BtrzAuth

Build status badge

Elixir package for authentication handling using Plug and Guardian (JWT). It supports X-API-KEY token and Authorization tokens, for external users or internal API communication.

Documentation

API documentation at HexDocs https://hexdocs.pm/btrz_ex_auth_api

Installation

If available in Hex, the package can be installed by adding btrz_auth to your list of dependencies in mix.exs:

def deps do
  [{:btrz_ex_auth_api, "~> 0.7.0"}]
end

Add your configuration

config :btrz_ex_auth_api, :token,
    issuer: "your-issuer",
    main_secret: "YOUR_MAIN_KEY",
    secondary_secret: "YOUR_SECONDARY_KEY"

Plugs

You can use the Guardian Plugs and the ones added by BtrzAuth:

BtrzAuth.Plug.VerifyApiKey

Looks for the header or querystring x-api-key and verify the account, saving it into conn.private[:account].

BtrzAuth.Plug.VerifyToken

It depends on BtrzAuth.Plug.VerifyApiKey, looks for a token in the Authorization header and verify it using first the account's private key loading the user id in the conn.private[:user_id], if not valid, then main and secondary secrets provided by your app for internal token cases.

BtrzAuth.Plug.VerifyPremium

Looks for and validates that the passed keys features are present in the account data under conn.private.account["premium"] saved by BtrzAuth.Plug.VerifyApiKey (the order of the plugs is very important!)

Pipelines

BtrzAuth.Pipeline.ApiKeySecured

This pipeline will check the x-api-key header or querystring is sent and load the implemented resource in conn.private[:account].

  • plug BtrzAuth.Plug.VerifyApiKey

BtrzAuth.Pipeline.TokenSecured

This pipeline will check the x-api-key header loading the account data in conn.private[:account] and also the token with the private key or the configured main and secondary secret keys in case the token could be an internal one, then ensure authenticated and load the implemented resource id in the conn.private[:user_id].

  • plug BtrzAuth.Plug.VerifyApiKey
  • plug BtrzAuth.Plug.VerifyToken
  • plug Guardian.Plug.EnsureAuthenticated

You can add pipelines in your Phoenix Router to get different authentication working.

pipeline :token_secured do
  plug BtrzAuth.Pipelines.TokenSecured
end

scope "/" do
  pipe_through :token_secured
  # your routes here...
end

Phoenix Channels

For Phoenix socket auth we wrap the Guardian.Phoenix.Socket module in order to use our internal-token, you might add to your user_socket.ex:

def connect(%{"token" => token}, socket) do
  case BtrzAuth.Phoenix.SocketAuth.authenticate(socket, token) do
    {:ok, authed_socket} ->
      {:ok, authed_socket}
    {:error, _} -> :error
  end
end

def connect(_params, _socket) do
  :error
end

Integration tests in your API

Add the test_resource in order to test your endpoints once the plugs or pipelines are defined:

config :btrz_ex_auth_api, :token,
    issuer: "your-issuer",
    main_secret: "YOUR_MAIN_KEY",
    secondary_secret: "YOUR_SECONDARY_KEY"
    test_resource: %{account_id: "DESIRED_ID"}

and use "test-token" as your test token in the Authorization header.

Documentation can be generated with ExDoc and published on HexDocs. Once published, the docs can be found at https://hexdocs.pm/btrz_auth.