Skip to content

Commit 6c8f139

Browse files
author
Jorge
committed
- /authenticate/:provider routes can now receive a 'redirectTo' parameter. This is where the user is redirected
after succesful authentication (if used overrides the url set in OriginalUrl by SecuredAction) - ProviderController.authenticate signature changed. Breaks compatibility: routes file needs to be adjusted (see sample apps) - Added support for linking accounts. New 'link' method in UserService needs to be implemented. - Update messages.fr for single quotes (thanks @fmasion) - Small fixes for NL messages (thanks @francisdb) - Added German translation (thanks @l0rdn1kk0n) - Added Arabic translation (thanks @ahimta) - Added Brazilian Portuguese translation (thanks @jeohalves)
1 parent 12b608f commit 6c8f139

25 files changed

+443
-58
lines changed

ChangeLog

+10-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,13 @@
1-
master -
1+
master -
2+
- /authenticate/:provider routes can now receive a 'redirectTo' parameter. This is where the user is redirected
3+
after succesful authentication (if used overrides the url set in OriginalUrl by SecuredAction)
4+
- ProviderController.authenticate signature changed. Breaks compatibility: routes file needs to be adjusted (see sample apps)
5+
- Added support for linking accounts. New 'link' method in UserService needs to be implemented.
6+
- Update messages.fr for single quotes (thanks @fmasion)
7+
- Small fixes for NL messages (thanks @francisdb)
8+
- Added German translation (thanks @l0rdn1kk0n)
9+
- Added Arabic translation (thanks @Ahimta)
10+
- Added Brazilian Portuguese translation (thanks @jeohalves)
211
- Added Polish translation (thanks Dominik Sienkiewicz)
312
- Added Spanish translation (thanks @jorgeolmos)
413
- Added Hungarian translation (thanks @bubbanat)

docs/src/manual/source/guide/user-service.md

+22-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ file: user-service
33
---
44
# UserService
55

6-
SecureSocial relies on an implementation of `UserService` to handle all the operations related to saving/finding users. Using this delegation model you are not forced to use a particular model object or a persistence mechanism but rather provide a service that translates back and forth between your models and what SecureSocial understands.
6+
SecureSocial relies on an implementation of `UserService` to handle all the operations related to saving/finding users and linkind different external accounts to a local user. Using this delegation model you are not forced to use a particular model object or a persistence mechanism but rather provide a service that translates back and forth between your models and what SecureSocial understands.
77

88
Besides users, this service is also in charge of persisting the tokens that are used in signup and reset password requests. Some of these methods are only required if you are going to use the `UsernamePasswordProvider`. If you do not plan to use it just provide an empty implementation for them. Check the documentation in the source code to know which ones are optional.
99

@@ -82,6 +82,16 @@ For Scala you need to extend the `UserServicePlugin`. For example:
8282
def save(user: Identity) {
8383
// implement me
8484
}
85+
86+
/**
87+
* Links the current user Identity to another
88+
*
89+
* @param current The Identity of the current user
90+
* @param to The Identity that needs to be linked to the current user
91+
*/
92+
def link(current: Identity, to: Identity) {
93+
// implement me
94+
}
8595

8696
/**
8797
* Saves a token. This is needed for users that
@@ -154,6 +164,16 @@ For Java, you need to extend the `BaseUserService` class.
154164
// implement me
155165
}
156166

167+
/**
168+
* Links the current user Identity to another
169+
*
170+
* @param current The Identity of the current user
171+
* @param to The Identity that needs to be linked to the current user
172+
*/
173+
public void doLink(Identity current, Identity to) {
174+
// implement me
175+
}
176+
157177
/**
158178
* Finds an Identity in the backing store.
159179
* @return an Identity instance or null if no user matches the specified id
@@ -231,3 +251,4 @@ For Java, you need to extend the `BaseUserService` class.
231251
# Important
232252

233253
Note that the `Token` class is implemented in Scala and Java. Make sure you import the one that matches the language you are using in your `UserService` implementation.
254+

module-code/app/securesocial/controllers/ProviderController.scala

+43-6
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,13 @@ import providers.utils.RoutesHelper
2525
import securesocial.core.LoginEvent
2626
import securesocial.core.AccessDeniedException
2727
import scala.Some
28+
import play.api.http.HeaderNames
2829

