doorkeeper 5.2.6 → 5.3.3
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of doorkeeper might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/Appraisals +2 -2
- data/CHANGELOG.md +24 -5
- data/Gemfile +2 -2
- data/app/controllers/doorkeeper/application_controller.rb +2 -2
- data/app/controllers/doorkeeper/application_metal_controller.rb +2 -2
- data/app/controllers/doorkeeper/authorizations_controller.rb +2 -2
- data/app/controllers/doorkeeper/authorized_applications_controller.rb +2 -2
- data/gemfiles/rails_5_0.gemfile +2 -2
- data/gemfiles/rails_5_1.gemfile +2 -2
- data/gemfiles/rails_5_2.gemfile +2 -2
- data/gemfiles/rails_6_0.gemfile +2 -2
- data/gemfiles/rails_master.gemfile +2 -2
- data/lib/doorkeeper/config.rb +71 -38
- data/lib/doorkeeper/grape/helpers.rb +1 -1
- data/lib/doorkeeper/helpers/controller.rb +10 -8
- data/lib/doorkeeper/models/access_grant_mixin.rb +7 -6
- data/lib/doorkeeper/models/access_token_mixin.rb +54 -16
- data/lib/doorkeeper/models/application_mixin.rb +3 -3
- data/lib/doorkeeper/models/concerns/ownership.rb +1 -1
- data/lib/doorkeeper/models/concerns/reusable.rb +1 -1
- data/lib/doorkeeper/models/concerns/revocable.rb +0 -27
- data/lib/doorkeeper/oauth/authorization/code.rb +4 -4
- data/lib/doorkeeper/oauth/authorization/token.rb +9 -6
- data/lib/doorkeeper/oauth/authorization_code_request.rb +13 -6
- data/lib/doorkeeper/oauth/base_request.rb +8 -4
- data/lib/doorkeeper/oauth/client.rb +7 -8
- data/lib/doorkeeper/oauth/client_credentials/creator.rb +16 -9
- data/lib/doorkeeper/oauth/client_credentials/issuer.rb +7 -7
- data/lib/doorkeeper/oauth/client_credentials/{validation.rb → validator.rb} +4 -4
- data/lib/doorkeeper/oauth/client_credentials_request.rb +1 -1
- data/lib/doorkeeper/oauth/code_response.rb +2 -2
- data/lib/doorkeeper/oauth/error.rb +1 -1
- data/lib/doorkeeper/oauth/error_response.rb +5 -5
- data/lib/doorkeeper/oauth/helpers/scope_checker.rb +7 -5
- data/lib/doorkeeper/oauth/helpers/unique_token.rb +8 -5
- data/lib/doorkeeper/oauth/helpers/uri_checker.rb +1 -1
- data/lib/doorkeeper/oauth/invalid_request_response.rb +3 -3
- data/lib/doorkeeper/oauth/invalid_token_response.rb +5 -2
- data/lib/doorkeeper/oauth/password_access_token_request.rb +3 -3
- data/lib/doorkeeper/oauth/pre_authorization.rb +7 -5
- data/lib/doorkeeper/oauth/refresh_token_request.rb +5 -5
- data/lib/doorkeeper/oauth/token.rb +2 -2
- data/lib/doorkeeper/oauth/token_introspection.rb +6 -6
- data/lib/doorkeeper/orm/active_record/access_grant.rb +4 -43
- data/lib/doorkeeper/orm/active_record/access_token.rb +4 -35
- data/lib/doorkeeper/orm/active_record/application.rb +3 -155
- data/lib/doorkeeper/orm/active_record/mixins/access_grant.rb +53 -0
- data/lib/doorkeeper/orm/active_record/mixins/access_token.rb +47 -0
- data/lib/doorkeeper/orm/active_record/mixins/application.rb +187 -0
- data/lib/doorkeeper/orm/active_record/redirect_uri_validator.rb +3 -3
- data/lib/doorkeeper/orm/active_record.rb +3 -3
- data/lib/doorkeeper/rails/helpers.rb +4 -4
- data/lib/doorkeeper/rails/routes.rb +5 -7
- data/lib/doorkeeper/rake/db.rake +3 -3
