Gathering detailed insights and metrics for @octokit/auth-oauth-device
Gathering detailed insights and metrics for @octokit/auth-oauth-device
Gathering detailed insights and metrics for @octokit/auth-oauth-device
Gathering detailed insights and metrics for @octokit/auth-oauth-device
GitHub OAuth Device authentication strategy for JavaScript
npm install @octokit/auth-oauth-device
Module System
Min. Node Version
Typescript Support
Node Version
NPM Version
10 Stars
315 Commits
5 Forks
5 Watching
4 Branches
14 Contributors
Updated on 26 Nov 2024
TypeScript (95.26%)
JavaScript (4.74%)
Cumulative downloads
Total Downloads
Last day
-10.8%
201,569
Compared to previous day
Last week
0.7%
1,196,985
Compared to previous week
Last month
2.1%
5,200,643
Compared to previous month
Last year
57.7%
55,133,338
Compared to previous year
GitHub OAuth Device authentication strategy for JavaScript
@octokit/auth-oauth-device
is implementing one of GitHub’s OAuth Device Flow.
createOAuthDeviceAuth(options)
auth(options)
auth.hook(request, route, parameters)
or auth.hook(request, options)
Browsers |
Load
|
---|---|
Node |
Install with
|
[!IMPORTANT] As we use conditional exports, you will need to adapt your
tsconfig.json
by setting"moduleResolution": "node16", "module": "node16"
.See the TypeScript docs on package.json "exports".
See this helpful guide on transitioning to ESM from @sindresorhus
1const auth = createOAuthDeviceAuth({ 2 clientType: "oauth-app", 3 clientId: "1234567890abcdef1234", 4 scopes: ["public_repo"], 5 onVerification(verification) { 6 // verification example 7 // { 8 // device_code: "3584d83530557fdd1f46af8289938c8ef79f9dc5", 9 // user_code: "WDJB-MJHT", 10 // verification_uri: "https://github.com/login/device", 11 // expires_in: 900, 12 // interval: 5, 13 // }; 14 15 console.log("Open %s", verification.verification_uri); 16 console.log("Enter code: %s", verification.user_code); 17 }, 18}); 19 20const tokenAuthentication = await auth({ 21 type: "oauth", 22}); 23// resolves with 24// { 25// type: "token", 26// tokenType: "oauth", 27// clientType: "oauth-app", 28// clientId: "1234567890abcdef1234", 29// token: "...", /* the created oauth token */ 30// scopes: [] /* depend on request scopes by OAuth app */ 31// }
GitHub Apps do not support scopes
. Client IDs of GitHub Apps have a lv1.
prefix. If the GitHub App has expiring user tokens enabled, the resulting authentication
object has extra properties related to expiration and refreshing the token.
1const auth = createOAuthDeviceAuth({ 2 clientType: "github-app", 3 clientId: "lv1.1234567890abcdef", 4 onVerification(verification) { 5 // verification example 6 // { 7 // device_code: "3584d83530557fdd1f46af8289938c8ef79f9dc5", 8 // user_code: "WDJB-MJHT", 9 // verification_uri: "https://github.com/login/device", 10 // expires_in: 900, 11 // interval: 5, 12 // }; 13 14 console.log("Open %s", verification.verification_uri); 15 console.log("Enter code: %s", verification.user_code); 16 }, 17}); 18 19const tokenAuthentication = await auth({ 20 type: "oauth", 21}); 22// resolves with 23// { 24// type: "token", 25// tokenType: "oauth", 26// clientType: "github-app", 27// clientId: "lv1.1234567890abcdef", 28// token: "...", /* the created oauth token */ 29// } 30// or if expiring user tokens are enabled 31// { 32// type: "token", 33// tokenType: "oauth", 34// clientType: "github-app", 35// clientId: "lv1.1234567890abcdef", 36// token: "...", /* the created oauth token */ 37// refreshToken: "...", 38// expiresAt: "2022-01-01T08:00:0.000Z", 39// refreshTokenExpiresAt: "2021-07-01T00:00:0.000Z", 40// }
createOAuthDeviceAuth(options)
The createOAuthDeviceAuth
method accepts a single options
parameter
name | type | description |
---|---|---|
clientId
|
string
|
Required. Find your OAuth app’s Client ID in your account’s developer settings.
