npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

@brainhubeu/hadron-oauth

v1.0.2

Published

Hadron module for authorisation from OAuth2 providers.

Downloads

4

Readme

Installation

npm install --save @brainhubeu/hadron-oauth

Overview

hadron-oauth is a Hadron utility package to simplify working with OAuth providers, such as Google and Facebook. It provides several utility functions that you can use to make writing OAuth2 authentication quicker and more streamlined.

Tutorial

Understanding OAuth flow

The plan for our authentication flow is as follows:

  • The client makes a GET request to /auth/{provider} to begin the process of authentication.
  • The server redirects the client to a provider consent site.
  • The client receives an auth code.
  • The client makes a POST request to /auth/{provider}/token to exchange the auth code for an access token.

We can then use the access token to make further request to the provider's API in order to fetch data about the user (such as their name or email).

Configuration

We will need to provide certain information to hadron-oauth before we can proceed with the auth process. This information exists in Hadron's config file.

// oauth.js
module.exports = {
  google: {
    clientID: 'keyboard-cat',
    clientSecret: 'shhh',
    scope: ['https://www.googleapis.com/auth/userinfo.profile'],
    redirectUri: 'http://localhost:8081/',
  },
};

The clientID and clientSecret fields need to be the same as these given to you by your provider (such as the Google API Console). The redirectUri must be exactly the same as the one given to your provider.

scope is an array of strings defining the scopes your app requires from the user. See the Google scopes and Facebook scopes for details. These can be used later to retrieve relevant data from your provider's APIs about the user.

In this case, we'll also pretend that there is a front-end dev server at http://localhost:8081, however we can just as well redirect the calls back to our own server.

It's recommended that you exclude this file from your version control or supply the specific config fields through environment variables as this file contains sensitive information.

Registration

Now that our config is created, we need to create our Hadron app entry point.

// index.js
const hadron = require('@brainhubeu/hadron-core').default;
const hadronExpress = require('@brainhubeu/hadron-express');
const hadronOauth = require('@brainhubeu/hadron-oauth');

const express = require('express');
const oauthConfig = require('./oauth.js');

const app = express();

const config = {
  oauth: oauthConfig,
  routes: {
    root: {
      path: '/',
      methods: ['GET'],
      callback: () => 'Hello!',
    },
  },
};

hadron(app, [hadronExpress, hadronOauth], config).then(() => {
  app.listen(8080, () => {
    console.log('Hadron/Express listening on 8080.');
  });
});

We now have access to the OAuth methods through the container.

Auth code route

Let's create a separate file to store the logic for our route endpoints. We'll first create a route to redirect to the consent screen.

// routes.js
const routes = {
  googleAuthRequest: {
    path: '/auth/google',
    methods: ['GET'],
    callback: (req, { oauth }) => ({
      redirect: oauth.google.redirect(),
    }),
  },
};

module.exports = routes;
// index.js
const oauthRoutes = require('./routes');
// ...
const config = {
  routes: {
    root: {
      // ...
    },
    ...oauthRoutes,
  },
};

Now, whenever a client calls the /auth/google endpoint, he or she will be redirected to the Google auth consent page.

Handling the auth code

Now, we'll delve into the client side here for a minute, because we need to send the auth code that the client receives back to the server.

In the oauth.js config file we defined a redirect to our front-end dev server. We now need to send the authorization code from that server back to our app.

We can do it like this:

// client side javascript
const url = new URL(window.location);
const params = new URLSearchParams(url.search);
const code = params.get('code');

if (!code) return;

fetch('http://localhost:8080/auth/google/token', {
  method: 'POST',
  headers: { 'content-type': 'application/json' },
  body: JSON.stringify({ code }),
}).then((res) => {
  // ...
});

Exchanging the code for an access token.

We'll define another route to exchange the auth code for an access token.

// routes.js
const routes = {
  googleAuthRequest: {
    // ...
  },
  googleTokenRequest: {
    path: '/auth/google/token',
    methods: ['POST'],
    callback: (req, { oauth }) => {
      oauth.google.token(req.body.code).then((res) => {
        console.log(res.access_token);
        // do things with the token...
      });
    },
  },
};

module.exports = routes;

Now that we have the access token we can implement other features, such as our own authentication. We can also call the Google API in the name of the user to pull any relevant information we need.

Reference

Config

google.

  • clientID: string - your app id as provided by the Google API Console.
  • clientSecret: string - your app secret from the Google API Console
  • scope: string[] - an array of strings listing the scope URLs you need for your app.
  • redirectUri: string - redirect URI for your app, must be exactly the same as the one you chose in Google API Console.
  • authUrl: ?string - an optional parameter to provide a different auth URL to Google (for instance if the current one was to stop working). Defaults to https://accounts.google.com/o/oauth2/v2/auth.
  • tokenUrl: ?string - an optional parameter to provide a different token exchange Google API endpoint. Defaults to https://www.googleapis.com/oauth2/v4/token.
  • responseType: ?string - if Google was to support a different kind of OAuth authentication flow, we could specify the response type here. Currently, it only supports code and so it defaults to that.
  • grantType: ?string - similarly to the point above, if Google was to support a different kind of OAuth authentication flow, we could specify the grant type here. Defaults to authorization_code.

facebook.

  • clientID: string - your app id as provided by the App Dashboard.
  • clientSecret: string - your app secret from the App Dashboard.
  • scope: string[] - an array of strings listing Facebook API scopes.
  • redirectUri: string - the redirect URI for your app, must be the same as in the App Dashboard.
  • authUrl: ?string - see above, defaults to https://www.facebook.com/v3.0/dialog/oauth.
  • tokenUrl: ?string - see above, defaults to https://graph.facebook.com/v3.0/oauth/access_token
  • responseType - see above, defaults to code.

github.

  • clientID: string - your app id as provided in the Github Developer Settings.
  • clientSecert: string - your app secret from the Developer Settings.
  • scope: string[] - an array of strings listing Github API scopes.
  • redirectUri: string - the redirect URI for your app, must be the same as in the Developer Settings.
  • authUrl: ?string - see above, defaults to https://github.com/login/oauth/authorize.
  • tokenUrl: ?string - see above, defaults to https://github.com/login/oauth/access_token
  • allowSignup: ?boolean - determines whether the user will be able to sign up to Github while authorizing the app, defaults to true.

Methods

oauth.google.

  • redirect() => string - parses the config options and returns a redirect URL to the user consent screen.
  • token(code: string) => Promise - exchanges the auth code in the first argument for an access token. Returns a promise which resolves to the response from Google.

oauth.facebook.

  • redirect(state: ?string) => string - parses the config and returns a redirect URL to the user consent screen. You can provide a state string to secure your app against CSRF (see here for details).
  • token(code: string) => Promise - exchanges the auth code in the first argument for an access token. Returns a promise which resolves to the repsonse from Facebook.

oauth.github.

  • redirect(state: ?string) => string - parses the config and returns a redirect URL to the user consent screen. You can provide a state string to secure your app against CSRF.
  • token(code: string, state: ?string) => Promise - exchanges the auth code in the first argument for an access token. Returns a promise which resolves to the repsonse from Facebook.