lib/simple_oauth/header.rb in simple_oauth-0.2.0 vs lib/simple_oauth/header.rb in simple_oauth-0.3.0

- old
+ new

@@ -12,37 +12,36 @@ def default_options { :nonce => OpenSSL::Random.random_bytes(16).unpack('H*')[0], :signature_method => 'HMAC-SHA1', :timestamp => Time.now.to_i.to_s, - :version => '1.0' + :version => '1.0', } end def parse(header) header.to_s.sub(/^OAuth\s/, '').split(/,\s*/).inject({}) do |attributes, pair| match = pair.match(/^(\w+)\=\"([^\"]*)\"$/) - attributes.merge(match[1].sub(/^oauth_/, '').to_sym => decode(match[2])) + attributes.merge(match[1].sub(/^oauth_/, '').to_sym => unescape(match[2])) end end def escape(value) uri_parser.escape(value.to_s, /[^a-z0-9\-\.\_\~]/i) end - alias encode escape + alias_method :encode, :escape def unescape(value) uri_parser.unescape(value.to_s) end - alias decode unescape + alias_method :decode, :unescape private def uri_parser @uri_parser ||= URI.const_defined?(:Parser) ? URI::Parser.new : URI end - end def initialize(method, url, params, oauth = {}) @method = method.to_s.upcase @uri = URI.parse(url.to_s) @@ -76,15 +75,20 @@ end private def normalized_attributes - signed_attributes.sort_by{|k,v| k.to_s }.map{|k,v| %(#{k}="#{self.class.encode(v)}") }.join(', ') + signed_attributes.sort_by { |k, _| k.to_s }.collect { |k, v| %(#{k}="#{self.class.escape(v)}") }.join(', ') end def attributes - ATTRIBUTE_KEYS.inject({}){|a,k| options[k] ? a.merge(:"oauth_#{k}" => options[k]) : a } + matching_keys, extra_keys = options.keys.partition { |key| ATTRIBUTE_KEYS.include?(key) } + if options[:ignore_extra_keys] || extra_keys.empty? + Hash[options.select { |key, _value| matching_keys.include?(key) }.collect { |key, value| [:"oauth_#{key}", value] }] + else + fail "SimpleOAuth: Found extra option keys not matching ATTRIBUTE_KEYS:\n [#{extra_keys.collect(&:inspect).join(', ')}]" + end end def signature send(options[:signature_method].downcase.tr('-', '_') + '_signature') end @@ -92,35 +96,34 @@ def hmac_sha1_signature Base64.encode64(OpenSSL::HMAC.digest(OpenSSL::Digest::SHA1.new, secret, signature_base)).chomp.gsub(/\n/, '') end def secret - options.values_at(:consumer_secret, :token_secret).map{|v| self.class.encode(v) }.join('&') + options.values_at(:consumer_secret, :token_secret).collect { |v| self.class.escape(v) }.join('&') end alias_method :plaintext_signature, :secret def signature_base - [method, url, normalized_params].map{|v| self.class.encode(v) }.join('&') + [method, url, normalized_params].collect { |v| self.class.escape(v) }.join('&') end def normalized_params - signature_params.map{|p| p.map{|v| self.class.encode(v) } }.sort.map{|p| p.join('=') }.join('&') + signature_params.collect { |p| p.collect { |v| self.class.escape(v) } }.sort.collect { |p| p.join('=') }.join('&') end def signature_params attributes.to_a + params.to_a + url_params end def url_params - CGI.parse(@uri.query || '').inject([]){|p,(k,vs)| p + vs.sort.map{|v| [k, v] } } + CGI.parse(@uri.query || '').inject([]) { |p, (k, vs)| p + vs.sort.collect { |v| [k, v] } } end def rsa_sha1_signature Base64.encode64(private_key.sign(OpenSSL::Digest::SHA1.new, signature_base)).chomp.gsub(/\n/, '') end def private_key OpenSSL::PKey::RSA.new(options[:consumer_secret]) end - end end