line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
use strict; |
3
|
1
|
|
|
1
|
|
412
|
use warnings; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
23
|
|
4
|
1
|
|
|
1
|
|
4
|
|
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
95
|
|
5
|
|
|
|
|
|
|
use DateTime; |
6
|
1
|
|
|
1
|
|
810
|
use Digest::MD5 qw(md5_hex); |
|
1
|
|
|
|
|
485578
|
|
|
1
|
|
|
|
|
52
|
|
7
|
1
|
|
|
1
|
|
9
|
use HTTP::Request::Common; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
79
|
|
8
|
1
|
|
|
1
|
|
6
|
use JSON::MaybeXS; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
64
|
|
9
|
1
|
|
|
1
|
|
6
|
use LWP::UserAgent; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
53
|
|
10
|
1
|
|
|
1
|
|
7
|
use Net::OAuth; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
29
|
|
11
|
1
|
|
|
1
|
|
666
|
use Scalar::Util qw( blessed ); |
|
1
|
|
|
|
|
696
|
|
|
1
|
|
|
|
|
39
|
|
12
|
1
|
|
|
1
|
|
7
|
use URI::Query; |
|
1
|
|
|
|
|
3
|
|
|
1
|
|
|
|
|
45
|
|
13
|
1
|
|
|
1
|
|
421
|
use Hash::Merge; |
|
1
|
|
|
|
|
1933
|
|
|
1
|
|
|
|
|
77
|
|
14
|
1
|
|
|
1
|
|
553
|
|
|
1
|
|
|
|
|
3978
|
|
|
1
|
|
|
|
|
1625
|
|
15
|
|
|
|
|
|
|
my ($class, $settings, $dsl) = @_; |
16
|
|
|
|
|
|
|
my $self = bless { |
17
|
12
|
|
|
12
|
0
|
243452
|
settings => $settings, |
18
|
12
|
|
|
|
|
65
|
}, $class; |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
my $merge = Hash::Merge->new('LEFT_PRECEDENT'); |
21
|
|
|
|
|
|
|
my $config = $merge->merge($self->{settings}{providers}{$self->_provider}||{}, $self->config); |
22
|
12
|
|
|
|
|
124
|
|
23
|
12
|
|
100
|
|
|
1605
|
$self->{settings}{providers}{$self->_provider} = $config; |
24
|
|
|
|
|
|
|
|
25
|
12
|
|
|
|
|
1231
|
my $protocol_version = $self->provider_settings->{version} || 2; |
26
|
|
|
|
|
|
|
$self->{protocol_version} = $protocol_version; |
27
|
12
|
|
100
|
|
|
92
|
|
28
|
12
|
|
|
|
|
38
|
$self->{ua} ||= LWP::UserAgent->new(); |
29
|
|
|
|
|
|
|
$self->{ua}->env_proxy; # c'mon make this default behaviour already! |
30
|
12
|
|
33
|
|
|
181
|
|
31
|
12
|
|
|
|
|
3614
|
$self->{dsl} = $dsl; |
32
|
|
|
|
|
|
|
|
33
|
12
|
|
|
|
|
6626
|
return $self; |
34
|
|
|
|
|
|
|
} |
35
|
12
|
|
|
|
|
726
|
|
36
|
|
|
|
|
|
|
# Provider:: module should override this if needed/wanted |
37
|
|
|
|
|
|
|
my $self = shift; |
38
|
|
|
|
|
|
|
|
39
|
|
|
|
|
|
|
return 1; |
40
|
0
|
|
|
0
|
0
|
0
|
} |
41
|
|
|
|
|
|
|
|
42
|
0
|
|
|
|
|
0
|
return (split '::', blessed($_[0]))[-1]; |
43
|
|
|
|
|
|
|
} |
44
|
|
|
|
|
|
|
|
45
|
|
|
|
|
|
|
my ($self, $obj) = @_; |
46
|
105
|
|
|
105
|
|
1197
|
|
47
|
|
|
|
|
|
|
while( my ($k, $v) = each %{$obj} ) { |
48
|
|
|
|
|
|
|
$obj->{$k} = $self->_stringify_json_booleans( $v ) |
