Commit Graph

120 Commits

Author SHA1 Message Date
3wc ca052078de Reinstate FedWiki change 2022-12-07 16:46:04 -08:00
Tomasz Ciborski db8088793f
fix: prevent double callback in _executeRequest 2021-11-16 11:05:40 +01:00
Philip Skinner 6baf574f87 Adding ability to specify an agent for OAuth2 requests 2017-01-04 10:25:52 +00:00
ciaranj eefd821ea9 Bumping to 0.9.14 (Treat 20x OAuth2 responses as successes) 2015-09-22 17:15:04 +01:00
AJ ONeal 763d5ec3cc remove dead code (bogus call to createCredentials) 2015-02-04 10:36:03 -07:00
ciaranj a4b96af335 Repair missing commit(s) 2014-12-18 20:12:24 +00:00
John Baumbach 9419b00441 Fix headers variable in wrong scope in get() 2014-10-08 18:35:52 +00:00
zedgu 47e50fe3ce Fix #196 #207
tests/oauth2.js
  [remove] https never used
  [add] https url testing
lib/oauth2.js
  [remove] creds never used
2014-08-08 21:24:51 +08:00
Ciaran Jessup 0707eb851b Merge pull request #150 from joserobleda/master
Use hasOwnProperty to prevent erros
2014-05-21 21:03:03 +01:00
ciaranj 4e351fef16 Merge remote-tracking branch 'origin/master' into evanp-issue144 2014-05-21 20:48:58 +01:00
ciaranj 00ae962b32 Merge branch 'broox-oauth2_put'
Conflicts:
	tests/oauth2.js
2014-05-21 20:23:47 +01:00
ciaranj 1eda281512 Provides a test-case for #160 2014-05-21 20:22:00 +01:00
Ted Goddard 9b538ba09a support for use_strict 2014-04-17 11:18:11 -06:00
Don Neufeld 54b958436a Added protection against multiple callback invocation on error path 2014-04-01 19:05:17 -07:00
Ciaran Jessup d228aebb0b Merge pull request #121 from knechtandreas/master
Add RSA-SHA1 support
2014-01-04 06:37:26 -08:00
Ciaran Jessup 631ab09b5b Merge pull request #138 from pjvds/no-follow-option
Don't follow redirects opt-out
2014-01-04 06:27:32 -08:00
Ciaran Jessup 4d8bf8ba5f Merge pull request #140 from AndrewMartens/master
Set default User-Agent if not otherwise specified in customHeaders
2014-01-04 06:17:49 -08:00
Derek Brooks e599d29787 Write the post_body to OAuth2 PUT requests 2013-10-15 00:53:34 +00:00
Brad Gignac 8658d7d55b Remove type query parameter from OAuth2 requests.
While the type parameter was required in older versions of the OAuth2
specification, it was removed in version 8. Currently, this breaks OAuth2
against the Dropbox API. Closes #127.

http://tools.ietf.org/html/draft-ietf-oauth-v2-08#section-4.1.1
2013-07-27 18:42:14 -04:00
Jose Ignacio Andres 89f79727be prevent inherited properties using hasOwnProperty 2013-07-09 00:38:18 +02:00
Evan Prodromou 509cad25ef Allow passing binary data to PUT or POST as a Buffer
Allow the post_body argument to a PUT or POST to be a Buffer. This will
pass the data directly to the request in binary form.

Closes #144.
2013-05-31 15:59:45 -04:00
Andrew Martens a742d838f5 Set default User-Agent if not otherwise specified in customHeaders 2013-05-07 14:38:04 -07:00
Pieter Joost van de Sande f24590182c Remove trailing whitespaces 2013-05-06 08:42:23 +02:00
Pieter Joost van de Sande d4143a6452 Add followRedirect client option to turn auto follow on or off 2013-05-05 23:04:10 +02:00
ciaranj 301ebab90c Added an extra test, and checked realHeaders to catch any dodgy custom ones 2013-03-05 18:07:40 +00:00
ciaranj 8be23c309c Merge remote-tracking branch 'jfromaniello/bug129' 2013-03-05 17:43:51 +00:00
ciaranj 03d713be9a Fixes Issue #129
Not ideal, but effectively reverts the default behaviour of the library to how 0.9.8 worked,
that is it passes the access_token as a query parameter to the server.

