Class: OmniAuth::Strategies::Oauthio
- Inherits:
-
OAuth2
- Object
- OAuth2
- OmniAuth::Strategies::Oauthio
- Includes:
- OmniAuth::Strategy
- Defined in:
- lib/omniauth/strategies/oauthio.rb
Instance Method Summary collapse
- #auth_hash ⇒ Object
- #authorize_params ⇒ Object
- #call(env) ⇒ Object
- #callback_path ⇒ Object
- #callback_phase ⇒ Object
- #callback_url_with_state(state) ⇒ Object
- #current_path ⇒ Object
- #request_path ⇒ Object
- #request_phase ⇒ Object
- #sub_provider ⇒ Object
Instance Method Details
#auth_hash ⇒ Object
111 112 113 114 115 116 117 118 119 120 121 122 123 |
# File 'lib/omniauth/strategies/oauthio.rb', line 111 def auth_hash provider_info = ::Oauthio::Providers::Oauthio.new(access_token, client.secret, ) provider = access_token.provider hash = AuthHash.new(:provider => provider, :uid => provider_info.uid) hash.info = provider_info.info unless provider_info.skip_info? if provider_info.credentials hash.credentials = provider_info.credentials end hash.extra = provider_info.extra if provider_info.extra hash end |
#authorize_params ⇒ Object
70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 |
# File 'lib/omniauth/strategies/oauthio.rb', line 70 def .[:state] = SecureRandom.hex(24) params = ..merge(('authorize')) if .jwt_secret.nil? if OmniAuth.config.test_mode @env ||= {} @env['rack.session'] ||= {} end session['omniauth.state'] = params[:state] else jwt = JWT.encode({state: params[:state]}, .jwt_secret) params[:state] = jwt end params end |
#call(env) ⇒ Object
13 14 15 16 17 18 19 20 21 |
# File 'lib/omniauth/strategies/oauthio.rb', line 13 def call(env) unless .jwt_secret.nil? # This is kinda hacky but omniauth expects the rack.session to be set. Since we are using jwt we will not # be using a session. We will just set it to an empty hash to avoid the error. env['rack.session'] = {} end dup.call!(env) end |
#callback_path ⇒ Object
59 60 61 62 63 64 65 66 67 68 |
# File 'lib/omniauth/strategies/oauthio.rb', line 59 def callback_path callback_option = [:callback_path] path = callback_option if callback_option.is_a?(String) if callback_option.respond_to?(:call) && callback_option.call(env) path ||= current_path end path ||= custom_path(:request_path) path ||= "#{path_prefix}/#{name}/#{sub_provider}/callback" path end |
#callback_phase ⇒ Object
125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 |
# File 'lib/omniauth/strategies/oauthio.rb', line 125 def callback_phase unless request.params['code'] # TODO: Is there an option we can pass to OAuth.io to prevent it from # putting the code in the hash part of the url? Currently we have to # parse the hash to get the code and then do an additional redirect. html = <<-END.gsub(/^\s{10}/, '') <!DOCTYPE html> <html> <head> <script> (function() { "use strict"; var hash = document.location.hash; var data = JSON.parse(decodeURIComponent(hash.split("=")[1])); var code = data.data.code; document.location.href = document.location.origin + document.location.pathname + document.location.search + "&code=" + code; })(); </script> </head> <body></body> </html> END return Rack::Response.new(html, 200).finish end = request.params['error_reason'] || request.params['error'] if error_description = request.params['error_description'] || request.params['error_reason'] error = CallbackError.new(request.params['error'], error_description, request.params['error_uri']) fail!(, error) elsif !.provider_ignores_state && !verified_state? error = CallbackError.new(:csrf_detected, 'CSRF detected') fail!(:csrf_detected, error) else self.access_token = build_access_token self.access_token = access_token.refresh! if access_token.expired? env['omniauth.auth'] = auth_hash if .jwt_secret.nil? # Delete the omniauth.state after we have verified all requests session.delete('omniauth.state') end call_app! end rescue CallbackError => e fail!(:invalid_credentials, e) rescue ::MultiJson::DecodeError => e fail!(:invalid_response, e) rescue ::Timeout::Error, ::Errno::ETIMEDOUT => e fail!(:timeout, e) rescue ::SocketError => e fail!(:failed_to_connect, e) end |
#callback_url_with_state(state) ⇒ Object
104 105 106 107 108 109 |
# File 'lib/omniauth/strategies/oauthio.rb', line 104 def callback_url_with_state(state) uri = URI.parse(callback_url) new_query_ar = URI.decode_www_form(uri.query || '') << ['state', state] uri.query = URI.encode_www_form(new_query_ar) uri.to_s end |
#current_path ⇒ Object
36 37 38 39 40 41 |
# File 'lib/omniauth/strategies/oauthio.rb', line 36 def current_path # This might not be completely safe. I want to ensure that the # current_path does not have a format at the end so the .json should be # removed. super.sub(/(\.json)$/, '') end |
#request_path ⇒ Object
51 52 53 54 55 56 57 |
# File 'lib/omniauth/strategies/oauthio.rb', line 51 def request_path if (path=[:request_path]).is_a?(String) path else "#{path_prefix}/#{name}/#{sub_provider}" end end |
#request_phase ⇒ Object
86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 |
# File 'lib/omniauth/strategies/oauthio.rb', line 86 def request_phase params = provider = sub_provider opts = {:state => params.state}.to_json # We may want to skip redirecting the user if calling from a # single-page application that does not want to reload the page. if request.path_info =~ /\.json$/ return Rack::Response.new(opts, 200, 'content-type' => 'application/json').finish end defaults = {:redirect_uri => callback_url_with_state(params.state)} = defaults.merge({opts: opts}) redirect client.auth_code.(provider, ) end |
#sub_provider ⇒ Object
43 44 45 46 47 48 49 |
# File 'lib/omniauth/strategies/oauthio.rb', line 43 def sub_provider # e.g., /auth/oauthio/twitter after_base = request.path.split("#{path_prefix}/#{name}/").last slashes = after_base.split('/') str = slashes.length > 1 ? slashes.first : after_base str.split('.').first end |