§OAuth
OAuth is a simple way to publish and interact with protected data. It’s also a safer and more secure way for people to give you access. For example, it can be used to access your users’ data on Twitter.
There are two very different versions of OAuth: OAuth 1.0 and OAuth 2.0. Version 2 is simple enough to be implemented easily without library or helpers, so Play only provides support for OAuth 1.0.
§Usage
To use OAuth, first add ws
to your build.sbt
file:
libraryDependencies ++= Seq(
ws
)
§Required Information
OAuth requires you to register your application to the service provider. Make sure to check the callback URL that you provide, because the service provider may reject your calls if they don’t match. When working locally, you can use /etc/hosts
to fake a domain on your local machine.
The service provider will give you:
- Application ID
- Secret key
- Request Token URL
- Access Token URL
- Authorize URL
§Authentication Flow
Most of the flow will be done by the Play library.
- Get a request token from the server (in a server-to-server call)
- Redirect the user to the service provider, where he will grant your application rights to use his data
- The service provider will redirect the user back, giving you a /verifier/
- With that verifier, exchange the /request token/ for an /access token/ (server-to-server call)
Now the /access token/ can be passed to any call to access protected data.
More details on OAuth’s process flow are available at The OAuth Bible.
§Example
conf/routes
:
GET /twitter/homeTimeline controllers.Twitter.homeTimeline()
GET /twitter/auth controllers.Twitter.auth()
controller:
import play.libs.oauth.OAuth;
import play.libs.oauth.OAuth.ConsumerKey;
import play.libs.oauth.OAuth.OAuthCalculator;
import play.libs.oauth.OAuth.RequestToken;
import play.libs.oauth.OAuth.ServiceInfo;
import play.libs.ws.WSClient;
import play.mvc.Controller;
import play.mvc.Result;
import com.google.common.base.Strings;
import javax.inject.Inject;
import java.util.Optional;
import java.util.concurrent.CompletableFuture;
import java.util.concurrent.CompletionStage;
public class Twitter extends Controller {
static final ConsumerKey KEY = new ConsumerKey("...", "...");
private static final ServiceInfo SERVICE_INFO =
new ServiceInfo("https://api.twitter.com/oauth/request_token",
"https://api.twitter.com/oauth/access_token",
"https://api.twitter.com/oauth/authorize",
KEY);
private static final OAuth TWITTER = new OAuth(SERVICE_INFO);
private final WSClient ws;
@Inject
public Twitter(WSClient ws) {
this.ws = ws;
}
public CompletionStage<Result> homeTimeline() {
Optional<RequestToken> sessionTokenPair = getSessionTokenPair();
if (sessionTokenPair.isPresent()) {
return ws.url("https://api.twitter.com/1.1/statuses/home_timeline.json")
.sign(new OAuthCalculator(Twitter.KEY, sessionTokenPair.get()))
.get()
.thenApply(result -> ok(result.asJson()));
}
return CompletableFuture.completedFuture(redirect(routes.Twitter.auth()));
}
public Result auth() {
String verifier = request().getQueryString("oauth_verifier");
if (Strings.isNullOrEmpty(verifier)) {
String url = routes.Twitter.auth().absoluteURL(request());
RequestToken requestToken = TWITTER.retrieveRequestToken(url);
return redirect(TWITTER.redirectUrl(requestToken.token))
.addingToSession(request(), "token", requestToken.token)
.addingToSession(request(), "secret", requestToken.secret);
} else {
RequestToken requestToken = getSessionTokenPair().get();
RequestToken accessToken = TWITTER.retrieveAccessToken(requestToken, verifier);
return redirect(routes.Twitter.homeTimeline())
.addingToSession(request(), "token", accessToken.token)
.addingToSession(request(), "secret", accessToken.secret);
}
}
private Optional<RequestToken> getSessionTokenPair() {
if (request().session().containsKey("token")) {
return Optional.ofNullable(new RequestToken(request().session().get("token"), request().session().get("secret")));
}
return Optional.empty();
}
}
Note: OAuth does not provide any protection against MITM attacks. This example shows the OAuth token and secret stored in a session cookie – for the best security, always use HTTPS with
play.http.session.secure=true
defined.
Next: Integrating with Akka