line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
1
|
|
|
1
|
|
360
|
use strict; use warnings; |
|
1
|
|
|
1
|
|
2
|
|
|
1
|
|
|
|
|
23
|
|
|
1
|
|
|
|
|
4
|
|
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
46
|
|
2
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
package Net::OAuth2Server::Request; |
4
|
|
|
|
|
|
|
our $VERSION = '0.006'; |
5
|
|
|
|
|
|
|
|
6
|
1
|
|
|
1
|
|
362
|
use Net::OAuth2Server::Set (); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
19
|
|
7
|
1
|
|
|
1
|
|
357
|
use Net::OAuth2Server::Response (); |
|
1
|
|
|
|
|
5
|
|
|
1
|
|
|
|
|
32
|
|
8
|
1
|
|
|
1
|
|
660
|
use MIME::Base64 (); |
|
1
|
|
|
|
|
1664
|
|
|
1
|
|
|
|
|
41
|
|
9
|
1
|
|
|
1
|
|
11
|
use Carp (); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
81
|
|
10
|
|
|
|
|
|
|
|
11
|
0
|
|
|
0
|
0
|
|
sub request_body_methods { 'POST' } |
12
|
|
|
|
0
|
0
|
|
sub allowed_methods {} |
13
|
|
|
|
0
|
0
|
|
sub accepted_auth {} |
14
|
|
|
|
0
|
0
|
|
sub required_parameters {} |
15
|
0
|
|
|
0
|
0
|
|
sub set_parameters { 'scope' } |
16
|
|
|
|
0
|
0
|
|
sub confidential_parameters {} |
17
|
|
|
|
|
|
|
|
18
|
1
|
|
|
1
|
|
5
|
use Object::Tiny::Lvalue qw( method headers parameters confidential scope error ); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
13
|
|
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
my $ct_rx = qr[ \A application/x-www-form-urlencoded [ \t]* (?: ; | \z ) ]xi; |
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
my $loaded; |
23
|
|
|
|
|
|
|
sub from_psgi { |
24
|
0
|
|
|
0
|
0
|
|
my ( $class, $env ) = ( shift, @_ ); |
25
|
0
|
|
|
|
|
|
my $body; |
26
|
0
|
|
0
|
|
|
|
$body = do { $loaded ||= require Plack::Request; Plack::Request->new( $env )->content } |
|
0
|
|
|
|
|
|
|
27
|
|
|
|
|
|
|
if ( $env->{'CONTENT_TYPE'} || '' ) =~ $ct_rx |
28
|
0
|
0
|
0
|
|
|
|
and grep $env->{'REQUEST_METHOD'} eq $_, $class->request_body_methods; |
|
|
|
0
|
|
|
|
|
29
|
|
|
|
|
|
|
$class->from( |
30
|
|
|
|
|
|
|
$env->{'REQUEST_METHOD'}, |
31
|
|
|
|
|
|
|
$env->{'QUERY_STRING'}, |
32
|
0
|
0
|
|
|
|
|
{ map /\A(?:HTTPS?_)?((?:(?!\A)|\ACONTENT_).*)/s ? ( "$1", $env->{ $_ } ) : (), keys %$env }, |
33
|
|
|
|
|
|
|
$body, |
34
|
|
|
|
|
|
|
); |
35
|
|
|
|
|
|
|
} |
36
|
|
|
|
|
|
|
|
37
|
|
|
|
|
|
|
my %auth_parser = ( # XXX not sure about this design... |
38
|
|
|
|
|
|
|
Bearer => sub { [ access_token => $_[0] ] }, |
39
|
|
|
|
|
|
|
Basic => sub { |
40
|
|
|
|
|
|
|
my @k = qw( client_id client_secret ); |
41
|
|
|
|
|
|
|
my @v = split /:/, MIME::Base64::decode( $_[0] ), 2; |
42
|
|
|
|
|
|
|
[ map { ( shift @k, $_ ) x ( '' ne $_ ) } @v ]; |
43
|
|
|
|
|
|
|
}, |
44
|
|
|
|
|
|
|
); |
45
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
sub from { |
47
|
0
|
|
|
0
|
0
|
|
my ( $class, $meth, $query, $hdr, $body ) = ( shift, @_ ); |
48
|
|
|
|
|
|
|
|
49
|
0
|
0
|
0
|
|
|
|
Carp::croak 'missing request method' unless defined $meth and '' ne $meth; |
50
|
|
|
|
|
|
|
|
51
|
0
|
0
|
|
|
|
|
%$hdr = map { my $k = $_; y/-/_/; ( lc, $hdr->{ $k } ) } $hdr ? keys %$hdr : (); |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
|
53
|
0
|
0
|
|
|
|
|
if ( grep $meth eq $_, $class->request_body_methods ) { |
54
|
|
|
|
|
|
|
return $class->new( method => $meth, headers => $hdr )->set_error_invalid_request( 'bad content type' ) |
55
|
0
|
0
|
0
|
|
|
|
if ( $hdr->{'content_type'} || '' ) !~ $ct_rx; |
