0.8.3 - This version may not be safe as it has not been updated for a long time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT LicenseGitHub OAuth2 strategy for Überauth.
Setup your application at GitHub Developer.
Add :ueberauth_github to your list of dependencies in mix.exs:
def deps do
[
{:ueberauth_github, "~> 0.8"}
]
endAdd GitHub to your Überauth configuration:
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, []}
]Update your provider configuration:
config :ueberauth, Ueberauth.Strategy.Github.OAuth,
client_id: System.get_env("GITHUB_CLIENT_ID"),
client_secret: System.get_env("GITHUB_CLIENT_SECRET")Or, to read the client credentials at runtime:
config :ueberauth, Ueberauth.Strategy.Github.OAuth,
client_id: {:system, "GITHUB_CLIENT_ID"},
client_secret: {:system, "GITHUB_CLIENT_SECRET"}Include the Überauth plug in your router:
defmodule MyApp.Router do
use MyApp.Web, :router
pipeline :browser do
plug Ueberauth
...
end
endCreate the request and callback routes if you haven't already:
scope "/auth", MyApp do
pipe_through :browser
get "/:provider", AuthController, :request
get "/:provider/callback", AuthController, :callback
endYour controller needs to implement callbacks to deal with Ueberauth.Auth
and Ueberauth.Failure responses.
For an example implementation see the Überauth Example application.
Depending on the configured url you can initiate the request through:
/auth/github
Or with options:
/auth/github?scope=user,public_repo
By default the requested scope is "user,public\_repo". This provides both read
and write access to the GitHub user profile details and public repos. For a
read-only scope, either use "user:email" or an empty scope "". Empty scope
will only request minimum public information which even excludes user's email address
which results in a nil for email inside returned %Ueberauth.Auth.Info{}.
See more at GitHub's OAuth Documentation.
Scope can be configured either explicitly as a scope query value on the
request path or in your configuration:
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, [default_scope: "user,public_repo,notifications"]}
]It is also possible to disable the sending of the redirect_uri to GitHub.
This is particularly useful when your production application sits behind a
proxy that handles SSL connections. In this case, the redirect_uri sent by
Ueberauth will start with http instead of https, and if you configured
your GitHub OAuth application's callback URL to use HTTPS, GitHub will throw an
uri_mismatch error.
To prevent Ueberauth from sending the redirect_uri, you should add the
following to your configuration:
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, [send_redirect_uri: false]}
]GitHub now allows you to keep your email address private. If you don't mind
that you won't know a users email address you can specify
allow_private_emails. This will set the users email as
id+username@users.noreply.github.com.
config :ueberauth, Ueberauth,
providers: [
github: {Ueberauth.Strategy.Github, [allow_private_emails: true]}
]Copyright (c) 2015 Daniel Neighman
This library is released under the MIT License. See the LICENSE.md file