Skip to content

Commit c04307d

Browse files
committed
Refactoring
1 parent 831c0da commit c04307d

File tree

1 file changed

+17
-25
lines changed

1 file changed

+17
-25
lines changed

play2-oauth2-provider/src/main/scala/scalaoauth2/provider/OAuth2Provider.scala

Lines changed: 17 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ trait OAuth2BaseProvider extends Results {
6767
"error_description" -> e.description
6868
)
6969

70-
protected[scalaoauth2] def responseOAuthErrorHeader(e: OAuthError): (String, String) = ("WWW-Authenticate" -> ("Bearer " + toOAuthErrorString(e)))
70+
protected[scalaoauth2] def responseOAuthErrorHeader(e: OAuthError): (String, String) = "WWW-Authenticate" -> ("Bearer " + toOAuthErrorString(e))
7171

7272
protected def toOAuthErrorString(e: OAuthError): String = {
7373
val params = Seq("error=\"" + e.errorType + "\"") ++
@@ -119,12 +119,10 @@ trait OAuth2Provider extends OAuth2BaseProvider {
119119
* Request is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
120120
*/
121121
def issueAccessToken[A, U](dataHandler: DataHandler[U], timeout: Duration = 60.seconds)(implicit request: Request[A]): Result = {
122-
val f = tokenEndpoint.handleRequest(request, dataHandler).map { requestResult =>
123-
requestResult match {
124-
case Left(e) if e.statusCode == 400 => BadRequest(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
125-
case Left(e) if e.statusCode == 401 => Unauthorized(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
126-
case Right(r) => Ok(Json.toJson(responseAccessToken(r))).withHeaders("Cache-Control" -> "no-store", "Pragma" -> "no-cache")
127-
}
122+
val f = tokenEndpoint.handleRequest(request, dataHandler).map {
123+
case Left(e) if e.statusCode == 400 => BadRequest(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
124+
case Left(e) if e.statusCode == 401 => Unauthorized(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
125+
case Right(r) => Ok(Json.toJson(responseAccessToken(r))).withHeaders("Cache-Control" -> "no-store", "Pragma" -> "no-cache")
128126
}
129127

130128
Await.result(f, timeout)
@@ -141,12 +139,10 @@ trait OAuth2Provider extends OAuth2BaseProvider {
141139
* Authentication is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
142140
*/
143141
def authorize[A, U](dataHandler: DataHandler[U], timeout: Duration = 60.seconds)(callback: AuthInfo[U] => Result)(implicit request: Request[A]): Result = {
144-
val f = protectedResource.handleRequest(request, dataHandler).map { requestResult =>
145-
requestResult match {
146-
case Left(e) if e.statusCode == 400 => BadRequest.withHeaders(responseOAuthErrorHeader(e))
147-
case Left(e) if e.statusCode == 401 => Unauthorized.withHeaders(responseOAuthErrorHeader(e))
148-
case Right(authInfo) => callback(authInfo)
149-
}
142+
val f = protectedResource.handleRequest(request, dataHandler).map {
143+
case Left(e) if e.statusCode == 400 => BadRequest.withHeaders(responseOAuthErrorHeader(e))
144+
case Left(e) if e.statusCode == 401 => Unauthorized.withHeaders(responseOAuthErrorHeader(e))
145+
case Right(authInfo) => callback(authInfo)
150146
}
151147

152148
Await.result(f, timeout)
@@ -196,12 +192,10 @@ trait OAuth2AsyncProvider extends OAuth2BaseProvider {
196192
* Request is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
197193
*/
198194
def issueAccessToken[A, U](dataHandler: DataHandler[U])(implicit request: Request[A]): Future[Result] = {
199-
tokenEndpoint.handleRequest(request, dataHandler).map { requestResult =>
200-
requestResult match {
201-
case Left(e) if e.statusCode == 400 => BadRequest(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
202-
case Left(e) if e.statusCode == 401 => Unauthorized(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
203-
case Right(r) => Ok(Json.toJson(responseAccessToken(r))).withHeaders("Cache-Control" -> "no-store", "Pragma" -> "no-cache")
204-
}
195+
tokenEndpoint.handleRequest(request, dataHandler).map {
196+
case Left(e) if e.statusCode == 400 => BadRequest(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
197+
case Left(e) if e.statusCode == 401 => Unauthorized(responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
198+
case Right(r) => Ok(Json.toJson(responseAccessToken(r))).withHeaders("Cache-Control" -> "no-store", "Pragma" -> "no-cache")
205199
}
206200
}
207201

@@ -216,12 +210,10 @@ trait OAuth2AsyncProvider extends OAuth2BaseProvider {
216210
* Authentication is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
217211
*/
218212
def authorize[A, U](dataHandler: DataHandler[U])(callback: AuthInfo[U] => Future[Result])(implicit request: Request[A]): Future[Result] = {
219-
protectedResource.handleRequest(request, dataHandler).flatMap { requestResult =>
220-
requestResult match {
221-
case Left(e) if e.statusCode == 400 => Future.successful(BadRequest.withHeaders(responseOAuthErrorHeader(e)))
222-
case Left(e) if e.statusCode == 401 => Future.successful(Unauthorized.withHeaders(responseOAuthErrorHeader(e)))
223-
case Right(authInfo) => callback(authInfo)
224-
}
213+
protectedResource.handleRequest(request, dataHandler).flatMap {
214+
case Left(e) if e.statusCode == 400 => Future.successful(BadRequest.withHeaders(responseOAuthErrorHeader(e)))
215+
case Left(e) if e.statusCode == 401 => Future.successful(Unauthorized.withHeaders(responseOAuthErrorHeader(e)))
216+
case Right(authInfo) => callback(authInfo)
225217
}
226218
}
227219

0 commit comments

Comments
 (0)