56
|
|
|
|
|
|
|
} else { |
57
|
0
|
|
|
|
|
|
undef $body; |
58
|
|
|
|
|
|
|
} |
59
|
|
|
|
|
|
|
|
60
|
0
|
|
|
|
|
|
for ( $query, $body ) { |
61
|
0
|
0
|
|
|
|
|
defined $_ ? y/+/ / : ( $_ = '' ); |
62
|
|
|
|
|
|
|
# parse to k/v pairs, ignoring empty pairs, ensuring both k&v are always defined |
63
|
0
|
|
|
|
|
|
$_ = [ / \G (?!\z) [&;]* ([^=&;]*) =? ([^&;]*) (?: [&;]+ | \z) /xg ]; |
64
|
0
|
|
|
|
|
|
s/%([0-9A-Fa-f]{2})/chr hex $1/ge for @$_; |
|
0
|
|
|
|
|
|
|
65
|
|
|
|
|
|
|
} |
66
|
|
|
|
|
|
|
|
67
|
0
|
|
|
|
|
|
my $auth = $class->accepted_auth; |
68
|
0
|
0
|
0
|
|
|
|
if ( $auth and ( $hdr->{'authorization'} || '' ) =~ /\A\Q$auth\E +([^ ]+) *\z/ ) { |
|
|
|
0
|
|
|
|
|
69
|
0
|
0
|
|
|
|
|
my $parser = $auth_parser{ $auth } |
70
|
|
|
|
|
|
|
or Carp::croak "unsupported HTTP Auth type '$auth' requested in $class"; |
71
|
0
|
|
|
|
|
|
$auth = $parser->( "$1" ); |
72
|
|
|
|
|
|
|
} |
73
|
0
|
|
|
|
|
|
else { $auth = [] } |
74
|
|
|
|
|
|
|
|
75
|
0
|
|
|
|
|
|
my ( %param, %visible, %dupe ); |
76
|
0
|
|
|
|
|
|
for my $list ( $auth, $body, $query ) { |
77
|
0
|
|
|
|
|
|
while ( @$list ) { |
78
|
0
|
|
|
|
|
|
my ( $name, $value ) = splice @$list, 0, 2; |
79
|
0
|
0
|
0
|
|
|
|
if ( exists $param{ $name } and $value ne $param{ $name } ) { |
80
|
0
|
|
|
|
|
|
$dupe{ $name } = 1; |
81
|
|
|
|
|
|
|
} |
82
|
|
|
|
|
|
|
else { |
83
|
0
|
|
|
|
|
|
$param{ $name } = $value; |
84
|
0
|
0
|
|
|
|
|
$visible{ $name } = 1 if $list == $query; |
85
|
|
|
|
|
|
|
} |
86
|
|
|
|
|
|
|
} |
87
|
|
|
|
|
|
|
} |
88
|
|
|
|
|
|
|
|
89
|
0
|
0
|
|
|
|
|
if ( my @dupe = sort keys %dupe ) { |
90
|
0
|
|
|
|
|
|
my $self = $class->new( method => $meth, headers => $hdr ); |
91
|
0
|
|
|
|
|
|
return $self->set_error_invalid_request( "duplicate parameter: @dupe" ); |
92
|
|
|
|
|
|
|
} |
93
|
|
|
|
|
|
|
|
94
|
0
|
0
|
|
|
|
|
while ( my ( $k, $v ) = each %param ) { delete $param{ $k } if '' eq $v } |
|
0
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
|
96
|
0
|
|
|
|
|
|
my %confidential = map +( $_, 1 ), grep !$visible{ $_ }, keys %param; |
97
|
|
|
|
|
|
|
|
98
|
0
|
|
|
|
|
|
$class->new( |
99
|
|
|
|
|
|
|
method => $meth, |
100
|
|
|
|
|
|
|
headers => $hdr, |
101
|
|
|
|
|
|
|
parameters => \%param, |
102
|
|
|
|
|
|
|
confidential => \%confidential, |
103
|
|
|
|
|
|
|
); |
104
|
|
|
|
|
|
|
} |
105
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
sub new { |
107
|
0
|
|
|
0
|
0
|
|
my $class = shift; |
108
|
0
|
|
|
|
|
|
my $self = bless { @_ }, $class; |
109
|
0
|
0
|
|
|
|
|
$self->method or Carp::croak 'missing request method'; |
110
|
0
|
|
0
|
|
|
|
$self->confidential ||= {}; |
111
|
0
|
|
0
|
|
|
|
my $params = $self->parameters ||= {}; |
112
|
0
|
|
0
|
|
|
|
$self->$_ ||= Net::OAuth2Server::Set->new( $params->{ $_ } ) for $self->set_parameters; |
113
|
0
|
0
|
|
|
|
|
$self->ensure_method( $self->allowed_methods ) or return $self; |
114
|
0
|
0
|
|
|
|
|
$self->ensure_confidential( $self->confidential_parameters ) or return $self; |
115
|
0
|
0
|
|
|
|
|
$self->ensure_required( $self->required_parameters ) or return $self; |
116
|
0
|
|
|
|
|
|
$self; |
117
|
|
|
|
|
|
|
} |
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
####################################################################### |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
sub ensure_method { |
122
|
0
|
|
|
0
|
0
|
|
my $self = shift; |
123
|
0
|
|
|
|
|
|
my $meth = $self->method; |
124
|
0
|
|
|
|
|
|
my $disallowed = not grep $meth eq $_, @_; |
125
|
0
|
0
|
|
|
|
|
$self->set_error_invalid_request( "method not allowed: $meth" ) if $disallowed; |
126
|
0
|
|
|
|
|
|
not $disallowed; |
127
|
|
|
|
|
|
|
} |
128
|
|
|
|
|
|
|
|
129
|
|
|
|
|
|
|
sub ensure_required { |
130
|
0
|
|
|
0
|
0
|
|
my $self = shift; |
131
|
0
|
|
|
|
|
|
my $p = $self->parameters; |
132
|
0
|
|
|
|
|
|
my @missing = sort grep !exists $p->{ $_ }, @_; |
133
|
0
|
0
|
|
|
|
|
$self->set_error_invalid_request( "missing parameter: @missing" ) if @missing; |
134
|
0
|
|
|
|
|
|
not @missing; |
135
|
|
|
|
|
|
|
} |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
sub ensure_confidential { |
138
|
0
|
|
|
0
|
0
|
|
my $self = shift; |
139
|
0
|
|
|
|
|
|
my $p = $self->parameters; |
140
|
0
|
|
|
|
|
|
my $confidential = $self->confidential; |
141
|
0
|
|
0
|
|
|
|
my @visible = sort grep exists $p->{ $_ } && !$confidential->{ $_ }, @_; |
142
|
0
|
0
|
|
|
|
|
$self->set_error_invalid_request( "parameter not accepted in query string: @visible" ) if @visible; |
143
|
0
|
|
|
|
|
|
not @visible; |
144
|
|
|
|
|
|
|
} |
145
|
|
|
|
|
|
|
|
146
|
|
|
|
|
|
|
####################################################################### |
147
|
|
|
|
|
|
|
|
148
|
0
|
|
|
0
|
0
|
|
sub params { my $p = shift->parameters; @$p{ @_ } } |
|
0
|
|
|
|
|
|
|
149
|
0
|
|
|
0
|
0
|
|
sub param { my $p = shift->parameters; $$p{ $_[0] } } |
|
0
|
|
|
|
|
|
|
150
|
0
|
|
|
0
|
0
|
|
sub has_param { my $p = shift->parameters; exists $$p{ $_[0] } } |
|
0
|
|
|
|
|
|
|
151
|
|
|
|
|
|
|
sub param_if_confidential { |
152
|
0
|
|
|
0
|
0
|
|
my ( $self, $name ) = ( shift, @_ ); |
153
|
0
|
0
|
|
|
|
|
$self->confidential->{ $name } ? $self->parameters->{ $name } : (); |
154
|
|
|
|
|
|
|
} |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
####################################################################### |
157
|
|
|
|
|
|
|
|
158
|
0
|
|
|
0
|
0
|
|
sub set_error { my $self = shift; $self->error = Net::OAuth2Server::Response->new_error( @_ ); $self } |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
159
|
0
|
|
|
0
|
0
|
|
sub set_error_invalid_token { shift->set_error( invalid_token => @_ ) } |
160
|
0
|
|
|
0
|
0
|
|
sub set_error_invalid_request { shift->set_error( invalid_request => @_ ) } |
161
|
0
|
|
|
0
|
0
|
|
sub set_error_invalid_client { shift->set_error( invalid_client => @_ ) } |
162
|
0
|
|
|
0
|
0
|
|
sub set_error_invalid_grant { shift->set_error( invalid_grant => @_ ) } |
163
|
0
|
|
|
0
|
0
|
|
sub set_error_unauthorized_client { shift->set_error( unauthorized_client => @_ ) } |
164
|
0
|
|
|
0
|
0
|
|
sub set_error_access_denied { shift->set_error( access_denied => @_ ) } |
165
|
0
|
|
|
0
|
0
|
|
sub set_error_unsupported_response_type { shift->set_error( unsupported_response_type => @_ ) } |
166
|
0
|
|
|
0
|
0
|
|
sub set_error_unsupported_grant_type { shift->set_error( unsupported_grant_type => @_ ) } |
167
|
0
|
|
|
0
|
0
|
|
sub set_error_invalid_scope { shift->set_error( invalid_scope => @_ ) } |
168
|
0
|
|
|
0
|
0
|
|
sub set_error_server_error { shift->set_error( server_error => @_ ) } |
169
|
0
|
|
|
0
|
0
|
|
sub set_error_temporarily_unavailable { shift->set_error( temporarily_unavailable => @_ ) } |
170
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
1; |