- data/lib/doorkeeper/request/authorization_code.rb +3 -3
- data/lib/doorkeeper/request/client_credentials.rb +2 -2
- data/lib/doorkeeper/request/password.rb +2 -2
- data/lib/doorkeeper/request/refresh_token.rb +3 -3
- data/lib/doorkeeper/request.rb +1 -1
- data/lib/doorkeeper/server.rb +1 -1
- data/lib/doorkeeper/stale_records_cleaner.rb +1 -1
- data/lib/doorkeeper/version.rb +2 -2
- data/lib/doorkeeper.rb +2 -3
- data/lib/generators/doorkeeper/application_owner_generator.rb +1 -1
- data/lib/generators/doorkeeper/confidential_applications_generator.rb +1 -1
- data/lib/generators/doorkeeper/migration_generator.rb +1 -1
- data/lib/generators/doorkeeper/pkce_generator.rb +1 -1
- data/lib/generators/doorkeeper/previous_refresh_token_generator.rb +2 -2
- data/lib/generators/doorkeeper/templates/initializer.rb +39 -0
- data/spec/controllers/application_metal_controller_spec.rb +1 -1
- data/spec/controllers/applications_controller_spec.rb +3 -2
- data/spec/controllers/authorizations_controller_spec.rb +18 -18
- data/spec/controllers/protected_resources_controller_spec.rb +25 -17
- data/spec/controllers/token_info_controller_spec.rb +1 -1
- data/spec/controllers/tokens_controller_spec.rb +1 -1
- data/spec/dummy/db/migrate/20151223192035_create_doorkeeper_tables.rb +3 -3
- data/spec/dummy/db/migrate/20160320211015_add_previous_refresh_token_to_access_tokens.rb +1 -1
- data/spec/dummy/db/migrate/20180210183654_add_confidential_to_applications.rb +1 -1
- data/spec/generators/install_generator_spec.rb +1 -1
- data/spec/generators/previous_refresh_token_generator_spec.rb +2 -2
- data/spec/helpers/doorkeeper/dashboard_helper_spec.rb +1 -1
- data/spec/lib/config_spec.rb +62 -7
- data/spec/lib/doorkeeper_spec.rb +1 -1
- data/spec/lib/models/revocable_spec.rb +3 -3
- data/spec/lib/oauth/authorization_code_request_spec.rb +127 -125
- data/spec/lib/oauth/base_request_spec.rb +160 -158
- data/spec/lib/oauth/base_response_spec.rb +27 -29
- data/spec/lib/oauth/client/credentials_spec.rb +1 -1
- data/spec/lib/oauth/client_credentials/creator_spec.rb +42 -5
- data/spec/lib/oauth/client_credentials/issuer_spec.rb +12 -12
- data/spec/lib/oauth/client_credentials/validation_spec.rb +4 -4
- data/spec/lib/oauth/client_credentials_integration_spec.rb +16 -18
- data/spec/lib/oauth/client_credentials_request_spec.rb +78 -80
- data/spec/lib/oauth/client_spec.rb +26 -26
- data/spec/lib/oauth/code_request_spec.rb +34 -34
- data/spec/lib/oauth/code_response_spec.rb +21 -25
- data/spec/lib/oauth/error_response_spec.rb +42 -44
- data/spec/lib/oauth/error_spec.rb +12 -14
- data/spec/lib/oauth/forbidden_token_response_spec.rb +11 -13
- data/spec/lib/oauth/helpers/scope_checker_spec.rb +30 -18
- data/spec/lib/oauth/invalid_request_response_spec.rb +48 -50
- data/spec/lib/oauth/invalid_token_response_spec.rb +32 -34
- data/spec/lib/oauth/password_access_token_request_spec.rb +145 -147
- data/spec/lib/oauth/pre_authorization_spec.rb +159 -161
- data/spec/lib/oauth/refresh_token_request_spec.rb +138 -139
- data/spec/lib/oauth/scopes_spec.rb +104 -106
- data/spec/lib/oauth/token_request_spec.rb +115 -111
