-
Notifications
You must be signed in to change notification settings - Fork 26
/
README
277 lines (198 loc) · 8.83 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
NAME
Mojolicious::Plugin::OAuth2 - Auth against OAuth2 APIs
DESCRIPTION
This Mojolicious plugin allows you to easily authenticate against a
OAuth2 <http://oauth.net> provider. It includes configurations for a few
popular providers, but you can add your own easily as well.
Note that OAuth2 requires https, so you need to have the optional
Mojolicious dependency required to support it. Run the command below to
check if IO::Socket::SSL is installed.
$ mojo version
References
* <http://oauth.net/documentation/>
* <http://aaronparecki.com/articles/2012/07/29/1/oauth2-simplified>
* <http://homakov.blogspot.jp/2013/03/oauth1-oauth2-oauth.html>
* <http://en.wikipedia.org/wiki/OAuth#OAuth_2.0>
SYNOPSIS
Example web application
use Mojolicious::Lite;
plugin "OAuth2" => {
facebook => {
key => "some-public-app-id",
secret => $ENV{OAUTH2_FACEBOOK_SECRET},
},
};
get "/connect" => sub {
my $c = shift;
$c->delay(
sub {
my $delay = shift;
my $args = {redirect_uri => $c->url_for('connect')->userinfo(undef)->to_abs};
$c->oauth2->get_token(facebook => $args, $delay->begin);
},
sub {
my ($delay, $err, $data) = @_;
return $c->render("connect", error => $err) unless $data->{access_token};
return $c->session(token => $c->redirect_to('profile'));
},
);
};
Example blocking web application
use Mojolicious::Lite;
plugin "OAuth2" => {
facebook => {
key => "some-public-app-id",
secret => $ENV{OAUTH2_FACEBOOK_SECRET},
},
};
get "/connect" => sub {
my $c = shift;
my $args = {redirect_uri => $c->url_for('connect')->userinfo(undef)->to_abs};
if (my $err = $c->param('error')) {
# do stuff with error from OAuth2 provider
} elsif (my $data = $c->oauth2->get_token(facebook => $args)) {
# do stuff with $data->{access_token};
} else {
# already redirected by OAuth2 plugin
return;
}
};
Custom connect button
You can add a "connect link" to your template using the
"oauth2.auth_url" helper. Example template:
Click here to log in:
<%= link_to "Connect!", $c->oauth2->auth_url("facebook", scope => "user_about_me email") %>
Configuration
This plugin takes a hash as config, where the keys are provider names
and the values are configuration for each provider. Here is a complete
example:
plugin "OAuth2" => {
custom_provider => {
key => "APP_ID",
secret => "SECRET_KEY",
authorize_url => "https://provider.example.com/auth",
token_url => "https://provider.example.com/token",
},
};
To make it a bit easier, Mojolicious::Plugin::OAuth2 has already values
for "authorize_url" and "token_url" for the following providers:
* dailymotion
Authentication for Dailymotion video site.
* eventbrite
Authentication for <https://www.eventbrite.com> event site.
See also <http://developer.eventbrite.com/docs/auth/>.
* facebook
OAuth2 for Facebook's graph API, <http://graph.facebook.com/>. You
can find "key" (App ID) and "secret" (App Secret) from the app
dashboard here: <https://developers.facebook.com/apps>.
See also
<https://developers.facebook.com/docs/reference/dialogs/oauth/>.
* github
Authentication with Github.
See also <https://developer.github.com/v3/oauth/>
* google
OAuth2 for Google. You can find the "key" (CLIENT ID) and "secret"
(CLIENT SECRET) from the app console here under "APIs & Auth" and
"Credentials" in the menu at
<https://console.developers.google.com/project>.
See also <https://developers.google.com/+/quickstart/>.
Testing
THIS API IS EXPERIMENTAL AND CAN CHANGE WITHOUT NOTICE.
To enable a "mocked" OAuth2 api, you need to give the special "mocked"
provider a "key":
plugin "OAuth2" => { mocked => {key => 42} };
The code above will add two new routes to your application:
* GET /mocked/oauth/authorize
This route is a web page which contains a link that takes you back
to "redirect_uri", with a "code". The "code" default to "fake_code",
but can be configured:
$c->app->oauth2->providers->{mocked}{return_code} = "...";
The route it self can also be customized:
plugin "OAuth2" => { mocked => {authorize_url => '...'} };
* POST /mocked/oauth/token
This route is will return a "access_token" which is available in
your "oauth2.get_token" callback. The default is "fake_token", but
it can be configured:
$c->app->oauth2->providers->{mocked}{return_token} = "...";
The route it self can also be customized:
plugin "OAuth2" => { mocked => {token_url => '...'} };
HELPERS
oauth2.auth_url
$url = $c->oauth2->auth_url($provider => \%args);
Returns a Mojo::URL object which contain the authorize URL. This is
useful if you want to add the authorize URL as a link to your webpage
instead of doing a redirect like "oauth2.get_token" does. %args is
optional, but can contain:
* host
Useful if your provider uses different hosts for accessing different
accounts. The default is specified in the provider configuration.
$url->host($host);
* authorize_query
Either a hash-ref or an array-ref which can be used to give extra
query params to the URL.
$url->query($authorize_url);
* redirect_uri
Useful if you want to go back to a different page than what you came
from. The default is:
$c->url_for->to_abs->to_string
* scope
Scope to ask for credentials to. Should be a space separated list.
* state
A string that will be sent to the identity provider. When the user
returns from the identity provider, this exact same string will be
carried with the user, as a GET parameter called "state" in the URL
that the user will return to.
oauth2.get_token
$data = $c->oauth2->get_token($provider_name => \%args);
$c = $c->oauth2->get_token($provider_name => \%args, sub {
my ($c, $err, $data) = @_;
});
"oauth2.get_token" is used to either fetch access token from OAuth2
provider, handle errors or redirect to OAuth2 provider. This method can
be called in either blocking or non-blocking mode. $err holds a error
description if something went wrong. Blocking mode will "die($err)"
instead of returning it to caller. $data is a hash-ref containing the
access token from the OAauth2 provider. $data in blocking mode can also
be "undef" if a redirect has been issued by this module.
In more detail, this method will do one of two things:
1. If called from an action on your site, it will redirect you to the
$provider_name's "authorize_url". This site will probably have some
sort of "Connect" and "Reject" button, allowing the visitor to
either connect your site with his/her profile on the OAuth2
provider's page or not.
2. The OAuth2 provider will redirect the user back to your site after
clicking the "Connect" or "Reject" button. $data will then contain a
key "access_token" on "Connect" and a false value on "Reject" mode,
or will die in blocking mode.
Will redirect to the provider to allow for authorization, then fetch the
token. The token gets provided as a parameter to the callback function.
Usually you want to store the token in a session or similar to use for
API requests. Supported arguments:
* host
Useful if your provider uses different hosts for accessing different
accounts. The default is specified in the provider configuration.
* scope
Scope to ask for credentials to. Should be a space separated list.
oauth2.providers
This helper allow you to access the raw providers mapping, which looks
something like this:
{
facebook => {
authorize_url => "https://graph.facebook.com/oauth/authorize",
token_url => "https://graph.facebook.com/oauth/access_token",
key => ...,
secret => ...,
},
...
}
ATTRIBUTES
providers
Holds a hash of provider information. See oauth2.providers.
METHODS
register
Will register this plugin in your application. See "SYNOPSIS".
AUTHOR
Marcus Ramberg - "[email protected]"
Jan Henning Thorsen - "[email protected]"
LICENSE
This software is licensed under the same terms as Perl itself.