
Security News
Another Round of TEA Protocol Spam Floods npm, But It’s Not a Worm
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.
MealTicket simplifies the process of authenticating with 3rd-party APIs by eliminating the stuff that's the same for everyone, letting you focus solely on the parts of authentication that matter to you.
== Overview
== Currently Supported Services
== Getting Started
Require the gem. In your gemfile:
gem 'meal_ticket'
Install the gem. In your console:
bundle install (or maybe 'sudo bundle install')
Install MealTicket as middleware to handle cross-domain communication. In Rails, you'd add something like this to your application.rb:
module YourAppName class Application < Rails::Application config.middleware.use "MealTicket"
Make meal_ticket URLs available to your views. In Rails, you'd add something like this to your application_helper.rb:
require 'meal_ticket'
module ApplicationHelper include MealTicketRoutes end
Optionally, make meal_ticket URLs available to your controllers. In Rails, you'd add something like this to your application_controller.rb:
require 'meal_ticket'
class ApplicationController < ActionController::Base include MealTicketRoutes end
Now that you've finished installing MealTicket, look below for further instructions on how to connect with individual services.
= Service-Specific Instructions
For each service you want to integrate with, find it here and follow the steps to get your API keys.
In general, you'll need to do a couple things for each service:
Create global constants that look something like this:
FACEBOOK_APP_ID = "158079864105359" # facebook calls this "App ID" FACEBOOK_SECRET = "98882d6d6cf0d7b69a5de5cc43abc10" # facebook calls this "App Secret" FACEBOOK_CALLBACK = "path/to/my/facebook/callback" # whatever URL you've created to grab the user data and do something useful
Now, redirect users to facebook_auth_url, passing the permissions you want to ask for. Like so:
redirect_to facebook_auth_url(root_url, "user_photos,publish_stream")
After they authenticate, they'll be redirected to your +FACEBOOK_CALLBACK+ URL with query string params like:
?facebook[token]=q2jf89ojq.j32f|FQf9j23la&facebook[expires]=4829
Notes:
== Flickr
Create global constants that look something like this:
FLICKR_TOKEN = "3637b1e30ae90503fedf9aaca8a4c370" FLICKR_SECRET = "3570d29a7a3c086b" FLICKR_CALLBACK = "path/to/my/flickr/callback" # whatever URL you've created to grab the user data and do something useful
Now, redirect users to flickr_auth_url, passing the permission level you want to ask for. Like so:
redirect_to flickr_auth_url("write")
After they authenticate, they'll be redirected to your +FACEBOOK_CALLBACK+ method with params like:
?flickr[token]=q2jf89ojq.j32f|FQf9j23la&facebook[user_id]=
Notes:
== Contributing to meal_ticket
== Copyright
Copyright (c) 2011 Chris Doyle. See LICENSE.txt for further details.
FAQs
Unknown package
We found that meal_ticket demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads

Research
/Security News
A malicious Chrome extension posing as an Ethereum wallet steals seed phrases by encoding them into Sui transactions, enabling full wallet takeover.