@@ -67,7 +67,7 @@ trait OAuth2BaseProvider extends Results {
6767 " error_description" -> e.description
6868 )
6969
70- protected [scalaoauth2] def responseOAuthErrorHeader (e : OAuthError ): (String , String ) = ( " WWW-Authenticate" -> (" Bearer " + toOAuthErrorString(e) ))
70+ protected [scalaoauth2] def responseOAuthErrorHeader (e : OAuthError ): (String , String ) = " WWW-Authenticate" -> (" Bearer " + toOAuthErrorString(e))
7171
7272 protected def toOAuthErrorString (e : OAuthError ): String = {
7373 val params = Seq (" error=\" " + e.errorType + " \" " ) ++
@@ -119,12 +119,10 @@ trait OAuth2Provider extends OAuth2BaseProvider {
119119 * Request is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
120120 */
121121 def issueAccessToken [A , U ](dataHandler : DataHandler [U ], timeout : Duration = 60 .seconds)(implicit request : Request [A ]): Result = {
122- val f = tokenEndpoint.handleRequest(request, dataHandler).map { requestResult =>
123- requestResult match {
124- case Left (e) if e.statusCode == 400 => BadRequest (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
125- case Left (e) if e.statusCode == 401 => Unauthorized (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
126- case Right (r) => Ok (Json .toJson(responseAccessToken(r))).withHeaders(" Cache-Control" -> " no-store" , " Pragma" -> " no-cache" )
127- }
122+ val f = tokenEndpoint.handleRequest(request, dataHandler).map {
123+ case Left (e) if e.statusCode == 400 => BadRequest (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
124+ case Left (e) if e.statusCode == 401 => Unauthorized (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
125+ case Right (r) => Ok (Json .toJson(responseAccessToken(r))).withHeaders(" Cache-Control" -> " no-store" , " Pragma" -> " no-cache" )
128126 }
129127
130128 Await .result(f, timeout)
@@ -141,12 +139,10 @@ trait OAuth2Provider extends OAuth2BaseProvider {
141139 * Authentication is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
142140 */
143141 def authorize [A , U ](dataHandler : DataHandler [U ], timeout : Duration = 60 .seconds)(callback : AuthInfo [U ] => Result )(implicit request : Request [A ]): Result = {
144- val f = protectedResource.handleRequest(request, dataHandler).map { requestResult =>
145- requestResult match {
146- case Left (e) if e.statusCode == 400 => BadRequest .withHeaders(responseOAuthErrorHeader(e))
147- case Left (e) if e.statusCode == 401 => Unauthorized .withHeaders(responseOAuthErrorHeader(e))
148- case Right (authInfo) => callback(authInfo)
149- }
142+ val f = protectedResource.handleRequest(request, dataHandler).map {
143+ case Left (e) if e.statusCode == 400 => BadRequest .withHeaders(responseOAuthErrorHeader(e))
144+ case Left (e) if e.statusCode == 401 => Unauthorized .withHeaders(responseOAuthErrorHeader(e))
145+ case Right (authInfo) => callback(authInfo)
150146 }
151147
152148 Await .result(f, timeout)
@@ -196,12 +192,10 @@ trait OAuth2AsyncProvider extends OAuth2BaseProvider {
196192 * Request is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
197193 */
198194 def issueAccessToken [A , U ](dataHandler : DataHandler [U ])(implicit request : Request [A ]): Future [Result ] = {
199- tokenEndpoint.handleRequest(request, dataHandler).map { requestResult =>
200- requestResult match {
201- case Left (e) if e.statusCode == 400 => BadRequest (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
202- case Left (e) if e.statusCode == 401 => Unauthorized (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
203- case Right (r) => Ok (Json .toJson(responseAccessToken(r))).withHeaders(" Cache-Control" -> " no-store" , " Pragma" -> " no-cache" )
204- }
195+ tokenEndpoint.handleRequest(request, dataHandler).map {
196+ case Left (e) if e.statusCode == 400 => BadRequest (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
197+ case Left (e) if e.statusCode == 401 => Unauthorized (responseOAuthErrorJson(e)).withHeaders(responseOAuthErrorHeader(e))
198+ case Right (r) => Ok (Json .toJson(responseAccessToken(r))).withHeaders(" Cache-Control" -> " no-store" , " Pragma" -> " no-cache" )
205199 }
206200 }
207201
@@ -216,12 +210,10 @@ trait OAuth2AsyncProvider extends OAuth2BaseProvider {
216210 * Authentication is failed then return BadRequest or Unauthorized status to client with cause into the JSON.
217211 */
218212 def authorize [A , U ](dataHandler : DataHandler [U ])(callback : AuthInfo [U ] => Future [Result ])(implicit request : Request [A ]): Future [Result ] = {
219- protectedResource.handleRequest(request, dataHandler).flatMap { requestResult =>
220- requestResult match {
221- case Left (e) if e.statusCode == 400 => Future .successful(BadRequest .withHeaders(responseOAuthErrorHeader(e)))
222- case Left (e) if e.statusCode == 401 => Future .successful(Unauthorized .withHeaders(responseOAuthErrorHeader(e)))
223- case Right (authInfo) => callback(authInfo)
224- }
213+ protectedResource.handleRequest(request, dataHandler).flatMap {
214+ case Left (e) if e.statusCode == 400 => Future .successful(BadRequest .withHeaders(responseOAuthErrorHeader(e)))
215+ case Left (e) if e.statusCode == 401 => Future .successful(Unauthorized .withHeaders(responseOAuthErrorHeader(e)))
216+ case Right (authInfo) => callback(authInfo)
225217 }
226218 }
227219
0 commit comments