Omniauth-Facebook: 如何获得长期访问令牌?

4
我跟随Ryan Bates的教程来帮助我设置 ominauth-facebook,但是他的教程只展示了如何使用短期访问令牌(一两个小时)进行设置。我们如何修改他的教程以使用长期访问令牌(60天)进行设置?
我已经阅读了Facebook文档和这个较旧的SO问题
这两个链接都建议添加以下代码(尽管每个代码略有不同):
GET /oauth/access_token?  
    grant_type=fb_exchange_token&           
    client_id={app-id}&
    client_secret={app-secret}&
    fb_exchange_token={short-lived-token}

这个应该添加在哪里?

从我所读的来看,似乎他们把这个问题弄得比应该的更加复杂了。有人能用初学者友好的语言解释一下吗?

让我们变得个人化。

我的代码与Mr. Bates的代码略有不同。

initializers/ominauth.rb

Rails.application.config.middleware.use OmniAuth::Builder do
  provider :facebook, "1540352575225959", "ee957abf5e851c98574cdfaebb1355f4", {:scope => 'user_about_me'}
end

routes.rb

get 'auth/:provider/callback', to: 'sessions#facebook'

sessions_controller

  def facebook
    user = User.from_omniauth(env["omniauth.auth"])
    session[:user_id] = user.id
    redirect_to root_url
  end

user.rb

class User < ActiveRecord::Base
  acts_as_tagger
  acts_as_taggable
  has_many :notifications
  has_many :activities
  has_many :liked_comments, through: :comment_likes, class_name: 'Comment', source: :liked_comment
  has_many :valuation_likes
  has_many :habit_likes
  has_many :goal_likes
  has_many :stat_likes
  has_many :comment_likes
  has_many :authentications
  has_many :habits, dependent: :destroy
  has_many :levels
  has_many :valuations, dependent: :destroy
  has_many :comments
  has_many :goals, dependent: :destroy
  has_many :stats, dependent: :destroy
  has_many :results, through: :stats
  has_many :notes
  accepts_nested_attributes_for :habits, :reject_if => :all_blank, :allow_destroy => true
  accepts_nested_attributes_for :notes, :reject_if => :all_blank, :allow_destroy => true
  accepts_nested_attributes_for :stats, :reject_if => :all_blank, :allow_destroy => true
  accepts_nested_attributes_for :results, :reject_if => :all_blank, :allow_destroy => true
  has_many :active_relationships, class_name:  "Relationship",
                                  foreign_key: "follower_id",
                                  dependent:   :destroy
  has_many :passive_relationships, class_name:  "Relationship",
                                   foreign_key: "followed_id",
                                   dependent:   :destroy
  has_many :following, through: :active_relationships,  source: :followed
  has_many :followers, through: :passive_relationships, source: :follower
  attr_accessor :remember_token, :activation_token, :reset_token
  before_save   :downcase_email
  before_create :create_activation_digest
  validates :name,  presence: true, length: { maximum: 50 }, format: { with: /\A[a-z\sA-Z]+\z/,
    message: "only allows letters" }
  VALID_EMAIL_REGEX = /\A[\w+\-.]+@[a-z\d\-.]+\.[a-z]+\z/i
  validates :email, presence: true, length: { maximum: 255 },
                    format: { with: VALID_EMAIL_REGEX },
                    uniqueness: { case_sensitive: false }, unless: -> { from_omniauth? }
  has_secure_password
  validates :password, length: { minimum: 6 }

  def name
     read_attribute(:name).try(:titleize)
  end

  def count_mastered
    @res = habits.reduce(0) do |count, habit|
    habit.current_level == 6 ? count + 1 : count
    end
  end

  def count_challenged
    @challenged_count = habits.count - @res
  end

    def self.from_omniauth(auth)
      where(provider: auth.provider, uid: auth.uid).first_or_initialize.tap do |user|
        user.provider = auth.provider
        user.image = auth.info.image
        user.uid = auth.uid
        user.name = auth.info.name
        user.oauth_token = auth.credentials.token
        user.oauth_expires_at = Time.at(auth.credentials.expires_at)
        user.password = (0...8).map { (65 + rand(26)).chr }.join
        user.email = (0...8).map { (65 + rand(26)).chr }.join+"@mailinator.com"
        user.save!
      end
    end

  def self.koala(auth)
    access_token = auth['token']
    facebook = Koala::Facebook::API.new(access_token)
    facebook.get_object("me?fields=name,picture")
  end


