Ciaran Jessup
4d8bf8ba5f
Merge pull request #140 from AndrewMartens/master
...
Set default User-Agent if not otherwise specified in customHeaders
2014-01-04 06:17:49 -08:00
Brad Gignac
8658d7d55b
Remove type query parameter from OAuth2 requests.
...
While the type parameter was required in older versions of the OAuth2
specification, it was removed in version 8. Currently, this breaks OAuth2
against the Dropbox API. Closes #127 .
http://tools.ietf.org/html/draft-ietf-oauth-v2-08#section-4.1.1
2013-07-27 18:42:14 -04:00
Andrew Martens
a742d838f5
Set default User-Agent if not otherwise specified in customHeaders
2013-05-07 14:38:04 -07:00
ciaranj
301ebab90c
Added an extra test, and checked realHeaders to catch any dodgy custom ones
2013-03-05 18:07:40 +00:00
ciaranj
8be23c309c
Merge remote-tracking branch 'jfromaniello/bug129'
2013-03-05 17:43:51 +00:00
ciaranj
03d713be9a
Fixes Issue #129
...
Not ideal, but effectively reverts the default behaviour of the library to how 0.9.8 worked,
that is it passes the access_token as a query parameter to the server.
To allow the utility 'get' method to use an Authorization header *instead* then you need to
explicitly enable this behaviour by using the method :
var oa= new Oauth(...);
oa.useAuthorizationHeaderforGET(true)
Note this can/should be used in conjunction with the other utility method:
oa.setAuthMethod(...)
The default value for the Authorization header is 'Bearer'
If you're building your own requests using oa._request then there is a new exported
method:
oa.buildAuthHeader(token)
2013-03-05 17:34:20 +00:00
ciaranj
ba81ad43bd
Fixes Issue #125 - Abusing externally passed in data structure
...
Also had to re-jig the test, as it turns out the contributor-supplied test
for this work didn't *actually* test anything :(
2013-03-05 17:00:35 +00:00
Jose F. Romaniello
798157c185
fix #129 Setting token in query params and Authorization header violates spec
2013-03-05 04:04:00 -03:00
Ciaran Jessup
45a983e6dc
Merge pull request #114 from rolandboon/master
...
Fix requests containing !'()* in POST data
2012-11-25 07:28:31 -08:00
Brian Park
efbce5bd68
Add in Authorization Header and support extra headers by default.
2012-11-21 10:29:30 -05:00
rolandboon
240a992553
Update lib/oauth.js
...
Fix the mismatch between the output of querystring.stringify() and this._encodeData().
2012-09-28 12:59:59 +03:00
Ciaran Jessup
3a15f03c34
Merge pull request #101 from GCheung55/patch-1
...
Update to make sure hostName exists before trying to act on it
2012-07-28 05:33:46 -07:00
ciaranj
d43a712548
Merge remote-tracking branch 'chrischw/master'
2012-07-28 13:25:12 +01:00
ciaranj
b03f6ae424
Remove excess double URL encoding introduced by fixes for issue #64
2012-07-28 13:09:32 +01:00
Christian Schwarz
5fab3c577e
Added an option to change the OAuth parameter seperator
2012-07-07 00:56:39 +02:00
Garrick Cheung
409405f674
Update to make sure hostName exists before trying to act on it. Otherwise it will throw an error.
2012-06-11 11:36:31 -07:00
Joe Rozner
d8d1e0bad7
fixed issue #64 w/ tests
2012-06-07 10:44:54 -07:00
ciaranj
64b2487199
Merge remote-tracking branch 'lukebaker/patch-1' into add_support_for_oauth2_token_refresh
2012-04-24 21:19:02 +01:00
ciaranj
ef51782104
Fix global scope leak, and amend decision on when to use https or http libraries
2012-04-24 21:11:20 +01:00
ciaranj
1970e0045e
Merge remote-tracking branch 'dmathieu/fix_http' into not_require_http
...
