-
Notifications
You must be signed in to change notification settings - Fork 6
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Adds in the ability to use 2 Legged OAuth for securing requests to imagefactory.
- Loading branch information
Showing
5 changed files
with
78 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,5 @@ | ||
require "active_resource" | ||
require File.join(File.dirname(__FILE__), 'oauth', 'active_resource_oauth_client') | ||
require File.join(File.dirname(__FILE__), 'model', 'base') | ||
require File.join(File.dirname(__FILE__), 'model', 'target_image') | ||
require File.join(File.dirname(__FILE__), 'model', 'provider_image') | ||
require File.join(File.dirname(__FILE__), 'model', 'provider_image') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
require 'oauth' | ||
|
||
# Monkey-patch ActiveResource to allow us to merge our OAuth headers in. | ||
# Portions of the below are taken from Active Resource which is MIT licensed; | ||
# hence this whole file is being licensed under the MIT License to err on the side of safety. | ||
module ActiveResourceOAuthClient | ||
ActiveResource::Connection.class_eval do | ||
def request_with_oauth(method, path, *arguments) | ||
@oauth_config = Tim::ImageFactory::Base.config || {} | ||
# Take care to fall back to the standard request method if we don't have full OAuth credentials | ||
unless use_oauth_for_url?("#{site.scheme}://#{site.host}:#{site.port}#{path}") | ||
return request_without_oauth(method, path, *arguments) | ||
end | ||
result = ActiveSupport::Notifications.instrument("request.active_resource") do |payload| | ||
payload[:method] = method | ||
payload[:request_uri] = "#{site.scheme}://#{site.host}:#{site.port}#{path}" | ||
puts "#{payload[:method]} #{payload[:request_uri]}" | ||
oauth_consumer = OAuth::Consumer.new( | ||
@oauth_config[:consumer_key], | ||
@oauth_config[:consumer_secret], | ||
:site => @oauth_config[:site] ) | ||
puts @oauth_config[:consumer_key] + " " + @oauth_config[:consumer_secret] | ||
token = OAuth::AccessToken.new(oauth_consumer) | ||
base_request = oauth_consumer.create_signed_request(method, path, token, {}, *arguments) | ||
payload[:result] = http.request(base_request) | ||
end | ||
# Error-handling code from OAuth | ||
# http://wiki.oauth.net/w/page/12238543/ProblemReporting | ||
auth_header = result.to_hash['www-authenticate'] | ||
problem_header = auth_header ? auth_header.select{|h| h =~ /^OAuth /}.select{|h| h =~ /oauth_problem/}.first : nil | ||
if auth_header && problem_header | ||
params = OAuth::Helper.parse_header(problem_header) | ||
raise OAuth::Problem.new(params.delete("oauth_problem"), result, params) | ||
end | ||
# Error-handling code from ActiveResource | ||
handle_response(result) | ||
rescue Timeout::Error => e | ||
raise TimeoutError.new(e.message) | ||
rescue OpenSSL::SSL::SSLError => e | ||
raise SSLError.new(e.message) | ||
end | ||
|
||
# Currently, only Factory calls should use OAuth -- extend as needed | ||
def use_oauth_for_url?(url) | ||
Tim::ImageFactory::Base.use_oauth? and | ||
url.include?(Tim::ImageFactory::Base.config[:site]) | ||
end | ||
|
||
alias_method_chain :request, :oauth | ||
|
||
end | ||
end |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,16 @@ | ||
Tim.user_class = "User" | ||
Tim.provider_account_class = "ProviderAccount" | ||
Tim.provider_type_class = "ProviderType" | ||
|
||
# Image Factory URL | ||
Tim::ImageFactory::Base.site = "http://localhost:8075/imagefactory" | ||
|
||
# Example OAuth Configuration | ||
#oauth_config = {:consumer_key => "mock-key", | ||
# :consumer_secret => "mock-secret", | ||
# :site => "http://localhost:8075/imagefactory/"}# | ||
#Tim::ImageFactory::Base.config = oauth_config | ||
|
||
# FIXME: We should be able to infer these from Routes | ||
Tim::ImageFactory::TargetImage.callback_url = "http://localhost:3000/tim/target_images/" | ||
Tim::ImageFactory::ProviderImage.callback_url = "http://localhost:3000/tim/provider_images/" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters