@see tools.ietf.org/html/draft-ietf-oauth-v2-10#section-4.1.3
Sample usage:
client = OAuth2::Client.new(client_id, client_secret, :site => 'http://localhost:8080') params = {:hmac_secret => "some secret", # or :private_key => "private key string", :iss => "http://localhost:3001", :prn => "me@here.com", :exp => Time.now.utc.to_i + 3600} access = client.assertion.get_token(params) access.token # actual access_token string access.get("/api/stuff") # making api calls with access token in header
# File lib/oauth2/strategy/assertion.rb, line 60 def build_assertion(params) claims = {:iss => params[:iss], :aud => params[:aud], :prn => params[:prn], :exp => params[:exp] } if params[:hmac_secret] jwt_assertion = JWT.encode(claims, params[:hmac_secret], "HS256") elsif params[:private_key] jwt_assertion = JWT.encode(claims, params[:private_key], "RS256") end end
# File lib/oauth2/strategy/assertion.rb, line 51 def build_request(params) assertion = build_assertion(params) {:grant_type => "assertion", :assertion_type => "urn:ietf:params:oauth:grant-type:jwt-bearer", :assertion => assertion, :scope => params[:scope] }.merge(client_params) end
Retrieve an access token given the specified client.
@param [Hash] params assertion params pass either :hmac_secret or :private_key, but not both.
params :hmac_secret, secret string. params :private_key, private key string. params :iss, issuer params :aud, audience, optional params :prn, principal, current user params :exp, expired at, in seconds, like Time.now.utc.to_i + 3600
@param [Hash] opts options
# File lib/oauth2/strategy/assertion.rb, line 46 def get_token(params={}, opts={}) hash = build_request(params) @client.get_token(hash, opts.merge('refresh_token' => nil)) end
Generated with the Darkfish Rdoc Generator 2.