plain.oauth 0.15.0__py3-none-any.whl → 0.16.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- plain/oauth/README.md +5 -6
- plain/oauth/migrations/0001_initial.py +2 -2
- {plain_oauth-0.15.0.dist-info → plain_oauth-0.16.1.dist-info}/METADATA +6 -7
- {plain_oauth-0.15.0.dist-info → plain_oauth-0.16.1.dist-info}/RECORD +6 -6
- {plain_oauth-0.15.0.dist-info → plain_oauth-0.16.1.dist-info}/WHEEL +0 -0
- {plain_oauth-0.15.0.dist-info → plain_oauth-0.16.1.dist-info}/licenses/LICENSE +0 -0
plain/oauth/README.md
CHANGED
@@ -15,7 +15,6 @@ There are three OAuth flows that it makes possible:
|
|
15
15
|
2. Login via OAuth (existing user, existing OAuth connection)
|
16
16
|
3. Connect/disconnect OAuth accounts to a user (existing user, new OAuth connection)
|
17
17
|
|
18
|
-
|
19
18
|
## Usage
|
20
19
|
|
21
20
|
Install the package from PyPi:
|
@@ -142,7 +141,7 @@ That's pretty much it!
|
|
142
141
|
The most common error you'll run into is if an existing user clicks a login button,
|
143
142
|
but they haven't yet connected that provider to their account.
|
144
143
|
For security reasons,
|
145
|
-
the required flow here is that the user actually logs in with another method (however they signed up) and then
|
144
|
+
the required flow here is that the user actually logs in with another method (however they signed up) and then _connects_ the OAuth provider from a settings page.
|
146
145
|
|
147
146
|
For this error (and a couple others),
|
148
147
|
there is an error template that is rendered.
|
@@ -236,7 +235,7 @@ response = requests.get(...)
|
|
236
235
|
|
237
236
|
### Using the Django system check
|
238
237
|
|
239
|
-
This library comes with a Django system check to ensure you don't
|
238
|
+
This library comes with a Django system check to ensure you don't _remove_ a provider from `settings.py` that is still in use in your database.
|
240
239
|
You do need to specify the `--database` for this to run when using the check command by itself:
|
241
240
|
|
242
241
|
```sh
|
@@ -247,7 +246,7 @@ python manage.py check --database default
|
|
247
246
|
|
248
247
|
### How is this different from [Django OAuth libraries](https://djangopackages.org/grids/g/oauth/)?
|
249
248
|
|
250
|
-
The short answer is that
|
249
|
+
The short answer is that _it does less_.
|
251
250
|
|
252
251
|
In [django-allauth](https://github.com/pennersr/django-allauth)
|
253
252
|
(maybe the most popular alternative)
|
@@ -262,7 +261,7 @@ Personally, I don't like the way that your OAuth settings are stored in the data
|
|
262
261
|
and the implications for doing it one way or another.
|
263
262
|
|
264
263
|
The other popular OAuth libraries have similar issues,
|
265
|
-
and I think their
|
264
|
+
and I think their _weight_ outweighs their usefulness for 80% of the use cases.
|
266
265
|
|
267
266
|
### Why aren't providers included in the library itself?
|
268
267
|
|
@@ -281,7 +280,7 @@ Just copy that code and paste it in your project.
|
|
281
280
|
Tweak as necessary!
|
282
281
|
|
283
282
|
This might sound strange at first.
|
284
|
-
But in the long run we think it's actually
|
283
|
+
But in the long run we think it's actually _much_ more maintainable for both us (as library authors) and you (as app author).
|
285
284
|
If something breaks with a provider, you can fix it immediately!
|
286
285
|
You don't need to try to run changes through us or wait for an upstream update.
|
287
286
|
You're welcome to contribute an example to this repo,
|
@@ -26,8 +26,8 @@ class Migration(migrations.Migration):
|
|
26
26
|
),
|
27
27
|
("created_at", models.DateTimeField(auto_now_add=True)),
|
28
28
|
("updated_at", models.DateTimeField(auto_now=True)),
|
29
|
-
("provider_key", models.CharField(
|
30
|
-
("provider_user_id", models.CharField(
|
29
|
+
("provider_key", models.CharField(max_length=100)),
|
30
|
+
("provider_user_id", models.CharField(max_length=100)),
|
31
31
|
("access_token", models.CharField(required=False, max_length=100)),
|
32
32
|
("refresh_token", models.CharField(required=False, max_length=100)),
|
33
33
|
(
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.4
|
2
2
|
Name: plain.oauth
|
3
|
-
Version: 0.
|
3
|
+
Version: 0.16.1
|
4
4
|
Summary: OAuth login and API access for Plain.
|
5
5
|
Author-email: Dave Gaeddert <dave.gaeddert@dropseed.dev>
|
6
6
|
License-Expression: BSD-3-Clause
|
@@ -29,7 +29,6 @@ There are three OAuth flows that it makes possible:
|
|
29
29
|
2. Login via OAuth (existing user, existing OAuth connection)
|
30
30
|
3. Connect/disconnect OAuth accounts to a user (existing user, new OAuth connection)
|
31
31
|
|
32
|
-
|
33
32
|
## Usage
|
34
33
|
|
35
34
|
Install the package from PyPi:
|
@@ -156,7 +155,7 @@ That's pretty much it!
|
|
156
155
|
The most common error you'll run into is if an existing user clicks a login button,
|
157
156
|
but they haven't yet connected that provider to their account.
|
158
157
|
For security reasons,
|
159
|
-
the required flow here is that the user actually logs in with another method (however they signed up) and then
|
158
|
+
the required flow here is that the user actually logs in with another method (however they signed up) and then _connects_ the OAuth provider from a settings page.