- data/spec/lib/oauth/token_response_spec.rb +71 -73
- data/spec/lib/oauth/token_spec.rb +121 -123
- data/spec/models/doorkeeper/access_grant_spec.rb +3 -5
- data/spec/models/doorkeeper/access_token_spec.rb +7 -7
- data/spec/models/doorkeeper/application_spec.rb +2 -2
- data/spec/requests/applications/applications_request_spec.rb +1 -1
- data/spec/requests/endpoints/authorization_spec.rb +5 -3
- data/spec/requests/flows/authorization_code_spec.rb +34 -22
- data/spec/requests/flows/client_credentials_spec.rb +1 -1
- data/spec/requests/flows/password_spec.rb +32 -12
- data/spec/requests/flows/refresh_token_spec.rb +19 -19
- data/spec/requests/flows/revoke_token_spec.rb +18 -12
- data/spec/spec_helper.rb +1 -4
- data/spec/support/shared/controllers_shared_context.rb +33 -23
- data/spec/validators/redirect_uri_validator_spec.rb +1 -1
- metadata +6 -5
- data/spec/support/http_method_shim.rb +0 -29
@@ -11,8 +11,8 @@ module Doorkeeper
|
|
11
11
|
state: request.try(:state),
|
12
12
|
redirect_uri: request.try(:redirect_uri),
|
13
13
|
missing_param: request.try(:missing_param),
|
14
|
-
reason: request.try(:invalid_request_reason)
|
15
|
-
)
|
14
|
+
reason: request.try(:invalid_request_reason),
|
15
|
+
),
|
16
16
|
)
|
17
17
|
end
|
18
18
|
|
@@ -31,7 +31,7 @@ module Doorkeeper
|
|
31
31
|
reason,
|
32
32
|
scope: %i[doorkeeper errors messages invalid_request],
|
33
33
|
default: :unknown,
|
34
|
-
value: @missing_param
|
34
|
+
value: @missing_param,
|
35
35
|
)
|
36
36
|
end
|
37
37
|
|
@@ -27,8 +27,11 @@ module Doorkeeper
|
|
27
27
|
end
|
28
28
|
|
29
29
|
def description
|
30
|
-
|
31
|
-
|
30
|
+
@description ||=
|
31
|
+
I18n.translate(
|
32
|
+
@reason,
|
33
|
+
scope: %i[doorkeeper errors messages invalid_token],
|
34
|
+
)
|
32
35
|
end
|
33
36
|
|
34
37
|
protected
|
@@ -37,12 +37,12 @@ module Doorkeeper
|
|
37
37
|
scope_str: scopes.to_s,
|
38
38
|
server_scopes: server.scopes,
|
39
39
|
app_scopes: client_scopes,
|
40
|
-
grant_type: grant_type
|
40
|
+
grant_type: grant_type,
|
41
41
|
)
|
42
42
|
end
|
43
43
|
|
44
44
|
def validate_resource_owner
|
45
|
-
|
45
|
+
resource_owner.present?
|
46
46
|
end
|
47
47
|
|
48
48
|
def validate_client
|
@@ -50,7 +50,7 @@ module Doorkeeper
|
|
50
50
|
end
|
51
51
|
|
52
52
|
def validate_client_supports_grant_flow
|
53
|
-
|
53
|
+
server_config.allow_grant_flow_for_client?(grant_type, client)
|
54
54
|
end
|
55
55
|
end
|
56
56
|
end
|
@@ -33,7 +33,7 @@ module Doorkeeper
|
|
33
33
|
end
|
34
34
|
|
35
35
|
def validate_client_supports_grant_flow
|
36
|
-
Doorkeeper.
|
36
|
+
Doorkeeper.config.allow_grant_flow_for_client?(grant_type, client.application)
|
37
37
|
end
|
38
38
|
|
39
39
|
def scopes
|
@@ -46,8 +46,10 @@ module Doorkeeper
|
|
46
46
|
|
47
47
|
def error_response
|
48
48
|
if error == :invalid_request
|
49
|
-
OAuth::InvalidRequestResponse.from_request(
|
50
|
-
|
49
|
+
OAuth::InvalidRequestResponse.from_request(
|
50
|
+
self,
|
51
|
+
response_on_fragment: response_on_fragment?,
|
52
|
+
)
|
51
53
|
else
|
52
54
|
OAuth::ErrorResponse.from_request(self, response_on_fragment: response_on_fragment?)
