[![Project stage: Experimental][project-stage-badge: Experimental]][project-stage-page]
The Oauth2 middleware allows you to configure the metro client to handle OAuth2 connections, fetching and refreshing tokens automatically:
import oauth2mw from '@muze-nl/metro-oauth2'
const client = metro.client('https://oauth2api.example.com')
.with( oauth2mw({
client_id: myClientId,
client_secret: myClientSecret
}) )
function fetchSomething(url) {
return client.get(url)
}
You pass the OAuth2 configuration options to the oauth2mw()
function. This returns the middleware function for the metro client.
The oauth2 protocol can redirect the browser page to the oauth2 servers login page. When logged in, the browser is then redirected back to your clients redirect_uri, with the authorization_code either in the URL's search query, or in its fragment or hash.
To handle this redirect, use the provided isRedirected function like this:
import oauth2mw, {isRedirected} from '@muze-nl/metro-oauth2'
const client = metro.client('https://oauth2api.example.com')
.with( oauth2mw({
client_id: myClientId,
client_secret: myClientSecret
}) )
function fetchMovies() {
return client.get('movies.ttl')
}
if (isRedirected()) {
movies = await fetchMovies()
}
If your application calls the fetchMovies() function, and the browser is redirected to allow the user to login, then, when the browser is redirected back to your application, the isRedirected() function will return true. Now the user is logged in, so the fetchMovies() call will succeed.
This does mean that your application will reload and lose its state. That is often undesirable, so you can opt to create your own authorize_callback function, that could open a new tab to log the user in, and then close it and return the authorization_code as a Promise instead. Since this is so common, this function is provided for you as authorizePopup
:
import oauth2mw, {authorizePopup} from '@muze-nl/metro-oauth2'
const client = metro.client('https://oauth2api.example.com')
.with( oauth2mw({
authorize_callback: authorizePopup,
client_id: myClientId,
client_secret: myClientSecret
}) )
However, it does require that you create a separate page as your redirect_uri
, that will send the authorization_code to your application, e.g.:
<script src="metro-oidc/dist/browser.js"></script>
<script>
metro.oauth2.popupHandleRedirect()
window.close()
</script>
You can also use an iframe to show the login screen of and OAuth2 Provider, however, not all providers allow their login screens to be shown inside an iframe. However, if they do, use something like this as your authorize_callback
:
function authorizeIframe(authorizeURL) {
return new Promise((resolve, reject) => {
window.addEventListener('message', (event) => {
if (event.data.authorization_code) {
resolve(event.data.authorization_code)
} else {
reject('Error: '.event.data.error)
}
document.getElementById('authorize').close()
})
document.getElementById('authorizeIframe').src=authorizeURL
document.getElementById('authorize').showModal()
})
}
This code assumes you have a dialog and iframe like this:
<dialog id="authorize">
<iframe id="authorizeIframe"></iframe>
</dialog>
You can still use the same redirect page as for authorizePopup
, it will automatically determine it is running in an iframe instead of a new window.
Valid configuration options are:
authorize_callback
- Allows you to set a callback function for theauthorize
step, e.g. by doing a full page redirect or using a new window. The callback function takes one parameter, the authorization URL to use and can optionally return a Promise with theauthorization_code
.client
- sets the base metro client to use by the OAuth2 middlewareforce_authorization
- if not set orfalse
, the OAuth2 middleware will only use OAuth2 if a normal--unauthorized--fetch doesn't work. If set totrue
, all requests will use OAuth2.site
- URL of the identity provider, used to store token specific for that providerstate
- How to store the state parameter, defaults tolocalStorage
tokens
- How to store tokens. Either a normal object, or a Map-like object.oauth2_configuration
- OAuth2 standard parametersaccess_token
- if you've stored an OAuth2 access token, you can set it hereauthorization_code
- if you've retrieved an OAuth2 authorization code, set it hereclient_id
- the OAuth2 client idclient_secret
- the OAuth2 client secretcode_verifier
- the PKCE code verifier, code_challenge is automatically calculatedgrant_type
- currently onlyauthorization_code
is implementedredirect_uri
- The URL the OAuth2 authorization server will redirect back torefresh_token
- sets the refresh token to use when the access token must be refreshedtoken_endpoint
- URL of the access and refresh token endpointauthorize_endpoint
- URL of the authorize endpoint
Only the client_id
and client_secret
don't have valid defaults. The defaults are:
grant_type
:authorization_code
force_authorization
: falseredirect_uri
:document.location
state
:localStorage
tokens
:localStorage
client
:metro.client().with(jsonmw())
callbacks.authorize
:url => document.location = url
endpoints.authorize
:/authorize
endpoints.token
:/token
The oauth2mockserver
middleware implements a mock of an OAuth2 server. It doesn't actually call fetch()
or next()
, so no network requests are made. Instead it parses the request and implements a very basic OAuth2 authorization_code flow.
import oauth2mw from '@muze-nl/metro-oauth2'
import oauth2mockserver from '@muze-nl/metro-auth2/src/oauth2.mockserver.mjs'
const client = metro.client('https://oauth2api.example.com')
.with( oauth2mockserver() )
.with( oauth2mw({
client_id: 'mockClientId',
client_secret: 'mockClientSecret'
}))
The oauth2mock
server handles requests with the following pathnames--regardless of the domain used.
/authorize/
- returns an authorization_code/token/
- returns an access_token/protected/
- requires an access_token, or returns 401 Forbidden/public/
- doesn't require an access_token
Any other requests will return a 404 Not Found response.
The OAuth2 mock server expects/provides the following values for the OAuth2 settings:
client_id
:mockClientId
client_secret
:mockClientSecret
authorization_code
:mockAuthorizeToken
refresh_token
:mockRefreshToken
access_token
:mockAccessToken