. (#570) * Add configurable timeout for GCE metadata server check. (#571) * Add warnings when using deprecated `approval_prompt='force'`. (#572) * Add deprecation warning to `oauth2client.contrib.multistore_file`. (#574) * (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562) * (Hygiene) Remove duplicated exception classes in `oauth2client.contrib.appengine`. (#533) NOTE: The next major release of oauth2client (v4.0.0) will remove the `oauth2client.contrib.multistore_file` module. ## v2.2.0 * Added support to override `token_uri` and `revoke_uri` in `oauth2client.service_account.ServiceAccountCredentials`. (#510) * `oauth2client.contrib.multistore_file` now handles `OSError` in addition to `IOError` because Windows may raise `OSError` where other platforms will raise `IOError`. * `oauth2client.contrib.django_util` and `oauth2client.contrib.django_orm` have been updated to support Django 1.8 - 1.10. Versions of Django below 1.8 will not work with these modules. ## v2.1.0 * Add basic support for JWT access credentials. (#503) * Fix `oauth2client.client.DeviceFlowInfo` to use UTC instead of the system timezone when calculating code expiration. ## v2.0.2 * Fix issue where `flask_util.UserOAuth2.required` would accept expired credentials (#452). * Fix issue where `flask_util` would fill the session with `Flow` objects (#498). * Fix issue with Python 3 binary strings in `Flow.step2_exchange` (#446). * Improve test coverage to 100%. ## v2.0.1 * Making scopes optional on Google Compute Engine `AppAssertionCredentials` and adding a warning that GCE won't honor scopes (#419) * Adding common `sign_blob()` to service account types and a `service_account_email` property. (#421) * Improving error message in P12 factory `ServiceAccountCredentials.from_p12_keyfile` when pyOpenSSL is missing. (#424) * Allowing default flags in `oauth2client.tools.run_flow()` rather than forcing users to create a dummy argparser (#426) * Removing `oauth2client.util.dict_to_tuple_key()` from public interface (#429) * Adding `oauth2client.contrib._appengine_ndb` helper module for `oauth2client.contrib.appengine` and moving most code that uses the `ndb` library into the helper (#434) * Fix error in `django_util` sample code (#438) ## v2.0.0-post1 * Fix Google Compute Engine breakage (#411, breakage introduced in #387) that made it impossible to obtain access tokens * Implement `ServiceAccountCredentials.from_p12_keyfile_buffer()` to allow passing a file-like object in addition to the factory constructor that uses a filename directly (#413) * Implement `ServiceAccountCredentials.create_delegated()` to allow upgrading a credential to one that acts on behalf of a given subject (#420)
2016-10-19 15:02:48 +02:00
${PYSITELIB}/oauth2client/contrib/django_util/models.py
${PYSITELIB}/oauth2client/contrib/django_util/models.pyc
${PYSITELIB}/oauth2client/contrib/django_util/models.pyo
Update py-oauth2client to 2.0.0. ## v2.0.0 * Add django_util (#332) * Avoid OAuth2Credentials `id_token` going out of sync after a token refresh (#337) * Move to a `contrib` sub-package code not considered a core part of the library (#346, #353, #370, #375, #376, #382) * Add `token_expiry` to `devshell` credentials (#372) * Move `Storage` locking into a base class (#379) * Added dictionary storage (#380) * Added `to_json` and `from_json` methods to all `Credentials` classes (#385) * Fall back to read-only credentials on EACCES errors (#389) * Coalesced the two `ServiceAccountCredentials` classes (#395, #396, #397, #398, #400) ### Special Note About `ServiceAccountCredentials`: ------------------------------------------------- For JSON keys, you can create a credential via ```py from oauth2client.service_account import ServiceAccountCredentials credentials = ServiceAccountCredentials.from_json_keyfile_name( key_file_name, scopes=[...]) ``` You can still rely on ```py from oauth2client.client import GoogleCredentials credentials = GoogleCredentials.get_application_default() ``` returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS` environment variable. For `.p12` keys, construct via ```py credentials = ServiceAccountCredentials.from_p12_keyfil( service_account_email, key_file_name, scopes=[...]) ``` though we urge you to use JSON keys (rather than `.p12` keys) if you can. This is equivalent to the previous method ```py # PRE-oauth2client 2.0.0 EXAMPLE CODE! from oauth2client.client import SignedJwtAssertionCredentials with open(key_file_name, 'rb') as key_file: private_key = key_file.read() credentials = SignedJwtAssertionCredentials( service_account_email, private_key, scope=[...]) ```
