errors
oauthlib.oauth2.rfc6749.errors ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Error used both by OAuth 2 clients and providers to represent the spec defined error responses for all four core grant types.
AccessDeniedError
Bases: OAuth2Error
The resource owner or authorization server denied the request.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
218 219 220 221 222 |
|
ConsentRequired
Bases: OAuth2Error
The Authorization Server requires End-User consent.
This error MAY be returned when the prompt parameter value in the Authentication Request is none, but the Authentication Request cannot be completed without displaying a user interface for End-User consent.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
357 358 359 360 361 362 363 364 365 |
|
CustomOAuth2Error
Bases: OAuth2Error
This error is a placeholder for all custom errors not described by the RFC. Some of the popular OAuth2 providers are using custom errors.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
379 380 381 382 383 384 385 386 |
|
FatalClientError
Bases: OAuth2Error
Errors during authorization where user should not be redirected back.
If the request fails due to a missing, invalid, or mismatching redirection URI, or if the client identifier is missing or invalid, the authorization server SHOULD inform the resource owner of the error and MUST NOT automatically redirect the user-agent to the invalid redirection URI.
Instead the user should be informed of the error by the provider itself.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
141 142 143 144 145 146 147 148 149 150 151 152 153 |
|
InsufficientScopeError
Bases: OAuth2Error
The request requires higher privileges than provided by the access token. The resource server SHOULD respond with the HTTP 403 (Forbidden) status code and MAY include the "scope" attribute with the scope necessary to access the protected resource.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
343 344 345 346 347 348 349 350 351 352 353 354 |
|
InvalidClientError
Bases: FatalClientError
Client authentication failed (e.g. unknown client, no client authentication included, or unsupported authentication method). The authorization server MAY return an HTTP 401 (Unauthorized) status code to indicate which HTTP authentication schemes are supported. If the client attempted to authenticate via the "Authorization" request header field, the authorization server MUST respond with an HTTP 401 (Unauthorized) status code, and include the "WWW-Authenticate" response header field matching the authentication scheme used by the client.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
275 276 277 278 279 280 281 282 283 284 285 286 287 288 |
|
InvalidGrantError
Bases: OAuth2Error
The provided authorization grant (e.g. authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client.
https://tools.ietf.org/html/rfc6749#section-5.2
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
291 292 293 294 295 296 297 298 299 300 301 |
|
InvalidRequestError
Bases: OAuth2Error
The request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
185 186 187 188 189 190 191 |
|
InvalidRequestFatalError
Bases: FatalClientError
For fatal errors, the request is missing a required parameter, includes an invalid parameter value, includes a parameter more than once, or is otherwise malformed.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
156 157 158 159 160 161 162 |
|
InvalidScopeError
Bases: OAuth2Error
The requested scope is invalid, unknown, or malformed, or exceeds the scope granted by the resource owner.
https://tools.ietf.org/html/rfc6749#section-5.2
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
245 246 247 248 249 250 251 252 |
|
InvalidTokenError
Bases: OAuth2Error
The access token provided is expired, revoked, malformed, or invalid for other reasons. The resource SHOULD respond with the HTTP 401 (Unauthorized) status code. The client MAY request a new access token and retry the protected resource request.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
329 330 331 332 333 334 335 336 337 338 339 340 |
|
LoginRequired
Bases: OAuth2Error
The Authorization Server requires End-User authentication.
This error MAY be returned when the prompt parameter value in the Authentication Request is none, but the Authentication Request cannot be completed without displaying a user interface for End-User authentication.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
368 369 370 371 372 373 374 375 376 |
|
MissingCodeChallengeError
Bases: InvalidRequestError
If the server requires Proof Key for Code Exchange (PKCE) by OAuth public clients and the client does not send the "code_challenge" in the request, the authorization endpoint MUST return the authorization error response with the "error" value set to "invalid_request". The "error_description" or the response of "error_uri" SHOULD explain the nature of error, e.g., code challenge required.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
198 199 200 201 202 203 204 205 206 207 |
|
MissingCodeVerifierError
Bases: InvalidRequestError
The request to the token endpoint, when PKCE is enabled, has the parameter code_verifier
REQUIRED.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
210 211 212 213 214 215 |
|
OAuth2Error
Bases: Exception
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 |
|
__init__(description=None, uri=None, state=None, status_code=None, request=None)
:param description: A human-readable ASCII [USASCII] text providing additional information, used to assist the client developer in understanding the error that occurred. Values for the "error_description" parameter MUST NOT include characters outside the set x20-21 / x23-5B / x5D-7E.
:param uri: A URI identifying a human-readable web page with information about the error, used to provide the client developer with additional information about the error. Values for the "error_uri" parameter MUST conform to the URI- Reference syntax, and thus MUST NOT include characters outside the set x21 / x23-5B / x5D-7E.
:param state: A CSRF protection value received from the client.
:param status_code:
:param request: OAuthlib request. :type request: oauthlib.common.Request
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 |
|
ServerError
Bases: OAuth2Error
The authorization server encountered an unexpected condition that prevented it from fulfilling the request. (This error code is needed because a 500 Internal Server Error HTTP status code cannot be returned to the client via a HTTP redirect.)
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
255 256 257 258 259 260 261 262 |
|
TemporarilyUnavailableError
Bases: OAuth2Error
The authorization server is currently unable to handle the request due to a temporary overloading or maintenance of the server. (This error code is needed because a 503 Service Unavailable HTTP status code cannot be returned to the client via a HTTP redirect.)
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
265 266 267 268 269 270 271 272 |
|
UnauthorizedClientError
Bases: OAuth2Error
The authenticated client is not authorized to use this authorization grant type.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
304 305 306 307 308 309 |
|
UnsupportedCodeChallengeMethodError
Bases: InvalidRequestError
If the server supporting PKCE does not support the requested transformation, the authorization endpoint MUST return the authorization error response with "error" value set to "invalid_request". The "error_description" or the response of "error_uri" SHOULD explain the nature of error, e.g., transform algorithm not supported.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
233 234 235 236 237 238 239 240 241 242 |
|
UnsupportedGrantTypeError
Bases: OAuth2Error
The authorization grant type is not supported by the authorization server.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
312 313 314 315 316 317 |
|
UnsupportedResponseTypeError
Bases: OAuth2Error
The authorization server does not support obtaining an authorization code using this method.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
225 226 227 228 229 230 |
|
UnsupportedTokenTypeError
Bases: OAuth2Error
The authorization server does not support the hint of the presented token type. I.e. the client tried to revoke an access token on a server not supporting this feature.
Source code in server/vendor/oauthlib/oauth2/rfc6749/errors.py
320 321 322 323 324 325 326 |
|