def access_token(request): oauth_request = get_oauth_request(request) if oauth_request is None: return INVALID_PARAMS_RESPONSE missing_params = require_params(oauth_request, ('oauth_token', 'oauth_verifier')) if missing_params is not None: return missing_params try: request_token = store.get_request_token(request, oauth_request, oauth_request['oauth_token']) except InvalidTokenError: return HttpResponseBadRequest('Invalid request token.') try: consumer = store.get_consumer(request, oauth_request, oauth_request['oauth_consumer_key']) except InvalidConsumerError: return HttpResponseBadRequest('Invalid consumer.') if not verify_oauth_request(request, oauth_request, consumer, request_token): return HttpResponseBadRequest('Could not verify OAuth request.') if oauth_request.get('oauth_verifier', None) != request_token.verifier: return HttpResponseBadRequest('Invalid OAuth verifier.') if not request_token.is_approved: return HttpResponseBadRequest('Request Token not approved by the user.') access_token = store.create_access_token(request, oauth_request, consumer, request_token) ret = urlencode({ 'oauth_token': access_token.key, 'oauth_token_secret': access_token.secret }) return HttpResponse(ret, content_type='application/x-www-form-urlencoded')
def access_token(request): oauth_request = get_oauth_request(request) if oauth_request is None: return INVALID_PARAMS_RESPONSE missing_params = require_params(oauth_request, ("oauth_token", "oauth_verifier")) if missing_params is not None: return missing_params try: request_token = store.get_request_token(request, oauth_request, oauth_request["oauth_token"]) except InvalidTokenError: return HttpResponseBadRequest("Invalid request token.") try: consumer = store.get_consumer(request, oauth_request, oauth_request["oauth_consumer_key"]) except InvalidConsumerError: return HttpResponseBadRequest("Invalid consumer.") if not verify_oauth_request(request, oauth_request, consumer, request_token): return HttpResponseBadRequest("Could not verify OAuth request.") if oauth_request.get("oauth_verifier", None) != request_token.verifier: return HttpResponseBadRequest("Invalid OAuth verifier.") if not request_token.is_approved: return HttpResponseBadRequest("Request Token not approved by the user.") access_token = store.create_access_token(request, oauth_request, consumer, request_token) ret = urlencode({"oauth_token": access_token.key, "oauth_token_secret": access_token.secret}) return HttpResponse(ret, content_type="application/x-www-form-urlencoded")
def access_token(request): oauth_request = get_oauth_request(request) missing_params = require_params(oauth_request, ('oauth_token', 'oauth_verifier')) if missing_params is not None: return missing_params try: request_token = store.get_request_token(request, oauth_request, oauth_request['oauth_token']) except InvalidTokenError: return HttpResponseBadRequest('Invalid request token.') try: consumer = store.get_consumer(request, oauth_request, oauth_request['oauth_consumer_key']) except InvalidConsumerError: return HttpResponseBadRequest('Invalid consumer.') if not verify_oauth_request(request, oauth_request, consumer, request_token): return HttpResponseBadRequest('Could not verify OAuth request.') if oauth_request.get('oauth_verifier', None) != request_token.verifier: return HttpResponseBadRequest('Invalid OAuth verifier.') if not request_token.is_approved: return HttpResponseBadRequest('Request Token not approved by the user.') access_token = store.create_access_token(request, oauth_request, consumer, request_token) ret = urlencode({ 'oauth_token': access_token.key, 'oauth_token_secret': access_token.secret }) return HttpResponse(ret, content_type='application/x-www-form-urlencoded')
return HttpResponseBadRequest( 'xAuth username or password is not valid') else: request.user = user # Handle Request Token try: #request_token = store.create_request_token(request, oauth_request, consumer, oauth_request.get('oauth_callback')) request_token = store.create_request_token(request, oauth_request, consumer, OUT_OF_BAND) request_token = store.authorize_request_token( request, oauth_request, request_token) except oauth.Error, err: return send_oauth_error(err) access_token = store.create_access_token(request, oauth_request, consumer, request_token) ret = urlencode({ 'oauth_token': access_token.key, 'oauth_token_secret': access_token.secret }) return HttpResponse(ret, content_type='application/x-www-form-urlencoded') # LRS CHANGE - ADDED OUR REAL VIEWS @login_required(login_url="/accounts/login") def authorize_client(request, token=None, callback=None, params=None, form=None):
def access_token(request): oauth_request = get_oauth_request(request) if oauth_request is None: return HttpResponseBadRequest('Invalid request parameters.') # Consumer try: consumer = store.get_consumer( request, oauth_request, oauth_request['oauth_consumer_key']) except InvalidConsumerError: return HttpResponseBadRequest('Invalid consumer.') is_xauth = is_xauth_request(oauth_request) if not is_xauth: # Check Parameters missing_params = require_params( oauth_request, ('oauth_token', 'oauth_verifier')) if missing_params is not None: return missing_params # Check Request Token try: request_token = store.get_request_token( request, oauth_request, oauth_request['oauth_token']) except InvalidTokenError: return HttpResponse('Invalid request token: %s' % oauth_request['oauth_token'], status=401) if not request_token.is_approved: return HttpResponse('Request Token not approved by the user.', status=401) # Verify Signature if not