2930

3031
/**
3132
* A controller to provide the authentication entry point
3233
*/
33-
object ProviderController extends Controller
34+
object ProviderController extends Controller with SecureSocial
3435
{
3536
/**
3637
* The property that specifies the page the user is redirected to if there is no original URL saved in
@@ -82,15 +83,51 @@ object ProviderController extends Controller
8283
* @param provider The id of the provider that needs to handle the call
8384
* @return
8485
*/
85-
def authenticate(provider: String) = handleAuth(provider)
86-
def authenticateByPost(provider: String) = handleAuth(provider)
86+
def authenticate(provider: String, redirectTo: Option[String] = None) = handleAuth(provider, redirectTo)
87+
def authenticateByPost(provider: String, redirectTo: Option[String] = None) = handleAuth(provider, redirectTo)
88+
89+
private def overrideOriginalUrl(session: Session, redirectTo: Option[String]) = redirectTo match {
90+
case Some(url) =>
91+
session + (SecureSocial.OriginalUrlKey -> url)
92+
case _ =>
93+
session
94+
}
95+
96+
private def handleAuth(provider: String, redirectTo: Option[String]) = UserAwareAction { implicit request =>
97+
val authenticationFlow = request.user.isEmpty
98+
val modifiedSession = overrideOriginalUrl(session, redirectTo)
8799

88-
private def handleAuth(provider: String) = Action { implicit request =>
89100
Registry.providers.get(provider) match {
90101
case Some(p) => {
91102
try {
92-
p.authenticate().fold( result => result , {
93-
user => completeAuthentication(user, session)
103+
p.authenticate().fold( result => {
104+
redirectTo match {
105+
case Some(url) =>
106+
val cookies = Cookies(result.header.headers.get(HeaderNames.SET_COOKIE))
107+
val resultSession = Session.decodeFromCookie(cookies.get(Session.COOKIE_NAME))
108+
result.withSession(resultSession + (SecureSocial.OriginalUrlKey -> url))
109+
case _ => result
110+
}
111+
} , {
112+
user => if ( authenticationFlow ) {
113+
val saved = UserService.save(user)
114+
completeAuthentication(saved, modifiedSession)
115+
} else {
116+
request.user match {
117+
case Some(currentUser) =>
118+
UserService.link(currentUser, user)
119+
if ( Logger.isDebugEnabled ) {
120+
Logger.debug(s"[securesocial] linked $currentUser to $user")
121+
}
122+
// improve this, I'm duplicating part of the code in completeAuthentication
123+
Redirect(toUrl(modifiedSession)).withSession(modifiedSession-
124+
SecureSocial.OriginalUrlKey -
125+
IdentityProvider.SessionId -
126+
OAuth1Provider.CacheKey)
127+
case _ =>
128+
Unauthorized
129+
}
130+
}
94131
})
95132
} catch {
96133
case ex: AccessDeniedException => {

module-code/app/securesocial/core/IdentityProvider.scala

+6-10
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
package securesocial.core
1818

1919
import providers.utils.RoutesHelper
20-
import play.api.mvc.{AnyContent, Request, Result}
20+
import play.api.mvc.{SimpleResult, AnyContent, Request}
2121
import play.api.{Play, Application, Logger, Plugin}
2222
import concurrent.{Await, Future}
2323
import play.api.libs.ws.Response
@@ -70,15 +70,10 @@ abstract class IdentityProvider(application: Application) extends Plugin with Re
7070
* @param request
7171
* @return
7272
*/
73-
def authenticate()(implicit request: Request[AnyContent]):Either[Result, Identity] = {
73+
def authenticate()(implicit request: Request[AnyContent]):Either[SimpleResult, Identity] = {
7474
doAuth().fold(
7575
result => Left(result),
76-
u =>
77-
{
78-
val user = fillProfile(u)
79-
val saved = UserService.save(user)
80-
Right(saved)
81-
}
76+
u => Right(fillProfile(u))
8277
)
8378
}
8479

@@ -87,7 +82,8 @@ abstract class IdentityProvider(application: Application) extends Plugin with Re
8782
* to the provider url.
8883
* @return
8984
*/
90-
def authenticationUrl:String = RoutesHelper.authenticate(id).url
85+
def authenticationUrl: String = RoutesHelper.authenticate(id).url
86+
def authenticationUrl(redirectTo: String): String = RoutesHelper.authenticate(id, Some(redirectTo)).url
9187

9288
/**
9389
* The property key used for all the provider properties.
@@ -117,7 +113,7 @@ abstract class IdentityProvider(application: Application) extends Plugin with Re
117113
* @param request
118114
* @return Either a Result or a User
119115
*/
120-
def doAuth()(implicit request: Request[AnyContent]):Either[Result, SocialUser]
116+
def doAuth()(implicit request: Request[AnyContent]):Either[SimpleResult, SocialUser]
121117

