session.rb 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. # frozen_string_literal: true
  2. require 'openssl'
  3. require 'rack'
  4. module ShopifyAPI
  5. class ValidationException < StandardError
  6. end
  7. class Session
  8. cattr_accessor :api_key, :secret, :myshopify_domain
  9. self.myshopify_domain = 'myshopify.com'
  10. attr_accessor :domain, :token, :name, :extra
  11. attr_reader :api_version
  12. alias_method :url, :domain
  13. class << self
  14. def setup(params)
  15. params.each { |k,value| public_send("#{k}=", value) }
  16. end
  17. def temp(domain:, token:, api_version: ShopifyAPI::Base.api_version, &block)
  18. session = new(domain: domain, token: token, api_version: api_version)
  19. with_session(session, &block)
  20. end
  21. def with_session(session, &_block)
  22. original_session = extract_current_session
  23. original_user = ShopifyAPI::Base.user
  24. original_password = ShopifyAPI::Base.password
  25. begin
  26. ShopifyAPI::Base.clear_session
  27. ShopifyAPI::Base.activate_session(session)
  28. yield
  29. ensure
  30. ShopifyAPI::Base.activate_session(original_session)
  31. ShopifyAPI::Base.user = original_user
  32. ShopifyAPI::Base.password = original_password
  33. end
  34. end
  35. def with_version(api_version, &block)
  36. original_session = extract_current_session
  37. session = new(domain: original_session.site, token: original_session.token, api_version: api_version)
  38. with_session(session, &block)
  39. end
  40. def prepare_domain(domain)
  41. return nil if domain.blank?
  42. # remove http:// or https://
  43. domain = domain.strip.gsub(%r{\Ahttps?://}, '')
  44. # extract host, removing any username, password or path
  45. shop = URI.parse("https://#{domain}").host
  46. # extract subdomain of .myshopify.com
  47. if (idx = shop.index("."))
  48. shop = shop.slice(0, idx)
  49. end
  50. return nil if shop.empty?
  51. "#{shop}.#{myshopify_domain}"
  52. rescue URI::InvalidURIError
  53. nil
  54. end
  55. def validate_signature(params)
  56. params = (params.respond_to?(:to_unsafe_hash) ? params.to_unsafe_hash : params).with_indifferent_access
  57. return false unless (signature = params[:hmac])
  58. calculated_signature = OpenSSL::HMAC.hexdigest(
  59. OpenSSL::Digest.new('SHA256'), secret, encoded_params_for_signature(params)
  60. )
  61. Rack::Utils.secure_compare(calculated_signature, signature)
  62. end
  63. private
  64. def encoded_params_for_signature(params)
  65. params = params.except(:signature, :hmac, :action, :controller)
  66. params.map { |k,v| "#{URI.escape(k.to_s, '&=%')}=#{URI.escape(v.to_s, '&%')}" }.sort.join('&')
  67. end
  68. def extract_current_session
  69. site = ShopifyAPI::Base.site.to_s
  70. token = ShopifyAPI::Base.headers['X-Shopify-Access-Token']
  71. version = ShopifyAPI::Base.api_version
  72. new(domain: site, token: token, api_version: version)
  73. end
  74. end
  75. def initialize(domain:, token:, api_version: ShopifyAPI::Base.api_version, extra: {})
  76. self.domain = self.class.prepare_domain(domain)
  77. self.api_version = api_version
  78. self.token = token
  79. self.extra = extra
  80. end
  81. def create_permission_url(scope, redirect_uri, options = {})
  82. params = { client_id: api_key, scope: scope.join(','), redirect_uri: redirect_uri }
  83. params[:state] = options[:state] if options[:state]
  84. construct_oauth_url("authorize", params)
  85. end
  86. def request_token(params)
  87. return token if token
  88. unless self.class.validate_signature(params) && params[:timestamp].to_i > 24.hours.ago.utc.to_i
  89. raise ShopifyAPI::ValidationException, "Invalid Signature: Possible malicious login"
  90. end
  91. response = access_token_request(params[:code])
  92. if response.code == "200"
  93. self.extra = JSON.parse(response.body)
  94. self.token = extra.delete('access_token')
  95. if (expires_in = extra.delete('expires_in'))
  96. extra['expires_at'] = Time.now.utc.to_i + expires_in
  97. end
  98. token
  99. else
  100. raise RuntimeError, response.msg
  101. end
  102. end
  103. def shop
  104. Shop.current
  105. end
  106. def site
  107. "https://#{domain}"
  108. end
  109. def api_version=(version)
  110. @api_version = if ApiVersion::NullVersion.matches?(version)
  111. ApiVersion::NullVersion
  112. else
  113. ApiVersion.find_version(version)
  114. end
  115. end
  116. def valid?
  117. domain.present? && token.present? && api_version.is_a?(ApiVersion)
  118. end
  119. def expires_in
  120. return unless expires_at.present?
  121. [0, expires_at.to_i - Time.now.utc.to_i].max
  122. end
  123. def expires_at
  124. return unless extra.present?
  125. @expires_at ||= Time.at(extra['expires_at']).utc
  126. end
  127. def expired?
  128. return false if expires_in.nil?
  129. expires_in <= 0
  130. end
  131. def hash
  132. state.hash
  133. end
  134. def ==(other)
  135. self.class == other.class && state == other.state
  136. end
  137. alias_method :eql?, :==
  138. protected
  139. def state
  140. [domain, token, api_version, extra]
  141. end
  142. private
  143. def parameterize(params)
  144. URI.escape(params.collect { |k, v| "#{k}=#{v}" }.join('&'))
  145. end
  146. def access_token_request(code)
  147. uri = URI.parse(construct_oauth_url('access_token'))
  148. https = Net::HTTP.new(uri.host, uri.port)
  149. https.use_ssl = true
  150. request = Net::HTTP::Post.new(uri.request_uri)
  151. request.set_form_data('client_id' => api_key, 'client_secret' => secret, 'code' => code)
  152. https.request(request)
  153. end
  154. def construct_oauth_url(path, query_params = {})
  155. query_string = "?#{parameterize(query_params)}" unless query_params.empty?
  156. "https://#{domain}/admin/oauth/#{path}#{query_string}"
  157. end
  158. end
  159. end