49
|
|
|
|
|
|
|
if( ref($v) && ref($v) eq 'HASH' ); |
50
|
7
|
|
|
7
|
|
900
|
$obj->{$k} = "$v" |
51
|
|
|
|
|
|
|
if( blessed( $v ) ); |
52
|
7
|
|
|
|
|
14
|
} |
|
75
|
|
|
|
|
194
|
|
53
|
68
|
100
|
100
|
|
|
133
|
|
54
|
|
|
|
|
|
|
return $obj; |
55
|
68
|
100
|
|
|
|
179
|
} |
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
my $self = shift; |
58
|
|
|
|
|
|
|
|
59
|
7
|
|
|
|
|
17
|
return ( |
60
|
|
|
|
|
|
|
consumer_key => $self->provider_settings->{tokens}{consumer_key}, |
61
|
|
|
|
|
|
|
consumer_secret => $self->provider_settings->{tokens}{consumer_secret}, |
62
|
|
|
|
|
|
|
signature_method => $self->provider_settings->{signature_method} || 'HMAC-SHA1', |
63
|
3
|
|
|
3
|
|
13286
|
timestamp => DateTime->now->epoch, |
64
|
|
|
|
|
|
|
nonce => md5_hex(time), |
65
|
|
|
|
|
|
|
); |
66
|
|
|
|
|
|
|
} |
67
|
|
|
|
|
|
|
|
68
|
3
|
|
50
|
|
|
16
|
my $self = shift; |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
# construct the callback url |
71
|
|
|
|
|
|
|
return sprintf "%s%s/%s/callback", |
72
|
|
|
|
|
|
|
$self->settings->{base}, |
73
|
|
|
|
|
|
|
$self->settings->{prefix}, |
74
|
|
|
|
|
|
|
lc($self->_provider) |
75
|
12
|
|
|
12
|
|
31
|
; |
76
|
|
|
|
|
|
|
} |
77
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
return $_[0]->{ua}; |
80
|
|
|
|
|
|
|
} |
81
|
12
|
|
|
|
|
35
|
|
82
|
|
|
|
|
|
|
return $_[0]->{protocol_version}; |
83
|
|
|
|
|
|
|
} |
84
|
|
|
|
|
|
|
|
85
|
|
|
|
|
|
|
return $_[0]->{settings}; |
86
|
|
|
|
|
|
|
} |
87
|
3
|
|
|
3
|
0
|
27
|
|
88
|
|
|
|
|
|
|
my $self = shift; |
89
|
|
|
|
|
|
|
return $self->{settings}{providers}{$self->_provider}; |
90
|
|
|
|
|
|
|
} |
91
|
13
|
|
|
13
|
0
|
80
|
|
92
|
|
|
|
|
|
|
my ( $self, $base ) = @_; |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
$self->settings->{base} ||= $base; |
95
|
36
|
|
|
36
|
0
|
152
|
|
96
|
|
|
|
|
|
|
if( $self->protocol_version < 2 ) { |
97
|
|
|
|
|
|
|
# oAuth 1.0 / 1.0a |
98
|
|
|
|
|
|
|
$Net::OAuth::PROTOCOL_VERSION = $self->protocol_version; |
99
|
63
|
|
|
63
|
0
|
1148
|
my $request = Net::OAuth->request("request token")->new( |
100
|
63
|
|
|
|
|
173
|
$self->_default_args_v1, |
101
|
|
|
|
|
|
|
request_method => 'POST', |
102
|
|
|
|
|
|
|
request_url => $self->provider_settings->{urls}{request_token_url}, |
103
|
|
|
|
|
|
|
callback => $self->_callback_url, |
104
|
6
|
|
|
6
|
0
|
2682
|
); |
105
|
|
|
|
|
|
|
$request->sign; |
106
|
6
|
|
66
|
|
|
42
|
|
107
|
|
|
|
|
|
|
my $res = $self->ua->request(POST $request->to_url); |
108
|
6
|
100
|
|
|
|
54
|
if ($res->is_success) { |
109
|
|
|
|
|
|
|
my $response = Net::OAuth->response('request token')->from_post_body($res->content); |
110
|
1
