summaryrefslogtreecommitdiff
path: root/oauthlib/oauth1/rfc5849/endpoints
diff options
context:
space:
mode:
authorKyle Valade <kylevalade@gmail.com>2013-07-18 17:00:13 -0700
committerKyle Valade <kylevalade@gmail.com>2013-07-18 17:00:13 -0700
commit967b6c425a7b9572753bf451e1e4b5fe535c2566 (patch)
tree502c18a684507706baf23cfc29c4d995fb5754eb /oauthlib/oauth1/rfc5849/endpoints
parent6fe70413ee6c87720ea6421d64683624f230795a (diff)
downloadoauthlib-967b6c425a7b9572753bf451e1e4b5fe535c2566.tar.gz
Update authorization.py - use the _create_request method and change request.oauth_token attribute to resource_owner_key
The Request() constructor doesn't give the request.oauth_token attribute that the create_authorization_response relies on. The _create_request() method doesn't either, but it gives something equivalent.
Diffstat (limited to 'oauthlib/oauth1/rfc5849/endpoints')
-rw-r--r--oauthlib/oauth1/rfc5849/endpoints/authorization.py16
1 files changed, 8 insertions, 8 deletions
diff --git a/oauthlib/oauth1/rfc5849/endpoints/authorization.py b/oauthlib/oauth1/rfc5849/endpoints/authorization.py
index 6957232..1cc0915 100644
--- a/oauthlib/oauth1/rfc5849/endpoints/authorization.py
+++ b/oauthlib/oauth1/rfc5849/endpoints/authorization.py
@@ -42,12 +42,12 @@ class AuthorizationEndpoint(BaseEndpoint):
:returns: The verifier as a dict.
"""
verifier = {
- 'oauth_token': request.oauth_token,
+ 'oauth_token': request.resource_owner_key,
'oauth_verifier': self.token_generator(),
}
verifier.update(credentials)
self.request_validator.save_verifier(
- request.oauth_token, verifier, request)
+ request.resource_owner_key, verifier, request)
return verifier
def create_authorization_response(self, uri, http_method='GET', body=None,
@@ -87,25 +87,25 @@ class AuthorizationEndpoint(BaseEndpoint):
>>> s
302
"""
- request = Request(uri, http_method=http_method, body=body,
+ request = self._create_request(uri, http_method=http_method, body=body,
headers=headers)
if not self.request_validator.verify_request_token(
- request.oauth_token, request):
+ request.resource_owner_key, request):
raise errors.InvalidClientError()
- if not request.oauth_token:
- raise NotImplementedError('request.oauth_token must be set after '
+ if not request.resource_owner_key:
+ raise NotImplementedError('request.resource_owner_key must be set after '
'request token verification.')
request.realms = realms
if (request.realms and not self.request_validator.verify_realms(
- request.oauth_token, request.realms, request)):
+ request.resource_owner_key, request.realms, request)):
raise errors.InvalidRequestError(
description=('User granted access to realms outside of '
'what the client may request.'))
redirect_uri = self.request_validator.get_redirect_uri(
- request.oauth_token, request)
+ request.resource_owner_key, request)
verifier = self.create_verifier(request, credentials or {})
uri = add_params_to_uri(redirect_uri, verifier.items())
return uri, {}, None, 302