| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
use strict; |
|
3
|
2
|
|
|
2
|
|
899883
|
use 5.008_005; |
|
|
2
|
|
|
|
|
11
|
|
|
|
2
|
|
|
|
|
90
|
|
|
4
|
2
|
|
|
2
|
|
43
|
our $VERSION = '0.20'; |
|
|
2
|
|
|
|
|
5
|
|
|
5
|
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
use Dancer2::Plugin; |
|
7
|
2
|
|
|
2
|
|
819
|
use Module::Load; |
|
|
2
|
|
|
|
|
193286
|
|
|
|
2
|
|
|
|
|
11
|
|
|
8
|
2
|
|
|
2
|
|
34176
|
|
|
|
2
|
|
|
|
|
790
|
|
|
|
2
|
|
|
|
|
10
|
|
|
9
|
|
|
|
|
|
|
# setup the plugin |
|
10
|
|
|
|
|
|
|
on_plugin_import { |
|
11
|
|
|
|
|
|
|
my $dsl = shift; |
|
12
|
|
|
|
|
|
|
my $settings = plugin_setting; |
|
13
|
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
$settings->{prefix} ||= '/auth'; |
|
15
|
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
for my $provider ( keys %{$settings->{providers} || {}} ) { |
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
# load the provider plugin |
|
19
|
|
|
|
|
|
|
my $provider_class = __PACKAGE__."::Provider::".$provider; |
|
20
|
|
|
|
|
|
|
eval { load $provider_class; 1; } or do { |
|
21
|
|
|
|
|
|
|
$dsl->app->log(debug => "Couldn't load $provider_class"); |
|
22
|
|
|
|
|
|
|
next; |
|
23
|
|
|
|
|
|
|
}; |
|
24
|
|
|
|
|
|
|
$dsl->app->{_oauth}{$provider} ||= $provider_class->new($settings, $dsl); |
|
25
|
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
# add the routes |
|
27
|
|
|
|
|
|
|
$dsl->app->add_route( |
|
28
|
|
|
|
|
|
|
method => 'get', |
|
29
|
|
|
|
|
|
|
regexp => sprintf( "%s/%s", $settings->{prefix}, lc($provider) ), |
|
30
|
|
|
|
|
|
|
code => sub { |
|
31
|
|
|
|
|
|
|
$dsl->app->redirect( |
|
32
|
|
|
|
|
|
|
$dsl->app->{_oauth}{$provider}->authentication_url( |
|
33
|
|
|
|
|
|
|
$dsl->app->request->uri_base |
|
34
|
|
|
|
|
|
|
) |
|
35
|
|
|
|
|
|
|
) |
|
36
|
|
|
|
|
|
|
}, |
|
37
|
|
|
|
|
|
|
); |
|
38
|
|
|
|
|
|
|
$dsl->app->add_route( |
|
39
|
|
|
|
|
|
|
method => 'get', |
|
40
|
|
|
|
|
|
|
regexp => sprintf( "%s/%s/callback", $settings->{prefix}, lc($provider) ), |
|
41
|
|
|
|
|
|
|
code => sub { |
|
42
|
|
|
|
|
|
|
my $redirect; |
|
43
|
|
|
|
|
|
|
if( $dsl->app->{_oauth}{$provider}->callback($dsl->app->request, $dsl->app->session) ) { |
|
44
|
|
|
|
|
|
|
$redirect = $settings->{success_url} || '/'; |
|
45
|
|
|
|
|
|
|
} else { |
|
46
|
|
|
|
|
|
|
$redirect = $settings->{error_url} || '/'; |
|
47
|
|
|
|
|
|
|
} |
|
48
|
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
$dsl->app->redirect( $redirect ); |
|
50
|
|
|
|
|
|
|
}, |
|
51
|
|
|
|
|
|
|
); |
|
52
|
|
|
|
|
|
|
$dsl->app->add_route( |
|
53
|
|
|
|
|
|
|
method => 'get', |
|
54
|
|
|
|
|
|
|
regexp => sprintf( "%s/%s/refresh", $settings->{prefix}, lc($provider) ), |
|
55
|
|
|
|
|
|
|
code => sub { |
|
56
|
|
|
|
|
|
|
my $redirect; |
|
57
|
|
|
|
|
|
|
if( $dsl->app->{_oauth}{$provider}->refresh($dsl->app->request, $dsl->app->session) ) { |
|
58
|
|
|
|
|
|
|
$redirect = $settings->{success_url} || '/'; |
|
59
|
|
|
|
|
|
|
} else { |
|
60
|
|
|
|
|
|
|
if ($settings->{reauth_on_refresh_fail}) { |
|
61
|
|
|
|
|
|
|
$redirect = $settings->{prefix}."/".lc($provider); |
|
62
|
|
|
|
|
|
|
} else { |
|
63
|
|
|
|
|
|
|
$redirect = $settings->{error_url} || '/'; |
|
64
|
|
|
|
|
|
|
} |
|
65
|
|
|
|
|
|
|
} |
|
66
|
|
|
|
|
|
|
$dsl->app->redirect( $redirect ); |
