-
Notifications
You must be signed in to change notification settings - Fork 46
/
oauth_token.rb
76 lines (58 loc) · 2.14 KB
/
oauth_token.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
# Access token used from the client to request resource
# owner resouces
class OauthToken
include Mongoid::Document
include Mongoid::Timestamps
field :client_uri # client identifier (internal)
field :resource_owner_uri # resource owner identifier
field :token # access token
field :refresh_token # refresh token
field :scope, type: Array # scope accessible with token
field :expire_at, type: Time, default: nil # token expiration
field :blocked, type: Time, default: nil # access token block (if client is blocked)
before_create :random_token
before_create :random_refresh_token
before_create :create_expiration
validates :client_uri, presence: true, url: true
validates :resource_owner_uri, presence: true, url: true
# Block the resource owner delegation to a specific client
def block!
self.blocked = Time.now
self.save
end
# Block tokens used from a client
def self.block_client!(client_uri)
self.where(client_uri: client_uri).map(&:block!)
end
# Block tokens used from a client in behalf of a resource owner
def self.block_access!(client_uri, resource_owner_uri)
self.where(client_uri: client_uri, resource_owner_uri: resource_owner_uri).map(&:block!)
end
def self.exist(client_uri, resource_owner_uri, scope)
self.where(client_uri: client_uri).
where(resource_owner_uri: resource_owner_uri).
all_in(scope: scope)
end
# Check if the status is or is not blocked
def blocked?
!self.blocked.nil?
end
# Last time the resource owner have used the token
def last_access
self.updated_at
end
# Token is expired or not
def expired?
self.expire_at < Time.now
end
private
def random_token
self.token = ActiveSupport::SecureRandom.hex(Oauth.settings["random_length"])
end
def random_refresh_token
self.refresh_token = ActiveSupport::SecureRandom.hex(Oauth.settings["random_length"])
end
def create_expiration
self.expire_at = Chronic.parse("in #{Oauth.settings["token_expires_in"]} seconds")
end
end