X-Git-Url: https://git.openstreetmap.org./rails.git/blobdiff_plain/2f9291ba5764fe104264ae7e3b6a361e11212e8b..952188c814382b4ee0a90f6fc6084542dd113e75:/app/controllers/oauth_controller.rb diff --git a/app/controllers/oauth_controller.rb b/app/controllers/oauth_controller.rb index 0954071a5..62a68b533 100644 --- a/app/controllers/oauth_controller.rb +++ b/app/controllers/oauth_controller.rb @@ -1,5 +1,3 @@ -require "oauth/controllers/provider_controller" - class OauthController < ApplicationController include OAuth::Controllers::ProviderController @@ -7,8 +5,12 @@ class OauthController < ApplicationController # a login, but we want to check authorization on every action. authorize_resource :class => false + before_action :require_oauth_10a_support + layout "site" + allow_all_form_action :only => :oauth1_authorize + def revoke @token = current_user.oauth_tokens.find_by :token => params[:token] if @token @@ -29,7 +31,7 @@ class OauthController < ApplicationController any_auth = false @token.client_application.permissions.each do |pref| - if params[pref] + if params[pref].to_i.nonzero? @token.write_attribute(pref, true) any_auth ||= true else @@ -41,8 +43,6 @@ class OauthController < ApplicationController end def oauth1_authorize - override_content_security_policy_directives(:form_action => []) if CSP_ENFORCE || defined?(CSP_REPORT_URL) - if @token.invalidated? @message = t "oauth.authorize_failure.invalid" render :action => "authorize_failure" @@ -68,7 +68,7 @@ class OauthController < ApplicationController @redirect_url.query += "&oauth_verifier=#{@token.verifier}" unless @token.oauth10? - redirect_to @redirect_url.to_s + redirect_to @redirect_url.to_s, :allow_other_host => true end else @token.invalidate!