  # Returns the hash digest of the given string.
  def User.digest(string)
    cost = ActiveModel::SecurePassword.min_cost ? BCrypt::Engine::MIN_COST :
                                                  BCrypt::Engine.cost
    BCrypt::Password.create(string, cost: cost)
  end

  # Returns a random token.
  def User.new_token
    SecureRandom.urlsafe_base64
  end

  # Remembers a user in the database for use in persistent sessions.
  def remember
    self.remember_token = User.new_token
    update_attribute(:remember_digest, User.digest(remember_token))
  end

  # Forgets a user. NOT SURE IF I REMOVE
  def forget
    update_attribute(:remember_digest, nil)
  end

  # Returns true if the given token matches the digest.
  def authenticated?(attribute, token)
    digest = send("#{attribute}_digest")
    return false if digest.nil?
    BCrypt::Password.new(digest).is_password?(token)
  end

  # Activates an account.
  def activate
    update_attribute(:activated,    true)
    update_attribute(:activated_at, Time.zone.now)
  end

  # Sends activation email.
  def send_activation_email
    UserMailer.account_activation(self).deliver_now
  end

  def create_reset_digest
    self.reset_token = User.new_token
    update_attribute(:reset_digest,  User.digest(reset_token))
    update_attribute(:reset_sent_at, Time.zone.now)
  end

  # Sends password reset email.
  def send_password_reset_email
    UserMailer.password_reset(self).deliver_now
  end

   # Returns true if a password reset has expired.
  def password_reset_expired?
    reset_sent_at < 2.hours.ago
  end

  def good_results_count
    results.good_count
  end

  # Follows a user.
  def follow(other_user)
    active_relationships.create(followed_id: other_user.id)
  end

  # Unfollows a user.
  def unfollow(other_user)
    active_relationships.find_by(followed_id: other_user.id).destroy
  end

  # Returns true if the current user is following the other user.
  def following?(other_user)
    following.include?(other_user)
  end

private 

    def from_omniauth? 
      provider && uid 
    end

      # Converts email to all lower-case.
    def downcase_email 
      self.email = email.downcase unless from_omniauth? 
    end

    # Creates and assigns the activation token and digest.
    def create_activation_digest
      self.activation_token  = User.new_token
      self.activation_digest = User.digest(activation_token)
    end
end

facebook.js.coffee.erb

jQuery ->
  $('body').prepend('<div id="fb-root"></div>')

  $.ajax
    url: "#{window.location.protocol}//connect.facebook.net/en_US/all.js"
    dataType: 'script'
    cache: true


window.fbAsyncInit = ->
  FB.init(appId: '<%= 1540372976229929 %>', cookie: true)

  $('#sign_in').click (e) ->
    e.preventDefault()
    FB.login (response) ->
      window.location = '/auth/facebook/callback' if response.authResponse

  if $('#sign_out').length > 0
    FB.getLoginStatus (response) ->
      window.location = $('#sign_out').attr("href") if !response.authResponse

来源:Omniauth-Facebook

“成为一名优秀的程序员,有3%的天赋和97%不被互联网分心。”


1
既然你已经在解决问题的路上了,我就不会干涉了……但是我在为Plezi框架构建OAuth2库时也遇到了类似的挑战。你可以查看最终授权令牌的代码。它可以获得一个持续约30天的令牌。令牌需要定期更新。该代码容易受到中间人攻击,除非你更改OAuth HTTPS请求的SSL验证模式。 - Myst
2个回答

10

我之前在构建当前应用程序时遇到了与您相同的问题。我找到的解决方案建议在创建初始短暂令牌后立即使用Koala身份验证来延长其有效期。

适用于我良好的解决方案如下...