|
53
55
|
end
|
@@ -86,7 +88,7 @@ module Doorkeeper
|
|
86
88
|
|
87
89
|
Helpers::URIChecker.valid_for_authorization?(
|
88
90
|
redirect_uri,
|
89
|
-
client.redirect_uri
|
91
|
+
client.redirect_uri,
|
90
92
|
)
|
91
93
|
end
|
92
94
|
|
@@ -109,7 +111,7 @@ module Doorkeeper
|
|
109
111
|
scope_str: scope,
|
110
112
|
server_scopes: server.scopes,
|
111
113
|
app_scopes: client.scopes,
|
112
|
-
grant_type: grant_type
|
114
|
+
grant_type: grant_type,
|
113
115
|
)
|
114
116
|
end
|
115
117
|
|
@@ -27,7 +27,7 @@ module Doorkeeper
|
|
27
27
|
private
|
28
28
|
|
29
29
|
def load_client(credentials)
|
30
|
-
|
30
|
+
server_config.application_model.by_uid_and_secret(credentials.uid, credentials.secret)
|
31
31
|
end
|
32
32
|
|
33
33
|
def before_successful_response
|
@@ -42,7 +42,7 @@ module Doorkeeper
|
|
42
42
|
end
|
43
43
|
|
44
44
|
def refresh_token_revoked_on_use?
|
45
|
-
|
45
|
+
server_config.access_token_model.refresh_token_revoked_on_use?
|
46
46
|
end
|
47
47
|
|
48
48
|
def default_scopes
|
@@ -50,7 +50,7 @@ module Doorkeeper
|
|
50
50
|
end
|
51
51
|
|
52
52
|
def create_access_token
|
53
|
-
@access_token =
|
53
|
+
@access_token = server_config.access_token_model.create!(access_token_attributes)
|
54
54
|
end
|
55
55
|
|
56
56
|
def access_token_attributes
|
@@ -71,7 +71,7 @@ module Doorkeeper
|
|
71
71
|
context = Authorization::Token.build_context(
|
72
72
|
client,
|
73
73
|
Doorkeeper::OAuth::REFRESH_TOKEN,
|
74
|
-
scopes
|
74
|
+
scopes,
|
75
75
|
)
|
76
76
|
Authorization::Token.access_token_expires_in(server, context)
|
77
77
|
end
|
@@ -104,7 +104,7 @@ module Doorkeeper
|
|
104
104
|
if @original_scopes.present?
|
105
105
|
ScopeChecker.valid?(
|
106
106
|
scope_str: @original_scopes,
|
107
|
-
server_scopes: refresh_token.scopes
|
107
|
+
server_scopes: refresh_token.scopes,
|
108
108
|
)
|
109
109
|
else
|
110
110
|
true
|
@@ -14,8 +14,8 @@ module Doorkeeper
|
|
14
14
|
|
15
15
|
def authenticate(request, *methods)
|
16
16
|
if (token = from_request(request, *methods))
|
17
|
-
access_token =
|
18
|
-
refresh_token_enabled = Doorkeeper.
|
17
|
+
access_token = Doorkeeper.config.access_token_model.by_token(token)
|
18
|
+
refresh_token_enabled = Doorkeeper.config.refresh_token_enabled?
|
19
19
|
if access_token.present? && refresh_token_enabled
|
20
20
|
access_token.revoke_previous_refresh_token!
|
21
21
|
end
|
@@ -94,7 +94,7 @@ module Doorkeeper
|
|
94
94
|
client_id: @token.try(:application).try(:uid),
|
95
95
|
token_type: @token.token_type,
|
96
96
|
exp: @token.expires_at.to_i,
|
97
|
-
iat: @token.created_at.to_i
|
97
|
+
iat: @token.created_at.to_i,
|
98
98
|
)
|
99
99
|
end
|
100
100
|
|
@@ -174,15 +174,15 @@ module Doorkeeper
|
|
174
174
|
authorized_token.token == @token&.token
|
175
175
|
end
|
176
176
|
|
177
|
-
#
|
177
|
+
# Config constraints for introspection in Doorkeeper.config.allow_token_introspection
|
178
178
|
def token_introspection_allowed?(auth_client: nil, auth_token: nil)
|
179
|
-
allow_introspection = Doorkeeper.
|
179
|
+
allow_introspection = Doorkeeper.config.allow_token_introspection
|
180
180
|
return allow_introspection unless allow_introspection.respond_to?(:call)
|
181
181
|
|
182
182
|
allow_introspection.call(
|
183
183
|
@token,
|
184
184
|
auth_client,
|
185
|
-
auth_token
|
185
|
+
auth_token,
|
186
186
|
)
|
187
187
|
end
|
188
188
|
|
@@ -193,9 +193,9 @@ module Doorkeeper
|
|
193
193
|
# @see https://tools.ietf.org/html/rfc7662#section-2.2
|
194
194
|
#
|
195
195
|
def customize_response(response)
|
196
|
-
customized_response = Doorkeeper.
