Browser-To-Bearer
Allows a user with a regular browser to log into an API that's an OAuth2 resource server
This middleware allows a user with a regular browser to log into an API that’s an OAuth2 resource server.
It will do so by intercepting HTTP 401 Unauthorized
errors, seeing if the
user wanted Accept: text/html
and redirect the user to an OAuth2
authorization endpoint.
After the user comes back, the access token gets validated and placed into a
cookie. This cookie is then converted to an Authorization
header, which
will make it seem to the resource server that the user has normal OAuth2
authorization information.
What this enables in a nutshell is allowing developers to browse OAuth2 APIs with a browser, which otherwise is pretty hard to do.
Installation
npm install @curveball/browser-to-bearer @curveball/oauth2 @badgateway/oauth2-client
The @curveball/oauth2
curveball middleware is not required. If you have a
custom middleware that listens for a Authorization: Bearer
HTTP header, this
should also work.
The examples below assume you use the @curveball/oauth2
middleware though.
Getting started
This middleware needs to be loaded before your normal authorization
middelware to work correctly. In theory this middleware can work with any
OAuth2 middleware, but the below example is using the @curveball/oauth2
middleware.
In addition to a working OAuth2 middleware, it also requires a session
middleware.
import { Application } from '@curveball/core';
import oauth2 from '@curveball/oauth2';
import browserToBearer from '@curveball/browser-to-bearer';
import session from '@curveball/session';
import { OAuth2Client } from '@badgateway/oauth2-client';
const app = new Application();
const client = OAuth2Client({
server: 'https://auth.example/',
clientId: 'My-app',
clientSecret: 'some_client_secret',
/**
* Only specify these if your OAuth2 server _doesn't_ support auto
* discovery of these endpoints.
*
* If your server does support auto-discovery (through the OAuth2
* Authorization Metadata document), it's better to omit these as
* it will future-proof your code.
*/
authorizeEndpoint: '/authorize',
tokenEndpoint: '/token',
introspectionEndpoint: '/introspect',
});
app.use(session({
store: 'memory',
cookieOptions: {
httpOnly: true,
// It might be important to set sameSite to false to allow this to work.
// Without this, cookies will not be sent along after the first redirect
// from the OAuth2 server.
sameSite: false,
}
}));
app.use(browserToBearer({
client,
});
app.use(oauth2({
client,
}));
Setting the right origin
By default Curveball will assume you are running this package on
http://localhost
, which breaks the redirect back from the authentication
server to your app.
To fix this, either:
- Set the
CURVEBALL_ORIGIN
environment variable. This is recommended in most modern deployments. It should have a value such ashttps://domain.example
without any slashes in the end. - Set
app.origin = 'https://domain.example
. This is done on the main Curveball application object.