|
160
159
|
|
161
160
|
For this error (and a couple others),
|
162
161
|
there is an error template that is rendered.
|
@@ -250,7 +249,7 @@ response = requests.get(...)
|
|
250
249
|
|
251
250
|
### Using the Django system check
|
252
251
|
|
253
|
-
This library comes with a Django system check to ensure you don't
|
252
|
+
This library comes with a Django system check to ensure you don't _remove_ a provider from `settings.py` that is still in use in your database.
|
254
253
|
You do need to specify the `--database` for this to run when using the check command by itself:
|
255
254
|
|
256
255
|
```sh
|
@@ -261,7 +260,7 @@ python manage.py check --database default
|
|
261
260
|
|
262
261
|
### How is this different from [Django OAuth libraries](https://djangopackages.org/grids/g/oauth/)?
|
263
262
|
|
264
|
-
The short answer is that
|
263
|
+
The short answer is that _it does less_.
|
265
264
|
|
266
265
|
In [django-allauth](https://github.com/pennersr/django-allauth)
|
267
266
|
(maybe the most popular alternative)
|
@@ -276,7 +275,7 @@ Personally, I don't like the way that your OAuth settings are stored in the data
|
|
276
275
|
and the implications for doing it one way or another.
|
277
276
|
|
278
277
|
The other popular OAuth libraries have similar issues,
|
279
|
-
and I think their
|
278
|
+
and I think their _weight_ outweighs their usefulness for 80% of the use cases.
|
280
279
|
|
281
280
|
### Why aren't providers included in the library itself?
|
282
281
|
|
@@ -295,7 +294,7 @@ Just copy that code and paste it in your project.
|
|
295
294
|
Tweak as necessary!
|
296
295
|
|
297
296
|
This might sound strange at first.
|
298
|
-
But in the long run we think it's actually
|
297
|
+
But in the long run we think it's actually _much_ more maintainable for both us (as library authors) and you (as app author).
|
299
298
|
If something breaks with a provider, you can fix it immediately!
|
300
299
|
You don't need to try to run changes through us or wait for an upstream update.
|
301
300
|
You're welcome to contribute an example to this repo,
|
@@ -1,4 +1,4 @@
|
|
1
|
-
plain/oauth/README.md,sha256=
|
1
|
+
plain/oauth/README.md,sha256=9_l9lOSndGBG31mD3oteT8UJMeonuCKdBreLQhUO70E,9900
|
2
2
|
plain/oauth/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
3
3
|
plain/oauth/admin.py,sha256=rqrGRRUVxOlG9wiuXtndIyQxd1VT67cvFy6qWo7LF-Q,1278
|
4
4
|
plain/oauth/config.py,sha256=5Zc9mdpRgN3R1c9YspFrspWteqB2NAWna2p_-tgoPCc,159
|
@@ -8,7 +8,7 @@ plain/oauth/models.py,sha256=ceSw9AKZMXffE4ZKZLxIbOlSyndTCHL22GCuSF3Hpmk,6880
|
|
8
8
|
plain/oauth/providers.py,sha256=WMLr9g3S84lfIRFslO0VBCmthMBDQ3GCDLSIquTA_Y0,7138
|
9
9
|
plain/oauth/urls.py,sha256=FYzpQwhvZdcat8n3f7RyA-1Q21finKb8JEyakSOjXXg,696
|
10
10
|
plain/oauth/views.py,sha256=G6icfdKkOOOKB00JVN4SCeZmBcGOGUvAgueyvOd9bLI,3042
|
11
|
-
plain/oauth/migrations/0001_initial.py,sha256=
|
11
|
+
plain/oauth/migrations/0001_initial.py,sha256=B9Finbn7ijEIUbkDy_B7UsKQLfMWaXd0Kx3oZrUENWc,1753
|
12
12
|
plain/oauth/migrations/0002_alter_oauthconnection_options_and_more.py,sha256=3Mb0IU9KDRQfog0PjVbzuNv_AxCs7UVHnA0F263AKNo,581
|
13
13
|
plain/oauth/migrations/0003_alter_oauthconnection_access_token_and_more.py,sha256=FyLfwxc2pRzF-CbdRFQRRSQTOCxc9l1womgStygm_lo,629
|
14
14
|
plain/oauth/migrations/0004_alter_oauthconnection_access_token_and_more.py,sha256=ho9CG-lf7OVg1vBnjn7miihoioNmOIz7ObxB2QkPeSo,652
|
@@ -17,7 +17,7 @@ plain/oauth/migrations/0006_remove_oauthconnection_unique_oauth_provider_user_id
|
|
17
17
|
plain/oauth/migrations/0007_alter_oauthconnection_provider_key_and_more.py,sha256=B_LW6xG1o_uA13tqUs0KniXl1JBNbQu4wMh2pW8rq5I,675
|
18
18
|
plain/oauth/migrations/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
19
19
|
plain/oauth/templates/oauth/error.html,sha256=xkkWw57sZ3fz4dDfH30SVtq3okJNnJmrSRPfGxrxjh8,108
|
20
|
-
plain_oauth-0.
|
21
|
-
plain_oauth-0.
|
22
|
-
plain_oauth-0.
|
23
|
-
plain_oauth-0.
|
20
|
+
plain_oauth-0.16.1.dist-info/METADATA,sha256=anhOkdr4m5fixHd5F0SIOXLtXBljUh1SScMxn5-dZ0Y,10304
|
21
|
+
plain_oauth-0.16.1.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
22
|
+
plain_oauth-0.16.1.dist-info/licenses/LICENSE,sha256=cvKM3OlqHx3ijD6e34zsSUkPvzl-ya3Dd63A6EHL94U,1500
|
23
|
+
plain_oauth-0.16.1.dist-info/RECORD,,
|
File without changes
|
File without changes
|