98 Commits

Author SHA1 Message Date
Ciaran Jessup
4d8bf8ba5f Merge pull request #140 from AndrewMartens/master
Set default User-Agent if not otherwise specified in customHeaders
2014-01-04 06:17:49 -08:00
Brad Gignac
8658d7d55b Remove type query parameter from OAuth2 requests.
While the type parameter was required in older versions of the OAuth2
specification, it was removed in version 8. Currently, this breaks OAuth2
against the Dropbox API. Closes #127.

http://tools.ietf.org/html/draft-ietf-oauth-v2-08#section-4.1.1
2013-07-27 18:42:14 -04:00
Andrew Martens
a742d838f5 Set default User-Agent if not otherwise specified in customHeaders 2013-05-07 14:38:04 -07:00
ciaranj
301ebab90c Added an extra test, and checked realHeaders to catch any dodgy custom ones 2013-03-05 18:07:40 +00:00
ciaranj
8be23c309c Merge remote-tracking branch 'jfromaniello/bug129' 2013-03-05 17:43:51 +00:00
ciaranj
03d713be9a Fixes Issue #129
Not ideal, but effectively reverts the default behaviour of the library to how 0.9.8 worked,
that is it passes the access_token as a query parameter to the server.

To allow the utility 'get' method to use an Authorization header *instead* then you need to
explicitly enable this behaviour by using the method :

  var oa= new Oauth(...);
  oa.useAuthorizationHeaderforGET(true)

Note this can/should be used in conjunction with the other utility method:

  oa.setAuthMethod(...)

The default value for the Authorization header is 'Bearer'

If you're building your own requests using oa._request then there is a new exported
method:

  oa.buildAuthHeader(token)
2013-03-05 17:34:20 +00:00
ciaranj
ba81ad43bd Fixes Issue #125 - Abusing externally passed in data structure
Also had to re-jig the test, as it turns out the contributor-supplied test
for this work didn't *actually* test anything :(
2013-03-05 17:00:35 +00:00
Jose F. Romaniello
798157c185 fix #129 Setting token in query params and Authorization header violates spec 2013-03-05 04:04:00 -03:00
Ciaran Jessup
45a983e6dc Merge pull request #114 from rolandboon/master
Fix requests containing !'()* in POST data
2012-11-25 07:28:31 -08:00
Brian Park
efbce5bd68 Add in Authorization Header and support extra headers by default. 2012-11-21 10:29:30 -05:00
rolandboon
240a992553 Update lib/oauth.js
Fix the mismatch between the output of querystring.stringify() and this._encodeData().
2012-09-28 12:59:59 +03:00
Ciaran Jessup
3a15f03c34 Merge pull request #101 from GCheung55/patch-1
Update to make sure hostName exists before trying to act on it
2012-07-28 05:33:46 -07:00
ciaranj
d43a712548 Merge remote-tracking branch 'chrischw/master' 2012-07-28 13:25:12 +01:00
ciaranj
b03f6ae424 Remove excess double URL encoding introduced by fixes for issue #64 2012-07-28 13:09:32 +01:00
Christian Schwarz
5fab3c577e Added an option to change the OAuth parameter seperator 2012-07-07 00:56:39 +02:00
Garrick Cheung
409405f674 Update to make sure hostName exists before trying to act on it. Otherwise it will throw an error. 2012-06-11 11:36:31 -07:00
Joe Rozner
d8d1e0bad7 fixed issue #64 w/ tests 2012-06-07 10:44:54 -07:00
ciaranj
64b2487199 Merge remote-tracking branch 'lukebaker/patch-1' into add_support_for_oauth2_token_refresh 2012-04-24 21:19:02 +01:00
ciaranj
ef51782104 Fix global scope leak, and amend decision on when to use https or http libraries 2012-04-24 21:11:20 +01:00
ciaranj
1970e0045e Merge remote-tracking branch 'dmathieu/fix_http' into not_require_http
Conflicts:
	lib/oauth2.js
2012-04-24 20:54:49 +01:00
ciaranj
e4cc471160 Merge commit '2e1f9f9' into oauth2_results_callback 2012-04-24 20:37:38 +01:00
Luke Baker
e1a8422e7c Add support for refreshing an access token 2012-03-13 23:17:15 -03:00
Patrick Negri
6404f6e023 [ #Issue 75 ] Fixing Live Protocol 302 Resources 2011-10-26 14:05:03 -02:00
Fabian Jakobs
9b4703aaca request variable leaked into the global scope 2011-10-20 16:39:13 +03:00
Damien Mathieu
32620902a5 don't send the request using https if the uri is http 2011-09-24 14:10:46 +02:00
Tang Bo Hao
2e1f9f9db6 callback results when getAccessToken 2011-09-21 01:26:33 +08:00
ciaranj
3c45927acd Fixes Issue #62 (adds another misbehaving host) 2011-08-23 20:59:47 +01:00
ciaranj
85805b6b1b Tidying up a method comment 2011-08-17 09:02:03 +01:00
Raoul Millais
aca047eaeb Reimplemented configurable http method for token requests using setClientOptions 2011-08-17 08:42:58 +01:00
ciaranj
49c83f1824 Documented behaviour of getOAuthRequestToken 2011-08-16 14:04:01 +01:00
Raoul Millais
1b4624cacd Added support for GET when requesting request tokens 2011-08-16 13:26:49 +01:00
ciaranj
a2ac03bc37 uggh committed a console.log 2011-08-15 23:43:29 +01:00
ciaranj
707b8f77b2 OAuth2 getOAuthAccessToken now POSTs rather than GET as per the spec (v20) 2011-08-15 23:30:47 +01:00
ciaranj
0643395b2e Supports OAuth Providers that don't end connections neatly (Google!) 2011-08-15 23:27:06 +01:00
bdickason
d8b5731446 Added support and test coverage for following 301 redirects 2011-07-08 10:04:45 -04:00
ciaranj
5707c480df Adding a configuration mechanism (that may not stay) to allow overriding of the name of the access token used when requesting resources 2011-06-30 00:03:22 +01:00
selead
5f383ff1b1 fix content length for oauth 1.0 2011-06-25 12:36:25 +04:00
ciaranj
3ed11c05bd Inverting the branch logic for easier reading 2011-06-23 22:18:11 +01:00
Neil Mansilla
c78a9ca129 Match all 2xx response codes. 2011-06-23 09:14:46 -07:00
ciaranj
37c2408187 Some minor reformatting and 'standardisation' of the merged code
Also updating package.json to reflect Echo support
2011-05-10 23:31:14 +01:00
meltingice
ed01a23da1 Refactored OAuthEcho object into oauth.js to remove lots of redundancy 2011-05-08 23:07:57 -04:00
meltingice
0158a78c4c Added support for OAuth Echo 2011-05-05 10:56:23 -04:00
ciaranj
9fea0b5458 Added tests for 302 redirect functionality 2011-04-19 23:09:20 +01:00
neyric
15f06f254f Follow 302 redirects with "Location" header 2011-02-26 15:01:54 +01:00
ciaranj
13d9420c94 Merge branch '0.4_compat_fixes'
Conflicts:
	lib/oauth.js
2011-02-13 11:41:15 +00:00
ciaranj
349d258b1f Updated the Oauth2 code to work with the new https api 2011-02-06 19:52:44 +00:00
ciaranj
5041ca168a closes 24 - Now compatible with node v0.3.7 2011-02-02 21:35:04 +00:00
Rasmus Andersson
98e432b431 Compatibility with node 0.3.8 2011-02-02 19:34:32 +00:00
Daniel Hofstetter
40b70bb9ef Renaming variable sshEnabled -> sslEnabled 2010-12-18 07:52:48 -08:00
ciaranj
3331aefe27 Resolves Issue 18 - Handles node.js querystring a little better
in the edge case on composite parameters such as foo[bar] :)
2010-12-13 20:04:41 +00:00