diff options
author | Kyle Valade <kylevalade@gmail.com> | 2013-07-18 17:00:13 -0700 |
---|---|---|
committer | Kyle Valade <kylevalade@gmail.com> | 2013-07-18 17:00:13 -0700 |
commit | 967b6c425a7b9572753bf451e1e4b5fe535c2566 (patch) | |
tree | 502c18a684507706baf23cfc29c4d995fb5754eb /oauthlib/oauth1/rfc5849/endpoints/authorization.py | |
parent | 6fe70413ee6c87720ea6421d64683624f230795a (diff) | |
download | oauthlib-967b6c425a7b9572753bf451e1e4b5fe535c2566.tar.gz |
Update authorization.py - use the _create_request method and change request.oauth_token attribute to resource_owner_key
The Request() constructor doesn't give the request.oauth_token attribute that the create_authorization_response relies on. The _create_request() method doesn't either, but it gives something equivalent.
Diffstat (limited to 'oauthlib/oauth1/rfc5849/endpoints/authorization.py')
-rw-r--r-- | oauthlib/oauth1/rfc5849/endpoints/authorization.py | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/oauthlib/oauth1/rfc5849/endpoints/authorization.py b/oauthlib/oauth1/rfc5849/endpoints/authorization.py index 6957232..1cc0915 100644 --- a/oauthlib/oauth1/rfc5849/endpoints/authorization.py +++ b/oauthlib/oauth1/rfc5849/endpoints/authorization.py @@ -42,12 +42,12 @@ class AuthorizationEndpoint(BaseEndpoint): :returns: The verifier as a dict. """ verifier = { - 'oauth_token': request.oauth_token, + 'oauth_token': request.resource_owner_key, 'oauth_verifier': self.token_generator(), } verifier.update(credentials) self.request_validator.save_verifier( - request.oauth_token, verifier, request) + request.resource_owner_key, verifier, request) return verifier def create_authorization_response(self, uri, http_method='GET', body=None, @@ -87,25 +87,25 @@ class AuthorizationEndpoint(BaseEndpoint): >>> s 302 """ - request = Request(uri, http_method=http_method, body=body, + request = self._create_request(uri, http_method=http_method, body=body, headers=headers) if not self.request_validator.verify_request_token( - request.oauth_token, request): + request.resource_owner_key, request): raise errors.InvalidClientError() - if not request.oauth_token: - raise NotImplementedError('request.oauth_token must be set after ' + if not request.resource_owner_key: + raise NotImplementedError('request.resource_owner_key must be set after ' 'request token verification.') request.realms = realms if (request.realms and not self.request_validator.verify_realms( - request.oauth_token, request.realms, request)): + request.resource_owner_key, request.realms, request)): raise errors.InvalidRequestError( description=('User granted access to realms outside of ' 'what the client may request.')) redirect_uri = self.request_validator.get_redirect_uri( - request.oauth_token, request) + request.resource_owner_key, request) verifier = self.create_verifier(request, credentials or {}) uri = add_params_to_uri(redirect_uri, verifier.items()) return uri, {}, None, 302 |