|
|
|
|
|
4
|
my $uri = URI->new( $self->provider_settings->{urls}{authorize_url} ); |
111
|
|
|
|
|
|
|
$uri->query_form( oauth_callback => $self->_callback_url, oauth_token => $response->token ); |
112
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
return $uri->as_string; |
114
|
|
|
|
|
|
|
} else { |
115
|
1
|
|
|
|
|
12
|
return $self->settings->{error_url} || '/'; |
116
|
|
|
|
|
|
|
} |
117
|
1
|
|
|
|
|
1226
|
} else { |
118
|
|
|
|
|
|
|
# oAuth 2 and up |
119
|
1
|
|
|
|
|
4318
|
my $uri = URI->new( $self->provider_settings->{urls}{authorize_url} ); |
120
|
1
|
50
|
|
|
|
1714
|
my %query = ( |
121
|
1
|
|
|
|
|
24
|
client_id => $self->provider_settings->{tokens}{client_id}, |
122
|
1
|
|
|
|
|
3870
|
redirect_uri => $self->_callback_url, |
123
|
1
|
|
|
|
|
118
|
%{ $self->provider_settings->{query_params}{authorize} || {} }, |
124
|
|
|
|
|
|
|
); |
125
|
1
|
|
|
|
|
188
|
$uri->query_form( %query ); |
126
|
|
|
|
|
|
|
return $uri->as_string; |
127
|
0
|
|
0
|
|
|
0
|
} |
128
|
|
|
|
|
|
|
} |
129
|
|
|
|
|
|
|
my ($self, $request, $session) = @_; |
130
|
|
|
|
|
|
|
|
131
|
5
|
|
|
|
|
21
|
my $provider = lc $self->_provider; |
132
|
|
|
|
|
|
|
my $session_data = $session->read('oauth') || {}; |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
if( $self->protocol_version < 2 || !defined $session_data->{$provider} || !defined $session_data->{$provider}{refresh_token}) { |
135
|
5
|
100
|
|
|
|
348
|
if (defined defined $session_data->{$provider}) { |
|
5
|
|
|
|
|
16
|
|
136
|
|
|
|
|
|
|
$session_data->{$provider} = { }; |
137
|
5
|
|
|
|
|
42
|
$session->write('oauth', $session_data); |
138
|
5
|
|
|
|
|
852
|
} |
139
|
|
|
|
|
|
|
$self->{dsl}->app->log(debug => "Auth::OAuth::Provider::".$self->_provider.": Failed to action call to token refresh, refresh_token is not present in session data."); |
140
|
|
|
|
|
|
|
return undef; |
141
|
|
|
|
|
|
|
} |
142
|
0
|
|
|
0
|
0
|
0
|
my $retval = _get_token(@_, { "refresh_token" => $session_data->{$provider}{refresh_token}, grant_type => 'refresh_token' }); |
143
|
|
|
|
|
|
|
if (!$retval) { |
144
|
0
|
|
|
|
|
0
|
if (defined defined $session_data->{$provider}) { |
145
|
0
|
|
0
|
|
|
0
|
$session_data->{$provider} = {}; |
146
|
|
|
|
|
|
|
$session->write('oauth', $session_data); |
147
|
0
|
0
|
0
|
|
|
0
|
} |
|
|
|
0
|
|
|
|
|
148
|
0
|
0
|
|
|
|
0
|
} |
149
|
0
|
|
|
|
|
0
|
return $retval; |
150
|
0
|
|
|
|
|
0
|
} |
151
|
|
|
|
|
|
|
my ($self, $request, $session) = @_; |
152
|
0
|
|
|
|
|
0
|
_get_token(@_, { "code" => $request->param('code'), grant_type => 'authorization_code' }); |
153
|
0
|
|
|
|
|
0
|
} |
154
|
|
|
|
|
|
|
my ($self, $request, $session, $v2opts) = @_; |
155
