Commit dad198ba authored by Sofia Papagiannaki's avatar Sofia Papagiannaki
Browse files

astakos: Introduce api call for validating a temporary oa2 token

parent fb7b3c0a
......@@ -36,6 +36,8 @@ from snf_django.lib.api import api_endpoint_not_found
urlpatterns = patterns(
url(r'^v2.0/tokens/(?P<token_id>.+?)?$', 'validate_token',
url(r'^v2.0/tokens/?$', 'authenticate', name='tokens_authenticate'),
url(r'^.*', api_endpoint_not_found),
......@@ -40,6 +40,7 @@ from django.core.cache import cache
from import settings
from import Service, AstakosUser
from astakos.oa2.backends.djangobackend import DjangoBackend
from .util import json_response, xml_response, validate_user,\
......@@ -137,3 +138,35 @@ def authenticate(request):
return xml_response({'d': d}, 'api/access.xml')
return json_response(d)
@api_method(http_method="GET", token_required=False, user_required=False,
def validate_token(request, token_id):
oa2_backend = DjangoBackend()
token = oa2_backend.consume_token(token_id)
except Exception, e:
raise faults.ItemNotFound(e.message)
belongsTo = request.GET.get('belongsTo')
if belongsTo is not None:
if not belongsTo.startswith(token.scope):
raise faults.ItemNotFound(
"The specified tenant is outside the token's scope")
d = defaultdict(dict)
d["access"]["token"] = {"id": token.code,
"expires": token.expires_at,
"tenant": {"id": token.user.uuid,
"name": token.user.realname}}
d["access"]["user"] = {"id": token.user.uuid,
'name': token.user.realname,
"roles": list(token.user.groups.values("id",
"roles_links": []}
if request.serialization == 'xml':
return xml_response({'d': d}, 'api/access.xml')
return json_response(d)
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment