qoobaa-oauth 0.3.8

Sign up to get free protection for your applications and to get access to all the features.
Files changed (75) hide show
  1. data/.document +5 -0
  2. data/.gitignore +21 -0
  3. data/History.txt +114 -0
  4. data/LICENSE +20 -0
  5. data/README.rdoc +71 -0
  6. data/Rakefile +58 -0
  7. data/TODO +31 -0
  8. data/VERSION +1 -0
  9. data/lib/oauth.rb +4 -0
  10. data/lib/oauth/cli.rb +378 -0
  11. data/lib/oauth/client.rb +4 -0
  12. data/lib/oauth/client/action_controller_request.rb +54 -0
  13. data/lib/oauth/client/helper.rb +85 -0
  14. data/lib/oauth/client/net_http.rb +106 -0
  15. data/lib/oauth/consumer.rb +370 -0
  16. data/lib/oauth/errors.rb +3 -0
  17. data/lib/oauth/errors/error.rb +4 -0
  18. data/lib/oauth/errors/problem.rb +14 -0
  19. data/lib/oauth/errors/unauthorized.rb +12 -0
  20. data/lib/oauth/helper.rb +78 -0
  21. data/lib/oauth/oauth.rb +11 -0
  22. data/lib/oauth/oauth_test_helper.rb +25 -0
  23. data/lib/oauth/request_proxy.rb +24 -0
  24. data/lib/oauth/request_proxy/action_controller_request.rb +73 -0
  25. data/lib/oauth/request_proxy/base.rb +166 -0
  26. data/lib/oauth/request_proxy/jabber_request.rb +41 -0
  27. data/lib/oauth/request_proxy/mock_request.rb +44 -0
  28. data/lib/oauth/request_proxy/net_http.rb +65 -0
  29. data/lib/oauth/request_proxy/rack_request.rb +40 -0
  30. data/lib/oauth/request_proxy/typhoeus_request.rb +53 -0
  31. data/lib/oauth/server.rb +66 -0
  32. data/lib/oauth/signature.rb +40 -0
  33. data/lib/oauth/signature/base.rb +87 -0
  34. data/lib/oauth/signature/hmac/md5.rb +21 -0
  35. data/lib/oauth/signature/hmac/rmd160.rb +21 -0
  36. data/lib/oauth/signature/hmac/sha1.rb +22 -0
  37. data/lib/oauth/signature/hmac/sha2.rb +21 -0
  38. data/lib/oauth/signature/md5.rb +13 -0
  39. data/lib/oauth/signature/plaintext.rb +23 -0
  40. data/lib/oauth/signature/rsa/sha1.rb +45 -0
  41. data/lib/oauth/signature/sha1.rb +13 -0
  42. data/lib/oauth/token.rb +7 -0
  43. data/lib/oauth/tokens/access_token.rb +68 -0
  44. data/lib/oauth/tokens/consumer_token.rb +33 -0
  45. data/lib/oauth/tokens/request_token.rb +32 -0
  46. data/lib/oauth/tokens/server_token.rb +9 -0
  47. data/lib/oauth/tokens/token.rb +17 -0
  48. data/lib/oauth/version.rb +3 -0
  49. data/qoobaa-oauth.gemspec +149 -0
  50. data/test/cases/oauth_case.rb +19 -0
  51. data/test/cases/spec/1_0-final/test_construct_request_url.rb +62 -0
  52. data/test/cases/spec/1_0-final/test_normalize_request_parameters.rb +88 -0
  53. data/test/cases/spec/1_0-final/test_parameter_encodings.rb +86 -0
  54. data/test/cases/spec/1_0-final/test_signature_base_strings.rb +77 -0
  55. data/test/integration/consumer_test.rb +304 -0
  56. data/test/keys/rsa.cert +11 -0
  57. data/test/keys/rsa.pem +16 -0
  58. data/test/test_access_token.rb +26 -0
  59. data/test/test_action_controller_request_proxy.rb +133 -0
  60. data/test/test_consumer.rb +159 -0
  61. data/test/test_helper.rb +14 -0
  62. data/test/test_hmac_sha1.rb +20 -0
  63. data/test/test_net_http_client.rb +224 -0
  64. data/test/test_net_http_request_proxy.rb +72 -0
  65. data/test/test_oauth_helper.rb +49 -0
  66. data/test/test_rack_request_proxy.rb +40 -0
  67. data/test/test_request_token.rb +51 -0
  68. data/test/test_rsa_sha1.rb +59 -0
  69. data/test/test_server.rb +40 -0
  70. data/test/test_signature.rb +21 -0
  71. data/test/test_signature_base.rb +32 -0
  72. data/test/test_signature_plain_text.rb +26 -0
  73. data/test/test_token.rb +14 -0
  74. data/test/test_typhoeus_request_proxy.rb +72 -0
  75. metadata +209 -0
@@ -0,0 +1,22 @@
1
+ require 'oauth/signature/base'
2
+
3
+ if RUBY_VERSION >= "1.9"
4
+ require 'digest/hmac'
5
+ else
6
+ require "rubygems"
7
+ require 'hmac-sha1'
8
+ end
9
+
10
+ module OAuth::Signature::HMAC
11
+ class SHA1 < ::OAuth::Signature::Base
12
+ implements 'hmac-sha1'
13
+
14
+ def digest
15
+ if RUBY_VERSION >= "1.9"
16
+ Digest::HMAC.new(secret, Digest::SHA1).digest(signature_base_string)
17
+ else
18
+ ::HMAC::SHA1.digest(secret, signature_base_string)
19
+ end
20
+ end
21
+ end
22
+ end
@@ -0,0 +1,21 @@
1
+ require 'oauth/signature/base'
2
+
3
+ if RUBY_VERSION >= "1.9"
4
+ require 'digest/hmac'
5
+ else
6
+ require 'hmac-sha2'
7
+ end
8
+
9
+ module OAuth::Signature::HMAC
10
+ class SHA2 < OAuth::Signature::Base
11
+ implements 'hmac-sha2'
12
+
13
+ def digest
14
+ if RUBY_VERSION >= "1.9"
15
+ Digest::HMAC.new(secret, Digest::SHA2).digest(signature_base_string)
16
+ else
17
+ ::HMAC::SHA2.digest(secret, signature_base_string)
18
+ end
19
+ end
20
+ end
21
+ end
@@ -0,0 +1,13 @@
1
+ require 'oauth/signature/base'
2
+ require 'digest/md5'
3
+
4
+ module OAuth::Signature
5
+ class MD5 < Base
6
+ implements 'md5'
7
+ digest_class Digest::MD5
8
+
9
+ def signature_base_string
10
+ secret + super
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,23 @@
1
+ require 'oauth/signature/base'
2
+
3
+ module OAuth::Signature
4
+ class PLAINTEXT < Base
5
+ implements 'plaintext'
6
+
7
+ def signature
8
+ signature_base_string
9
+ end
10
+
11
+ def ==(cmp_signature)
12
+ signature.to_s == cmp_signature.to_s
13
+ end
14
+
15
+ def signature_base_string
16
+ secret
17
+ end
18
+
19
+ def secret
20
+ super
21
+ end
22
+ end
23
+ end
@@ -0,0 +1,45 @@
1
+ require 'oauth/signature/base'
2
+ require 'openssl'
3
+
4
+ module OAuth::Signature::RSA
5
+ class SHA1 < OAuth::Signature::Base
6
+ implements 'rsa-sha1'
7
+
8
+ def ==(cmp_signature)
9
+ public_key.verify(OpenSSL::Digest::SHA1.new, Base64.decode64(cmp_signature.is_a?(Array) ? cmp_signature.first : cmp_signature), signature_base_string)
10
+ end
11
+
12
+ def public_key
13
+ if consumer_secret.is_a?(String)
14
+ decode_public_key
15
+ elsif consumer_secret.is_a?(OpenSSL::X509::Certificate)
16
+ consumer_secret.public_key
17
+ else
18
+ consumer_secret
19
+ end
20
+ end
21
+
22
+ private
23
+
24
+ def decode_public_key
25
+ case consumer_secret
26
+ when /-----BEGIN CERTIFICATE-----/
27
+ OpenSSL::X509::Certificate.new( consumer_secret).public_key
28
+ else
29
+ OpenSSL::PKey::RSA.new( consumer_secret)
30
+ end
31
+ end
32
+
33
+ def digest
34
+ private_key = OpenSSL::PKey::RSA.new(
35
+ if options[:private_key_file]
36
+ IO.read(options[:private_key_file])
37
+ else
38
+ consumer_secret
39
+ end
40
+ )
41
+
42
+ private_key.sign(OpenSSL::Digest::SHA1.new, signature_base_string)
43
+ end
44
+ end
45
+ end
@@ -0,0 +1,13 @@
1
+ require 'oauth/signature/base'
2
+ require 'digest/sha1'
3
+
4
+ module OAuth::Signature
5
+ class SHA1 < Base
6
+ implements 'sha1'
7
+ digest_class Digest::SHA1
8
+
9
+ def signature_base_string
10
+ secret + super
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,7 @@
1
+ # this exists for backwards-compatibility
2
+
3
+ require 'oauth/tokens/token'
4
+ require 'oauth/tokens/server_token'
5
+ require 'oauth/tokens/consumer_token'
6
+ require 'oauth/tokens/request_token'
7
+ require 'oauth/tokens/access_token'
@@ -0,0 +1,68 @@
1
+ module OAuth
2
+ # The Access Token is used for the actual "real" web service calls that you perform against the server
3
+ class AccessToken < ConsumerToken
4
+ # The less intrusive way. Otherwise, if we are to do it correctly inside consumer,
5
+ # we need to restructure and touch more methods: request(), sign!(), etc.
6
+ def request(http_method, path, *arguments)
7
+ request_uri = URI.parse(path)
8
+ site_uri = consumer.uri
9
+ is_service_uri_different = (request_uri.absolute? && request_uri != site_uri)
10
+ consumer.uri(request_uri) if is_service_uri_different
11
+ @response = super(http_method, path, *arguments)
12
+ # NOTE: reset for wholesomeness? meaning that we admit only AccessToken service calls may use different URIs?
13
+ # so reset in case consumer is still used for other token-management tasks subsequently?
14
+ consumer.uri(site_uri) if is_service_uri_different
15
+ @response
16
+ end
17
+
18
+ # Make a regular GET request using AccessToken
19
+ #
20
+ # @response = @token.get('/people')
21
+ # @response = @token.get('/people', { 'Accept'=>'application/xml' })
22
+ #
23
+ def get(path, headers = {})
24
+ request(:get, path, headers)
25
+ end
26
+
27
+ # Make a regular HEAD request using AccessToken
28
+ #
29
+ # @response = @token.head('/people')
30
+ #
31
+ def head(path, headers = {})
32
+ request(:head, path, headers)
33
+ end
34
+
35
+ # Make a regular POST request using AccessToken
36
+ #
37
+ # @response = @token.post('/people')
38
+ # @response = @token.post('/people', { :name => 'Bob', :email => 'bob@mailinator.com' })
39
+ # @response = @token.post('/people', { :name => 'Bob', :email => 'bob@mailinator.com' }, { 'Accept' => 'application/xml' })
40
+ # @response = @token.post('/people', nil, {'Accept' => 'application/xml' })
41
+ # @response = @token.post('/people', @person.to_xml, { 'Accept'=>'application/xml', 'Content-Type' => 'application/xml' })
42
+ #
43
+ def post(path, body = '', headers = {})
44
+ request(:post, path, body, headers)
45
+ end
46
+
47
+ # Make a regular PUT request using AccessToken
48
+ #
49
+ # @response = @token.put('/people/123')
50
+ # @response = @token.put('/people/123', { :name => 'Bob', :email => 'bob@mailinator.com' })
51
+ # @response = @token.put('/people/123', { :name => 'Bob', :email => 'bob@mailinator.com' }, { 'Accept' => 'application/xml' })
52
+ # @response = @token.put('/people/123', nil, { 'Accept' => 'application/xml' })
53
+ # @response = @token.put('/people/123', @person.to_xml, { 'Accept' => 'application/xml', 'Content-Type' => 'application/xml' })
54
+ #
55
+ def put(path, body = '', headers = {})
56
+ request(:put, path, body, headers)
57
+ end
58
+
59
+ # Make a regular DELETE request using AccessToken
60
+ #
61
+ # @response = @token.delete('/people/123')
62
+ # @response = @token.delete('/people/123', { 'Accept' => 'application/xml' })
63
+ #
64
+ def delete(path, headers = {})
65
+ request(:delete, path, headers)
66
+ end
67
+ end
68
+ end
@@ -0,0 +1,33 @@
1
+ module OAuth
2
+ # Superclass for tokens used by OAuth Clients
3
+ class ConsumerToken < Token
4
+ attr_accessor :consumer, :params
5
+ attr_reader :response
6
+
7
+ def self.from_hash(consumer, hash)
8
+ token = self.new(consumer, hash[:oauth_token], hash[:oauth_token_secret])
9
+ token.params = hash
10
+ token
11
+ end
12
+
13
+ def initialize(consumer, token="", secret="")
14
+ super(token, secret)
15
+ @consumer = consumer
16
+ @params = {}
17
+ end
18
+
19
+ # Make a signed request using given http_method to the path
20
+ #
21
+ # @token.request(:get, '/people')
22
+ # @token.request(:post, '/people', @person.to_xml, { 'Content-Type' => 'application/xml' })
23
+ #
24
+ def request(http_method, path, *arguments)
25
+ @response = consumer.request(http_method, path, self, {}, *arguments)
26
+ end
27
+
28
+ # Sign a request generated elsewhere using Net:HTTP::Post.new or friends
29
+ def sign!(request, options = {})
30
+ consumer.sign!(request, self, options)
31
+ end
32
+ end
33
+ end
@@ -0,0 +1,32 @@
1
+ module OAuth
2
+ # The RequestToken is used for the initial Request.
3
+ # This is normally created by the Consumer object.
4
+ class RequestToken < ConsumerToken
5
+
6
+ # Generate an authorization URL for user authorization
7
+ def authorize_url(params = nil)
8
+ params = (params || {}).merge(:oauth_token => self.token)
9
+ build_authorize_url(consumer.authorize_url, params)
10
+ end
11
+
12
+ def callback_confirmed?
13
+ params[:oauth_callback_confirmed] == "true"
14
+ end
15
+
16
+ # exchange for AccessToken on server
17
+ def get_access_token(options = {}, *arguments)
18
+ response = consumer.token_request(consumer.http_method, (consumer.access_token_url? ? consumer.access_token_url : consumer.access_token_path), self, options, *arguments)
19
+ OAuth::AccessToken.from_hash(consumer, response)
20
+ end
21
+
22
+ protected
23
+
24
+ # construct an authorization url
25
+ def build_authorize_url(base_url, params)
26
+ uri = URI.parse(base_url.to_s)
27
+ # TODO doesn't handle array values correctly
28
+ uri.query = params.map { |k,v| [k, CGI.escape(v)] * "=" } * "&"
29
+ uri.to_s
30
+ end
31
+ end
32
+ end
@@ -0,0 +1,9 @@
1
+ module OAuth
2
+ # Used on the server for generating tokens
3
+ class ServerToken < Token
4
+
5
+ def initialize
6
+ super(generate_key(16), generate_key)
7
+ end
8
+ end
9
+ end
@@ -0,0 +1,17 @@
1
+ module OAuth
2
+ # Superclass for the various tokens used by OAuth
3
+ class Token
4
+ include OAuth::Helper
5
+
6
+ attr_accessor :token, :secret
7
+
8
+ def initialize(token, secret)
9
+ @token = token
10
+ @secret = secret
11
+ end
12
+
13
+ def to_query
14
+ "oauth_token=#{escape(token)}&oauth_secret=#{escape(secret)}"
15
+ end
16
+ end
17
+ end
@@ -0,0 +1,3 @@
1
+ module OAuth #:nodoc:
2
+ VERSION = '0.3.6'
3
+ end
@@ -0,0 +1,149 @@
1
+ # Generated by jeweler
2
+ # DO NOT EDIT THIS FILE DIRECTLY
3
+ # Instead, edit Jeweler::Tasks in Rakefile, and run the gemspec command
4
+ # -*- encoding: utf-8 -*-
5
+
6
+ Gem::Specification.new do |s|
7
+ s.name = %q{qoobaa-oauth}
8
+ s.version = "0.3.8"
9
+
10
+ s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
11
+ s.authors = ["Piotr Sarnacki", "Jakub Ku\305\272ma"]
12
+ s.date = %q{2010-03-24}
13
+ s.description = %q{OAuth Core Ruby implementation}
14
+ s.email = %q{drogus@gmail.com}
15
+ s.extra_rdoc_files = [
16
+ "LICENSE",
17
+ "README.rdoc",
18
+ "TODO"
19
+ ]
20
+ s.files = [
21
+ ".document",
22
+ ".gitignore",
23
+ "History.txt",
24
+ "LICENSE",
25
+ "README.rdoc",
26
+ "Rakefile",
27
+ "TODO",
28
+ "VERSION",
29
+ "lib/oauth.rb",
30
+ "lib/oauth/cli.rb",
31
+ "lib/oauth/client.rb",
32
+ "lib/oauth/client/action_controller_request.rb",
33
+ "lib/oauth/client/helper.rb",
34
+ "lib/oauth/client/net_http.rb",
35
+ "lib/oauth/consumer.rb",
36
+ "lib/oauth/errors.rb",
37
+ "lib/oauth/errors/error.rb",
38
+ "lib/oauth/errors/problem.rb",
39
+ "lib/oauth/errors/unauthorized.rb",
40
+ "lib/oauth/helper.rb",
41
+ "lib/oauth/oauth.rb",
42
+ "lib/oauth/oauth_test_helper.rb",
43
+ "lib/oauth/request_proxy.rb",
44
+ "lib/oauth/request_proxy/action_controller_request.rb",
45
+ "lib/oauth/request_proxy/base.rb",
46
+ "lib/oauth/request_proxy/jabber_request.rb",
47
+ "lib/oauth/request_proxy/mock_request.rb",
48
+ "lib/oauth/request_proxy/net_http.rb",
49
+ "lib/oauth/request_proxy/rack_request.rb",
50
+ "lib/oauth/request_proxy/typhoeus_request.rb",
51
+ "lib/oauth/server.rb",
52
+ "lib/oauth/signature.rb",
53
+ "lib/oauth/signature/base.rb",
54
+ "lib/oauth/signature/hmac/md5.rb",
55
+ "lib/oauth/signature/hmac/rmd160.rb",
56
+ "lib/oauth/signature/hmac/sha1.rb",
57
+ "lib/oauth/signature/hmac/sha2.rb",
58
+ "lib/oauth/signature/md5.rb",
59
+ "lib/oauth/signature/plaintext.rb",
60
+ "lib/oauth/signature/rsa/sha1.rb",
61
+ "lib/oauth/signature/sha1.rb",
62
+ "lib/oauth/token.rb",
63
+ "lib/oauth/tokens/access_token.rb",
64
+ "lib/oauth/tokens/consumer_token.rb",
65
+ "lib/oauth/tokens/request_token.rb",
66
+ "lib/oauth/tokens/server_token.rb",
67
+ "lib/oauth/tokens/token.rb",
68
+ "lib/oauth/version.rb",
69
+ "qoobaa-oauth.gemspec",
70
+ "test/cases/oauth_case.rb",
71
+ "test/cases/spec/1_0-final/test_construct_request_url.rb",
72
+ "test/cases/spec/1_0-final/test_normalize_request_parameters.rb",
73
+ "test/cases/spec/1_0-final/test_parameter_encodings.rb",
74
+ "test/cases/spec/1_0-final/test_signature_base_strings.rb",
75
+ "test/integration/consumer_test.rb",
76
+ "test/keys/rsa.cert",
77
+ "test/keys/rsa.pem",
78
+ "test/test_access_token.rb",
79
+ "test/test_action_controller_request_proxy.rb",
80
+ "test/test_consumer.rb",
81
+ "test/test_helper.rb",
82
+ "test/test_hmac_sha1.rb",
83
+ "test/test_net_http_client.rb",
84
+ "test/test_net_http_request_proxy.rb",
85
+ "test/test_oauth_helper.rb",
86
+ "test/test_rack_request_proxy.rb",
87
+ "test/test_request_token.rb",
88
+ "test/test_rsa_sha1.rb",
89
+ "test/test_server.rb",
90
+ "test/test_signature.rb",
91
+ "test/test_signature_base.rb",
92
+ "test/test_signature_plain_text.rb",
93
+ "test/test_token.rb",
94
+ "test/test_typhoeus_request_proxy.rb"
95
+ ]
96
+ s.homepage = %q{http://github.com/drogus/oauth}
97
+ s.rdoc_options = ["--charset=UTF-8"]
98
+ s.require_paths = ["lib"]
99
+ s.rubygems_version = %q{1.3.6}
100
+ s.summary = %q{OAuth Core Ruby implementation}
101
+ s.test_files = [
102
+ "test/test_oauth_helper.rb",
103
+ "test/test_net_http_client.rb",
104
+ "test/test_server.rb",
105
+ "test/test_access_token.rb",
106
+ "test/test_rsa_sha1.rb",
107
+ "test/test_action_controller_request_proxy.rb",
108
+ "test/test_request_token.rb",
109
+ "test/test_typhoeus_request_proxy.rb",
110
+ "test/test_consumer.rb",
111
+ "test/test_rack_request_proxy.rb",
112
+ "test/test_net_http_request_proxy.rb",
113
+ "test/test_helper.rb",
114
+ "test/integration/consumer_test.rb",
115
+ "test/test_hmac_sha1.rb",
116
+ "test/test_signature_plain_text.rb",
117
+ "test/test_token.rb",
118
+ "test/test_signature_base.rb",
119
+ "test/cases/oauth_case.rb",
120
+ "test/cases/spec/1_0-final/test_signature_base_strings.rb",
121
+ "test/cases/spec/1_0-final/test_parameter_encodings.rb",
122
+ "test/cases/spec/1_0-final/test_normalize_request_parameters.rb",
123
+ "test/cases/spec/1_0-final/test_construct_request_url.rb",
124
+ "test/test_signature.rb"
125
+ ]
126
+
127
+ if s.respond_to? :specification_version then
128
+ current_version = Gem::Specification::CURRENT_SPECIFICATION_VERSION
129
+ s.specification_version = 3
130
+
131
+ if Gem::Version.new(Gem::RubyGemsVersion) >= Gem::Version.new('1.2.0') then
132
+ s.add_runtime_dependency(%q<ruby-hmac>, [">= 0.3.1"])
133
+ s.add_development_dependency(%q<actionpack>, [">= 0"])
134
+ s.add_development_dependency(%q<rack>, [">= 0"])
135
+ s.add_development_dependency(%q<mocha>, [">= 0"])
136
+ else
137
+ s.add_dependency(%q<ruby-hmac>, [">= 0.3.1"])
138
+ s.add_dependency(%q<actionpack>, [">= 0"])
139
+ s.add_dependency(%q<rack>, [">= 0"])
140
+ s.add_dependency(%q<mocha>, [">= 0"])
141
+ end
142
+ else
143
+ s.add_dependency(%q<ruby-hmac>, [">= 0.3.1"])
144
+ s.add_dependency(%q<actionpack>, [">= 0"])
145
+ s.add_dependency(%q<rack>, [">= 0"])
146
+ s.add_dependency(%q<mocha>, [">= 0"])
147
+ end
148
+ end
149
+