EsiSecurity(**kwargs)
The EsiPy App wrapper that will deal with pyswagger.App
and caching.
Parameters:
None
. Either this or code_verifier must be providedNone
. Either this or secret_key must be providedUser-Agent
header will trigger a warn.evesso
AFTER_TOKEN_REFRESH
using signal_token_updated
when initializing the clienthttps://login.eveonline.com/.well-known/oauth-authorization-server
. Change this URL to use SISI or Serenity SSO.None
. If this is None
, EsiSecurity
will make a request to get the informations.None
. If this is None
, EsiSecurity
will make a request to get the informations.EsiSecurity.verify(kid='JWT-Signature-Key', options=None)
Use python-jose
to validate and decode the token and return the token informations.
Parameters:
JWT-Signature-Key
.EsiSecurity.auth(code)
Get the tokens from SSO using the given code, and return the json response containing the tokens.
Parameters:
EsiSecurity.refresh(scope_list=None)
Use the given refresh token (using update_token
or auth
) to get a new access_token.
Parameters:
None
EsiSecurity.revoke()
Use the current tokens to make a request CCP side to revoke these tokens.
EsiSecurity.is_token_expired(offset=0)
Check if the stored access_token is expired, with the offset offset
.
Parameters:
EsiSecurity.update_token(response_json, **kwargs)
Update the security object with the given tokens.
Parameters:
{'access_token':'token', 'refresh_token':'token', 'expires_in': seconds
}EsiSecurity.get_auth_uri(state, scopes=None, implicit=False)
Generate the SSO auth URL, using the given parameters and EsiSecurity
attributes. If no secret_key
is provided but code_verifier
, the function will automatically use the PCKE flow.
Parameters: All parameters are optional.