|
onVerification
|
function
|
Required. A function that is called once the device and user codes were retrieved
The
|
clientType
|
string
|
Must be either |
request
|
function
|
You can pass in your own @octokit/request instance. For usage with enterprise, set baseUrl to the API root endpoint. Example:
|
scopes
|
array of strings
|
Only relevant if Array of scope names enabled for the token. Defaults to |
auth(options)
The async auth()
method returned by createOAuthDeviceAuth(options)
accepts the following options
name | type | description |
---|---|---|
type
|
string
|
Required. Must be set to "oauth"
|
scopes
|
array of strings
|
Only relevant if the Array of scope names enabled for the token. Defaults to what was set in the strategy options. See available scopes |
refresh
|
boolean
|
Defaults to |
The async auth(options)
method resolves to one of three possible objects
The differences are
scopes
is only present for OAuth AppsrefreshToken
, expiresAt
, refreshTokenExpiresAt
are only present for GitHub Apps, and only if token expiration is enabledname | type | description |
---|---|---|
type
|
string
|
"token"
|
tokenType
|
string
|
"oauth"
|
clientType
|
string
|
"github-app"
|
clientId
|
string
|
The app's Client ID
|
token
|
string
| The personal access token |
scopes
|
array of strings
| array of scope names enabled for the token |
name | type | description |
---|---|---|
type
|
string
|
"token"
|
tokenType
|
string
|
"oauth"
|
clientType
|
string
|
"github-app"
|
clientId
|
string
|
The app's Client ID
|
token
|
string
| The personal access token |
name | type | description |
---|---|---|
type
|
string
|
"token"
|
tokenType
|
string
|
"oauth"
|
clientType
|
string
|
"github-app"
|
clientId
|
string
|
The app's Client ID
|
token
|
string
| The user access token |
refreshToken
|
string
| The refresh token |
expiresAt
|
string
|
Date timestamp in ISO 8601 standard. Example: 2022-01-01T08:00:0.000Z
|
refreshTokenExpiresAt
|
string
|
Date timestamp in ISO 8601 standard. Example: 2021-07-01T00:00:0.000Z
|
auth.hook(request, route, parameters)
 or auth.hook(request, options)
auth.hook()
hooks directly into the request life cycle. It amends the request to authenticate correctly based on the request URL.
The request
option is an instance of @octokit/request
. The route
/options
parameters are the same as for the request()
method.
auth.hook()
can be called directly to send an authenticated request
1const { data: user } = await auth.hook(request, "GET /user");
Or it can be passed as option to request()
.
1const requestWithAuth = request.defaults({ 2 request: { 3 hook: auth.hook, 4 }, 5}); 6 7const { data: user } = await requestWithAuth("GET /user");
1import { 2 OAuthAppStrategyOptions, 3 OAuthAppAuthOptions, 4 OAuthAppAuthentication, 5 GitHubAppStrategyOptions, 6 GitHubAppAuthOptions, 7 GitHubAppAuthentication, 8 GitHubAppAuthenticationWithExpiration, 9} from "@octokit/auth-oauth-device";
GitHub's OAuth Device flow is different from the web flow in two ways
The flow has 3 parts (see GitHub documentation)
@octokit/auth-oauth-device
requests a device and user code@octokit/auth-oauth-device
is sending requests in the background to retrieve the OAuth access token. Once the user completed step 2, the request will succeed and the token will be returnedSee CONTRIBUTING.md
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
no dangerous workflow patterns detected
Reason
all changesets reviewed
Reason
18 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
license file detected
Details
Reason
packaging workflow detected
Details
Reason
SAST tool is run on all commits
Details
Reason
2 existing vulnerabilities detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 6
Details
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
Reason
security policy file not detected
Details
Score
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More