lib/tdiary/rack/auth/omniauth/authorization.rb in tdiary-5.2.4 vs lib/tdiary/rack/auth/omniauth/authorization.rb in tdiary-5.3.0

- old
+ new

@@ -30,29 +30,29 @@ def login(env) STDERR.puts "use #{@provider} authentication strategy" req = ::Rack::Request.new(env) env['rack.session']['tdiary.auth.redirect'] = "#{req.base_url}#{req.fullpath}" redirect = File.join("#{req.base_url}#{req.path}", "#{::OmniAuth.config.path_prefix}/#{@provider}") - [302, {'Content-Type' => 'text/plain', 'Location' => redirect}, []] + [302, {'content-type' => 'text/plain', 'location' => redirect}, []] end def logout(env) env['rack.session']['user_id'] = nil end def forbidden - [403, {'Content-Type' => 'text/plain'}, ['forbidden']] + [403, {'content-type' => 'text/plain'}, ['forbidden']] end def callback(env) # reset sesstion to prevend session fixation attack # see: http://www.ipa.go.jp/security/vuln/documents/website_security.pdf (section 1.4) env['rack.session.options'][:renew] = true auth = env['omniauth.auth'] env['rack.session']['auth'] = auth env['REMOTE_USER'] = "#{auth.uid}@#{auth.provider}" redirect = env['rack.session']['tdiary.auth.redirect'] || '/' - [302, {'Content-Type' => 'text/plain', 'Location' => redirect}, []] + [302, {'content-type' => 'text/plain', 'location' => redirect}, []] end def authenticate?(env) env['omniauth.auth'] || env['rack.session']['auth'] end