Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Browse files

More replacement of browserid.org with persona.org.

  • Loading branch information...
commit eb011a0aeb276b6f832f239e75e72c2d3154750f 1 parent f80ef44
@rfk rfk authored
View
13 README.rst
@@ -1,13 +1,14 @@
========================================================
-PyBrowserID: a python library for the BrowseriD Protocol
+PyBrowserID: a python library for the BrowserID Protocol
========================================================
-This is a python client library for the BrowserID protocol:
+This is a python client library for the BrowserID protocol that underlies
+Mozilla Persona:
- https://browserid.org/
+ https://login.persona.org/
-For the vast majority of deployments, you will simply want to call the "verify"
-functon to verify a given assertion::
+For the vast majority of deployments, you will simply want to call the module-
+level "verify" functon to verify a given assertion::
>>> data = browserid.verify(BROWSERIDASSERTION, "http://mysite.com")
>>> print data["email"]
@@ -15,7 +16,7 @@ functon to verify a given assertion::
The precise implementation of this function will change depending on the
current recommendedations of the BrowserID team. Currently it POSTs the
-assertion to the remote verifier services on browserid.org.
+assertion to the remote verifier services on persona.org.
Note that you *must* specify your site's root URL as the second argument
to that function. This is the "expected audience" and is a key security
View
2  browserid/__init__.py
@@ -35,7 +35,7 @@ def verify(assertion, audience=None):
This function uses the "best" verification method available in order to
verify the given BrowserID assertion and return a dict of user data. The
best method currently involves POSTing to the hosted verifier service on
- browserid.org; eventually it will do local verification.
+ persona.org; eventually it will do local verification.
"""
global _DEFAULT_VERIFIER
if _DEFAULT_VERIFIER is None:
View
4 browserid/tests/support.py
@@ -112,13 +112,13 @@ def make_assertion(email, audience, issuer=None, exp=None,
This method lets you generate BrowserID assertions using dummy private
keys. Called with just an email and audience it will generate an assertion
- from browserid.org.
+ from login.persona.org.
By specifying the "exp", "assertion_sig" or "certificate_sig" arguments
it is possible generate invalid assertions for testing purposes.
"""
if issuer is None:
- issuer = "browserid.org"
+ issuer = "login.persona.org"
if exp is None:
exp = int((time.time() + 60) * 1000)
# Get private key for the email address itself.
View
5 browserid/tests/test_supportdoc.py
@@ -100,8 +100,9 @@ def _is_trusted_issuer(self, *args, **kwds):
return self.supportdocmgr.is_trusted_issuer(*args, **kwds)
def test_trusted_secondaries(self):
- self.assertTrue(self._is_trusted_issuer('test.com', 'browserid.org'))
- self.assertFalse(self._is_trusted_issuer('test.com', 'browserid.org',
+ PERSONA_HOST = 'login.persona.org'
+ self.assertTrue(self._is_trusted_issuer('test.com', PERSONA_HOST))
+ self.assertFalse(self._is_trusted_issuer('test.com', PERSONA_HOST,
trusted_secondaries=[], max_delegations=0))
def test_hostname_issuer(self):
Please sign in to comment.
Something went wrong with that request. Please try again.