from django.contrib.auth.decorators import login_required
from django.http import HttpResponseForbidden, HttpResponseNotAllowed, HttpResponseRedirect, JsonResponse
+from django.urls import reverse
from django.utils.text import slugify
from django.utils.timezone import now
from django.views.decorators.csrf import csrf_exempt
'username': slugify(str(access_token.user)),
}
return JsonResponse(user_info)
+
+
+def well_known_openid_configuration(request):
+ data = {
+ 'issuer': request.build_absolute_uri('/'),
+ 'authorization_endpoint': request.build_absolute_uri(reverse('oauth-authorize')),
+ 'token_endpoint': request.build_absolute_uri(reverse('oauth-token')),
+ 'userinfo_endpoint': request.build_absolute_uri(reverse('oauth-user-info')),
+ 'token_endpoint_auth_methods_supported': ['client_secret_post'],
+ }
+ return JsonResponse(data)
from .aa.urls import urlpatterns as aa_urlpatterns
from .forms import AuthenticationForm
from .oauth.urls import urlpatterns as oauth_urlpatterns
+from .oauth.views import well_known_openid_configuration
from .poll import views as poll_views
from .regie.urls import urlpatterns as regie_urlpatterns
from .service_messages.urls import urlpatterns as service_messages_urlpatterns
url(r'^wiki/', include(wiki_urlpatterns)),
url(r'^regie/', include(regie_urlpatterns)),
url(r'^oauth/', include(oauth_urlpatterns)),
+ url(r'^\.well-known/openid-configuration$', well_known_openid_configuration),
url(r'^messages/', include(service_messages_urlpatterns)),
url(r'^admin/', admin.site.urls),
]