3 from openid
.consumer
.consumer
import Consumer
4 from openid
.extensions
.sreg
import SRegRequest
, SRegResponse
5 from openid
.store
.filestore
import FileOpenIDStore
6 from openid
.yadis
.discover
import DiscoveryFailure
7 from sqlalchemy
.orm
.exc
import NoResultFound
9 from pylons
import request
, response
, session
, tmpl_context
as c
, url
10 from pylons
.controllers
.util
import abort
, redirect
, redirect_to
11 from routes
import url_for
, request_config
13 from floof
.lib
.base
import BaseController
, render
14 import floof
.lib
.helpers
as h
15 from floof
.model
.users
import IdentityURL
, User
17 log
= logging
.getLogger(__name__
)
19 class AccountController(BaseController
):
21 openid_store
= FileOpenIDStore('/var/tmp')
24 c
.bogus_identity_url
= request
.params
.get('bogus_identity_url', None)
25 return render('/account/login.mako')
27 def login_begin(self
):
28 """Step one of logging in with OpenID; we redirect to the provider"""
30 identity_url
= request
.params
['identity_url']
31 cons
= Consumer(session
=session
, store
=self
.openid_store
)
33 auth_request
= cons
.begin(identity_url
)
34 except DiscoveryFailure
:
35 redirect_to(controller
='account', action
='login',
36 bogus_identity_url
=identity_url
)
38 sreg_req
= SRegRequest(optional
=['nickname', 'email', 'dob', 'gender',
39 'country', 'language', 'timezone'])
40 auth_request
.addExtension(sreg_req
)
42 host
= request
.headers
['host']
43 protocol
= request_config().protocol
44 return_url
= url_for(host
=host
, controller
='account', action
='login_finish')
45 new_url
= auth_request
.redirectURL(return_to
=return_url
,
46 realm
=protocol
+ '://' + host
)
49 def login_finish(self
):
50 """Step two of logging in; the OpenID provider redirects back here."""
52 cons
= Consumer(session
=session
, store
=self
.openid_store
)
53 host
= request
.headers
['host']
54 return_url
= url_for(host
=host
, controller
='account', action
='login_finish')
55 res
= cons
.complete(request
.params
, return_url
)
57 if res
.status
!= 'success':
58 return 'Error! %s' % res
.message
61 # Grab an existing user record, if one exists
62 q
= User
.query
.filter(User
.identity_urls
.any(url
=res
.identity_url
))
65 # Unrecognized URL. Redirect to a registration page to ask for a
67 session
['register:identity_url'] = res
.identity_url
69 # Try to pull a name out of the SReg response
70 sreg_res
= SRegResponse
.fromSuccessResponse(res
)
71 if sreg_res
and 'nickname' in sreg_res
:
72 session
['register:nickname'] = sreg_res
['nickname']
75 redirect(url('register'))
77 # Remember who's logged in, and we're good to go
78 session
['user_id'] = user
.id
81 # XXX send me where I came from
87 if 'user_id' in session
:
88 del session
['user_id']
92 # XXX send me where I came from
96 """Logging in with an unrecognized identity URL redirects here."""
98 c
.identity_url
= session
['register:identity_url']
99 c
.nickname
= session
.get('register:nickname', None)
100 # XXX hey, uh. warn if this name is taken already.
102 return render('/account/register.mako')
104 def register_finish(self
):
105 """Complete a new-user registration. Create the user and log in."""
107 identity_url
= session
['register:identity_url']
108 username
= request
.params
.get('username', None)
111 h
.flash(u
'Please enter a username.')
112 return self
.register()
114 if User
.query
.filter_by(name
=username
).count():
115 h
.flash(u
'This username is already taken.')
116 return self
.register()
118 if not User
.is_valid_name(username
):
119 h
.flash(u
'This username is not valid.')
120 return self
.register()
123 user
= User(name
=username
, display_name
=username
)
124 user
.identity_urls
.append(IdentityURL(url
=identity_url
))
125 elixir
.session
.commit()
128 session
['user_id'] = user
.id
130 h
.flash(u
'You are now logged in.')
132 # XXX send me where I came from