EsiSecurity(**kwargs)The EsiPy App wrapper that will deal with pyswagger.App and caching.
Parameters:
None. Either this or code_verifier must be providedNone. Either this or secret_key must be providedUser-Agent header will trigger a warn.evessoAFTER_TOKEN_REFRESH using signal_token_updated when initializing the clienthttps://login.eveonline.com/.well-known/oauth-authorization-server. Change this URL to use SISI or Serenity SSO.None. If this is None, EsiSecurity will make a request to get the informations.None. If this is None, EsiSecurity will make a request to get the informations.EsiSecurity.verify(kid='JWT-Signature-Key', options=None)Use python-jose to validate and decode the token and return the token informations.
Parameters:
JWT-Signature-Key.EsiSecurity.auth(code)Get the tokens from SSO using the given code, and return the json response containing the tokens.
Parameters:
EsiSecurity.refresh(scope_list=None)Use the given refresh token (using update_token or auth) to get a new access_token.
Parameters:
NoneEsiSecurity.revoke()Use the current tokens to make a request CCP side to revoke these tokens.
EsiSecurity.is_token_expired(offset=0)Check if the stored access_token is expired, with the offset offset.
Parameters:
EsiSecurity.update_token(response_json, **kwargs)Update the security object with the given tokens.
Parameters:
{'access_token':'token', 'refresh_token':'token', 'expires_in': seconds}EsiSecurity.get_auth_uri(state, scopes=None, implicit=False)Generate the SSO auth URL, using the given parameters and EsiSecurity attributes. If no secret_key is provided but code_verifier, the function will automatically use the PCKE flow.
Parameters: All parameters are optional.