Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Newer
Older
100644 56 lines (44 sloc) 2.148 kb
22ce9b7 @ametaireau preparation of the 0.7 release
ametaireau authored
1 0.7.0 - 2012-07-26
78bdd94 @ametaireau prepare next release
ametaireau authored
2 ==================
3
f9e9701 @rfk Update changlog.
rfk authored
4 * Added a pure-python implementation of the JWT crypto routines, for
5 use when M2Crypto is not available.
6 * Added "from_pem_data" and "to_pem_data" methods to Key objects.
7 Currently these are only available when M2Crypto is installed.
58e44c5 @rfk Mention delegated authority support in the changelog.
rfk authored
8 * Added support for delegation of authority; thanks @kylef.
f80ef44 @rfk Update RemoteVerifier to use persona.org URLs.
rfk authored
9 * Use https://verifier.login.persona.org/verify for remote verification
ed4e7fc @rfk Prepare metadata for next version number
rfk authored
10
8770cb4 @rfk Prep 0.6.2 release.
rfk authored
11 0.6.2 - 2012-07-17
12 ==================
13
14 * Add persona.org and related sites to the list of default
15 trusted secondaries.
16
6347701 @rfk Update CHANGELOG for 0.6.1 release
rfk authored
17 0.6.1 - 2012-06-07
18 ==================
19
20 * Disable certificate chaining for now. This feature is not used by any
21 servers in the wild, and the spec for it is going to change soon.
22
f19ca6d @ametaireau Bump version number to 0.6
ametaireau authored
23 0.6.0 - 2012-31-05
ed4e7fc @rfk Prepare metadata for next version number
rfk authored
24 ==================
25
3126a37 @rfk Remove ability to use a custom JWT subclass for parsing.
rfk authored
26 * Remove ability to use a custom JWT parser class, it's not used and
27 adds needless complexity.
f19ca6d @ametaireau Bump version number to 0.6
ametaireau authored
28 * Add a way to skip the ssl verification when getting certificates with the
29 CertificateManager.
ed4e7fc @rfk Prepare metadata for next version number
rfk authored
30
0d34842 @ametaireau update the CHANGES.txt file
ametaireau authored
31 0.5.0 - 2012-04-18
334be35 @ametaireau bump changes
ametaireau authored
32 ==================
33
34 * add support of requests rather than custom code for ssl checking when
35 retrieving certificates.
a03f9b7 @ametaireau patched_urlopen is not needed anymore
ametaireau authored
36 * removed patch utility for secure_urlopen (we are now using requests)
0d34842 @ametaireau update the CHANGES.txt file
ametaireau authored
37 * add more verbose errors when dealing with RSA/DSA Keys.
8fa92fb @rfk Prep for version 0.4.0, the "PyBrowserID" rename.
rfk authored
38
39 0.4.0 - 2012-03-13
32798c0 @rfk Remove vep.verify[remote|local|dummy] functions.
rfk authored
40 ==================
41
3f85301 @rfk Rename from PyVEP to PyBrowserID
rfk authored
42 * Renamed from PyVEP to PyBrowserID, in keeping with Mozilla branding.
8fa92fb @rfk Prep for version 0.4.0, the "PyBrowserID" rename.
rfk authored
43 * Audience checking now accepts glob-style patterns as well as fixed
44 audience strings.
45 * Verifier objects now accept a list of audience patterns as their first
46 argument. This is designed to encourage doing the right thing rather than,
47 say, passing in the hostname from the request.
48 * Allowed LocalVerifier to use of a custom JWT parser.
49 * Removed browserid.verify_[remote|local|dummy] since they just cause
3f85301 @rfk Rename from PyVEP to PyBrowserID
rfk authored
50 confusion. You should either accept the defaults provided by the
51 browserid.verify function, or use a full-blown Verifier object.
8fa92fb @rfk Prep for version 0.4.0, the "PyBrowserID" rename.
rfk authored
52 * Split certificate loading and caching into a separate class, in
53 browserid.certificates:CertificatesManager.
54 * Removed the DummyVerifier class in favour of supporting functions
55 in browserid.tests.support.
Something went wrong with that request. Please try again.