class Doorkeeper::OAuth::Authorization::Code
def access_grant?
def access_grant? true end
def access_grant_attributes
def access_grant_attributes attributes = { application_id: pre_auth.client.id, expires_in: authorization_code_expires_in, redirect_uri: pre_auth.redirect_uri, scopes: pre_auth.scopes.to_s, } if Doorkeeper.config.polymorphic_resource_owner? attributes[:resource_owner] = resource_owner else attributes[:resource_owner_id] = resource_owner.id end pkce_attributes.merge(attributes).merge(custom_attributes) end
def authorization_code_expires_in
def authorization_code_expires_in Doorkeeper.config.authorization_code_expires_in end
def custom_attributes
def custom_attributes # Custom access token attributes are saved into the access grant, # and then included in subsequently generated access tokens. @pre_auth.custom_access_token_attributes.to_h.with_indifferent_access end
def initialize(pre_auth, resource_owner)
def initialize(pre_auth, resource_owner) @pre_auth = pre_auth @resource_owner = resource_owner end
def issue_token!
def issue_token! return @token if defined?(@token) @token = Doorkeeper.config.access_grant_model.create!(access_grant_attributes) end
def oob_redirect
def oob_redirect { action: :show, code: token.plaintext_token } end
def pkce_attributes
def pkce_attributes return {} unless pkce_supported? { code_challenge: pre_auth.code_challenge, code_challenge_method: pre_auth.code_challenge_method, } end
def pkce_supported?
Ensures firstly, if migration with additional PKCE columns was
def pkce_supported? Doorkeeper.config.access_grant_model.pkce_supported? end