The Protevus Platform: Unified Full-Stack Development https://protevus.com
Find a file
2017-10-16 02:41:01 -04:00
.idea Need to work out tokens 2017-09-28 22:16:44 -04:00
lib All grants ready 2017-10-16 02:38:46 -04:00
test All grants ready 2017-10-16 02:38:46 -04:00
.DS_Store A LOT of work necessary... 2017-01-23 22:28:34 -05:00
.gitignore Need to work out tokens 2017-09-28 22:16:44 -04:00
.travis.yml analysis 2017-09-28 22:17:00 -04:00
analysis_options.yaml IDK where to even go... 2017-03-11 01:15:40 -05:00
LICENSE Initial commit 2017-01-23 20:53:20 -05:00
pubspec.yaml All grants ready 2017-10-16 02:38:46 -04:00
README.md README 2017-10-16 02:41:01 -04:00

oauth2

Pub build status

A class containing handlers that can be used within Angel to build a spec-compliant OAuth 2.0 server.

Installation

In your pubspec.yaml:

dependencies:
  angel_oauth2: ^1.0.0

Usage

Your server needs to have definitions of at least two types:

  • One model that represents a third-party application (client) trying to access a user's profile.
  • One that represents a user logged into the application.

Define a server class as such:

import 'package:angel_oauth2/angel_oauth2.dart' as oauth2;

class MyServer extends oauth2.AuthorizationServer<Client, User> {}

Then, implement the findClient and verifyClient to ensure that the server class can not only identify a client application via a client_id, but that it can also verify its identity via a client_secret.

class _Server extends AuthorizationServer<PseudoApplication, Map> {
  final Uuid _uuid = new Uuid();

  @override
  FutureOr<PseudoApplication> findClient(String clientId) {
    return clientId == pseudoApplication.id ? pseudoApplication : null;
  }

  @override
  Future<bool> verifyClient(
      PseudoApplication client, String clientSecret) async {
    return client.secret == clientSecret;
  }
}

Next, write some logic to be executed whenever a user visits the authorization endpoint. In most cases, you will want to show a dialog:

@override
Future requestAuthorizationCode(
  PseudoApplication client,
  String redirectUri,
  Iterable<String> scopes,
  String state,
  RequestContext req,
  ResponseContext res) async {
  res.render('dialog');
}

Now, write logic that exchanges an authorization code for an access token, and optionally, a refresh token.

@override
Future<AuthorizationCodeResponse> exchangeAuthCodeForAccessToken(
  String authCode,
  String redirectUri,
  RequestContext req,
  ResponseContext res) async {
    return new AuthorizationCodeResponse('foo', refreshToken: 'bar');
}

Now, set up some routes to point the server.

void pseudoCode() {
  app.group('/oauth2', (router) {
    router
      ..get('/authorize', server.authorizationEndpoint)
      ..post('/token', server.tokenEndpoint);
  });
}

The authorizationEndpoint and tokenEndpoint handle all OAuth2 grant types.

Other Grants

By default, all OAuth2 grant methods will throw a 405 Method Not Allowed error. To support any specific grant type, all you need to do is implement the method. The following are available, not including authorization code grant support (mentioned above):

  • implicitGrant
  • resourceOwnerPasswordCredentialsGrant
  • clientCredentialsGrant

Read the OAuth2 specification for in-depth information on each grant type.