|
67
|
|
|
|
|
|
|
}, |
|
68
|
|
|
|
|
|
|
); |
|
69
|
|
|
|
|
|
|
} |
|
70
|
|
|
|
|
|
|
}; |
|
71
|
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
register_plugin; |
|
73
|
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
1; |
|
75
|
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
=encoding utf-8 |
|
77
|
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
=head1 NAME |
|
79
|
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
Dancer2::Plugin::Auth::OAuth - OAuth for your Dancer2 app |
|
81
|
|
|
|
|
|
|
|
|
82
|
|
|
|
|
|
|
=head1 SYNOPSIS |
|
83
|
|
|
|
|
|
|
|
|
84
|
|
|
|
|
|
|
# just 'use' the plugin, that's all. |
|
85
|
|
|
|
|
|
|
use Dancer2::Plugin::Auth::OAuth; |
|
86
|
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
=head1 DESCRIPTION |
|
88
|
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
Dancer2::Plugin::Auth::OAuth is a Dancer2 plugin which tries to make OAuth |
|
90
|
|
|
|
|
|
|
authentication easy. |
|
91
|
|
|
|
|
|
|
|
|
92
|
|
|
|
|
|
|
The module is highly influenced by L<Plack::Middleware::OAuth> and Dancer 1 |
|
93
|
|
|
|
|
|
|
OAuth modules, but unlike the Dancer 1 versions, this plugin only needs |
|
94
|
|
|
|
|
|
|
configuration (look mom, no code needed!). It automatically sets up the |
|
95
|
|
|
|
|
|
|
needed routes (defaults to C</auth/$provider> and C</auth/$provider/callback>). |
|
96
|
|
|
|
|
|
|
So if you define the Twitter provider in your config, you should automatically |
|
97
|
|
|
|
|
|
|
get C</auth/twitter> and C</auth/twitter/callback>. |
|
98
|
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
After a successful OAuth dance, the user info is stored in the session "oauth". |
|
100
|
|
|
|
|
|
|
What you do with it afterwards is up to you. Please note the user will |
|
101
|
|
|
|
|
|
|
continue to be authenticated until the Dancer2 session has expired, |
|
102
|
|
|
|
|
|
|
whenever that might be. |
|
103
|
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
=head1 CONFIGURATION |
|
105
|
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
The plugin comes with support for Facebook, Google, Twitter, GitHub, Stack |
|
107
|
|
|
|
|
|
|
Exchange, LinkedIn and several more (other providers aren't hard to add, |
|
108
|
|
|
|
|
|
|
send me a pull request when you add more!). |
|
109
|
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
All it takes to use OAuth authentication for a given provider, is to add |
|
111
|
|
|
|
|
|
|
the configuration for it. You don't need anything else. |
|
112
|
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
The YAML below shows all available options. |
|
114
|
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
plugins: |
|
116
|
|
|
|
|
|
|
"Auth::OAuth": |
|
117
|
|
|
|
|
|
|
reauth_on_refresh_fail: 0 [*] |
|
118
|
|
|
|
|
|
|
prefix: /auth [*] |
|
119
|
|
|
|
|
|
|
success_url: / [*] |
|
120
|
|
|
|
|
|
|
error_url: / [*] |
|
121
|
|
|
|
|
|
|
providers: |
|
122
|
|
|
|
|
|
|
Facebook: |
|
123
|
|
|
|
|
|
|
tokens: |
|
124
|
|
|
|
|
|
|
client_id: your_client_id |
|
125
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
126
|
|
|
|
|
|
|
fields: id,email,name,gender,picture |
|
127
|
|
|
|
|
|
|
# Original default Facebook scope was 'email,public_profile,user_friends' |
|
128
|
|
|
|
|
|
|
# Since March 2018 'user_friends' requires an app review. |
|
