def prepare_authentication_request(self, request, redirect_to): if not redirect_to.startswith('http://') or redirect_to.startswith( 'https://'): redirect_to = get_url_host(request) + redirect_to user_url = self.get_user_url(request) if xri.identifierScheme(user_url) == 'XRI' and getattr( settings, 'OPENID_DISALLOW_INAMES', False): raise InvalidAuthentication('i-names are not supported') consumer = Consumer(request.session, OsqaOpenIDStore()) try: auth_request = consumer.begin(user_url) except DiscoveryFailure: raise InvalidAuthentication( _('Sorry, but your input is not a valid OpenId')) sreg = getattr(self, 'sreg_attributes', False) if sreg: s = SRegRequest() for k, attr_dic in sreg.items(): if k == "policy_url": s.policy_url = attr_dic continue for attr_name in attr_dic.keys(): s.requestField(field_name=attr_name, required=(k == "required")) auth_request.addExtension(s) ax_schema = getattr(self, 'dataype2ax_schema', False) if ax_schema and request.session.get('force_email_request', True): axr = AXFetchRequest() for data_type, schema in ax_schema.items(): if isinstance(schema, tuple): axr.add(AttrInfo(schema[0], required=True, alias=schema[1])) else: axr.add(AttrInfo(schema, required=True, alias=data_type)) auth_request.addExtension(axr) trust_root = getattr(settings, 'OPENID_TRUST_ROOT', get_url_host(request) + '/') return auth_request.redirectURL(trust_root, redirect_to)
def prepare_authentication_request(self, request, redirect_to): if not redirect_to.startswith('http://') or redirect_to.startswith( 'https://'): redirect_to = get_url_host(request) + redirect_to user_url = self.get_user_url(request) if xri.identifierScheme(user_url) == 'XRI' and getattr( settings, 'OPENID_DISALLOW_INAMES', False): raise InvalidAuthentication('i-names are not supported') consumer = Consumer(request.session, OsqaOpenIDStore()) try: auth_request = consumer.begin(user_url) except DiscoveryFailure: raise InvalidAuthentication( _('Sorry, but your input is not a valid OpenId')) #sreg = getattr(settings, 'OPENID_SREG', False) #if sreg: # s = SRegRequest() # for sarg in sreg: # if sarg.lower().lstrip() == "policy_url": # s.policy_url = sreg[sarg] # else: # for v in sreg[sarg].split(','): # s.requestField(field_name=v.lower().lstrip(), required=(sarg.lower().lstrip() == "required")) # auth_request.addExtension(s) #auth_request.addExtension(SRegRequest(required=['email'])) if request.session.get('force_email_request', True): axr = AXFetchRequest() for data_type, schema in self.dataype2ax_schema.items(): if isinstance(schema, tuple): axr.add(AttrInfo(schema[0], 1, True, schema[1])) else: axr.add(AttrInfo(schema, 1, True, data_type)) auth_request.addExtension(axr) trust_root = getattr(settings, 'OPENID_TRUST_ROOT', get_url_host(request) + '/') return auth_request.redirectURL(trust_root, redirect_to)
def process_authentication_request(self, request): consumer = Consumer(request.session, OsqaOpenIDStore()) query_dict = dict([(k.encode('utf8'), v.encode('utf8')) for k, v in request.GET.items()]) #for i in query_dict.items(): #print "%s : %s" % i url = get_url_host(request) + request.path openid_response = consumer.complete(query_dict, url) if openid_response.status == SUCCESS: if request.session.get('force_email_request', True): try: ax = AXFetchResponse.fromSuccessResponse(openid_response) axargs = ax.getExtensionArgs() ax_schema2data_type = dict([ (s, t) for t, s in self.dataype2ax_schema.items() ]) available_types = dict([(ax_schema2data_type[s], re.sub('^type\.', '', n)) for n, s in axargs.items() if s in ax_schema2data_type]) available_data = dict([(t, axargs["value.%s.1" % s]) for t, s in available_types.items() ]) request.session['auth_consumer_data'] = { 'email': available_data.get('email', None), } except Exception, e: pass #import sys, traceback #traceback.print_exc(file=sys.stdout) return request.GET['openid.identity']
def process_authentication_request(self, request): consumer = Consumer(request.session, OsqaOpenIDStore()) query_dict = dict([(k.encode('utf8'), v.encode('utf8')) for k, v in request.GET.items()]) #for i in query_dict.items(): # print "%s : %s" % i url = get_url_host(request) + request.path openid_response = consumer.complete(query_dict, url) if openid_response.status == SUCCESS: if request.session.get('force_email_request', True): try: ax = AXFetchResponse.fromSuccessResponse(openid_response) email = ax.getExtensionArgs()['value.ext0.1'] request.session['auth_email_request'] = email except Exception, e: pass return request.GET['openid.identity']
def process_authentication_request(self, request): consumer = Consumer(request.session, OsqaOpenIDStore()) query_dict = dict([(smart_unicode(k), smart_unicode(v)) for k, v in request.GET.items()]) #for i in query_dict.items(): #print "%s : %s" % i url = get_url_host(request) + request.path openid_response = consumer.complete(query_dict, url) if openid_response.status == SUCCESS: consumer_data = {} sreg_attrs = getattr(self, 'sreg_attributes', False) if sreg_attrs: sreg_response = SRegResponse.fromSuccessResponse( openid_response) if sreg_response: all_attrs = {} [ all_attrs.update(d) for k, d in sreg_attrs.items() if k != "policy_url" ] for attr_name, local_name in all_attrs.items(): if attr_name in sreg_response: consumer_data[local_name] = sreg_response[ attr_name] ax_schema = getattr(self, 'dataype2ax_schema', False) if ax_schema: ax = AXFetchResponse.fromSuccessResponse( openid_response, False) if ax: axargs = ax.getExtensionArgs() ax_schema2data_type = dict([(s, t) for t, s in ax_schema.items()]) available_types = dict([(ax_schema2data_type[s], re.sub('^type\.', '', n)) for n, s in axargs.items() if s in ax_schema2data_type]) for t, s in available_types.items(): if not t in consumer_data: if axargs.get("value.%s.1" % s, None): consumer_data[t] = axargs["value.%s.1" % s] request.session['auth_consumer_data'] = consumer_data return request.GET['openid.identity'] elif openid_response.status == CANCEL: raise InvalidAuthentication( _('The OpenId authentication request was canceled')) elif openid_response.status == FAILURE: raise InvalidAuthentication( _('The OpenId authentication failed: ') + openid_response.message) elif openid_response.status == SETUP_NEEDED: raise InvalidAuthentication(_('Setup needed')) else: raise InvalidAuthentication( _('The OpenId authentication failed with an unknown status: ') + openid_response.status)