summaryrefslogtreecommitdiffstats
path: root/src/OpenID/OpenIdProviderWebForms/Code/InMemoryTokenManager.cs
blob: c391291120414a383152134f8d34b9c0f3feddfe (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
//-----------------------------------------------------------------------
// <copyright file="InMemoryTokenManager.cs" company="Outercurve Foundation">
//     Copyright (c) Outercurve Foundation. All rights reserved.
// </copyright>
//-----------------------------------------------------------------------

namespace OpenIdProviderWebForms.Code {
	using System;
	using System.Collections.Generic;
	using System.Linq;
	using System.Web;
	using DotNetOpenAuth.OAuth.ChannelElements;
	using DotNetOpenAuth.OAuth.Messages;
	using DotNetOpenAuth.OpenId.Extensions.OAuth;

	/// <summary>
	/// A simple in-memory token manager.  JUST FOR PURPOSES OF KEEPING THE SAMPLE SIMPLE.
	/// </summary>
	/// <remarks>
	/// This is merely a sample app.  A real web app SHOULD NEVER store a memory-only
	/// token manager in application.  It should be an IServiceProviderTokenManager
	/// implementation that is bound to a database.
	/// </remarks>
	public class InMemoryTokenManager : IServiceProviderTokenManager, IOpenIdOAuthTokenManager, ICombinedOpenIdProviderTokenManager {
		private Dictionary<string, InMemoryServiceProviderRequestToken> requestTokens = new Dictionary<string, InMemoryServiceProviderRequestToken>();
		private Dictionary<string, InMemoryServiceProviderAccessToken> accessTokens = new Dictionary<string, InMemoryServiceProviderAccessToken>();

		/// <summary>
		/// Initializes a new instance of the <see cref="InMemoryTokenManager"/> class.
		/// </summary>
		internal InMemoryTokenManager() {
		}

		#region IServiceProviderTokenManager Members

		public IConsumerDescription GetConsumer(string consumerKey) {
			return new InMemoryConsumerDescription {
				Key = consumerKey,
				Secret = "some crazy secret",
			};
		}

		public IServiceProviderRequestToken GetRequestToken(string token) {
			return this.requestTokens[token];
		}

		public IServiceProviderAccessToken GetAccessToken(string token) {
			throw new NotImplementedException();
		}

		public void UpdateToken(IServiceProviderRequestToken token) {
			// Nothing to do here, since there's no database in this sample.
		}

		#endregion

		#region ITokenManager Members

		public string GetTokenSecret(string token) {
			if (this.requestTokens.ContainsKey(token)) {
				return this.requestTokens[token].Secret;
			} else {
				return this.accessTokens[token].Secret;
			}
		}

		public void StoreNewRequestToken(DotNetOpenAuth.OAuth.Messages.UnauthorizedTokenRequest request, DotNetOpenAuth.OAuth.Messages.ITokenSecretContainingMessage response) {
			throw new NotImplementedException();
		}

		public bool IsRequestTokenAuthorized(string requestToken) {
			// In OpenID+OAuth scenarios, request tokens are always authorized.
			return true;
		}

		public void ExpireRequestTokenAndStoreNewAccessToken(string consumerKey, string requestToken, string accessToken, string accessTokenSecret) {
			this.requestTokens.Remove(requestToken);
			this.accessTokens[accessToken] = new InMemoryServiceProviderAccessToken {
				Token = accessToken,
				Secret = accessTokenSecret,
			};
		}

		public TokenType GetTokenType(string token) {
			if (this.requestTokens.ContainsKey(token)) {
				return TokenType.RequestToken;
			} else if (this.accessTokens.ContainsKey(token)) {
				return TokenType.AccessToken;
			} else {
				return TokenType.InvalidToken;
			}
		}

		#endregion

		#region IOpenIdOAuthTokenManager Members

		public void StoreOpenIdAuthorizedRequestToken(string consumerKey, AuthorizationApprovedResponse authorization) {
			this.requestTokens[authorization.RequestToken] = new InMemoryServiceProviderRequestToken {
				Token = authorization.RequestToken,
				Scope = authorization.Scope,
				ConsumerVersion = authorization.Version,
			};
		}

		#endregion

		#region ICombinedOpenIdProviderTokenManager Members

		public string GetConsumerKey(DotNetOpenAuth.OpenId.Realm realm) {
			// We just use the realm as the consumer key, like Google does.
			return realm;
		}

		#endregion
	}
}