wine_bouncer
wine_bouncer copied to clipboard
A Ruby gem that allows Oauth2 protection with Doorkeeper for Grape Api's
Hey @antek-drzewiecki, first of all, thank you very much for all the hard work you contributed into this gem! For one of my projects I use the newest version of...
Current strategies (default, protected, and swagger) are not very handy to use. I guess that `swagger` could be an additional configuration, injecting swagger specific syntax. And for the `protected`, maybe...
I have an enpoint that can work both authorized and not authorized, when I don't decorate it with `oauth2` I can't seem to be able to get the resource_owner even...
Thanks for providing this gem, it helped me a lot and I have something up and running. During the process of setting everything up (Grape, WineBouncer, Swagger and SwaggerUI) I...
Added the call to Doorkeeper's authenticate_admin initializer block to valid_doorkeeper_token? method. This make it possible to define the block in such a way in config/initializers/doorkeeper.rb: ``` admin_authenticator do |doorkeeper_token| User.find(doorkeeper_token.resource_owner_id).admin?...
not sure if this is just my special usecase or if this PR is already general enough for other people to be useful. feedback please. anyways we need this patch...
but it is dirty hack.
The [client credentials flow](https://github.com/doorkeeper-gem/doorkeeper/wiki/Client-Credentials-flow) only authenticates the client application without a user role. So basically there is a valid `doorkeeper_access_token` but no `resource_owner`. The configuration looks like this: ``` config.define_resource_owner...
Application uses rails-4.2 grape (0.17.0) doorkeeper (2.1.4) wine_bouncer (1.0.1) grape (0.17.0) devise (4.2.0) omniauth (1.3.1) warden (1.2.6) ruby 2.3.1p112 (2016-04-26 revision 54768) [x86_64-linux] 4.4.0-38-generic #57-Ubuntu SMP Tue Sep 6 15:42:33...
When setting oauth2 'admin' scope, only the access_token scope is analyzed, returning error if the 'admin' scope is missing. Woluld be better to, also, analyze user's role. Didn't quite get...