129
|
|
|
|
|
|
|
# Add the following three lines if you don't have it reviewed. |
|
130
|
|
|
|
|
|
|
query_params: |
|
131
|
|
|
|
|
|
|
authorize: |
|
132
|
|
|
|
|
|
|
scope: email,public_profile |
|
133
|
|
|
|
|
|
|
Google: |
|
134
|
|
|
|
|
|
|
tokens: |
|
135
|
|
|
|
|
|
|
client_id: your_client_id |
|
136
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
137
|
|
|
|
|
|
|
AzureAD: |
|
138
|
|
|
|
|
|
|
tokens: |
|
139
|
|
|
|
|
|
|
client_id: your_client_id |
|
140
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
141
|
|
|
|
|
|
|
Twitter: |
|
142
|
|
|
|
|
|
|
tokens: |
|
143
|
|
|
|
|
|
|
consumer_key: your_consumer_token |
|
144
|
|
|
|
|
|
|
consumer_secret: your_consumer_secret |
|
145
|
|
|
|
|
|
|
Github: |
|
146
|
|
|
|
|
|
|
tokens: |
|
147
|
|
|
|
|
|
|
client_id: your_client_id |
|
148
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
149
|
|
|
|
|
|
|
Stackexchange: |
|
150
|
|
|
|
|
|
|
tokens: |
|
151
|
|
|
|
|
|
|
client_id: your_client_id |
|
152
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
153
|
|
|
|
|
|
|
key: your_key |
|
154
|
|
|
|
|
|
|
site: stackoverflow |
|
155
|
|
|
|
|
|
|
Linkedin: |
|
156
|
|
|
|
|
|
|
tokens: |
|
157
|
|
|
|
|
|
|
client_id: your_client_id |
|
158
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
159
|
|
|
|
|
|
|
fields: id,num-connections,picture-url,email-address |
|
160
|
|
|
|
|
|
|
VKontakte: # https://vk.com |
|
161
|
|
|
|
|
|
|
tokens: |
|
162
|
|
|
|
|
|
|
client_id: your_client_id |
|
163
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
164
|
|
|
|
|
|
|
fields: 'first_name,last_name,about,bdate,city,country,photo_max_orig,sex,site' |
|
165
|
|
|
|
|
|
|
api_version: '5.8' |
|
166
|
|
|
|
|
|
|
Odnoklassniki: # https://ok.ru |
|
167
|
|
|
|
|
|
|
tokens: |
|
168
|
|
|
|
|
|
|
client_id: your_client_id |
|
169
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
170
|
|
|
|
|
|
|
application_key: your_application_key |
|
171
|
|
|
|
|
|
|
method: 'users.getCurrentUser' |
|
172
|
|
|
|
|
|
|
format: 'json' |
|
173
|
|
|
|
|
|
|
fields: 'email,name,gender,birthday,location,uid,pic_full' |
|
174
|
|
|
|
|
|
|
MailRU: |
|
175
|
|
|
|
|
|
|
tokens: |
|
176
|
|
|
|
|
|
|
client_id: your_client_id |
|
177
|
|
|
|
|
|
|
client_private: your_client_private |
|
178
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
179
|
|
|
|
|
|
|
method: 'users.getInfo' |
|
180
|
|
|
|
|
|
|
format: 'json' |
|
181
|
|
|
|
|
|
|
secure: 1 |
|
182
|
|
|
|
|
|
|
Yandex: |
|
183
|
|
|
|
|
|
|
tokens: |
|
184
|
|
|
|
|
|
|
client_id: your_client_id |
|
185
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
186
|
|
|
|
|
|
|
format: 'json' |
|
187
|
|
|
|
|
|
|
SalesForce: |
|
188
|
|
|
|
|
|
|
tokens: |
|
189
|
|
|
|
|
|
|
client_id: your_client_id |
|
190
|
|
|
|
|
|
|
client_secret: your_client_secret |
|
191
|
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
[*] default value, may be omitted. |
|
193
|
|
|
|
|
|
|
|
|
194
|
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
=head2 FUNCTIONAL LOGIN |
|
196
|
|
|
|
|
|
|
|
|
197
|
|
|
|
|
|
|
The main purpose of this module is simply to authenticate against a third |
|
198
|
|
|
|
|
|
|
party Identity Provider (IdP). |
|
199
|
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
However you can get a bit more than that. |
|
201
|
