Authentication Plugin for DocPad
Handles authentication and login functionality via social login for your docpad application. Protects pages from unauthenticated users. Uses the node module social-login to standardise the configuration interface to the various login strategies and handle routing and redirection.
The following services are supported:
- github
docpad install authentication
or
npm install docpad-plugin-authentication --save
Example configurations for facebook, twitter, google and gihub in the docpad configuration file:
plugins:
authentication:
#list of urls that will be protected by authentication
protectedUrls: ['/admin/*','/analytics/*','/super-secret-url/*']
###
Enable this if you get the `passport.initialize() middleware not in use` error.
This is caused when another plugin is loaded before the authentication plugin and is
applying routes before the authentication routes can be applied. This config option
forces the plugin to manually create the HTTP server and apply the authentication
routes before any other plugin.
###
forceServerCreation: false
###
If you want your app to be able to retrieve a list of users from the membership list
then you will need to supply a method to this config option - unless you just rely
on the default simple membership which populates this method automatically.
###
getUsers: () ->
#do something to get a list of users
###
configuration parameters for the various authentication
strategies. You will normally need to create an application
via the various services developer consoles to get a the
appropriate clientIDs and clientSecrets (sometimes called things
like consumer key/secrets or API key/secrets). Recommended that you
store these values in an environment file (https://docpad.org/docs/config)
and added to your .gitignore file
###
strategies:
facebook:
settings:
#if you use a .env file to store the clientID and clientSecret
#don't wrap them in quotes as that will be counted as extra characters
clientID: process.env.facebook_clientID
clientSecret: process.env.facebook_clientSecret
authParameters: scope: 'read_stream,manage_pages'
url:
auth: '/auth/facebook'
callback: '/auth/facebook/callback'
success: '/'
fail: '/login'
twitter:
settings:
clientID: process.env.twitter_clientID
clientSecret: process.env.twitter_clientSecret
url:
auth: '/auth/twitter'
callback: '/auth/twitter/callback'
success: '/'
fail: '/login'
google:
settings:
clientID: process.env.google_clientID
clientSecret: process.env.google_clientSecret
authParameters: scope: ['https://www.googleapis.com/auth/userinfo.profile','https://www.googleapis.com/auth/userinfo.email']
url:
auth: '/auth/google'
callback: '/auth/google/callback'
success: '/'
fail: '/login'
github:
settings:
clientID: process.env.github_clientID
clientSecret: process.env.github_clientSecret
url:
auth: '/auth/github'
callback: '/auth/github/callback'
success: '/'
fail: '/login'
environments:
development:
templateData:
site:
url: "http://127.0.0.1:9778"
plugins:
authentication:
strategies:
github:
settings:
#set development ids in env file
clientID: process.env.github_devclientID
clientSecret: process.env.github_devclientSecret
Note: You don't need to configure a logout URL unless you want to use a URL other than /logout
.
The plugin now has a simple membership system built in (since version 2.4.0). This is based on saving a list of users to an external JSON file. No extra configuration is required to use this membership as it is turned on by default. To override it you need only to supply a findOrCreate
method to the plugin configuration and then implement your own methods for finding, creating and saving users.
Please note
Much of the correct functioning of this plugin depends on the correct configuration on the side of the various services developer consoles. In particular, pay attention to URLs. Some services do not work well with localhost/127.0.0.1. I couldn't get facebook to work on localhost. Make sure the domain of your login button is on the same domain that the service returns you to. Seems obvious, but in testing I had a login page on 127.0.0.1 and the service was returning me to localhost. You will lose your session if you do that - and it may not be obvious why.
How to work out if it is your setup causing problems or your configuration of a particular service
Use github to test your own application, even if you don't intend to use github as your login service. If login works with github but not another service, chances are that the problem is with your configuration of the particular service that is failing. Some services are more difficult to configure correctly than others, but github seems to be the easiest. Also check the url returned by a failing service. Often there is information in the response header or query parameters returned by the service.
Don't test in development mode with live reload
To write out any information, such as username, that is returned from the login, you will need to mark the page as dynamic (and install the clean urls plugin). However, this seems to cause a problem when in development mode and the live reload. I don't think this is specific to this plugin, but it means you will end up in a loop of the page regenerating and reloading. It's best to just remove the livereload plugin. Delete it from the package.json file and the node_modules directory.
Plugin checks for configured authentication strategies
The plugin now checks the configured authentication strategies all have a clientID and clientSecret. If not, these strategies are removed and a warning issued through the console. If no strategies are configured, a warning will be issued that no pages will be protected by authentication.
For a working example using twitter, facebook, google and github, refer to the My Authentication Website
Licensed under the incredibly permissive MIT license
Copyright © 2015+ Steve McArthur [email protected] (http://www.stevemcarthur.co.uk)