oauth2_resource_app {webfakes} | R Documentation |
Fake OAuth 2.0 resource and authorization app
Description
The webfakes package comes with two fake apps that allow to imitate the
OAuth2.0 flow in your test cases. (See Aaron Parecki’s tutorial for a good
introduction to OAuth2.0.) One app (oauth2_resource_app()
) is the API
server that serves both as the resource and provides authorization.
oauth2_third_party_app()
plays the role of the third-party app. They
are useful when testing or demonstrating code handling OAuth2.0
authorization, token caching, etc. in a package. The apps can be used in
your tests directly, or you could adapt one or both of them to better
mimic a particular OAuth2.0 flow.
Usage
oauth2_resource_app(
access_duration = 3600L,
refresh_duration = 7200L,
refresh = TRUE,
seed = NULL,
authorize_endpoint = "/authorize",
token_endpoint = "/token"
)
Arguments
access_duration |
After how many seconds should access tokens expire. |
refresh_duration |
After how many seconds should refresh
tokens expire (ignored if |
refresh |
Should a refresh token be returned (logical). |
seed |
Random seed used when creating tokens. If |
authorize_endpoint |
The authorization endpoint of the resource
server. Change this from the default if the real app that you
are faking does not use |
token_endpoint |
The endpoint to request tokens. Change this if the
real app that you are faking does not use |
Details
The app has the following endpoints:
-
GET /register
is the endpoint that you can use to register your third party app. It needs to receive thename
of the third party app, and itsredirect_uri
as query parameters, otherwise returns an HTTP 400 error. On success it returns a JSON dictionary with entriesname
(the name of the third party app),client_id
,client_secret
andredirect_uri
. -
GET /authorize
is the endpoint where the user of the third party app is sent. You can change the URL of this endpoint with theauthorize_endpoint
argument. It needs to receive theclient_id
of the third party app, and its correctredirect_uri
as query parameters. It may receive astate
string as well, which can be used by a client to identify the request. Otherwise it generates a randomstate
string. On error it fails with a HTTP 400 error. On success it returns a simple HTML login page. -
POST /authorize/decision
is the endpoint where the HTML login page generated at/authorize
connects back to, either with a positive or negative result. The form on the login page will send thestate
string and the user's choice in theaction
variable. If the user authorized the third party app, then they are redirected to theredirect_uri
of the app, with a temporarycode
and thestate
string supplied as query parameters. Otherwise a simple HTML page is returned. -
POST /token
is the endpoint where the third party app requests a temporary access token. It is also uses for refreshing an access token with a refresh token. You can change the URL of this endpoint with thetoken_endpoint
argument. To request a new token or refresh an existing one, the following data must be included in either a JSON or an URL encoded request body:-
grant_type
, this must beauthorization_code
for new tokens, andrefresh_token
for refreshing. -
code
, this must be the temporary code obtained from the/authorize/decision
redirection, for new tokens. It is not needed when refreshing. -
client_id
must be the client id of the third party app. -
client_secret
must be the client secret of the third party app. -
redirect_uri
must be the correct redirection URI of the third party app. It is not needed when refreshing tokens. -
refresh_token
must be the refresh token obtained previously, when refreshing a token. It is not needed for new tokens. On success a JSON dictionary is returned with entries:access_token
,expiry
andrefresh_token
. (The latter is omitted if therefresh
argument isFALSE
).
-
-
GET /locals
returns a list of current apps, access tokens and refresh tokens. -
GET /data
is an endpoint that returns a simple JSON response, and needs authorization.
Notes
Using this app in your tests requires the glue package, so you need to put it in
Suggests
.You can add custom endpoints to the app, as needed.
If you need authorization in your custom endpoint, call
app$is_authorized()
in your handler:if (!app$is_authorized(req, res)) return()
app$is_authorized()
returns an HTTP 401 response if the client is not authorized, so you can simply return from your handler.
For more details see vignette("oauth", package = "webfakes")
.
Value
a webfakes
app
webfakes app
oauth2_resource_app()
App representing the API server (resource/authorization)
See Also
Other OAuth2.0 functions:
oauth2_httr_login()
,
oauth2_login()
,
oauth2_third_party_app()