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
Your Dancer2 app might additionally use the "id_token" to access the API of |
|
203
|
|
|
|
|
|
|
the same (or other) third parties to enable you to do cool stuff with your |
|
204
|
|
|
|
|
|
|
apps, like show a feed, access data, etc. |
|
205
|
|
|
|
|
|
|
|
|
206
|
|
|
|
|
|
|
Because access to the third party systems would be cut off when the "id_token" |
|
207
|
|
|
|
|
|
|
expires, Dancer2::Plugin::Auth::OAuth will automatically set up the route |
|
208
|
|
|
|
|
|
|
C</auth/$provider/refresh>. Call this when the token has expired to try to |
|
209
|
|
|
|
|
|
|
refresh the token without bumping the user back to log in. You can optionally |
|
210
|
|
|
|
|
|
|
tell Dancer2::Plugin::Auth::OAuth to bump the user back to the login page if |
|
211
|
|
|
|
|
|
|
for whatever reason the refresh fails. |
|
212
|
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
In addition, Dancer2::Plugin::Auth::OAuth will save or generate an auth session |
|
214
|
|
|
|
|
|
|
key called "expires", which is (usually) number of seconds from epoch. Check |
|
215
|
|
|
|
|
|
|
this to determine if the "id_token" has expired (see examples below). |
|
216
|
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
Authenticate using one of the examples below but be sure to use the |
|
218
|
|
|
|
|
|
|
'refresh' functionality, as the logged in user will need to have a |
|
219
|
|
|
|
|
|
|
valid "id_token" at all times. |
|
220
|
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
Also make sure that you set the scope of your authentication to tell the third |
|
222
|
|
|
|
|
|
|
party what you wish to access (and for Microsoft/Azure also set the resource, |
|
223
|
|
|
|
|
|
|
for the same reason). |
|
224
|
|
|
|
|
|
|
|
|
225
|
|
|
|
|
|
|
Once you've got an active session you can get the "id_token" to use in further |
|
226
|
|
|
|
|
|
|
calls to the providers backend systems with: |
|
227
|
|
|
|
|
|
|
|
|
228
|
|
|
|
|
|
|
my $session_data = session->read('oauth'); |
|
229
|
|
|
|
|
|
|
my $token = $session_data->{$provider}{id_token}; |
|
230
|
|
|
|
|
|
|
|
|
231
|
|
|
|
|
|
|
=head1 SETTING THE SCOPE |
|
232
|
|
|
|
|
|
|
|
|
233
|
|
|
|
|
|
|
If you're authenticating in order to use the "id_token" issued, or if login |
|
234
|
|
|
|
|
|
|
requires a specific 'scope' setting, you can change these values in the initial |
|
235
|
|
|
|
|
|
|
calls like this within your YAML config (example provided for AzureAD plugin). |
|
236
|
|
|
|
|
|
|
|
|
237
|
|
|
|
|
|
|
Auth::OAuth: |
|
238
|
|
|
|
|
|
|
providers: |
|
239
|
|
|
|
|
|
|
AzureAD: |
|
240
|
|
|
|
|
|
|
query_params: |
|
241
|
|
|
|
|
|
|
authorize: |
|
242
|
|
|
|
|
|
|
scope: 'Calendars.ReadWrite Contacts.Read Directory.Read.All Files.Read.All Group.Read.All GroupMember.Read.All Mail.ReadWrite openid People.Read Sites.Read.All Sites.ReadWrite.All User.Read User.ReadBasic.All Files.Read.All' |
|
243
|
|
|
|
|
|
|
|
|
244
|
|
|
|
|
|
|
You do not need to list all other authorize attributes sent to the server, |
|
245
|
|
|
|
|
|
|
unless you want to change them from the default values set in the provider. |
|
246
|
|
|
|
|
|
|
Please view the provider source/documentation for what these default values are. |
|
247
|
|
|
|
|
|
|
|
|
248
|
|
|
|
|
|
|
