Skip to content
Newer
Older
100644 49 lines (39 sloc) 1.9 KB
78bdd94 @almet prepare next release
almet authored
1 0.7.0 - XXXX-XX-XX
2 ==================
3
f9e9701 @rfk Update changlog.
rfk authored
4 * Added a pure-python implementation of the JWT crypto routines, for
5 use when M2Crypto is not available.
6 * Added "from_pem_data" and "to_pem_data" methods to Key objects.
7 Currently these are only available when M2Crypto is installed.
58e44c5 @rfk Mention delegated authority support in the changelog.
rfk authored
8 * Added support for delegation of authority; thanks @kylef.
ed4e7fc @rfk Prepare metadata for next version number
rfk authored
9
6347701 @rfk Update CHANGELOG for 0.6.1 release
rfk authored
10 0.6.1 - 2012-06-07
11 ==================
12
13 * Disable certificate chaining for now. This feature is not used by any
14 servers in the wild, and the spec for it is going to change soon.
15
f19ca6d @almet Bump version number to 0.6
almet authored
16 0.6.0 - 2012-31-05
ed4e7fc @rfk Prepare metadata for next version number
rfk authored
17 ==================
18
3126a37 @rfk Remove ability to use a custom JWT subclass for parsing.
rfk authored
19 * Remove ability to use a custom JWT parser class, it's not used and
20 adds needless complexity.
f19ca6d @almet Bump version number to 0.6
almet authored
21 * Add a way to skip the ssl verification when getting certificates with the
22 CertificateManager.
ed4e7fc @rfk Prepare metadata for next version number
rfk authored
23
0d34842 @almet update the CHANGES.txt file
almet authored
24 0.5.0 - 2012-04-18
334be35 @almet bump changes
almet authored
25 ==================
26
27 * add support of requests rather than custom code for ssl checking when
28 retrieving certificates.
a03f9b7 @almet patched_urlopen is not needed anymore
almet authored
29 * removed patch utility for secure_urlopen (we are now using requests)
0d34842 @almet update the CHANGES.txt file
almet authored
30 * add more verbose errors when dealing with RSA/DSA Keys.
8fa92fb @rfk Prep for version 0.4.0, the "PyBrowserID" rename.
rfk authored
31
32 0.4.0 - 2012-03-13
32798c0 @rfk Remove vep.verify[remote|local|dummy] functions.
rfk authored
33 ==================
34
3f85301 @rfk Rename from PyVEP to PyBrowserID
rfk authored
35 * Renamed from PyVEP to PyBrowserID, in keeping with Mozilla branding.
8fa92fb @rfk Prep for version 0.4.0, the "PyBrowserID" rename.
rfk authored
36 * Audience checking now accepts glob-style patterns as well as fixed
37 audience strings.
38 * Verifier objects now accept a list of audience patterns as their first
39 argument. This is designed to encourage doing the right thing rather than,
40 say, passing in the hostname from the request.
41 * Allowed LocalVerifier to use of a custom JWT parser.
42 * Removed browserid.verify_[remote|local|dummy] since they just cause
3f85301 @rfk Rename from PyVEP to PyBrowserID
rfk authored
43 confusion. You should either accept the defaults provided by the
44 browserid.verify function, or use a full-blown Verifier object.
8fa92fb @rfk Prep for version 0.4.0, the "PyBrowserID" rename.
rfk authored
45 * Split certificate loading and caching into a separate class, in
46 browserid.certificates:CertificatesManager.
47 * Removed the DummyVerifier class in favour of supporting functions
48 in browserid.tests.support.
Something went wrong with that request. Please try again.