Skip to content
This repository has been archived by the owner on Mar 30, 2023. It is now read-only.

Commit

Permalink
Prep for version 0.4.0, the "PyBrowserID" rename.
Browse files Browse the repository at this point in the history
  • Loading branch information
rfk committed Mar 14, 2012
1 parent ac1d101 commit 8fa92fb
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 79 deletions.
89 changes: 13 additions & 76 deletions CHANGES.txt
Original file line number Original file line Diff line number Diff line change
@@ -1,81 +1,18 @@
0.4.0 - ????-??-??
0.4.0 - 2012-03-13
================== ==================


* Renamed from PyVEP to PyBrowserID, in keeping with Mozilla branding. * Renamed from PyVEP to PyBrowserID, in keeping with Mozilla branding.
* Verifier objects must be given a list of audience patterns as their first * Audience checking now accepts glob-style patterns as well as fixed
argument. This makes it easier to do the right thing with audience checks audience strings.
rather than, say, passing in the hostname from the request. * Verifier objects now accept a list of audience patterns as their first
* XXX: document refactoring here when we're finished with it. argument. This is designed to encourage doing the right thing rather than,
* Allow LocalVerifier to use of a custom JWT parser. say, passing in the hostname from the request.
* Remove browserid.verify_[remote|local|dummy] since they just cause * Allowed LocalVerifier to use of a custom JWT parser.
* Removed browserid.verify_[remote|local|dummy] since they just cause
confusion. You should either accept the defaults provided by the confusion. You should either accept the defaults provided by the
browserid.verify function, or use a full-blown Verifier object. browserid.verify function, or use a full-blown Verifier object.

* Split certificate loading and caching into a separate class, in
0.3.2 - 2012-02-03 browserid.certificates:CertificatesManager.
================== * Removed the DummyVerifier class in favour of supporting functions

in browserid.tests.support.
* Fix segfaults on OSX.
* Update license to MPL 2.0.


0.3.1 - 2012-01-24
==================

* Update the audience-extraction code in RemoteVerifier to support the
new-style assertion format; thanks junkafarian.


0.3.0 - 2012-01-06
==================

* Support the "new-style" VEP assertion format. This avoids double-b64-
encoding and generally results in smaller assertions.
* Warn rather than fail if we can't find the CA certificates. This will
help new users get up and running more easily.
* Add shortcut functions for verification with the default options.
They are vep.verify(), vep.verify_remote(), vep.verify_local(), and
vep.verify_dummy().
* Add vep.utils.get_assertion_info(), which parses useful information out
of an assertion without actually verifying it.
* Make LocalVerifier expire cached public keys after 6 hours by default.
* Allow LocalVerifier to take a user-specified cache object so that public
keys can be stored in e.g. memcached.
* Update to the latest issuer-key-fetch protocol (using /.well-known/vep).
* Add InvalidIssuerError to report on invalid or untrusted issuers.
* Clean up the internal JWT interface. It now uses module-level functions
rather than classmethods.


0.2.1 - 2011-12-16
==================

* Use M2Crypto for faster DSA operations.
* DummyVerifier: fix hex formatting for compatability with jwcrypto.
* DummyVerifier: don't emit FutureWarning on initialisation.


0.2.0 - 2011-12-07
==================

* do more validation of the assertion before checking the certificates,
to avoid expensive crypto ops for things we know to be invalid.
* implement DummyVerifier class to aid in testing, both of this package
and of packages that are using PyVEP.
* add exception hierarchy in vep.errors, so that calling code can easily
tell why verification failed.


0.1.1 - 2011-12-01
==================

* add "diresworb.org" to default list of trusted secondaries.
* implement additional signature algorithms.
* if "hostname/.well-known/host-meta" gives a 404, fall back to "hostname/pk"
to find the public key.


0.1.0 - 2011-11-23
==================

* initial release.

4 changes: 2 additions & 2 deletions browserid/__init__.py
Original file line number Original file line Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@
""" """


__ver_major__ = 0 __ver_major__ = 0
__ver_minor__ = 3 __ver_minor__ = 4
__ver_patch__ = 2 __ver_patch__ = 0
__ver_sub__ = "" __ver_sub__ = ""
__ver_tuple__ = (__ver_major__, __ver_minor__, __ver_patch__, __ver_sub__) __ver_tuple__ = (__ver_major__, __ver_minor__, __ver_patch__, __ver_sub__)
__version__ = "%d.%d.%d%s" % __ver_tuple__ __version__ = "%d.%d.%d%s" % __ver_tuple__
Expand Down
2 changes: 1 addition & 1 deletion setup.py
Original file line number Original file line Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@


setup(name='PyBrowserID', setup(name='PyBrowserID',
version='0.4.0', version='0.4.0',
description='Python library for the BrowseriD Protocol', description='Python library for the BrowserID Protocol',
long_description=README + '\n\n' + CHANGES, long_description=README + '\n\n' + CHANGES,
license='MPLv2.0', license='MPLv2.0',
classifiers=[ classifiers=[
Expand Down

0 comments on commit 8fa92fb

Please sign in to comment.