|
0
|
|
|
|
|
0
|
|
156
|
0
|
0
|
|
|
|
0
|
# this code may be called before authentication_url() |
157
|
0
|
0
|
|
|
|
0
|
# (multiple processes), so we must make sure the base |
158
|
0
|
|
|
|
|
0
|
# setting isn't undef |
159
|
0
|
|
|
|
|
0
|
$self->settings->{base} ||= $request->uri_base; |
160
|
|
|
|
|
|
|
|
161
|
|
|
|
|
|
|
my $provider = lc $self->_provider; |
162
|
0
|
|
|
|
|
0
|
my $session_data = $session->read('oauth') || {}; |
163
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
if( $self->protocol_version < 2 ) { |
165
|
6
|
|
|
6
|
0
|
12359
|
return $self->settings->{error_url} || '/' unless( defined($request->param('oauth_token')) ); |
166
|
6
|
|
|
|
|
46
|
my $at_request = Net::OAuth->request( 'access token' )->new( |
167
|
|
|
|
|
|
|
$self->_default_args_v1, |
168
|
|
|
|
|
|
|
token => $request->param('oauth_token'), |
169
|
6
|
|
|
6
|
|
135
|
token_secret => '', |
170
|
|
|
|
|
|
|
verifier => $request->param('oauth_verifier'), |
171
|
|
|
|
|
|
|
|
172
|
|
|
|
|
|
|
request_url => $self->provider_settings->{urls}{access_token_url}, |
173
|
|
|
|
|
|
|
request_method => 'POST' |
174
|
6
|
|
33
|
|
|
28
|
); |
175
|
|
|
|
|
|
|
$at_request->sign; |
176
|
6
|
|
|
|
|
29
|
|
177
|
6
|
|
50
|
|
|
37
|
my $ua_response = $self->ua->request( |
178
|
|
|
|
|
|
|
POST $at_request->to_url, [ |
179
|
6
|
100
|
|
|
|
196
|
'oauth_verifier', $request->param('oauth_verifier') |
180
|
1
|
50
|
0
|
|
|
5
|
] |
181
|
|
|
|
|
|
|
); |
182
|
|
|
|
|
|
|
|
183
|
|
|
|
|
|
|
if( $ua_response->is_success ) { |
184
|
|
|
|
|
|
|
my $response = Net::OAuth->response( 'access token' )->from_post_body( $ua_response->content ); |
185
|
|
|
|
|
|
|
$session_data->{$provider} = { |
186
|
|
|
|
|
|
|
access_token => $response->token, |
187
|
|
|
|
|
|
|
access_token_secret => $response->token_secret, |
188
|
1
|
|
|
|
|
24
|
extra => $response->extra_params, |
189
|
|
|
|
|
|
|
}; |
190
|
1
|
|
|
|
|
1110
|
} |
191
|
|
|
|
|
|
|
} else { |
192
|
1
|
|
|
|
|
1383
|
my $uri = URI->new( $self->provider_settings->{urls}{access_token_url} ); |
193
|
|
|
|
|
|
|
my %args = %{$v2opts}; |
194
|
|
|
|
|
|
|
$args{client_id} = $self->provider_settings->{tokens}{client_id}; |
195
|
|
|
|
|
|
|
$args{client_secret} = $self->provider_settings->{tokens}{client_secret}; |
196
|
|
|
|
|
|
|
$args{redirect_uri} = $self->_callback_url; |
197
|
|
|
|
|
|
|
my $response = $self->{ua}->request( POST $uri->as_string, \%args ); |
198
|
1
|
50
|
|
|
|
1872
|
|
199
|
1
|
|
|
|
|
25
|
if( $response->is_success ) { |
200
|
1
|
|
|
|
|
1925
|
my $content_type = $response->header('Content-Type'); |
201
|
|
|
|
|
|
|
my $params = {}; |
202
|
|
|
|
|
|
|
