Doorkeeper is a gem that makes it easy to introduce OAuth 2 provider functionality to your application.
The gem is under constant development. It is based in the version 22 of the OAuth specification and it still does not support all OAuth features.
For more information about the supported features, check out the related page in the wiki. For more information about OAuth 2 go to OAuth 2 Specs (Draft).
- 1.8.7, 1.9.2 or 1.9.3
- 3.1.x or 3.2.x
- ActiveRecord
- Mongoid 2 (only for doorkeeper v0.5+)
Put this in your Gemfile:
gem 'doorkeeper', '~> 0.4.2'
Run the installation generator with:
rails generate doorkeeper:install
This will install the doorkeeper initializer into config/initializers/doorkeeper.rb
.
By default doorkeeper is configured to use active record, so to start you have to generate the migration tables:
rails generate doorkeeper:migration
Don't forget to run the migration with:
rake db:migrate
Doorkeeper currently supports Mongoid 2. To start using it, you have to set the orm
configuration:
Doorkeeper.configure do
orm :mongoid
end
Note: Make sure you create indexes for doorkeeper models. You can do this either by running db:mongoid:create_indexes
or by adding autocreate_indexes: true
to your config/mongoid.yml
The installation script will also automatically add the Doorkeeper routes into your app, like this:
Rails.application.routes.draw do
use_doorkeeper
# your routes
end
This will mount following routes:
GET /oauth/authorize
POST /oauth/authorize
DELETE /oauth/authorize
POST /oauth/token
resources /oauth/applications
For more information on how to customize routes, check out this page on the wiki.
You need to configure Doorkeeper in order to provide resource_owner model and authentication block initializers/doorkeeper.rb
Doorkeeper.configure do
resource_owner_authenticator do |routes|
current_user || redirect_to(routes.login_url) # returns nil if current_user is not logged in
end
end
This block runs into the context of your Rails application, and it has access to current_user
method, for example.
If you use devise, you may want to use warden to authenticate the block:
resource_owner_authenticator do |routes|
current_user || warden.authenticate!(:scope => :user)
end
If you are not using devise, you may want to check other ways of authentication here.
To protect your API with OAuth, doorkeeper only requires you to call doorkeeper_for
helper, specifying the actions you want to protect.
For example, if you have a products controller under api/v1, you can require the OAuth authentication with:
class Api::V1::ProductsController < Api::V1::ApiController
doorkeeper_for :all # Require access token for all actions
doorkeeper_for :all, :except => :index # All actions except index
doorkeeper_for :index, :show # Only for index and show action
# your actions
end
You don't need to setup any before filter, doorkeeper_for
will handle that for you.
You can pass if
or unless
blocks that would specify when doorkeeper has to guard the access.
class Api::V1::ProductsController < Api::V1::ApiController
doorkeeper_for :all, :if => lambda { request.xhr? }
end
The doorkeeper_for
filter is intended to work with ActionController::Metal too. You only need to include the required ActionController
modules:
class MetalController < ActionController::Metal
include AbstractController::Callbacks
include ActionController::Head
include Doorkeeper::Helpers::Filter
doorkeeper_for :all
end
For more information about integration and other integrations, check out the related wiki page.
You can also require the access token to have specific scopes in certain actions:
First configure the scopes in initializers/doorkeeper.rb
Doorkeeper.configure do
default_scopes :public # if no scope was requested, this will be the default
optional_scopes :admin, :write
end
The in your controllers:
class Api::V1::ProductsController < Api::V1::ApiController
doorkeeper_for :index, :show, :scopes => [:public]
doorkeeper_for :update, :create, :scopes => [:admin, :write]
end
For a more detailed explanation about scopes usage, check out the related page in the wiki.
If you want to return data based on the current resource owner, in other words, the access token owner, you may want to define a method in your controller that returns the resource owner instance:
class Api::V1::CredentialsController < Api::V1::ApiController
doorkeeper_for :all
respond_to :json
# GET /me.json
def me
respond_with current_resource_owner
end
private
# Find the user that owns the access token
def current_resource_owner
User.find(doorkeeper_token.resource_owner_id) if doorkeeper_token
end
end
In this example, we're returning the credentials (me.json
) of the access token owner.
If you want to upgrade doorkeeper to a new version, check out the upgrading notes and take a look at the changelog.
You can find everything about doorkeeper in our wiki here.
Check out this live demo hosted on heroku. For more demos check out the wiki.
Check out this screencast from railscasts.com: #353 OAuth with Doorkeeper
After you set up the provider, you may want to create a client application to test the integration. Check out these client examples in our wiki or follow this tutorial here.
Want to contribute and don't know where to start? Check out features we're missing, create example apps, integrate the gem with your app and let us know!
Also, check out our contributing guidelines page.
All supported ruby versions are listed here.
You might want to use Doorkeeper to protect an API and want an other application running in a different context (like a mobile application) to request on your API.
For mobile application, you might have to setup Cross Origin Resource Sharing. More info here
In order to setup the bahavior, you can take a look at rack-cors. It's a rack middleware that will set http headers for you in order to be able to make cross domain requests to your doorkeeper protected application (usualy your API).
Here is a demo application where rack-cors has been setup.
- Felipe Elias Philipp (github.com/felipeelias, twitter.com/felipeelias)
- Piotr Jakubowski (github.com/piotrj, twitter.com/piotrjakubowski)
Thanks to all our awesome contributors!
MIT License. Copyright 2011 Applicake. http://applicake.com