2015-10-14 21:26:21 +00:00
|
|
|
# Copyright 2014, Google Inc.
|
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions are
|
|
|
|
# met:
|
|
|
|
#
|
|
|
|
# * Redistributions of source code must retain the above copyright
|
|
|
|
# notice, this list of conditions and the following disclaimer.
|
|
|
|
# * Redistributions in binary form must reproduce the above
|
|
|
|
# copyright notice, this list of conditions and the following disclaimer
|
|
|
|
# in the documentation and/or other materials provided with the
|
|
|
|
# distribution.
|
|
|
|
# * Neither the name of Google Inc. nor the names of its
|
|
|
|
# contributors may be used to endorse or promote products derived from
|
|
|
|
# this software without specific prior written permission.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
2019-02-27 16:06:41 +00:00
|
|
|
require "multi_json"
|
|
|
|
require "googleauth/signet"
|
|
|
|
require "googleauth/user_authorizer"
|
|
|
|
require "googleauth/user_refresh"
|
|
|
|
require "securerandom"
|
2015-10-14 21:26:21 +00:00
|
|
|
|
|
|
|
module Google
|
|
|
|
module Auth
|
|
|
|
# Varation on {Google::Auth::UserAuthorizer} adapted for Rack based
|
|
|
|
# web applications.
|
|
|
|
#
|
|
|
|
# Example usage:
|
|
|
|
#
|
|
|
|
# get('/') do
|
|
|
|
# user_id = request.session['user_email']
|
|
|
|
# credentials = authorizer.get_credentials(user_id, request)
|
|
|
|
# if credentials.nil?
|
2015-12-10 20:47:13 +00:00
|
|
|
# redirect authorizer.get_authorization_url(user_id: user_id,
|
|
|
|
# request: request)
|
2015-10-14 21:26:21 +00:00
|
|
|
# end
|
|
|
|
# # Credentials are valid, can call APIs
|
|
|
|
# ...
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# get('/oauth2callback') do
|
2015-12-10 20:47:13 +00:00
|
|
|
# url = Google::Auth::WebUserAuthorizer.handle_auth_callback_deferred(
|
|
|
|
# request)
|
|
|
|
# redirect url
|
2015-10-14 21:26:21 +00:00
|
|
|
# end
|
|
|
|
#
|
|
|
|
# Instead of implementing the callback directly, applications are
|
2020-11-09 22:38:59 +00:00
|
|
|
# encouraged to use {Google::Auth::WebUserAuthorizer::CallbackApp} instead.
|
2015-10-14 21:26:21 +00:00
|
|
|
#
|
2020-11-09 22:38:59 +00:00
|
|
|
# @see CallbackApp
|
2015-10-14 21:26:21 +00:00
|
|
|
# @note Requires sessions are enabled
|
|
|
|
class WebUserAuthorizer < Google::Auth::UserAuthorizer
|
2019-02-27 16:06:41 +00:00
|
|
|
STATE_PARAM = "state".freeze
|
|
|
|
AUTH_CODE_KEY = "code".freeze
|
|
|
|
ERROR_CODE_KEY = "error".freeze
|
|
|
|
SESSION_ID_KEY = "session_id".freeze
|
|
|
|
CALLBACK_STATE_KEY = "g-auth-callback".freeze
|
|
|
|
CURRENT_URI_KEY = "current_uri".freeze
|
|
|
|
XSRF_KEY = "g-xsrf-token".freeze
|
|
|
|
SCOPE_KEY = "scope".freeze
|
2015-10-14 21:26:21 +00:00
|
|
|
|
2019-02-27 16:06:41 +00:00
|
|
|
NIL_REQUEST_ERROR = "Request is required.".freeze
|
|
|
|
NIL_SESSION_ERROR = "Sessions must be enabled".freeze
|
|
|
|
MISSING_AUTH_CODE_ERROR = "Missing authorization code in request".freeze
|
|
|
|
AUTHORIZATION_ERROR = "Authorization error: %s".freeze
|
2016-07-13 22:44:16 +00:00
|
|
|
INVALID_STATE_TOKEN_ERROR =
|
2019-02-27 16:06:41 +00:00
|
|
|
"State token does not match expected value".freeze
|
2015-10-14 21:26:21 +00:00
|
|
|
|
|
|
|
class << self
|
|
|
|
attr_accessor :default
|
|
|
|
end
|
|
|
|
|
|
|
|
# Handle the result of the oauth callback. This version defers the
|
|
|
|
# exchange of the code by temporarily stashing the results in the user's
|
|
|
|
# session. This allows apps to use the generic
|
|
|
|
