mirror of
https://github.com/discourse/discourse.git
synced 2024-11-23 02:19:27 +08:00
e0f970326f
Implemented by having Discourse download the image from the provided URL and treating it as a custom upload. Adds two more parameters to the SSO site’s response: * `avatar_url` specifies the URL of the overriding avatar. * `avatar_force_update` Discourse does not re-download avatars that has already been download from the same URL. Setting this to true forces Discourse to re-download the avatar in `avatar_url` Note that both parameters are ignored if `sso_overrides_avatar` is set to false.
95 lines
2.0 KiB
Ruby
95 lines
2.0 KiB
Ruby
class SingleSignOn
|
|
ACCESSORS = [:nonce, :name, :username, :email, :avatar_url, :avatar_force_update,
|
|
:about_me, :external_id]
|
|
FIXNUMS = []
|
|
NONCE_EXPIRY_TIME = 10.minutes
|
|
|
|
attr_accessor(*ACCESSORS)
|
|
attr_accessor :sso_secret, :sso_url
|
|
|
|
def self.sso_secret
|
|
raise RuntimeError, "sso_secret not implemented on class, be sure to set it on instance"
|
|
end
|
|
|
|
def self.sso_url
|
|
raise RuntimeError, "sso_url not implemented on class, be sure to set it on instance"
|
|
end
|
|
|
|
def self.parse(payload, sso_secret = nil)
|
|
sso = new
|
|
sso.sso_secret = sso_secret if sso_secret
|
|
|
|
parsed = Rack::Utils.parse_query(payload)
|
|
if sso.sign(parsed["sso"]) != parsed["sig"]
|
|
raise RuntimeError, "Bad signature for payload"
|
|
end
|
|
|
|
decoded = Base64.decode64(parsed["sso"])
|
|
decoded_hash = Rack::Utils.parse_query(decoded)
|
|
|
|
ACCESSORS.each do |k|
|
|
val = decoded_hash[k.to_s]
|
|
val = val.to_i if FIXNUMS.include? k
|
|
sso.send("#{k}=", val)
|
|
end
|
|
|
|
decoded_hash.each do |k,v|
|
|
# 1234567
|
|
# custom.
|
|
#
|
|
if k[0..6] == "custom."
|
|
field = k[7..-1]
|
|
sso.custom_fields[field] = v
|
|
end
|
|
end
|
|
|
|
sso
|
|
end
|
|
|
|
def sso_secret
|
|
@sso_secret || self.class.sso_secret
|
|
end
|
|
|
|
def sso_url
|
|
@sso_url || self.class.sso_url
|
|
end
|
|
|
|
def custom_fields
|
|
@custom_fields ||= {}
|
|
end
|
|
|
|
|
|
def sign(payload)
|
|
OpenSSL::HMAC.hexdigest("sha256", sso_secret, payload)
|
|
end
|
|
|
|
|
|
def to_url(base_url=nil)
|
|
base = "#{base_url || sso_url}"
|
|
"#{base}#{base.include?('?') ? '&' : '?'}#{payload}"
|
|
end
|
|
|
|
def payload
|
|
payload = Base64.encode64(unsigned_payload)
|
|
"sso=#{CGI::escape(payload)}&sig=#{sign(payload)}"
|
|
end
|
|
|
|
def unsigned_payload
|
|
payload = {}
|
|
ACCESSORS.each do |k|
|
|
next unless (val = send k)
|
|
|
|
payload[k] = val
|
|
end
|
|
|
|
if @custom_fields
|
|
@custom_fields.each do |k,v|
|
|
payload["custom.#{k}"] = v.to_s
|
|
end
|
|
end
|
|
|
|
Rack::Utils.build_query(payload)
|
|
end
|
|
|
|
end
|