if( $content_type =~ m/json/ || $content_type =~ m/javascript/ ) { |
203
|
|
|
|
|
|
|
$params = decode_json( $response->content ); |
204
|
|
|
|
|
|
|
} else { |
205
|
|
|
|
|
|
|
$params = URI::Query->new( $response->content )->hash; |
206
|
|
|
|
|
|
|
} |
207
|
5
|
|
|
|
|
24
|
|
208
|
5
|
|
|
|
|
546
|
# Error checking on the response from the server. If this is a refresh that failed we need to catch and return that fact |
|
5
|
|
|
|
|
26
|
|
209
|
5
|
|
|
|
|
17
|
my $keys_found = 0; |
210
|
5
|
|
|
|
|
17
|
for my $key (qw/access_token email user_id expires expires_in id_token token_type id issued_at scope instance_url refresh_token signature x_mailru_vid error/) { |
211
|
5
|
|
|
|
|
22
|
if ($params->{$key}) { |
212
|
5
|
|
|
|
|
46
|
$keys_found++; |
213
|
|
|
|
|
|
|
} |
214
|
5
|
50
|
|
|
|
5251
|
} |
215
|
5
|
|
|
|
|
88
|
if (!$keys_found) { |
216
|
5
|
|
|
|
|
239
|
$self->{dsl}->app->log(debug => "Auth::OAuth::Provider::".$self->_provider.": Token request for grant_type ".$args{grant_type}." didn't return any known ID data. Assuming failed, and returning failed response."); |
217
|
5
|
100
|
66
|
|
|
45
|
return undef; |
218
|
2
|
|
|
|
|
10
|
} |
219
|
|
|
|
|
|
|
|
220
|
3
|
|
|
|
|
14
|
# Some servers don't return an issued_at or expires; Dancer app authors might need this to check if a refresh is required |
221
|
|
|
|
|
|
|
if (!defined $params->{"issued_at"}) { |
222
|
|
|
|
|
|
|
$params->{"issued_at"} = DateTime->now->epoch; |
223
|
|
|
|
|
|
|
} |
224
|
5
|
|
|
|
|
807
|
if ($params->{"expires_in"} && !defined $params->{"expires"}) { |
225
|
5
|
|
|
|
|
19
|
$params->{"expires"} = $params->{"issued_at"} + $params->{"expires_in"}; |
226
|
75
|
100
|
|
|
|
140
|
} |
227
|
18
|
|
|
|
|
24
|
|
228
|
|
|
|
|
|
|
for my $key (qw/access_token email user_id expires expires_in id_token token_type id issued_at scope instance_url refresh_token signature x_mailru_vid error/) { |
229
|
|
|
|
|
|
|
if ($params->{$key}) { |
230
|
5
|
50
|
|
|
|
26
|
$session_data->{$provider}{$key} = $params->{$key}; |
231
|
0
|
|
|
|
|
0
|
} |
232
|
0
|
|
|
|
|
0
|
} |
233
|
|
|
|
|
|
|
|
234
|
|
|
|
|
|
|
} else { |
235
|
|
|
|
|
|
|
$self->{dsl}->app->log(debug => "Auth::OAuth::Provider::".$self->_provider.": Token request for grant_type ".$args{grant_type}." failed with ".$response->status_line); |
236
|
5
|
50
|
|
|
|
20
|
return undef; |
237
|
0
|
|
|
|
|
0
|
} |
238
|
|
|
|
|
|
|
} |
239
|
5
|
100
|
66
|
|
|
26
|
$session->write('oauth', $session_data); |
240
|
2
|
|
|
|
|
9
|
|
241
|
|
|
|
|
|
|
# fetch user info or whatever we want to do at this point |
242
|
|
|
|
|
|
|
$self->post_process( $session ); |
243
|
5
|
|
|
|
|
18
|
} |
244
|
75
|
100
|
|
|
|
138
|
|
245
|
20
|
|
|
|
|
44
|
1; |