TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Twitter from the command line in Python using OAuth - step-by-step howto

55 pointsby jmillerincalmost 15 years ago

5 comments

pilifalmost 15 years ago
This just goes to show how badly suited OAuth is for desktop applications: Basically, what ever you do, you will need to direct your users over to a browser (or embed one) and they'll have to deal with strange "passcodes" or whatever you want to call it.<p>This is much more difficult for a user to understand ("why can I give twitter my password, but in this client here, I have to do this strange dance? What am I supposed to do now?").<p>In most of the client apps, the issue of having to enter your password is a non-issue as there's no need for a third-party to know it.<p>In the case of desktop apps, IMHO, OAuth does nothing but makes the lives of both client developers and users harder.
评论 #1394737 未加载
ck2almost 15 years ago
After setting up Twitter which uses OAuth 1.0, try Facebook's OAuth 2.0 - it's amazingly easy in comparison since it doesn't use secrets, simply relying on HTTPS's SSL encryption instead.<p><a href="http://developers.facebook.com/docs/authentication/" rel="nofollow">http://developers.facebook.com/docs/authentication/</a><p>Soooo much easier.
paulgbalmost 15 years ago
Thanks Jeff, this is exactly what I've been looking for. I found out about twitter killing basic auth today, but all the documentation seems to assume you have a web app. I just run a simple RSS scraper to twitter feed script on a cron job, so this is helpful.
评论 #1394285 未加载
jotalmost 15 years ago
Twitter have released a nice curl-like tool for using OAuth on the command line, it's called twurl:<p><a href="http://github.com/marcel/twurl" rel="nofollow">http://github.com/marcel/twurl</a>
cmelbyealmost 15 years ago
I wonder how difficult it would be to implement xAuth. Presumably, the configuration for username/password could be left intact because xAuth is performed by giving the username/password.