You may also need to set a value for "resource" in the same way. Refer to your |
|
249
|
|
|
|
|
|
|
providers OAuth documentation. |
|
250
|
|
|
|
|
|
|
|
|
251
|
|
|
|
|
|
|
=head1 AUTHENTICATION EXAMPLES |
|
252
|
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
The response from the IdP is stored as a hash in the session with key "oauth". |
|
254
|
|
|
|
|
|
|
An example of a Facebook response: |
|
255
|
|
|
|
|
|
|
|
|
256
|
|
|
|
|
|
|
{ |
|
257
|
|
|
|
|
|
|
facebook { |
|
258
|
|
|
|
|
|
|
access_token "...", |
|
259
|
|
|
|
|
|
|
expires 1662472004, |
|
260
|
|
|
|
|
|
|
expires_in 5183933, |
|
261
|
|
|
|
|
|
|
issued_at 1657288071, |
|
262
|
|
|
|
|
|
|
token_type "bearer", |
|
263
|
|
|
|
|
|
|
user_info { |
|
264
|
|
|
|
|
|
|
email "someone@example.com", |
|
265
|
|
|
|
|
|
|
id 12345678901234567, |
|
266
|
|
|
|
|
|
|
name "José do Telhado", |
|
267
|
|
|
|
|
|
|
picture { |
|
268
|
|
|
|
|
|
|
data { |
|
269
|
|
|
|
|
|
|
height 50, |
|
270
|
|
|
|
|
|
|
is_silhouette 0, |
|
271
|
|
|
|
|
|
|
url "https://platform-lookaside.fbsbx.com/platform/profilepic/...", |
|
272
|
|
|
|
|
|
|
width 50 |
|
273
|
|
|
|
|
|
|
} |
|
274
|
|
|
|
|
|
|
}, |
|
275
|
|
|
|
|
|
|
} |
|
276
|
|
|
|
|
|
|
} |
|
277
|
|
|
|
|
|
|
} |
|
278
|
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
=over |
|
280
|
|
|
|
|
|
|
|
|
281
|
|
|
|
|
|
|
=item Full site needs a user authentication for a specific IdP. |
|
282
|
|
|
|
|
|
|
|
|
283
|
|
|
|
|
|
|
An example of a simple single system authentication. |
|
284
|
|
|
|
|
|
|
|
|
285
|
|
|
|
|
|
|
hook before => sub { |
|
286
|
|
|
|
|
|
|
my $session_data = session->read('oauth'); |
|
287
|
|
|
|
|
|
|
my $provider = "facebook"; # Lower case of the authentication plugin used |
|
288
|
|
|
|
|
|
|
|
|
289
|
|
|
|
|
|
|
if ((!defined $session_data || !defined $session_data->{$provider} || !defined $session_data->{$provider}{id_token}) && request->path !~ m{^/auth}) { |
|
290
|
|
|
|
|
|
|
return forward "/auth/$provider"; |
|
291
|
|
|
|
|
|
|
} |
|
292
|
|
|
|
|
|
|
}; |
|
293
|
|
|
|
|
|
|
|
|
294
|
|
|
|
|
|
|
If you want to be sure they have a valid "id_token" at all times: |
|
295
|
|
|
|
|
|
|
|
|
296
|
|
|
|
|
|
|
hook before => sub { |
|
297
|
|
|
|
|
|
|
my $session_data = session->read('oauth'); |
|
298
|
|
|
|
|
|
|
my $provider = "facebook"; # Lower case of the authentication plugin used |
|
299
|
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
my $now = DateTime->now->epoch; |
|
301
|
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
if ((!defined $session_data || !defined $session_data->{$provider} || !defined $session_data->{$provider}{id_token}) && request->path !~ m{^/auth}) { |
|
303
|
|
|
|
|
|
|
return forward '/auth/$provider'; |
|
304
|
|
|
|
|
|
|
|
|
305
|
|
|
|
|
|
|
} elsif (defined $session_data->{$provider}{refresh_token} && defined $session_data->{$provider}{expires} && $session_data->{$provider}{expires} < $now && request->path !~ m{^/auth}) { |
|
306
|
|
|
|
|
|
|
return forward "/auth/$provider/refresh"; |
|
307
|
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
} |
|
309
|
|
|
|
|
|
|
}; |
|
310
|
|
|
|
|
|
|
|
|
311
|
|
|
|
|
|
|
in the case where you're using the refresh functionality, a failure of the |
|
312
|
|
|
|
|
|
|
refresh will send the user back to the "error_url". If you want to them |
|
313
|
|
|
|
|
|
