For side project #4323194 (implement a chrome extension that looks like this: 👂 and turns red when someone mentions you on GitHub), I needed to implement oauth from AppEngine to GitHub. As I’ve mentioned before, oauth is my nemesis, but for this project there didn’t seem to be a great way around it. It actually wasn’t as bad as I remember… maybe I know more about HTTP now? Either way, I only messed up ~16 times before I got it authenticating properly.
When you want an app to work with the GitHub API, you go to GitHub and set up a new application, tell it what URL it should send people to after login, and it gives you a “secret key” that no one else should know. Then you simply implement oauth’s easy, intuitive flow:
- Redirect a user to https://github.com/login/oauth/authorize when you want them to log in.
- GitHub will ask the person to log in, then redirect back to the URL you gave it when you set up your app.
- You POST the secret key you got to https://github.com/login/oauth/access_token.
- GitHub replies with an access token, which you can then use in the header of subsequent requests to access the API.
The problem here is #3: the secret key. In ye olde world of “I have a server box, I shall SSH into it and poke things,” I would simply set an environment variable, SOOPER_SECRET=<shhh>
, then get that from my Java code. However, AppEngine prevents that sort of (convenient) nonsense.
So, I poked around and the thing I saw people recommending was to store the value in the database. This is an interesting idea. On the downside, it’s approximately a zillion times slower than accessing an environment variable. On the other hand, this is a login flow that makes three separate HTTP requests, I don’t think a database lookup is going to make a huge difference. On the plus side, it “automatically propagates” to new machines as you scale.
So I began working on a class to store the secret. Requirements:
- Easy to set: I want to be able to visit a URL (e.g., /secrets) to set the value.
- Difficult for others to set: I don’t want users to be able to override keys I’ve created, or create their own keys.
- Perhaps most importantly: difficult for me to unintentionally commit to a public GitHub repo. I am super bad at this, so I need a completely brain-dead way to never, ever have this touch my local code, otherwise it will end up on GitHub.
What I decided on:
Create a servlet (/secrets) that takes the key/value to set as a query parameter. The servlet will only set the secret key for keys I’ve defined in code (so visitors can’t set up their own secret keys) and will only set the secret key if it doesn’t exist in the database, yet. Thus, after the first time I visit /secrets, it’ll be a no-op (and actually can be disabled entirely in production). Because the secret is given as a query parameter, it never hits my code base. It will appear in request logs, but I’m willing to live with that.
What this looks like in an AppEngine app:
secrets com.meab.oauth.SecretDatastore secrets /secrets
And the Java code does some URI parsing and then:
private void findOrInsert(String key, String value) { Entity entity = getEntity(key); if (entity != null) { // No need to insert. return; } entity = new Entity(ENTITY_TYPE); entity.setProperty("key", key); entity.setProperty("value", value); datastore.put(entity); }
And the nice thing about using Google’s AppEngine datastore is that it’s easy (relatively) to write tests for all this.
You can check out the sources & tests at my git repo. (Note that the extension doesn’t actually work yet, right now it just logs in. I’ll write a followup post once it’s functional, since I think this might be relevant to some of my readers’ interests.)