Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
This project is a Node.js library consisting of a client for interacting with Coursera's OAuth2 authorizes APIs.
Install Node.js from https://nodejs.org/en/download/
Clone project, open terminal, go to project directory, run in terminal 'npm install', you can find jar in $project_dir/target/ folder.
Before using Coursera's OAuth2 APIs, be sure you know your client id, client secret, and scopes you want for your application. You may create an application at https://accounts.coursera.org/console. When creating the application, set the Redirect URI to be http://localhost:9876/callback?client_id=<your_client_id>.
Usage
(Client-side module)
(Server-side module) You can use module in different way:
The Coaclient tries to open the default system browser. The application configuration will be saved to the local file if the request is succeeded. You should check the data you've provided to the library during application configuration if you see any errors in the browser.
If client was successfully added and configured, you will be able to successfully get authentication tokens for Coursera API. Otherwise, an exception will be thrown telling you to set up your application for API access.
class CourseraOAuth2API
Methods: :: addClient(clientName, clientId, clientSecretKey, scope);
Create a new client config and save it to the local config file: <home.dir>/.coursera/coaconfig.csv
Parameters: :: clientName - Client Name clientId - Coursera Client ID clientSecret - Coursera Client Secret Key scope - by default used "view_profile", for business use "access_business_api".
:: deleteClient(String clientName);
Delete client config from file: <home.dir>/.coursera/coaconfig.csv
:: generateAuthTokens(clientName);
By default starting server callback listener and get auth tokens from Coursera OAuth API.
:: getAuthTokens(clientName).then(function (tokens) { // do something with 'tokens'; }).catch(function (error) { // do something if catch error; });
Returns:
Promise object with refresh, access tokens and expired time from auth token file: <home.dir>/.coursera/<client_name>_oauth2.csv
.
:: getAccessToken(clientName).then(function (accessToken) { // do something with 'accessToken'; }).catch(function (error) { // do something if catch error; });
Returns:
Promise object with access token from auth token file: <home.dir>/.coursera/<client_name>_oauth2.csv
.
:: getListOfClients().then(function (listOfClients) { // do something with 'listOfClients'; }).catch(function (error) { // do something if catch error; });
Returns:
Promise object with list of client configs from local file: <home.dir>/.coursera/coaconfig.csv
.
:: getClient(clientNameOrId).then(function (clientConfig) { // do something with 'clientConfig'; }).catch(function (error) { // do something if catch error; });
Returns:
Promise object with client config from local file: <home.dir>/.coursera/coaconfig.csv
.
Please use the Github issue tracker to document any bugs or other issues you encounter while using this tool.
FAQs
Execute Node.js library for manage CourseraOAuth2 API tokens
We found that coaclient demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.