mirror of
https://github.com/meteor/meteor.git
synced 2026-05-02 03:01:46 -04:00
UIWebView which aren't able to use the preferred "popup" login flow. See the specs for details: https://meteor.hackpad.com/OAuth-redirect-flow-spec-PeziTcaNPDP https://meteor.hackpad.com/OAuth-redirect-flow-part-II-vswwUKP4vXe I extracted code to construct a URL from the `http` package into a new `url` utility package. The new package has no public API, it simply has the original URL construction functions that were in `http` and makes them available to oauth. Fixes the Meetup account login, as Meetup now requires using "https://api.meetup.com/2/members" instead of "https://secure.meetup.com/2/members". The `?close` parameter for the redirect URI is now not needed or used. For backwards compatibility the `?close` parameter is included if the login service configuration doesn't include the `loginStyle` field (indicating it was created using old code).
98 lines
2.9 KiB
JavaScript
98 lines
2.9 KiB
JavaScript
OAuth.registerService("meteor-developer", 2, null, function (query) {
|
|
var response = getTokens(query);
|
|
var accessToken = response.accessToken;
|
|
var identity = getIdentity(accessToken);
|
|
|
|
var serviceData = {
|
|
accessToken: OAuth.sealSecret(accessToken),
|
|
expiresAt: (+new Date) + (1000 * response.expiresIn)
|
|
};
|
|
|
|
_.extend(serviceData, identity);
|
|
|
|
// only set the token in serviceData if it's there. this ensures
|
|
// that we don't lose old ones (since we only get this on the first
|
|
// log in attempt)
|
|
if (response.refreshToken)
|
|
serviceData.refreshToken = OAuth.sealSecret(response.refreshToken);
|
|
|
|
return {
|
|
serviceData: serviceData,
|
|
options: {profile: {name: serviceData.username}}
|
|
// XXX use username for name until meteor accounts has a profile with a name
|
|
};
|
|
});
|
|
|
|
// returns an object containing:
|
|
// - accessToken
|
|
// - expiresIn: lifetime of token in seconds
|
|
// - refreshToken, if this is the first authorization request and we got a
|
|
// refresh token from the server
|
|
var getTokens = function (query) {
|
|
var config = ServiceConfiguration.configurations.findOne({
|
|
service: 'meteor-developer'
|
|
});
|
|
if (!config)
|
|
throw new ServiceConfiguration.ConfigError();
|
|
|
|
var response;
|
|
try {
|
|
response = HTTP.post(
|
|
MeteorDeveloperAccounts._server + "/oauth2/token", {
|
|
params: {
|
|
grant_type: "authorization_code",
|
|
code: query.code,
|
|
client_id: config.clientId,
|
|
client_secret: OAuth.openSecret(config.secret),
|
|
redirect_uri: OAuth._redirectUri('meteor-developer', config)
|
|
}
|
|
}
|
|
);
|
|
} catch (err) {
|
|
throw _.extend(
|
|
new Error(
|
|
"Failed to complete OAuth handshake with Meteor developer accounts. "
|
|
+ err.message
|
|
),
|
|
{response: err.response}
|
|
);
|
|
}
|
|
|
|
if (! response.data || response.data.error) {
|
|
// if the http response was a json object with an error attribute
|
|
throw new Error(
|
|
"Failed to complete OAuth handshake with Meteor developer accounts. " +
|
|
(response.data ? response.data.error :
|
|
"No response data")
|
|
);
|
|
} else {
|
|
return {
|
|
accessToken: response.data.access_token,
|
|
refreshToken: response.data.refresh_token,
|
|
expiresIn: response.data.expires_in
|
|
};
|
|
}
|
|
};
|
|
|
|
var getIdentity = function (accessToken) {
|
|
try {
|
|
return HTTP.get(
|
|
MeteorDeveloperAccounts._server + "/api/v1/identity",
|
|
{
|
|
headers: { Authorization: "Bearer " + accessToken }
|
|
}
|
|
).data;
|
|
} catch (err) {
|
|
throw _.extend(
|
|
new Error("Failed to fetch identity from Meteor developer accounts. " +
|
|
err.message),
|
|
{response: err.response}
|
|
);
|
|
}
|
|
};
|
|
|
|
MeteorDeveloperAccounts.retrieveCredential = function (credentialToken,
|
|
credentialSecret) {
|
|
return OAuth.retrieveCredential(credentialToken, credentialSecret);
|
|
};
|