Conflicts:
lib/oauth2.js
2012-04-24 20:54:49 +01:00
ciaranj
e4cc471160
Merge commit '2e1f9f9' into oauth2_results_callback
2012-04-24 20:37:38 +01:00
Luke Baker
e1a8422e7c
Add support for refreshing an access token
2012-03-13 23:17:15 -03:00
Patrick Negri
6404f6e023
[ #Issue 75 ] Fixing Live Protocol 302 Resources
2011-10-26 14:05:03 -02:00
Fabian Jakobs
9b4703aaca
request variable leaked into the global scope
2011-10-20 16:39:13 +03:00
Damien Mathieu
32620902a5
don't send the request using https if the uri is http
2011-09-24 14:10:46 +02:00
Tang Bo Hao
2e1f9f9db6
callback results when getAccessToken
2011-09-21 01:26:33 +08:00
ciaranj
3c45927acd
Fixes Issue #62 (adds another misbehaving host)
2011-08-23 20:59:47 +01:00
ciaranj
85805b6b1b
Tidying up a method comment
2011-08-17 09:02:03 +01:00
Raoul Millais
aca047eaeb
Reimplemented configurable http method for token requests using setClientOptions
2011-08-17 08:42:58 +01:00
ciaranj
49c83f1824
Documented behaviour of getOAuthRequestToken
2011-08-16 14:04:01 +01:00
Raoul Millais
1b4624cacd
Added support for GET when requesting request tokens
2011-08-16 13:26:49 +01:00
ciaranj
a2ac03bc37
uggh committed a console.log
2011-08-15 23:43:29 +01:00
ciaranj
707b8f77b2
OAuth2 getOAuthAccessToken now POSTs rather than GET as per the spec (v20)
2011-08-15 23:30:47 +01:00
ciaranj
0643395b2e
Supports OAuth Providers that don't end connections neatly (Google!)
2011-08-15 23:27:06 +01:00
bdickason
d8b5731446
Added support and test coverage for following 301 redirects
2011-07-08 10:04:45 -04:00
ciaranj
5707c480df
Adding a configuration mechanism (that may not stay) to allow overriding of the name of the access token used when requesting resources
2011-06-30 00:03:22 +01:00
selead
5f383ff1b1
fix content length for oauth 1.0
2011-06-25 12:36:25 +04:00
ciaranj
3ed11c05bd
Inverting the branch logic for easier reading
2011-06-23 22:18:11 +01:00
Neil Mansilla
c78a9ca129
Match all 2xx response codes.
2011-06-23 09:14:46 -07:00
ciaranj
37c2408187
Some minor reformatting and 'standardisation' of the merged code
...
Also updating package.json to reflect Echo support
2011-05-10 23:31:14 +01:00
meltingice
ed01a23da1
Refactored OAuthEcho object into oauth.js to remove lots of redundancy
2011-05-08 23:07:57 -04:00
meltingice
0158a78c4c
Added support for OAuth Echo
2011-05-05 10:56:23 -04:00
ciaranj
9fea0b5458
Added tests for 302 redirect functionality
2011-04-19 23:09:20 +01:00
neyric
15f06f254f
Follow 302 redirects with "Location" header
2011-02-26 15:01:54 +01:00
ciaranj
13d9420c94
Merge branch '0.4_compat_fixes'
...
Conflicts:
lib/oauth.js
2011-02-13 11:41:15 +00:00
ciaranj
349d258b1f
Updated the Oauth2 code to work with the new https api
2011-02-06 19:52:44 +00:00
ciaranj
5041ca168a
closes 24 - Now compatible with node v0.3.7
2011-02-02 21:35:04 +00:00
Rasmus Andersson
98e432b431
Compatibility with node 0.3.8
2011-02-02 19:34:32 +00:00
Daniel Hofstetter
40b70bb9ef
Renaming variable sshEnabled -> sslEnabled
2010-12-18 07:52:48 -08:00
ciaranj
3331aefe27
Resolves Issue 18 - Handles node.js querystring a little better
...
in the edge case on composite parameters such as foo[bar] :)
2010-12-13 20:04:41 +00:00