OAuth2 authentication for yesod
Go to file
2023-08-01 10:37:16 -04:00
.github/workflows Update resolvers 2023-08-01 10:37:16 -04:00
example Convert project to Fourmolu 2023-08-01 10:37:16 -04:00
src Fixup token-related comments 2023-08-01 10:37:16 -04:00
test Convert project to Fourmolu 2023-08-01 10:37:16 -04:00
.env.example Add AzureADv2 plugin 2023-04-06 11:19:32 -04:00
.gitignore address comment: add auth0 to example 2022-08-18 12:49:51 +00:00
.hlint.yaml Address HLint issues 2018-01-23 10:16:22 -05:00
.restyled.yaml Convert project to Fourmolu 2023-08-01 10:37:16 -04:00
CHANGELOG.md Version bump 2023-04-06 11:19:32 -04:00
fourmolu.yaml Convert project to Fourmolu 2023-08-01 10:37:16 -04:00
LICENSE Update licensing and package metadata 2021-03-01 10:44:56 -05:00
Makefile Update nightly CI 2020-12-21 08:40:43 -05:00
package.yaml Version bump 2023-04-06 11:19:32 -04:00
README.md Document Example in README 2023-04-06 08:43:14 -04:00
Setup.lhs Initial import 2013-07-14 11:11:44 +02:00
stack-hoauth2-2.0.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-hoauth2-2.0.yaml.lock Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-hoauth2-2.2.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-hoauth2-2.2.yaml.lock Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-hoauth2-2.3.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-hoauth2-2.3.yaml.lock Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-hoauth2-2.6.yaml Fixup allow-newer-deps 2023-04-06 16:50:44 -04:00
stack-hoauth2-2.6.yaml.lock Fix hoauth2 compat for 2.7.0 (#165) 2023-02-01 14:20:08 -05:00
stack-lts-14.27.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-14.27.yaml.lock Fixup 2023-04-06 16:41:29 -04:00
stack-lts-16.31.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-16.31.yaml.lock Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-18.28.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-18.28.yaml.lock Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-19.33.yaml Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-19.33.yaml.lock Refactor stack matrix 2023-04-06 14:50:52 -04:00
stack-lts-20.26.yaml Update resolvers 2023-08-01 10:37:16 -04:00
stack-lts-20.26.yaml.lock Update resolvers 2023-08-01 10:37:16 -04:00
stack-nightly.yaml Update resolvers 2023-08-01 10:37:16 -04:00
stack-nightly.yaml.lock Update resolvers 2023-08-01 10:37:16 -04:00
stack.yaml Update resolvers 2023-08-01 10:37:16 -04:00
stack.yaml.lock Update resolvers 2023-08-01 10:37:16 -04:00
yesod-auth-oauth2.cabal Version bump 2023-04-06 11:19:32 -04:00

Yesod.Auth.OAuth2

Hackage Stackage Nightly Stackage LTS CI

OAuth2 AuthPlugins for Yesod.

Usage

import Yesod.Auth
import Yesod.Auth.OAuth2.GitHub

instance YesodAuth App where
    -- ...

    authPlugins _ = [oauth2GitHub clientId clientSecret]

clientId :: Text
clientId = "..."

clientSecret :: Text
clientSecret = "..."

Some plugins, such as GitHub and Slack, have scoped functions for requesting additional information:

oauth2SlackScoped [SlackBasicScope, SlackEmailScope] clientId clientSecret

Working with Extra Data

We put the minimal amount of user data possible in credsExtra -- just enough to support you parsing or fetching additional data yourself.

For example, if you work with GitHub and GitHub user profiles, you likely already have a model and a way to parse the /user response. Rather than duplicate all that in our library, we try to make it easy for you to re-use that code yourself:

authenticate creds = do
    let
        -- You can run your own FromJSON parser on the response we already have
        eGitHubUser :: Either String GitHubUser
        eGitHubUser = getUserResponseJSON creds

        -- Avert your eyes, simplified example
        Just accessToken = getAccessToken creds
        Right githubUser = eGitHubUser

    -- Or make followup requests using our access token
    runGitHub accessToken $ userRepositories githubUser

    -- Or store it for later
    insert User
        { userIdent = credsIdent creds
        , userAccessToken = accessToken
        }

NOTE: Avoid looking up values in credsExtra yourself; prefer the provided get functions. The data representation itself is no longer considered public API.

Local Providers

If we don't supply a "Provider" (e.g. GitHub, Google, etc) you need, you can write your own using our provided Prelude:

import Yesod.Auth.OAuth2.Prelude

pluginName :: Text
pluginName = "mysite"

oauth2MySite :: YesodAuth m => Text -> Text -> AuthPlugin m
oauth2MySite clientId clientSecret =
    authOAuth2 pluginName oauth2 $ \manager token -> do
        -- Fetch a profile using the manager and token, leave it a ByteString
        userResponse <- -- ...

        -- Parse it to your preferred identifier, e.g. with Data.Aeson
        userId <- -- ...

        -- See authGetProfile for the typical case

        pure Creds
            { credsPlugin = pluginName
            , credsIdent = userId
            , credsExtra = setExtra token userResponse
            }
  where
    oauth2 = OAuth2
        { oauth2ClientId = clientId
        , oauth2ClientSecret = Just clientSecret
        , oauth2AuthorizeEndpoint = "https://mysite.com/oauth/authorize"
        , oauth2TokenEndpoint = "https://mysite.com/oauth/token"
        , oauth2RedirectUri = Nothing
        }

The Prelude module is considered public API, though we may build something higher-level that is more convenient for this use-case in the future.

Development & Tests

stack setup
stack build --dependencies-only
stack build --pedantic --test

Please also run HLint and Weeder before submitting PRs.

Example

This project includes an executable that runs a server with (almost) all supported providers present.

To use:

  1. cp .env.example .env and edit in secrets for providers you wish to test

    Be sure to include http://localhost:3000/auth/page/{plugin}/callback as a valid Redirect URI when configuring the OAuth application.

  2. Build with the example: stack build ... --flag yesod-auth-oauth2:example

  3. Run the example stack exec yesod-auth-oauth2-example

  4. Visit the example: $BROWSER http://localhost:3000

  5. Click the log-in link for the provider you configured

If successful, you will be presented with a page that shows the credential and User response value.


CHANGELOG | LICENSE