Commit Graph

288 Commits

Author SHA1 Message Date
Lewin Bormann
56e2edd4fd chore(syntax): Use dyn everywhere to prepare for deprecation. 2019-06-11 23:49:41 +02:00
Lewin Bormann
48c3c2cced fix(installed): Store server response with token 2019-06-11 22:24:35 +02:00
Lewin Bormann
add92f878f chore(version): Bump 2.0.2 for publishing no-openssl version 2019-06-10 21:30:18 +02:00
Lewin Bormann
aa6fb4e0b9 chore(syntax): Run rustfmt on examples. 2019-06-09 09:25:29 +02:00
Lewin Bormann
ce9b6d8dd7 chore(syntax): Remove extern crate imports where not needed 2019-06-09 09:24:15 +02:00
Lewin Bormann
db4077983f cleanup(openssl): Remove openssl dependency 2019-06-09 08:34:25 +02:00
Lewin Bormann
62facaf799 Merge pull request #93 from alu/master
Fix hyper 0.12.x compatibility
2019-05-28 21:08:53 +02:00
alu
b7962a8ba1 Fix hyper 0.12.x compatibility 2019-05-27 16:16:02 +09:00
Lewin Bormann
a7262ea7e3 chore(version): Publish comma fix for nightly rust in 2.0.1 2019-05-26 20:19:24 +02:00
Lewin Bormann
610240eb7c fix(syntax): Fix #92.
It was a missing comma.
2019-05-26 20:12:08 +02:00
Lewin Bormann
126c7cf32f chore(version): 2.0.0-pre -> 2.0.0 2019-05-26 11:12:26 +02:00
Lewin Bormann
793b0ca688 Merge branch 'pull86'
Merge #86
2019-05-26 11:08:55 +02:00
Guy Taylor
9f7f3c3b95 Upgrade to Hyper v0.12
This upgrade Hyper to v0.12 and updats to code to work for it. It has
being done with the minimum code change and so the logic is still
aukward for the futures model. This should be addressed in later commits
but I did not want to compilcate an already large commit.
2019-05-26 11:08:32 +02:00
Guy Taylor
e0c05210c1 Update version from 1.x to 2.x
Update version number and docs as the move to Hyper v0.12 will cause a
breaking change to consumers of this lib.
2019-05-26 11:04:32 +02:00
Lewin Bormann
fea08cf0a5 Merge pull request #91 from zeapo/service-account-typo-fix
Typo in ServiceAccountKey
2019-05-09 23:17:15 +02:00
Mohamed Zenadi
6098eeb45c fix typo 2019-05-04 20:06:11 +02:00
Lewin Bormann
47181e4926 Merge pull request #90 from IslandUsurper/string-refs
imp: accept any string-like parameter
2019-04-11 21:04:55 +02:00
Lyle Mantooth
6428023f59 Unupdate the examples. 2019-04-03 13:57:23 -04:00
Lyle Mantooth
108162fcf8 imp: accept any string-like parameter
Use the power of the `AsRef` trait to take generic parameters for
several API functions. This makes the API more ergonomic because the
callers may pass in static `str` slices or references to owned `String`s
or even more exotic things like a `Cow`, all based on their particular
situation.

Update the tests and examples to use the most natural types they have
available.

Fixes #77. No existing code should break, as `&String` implements
`AsRef<str>` and `AsRef<Path>`
2019-04-03 09:01:28 -04:00
Lewin Bormann
de57b8fbdf Merge pull request #88 from TheBiggerGuy/readme
Update README with codecov.io badge
2019-03-01 17:11:49 +01:00
Guy Taylor
f1eb193b26 Update README with codecov.io badge 2019-02-28 15:02:09 +00:00
Lewin Bormann
7e26db39ca Merge pull request #87 from TheBiggerGuy/rustfmt
Rust lint and coverage on Travis.
2019-02-28 07:18:39 +01:00
Guy Taylor
b6644892df Only run example tests on a single Travis config 2019-02-21 20:46:00 +00:00
Guy Taylor
b96cfcd66a Format to fustfmt defaults and force lint check in Travis 2019-02-21 20:46:00 +00:00
Guy Taylor
b5ff80a541 Rust lint and coverage on Travis 2019-02-21 20:46:00 +00:00
Lewin Bormann
39e6baa9c0 Merge pull request #84 from mashedcode/nit-weird-return-value-required
imp(flows) don't require present_user_url to return an additional char
2019-02-15 17:37:32 +01:00
mash
a7d5c40f5b imp(flows) don't require present_user_url to return an additional char
For custom AuthenticatorDelegate implementations it may be very weird to
be required to return an additional character after the code from
present_user_url.

One may find himself chasing the bug which is bad UX for the user.

