@@ -49,7 +49,7 @@ def initializeRequest(self):
49
49
50
50
path_index = [".well-known/(oauth-authorization-server|openid-configuration)" ]
51
51
52
- def web_index (self , well_known , instance = None ):
52
+ def web_index (self , well_known , instance = None , ** kwargs ):
53
53
"""Well known endpoint, specified by
54
54
`RFC8414 <https://tools.ietf.org/html/rfc8414#section-3>`_
55
55
@@ -96,7 +96,7 @@ def web_index(self, well_known, instance=None):
96
96
resDict .pop ("Clients" , None )
97
97
return resDict
98
98
99
- def web_jwk (self ):
99
+ def web_jwk (self , ** kwargs ):
100
100
"""JWKs endpoint
101
101
102
102
Request example::
@@ -121,7 +121,7 @@ def web_jwk(self):
121
121
result = self .server .db .getKeySet ()
122
122
return result ["Value" ].as_dict () if result ["OK" ] else {}
123
123
124
- def web_revoke (self ):
124
+ def web_revoke (self , ** kwargs ):
125
125
"""Revocation endpoint
126
126
127
127
Request example::
@@ -137,7 +137,7 @@ def web_revoke(self):
137
137
self .log .verbose ("Initialize a Device authentication flow." )
138
138
return self .server .create_endpoint_response (RevocationEndpoint .ENDPOINT_NAME , self .request )
139
139
140
- def web_userinfo (self ):
140
+ def web_userinfo (self , ** kwargs ):
141
141
"""The UserInfo endpoint can be used to retrieve identity information about a user,
142
142
see `spec <https://openid.net/specs/openid-connect-core-1_0.html#UserInfo>`_
143
143
@@ -175,7 +175,7 @@ def web_userinfo(self):
175
175
176
176
path_device = ["([A-z%0-9-_]*)" ]
177
177
178
- def web_device (self , provider = None , user_code = None ):
178
+ def web_device (self , provider = None , user_code = None , client_id = None , ** kwargs ):
179
179
"""The device authorization endpoint can be used to request device and user codes.
180
180
This endpoint is used to start the device flow authorization process and user code verification.
181
181
@@ -276,7 +276,7 @@ def web_device(self, provider=None, user_code=None):
276
276
277
277
path_authorization = ["([A-z%0-9-_]*)" ]
278
278
279
- def web_authorization (self , provider = None ):
279
+ def web_authorization (self , provider = None , ** kwargs ):
280
280
"""Authorization endpoint
281
281
282
282
GET: LOCATION/authorization/<provider>
@@ -312,7 +312,7 @@ def web_authorization(self, provider=None):
312
312
"""
313
313
return self .server .validate_consent_request (self .request , provider )
314
314
315
- def web_redirect (self , state , error = None , error_description = "" , chooseScope = []):
315
+ def web_redirect (self , state , error = None , error_description = "" , chooseScope = [], ** kwargs ):
316
316
"""Redirect endpoint.
317
317
After a user successfully authorizes an application, the authorization server will redirect
318
318
the user back to the application with either an authorization code or access token in the URL.
@@ -393,7 +393,7 @@ def web_redirect(self, state, error=None, error_description="", chooseScope=[]):
393
393
resp .payload = getHTML ("authorization response" , state = resp .status_code , body = resp .payload )
394
394
return resp
395
395
396
- def web_token (self ):
396
+ def web_token (self , ** kwargs ):
397
397
"""The token endpoint, the description of the parameters will differ depending on the selected grant_type
398
398
399
399
POST LOCATION/token
0 commit comments