|
196
|
+
customized_response = Doorkeeper.config.custom_introspection_response.call(
|
197
197
|
token,
|
198
|
-
server.context
|
198
|
+
server.context,
|
199
199
|
)
|
200
200
|
return response if customized_response.blank?
|
201
201
|
|
@@ -1,48 +1,9 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
-
|
4
|
-
class AccessGrant < ActiveRecord::Base
|
5
|
-
self.table_name = "#{table_name_prefix}oauth_access_grants#{table_name_suffix}"
|
6
|
-
|
7
|
-
include AccessGrantMixin
|
8
|
-
|
9
|
-
belongs_to :application, class_name: "Doorkeeper::Application",
|
10
|
-
optional: true, inverse_of: :access_grants
|
11
|
-
|
12
|
-
validates :resource_owner_id,
|
13
|
-
:application_id,
|
14
|
-
:token,
|
15
|
-
:expires_in,
|
16
|
-
:redirect_uri,
|
17
|
-
presence: true
|
18
|
-
|
19
|
-
validates :token, uniqueness: { case_sensitive: true }
|
3
|
+
require "doorkeeper/orm/active_record/mixins/access_grant"
|
20
4
|
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
# The stored refresh_token may be mapped and not available in cleartext.
|
25
|
-
#
|
26
|
-
# Some strategies allow restoring stored secrets (e.g. symmetric encryption)
|
27
|
-
# while hashing strategies do not, so you cannot rely on this value
|
28
|
-
# returning a present value for persisted tokens.
|
29
|
-
def plaintext_token
|
30
|
-
if secret_strategy.allows_restoring_secrets?
|
31
|
-
secret_strategy.restore_secret(self, :token)
|
32
|
-
else
|
33
|
-
@raw_token
|
34
|
-
end
|
35
|
-
end
|
36
|
-
|
37
|
-
private
|
38
|
-
|
39
|
-
# Generates token value with UniqueToken class.
|
40
|
-
#
|
41
|
-
# @return [String] token value
|
42
|
-
#
|
43
|
-
def generate_token
|
44
|
-
@raw_token = UniqueToken.generate
|
45
|
-
secret_strategy.store_secret(self, :token, @raw_token)
|
46
|
-
end
|
5
|
+
module Doorkeeper
|
6
|
+
class AccessGrant < ::ActiveRecord::Base
|
7
|
+
include Doorkeeper::Orm::ActiveRecord::Mixins::AccessGrant
|
47
8
|
end
|
48
9
|
end
|
@@ -1,40 +1,9 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
-
|
4
|
-
class AccessToken < ActiveRecord::Base
|
5
|
-
self.table_name = "#{table_name_prefix}oauth_access_tokens#{table_name_suffix}"
|
6
|
-
|
7
|
-
include AccessTokenMixin
|
8
|
-
|
9
|
-
belongs_to :application, class_name: "Doorkeeper::Application",
|
10
|
-
inverse_of: :access_tokens, optional: true
|
11
|
-
|
12
|
-
validates :token, presence: true, uniqueness: { case_sensitive: true }
|
13
|
-
validates :refresh_token, uniqueness: { case_sensitive: true }, if: :use_refresh_token?
|
3
|
+
require "doorkeeper/orm/active_record/mixins/access_token"
|
14
4
|
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
before_validation :generate_token, on: :create
|
20
|
-
before_validation :generate_refresh_token,
|
21
|
-
on: :create, if: :use_refresh_token?
|
22
|
-
|
23
|
-
# Searches for not revoked Access Tokens associated with the
|
24
|
-
# specific Resource Owner.
|
25
|
-
#
|
26
|
-
# @param resource_owner [ActiveRecord::Base]
|
27
|
-
# Resource Owner model instance
|
28
|
-
#
|
29
|
-
# @return [ActiveRecord::Relation]
|
30
|
-
# active Access Tokens for Resource Owner
|
31
|
-
#
|
32
|
-
def self.active_for(resource_owner)
|
33
|
-
where(resource_owner_id: resource_owner.id, revoked_at: nil)
|
34
|
-
end
|
35
|
-
|
36
|
-
def self.refresh_token_revoked_on_use?
