def view_user(request): # TODO # Add in auth tokens (if exists) and access tokens (if exists) session = DBSession() matchdict = request.matchdict if (request.logged_in != int(matchdict["user_id"])): return HTTPForbidden(_("You are not allowed to view information about a user other than yourself.")) user = session.query(User).join(User.groups).join(Group.group_info).filter(User.id == matchdict["user_id"]).one() request_key_url = "" key = "" secret = "" token = "" token_secret = "" keySecret = ConsumerKeySecret.getByUserID(request.logged_in) if (keySecret): key = keySecret.consumer_key secret = keySecret.consumer_secret tokenData = Token.getTokenByConsumerID(keySecret.id) if (tokenData): token = tokenData.token token_secret = tokenData.token_secret else: request_key_url = route_url("api_request_key", request) return dict(username = user.username, homepage = user.homepage, title = _("Viewing ") + " " + user.username, key = key, secret = secret, token = token, token_secret = token_secret, request_key_url = request_key_url)
def api_nexus_message_nonce(request): session = DBSession() auth_header = {} if ('Authorization' in request.headers): auth_header = {'Authorization': request.headers['Authorization']} # make temp request to get our header parameters req = oauth2.Request.from_request( request.method, request.url, headers = auth_header, parameters = dict([(k,v) for k,v in request.params.iteritems()])) consumer = ConsumerKeySecret.getByConsumerKey(req.get("oauth_consumer_key")) if (consumer is False): return {"Error": "No record for the key and secret found."} token = Token.getByToken(req.get("oauth_token")) if (token is False): return {"Error": "No record for the token key and token secret found."} req = oauth2.Request.from_consumer_and_token(consumer, token = token, http_method = request.method, http_url = request.url, parameters = dict([(k, v) for k,v in req.iteritems()])) try: oauth_server.verify_request(req, consumer, token) except oauth2.Error, e: return {"Oauth error": str(e)}
def api_access_token(request): session = DBSession() if (not request.logged_in): request.session.flash(_("You must be logged in.")) return HTTPFound(location = route_url("home", request)) consumer = ConsumerKeySecret.getByUserID(request.logged_in) if (not consumer): return HTTPFound(location = route_url("api_request_key", request)) token = Token.getByConsumerID(consumer.id) if (not token): request.session.flash(_("Attempt to retrieve an access token that does not belong to you.")) return HTTPFound(location = route_url("home", request)) return dict(title = _("Your token and token secret"), token = token.token, token_secret = token.token_secret)
def api_do_authorize_token(request): session = DBSession() matchdict = request.matchdict appType = matchdict.get("appType", "") # First check that the logged in user is the holder of this token given_token = request.params.get("token") token = Token.getByToken(given_token) consumer = ConsumerKeySecret.getByConsumerID(token.consumer_key_secret.id) if (not consumer): request.session.flash(_("Unable to find consumer key in the database; this should never happen!")) return HTTPFound(location = route_url("home", request)) if (token): if (token.consumer_key_secret.user.id != request.logged_in): request.session.flash(_("Attempt to use an authorization token that does not belong to you.")) return HTTPFound(location = route_url("home", request)) else: request.session.flash(_("Malformed authorization token parameters.")) return HTTPFound(location = route_url("home", request)) # Generate a new token to replace this now non-useful authorization token randomData = hashlib.sha1(str(random.random())).hexdigest() key = generateRandomKey() secret = generateRandomKey() token.token = key token.token_secret = secret token.consumer_id = consumer.id token.timestamp = time.time() token.setAccessType() if (appType == "android"): token.callback_url = token.callback_url + "?oauth_token=%s&oauth_token_secret=%s" % (token.token, token.token_secret) session.add(token) return HTTPFound(location = token.callback_url)
def api_authorize_token(request): session = DBSession() matchdict = request.matchdict appType = matchdict.get("appType", "") # First check that the logged in user is the holder of this token token = Token.getByToken(request.params.get("oauth_token")) consumer = ConsumerKeySecret.getByConsumerKey(request.params.get("oauth_consumer_key")) if (token): if (token.consumer_key_secret.user.id != request.logged_in): request.session.flash(_("Attempt to use an authorization token that does not belong to you.")) return HTTPFound(location = route_url("home", request)) else: request.session.flash(_("Malformed authorization token parameters.")) return HTTPFound(location = route_url("home", request)) #fs = AuthorizeTokenFieldSet().bind(token, session = session, data = request.POST or None) return dict(title = _("Authorization application to post to Nexus"), token = token.token, token_secret = token.token_secret, callback_url = token.callback_url, appType = appType)
def api_request_token(request): session = DBSession() auth_header = {} matchdict = request.matchdict appType = matchdict.get("appType", False) if ('Authorization' in request.headers): auth_header = {'Authorization': request.headers['Authorization']} req = oauth2.Request.from_request( request.method, request.url, headers = auth_header, parameters = dict([(k,v) for k,v in request.params.iteritems()])) consumer = ConsumerKeySecret.getByConsumerKey(req.get("oauth_consumer_key")) #if (request.logged_in != consumer.id): # request.session.flash(_("You are trying to request a token using credentials that do not belong to you.")) # return HTTPForbidden(location = route_url("home", request)) try: oauth_server.verify_request(req, consumer, None) # Check that this user doesn't already have an access token consumerToken = Token.getByConsumerID(consumer.id) if consumerToken: if (consumerToken.token_type == consumerToken.ACCESS): return Response(simplejson.dumps({'result': route_url('api_access_token', request)})) elif (consumerToken.token_type == consumerToken.AUTHORIZATION): # TODO # Check that the token hasn't already expired token = oauth2.Token(consumerToken.token, consumerToken.token_secret) if (appType == "android"): return Response(token.to_string()) else: return Response(simplejson.dumps({'result': route_url('api_authorize_token', request, appType = appType) + '?' + token.to_string()})) nonce = ConsumerNonce.getByNonce(req.get("oauth_nonce")) if (nonce): return simplejson.dumps({"error": "Nonce is already registered for an authorization token; please generate another request token, or wait five minutes and try again."}) else: nonce = ConsumerNonce() nonce.consumer_id = consumer.id nonce.timestamp = req.get("oauth_timestamp") nonce.nonce = req.get("oauth_nonce") session.add(nonce) randomData = hashlib.sha1(str(random.random())).hexdigest() key = generateRandomKey() secret = generateRandomKey() token = oauth2.Token(key, secret) token.callback_confirmed = True tokenData = Token() tokenData.token = key tokenData.token_secret = secret tokenData.consumer_id = consumer.id tokenData.timestamp = time.time() tokenData.callback_url = req.get("oauth_callback") tokenData.setAuthorizationType() session.add(tokenData) if (appType == "android"): return Response(token.to_string()) elif (appType == "desktop"): result = {'result': route_url('api_authorize_token', request, appType = appType) + '?' + token.to_string()} return Response(simplejson.dumps(result)) except oauth2.Error, e: return Response(simplejson.dumps({"oauth2 error": str(e)}))