Security News
New Python Packaging Proposal Aims to Solve Phantom Dependency Problem with SBOMs
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools oft miss.
simple-oauth2-promise
Advanced tools
Node.js client library for Oauth2.
OAuth2 lets users grant the access to the desired resources to third party applications, giving them the possibility to enable and disable those accesses whenever they want.
Simple OAuth2 supports the following flows.
Node client library is tested against Node ~0.8.x
Install the client library using npm:
$ npm install simple-oauth2-promise
Install the client library using git:
$ git clone git://github.com/jonathansamines/simple-oauth2.git
$ cd simple-oauth2
$ npm install
var express = require('express'),
app = express();
var oauth2 = require('simple-oauth2-promise')({
clientID: CLIENT_ID,
clientSecret: CLIENT_SECRET,
site: 'https://github.com/login',
tokenPath: '/oauth/access_token',
authorizationPath: '/oauth/authorize'
});
// Authorization uri definition
var authorization_uri = oauth2.authCode.authorizeURL({
redirect_uri: 'http://localhost:3000/callback',
scope: 'notifications',
state: '3(#0/!~'
});
// Initial page redirecting to Github
app.get('/auth', function (req, res) {
res.redirect(authorization_uri);
});
// Callback service parsing the authorization token and asking for the access token
app.get('/callback', function (req, res) {
var code = req.query.code;
console.log('/callback');
oauth2.authCode.getToken({
code: code,
redirect_uri: 'http://localhost:3000/callback'
}, saveToken);
function saveToken(error, result) {
if (error) { console.log('Access Token Error', error.message); }
token = oauth2.accessToken.create(result);
}
});
app.get('/', function (req, res) {
res.send('Hello<br><a href="/auth">Log in with Github</a>');
});
app.listen(3000);
console.log('Express server started on port 3000');
Credits to @lazybean
The Authorization Code flow is made up from two parts. At first your application asks to the user the permission to access their data. If the user approves the OAuth2 server sends to the client an authorization code. In the second part, the client POST the authorization code along with its client secret to the Lelylan in order to get the access token.
// Set the client credentials and the OAuth2 server
var credentials = {
clientID: '<client-id>',
clientSecret: '<client-secret>',
site: 'https://api.oauth.com'
};
// Initialize the OAuth2 Library
var oauth2 = require('simple-oauth2-promise')(credentials);
// Authorization oauth2 URI
var authorization_uri = oauth2.authCode.authorizeURL({
redirect_uri: 'http://localhost:3000/callback',
scope: '<scope>',
state: '<state>'
});
// Redirect example using Express (see http://expressjs.com/api.html#res.redirect)
res.redirect(authorization_uri);
// Get the access token object (the authorization code is given from the previous step).
var token;
oauth2.authCode.getToken({
code: '<code>',
redirect_uri: 'http://localhost:3000/callback'
}, saveToken);
// Save the access token
function saveToken(error, result) {
if (error) { console.log('Access Token Error', error.message); }
token = oauth2.accessToken.create(result);
});
This flow is suitable when the resource owner has a trust relationship with the client, such as its computer operating system or a highly privileged application. Use this flow only when other flows are not viable or when you need a fast way to test your application.
// Get the access token object.
var token;
oauth2.password.getToken({
username: 'username',
password: 'password'
}, saveToken);
// Save the access token
function saveToken(error, result) {
if (error) { console.log('Access Token Error', error.message); }
token = oauth2.accessToken.create(result);
oauth2.api('GET', '/users', {
access_token: token.token.access_token
}, function (err, data) {
console.log(data);
});
});
This flow is suitable when client is requesting access to the protected resources under its control.
// Get the access token object.
var token;
var credentials = {
clientID: '<client-id>',
clientSecret: '<client-secret>',
site: 'https://api.oauth.com'
};
// Initialize the OAuth2 Library
var oauth2 = require('simple-oauth2-promise')(credentials);
// Get the access token object for the client
oauth2.client.getToken({}, saveToken);
// Save the access token
function saveToken(error, result) {
if (error) { console.log('Access Token Error', error.message); }
token = oauth2.accessToken.create(result);
});
When a token expires we need to refresh it. Simple OAuth2 offers the AccessToken class that add a couple of useful methods to refresh the access token when it is expired.
// Sample of a JSON access token (you got it through previous steps)
var token = {
'access_token': '<access-token>',
'refresh_token': '<refresh-token>',
'expires_in': '7200'
};
// Create the access token wrapper
var token = oauth2.accessToken.create(token);
// Check if the token is expired. If expired it is refreshed.
if (token.expired()) {
token.refresh(function(error, result) {
token = result;
})
}
When you've done with the token or you want to log out, you can revoke the access token and refresh token.
// Revoke only the access token
token.revoke('access_token', function(error) {
// Session ended. But the refresh_token is still valid.
// Revoke the refresh_token
token.revoke('refresh_token', function(error) {
console.log('token revoked.');
});
});
Exceptions are raised when a 4xx or 5xx status code is returned.
HTTPError
Through the error message attribute you can access the JSON representation
based on HTTP status
and error message
.
oauth2.authCode.getToken(function(error, token) {
if (error) { console.log(error.message); }
});
// => { "status": "401", "message": "Unauthorized" }
Simple OAuth2 accepts an object with the following valid params.
clientID
- Required registered Client ID.clientSecret
- Required registered Client secret.site
- Required OAuth2 server site.authorizationPath
- Authorization path for the OAuth2 server. Defaults to /oauth/authorize
.tokenPath
- Access token path for the OAuth2 server. Defaults to /oauth/token
.revocationPath
- Revocation token path for the OAuth2 server. Defaults to /oauth/revoke
.useBasicAuthorizationHeader
- Whether or not the Authorization: Basic ...
header is set on the request.
Defaults to true
.clientSecretParameterName
- Parameter name for the client secret. Defaults to client_secret
.// Set the configuration settings
var credentials = {
clientID: '<client-id>',
clientSecret: '<client-secret>',
site: 'https://www.oauth2.com',
authorizationPath: '/oauth2/authorization',
tokenPath: '/oauth2/access_token',
revocationPath: '/oauth2/revoke'
};
// Initialize the OAuth2 Library
var oauth2 = require('simple-oauth2-promise')(credentials);
Fork the repo on github and send a pull requests with topic branches. Do not forget to provide specs to your contribution.
dev
branch).npm install
for dependencies.make test
to execute all specs.make test-watch
to auto execute all specs when a file change.Follow github guidelines.
Use the issue tracker for bugs.
See CHANGELOG
Copyright (c) 2013 Lelylan.
This project is released under the MIT License.
FAQs
Node.js client for OAuth2 with a promise based api
We found that simple-oauth2-promise demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PEP 770 proposes adding SBOM support to Python packages to improve transparency and catch hidden non-Python dependencies that security tools oft miss.
Security News
Socket CEO Feross Aboukhadijeh discusses open source security challenges, including zero-day attacks and supply chain risks, on the Cyber Security Council podcast.
Security News
Research
Socket researchers uncover how threat actors weaponize Out-of-Band Application Security Testing (OAST) techniques across the npm, PyPI, and RubyGems ecosystems to exfiltrate sensitive data.