|
37
|
-
column_names.include?("previous_refresh_token")
|
38
|
-
end
|
5
|
+
module Doorkeeper
|
6
|
+
class AccessToken < ::ActiveRecord::Base
|
7
|
+
include Doorkeeper::Orm::ActiveRecord::Mixins::AccessToken
|
39
8
|
end
|
40
9
|
end
|
@@ -1,162 +1,10 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
3
|
require "doorkeeper/orm/active_record/redirect_uri_validator"
|
4
|
+
require "doorkeeper/orm/active_record/mixins/application"
|
4
5
|
|
5
6
|
module Doorkeeper
|
6
|
-
class Application < ActiveRecord::Base
|
7
|
-
|
8
|
-
|
9
|
-
include ApplicationMixin
|
10
|
-
|
11
|
-
has_many :access_grants, dependent: :delete_all, class_name: "Doorkeeper::AccessGrant"
|
12
|
-
has_many :access_tokens, dependent: :delete_all, class_name: "Doorkeeper::AccessToken"
|
13
|
-
|
14
|
-
validates :name, :secret, :uid, presence: true
|
15
|
-
validates :uid, uniqueness: { case_sensitive: true }
|
16
|
-
validates :redirect_uri, "doorkeeper/redirect_uri": true
|
17
|
-
validates :confidential, inclusion: { in: [true, false] }
|
18
|
-
|
19
|
-
validate :scopes_match_configured, if: :enforce_scopes?
|
20
|
-
|
21
|
-
before_validation :generate_uid, :generate_secret, on: :create
|
22
|
-
|
23
|
-
has_many :authorized_tokens, -> { where(revoked_at: nil) }, class_name: "AccessToken"
|
24
|
-
has_many :authorized_applications, through: :authorized_tokens, source: :application
|
25
|
-
|
26
|
-
# Returns Applications associated with active (not revoked) Access Tokens
|
27
|
-
# that are owned by the specific Resource Owner.
|
28
|
-
#
|
29
|
-
# @param resource_owner [ActiveRecord::Base]
|
30
|
-
# Resource Owner model instance
|
31
|
-
#
|
32
|
-
# @return [ActiveRecord::Relation]
|
33
|
-
# Applications authorized for the Resource Owner
|
34
|
-
#
|
35
|
-
def self.authorized_for(resource_owner)
|
36
|
-
resource_access_tokens = AccessToken.active_for(resource_owner)
|
37
|
-
where(id: resource_access_tokens.select(:application_id).distinct)
|
38
|
-
end
|
39
|
-
|
40
|
-
# Revokes AccessToken and AccessGrant records that have not been revoked and
|
41
|
-
# associated with the specific Application and Resource Owner.
|
42
|
-
#
|
43
|
-
# @param resource_owner [ActiveRecord::Base]
|
44
|
-
# instance of the Resource Owner model
|
45
|
-
#
|
46
|
-
def self.revoke_tokens_and_grants_for(id, resource_owner)
|
47
|
-
AccessToken.revoke_all_for(id, resource_owner)
|
48
|
-
AccessGrant.revoke_all_for(id, resource_owner)
|
49
|
-
end
|
50
|
-
|
51
|
-
# Generates a new secret for this application, intended to be used
|
52
|
-
# for rotating the secret or in case of compromise.
|
53
|
-
#
|
54
|
-
def renew_secret
|
55
|
-
@raw_secret = UniqueToken.generate
|
56
|
-
secret_strategy.store_secret(self, :secret, @raw_secret)
|
57
|
-
end
|
58
|
-
|
59
|
-
# We keep a volatile copy of the raw secret for initial communication
|
60
|
-
# The stored refresh_token may be mapped and not available in cleartext.
|
61
|
-
#
|
62
|
-
# Some strategies allow restoring stored secrets (e.g. symmetric encryption)
|
63
|
-
# while hashing strategies do not, so you cannot rely on this value
|
64
|
-
# returning a present value for persisted tokens.
|
65
|
-
def plaintext_secret
|
66
|
-
if secret_strategy.allows_restoring_secrets?