首先,在Gemfile中包含gem 'koala', '2.0.0'。此外,访问Koala github网站以获取更多信息。

现在让我们将以上内容应用于user.rbfrom_omniauth方法...

def self.from_omniauth(auth)
   # Sets 60 day auth token
   oauth = Koala::Facebook::OAuth.new("1540352575225959", "ee957abf5e851c98574cdfaebb1355f4")
   new_access_info = oauth.exchange_access_token_info auth.credentials.token

   new_access_token = new_access_info["access_token"]
   new_access_expires_at = DateTime.now + new_access_info["expires"].to_i.seconds

  where(provider: auth.provider, uid: auth.uid).first_or_initialize.tap do |user|
    user.provider = auth.provider
    user.image = auth.info.image
    user.uid = auth.uid
    user.name = auth.info.name
    user.oauth_token = new_access_token # auth.credentials.token <- your old token. Not needed anymore.
    user.oauth_expires_at = Time.at(auth.credentials.expires_at)
    user.password = (0...8).map { (65 + rand(26)).chr }.join
    user.email = (0...8).map { (65 + rand(26)).chr }.join+"@mailinator.com"
    user.save!
  end
end

其他信息:

我还注意到您正在为用户的电子邮件和密码生成一些虚拟值。我建议您改用SecureRandom库来生成这些值。虽然您的代码很不可能导致值的碰撞,但至少对于电子邮件,我建议将 (0...8).map { (65 + rand(26)).chr }.join+"@mailinator.com" 更改为更稳定的 SecureRandom.hex + "@mailinator.com"。如果您使用电子邮件作为应用程序中用户登录的方式,则特别重要。

我希望这解决了您的问题。祝一切顺利,Tim。

更新:

我很高兴我们成功回答了您的问题并一起解决了所有其他问题,但是关于我之前提到的代码重构,这里是一个更新...

考虑一种情况,即通过Facebook登录的用户在您的网站上更改关于自己的某些数据。假设他们更改了姓名、电子邮件或头像。这将正常工作直到同一用户再次尝试登录。会发生的是,from_omniauth方法将再次被触发并覆盖那些更改。这是不好的,防止这种情况的方法是进行以下操作...

def self.from_omniauth(auth)
  .
  .
  .
  where(provider: auth.provider, uid: auth.uid).first_or_initialize.tap do |user|
    user.provider = auth.provider
    user.image = auth.info.image unless user.image != nil
    user.uid = auth.uid
    user.name = auth.info.name unless user.name != nil
    user.oauth_token = new_access_token 
    user.oauth_expires_at = Time.at(auth.credentials.expires_at)
    user.password = SecureRandom.urlsafe_base64 unless user.password != nil
    user.email = SecureRandom.hex + "@mailinator.com" unless user.email != nil
    user.activated = true
    user.save!
  end
关键在于使用unless user.image != nil,这可以确保如果:image的初始值为nil,则只会设置您的图像。如果用户更改了图像,则该值将不是nil,并且from_omniauth将不会更改它。对于名称、电子邮件和密码也是如此。不要将其设置为其他任何内容。
另外,请注意我使用的是SecureRandom.urlsafe_base64而不是您的(0...8).map { (65 + rand(26)).chr }.join。这是因为urlsafe_base64会生成一个随机的URL安全的base64字符串,比如i0XQ-7gglIsHGV2_BNPrdQ==,非常适合用作虚拟密码,看起来也很优雅。
另一方面,我之所以对电子邮件使用hex,是因为它会创建一个随机的十六进制字符串,比如eb693ec8252cd630102fd0d0fb7c3485,如果您恰好有一些用于验证电子邮件的正则表达式(理想情况下应该有),那么这样做不会影响您的验证。

你也可以直接使用 new_access_token = oauth.get_app_access_token(auth.credentials.token)。这只是一个帮助方法,用于从信息哈希中提取令牌。 - mcelicalderon

1
你可以在Koala::Facebook::OAuth实例中使用exchange_access_token_info方法。

网页内容由stack overflow 提供, 点击上面的
可以查看英文原文,
原文链接