122118
/**
123119
* Subclasses need to implement this method to populate the User object with profile

module-code/app/securesocial/core/OAuth1Provider.scala

+2-2
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ import play.api.cache.Cache
2121
import play.api.libs.oauth.{RequestToken, ConsumerKey, OAuth, ServiceInfo}
2222
import play.api.{Application, Logger, Play}
2323
import providers.utils.RoutesHelper
24-
import play.api.mvc.{AnyContent, Request, Result}
24+
import play.api.mvc.{SimpleResult, AnyContent, Request}
2525
import play.api.mvc.Results.Redirect
2626
import Play.current
2727

@@ -53,7 +53,7 @@ abstract class OAuth1Provider(application: Application) extends IdentityProvider
5353
}
5454

5555

56-
def doAuth()(implicit request: Request[AnyContent]):Either[Result, SocialUser] = {
56+
def doAuth()(implicit request: Request[AnyContent]):Either[SimpleResult, SocialUser] = {
5757
if ( request.queryString.get("denied").isDefined ) {
5858
// the user did not grant access to the account
5959
throw new AccessDeniedException()

module-code/app/securesocial/core/OAuth2Provider.scala

+5-3
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,12 @@ import _root_.java.util.UUID
2121
import play.api.{Logger, Play, Application}
2222
import play.api.cache.Cache
2323
import Play.current
24-
import play.api.mvc.{AnyContent, Results, Result, Request}
24+
import play.api.mvc._
2525
import providers.utils.RoutesHelper
26-
import play.api.libs.ws.{Response, WS}
26+
import play.api.libs.ws.WS
2727
import scala.collection.JavaConversions._
28+
import play.api.libs.ws.Response
29+
import scala.Some
2830

2931
/**
3032
* Base class for all OAuth2 providers
@@ -90,7 +92,7 @@ abstract class OAuth2Provider(application: Application, jsonResponse: Boolean =
9092
)
9193
}
9294

93-
def doAuth()(implicit request: Request[AnyContent]): Either[Result, SocialUser] = {
95+
def doAuth()(implicit request: Request[AnyContent]): Either[SimpleResult, SocialUser] = {
9496
request.queryString.get(OAuth2Constants.Error).flatMap(_.headOption).map( error => {
9597
error match {
9698
case OAuth2Constants.AccessDenied => throw new AccessDeniedException()

module-code/app/securesocial/core/UserService.scala

+14
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,14 @@ trait UserService {
5656
*/
5757
def save(user: Identity): Identity
5858

59+
/**
60+
* Links the current user Identity to another
61+
*
62+
* @param current The Identity of the current user
63+
* @param to The Identity that needs to be linked to the current user
64+
*/
65+
def link(current: Identity, to: Identity)
66+
5967
/**
6068
* Saves a token. This is needed for users that
6169
* are creating an account in the system instead of using one in a 3rd party system.
@@ -171,6 +179,12 @@ object UserService {
171179
}
172180
}
173181

182+
def link(current: Identity, to: Identity) {
183+
delegate.map( _.link(current, to) ).getOrElse {
184+
notInitialized()
185+
}
186+
}
187+
174188
def save(token: Token) {
175189
delegate.map( _.save(token) ).getOrElse {
176190
notInitialized()

module-code/app/securesocial/core/java/BaseUserService.java

+18
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,16 @@ public Identity save(securesocial.core.Identity user) {
8888
return doSave(user);
8989
}
9090

91+
/**
92+
* Links the current user Identity to another
93+
*
94+
* @param current The Identity of the current user
95+
* @param to The Identity that needs to be linked to the current user
96+
*/
97+
@Override
98+
public void link(Identity current, Identity to) {
99+
doLink(current, to);
100+
}
91101
/**
92102
* Saves a token. This is needed for users that
93103
* are creating an account in the system instead of using one in a 3rd party system.
@@ -162,6 +172,14 @@ public void deleteExpiredTokens() {
162172
*/
163173
public abstract void doSave(Token token);
164174

175+
/**
176+
* Links the current user Identity to another
177+
*
178+
* @param current The Identity of the current user
179+
* @param to The Identity that needs to be linked to the current user
180+
*/
181+
public abstract void doLink(Identity current, Identity to);
182+
165183
/**
166184
* Finds the user in the backing store.
167185
* @return an Identity instance or null if no user matches the specified id

module-code/app/securesocial/core/providers/UsernamePasswordProvider.scala

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ class UsernamePasswordProvider(application: Application) extends IdentityProvide
4141