|
67
|
-
secret_strategy.restore_secret(self, :secret)
|
68
|
-
else
|
69
|
-
@raw_secret
|
70
|
-
end
|
71
|
-
end
|
72
|
-
|
73
|
-
# Represents client as set of it's attributes in JSON format.
|
74
|
-
# This is the right way how we want to override ActiveRecord #to_json.
|
75
|
-
#
|
76
|
-
# Respects privacy settings and serializes minimum set of attributes
|
77
|
-
# for public/private clients and full set for authorized owners.
|
78
|
-
#
|
79
|
-
# @return [Hash] entity attributes for JSON
|
80
|
-
#
|
81
|
-
def as_json(options = {})
|
82
|
-
# if application belongs to some owner we need to check if it's the same as
|
83
|
-
# the one passed in the options or check if we render the client as an owner
|
84
|
-
if (respond_to?(:owner) && owner && owner == options[:current_resource_owner]) ||
|
85
|
-
options[:as_owner]
|
86
|
-
# Owners can see all the client attributes, fallback to ActiveModel serialization
|
87
|
-
super
|
88
|
-
else
|
89
|
-
# if application has no owner or it's owner doesn't match one from the options
|
90
|
-
# we render only minimum set of attributes that could be exposed to a public
|
91
|
-
only = extract_serializable_attributes(options)
|
92
|
-
super(options.merge(only: only))
|
93
|
-
end
|
94
|
-
end
|
95
|
-
|
96
|
-
# We need to hook into this method to allow serializing plan-text secrets
|
97
|
-
# when secrets hashing enabled.
|
98
|
-
#
|
99
|
-
# @param key [String] attribute name
|
100
|
-
#
|
101
|
-
def read_attribute_for_serialization(key)
|
102
|
-
return super unless key.to_s == "secret"
|
103
|
-
|
104
|
-
plaintext_secret || secret
|
105
|
-
end
|
106
|
-
|
107
|
-
private
|
108
|
-
|
109
|
-
def generate_uid
|
110
|
-
self.uid = UniqueToken.generate if uid.blank?
|
111
|
-
end
|
112
|
-
|
113
|
-
def generate_secret
|
114
|
-
return unless secret.blank?
|
115
|
-
renew_secret
|
116
|
-
end
|
117
|
-
|
118
|
-
def scopes_match_configured
|
119
|
-
if scopes.present? &&
|
120
|
-
!ScopeChecker.valid?(scope_str: scopes.to_s,
|
121
|
-
server_scopes: Doorkeeper.configuration.scopes)
|
122
|
-
errors.add(:scopes, :not_match_configured)
|
123
|
-
end
|
124
|
-
end
|
125
|
-
|
126
|
-
def enforce_scopes?
|
127
|
-
Doorkeeper.configuration.enforce_configured_scopes?
|
128
|
-
end
|
129
|
-
|
130
|
-
# Helper method to extract collection of serializable attribute names
|
131
|
-
# considering serialization options (like `only`, `except` and so on).
|
132
|
-
#
|
133
|
-
# @param options [Hash] serialization options
|
134
|
-
#
|
135
|
-
# @return [Array<String>]
|
136
|
-
# collection of attributes to be serialized using #as_json
|
137
|
-
#
|
138
|
-
def extract_serializable_attributes(options = {})
|
139
|
-
opts = options.try(:dup) || {}
|
140
|
-
only = Array.wrap(opts[:only]).map(&:to_s)
|
141
|
-
|
142
|
-
only = if only.blank?
|
143
|
-
serializable_attributes
|
144
|
-
else
|
145
|
-
only & serializable_attributes
|
146
|
-
end
|
147
|
-
|
148
|
-
only -= Array.wrap(opts[:except]).map(&:to_s) if opts.key?(:except)
|
149
|
-
only.uniq
|
150
|
-
end
|
151
|
-
|
152
|
-
# Collection of attributes that could be serialized for public.
|
153
|
-
# Override this method if you need additional attributes to be serialized.
|
154
|
-
#
|
155
|
-
# @return [Array<String>] collection of serializable attributes
|
156
|
-
def serializable_attributes
|
157
|
-
attributes = %w[id name created_at]
|
158
|
-
attributes << "uid" unless confidential?
