{-# LANGUAGE OverloadedStrings #-}

-- |
--
-- OAuth2 plugin for http://bitbucket.com
--
-- * Authenticates against bitbucket
-- * Uses bitbucket uuid as credentials identifier
module Yesod.Auth.OAuth2.Bitbucket
  ( oauth2Bitbucket
  , oauth2BitbucketScoped
  ) where

import Yesod.Auth.OAuth2.Prelude

import qualified Data.Text as T

newtype User = User Text

instance FromJSON User where
  parseJSON :: Value -> Parser User
parseJSON = forall a. String -> (Object -> Parser a) -> Value -> Parser a
withObject String
"User" forall a b. (a -> b) -> a -> b
$ \Object
o -> Text -> User
User forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b
<$> Object
o forall a. FromJSON a => Object -> Key -> Parser a
.: Key
"uuid"

pluginName :: Text
pluginName :: Text
pluginName = Text
"bitbucket"

defaultScopes :: [Text]
defaultScopes :: [Text]
defaultScopes = [Text
"account"]

oauth2Bitbucket :: YesodAuth m => Text -> Text -> AuthPlugin m
oauth2Bitbucket :: forall m. YesodAuth m => Text -> Text -> AuthPlugin m
oauth2Bitbucket = forall m. YesodAuth m => [Text] -> Text -> Text -> AuthPlugin m
oauth2BitbucketScoped [Text]
defaultScopes

oauth2BitbucketScoped :: YesodAuth m => [Text] -> Text -> Text -> AuthPlugin m
oauth2BitbucketScoped :: forall m. YesodAuth m => [Text] -> Text -> Text -> AuthPlugin m
oauth2BitbucketScoped [Text]
scopes Text
clientId Text
clientSecret =
  forall m.
YesodAuth m =>
Text -> OAuth2 -> FetchCreds m -> AuthPlugin m
authOAuth2 Text
pluginName OAuth2
oauth2 forall a b. (a -> b) -> a -> b
$ \Manager
manager OAuth2Token
token -> do
    (User Text
userId, ByteString
userResponse) <-
      forall a.
FromJSON a =>
Text -> Manager -> OAuth2Token -> URI -> IO (a, ByteString)
authGetProfile
        Text
pluginName
        Manager
manager
        OAuth2Token
token
        URI
"https://api.bitbucket.com/2.0/user"

    forall (f :: * -> *) a. Applicative f => a -> f a
pure
      Creds
        { credsPlugin :: Text
credsPlugin = Text
pluginName
        , -- FIXME: Preserved bug. This should just be userId (it's already
          -- a Text), but because this code was shipped, folks likely have
          -- Idents in their database like @"\"...\""@, and if we fixed this
          -- they would need migrating. We're keeping it for now as it's a
          -- minor wart. Breaking typed APIs is one thing, causing data to go
          -- invalid is another.
          credsIdent :: Text
credsIdent = String -> Text
T.pack forall a b. (a -> b) -> a -> b
$ forall a. Show a => a -> String
show Text
userId
        , credsExtra :: [(Text, Text)]
credsExtra = OAuth2Token -> ByteString -> [(Text, Text)]
setExtra OAuth2Token
token ByteString
userResponse
        }
 where
  oauth2 :: OAuth2
oauth2 =
    OAuth2
      { oauth2ClientId :: Text
oauth2ClientId = Text
clientId
      , oauth2ClientSecret :: Maybe Text
oauth2ClientSecret = forall a. a -> Maybe a
Just Text
clientSecret
      , oauth2AuthorizeEndpoint :: URI
oauth2AuthorizeEndpoint =
          URI
"https://bitbucket.com/site/oauth2/authorize"
            forall a. URIRef a -> [(ByteString, ByteString)] -> URIRef a
`withQuery` [Text -> [Text] -> (ByteString, ByteString)
scopeParam Text
"," [Text]
scopes]
      , oauth2TokenEndpoint :: URI
oauth2TokenEndpoint = URI
"https://bitbucket.com/site/oauth2/access_token"
      , oauth2RedirectUri :: Maybe URI
oauth2RedirectUri = forall a. Maybe a
Nothing
      }