# {Google::Auth::WebUserAuthorizer::CallbackApp} handler for the callback
|
|
|
|
# without any additional customization.
|
|
|
|
#
|
|
|
|
# Apps that wish to handle the callback directly should use
|
|
|
|
# {#handle_auth_callback} instead.
|
|
|
|
#
|
|
|
|
# @param [Rack::Request] request
|
|
|
|
# Current request
|
2019-03-15 19:34:54 +00:00
|
|
|
def self.handle_auth_callback_deferred request
|
|
|
|
callback_state, redirect_uri = extract_callback_state request
|
|
|
|
request.session[CALLBACK_STATE_KEY] = MultiJson.dump callback_state
|
2015-10-14 21:26:21 +00:00
|
|
|
redirect_uri
|
|
|
|
end
|
|
|
|
|
|
|
|
# Initialize the authorizer
|
|
|
|
#
|
|
|
|
# @param [Google::Auth::ClientID] client_id
|
|
|
|
# Configured ID & secret for this application
|
|
|
|
# @param [String, Array<String>] scope
|
|
|
|
# Authorization scope to request
|
|
|
|
# @param [Google::Auth::Stores::TokenStore] token_store
|
|
|
|
# Backing storage for persisting user credentials
|
|
|
|
# @param [String] callback_uri
|
|
|
|
# URL (either absolute or relative) of the auth callback. Defaults
|
|
|
|
# to '/oauth2callback'
|
2019-03-15 19:34:54 +00:00
|
|
|
def initialize client_id, scope, token_store, callback_uri = nil
|
|
|
|
super client_id, scope, token_store, callback_uri
|
2015-10-14 21:26:21 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# Handle the result of the oauth callback. Exchanges the authorization
|
|
|
|
# code from the request and persists to storage.
|
|
|
|
#
|
|
|
|
# @param [String] user_id
|
|
|
|
# Unique ID of the user for loading/storing credentials.
|
|
|
|
# @param [Rack::Request] request
|
|
|
|
# Current request
|
|
|
|
# @return (Google::Auth::UserRefreshCredentials, String)
|
|
|
|
# credentials & next URL to redirect to
|
2019-03-15 19:34:54 +00:00
|
|
|
def handle_auth_callback user_id, request
|
2015-10-14 21:26:21 +00:00
|
|
|
callback_state, redirect_uri = WebUserAuthorizer.extract_callback_state(
|
2016-07-13 22:44:16 +00:00
|
|
|
request
|
|
|
|
)
|
2019-03-15 19:34:54 +00:00
|
|
|
WebUserAuthorizer.validate_callback_state callback_state, request
|
2015-10-14 21:26:21 +00:00
|
|
|
credentials = get_and_store_credentials_from_code(
|
2019-03-15 19:34:54 +00:00
|
|
|
user_id: user_id,
|
|
|
|
code: callback_state[AUTH_CODE_KEY],
|
|
|
|
scope: callback_state[SCOPE_KEY],
|
2016-07-13 22:44:16 +00:00
|
|
|
base_url: request.url
|
|
|
|
)
|
2015-10-14 21:26:21 +00:00
|
|
|
[credentials, redirect_uri]
|
|
|
|
end
|
|
|
|
|
|
|
|
# Build the URL for requesting authorization.
|
|
|
|
#
|
|
|
|
# @param [String] login_hint
|
|
|
|
# Login hint if need to authorize a specific account. Should be a
|
|
|
|
# user's email address or unique profile ID.
|
|
|
|
# @param [Rack::Request] request
|
|
|
|
# Current request
|
|
|
|
# @param [String] redirect_to
|
|
|
|
# Optional URL to proceed to after authorization complete. Defaults to
|
|
|
|
# the current URL.
|
|
|
|
# @param [String, Array<String>] scope
|
|
|
|
# Authorization scope to request. Overrides the instance scopes if
|
|
|
|
# not nil.
|
2019-06-10 18:21:11 +00:00
|
|
|
# @param [Hash] state
|
|
|
|
# Optional key-values to be returned to the oauth callback.
|
2015-10-14 21:26:21 +00:00
|
|
|
# @return [String]
|
|
|
|
# Authorization url
|
2019-03-15 19:34:54 +00:00
|
|
|
def get_authorization_url options = {}
|
2015-10-14 21:26:21 +00:00
|
|
|
options = options.dup
|
|
|
|
request = options[:request]
|
2016-07-13 22:44:16 +00:00
|
|
|
raise NIL_REQUEST_ERROR if request.nil?