|
159
|
-
attributes
|
160
|
-
end
|
7
|
+
class Application < ::ActiveRecord::Base
|
8
|
+
include ::Doorkeeper::Orm::ActiveRecord::Mixins::Application
|
161
9
|
end
|
162
10
|
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Doorkeeper::Orm::ActiveRecord::Mixins
|
4
|
+
module AccessGrant
|
5
|
+
extend ActiveSupport::Concern
|
6
|
+
|
7
|
+
included do
|
8
|
+
self.table_name = "#{table_name_prefix}oauth_access_grants#{table_name_suffix}"
|
9
|
+
|
10
|
+
include ::Doorkeeper::AccessGrantMixin
|
11
|
+
|
12
|
+
belongs_to :application, class_name: Doorkeeper.config.application_class,
|
13
|
+
optional: true,
|
14
|
+
inverse_of: :access_grants
|
15
|
+
|
16
|
+
validates :resource_owner_id,
|
17
|
+
:application_id,
|
18
|
+
:token,
|
19
|
+
:expires_in,
|
20
|
+
:redirect_uri,
|
21
|
+
presence: true
|
22
|
+
|
23
|
+
validates :token, uniqueness: { case_sensitive: true }
|
24
|
+
|
25
|
+
before_validation :generate_token, on: :create
|
26
|
+
|
27
|
+
# We keep a volatile copy of the raw token for initial communication
|
28
|
+
# The stored refresh_token may be mapped and not available in cleartext.
|
29
|
+
#
|
30
|
+
# Some strategies allow restoring stored secrets (e.g. symmetric encryption)
|
31
|
+
# while hashing strategies do not, so you cannot rely on this value
|
32
|
+
# returning a present value for persisted tokens.
|
33
|
+
def plaintext_token
|
34
|
+
if secret_strategy.allows_restoring_secrets?
|
35
|
+
secret_strategy.restore_secret(self, :token)
|
36
|
+
else
|
37
|
+
@raw_token
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
private
|
42
|
+
|
43
|
+
# Generates token value with UniqueToken class.
|
44
|
+
#
|
45
|
+
# @return [String] token value
|
46
|
+
#
|
47
|
+
def generate_token
|
48
|
+
@raw_token = Doorkeeper::OAuth::Helpers::UniqueToken.generate
|
49
|
+
secret_strategy.store_secret(self, :token, @raw_token)
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Doorkeeper::Orm::ActiveRecord::Mixins
|
4
|
+
module AccessToken
|
5
|
+
extend ActiveSupport::Concern
|
6
|
+
|
7
|
+
included do
|
8
|
+
self.table_name = "#{table_name_prefix}oauth_access_tokens#{table_name_suffix}"
|
9
|
+
|
10
|
+
include ::Doorkeeper::AccessTokenMixin
|
11
|
+
|
12
|
+
belongs_to :application, class_name: Doorkeeper.config.application_class,
|
13
|
+
inverse_of: :access_tokens,
|
14
|
+
optional: true
|
15
|
+
|
16
|
+
validates :token, presence: true, uniqueness: { case_sensitive: true }
|
17
|
+
validates :refresh_token, uniqueness: { case_sensitive: true }, if: :use_refresh_token?
|
18
|
+
|
19
|
+
# @attr_writer [Boolean, nil] use_refresh_token
|
20
|
+
# indicates the possibility of using refresh token
|
21
|
+
attr_writer :use_refresh_token
|
22
|
+
|
23
|
+
before_validation :generate_token, on: :create
|
24
|
+
before_validation :generate_refresh_token,
|
25
|
+
on: :create, if: :use_refresh_token?
|
26
|
+
end
|
27
|
+
|
28
|
+
class_methods do
|
29
|
+
# Searches for not revoked Access Tokens associated with the
|
30
|
+
# specific Resource Owner.
|
31
|
+
#
|
32
|
+
# @param resource_owner [ActiveRecord::Base]
|
33
|
+
# Resource Owner model instance
|
34
|
+
#
|
35
|
+
# @return [ActiveRecord::Relation]
|
36
|
+
# active Access Tokens for Resource Owner
|
37
|
+
#
|
38
|
+
def active_for(resource_owner)
|
39
|
+
where(resource_owner_id: resource_owner.id, revoked_at: nil)
|
40
|
+
end
|
41
|
+
|
42
|
+
def refresh_token_revoked_on_use?
|
43
|
+
column_names.include?("previous_refresh_token")
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|