def authenticate_credentials(access_token): try: token = oauth2_provider.models.AccessToken.objects.select_related('user') token = token.get(token=access_token, expires__gt=provider_now()) except oauth2_provider.models.AccessToken.DoesNotExist: log.warn('Not exist!!!') raise exceptions.AuthenticationFailed(_('Invalid token.')) if not token.user.is_active: raise exceptions.AuthenticationFailed(_('User inactive or deleted.')) return (token.user, token)
def authenticate_credentials(self, request, access_token): """ Authenticate the request, given the access token. Override base class implementation to discard failure if user is inactive. """ try: token = oauth2_provider.oauth2.models.AccessToken.objects.select_related('user') # provider_now switches to timezone aware datetime when # the oauth2_provider version supports to it. token = token.get(token=access_token, expires__gt=provider_now()) except oauth2_provider.oauth2.models.AccessToken.DoesNotExist: raise AuthenticationFailed('Invalid token') return token.user, token
def authenticate_credentials(self, request, access_token): """ Authenticate the request, given the access token. """ try: try: if hasattr(request, 'oauth_middleware_token'): return (request.oauth_middleware_token.user, request.oauth_middleware_token) except Exception, e: log.error(e) token = oauth2_provider.models.AccessToken.objects.select_related('user') # provider_now switches to timezone aware datetime when # the oauth2_provider version supports to it. token = token.get(token=access_token, expires__gt=provider_now())
def authenticate_credentials(self, request, access_token): """ Authenticate the request, given the access token. Override base class implementation to discard failure if user is inactive. """ try: token = oauth2_provider.oauth2.models.AccessToken.objects.select_related( 'user') # provider_now switches to timezone aware datetime when # the oauth2_provider version supports to it. token = token.get(token=access_token, expires__gt=provider_now()) except oauth2_provider.oauth2.models.AccessToken.DoesNotExist: raise AuthenticationFailed('Invalid token') return token.user, token
def authenticate_credentials(self, request, access_token): """ Authenticate the request, given the access token. """ try: token = oauth2_provider.oauth2.models.AccessToken.objects.select_related('user') # provider_now switches to timezone aware datetime when # the oauth2_provider version supports to it. token = token.get(token=access_token, expires__gt=provider_now()) except oauth2_provider.oauth2.models.AccessToken.DoesNotExist: raise exceptions.AuthenticationFailed('Invalid token') user = token.user if not user.is_active: msg = 'User inactive or deleted: %s' % user.username raise exceptions.AuthenticationFailed(msg) return (user, token)
def authenticate_credentials(self, request, access_token): """ Authenticate the request, given the access token. """ try: token = oauth2_provider.oauth2.models.AccessToken.objects.select_related( 'user') # provider_now switches to timezone aware datetime when # the oauth2_provider version supports to it. token = token.get(token=access_token, expires__gt=provider_now()) except oauth2_provider.oauth2.models.AccessToken.DoesNotExist: raise exceptions.AuthenticationFailed('Invalid token') user = token.user #if not user.is_active: if user.users_delete: #msg = 'User inactive or deleted: %s' % user.username msg = 'User inactive or deleted: %s' % user.users_name raise exceptions.AuthenticationFailed(msg) return (user, token)