Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(315)

Unified Diff: pkg/oauth2/README.md

Issue 213083003: Move the oauth2 library documentation to a README. (Closed) Base URL: https://dart.googlecode.com/svn/branches/bleeding_edge/dart
Patch Set: code review Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « pkg/oauth2/CHANGELOG.md ('k') | pkg/oauth2/lib/oauth2.dart » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: pkg/oauth2/README.md
diff --git a/pkg/oauth2/README.md b/pkg/oauth2/README.md
new file mode 100644
index 0000000000000000000000000000000000000000..72aff2a8ed3306f01697dc5fc3fe32ed1e3dbd89
--- /dev/null
+++ b/pkg/oauth2/README.md
@@ -0,0 +1,100 @@
+A client library for authenticating with a remote service via OAuth2 on
+behalf of a user, and making authorized HTTP requests with the user's OAuth2
+credentials. Currently this only works where `dart:io` is available.
+
+OAuth2 allows a client (the program using this library) to access and
+manipulate a resource that's owned by a resource owner (the end user) and
+lives on a remote server. The client directs the resource owner to an
+authorization server (usually but not always the same as the server that
+hosts the resource), where the resource owner tells the authorization server
+to give the client an access token. This token serves as proof that the
+client has permission to access resources on behalf of the resource owner.
+
+OAuth2 provides several different methods for the client to obtain
+authorization. At the time of writing, this library only supports the
+[AuthorizationCodeGrant][] method, but further methods may be added in the
+future. The following example uses this method to authenticate, and assumes
+that the library is being used by a server-side application.
+
+[AuthorizationCodeGrant]: https://api.dartlang.org/apidocs/channels/stable/#oauth2/oauth2.AuthorizationCodeGrant
+
+```dart
+import 'dart:io'
+import 'package:oauth2/oauth2.dart' as oauth2;
+
+// These URLs are endpoints that are provided by the authorization
+// server. They're usually included in the server's documentation of its
+// OAuth2 API.
+final authorizationEndpoint =
+ Uri.parse("http://example.com/oauth2/authorization");
+final tokenEndpoint =
+ Uri.parse("http://example.com/oauth2/token");
+
+// The authorization server will issue each client a separate client
+// identifier and secret, which allows the server to tell which client
+// is accessing it. Some servers may also have an anonymous
+// identifier/secret pair that any client may use.
+//
+// Note that clients whose source code or binary executable is readily
+// available may not be able to make sure the client secret is kept a
+// secret. This is fine; OAuth2 servers generally won't rely on knowing
+// with certainty that a client is who it claims to be.
+final identifier = "my client identifier";
+final secret = "my client secret";
+
+// This is a URL on your application's server. The authorization server
+// will redirect the resource owner here once they've authorized the
+// client. The redirection will include the authorization code in the
+// query parameters.
+final redirectUrl = Uri.parse("http://my-site.com/oauth2-redirect");
+
+var credentialsFile = new File("~/.myapp/credentials.json");
+return credentialsFile.exists().then((exists) {
+ // If the OAuth2 credentials have already been saved from a previous
+ // run, we just want to reload them.
+ if (exists) {
+ return credentialsFile.readAsString().then((json) {
+ var credentials = new oauth2.Credentials.fromJson(json);
+ return new oauth2.Client(identifier, secret, credentials);
+ });
+ }
+
+ // If we don't have OAuth2 credentials yet, we need to get the
+ // resource owner to authorize us. We're assuming here that we're a
+ // command-line application.
+ var grant = new oauth2.AuthorizationCodeGrant(
+ identifier, secret, authorizationEndpoint, tokenEndpoint);
+
+ // Redirect the resource owner to the authorization URL. This will be
+ // a URL on the authorization server (authorizationEndpoint with some
+ // additional query parameters). Once the resource owner has
+ // authorized, they'll be redirected to `redirectUrl` with an
+ // authorization code.
+ //
+ // `redirect` is an imaginary function that redirects the resource
+ // owner's browser.
+ return redirect(grant.getAuthorizationUrl(redirectUrl)).then((_) {
+ // Another imaginary function that listens for a request to
+ // `redirectUrl`.
+ return listen(redirectUrl);
+ }).then((request) {
+ // Once the user is redirected to `redirectUrl`, pass the query
+ // parameters to the AuthorizationCodeGrant. It will validate them
+ // and extract the authorization code to create a new Client.
+ return grant.handleAuthorizationResponse(request.uri.queryParameters);
+ })
+}).then((client) {
+ // Once you have a Client, you can use it just like any other HTTP
+ // client.
+ return client.read("http://example.com/protected-resources.txt")
+ .then((result) {
+ // Once we're done with the client, save the credentials file. This
+ // ensures that if the credentials were automatically refreshed
+ // while using the client, the new credentials are available for the
+ // next run of the program.
+ return credentialsFile.open(FileMode.WRITE).then((file) {
+ return file.writeString(client.credentials.toJson());
+ }).then((file) => file.close()).then((_) => result);
+ });
+}).then(print);
+```
« no previous file with comments | « pkg/oauth2/CHANGELOG.md ('k') | pkg/oauth2/lib/oauth2.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698