To allow the utility 'get' method to use an Authorization header *instead* then you need to
explicitly enable this behaviour by using the method :

  var oa= new Oauth(...);
  oa.useAuthorizationHeaderforGET(true)

Note this can/should be used in conjunction with the other utility method:

  oa.setAuthMethod(...)

The default value for the Authorization header is 'Bearer'

If you're building your own requests using oa._request then there is a new exported
method:

  oa.buildAuthHeader(token)
2013-03-05 17:34:20 +00:00
ciaranj ba81ad43bd Fixes Issue #125 - Abusing externally passed in data structure
Also had to re-jig the test, as it turns out the contributor-supplied test
for this work didn't *actually* test anything :(
2013-03-05 17:00:35 +00:00
Jose F. Romaniello 798157c185 fix #129 Setting token in query params and Authorization header violates spec 2013-03-05 04:04:00 -03:00
Andreas Knecht 635ee2c1f7 Added RSA-SHA1 signature method based on the fork from https://github.com/wraithgar/node-oauth. Added test that uses the RSA-SHA1 method and verifies the signature using a public key. 2012-12-20 10:09:56 +01:00
Ciaran Jessup 45a983e6dc Merge pull request #114 from rolandboon/master
Fix requests containing !'()* in POST data
2012-11-25 07:28:31 -08:00
Brian Park efbce5bd68 Add in Authorization Header and support extra headers by default. 2012-11-21 10:29:30 -05:00
rolandboon 240a992553 Update lib/oauth.js
Fix the mismatch between the output of querystring.stringify() and this._encodeData().
2012-09-28 12:59:59 +03:00
Ciaran Jessup 3a15f03c34 Merge pull request #101 from GCheung55/patch-1
Update to make sure hostName exists before trying to act on it
2012-07-28 05:33:46 -07:00
ciaranj d43a712548 Merge remote-tracking branch 'chrischw/master' 2012-07-28 13:25:12 +01:00
ciaranj b03f6ae424 Remove excess double URL encoding introduced by fixes for issue #64 2012-07-28 13:09:32 +01:00
Christian Schwarz 5fab3c577e Added an option to change the OAuth parameter seperator 2012-07-07 00:56:39 +02:00
Garrick Cheung 409405f674 Update to make sure hostName exists before trying to act on it. Otherwise it will throw an error. 2012-06-11 11:36:31 -07:00
Joe Rozner d8d1e0bad7 fixed issue #64 w/ tests 2012-06-07 10:44:54 -07:00
ciaranj 64b2487199 Merge remote-tracking branch 'lukebaker/patch-1' into add_support_for_oauth2_token_refresh 2012-04-24 21:19:02 +01:00
ciaranj ef51782104 Fix global scope leak, and amend decision on when to use https or http libraries 2012-04-24 21:11:20 +01:00
ciaranj 1970e0045e Merge remote-tracking branch 'dmathieu/fix_http' into not_require_http
Conflicts:
	lib/oauth2.js
2012-04-24 20:54:49 +01:00
ciaranj e4cc471160 Merge commit '2e1f9f9' into oauth2_results_callback 2012-04-24 20:37:38 +01:00
Luke Baker e1a8422e7c Add support for refreshing an access token 2012-03-13 23:17:15 -03:00
Patrick Negri 6404f6e023 [ #Issue 75 ] Fixing Live Protocol 302 Resources 2011-10-26 14:05:03 -02:00
Fabian Jakobs 9b4703aaca request variable leaked into the global scope 2011-10-20 16:39:13 +03:00
Damien Mathieu 32620902a5 don't send the request using https if the uri is http 2011-09-24 14:10:46 +02:00
Tang Bo Hao 2e1f9f9db6 callback results when getAccessToken 2011-09-21 01:26:33 +08:00
ciaranj 3c45927acd Fixes Issue #62 (adds another misbehaving host) 2011-08-23 20:59:47 +01:00
ciaranj 85805b6b1b Tidying up a method comment 2011-08-17 09:02:03 +01:00