Improve this behavior and therefore introduce a breaking change that
will hopefully not break existing implementations nevertheless.
2019-02-15 16:24:12 +00:00
Lewin Bormann
1177631ca8 Merge pull request #83 from mashedcode/custom-redirect-uri
feat(flows): allow custom redirect uri
2019-02-15 16:59:33 +01:00
mash
4497eeb31a feat(flows): allow custom redirect uri
When implementing AuthenticatorDelegate one might want to change the
redirect_uri to use an authorized domain or just change the way
InstalledFlow works.

Add a redirect_uri method to AuthenticatorDelegate that may be
implemented to define a custom redirect uri if needed.
2019-02-12 16:48:08 +00:00
Lewin Bormann
0da0ff247b chore(version): Publish version 1.0.11 2019-02-12 06:20:10 +01:00
Lewin Bormann
4243ea8d41 chore(version): Version 1.0.10 2019-02-12 06:19:35 +01:00
Lewin Bormann
1ae13ca517 Merge pull request #82 from ignatenkobrain/patch-2
chore: Update itertools to 0.8
2019-02-11 19:59:29 +01:00
Lewin Bormann
efdb015add Merge pull request #81 from ignatenkobrain/patch-1
chore: Update base64 to 0.10
2019-02-11 19:59:20 +01:00
Igor Gnatenko
df5495879d chore: Update itertools to 0.8 2019-02-10 17:58:37 +01:00
Igor Gnatenko
0f93e5e915 chore: Update base64 to 0.10 2019-02-10 16:56:53 +01:00
Lewin Bormann
fa66623810 chore(version): Depend on hyper-native-tls 0.3 to use openssl 1.1 2019-01-27 16:27:09 +01:00
Lewin Bormann
8c5d9af02f Merge pull request #80 from jamwt/no-openssl
No openssl feature
2019-01-08 10:51:37 +01:00
Lewin Bormann
9054c16eba Merge pull request #75 from Terkwood/fix_service_account_example
fix: compilation of service account example
2019-01-08 10:31:47 +01:00
Lewin Bormann
064440f7eb Merge pull request #79 from jamwt/edition_2018
Rust 2018 edition modifications.
2019-01-08 10:30:51 +01:00
Jamie Turner
20810e32d5 Add a no-openssl feature.
Recently, commits were made to remove support for using rustls/ring
in lieu of OpenSSL to avoid having to add those as dependencies in
environments where OpenSSL already exists.

However, yup-oauth2 is being used in some environments where
*OpenSSL* doesn't exist. So, retaining the option to build
it with an openssl-free stack is key.

Note, the change to hyper-native-tls is fine and actually
unrelated, because this is often happening on Windows or
Mac enviornments, where the stack that will link to is
*not* necessarily OpenSSL either.

For example, the particular breakage that prompted this
CR is a build of yup-oauth2 on iOS. In that environment,
hyper-native-tls uses Apple's Security Framework,
but OpenSSL libraries are not actually present on all
devices/simulator environments. So a link against
a mix of Security Framework and rustls make sense,
there.

Also, update to a newer version of rustls/ring while we're at it.
2019-01-04 12:54:08 -08:00
Jamie Turner
ab4b2c2fd4 Rust 2018 edition modifications. 2019-01-04 12:43:19 -08:00
Terkwood
c55bb65c05 fix: compilation of service account example 2018-11-05 09:12:40 -05:00
Lewin Bormann
f865ffd5fe chore(version): 1.0.9
For new TLS dependency.
2018-10-07 13:59:53 +02:00
Lewin Bormann
649351c4b8 Merge pull request #74 from edelangh/update_hyper_native_tls_3
Update hyper-native-tls from 0.2 to 0.3
2018-10-03 15:41:57 +02:00
edelangh
2e1bbf761c Update hyper-native-tls from 0.2 to 0.3 2018-10-03 15:04:14 +02:00
Lewin Bormann
80ffb749fc bump version -> 1.0.8 2018-07-27 20:08:54 +02:00
Lewin Bormann
62b855ff6d Merge pull request #72 from ignatenkobrain/master
Bring deps to XXI century
2018-07-27 20:08:19 +02:00
Igor Gnatenko
3163be984d deps: rustls → openssl
Signed-off-by: Igor Gnatenko <i.gnatenko.brain@gmail.com>
2018-07-25 22:51:51 +02:00
Igor Gnatenko
9b5bbf5459 deps: hyper-rustls → hyper-native-tls
Signed-off-by: Igor Gnatenko <i.gnatenko.brain@gmail.com>
2018-07-25 22:51:37 +02:00
Igor Gnatenko
78cefeab47 deps: update url to 1
Signed-off-by: Igor Gnatenko <i.gnatenko.brain@gmail.com>
2018-07-25 22:50:45 +02:00