4242
val InvalidCredentials = "securesocial.login.invalidCredentials"
4343

44-
def doAuth()(implicit request: Request[AnyContent]): Either[Result, SocialUser] = {
44+
def doAuth()(implicit request: Request[AnyContent]): Either[SimpleResult, SocialUser] = {
4545
val form = UsernamePasswordProvider.loginForm.bindFromRequest()
4646
form.fold(
4747
errors => Left(badRequest(errors)(request)),

module-code/app/securesocial/core/providers/utils/RoutesHelper.scala

+4-4
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,13 @@ object RoutesHelper {
3131
// ProviderController
3232
lazy val pc = Play.application().classloader().loadClass("securesocial.controllers.ReverseProviderController")
3333
lazy val providerControllerMethods = pc.newInstance().asInstanceOf[{
34-
def authenticateByPost(p: String): Call
35-
def authenticate(p: String): Call
34+
def authenticateByPost(p: String, redirectTo: Option[String]): Call
35+
def authenticate(p: String, redirectTo: Option[String]): Call
3636
def notAuthorized: Call
3737
}]
3838

39-
def authenticateByPost(provider:String): Call = providerControllerMethods.authenticateByPost(provider)
40-
def authenticate(provider:String): Call = providerControllerMethods.authenticate(provider)
39+
def authenticateByPost(provider:String, redirectTo: Option[String] = None): Call = providerControllerMethods.authenticateByPost(provider, redirectTo)
40+
def authenticate(provider:String, redirectTo: Option[String] = None): Call = providerControllerMethods.authenticate(provider, redirectTo)
4141
def notAuthorized: Call = providerControllerMethods.notAuthorized
4242

4343
// LoginPage

module-code/app/securesocial/views/main.scala.html

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
<link rel="stylesheet" media="screen" href="@RoutesHelper.bootstrapCssPath">
1010
<link rel="shortcut icon" type="image/png" href="@RoutesHelper.faviconPath">
1111
<link rel="stylesheet" media="screen" href="@RoutesHelper.customCssPath.getOrElse("")">
12+
<meta http-equiv="Content-Type" content="text/html;charset=UTF-8">
1213
<script src="@RoutesHelper.jqueryPath" type="text/javascript"></script>
1314
</head>
1415
<body>

module-code/conf/messages.es

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ securesocial.signup.createAccount=Crear Cuenta
2626
securesocial.signup.cancel=Cancelar
2727
securesocial.signup.userNameAlreadyTaken=El nombre de Usuario ya esta tomado
2828
securesocial.signup.passwordsDoNotMatch=Las Contraseñas no coinciden
29-
securesocial.signup.thankYouCheckEmail=Gracias. Pof favor revise su email para más instrucciones
29+
securesocial.signup.thankYouCheckEmail=Gracias. Por favor revise su email para más instrucciones
3030
securesocial.signup.invalidLink=El enlace que siguió no es válido
3131
securesocial.signup.signUpDone=Gracias por registrarse. Ahora puede iniciar Sesión
3232
securesocial.signup.invalidPassword=Ingrese al menos {0} caracteres

samples/java/demo/app/controllers/Application.java

+15
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,16 @@
1616
*/
1717
package controllers;
1818

19+
import play.Play;
1920
import play.mvc.Controller;
2021
import play.mvc.Result;
2122
import securesocial.core.Identity;
23+
import securesocial.core.java.BaseUserService;
2224
import securesocial.core.java.SecureSocial;
25+
import service.InMemoryUserService;
2326
import views.html.index;
27+
import views.html.linkResult;
28+
2429

2530
/**
2631
* A sample controller
@@ -48,4 +53,14 @@ public static Result userAware() {
4853
public static Result onlyTwitter() {
4954
return ok("You are seeing this because you logged in using Twitter");
5055
}
56+
57+
@SecureSocial.SecuredAction
58+
public static Result linkResult() {
59+
Identity identity = (Identity) ctx().args.get(SecureSocial.USER_KEY);
60+
// get the user identities
61+
InMemoryUserService service = (InMemoryUserService) Play.application().plugin(BaseUserService.class);
62+
InMemoryUserService.User user = service.userForIdentity(identity);
63+
64+
return ok(linkResult.render(identity, user.identities));
65+
}
5166
}

0 commit comments

Comments
 (0)