|
|
|
|
raise NIL_SESSION_ERROR if request.session.nil?
|
2015-10-14 21:26:21 +00:00
|
|
|
|
2019-06-10 18:21:11 +00:00
|
|
|
state = options[:state] || {}
|
|
|
|
|
2015-10-14 21:26:21 +00:00
|
|
|
redirect_to = options[:redirect_to] || request.url
|
|
|
|
request.session[XSRF_KEY] = SecureRandom.base64
|
2019-06-10 18:21:11 +00:00
|
|
|
options[:state] = MultiJson.dump(state.merge(
|
|
|
|
SESSION_ID_KEY => request.session[XSRF_KEY],
|
|
|
|
CURRENT_URI_KEY => redirect_to
|
|
|
|
))
|
2015-10-14 21:26:21 +00:00
|
|
|
options[:base_url] = request.url
|
2019-03-15 19:34:54 +00:00
|
|
|
super options
|
2015-10-14 21:26:21 +00:00
|
|
|
end
|
|
|
|
|
2019-07-26 15:19:06 +00:00
|
|
|
# Fetch stored credentials for the user from the given request session.
|
2015-10-14 21:26:21 +00:00
|
|
|
#
|
|
|
|
# @param [String] user_id
|
|
|
|
# Unique ID of the user for loading/storing credentials.
|
|
|
|
# @param [Rack::Request] request
|
2019-07-26 15:19:06 +00:00
|
|
|
# Current request. Optional. If omitted, this will attempt to fall back
|
|
|
|
# on the base class behavior of reading from the token store.
|
2015-10-14 21:26:21 +00:00
|
|
|
# @param [Array<String>, String] scope
|
|
|
|
# If specified, only returns credentials that have all the \
|
|
|
|
# requested scopes
|
|
|
|
# @return [Google::Auth::UserRefreshCredentials]
|
|
|
|
# Stored credentials, nil if none present
|
|
|
|
# @raise [Signet::AuthorizationError]
|
|
|
|
# May raise an error if an authorization code is present in the session
|
|
|
|
# and exchange of the code fails
|
2019-07-26 15:19:06 +00:00
|
|
|
def get_credentials user_id, request = nil, scope = nil
|
|
|
|
if request && request.session.key?(CALLBACK_STATE_KEY)
|
2015-10-14 21:26:21 +00:00
|
|
|
# Note - in theory, no need to check required scope as this is
|
|
|
|
# expected to be called immediately after a return from authorization
|
2019-03-15 19:34:54 +00:00
|
|
|
state_json = request.session.delete CALLBACK_STATE_KEY
|
|
|
|
callback_state = MultiJson.load state_json
|
|
|
|
WebUserAuthorizer.validate_callback_state callback_state, request
|
2015-10-14 21:26:21 +00:00
|
|
|
get_and_store_credentials_from_code(
|
2019-03-15 19:34:54 +00:00
|
|
|
user_id: user_id,
|
|
|
|
code: callback_state[AUTH_CODE_KEY],
|
|
|
|
scope: callback_state[SCOPE_KEY],
|
2016-07-13 22:44:16 +00:00
|
|
|
base_url: request.url
|
|
|
|
)
|
2015-10-14 21:26:21 +00:00
|
|
|
else
|
2019-03-15 19:34:54 +00:00
|
|
|
super user_id, scope
|
2015-10-14 21:26:21 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
def self.extract_callback_state request
|
2019-02-27 16:06:41 +00:00
|
|
|
state = MultiJson.load(request[STATE_PARAM] || "{}")
|
2015-10-14 21:26:21 +00:00
|
|
|
redirect_uri = state[CURRENT_URI_KEY]
|
|
|
|
callback_state = {
|
2019-03-15 19:34:54 +00:00
|
|
|
AUTH_CODE_KEY => request[AUTH_CODE_KEY],
|
2016-07-13 22:44:16 +00:00
|
|
|
ERROR_CODE_KEY => request[ERROR_CODE_KEY],
|
2015-10-14 21:26:21 +00:00
|
|
|
SESSION_ID_KEY => state[SESSION_ID_KEY],
|
2019-03-15 19:34:54 +00:00
|
|
|
SCOPE_KEY => request[SCOPE_KEY]
|
2015-10-14 21:26:21 +00:00
|
|
|
}
|
|
|
|
[callback_state, redirect_uri]
|
|
|
|
end
|
|
|
|
|
|
|
|
# Verifies the results of an authorization callback
|
|
|
|
#
|
|
|
|
# @param [Hash] state
|
|
|
|
# Callback state
|
|
|
|
# @option state [String] AUTH_CODE_KEY
|
|
|
|
# The authorization code
|
|
|
|
# @option state [String] ERROR_CODE_KEY
|
|
|
|
# Error message if failed
|
|
|
|
# @param [Rack::Request] request
|
|
|
|
# Current request
|
2019-03-15 19:34:54 +00:00
|
|
|
def self.validate_callback_state state, request
|
|
|
|
raise Signet::AuthorizationError, MISSING_AUTH_CODE_ERROR if state[AUTH_CODE_KEY].nil?
