3 from django.utils.html import escape
4 from django.http import get_host
6 from forum.authentication.base import AuthenticationConsumer, InvalidAuthentication
9 from openid.yadis import xri
10 from openid.consumer.consumer import Consumer, SUCCESS, CANCEL, FAILURE, SETUP_NEEDED
11 from openid.consumer.discover import DiscoveryFailure
12 from openid.extensions.sreg import SRegRequest, SRegResponse
13 from openid.extensions.ax import FetchRequest as AXFetchRequest, AttrInfo, FetchResponse as AXFetchResponse
14 from django.utils.translation import ugettext as _
16 from store import OsqaOpenIDStore
18 class OpenIdAbstractAuthConsumer(AuthenticationConsumer):
21 #'username': 'http://axschema.org/namePerson/friendly',
22 'email': 'http://axschema.org/contact/email',
23 #'web': 'http://axschema.org/contact/web/default',
24 #'firstname': 'http://axschema.org/namePerson/first',
25 #'lastname': 'http://axschema.org/namePerson/last',
26 #'birthdate': 'http://axschema.org/birthDate',
29 def get_user_url(self, request):
31 return request.POST['openid_identifier']
33 raise NotImplementedError()
35 def prepare_authentication_request(self, request, redirect_to):
36 if not redirect_to.startswith('http://') or redirect_to.startswith('https://'):
37 redirect_to = get_url_host(request) + redirect_to
39 user_url = self.get_user_url(request)
41 if xri.identifierScheme(user_url) == 'XRI' and getattr(
42 settings, 'OPENID_DISALLOW_INAMES', False
44 raise InvalidAuthentication('i-names are not supported')
46 consumer = Consumer(request.session, OsqaOpenIDStore())
49 auth_request = consumer.begin(user_url)
50 except DiscoveryFailure:
51 raise InvalidAuthentication(_('Sorry, but your input is not a valid OpenId'))
53 #sreg = getattr(settings, 'OPENID_SREG', False)
58 # if sarg.lower().lstrip() == "policy_url":
59 # s.policy_url = sreg[sarg]
61 # for v in sreg[sarg].split(','):
62 # s.requestField(field_name=v.lower().lstrip(), required=(sarg.lower().lstrip() == "required"))
63 # auth_request.addExtension(s)
65 #auth_request.addExtension(SRegRequest(required=['email']))
67 if request.session.get('force_email_request', True):
68 axr = AXFetchRequest()
69 for data_type, schema in self.dataype2ax_schema.items():
70 if isinstance(schema, tuple):
71 axr.add(AttrInfo(schema[0], 1, True, schema[1]))
73 axr.add(AttrInfo(schema, 1, True, data_type))
75 auth_request.addExtension(axr)
78 settings, 'OPENID_TRUST_ROOT', get_url_host(request) + '/'
81 return auth_request.redirectURL(trust_root, redirect_to)
83 def process_authentication_request(self, request):
84 consumer = Consumer(request.session, OsqaOpenIDStore())
87 (k.encode('utf8'), v.encode('utf8')) for k, v in request.GET.items()
90 #for i in query_dict.items():
93 url = get_url_host(request) + request.path
94 openid_response = consumer.complete(query_dict, url)
96 if openid_response.status == SUCCESS:
97 if request.session.get('force_email_request', True):
99 ax = AXFetchResponse.fromSuccessResponse(openid_response)
101 axargs = ax.getExtensionArgs()
103 ax_schema2data_type = dict([(s, t) for t, s in self.dataype2ax_schema.items()])
105 available_types = dict([
106 (ax_schema2data_type[s], re.sub('^type\.', '', n))
107 for n, s in axargs.items() if s in ax_schema2data_type
110 available_data = dict([
111 (t, axargs["value.%s.1" % s]) for t, s in available_types.items()
114 request.session['auth_consumer_data'] = {
115 'email': available_data.get('email', None),
120 #import sys, traceback
121 #traceback.print_exc(file=sys.stdout)
123 return request.GET['openid.identity']
124 elif openid_response.status == CANCEL:
125 raise InvalidAuthentication(_('The OpenId authentication request was canceled'))
126 elif openid_response.status == FAILURE:
127 raise InvalidAuthentication(_('The OpenId authentication failed: ') + openid_response.message)
128 elif openid_response.status == SETUP_NEEDED:
129 raise InvalidAuthentication(_('Setup needed'))
131 raise InvalidAuthentication(_('The OpenId authentication failed with an unknown status: ') + openid_response.status)
133 def get_user_data(self, key):
136 def get_url_host(request):
137 if request.is_secure():
141 host = escape(get_host(request))
142 return '%s://%s' % (protocol, host)
144 def get_full_url(request):
145 return get_url_host(request) + request.get_full_path()