2016-03-03 13:59:55 +01:00
${PYSITELIB}/oauth2client/contrib/django_util/signals.py
${PYSITELIB}/oauth2client/contrib/django_util/signals.pyc
${PYSITELIB}/oauth2client/contrib/django_util/signals.pyo
${PYSITELIB}/oauth2client/contrib/django_util/site.py
${PYSITELIB}/oauth2client/contrib/django_util/site.pyc
${PYSITELIB}/oauth2client/contrib/django_util/site.pyo
${PYSITELIB}/oauth2client/contrib/django_util/storage.py
${PYSITELIB}/oauth2client/contrib/django_util/storage.pyc
${PYSITELIB}/oauth2client/contrib/django_util/storage.pyo
${PYSITELIB}/oauth2client/contrib/django_util/views.py
${PYSITELIB}/oauth2client/contrib/django_util/views.pyc
${PYSITELIB}/oauth2client/contrib/django_util/views.pyo
${PYSITELIB}/oauth2client/contrib/flask_util.py
${PYSITELIB}/oauth2client/contrib/flask_util.pyc
${PYSITELIB}/oauth2client/contrib/flask_util.pyo
${PYSITELIB}/oauth2client/contrib/gce.py
${PYSITELIB}/oauth2client/contrib/gce.pyc
${PYSITELIB}/oauth2client/contrib/gce.pyo
${PYSITELIB}/oauth2client/contrib/keyring_storage.py
${PYSITELIB}/oauth2client/contrib/keyring_storage.pyc
${PYSITELIB}/oauth2client/contrib/keyring_storage.pyo
Updated py-oauth2client to 4.0.0. ## v4.0.0 New features: * New Django samples. (#636) * Add support for RFC7636 PKCE. (#588) * Release as a universal wheel. (#665) Bug fixes: * Fix django authorization redirect by correctly checking validity of credentials. (#651) * Correct query loss when using parse_qsl to dict. (#622) * Switch django models from pickle to jsonpickle. (#614) * Support new MIDDLEWARE Django 1.10 aetting. (#623) * Remove usage of os.environ.setdefault. (#621) * Handle missing storage files correctly. (#576) * Try to revoke token with POST when getting a 405. (#662) Internal changes: * Use transport module for GCE environment check. (#612) * Remove __author__ lines and add contributors.md. (#627) * Clean up imports. (#625) * Use transport.request in tests. (#607) * Drop unittest2 dependency (#610) * Remove backslash line continuations. (#608) * Use transport helpers in system tests. (#606) * Clean up usage of HTTP mocks in tests. (#605) * Remove all uses of MagicMock. (#598) * Migrate test runner to pytest. (#569) * Merge util.py and _helpers.py. (#579) * Remove httplib2 imports from non-transport modules. (#577) Breaking changes: * Drop Python 3.3 support. (#603) * Drop Python 2.6 support. (#590) * Remove multistore_file. (#589) ## v3.0.0 * Populate `token_expiry` for GCE credentials. (#473) * Move GCE metadata interface to a separate module. (#520) * Populate `scopes` for GCE credentials. (#524) * Fix Python 3.5 compatibility. (#531) * Add `oauth2client.contrib.sqlalchemy`, a SQLAlchemy-based credential store. (#527) * Improve error when an invalid client secret is provided. (#530) * Add `oauth2client.contrib.multiprocess_storage`. This supersedes the functionality in `oauth2client.contrib.multistore_file`. (#504) * Pull httplib2 usage into a separate transport module. (#559, #561) * Refactor all django-related code into `oauth2client.contrib.django_util`. Add `DjangoORMStorage`, remove `FlowField`. (#546) * Fix application default credentials resolution order. (#570) * Add configurable timeout for GCE metadata server check. (#571) * Add warnings when using deprecated `approval_prompt='force'`. (#572) * Add deprecation warning to `oauth2client.contrib.multistore_file`. (#574) * (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562) * (Hygiene) Remove duplicated exception classes in `oauth2client.contrib.appengine`. (#533) NOTE: The next major release of oauth2client (v4.0.0) will remove the `oauth2client.contrib.multistore_file` module. ## v2.2.0 * Added support to override `token_uri` and `revoke_uri` in `oauth2client.service_account.ServiceAccountCredentials`. (#510) * `oauth2client.contrib.multistore_file` now handles `OSError` in addition to `IOError` because Windows may raise `OSError` where other platforms will raise `IOError`. * `oauth2client.contrib.django_util` and `oauth2client.contrib.django_orm` have been updated to support Django 1.8 - 1.10. Versions of Django below 1.8 will not work with these modules. ## v2.1.0 * Add basic support for JWT access credentials. (#503) * Fix `oauth2client.client.DeviceFlowInfo` to use UTC instead of the system timezone when calculating code expiration. ## v2.0.2 * Fix issue where `flask_util.UserOAuth2.required` would accept expired credentials (#452). * Fix issue where `flask_util` would fill the session with `Flow` objects (#498). * Fix issue with Python 3 binary strings in `Flow.step2_exchange` (#446). * Improve test coverage to 100%. ## v2.0.1 * Making scopes optional on Google Compute Engine `AppAssertionCredentials` and adding a warning that GCE won't honor scopes (#419) * Adding common `sign_blob()` to service account types and a `service_account_email` property. (#421) * Improving error message in P12 factory `ServiceAccountCredentials.from_p12_keyfile` when pyOpenSSL is missing. (#424) * Allowing default flags in `oauth2client.tools.run_flow()` rather than forcing users to create a dummy argparser (#426) * Removing `oauth2client.util.dict_to_tuple_key()` from public interface (#429) * Adding `oauth2client.contrib._appengine_ndb` helper module for `oauth2client.contrib.appengine` and moving most code that uses the `ndb` library into the helper (#434) * Fix error in `django_util` sample code (#438) ## v2.0.0-post1 * Fix Google Compute Engine breakage (#411, breakage introduced in #387) that made it impossible to obtain access tokens * Implement `ServiceAccountCredentials.from_p12_keyfile_buffer()` to allow passing a file-like object in addition to the factory constructor that uses a filename directly (#413) * Implement `ServiceAccountCredentials.create_delegated()` to allow upgrading a credential to one that acts on behalf of a given subject (#420)
2016-10-19 15:02:48 +02:00
${PYSITELIB}/oauth2client/contrib/multiprocess_file_storage.py
${PYSITELIB}/oauth2client/contrib/multiprocess_file_storage.pyc
${PYSITELIB}/oauth2client/contrib/multiprocess_file_storage.pyo
${PYSITELIB}/oauth2client/contrib/sqlalchemy.py
${PYSITELIB}/oauth2client/contrib/sqlalchemy.pyc
${PYSITELIB}/oauth2client/contrib/sqlalchemy.pyo
Update py-oauth2client to 2.0.0. ## v2.0.0 * Add django_util (#332) * Avoid OAuth2Credentials `id_token` going out of sync after a token refresh (#337) * Move to a `contrib` sub-package code not considered a core part of the library (#346, #353, #370, #375, #376, #382) * Add `token_expiry` to `devshell` credentials (#372) * Move `Storage` locking into a base class (#379) * Added dictionary storage (#380) * Added `to_json` and `from_json` methods to all `Credentials` classes (#385) * Fall back to read-only credentials on EACCES errors (#389) * Coalesced the two `ServiceAccountCredentials` classes (#395, #396, #397, #398, #400) ### Special Note About `ServiceAccountCredentials`: ------------------------------------------------- For JSON keys, you can create a credential via ```py from oauth2client.service_account import ServiceAccountCredentials credentials = ServiceAccountCredentials.from_json_keyfile_name( key_file_name, scopes=[...]) ``` You can still rely on ```py from oauth2client.client import GoogleCredentials credentials = GoogleCredentials.get_application_default() ``` returning these credentials when you set the `GOOGLE_APPLICATION_CREDENTIALS` environment variable. For `.p12` keys, construct via ```py credentials = ServiceAccountCredentials.from_p12_keyfil( service_account_email, key_file_name, scopes=[...]) ``` though we urge you to use JSON keys (rather than `.p12` keys) if you can. This is equivalent to the previous method ```py # PRE-oauth2client 2.0.0 EXAMPLE CODE! from oauth2client.client import SignedJwtAssertionCredentials with open(key_file_name, 'rb') as key_file: private_key = key_file.read() credentials = SignedJwtAssertionCredentials( service_account_email, private_key, scope=[...]) ```
2016-03-03 13:59:55 +01:00
${PYSITELIB}/oauth2client/contrib/xsrfutil.py
${PYSITELIB}/oauth2client/contrib/xsrfutil.pyc
${PYSITELIB}/oauth2client/contrib/xsrfutil.pyo
${PYSITELIB}/oauth2client/crypt.py
${PYSITELIB}/oauth2client/crypt.pyc
${PYSITELIB}/oauth2client/crypt.pyo
${PYSITELIB}/oauth2client/file.py
${PYSITELIB}/oauth2client/file.pyc
${PYSITELIB}/oauth2client/file.pyo
${PYSITELIB}/oauth2client/service_account.py
${PYSITELIB}/oauth2client/service_account.pyc
${PYSITELIB}/oauth2client/service_account.pyo
${PYSITELIB}/oauth2client/tools.py
${PYSITELIB}/oauth2client/tools.pyc
${PYSITELIB}/oauth2client/tools.pyo