|
|
|
|
if state[ERROR_CODE_KEY]
|
2016-07-13 22:44:16 +00:00
|
|
|
raise Signet::AuthorizationError,
|
2019-03-15 19:34:54 +00:00
|
|
|
format(AUTHORIZATION_ERROR, state[ERROR_CODE_KEY])
|
2015-10-14 21:26:21 +00:00
|
|
|
elsif request.session[XSRF_KEY] != state[SESSION_ID_KEY]
|
2016-07-13 22:44:16 +00:00
|
|
|
raise Signet::AuthorizationError, INVALID_STATE_TOKEN_ERROR
|
2015-10-14 21:26:21 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Small Rack app which acts as the default callback handler for the app.
|
|
|
|
#
|
|
|
|
# To configure in Rails, add to routes.rb:
|
|
|
|
#
|
|
|
|
# match '/oauth2callback',
|
|
|
|
# to: Google::Auth::WebUserAuthorizer::CallbackApp,
|
|
|
|
# via: :all
|
|
|
|
#
|
|
|
|
# With Rackup, add to config.ru:
|
|
|
|
#
|
|
|
|
# map '/oauth2callback' do
|
|
|
|
# run Google::Auth::WebUserAuthorizer::CallbackApp
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# Or in a classic Sinatra app:
|
|
|
|
#
|
|
|
|
# get('/oauth2callback') do
|
|
|
|
# Google::Auth::WebUserAuthorizer::CallbackApp.call(env)
|
|
|
|
# end
|
|
|
|
#
|
2020-11-09 22:38:59 +00:00
|
|
|
# @see Google::Auth::WebUserAuthorizer
|
2015-10-14 21:26:21 +00:00
|
|
|
class CallbackApp
|
2019-02-27 16:06:41 +00:00
|
|
|
LOCATION_HEADER = "Location".freeze
|
2015-10-14 21:26:21 +00:00
|
|
|
REDIR_STATUS = 302
|
|
|
|
ERROR_STATUS = 500
|
|
|
|
|
|
|
|
# Handle a rack request. Simply stores the results the authorization
|
|
|
|
# in the session temporarily and redirects back to to the previously
|
|
|
|
# saved redirect URL. Credentials can be later retrieved by calling.
|
|
|
|
# {Google::Auth::Web::WebUserAuthorizer#get_credentials}
|
|
|
|
#
|
|
|
|
# See {Google::Auth::Web::WebUserAuthorizer#get_authorization_uri}
|
|
|
|
# for how to initiate authorization requests.
|
|
|
|
#
|
|
|
|
# @param [Hash] env
|
|
|
|
# Rack environment
|
|
|
|
# @return [Array]
|
|
|
|
# HTTP response
|
2019-03-15 19:34:54 +00:00
|
|
|
def self.call env
|
|
|
|
request = Rack::Request.new env
|
|
|
|
return_url = WebUserAuthorizer.handle_auth_callback_deferred request
|
2015-10-14 21:26:21 +00:00
|
|
|
if return_url
|
|
|
|
[REDIR_STATUS, { LOCATION_HEADER => return_url }, []]
|
|
|
|
else
|
2019-02-27 16:06:41 +00:00
|
|
|
[ERROR_STATUS, {}, ["No return URL is present in the request."]]
|
2015-10-14 21:26:21 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-03-15 19:34:54 +00:00
|
|
|
def call env
|
|
|
|
self.class.call env
|
2015-10-14 21:26:21 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|