Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

More replacement of browserid.org with persona.org.

  • Loading branch information...
commit eb011a0aeb276b6f832f239e75e72c2d3154750f 1 parent f80ef44
Ryan Kelly authored July 19, 2012
13  README.rst
Source Rendered
... ...
@@ -1,13 +1,14 @@
1 1
 ========================================================
2  
-PyBrowserID: a python library for the BrowseriD Protocol
  2
+PyBrowserID: a python library for the BrowserID Protocol
3 3
 ========================================================
4 4
 
5  
-This is a python client library for the BrowserID protocol:
  5
+This is a python client library for the BrowserID protocol that underlies
  6
+Mozilla Persona:
6 7
 
7  
-    https://browserid.org/
  8
+    https://login.persona.org/
8 9
 
9  
-For the vast majority of deployments, you will simply want to call the "verify"
10  
-functon to verify a given assertion::
  10
+For the vast majority of deployments, you will simply want to call the module-
  11
+level "verify" functon to verify a given assertion::
11 12
 
12 13
     >>> data = browserid.verify(BROWSERIDASSERTION, "http://mysite.com")
13 14
     >>> print data["email"]
@@ -15,7 +16,7 @@ functon to verify a given assertion::
15 16
 
16 17
 The precise implementation of this function will change depending on the
17 18
 current recommendedations of the BrowserID team.  Currently it POSTs the
18  
-assertion to the remote verifier services on browserid.org.
  19
+assertion to the remote verifier services on persona.org.
19 20
 
20 21
 Note that you *must* specify your site's root URL as the second argument
21 22
 to that function.  This is the "expected audience" and is a key security
2  browserid/__init__.py
@@ -35,7 +35,7 @@ def verify(assertion, audience=None):
35 35
     This function uses the "best" verification method available in order to
36 36
     verify the given BrowserID assertion and return a dict of user data.  The
37 37
     best method currently involves POSTing to the hosted verifier service on
38  
-    browserid.org; eventually it will do local verification.
  38
+    persona.org; eventually it will do local verification.
39 39
     """
40 40
     global _DEFAULT_VERIFIER
41 41
     if _DEFAULT_VERIFIER is None:
4  browserid/tests/support.py
@@ -112,13 +112,13 @@ def make_assertion(email, audience, issuer=None, exp=None,
112 112
 
113 113
     This method lets you generate BrowserID assertions using dummy private
114 114
     keys. Called with just an email and audience it will generate an assertion
115  
-    from browserid.org.
  115
+    from login.persona.org.
116 116
 
117 117
     By specifying the "exp", "assertion_sig" or "certificate_sig" arguments
118 118
     it is possible generate invalid assertions for testing purposes.
119 119
     """
120 120
     if issuer is None:
121  
-        issuer = "browserid.org"
  121
+        issuer = "login.persona.org"
122 122
     if exp is None:
123 123
         exp = int((time.time() + 60) * 1000)
124 124
     # Get private key for the email address itself.
5  browserid/tests/test_supportdoc.py
@@ -100,8 +100,9 @@ def _is_trusted_issuer(self, *args, **kwds):
100 100
         return self.supportdocmgr.is_trusted_issuer(*args, **kwds)
101 101
 
102 102
     def test_trusted_secondaries(self):
103  
-        self.assertTrue(self._is_trusted_issuer('test.com', 'browserid.org'))
104  
-        self.assertFalse(self._is_trusted_issuer('test.com', 'browserid.org',
  103
+        PERSONA_HOST = 'login.persona.org'
  104
+        self.assertTrue(self._is_trusted_issuer('test.com', PERSONA_HOST))
  105
+        self.assertFalse(self._is_trusted_issuer('test.com', PERSONA_HOST,
105 106
             trusted_secondaries=[], max_delegations=0))
106 107
 
107 108
     def test_hostname_issuer(self):

0 notes on commit eb011a0

Please sign in to comment.
Something went wrong with that request. Please try again.