|
to instead be directed back to the main authentication (log in page) then |
|
314
|
|
|
|
|
|
|
please set the configuration option C<reauth_on_refresh_fail>. |
|
315
|
|
|
|
|
|
|
|
|
316
|
|
|
|
|
|
|
If the provider(s) you are using don't have the "id_token" |
|
317
|
|
|
|
|
|
|
change the example accordingly. |
|
318
|
|
|
|
|
|
|
|
|
319
|
|
|
|
|
|
|
=item Site has a mix of public zones and private or needing use authentication |
|
320
|
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
1. You only use one provider |
|
322
|
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
get '/we/need/a/user/here' => sub { |
|
324
|
|
|
|
|
|
|
my $session_data = session->read('oauth'); |
|
325
|
|
|
|
|
|
|
my $provider = "facebook"; |
|
326
|
|
|
|
|
|
|
|
|
327
|
|
|
|
|
|
|
redirect '/auth/$provider' unless $session_data && defined $session_data->{$provider}; |
|
328
|
|
|
|
|
|
|
|
|
329
|
|
|
|
|
|
|
... |
|
330
|
|
|
|
|
|
|
} |
|
331
|
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
|
|
333
|
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
2. You also have a login page to choose from a list of |
|
335
|
|
|
|
|
|
|
providers accepted by the site |
|
336
|
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
You may update the configuration file: |
|
338
|
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
"Auth::OAuth": |
|
340
|
|
|
|
|
|
|
success_url: /login/ok |
|
341
|
|
|
|
|
|
|
error_url: /login/fail |
|
342
|
|
|
|
|
|
|
|
|
343
|
|
|
|
|
|
|
And on your code |
|
344
|
|
|
|
|
|
|
|
|
345
|
|
|
|
|
|
|
get '/we/need/a/user/here' => sub { |
|
346
|
|
|
|
|
|
|
my $session_data = session->read('oauth'); |
|
347
|
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
redirect '/login' unless $session_data; |
|
349
|
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
... |
|
351
|
|
|
|
|
|
|
} |
|
352
|
|
|
|
|
|
|
|
|
353
|
|
|
|
|
|
|
get '/login/ok' => sub { |
|
354
|
|
|
|
|
|
|
my $session_data = session->read('oauth'); |
|
355
|
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
redirect '/login' unless $session_data; |
|
357
|
|
|
|
|
|
|
|
|
358
|
|
|
|
|
|
|
# Do something with the user data, update DB, |
|
359
|
|
|
|
|
|
|
# update session, etc |
|
360
|
|
|
|
|
|
|
|
|
361
|
|
|
|
|
|
|
} |
|
362
|
|
|
|
|
|
|
|
|
363
|
|
|
|
|
|
|
The login page can just have a list of the providers with |
|
364
|
|
|
|
|
|
|
a link to "/auth/<lc-name-of-the-provider>" |
|
365
|
|
|
|
|
|
|
|
|
366
|
|
|
|
|
|
|
You can mix this plugin with C<Dancer2::Plugin::Auth::Tiny> and |
|
367
|
|
|
|
|
|
|
on '/login/ok' you just define the 'user' session. Afterwards |
|
368
|
|
|
|
|
|
|
all validation can be against 'user' and not 'oauth'. |
|
369
|
|
|
|
|
|
|
|
|
370
|
|
|
|
|
|
|
=back |
|
371
|
|
|
|
|
|
|
|
|
372
|
|
|
|
|
|
|
=head1 AUTHOR |
|
373
|
|
|
|
|
|
|
|
|
374
|
|
|
|
|
|
|
Menno Blom E<lt>blom@cpan.orgE<gt> |
|
375
|
|
|
|
|
|
|
|
|
376
|
|
|
|
|
|
|
=head1 COPYRIGHT |
|
377
|
|
|
|
|
|
|
|
|
378
|
|
|
|
|
|
|
Copyright 2014- Menno Blom |
|
379
|
|
|
|
|
|
|
|
|
380
|
|
|
|
|
|
|
=head1 LICENSE |
|
381
|
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
This library is free software; you can redistribute it and/or modify |
|
383
|
|
|
|
|
|
|
it under the same terms as Perl itself. |
|
384
|
|
|
|
|
|
|
|
|
385
|
|
|
|
|
|
|
=cut |