deno.land / x / oauth4webapi@v1.2.2 / examples / oauth.ts
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172import * as oauth from '../src/index.js'
const issuer = new URL('https://example.as.com')const as = await oauth .discoveryRequest(issuer, { algorithm: 'oauth2' }) .then((response) => oauth.processDiscoveryResponse(issuer, response))
const client: oauth.Client = { client_id: 'abc4ba37-4ab8-49b5-99d4-9441ba35d428', client_secret: 'ddce41c3d7618bb30e8a5e5e423fce223427426265ebc96fd9dd5713a6d4fc58bc523c45af42274c210ab18d4a93b5b7169edf6236ed2657f6be64ec41b72f87', token_endpoint_auth_method: 'client_secret_basic',}
const redirect_uri = 'https://example.rp.com/cb'
if (as.code_challenge_methods_supported?.includes('S256') !== true) { // This example assumes S256 PKCE support is signalled // If it isn't supported, random `state` must be used for CSRF protection. throw new Error()}
const code_verifier = oauth.generateRandomCodeVerifier()const code_challenge = await oauth.calculatePKCECodeChallenge(code_verifier)const code_challenge_method = 'S256'
{ // redirect user to as.authorization_endpoint
const authorizationUrl = new URL(as.authorization_endpoint!) authorizationUrl.searchParams.set('client_id', client.client_id) authorizationUrl.searchParams.set('code_challenge', code_challenge) authorizationUrl.searchParams.set('code_challenge_method', code_challenge_method) authorizationUrl.searchParams.set('redirect_uri', redirect_uri) authorizationUrl.searchParams.set('response_type', 'code') authorizationUrl.searchParams.set('scope', 'api:read')}
// one eternity later, the user lands back on the redirect_uri
// @ts-expect-errorconst currentUrl: URL = getCurrentUrl()const parameters = oauth.validateAuthResponse(as, client, currentUrl, oauth.expectNoState)if (oauth.isOAuth2Error(parameters)) { console.log('error', parameters) throw new Error() // Handle OAuth 2.0 redirect error}
const response = await oauth.authorizationCodeGrantRequest( as, client, parameters, redirect_uri, code_verifier,)
let challenges: oauth.WWWAuthenticateChallenge[] | undefinedif ((challenges = oauth.parseWwwAuthenticateChallenges(response))) { for (const challenge of challenges) { console.log('challenge', challenge) } throw new Error() // Handle www-authenticate challenges as needed}
const result = await oauth.processAuthorizationCodeOAuth2Response(as, client, response)if (oauth.isOAuth2Error(result)) { console.log('error', result) throw new Error() // Handle OAuth 2.0 response body error}
console.log('result', result)
Version Info