0.0
The project is in a healthy, maintained state
A Ruby library for implementing AT Protocol OAuth flows, including DPoP, PAR, and dynamic client registration. Supports both client and server-side implementations with comprehensive security features.
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
 Dependencies

Runtime

~> 1.2
~> 2.9
~> 5.3
 Project Readme

AtprotoAuth

Gem Version Ruby Style Guide Documentation

A Ruby implementation of the AT Protocol OAuth specification. This library provides support for both client and server-side implementations, with built-in security features including DPoP, PAR, and dynamic client registration.

Features

  • Complete AT Protocol OAuth 2.0 implementation
  • Secure by default with mandatory DPoP and PKCE
  • Support for confidential (backend) and public clients
  • Thread-safe session and token management
  • Comprehensive identity resolution and verification
  • Automatic token refresh and session management
  • Robust error handling and recovery mechanisms
  • Configurable storage backends with built-in Redis support
  • Encrypted storage of sensitive data

Installation

Add this line to your application's Gemfile:

gem 'atproto_auth'

And then execute:

bundle install

Or install it yourself as:

gem install atproto_auth

Requirements

  • Ruby 3.3 or higher
  • OpenSSL support
  • For confidential clients: HTTPS-capable domain for client metadata hosting
  • Optional: Redis 5.0+ for production storage backend

Basic Usage

Configuration

require 'atproto_auth'

AtprotoAuth.configure do |config|
  # Configure HTTP client settings
  config.http_client = AtprotoAuth::HttpClient.new(
    timeout: 10,
    verify_ssl: true
  )

  # Set token lifetimes
  config.default_token_lifetime = 300 # 5 minutes
  config.dpop_nonce_lifetime = 300  # 5 minutes

  # Configure storage backend (default is in-memory)
  config.storage = AtprotoAuth::Storage::Memory.new
end

# For production environments, use Redis storage:
AtprotoAuth.configure do |config|
  # Configure Redis storage
  config.storage = AtprotoAuth::Storage::Redis.new(
    redis_client: Redis.new(url: ENV['REDIS_URL'])
  )
end

Storage Backends

The library supports multiple storage backends for managing OAuth state:

In-Memory Storage (Default)

# Default configuration - good for development
AtprotoAuth.configure do |config|
  config.storage = AtprotoAuth::Storage::Memory.new
end

Redis Storage (Recommended for Production)

# Redis configuration - recommended for production
require 'redis'

AtprotoAuth.configure do |config|
  redis_client = Redis.new(
    url: ENV['REDIS_URL'],
    ssl_params: { verify_mode: OpenSSL::SSL::VERIFY_PEER }
  )
  
  config.storage = AtprotoAuth::Storage::Redis.new(
    redis_client: redis_client
  )
end

Custom Storage Implementation

# Implement your own storage backend
class CustomStorage < AtprotoAuth::Storage::Interface
  def set(key, value, ttl: nil)
    # Implementation
  end

  def get(key)
    # Implementation
  end

  def delete(key)
    # Implementation
  end

  def exists?(key)
    # Implementation
  end

  def multi_get(keys)
    # Implementation
  end

  def multi_set(hash, ttl: nil)
    # Implementation
  end

  def acquire_lock(key, ttl:)
    # Implementation
  end

  def release_lock(key)
    # Implementation
  end

  def with_lock(key, ttl: 30)
    # Implementation
  end
end

Confidential Client Example

Here's a basic example of using the library in a confidential client application:

# Initialize client with metadata
client = AtprotoAuth::Client.new(
  client_id: "https://app.example.com/client-metadata.json",
  redirect_uri: "https://app.example.com/callback",
  metadata: {
    # Your client metadata...
  }
)

# Start authorization flow
auth = client.authorize(
  handle: "user.bsky.social",
  scope: "atproto"
)

# Use auth[:url] to redirect user

# Handle callback
tokens = client.handle_callback(
  code: params[:code],
  state: params[:state],
  iss: params[:iss]
)

# Make authenticated requests
headers = client.auth_headers(
  session_id: tokens[:session_id],
  method: "GET",
  url: "https://api.example.com/resource"
)

For a complete working example of a confidential client implementation, check out the example application in examples/confidential_client/. This Sinatra-based web application demonstrates:

  • Complete OAuth flow implementation
  • Session management
  • DPoP token binding
  • Making authenticated API requests
  • Proper error handling
  • Key generation and management

See examples/confidential_client/README.md for setup instructions and implementation details.

Public Client Example

client = AtprotoAuth::Client.new(
  client_id: "https://app.example.com/client-metadata.json",
  redirect_uri: "https://app.example.com/callback"
)

# Browser will open authorization URL
auth = client.authorize(
  handle: "user.bsky.social",
  scope: "atproto"
)

# After callback, exchange code for tokens
tokens = client.handle_callback(
  code: params[:code],
  state: params[:state],
  iss: params[:iss]
)

Features In Detail

Identity Resolution

The library handles the complete AT Protocol identity resolution flow:

  • Handle to DID resolution (DNS-based or HTTP fallback)
  • DID document fetching and validation
  • PDS (Personal Data Server) location verification
  • Bidirectional handle verification
  • Authorization server binding verification

Token & Session Management

Comprehensive token lifecycle management:

  • Secure token storage with encryption
  • Automatic token refresh
  • DPoP proof generation and binding
  • Session state tracking
  • Cleanup of expired sessions

Security Features

Built-in security best practices:

  • Mandatory PKCE for all flows
  • DPoP token binding
  • Constant-time token comparisons
  • Thread-safe state management
  • Protection against SSRF attacks
  • Secure encrypted token storage
  • Atomic storage operations with locking

Development

After checking out the repo, run bin/setup to install dependencies. Then, run rake test to run the tests. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and the created tag, and push the .gem file to rubygems.org.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/jhuckabee/atproto_auth.

License

The gem is available as open source under the terms of the MIT License.