verify_oauth_request(request, oauth_request, consumer, request_token): return HttpResponseBadRequest('Could not verify OAuth request.') # Check Verifier if oauth_request.get('oauth_verifier', None) != request_token.verifier: return HttpResponseBadRequest('Invalid OAuth verifier.') else: # xAuth # Check Parameters missing_params = require_params( oauth_request, ('x_auth_username', 'x_auth_password', 'x_auth_mode')) if missing_params is not None: return missing_params # Check if Consumer allows xAuth if not consumer.xauth_allowed: return HttpResponseBadRequest('xAuth not allowed for this method') # Check Signature if not verify_oauth_request(request, oauth_request, consumer): return HttpResponseBadRequest('Could not verify xAuth request.') user = authenticate( x_auth_username=oauth_request.get_parameter('x_auth_username'), x_auth_password=oauth_request.get_parameter('x_auth_password'), x_auth_mode=oauth_request.get_parameter('x_auth_mode') ) if not user: return HttpResponseBadRequest('xAuth username or password is not valid') else: request.user = user # Handle Request Token try: # request_token = store.create_request_token(request, oauth_request, consumer, oauth_request.get('oauth_callback')) request_token = store.create_request_token( request, oauth_request, consumer, OUT_OF_BAND) request_token = store.authorize_request_token( request, oauth_request, request_token) except oauth.Error as err: return send_oauth_error('https' if request.is_secure() else 'http', get_current_site(request).domain, err) access_token = store.create_access_token( request, oauth_request, consumer, request_token) ret = urlencode({ 'oauth_token': access_token.key, 'oauth_token_secret': access_token.secret }) return HttpResponse(ret, content_type='application/x-www-form-urlencoded')
if not verify_oauth_request(request, oauth_request, consumer): return HttpResponseBadRequest('Could not verify xAuth request.') # Check Username/Password if is_xauth and not verify_xauth_request(request, oauth_request): return HttpResponseBadRequest('xAuth username or password is not valid') # Handle Request Token try: #request_token = store.create_request_token(request, oauth_request, consumer, oauth_request.get('oauth_callback')) request_token = store.create_request_token(request, oauth_request, consumer, OUT_OF_BAND) request_token = store.authorize_request_token(request, oauth_request, request_token) except oauth.Error, err: return send_oauth_error(err) access_token = store.create_access_token(request, oauth_request, consumer, request_token) ret = urlencode({ 'oauth_token': access_token.key, 'oauth_token_secret': access_token.secret }) return HttpResponse(ret, content_type='application/x-www-form-urlencoded') @oauth_required def protected_resource_example(request): """ Test view for accessing a Protected Resource. """ return HttpResponse('Protected Resource access!') @login_required
def access_token(request): oauth_request = get_oauth_request(request) if oauth_request is None: return HttpResponseBadRequest("Invalid request parameters.") # Consumer try: consumer = store.get_consumer(request, oauth_request, oauth_request["oauth_consumer_key"]) except InvalidConsumerError: return HttpResponseBadRequest("Invalid consumer.") is_xauth = is_xauth_request(oauth_request) if not is_xauth: # Check Parameters missing_params = require_params(oauth_request, ("oauth_token", "oauth_verifier")) if missing_params is not None: return missing_params # Check Request Token try: request_token = store.get_request_token(request, oauth_request, oauth_request["oauth_token"]) except InvalidTokenError: return HttpResponse("Invalid request token: %s" % oauth_request["oauth_token"], status=401) if not request_token.is_approved: return HttpResponse("Request Token not approved by the user.", status=401) # Verify Signature if not verify_oauth_request(request, oauth_request, consumer, request_token): return HttpResponseBadRequest("Could not verify OAuth request.") # Check Verifier if oauth_request.get("oauth_verifier", None) != request_token.verifier: return HttpResponseBadRequest("Invalid OAuth verifier.") else: # xAuth # Check Parameters missing_params = require_params(oauth_request, ("x_auth_username", "x_auth_password", "x_auth_mode")) if missing_params is not None: return missing_params # Check if Consumer allows xAuth if not consumer.xauth_allowed: return HttpResponseBadRequest("xAuth not allowed for this method") # Check Signature if not verify_oauth_request(request, oauth_request, consumer): return HttpResponseBadRequest("Could not verify xAuth request.") user = authenticate( x_auth_username=oauth_request.get_parameter("x_auth_username"), x_auth_password=oauth_request.get_parameter("x_auth_password"), x_auth_mode=oauth_request.get_parameter("x_auth_mode"), ) if not user: return HttpResponseBadRequest("xAuth username or password is not valid") else: request.user = user # Handle Request Token try: # request_token = store.create_request_token(request, oauth_request, consumer, oauth_request.get('oauth_callback')) request_token = store.create_request_token(request, oauth_request, consumer, OUT_OF_BAND) request_token = store.authorize_request_token(request, oauth_request, request_token) except oauth.Error as err: return send_oauth_error("https" if request.is_secure() else "http", get_current_site(request).domain, err) access_token = store.create_access_token(request, oauth_request, consumer, request_token) ret = urlencode({"oauth_token": access_token.key, "oauth_token_secret": access_token.secret}) return HttpResponse(ret, content_type="application/x-www-form-urlencoded")