Last updated:
0 purchases
angel3 oauth2
Angel3 OAuth2 Server #
A class containing handlers that can be used within Angel to build a spec-compliant OAuth 2.0 server, including PKCE support.
Angel3 OAuth2 Server
Installation
Usage
Other Grants
PKCE
Installation #
In your pubspec.yaml:
dependencies:
angel3_framework: ^8.0.0
angel3_oauth2: ^8.0.0
copied to clipboard
Usage #
Your server needs to have definitions of at least two types:
One model that represents a third-party application (client) trying to access a user's profile.
One that represents a user logged into the application.
Define a server class as such:
import 'package:angel3_oauth2/angel3_oauth2.dart' as oauth2;
class MyServer extends oauth2.AuthorizationServer<Client, User> {}
copied to clipboard
Then, implement the findClient and verifyClient to ensure that the server class can not only identify a client application via a client_id, but that it can also verify its identity via a client_secret.
class _Server extends AuthorizationServer<PseudoApplication, Map> {
final Uuid _uuid = Uuid();
@override
FutureOr<PseudoApplication> findClient(String clientId) {
return clientId == pseudoApplication.id ? pseudoApplication : null;
}
@override
Future<bool> verifyClient(
PseudoApplication client, String clientSecret) async {
return client.secret == clientSecret;
}
}
copied to clipboard
Next, write some logic to be executed whenever a user visits the authorization endpoint. In many cases, you will want to show a dialog:
@override
Future requestAuthorizationCode(
PseudoApplication client,
String redirectUri,
Iterable<String> scopes,
String state,
RequestContext req,
ResponseContext res) async {
res.render('dialog');
}
copied to clipboard
Now, write logic that exchanges an authorization code for an access token, and optionally, a refresh token.
@override
Future<AuthorizationCodeResponse> exchangeAuthCodeForAccessToken(
String authCode,
String redirectUri,
RequestContext req,
ResponseContext res) async {
return AuthorizationCodeResponse('foo', refreshToken: 'bar');
}
copied to clipboard
Now, set up some routes to point the server.
void pseudoCode() {
app.group('/oauth2', (router) {
router
..get('/authorize', server.authorizationEndpoint)
..post('/token', server.tokenEndpoint);
});
}
copied to clipboard
The authorizationEndpoint and tokenEndpoint handle all OAuth2 grant types.
Other Grants #
By default, all OAuth2 grant methods will throw a 405 Method Not Allowed error. To support any specific grant type, all you need to do is implement the method. The following are available, not including authorization code grant support (mentioned above):
implicitGrant
resourceOwnerPasswordCredentialsGrant
clientCredentialsGrant
deviceCodeGrant
Read the OAuth2 specification for in-depth information on each grant type.
PKCE #
In some cases, you will be using OAuth2 on a mobile device, or on some other
public client, where the client cannot have a client
secret.
In such a case, you may consider using PKCE.
Both the authorizationEndpoint and tokenEndpoint inject a Pkce factory into the request, so it
can be used as follows:
@override
Future requestAuthorizationCode(
PseudoApplication client,
String redirectUri,
Iterable<String> scopes,
String state,
RequestContext req,
ResponseContext res) async {
// Automatically throws an error if the request doesn't contain the
// necessary information.
var pkce = req.container.make<Pkce>();
// At this point, store `pkce.codeChallenge` and `pkce.codeChallengeMethod`,
// so that when it's time to exchange the auth code for a token, we can
// create a [Pkce] object, and verify the client.
return await getAuthCodeSomehow(client, pkce.codeChallenge, pkce.codeChallengeMethod);
}
@override
Future<AuthorizationTokenResponse> exchangeAuthorizationCodeForToken(
String authCode,
String redirectUri,
RequestContext req,
ResponseContext res) async {
// When exchanging the authorization code for a token, we'll need
// a `code_verifier` from the client, so that we can ensure
// that the correct client is trying to use the auth code.
//
// If none is present, an OAuth2 exception is thrown.
var codeVerifier = await getPkceCodeVerifier(req);
// Next, we'll need to retrieve the code challenge and code challenge method
// from earlier.
var codeChallenge = await getTheChallenge();
var codeChallengeMethod = await getTheChallengeMethod();
// Make a [Pkce] object.
var pkce = Pkce(codeChallengeMethod, codeChallenge);
// Call `validate`. If the client is invalid, it throws an OAuth2 exception.
pkce.validate(codeVerifier);
// If we reach here, we know that the `code_verifier` was valid,
// so we can return our authorization token as per usual.
return AuthorizationTokenResponse('...');
}
copied to clipboard
For personal and professional use. You cannot resell or redistribute these repositories in their original state.
There are no reviews.