Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
This project is a Node.js library consisting of a client for interacting with Coursera's OAuth2 authorizes APIs.
Install Node.js from https://nodejs.org/en/download/
Before using Coursera's OAuth2 APIs, be sure you know your client id,
client secret, and scopes you want for your application. You may create
an application at https://accounts.coursera.org/console. When creating the
application, set the Redirect URI to be http://localhost:9876/callback?client_id=<your_client_id>
.
(Client-side module
)
browserify coaclient.js -o bundlecoaclient.js
', after that you can use it at client side.(Server-side module
)
You can use module in different ways:
Clone project, add this module to your project, then run command 'npm install' to fetch all dependencies.
Open terminal, go to your project folder and download module from npm global repository via command 'npm install coaclient
' after you can use it in your project:
var coaclientAPI = require('coaclient');
coaclientAPI().addClient(clientName, clientId, clientSecretKey, scope);
coaclientAPI().generateAuthTokens(clientName);
coaclientAPI().getAccessToken(clientName);
The Coaclient tries to open the default system browser. The application configuration will be saved to the local file if the request is succeeded. You should check the data you've provided to the library during application configuration if you see any errors in the browser.
If client was successfully added and configured, you will be able to successfully get authentication tokens for Coursera API. Otherwise, an exception will be thrown telling you to set up your application for API access.
class CourseraOAuth2API
Methods:
addClient(clientName, clientId, clientSecretKey, scope);
Create a new client config and save it to the local config file: <home.dir>/.coursera/coaconfig.csv
Parameters:
clientName - Client Name
clientId - Coursera Client ID
clientSecret - Coursera Client Secret Key
scope - by default used "view_profile", for business use "access_business_api".
deleteClient(clientName);
Delete client config from file: <home.dir>/.coursera/coaconfig.csv
generateAuthTokens(clientName);
By default start server callback listener on port 9877 and get auth tokens from Coursera OAuth API.
getAuthTokens(clientName).then(function (tokens) {
// do something with 'tokens';
}).catch(function (error) {
// do something if catch error;
});
Returns:
Promise object with refresh, access tokens and expired time from auth token file: <home.dir>/.coursera/<client_name>_oauth2.csv
.
getAccessToken(clientName).then(function (accessToken) {
// do something with 'accessToken';
}).catch(function (error) {
// do something if catch error;
});
Returns:
Promise object with access token from auth token file: <home.dir>/.coursera/<client_name>_oauth2.csv
.
getListOfClients().then(function (listOfClients) {
// do something with 'listOfClients';
}).catch(function (error) {
// do something if catch error;
});
Returns:
Promise object with list of client configs from local file: <home.dir>/.coursera/coaconfig.csv
.
getClient(clientNameOrId).then(function (clientConfig) {
// do something with 'clientConfig';
}).catch(function (error) {
// do something if catch error;
});
Returns:
Promise object with client config from local file: <home.dir>/.coursera/coaconfig.csv
.
Please use the Github issue tracker to document any bugs or other issues you encounter while using this tool.
FAQs
Execute Node.js library for manage CourseraOAuth2 API tokens
The npm package coaclient receives a total of 3 weekly downloads. As such, coaclient popularity was classified as not popular.
We found that coaclient demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.