Updated py-oauth2client to 4.0.0. ## v4.0.0 New features: * New Django samples. (#636) * Add support for RFC7636 PKCE. (#588) * Release as a universal wheel. (#665) Bug fixes: * Fix django authorization redirect by correctly checking validity of credentials. (#651) * Correct query loss when using parse_qsl to dict. (#622) * Switch django models from pickle to jsonpickle. (#614) * Support new MIDDLEWARE Django 1.10 aetting. (#623) * Remove usage of os.environ.setdefault. (#621) * Handle missing storage files correctly. (#576) * Try to revoke token with POST when getting a 405. (#662) Internal changes: * Use transport module for GCE environment check. (#612) * Remove __author__ lines and add contributors.md. (#627) * Clean up imports. (#625) * Use transport.request in tests. (#607) * Drop unittest2 dependency (#610) * Remove backslash line continuations. (#608) * Use transport helpers in system tests. (#606) * Clean up usage of HTTP mocks in tests. (#605) * Remove all uses of MagicMock. (#598) * Migrate test runner to pytest. (#569) * Merge util.py and _helpers.py. (#579) * Remove httplib2 imports from non-transport modules. (#577) Breaking changes: * Drop Python 3.3 support. (#603) * Drop Python 2.6 support. (#590) * Remove multistore_file. (#589) ## v3.0.0 * Populate `token_expiry` for GCE credentials. (#473) * Move GCE metadata interface to a separate module. (#520) * Populate `scopes` for GCE credentials. (#524) * Fix Python 3.5 compatibility. (#531) * Add `oauth2client.contrib.sqlalchemy`, a SQLAlchemy-based credential store. (#527) * Improve error when an invalid client secret is provided. (#530) * Add `oauth2client.contrib.multiprocess_storage`. This supersedes the functionality in `oauth2client.contrib.multistore_file`. (#504) * Pull httplib2 usage into a separate transport module. (#559, #561) * Refactor all django-related code into `oauth2client.contrib.django_util`. Add `DjangoORMStorage`, remove `FlowField`. (#546) * Fix application default credentials resolution order. (#570) * Add configurable timeout for GCE metadata server check. (#571) * Add warnings when using deprecated `approval_prompt='force'`. (#572) * Add deprecation warning to `oauth2client.contrib.multistore_file`. (#574) * (Hygiene) PEP8 compliance and various style fixes (#537, #540, #552, #562) * (Hygiene) Remove duplicated exception classes in `oauth2client.contrib.appengine`. (#533) NOTE: The next major release of oauth2client (v4.0.0) will remove the `oauth2client.contrib.multistore_file` module. ## v2.2.0 * Added support to override `token_uri` and `revoke_uri` in `oauth2client.service_account.ServiceAccountCredentials`. (#510) * `oauth2client.contrib.multistore_file` now handles `OSError` in addition to `IOError` because Windows may raise `OSError` where other platforms will raise `IOError`. * `oauth2client.contrib.django_util` and `oauth2client.contrib.django_orm` have been updated to support Django 1.8 - 1.10. Versions of Django below 1.8 will not work with these modules. ## v2.1.0 * Add basic support for JWT access credentials. (#503) * Fix `oauth2client.client.DeviceFlowInfo` to use UTC instead of the system timezone when calculating code expiration. ## v2.0.2 * Fix issue where `flask_util.UserOAuth2.required` would accept expired credentials (#452). * Fix issue where `flask_util` would fill the session with `Flow` objects (#498). * Fix issue with Python 3 binary strings in `Flow.step2_exchange` (#446). * Improve test coverage to 100%. ## v2.0.1 * Making scopes optional on Google Compute Engine `AppAssertionCredentials` and adding a warning that GCE won't honor scopes (#419) * Adding common `sign_blob()` to service account types and a `service_account_email` property. (#421) * Improving error message in P12 factory `ServiceAccountCredentials.from_p12_keyfile` when pyOpenSSL is missing. (#424) * Allowing default flags in `oauth2client.tools.run_flow()` rather than forcing users to create a dummy argparser (#426) * Removing `oauth2client.util.dict_to_tuple_key()` from public interface (#429) * Adding `oauth2client.contrib._appengine_ndb` helper module for `oauth2client.contrib.appengine` and moving most code that uses the `ndb` library into the helper (#434) * Fix error in `django_util` sample code (#438) ## v2.0.0-post1 * Fix Google Compute Engine breakage (#411, breakage introduced in #387) that made it impossible to obtain access tokens * Implement `ServiceAccountCredentials.from_p12_keyfile_buffer()` to allow passing a file-like object in addition to the factory constructor that uses a filename directly (#413) * Implement `ServiceAccountCredentials.create_delegated()` to allow upgrading a credential to one that acts on behalf of a given subject (#420)
2016-10-19 15:02:48 +02:00
${PYSITELIB}/oauth2client/transport.py
${PYSITELIB}/oauth2client/transport.pyc
${PYSITELIB}/oauth2client/transport.pyo