hoauth2-2.13.1: Haskell OAuth2 authentication client
Safe HaskellSafe-Inferred
LanguageHaskell2010

Network.OAuth2.Experiment

Description

This module contains a new way of doing OAuth2 authorization and authentication in order to obtain Access Token and maybe Refresh Token base on rfc6749.

This module will become default in future release.

The key concept/change is to introduce the Grant flow, which determines the entire work flow per spec. Each work flow will have slight different request parameters, which often time you'll see different configuration when creating OAuth2 application in the IdP developer application page.

Here are supported flows

  1. Authorization Code. This flow requires authorize call to obtain an authorize code, then exchange the code for tokens.
  2. Resource Owner Password. This flow only requires to hit token endpoint with, of course, username and password, to obtain tokens.
  3. Client Credentials. This flow also only requires to hit token endpoint but with different parameters. Client credentials flow does not involve an end user hence you won't be able to hit userinfo endpoint with access token obtained.
  4. PKCE (rfc7636). This is enhancement on top of authorization code flow.

Implicit flow is not supported because it is more for SPA (single page app) given it is deprecated by Authorization Code flow with PKCE.

Here is quick sample for how to use vocabularies from this new module.

Firstly, initialize your IdP (use google as example) and the application.

import Network.OAuth2.Experiment
import URI.ByteString.QQ

data Google = Google deriving (Eq, Show)

googleIdp :: Idp Google
googleIdp =
  Idp
    { idpAuthorizeEndpoint = [uri|https://accounts.google.com/o/oauth2/v2/auth|]
    , idpTokenEndpoint = [uri|https://oauth2.googleapis.com/token|]
    , idpUserInfoEndpoint = [uri|https://www.googleapis.com/oauth2/v2/userinfo|]
    , idpDeviceAuthorizationEndpoint = Just [uri|https://oauth2.googleapis.com/device/code|]
    }

fooApp :: AuthorizationCodeApplication
fooApp =
  AuthorizationCodeApplication
    { acClientId = "xxxxx",
      acClientSecret = "xxxxx",
      acScope =
        Set.fromList
          [ "https://www.googleapis.com/auth/userinfo.email",
            "https://www.googleapis.com/auth/userinfo.profile"
          ],
      acAuthorizeState = "CHANGE_ME",
      acAuthorizeRequestExtraParams = Map.empty,
      acRedirectUri = [uri|http://localhost/oauth2/callback|],
      acName = "sample-google-authorization-code-app",
      acTokenRequestAuthenticationMethod = ClientSecretBasic,
    }

fooIdpApplication :: IdpApplication AuthorizationCodeApplication Google
fooIdpApplication = IdpApplication fooApp googleIdp

Secondly, construct the authorize URL.

authorizeUrl = mkAuthorizationRequest fooIdpApplication

Thirdly, after a successful redirect with authorize code, you could exchange for access token

mgr <- liftIO $ newManager tlsManagerSettings
tokenResp <- conduitTokenRequest fooIdpApplication mgr authorizeCode

If you'd like to fetch user info, uses this method

conduitUserInfoRequest fooIdpApplication mgr (accessToken tokenResp)

You could also find example from hoauth2-providers-tutorials module.

Synopsis

Application per Grant type

data AuthorizationCodeApplication Source #

An Application that supports "Authorization code" flow

https://www.rfc-editor.org/rfc/rfc6749#section-4.1

Instances

Instances details
HasAuthorizeRequest AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasPkceAuthorizeRequest AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasRefreshTokenRequest AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasTokenRequest AuthorizationCodeApplication Source #

https://www.rfc-editor.org/rfc/rfc6749#section-4.1.3

Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasTokenRequestClientAuthenticationMethod AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasOAuth2Key AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasUserInfoRequest AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

ToQueryParam (TokenRequest AuthorizationCodeApplication) Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

type ExchangeTokenInfo AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

data TokenRequest AuthorizationCodeApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

data DeviceAuthorizationApplication Source #

An Application that supports "Device Authorization Grant"

https://www.rfc-editor.org/rfc/rfc8628#section-3.1

Constructors

DeviceAuthorizationApplication 

Fields

Instances

Instances details
HasDeviceAuthorizationRequest DeviceAuthorizationApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

HasTokenRequest DeviceAuthorizationApplication Source #

https://www.rfc-editor.org/rfc/rfc8628#section-3.4

Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

HasTokenRequestClientAuthenticationMethod DeviceAuthorizationApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

HasOAuth2Key DeviceAuthorizationApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

HasUserInfoRequest DeviceAuthorizationApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

ToQueryParam (TokenRequest DeviceAuthorizationApplication) Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

type ExchangeTokenInfo DeviceAuthorizationApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

data TokenRequest DeviceAuthorizationApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

data ClientCredentialsApplication Source #

An Application that supports "Client Credentials" flow

https://www.rfc-editor.org/rfc/rfc6749#section-4.4

Instances

Instances details
HasTokenRequest ClientCredentialsApplication Source #

https://www.rfc-editor.org/rfc/rfc6749#section-4.4.2

Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

HasTokenRequestClientAuthenticationMethod ClientCredentialsApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

HasOAuth2Key ClientCredentialsApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

ToQueryParam (TokenRequest ClientCredentialsApplication) Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

type ExchangeTokenInfo ClientCredentialsApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

data TokenRequest ClientCredentialsApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

data ResourceOwnerPasswordApplication Source #

An Application that supports "Resource Owner Password" flow

https://www.rfc-editor.org/rfc/rfc6749#section-4.3

Instances

Instances details
HasRefreshTokenRequest ResourceOwnerPasswordApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

HasTokenRequest ResourceOwnerPasswordApplication Source #

https://www.rfc-editor.org/rfc/rfc6749#section-4.3.2

Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

HasTokenRequestClientAuthenticationMethod ResourceOwnerPasswordApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

HasOAuth2Key ResourceOwnerPasswordApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

HasUserInfoRequest ResourceOwnerPasswordApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

ToQueryParam (TokenRequest ResourceOwnerPasswordApplication) Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

type ExchangeTokenInfo ResourceOwnerPasswordApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

data TokenRequest ResourceOwnerPasswordApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

data JwtBearerApplication Source #

An Application that supports "JWT Bearer" flow

https://datatracker.ietf.org/doc/html/rfc7523

Instances

Instances details
HasTokenRequest JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

HasTokenRequestClientAuthenticationMethod JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

HasOAuth2Key JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

HasUserInfoRequest JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

ToQueryParam (TokenRequest JwtBearerApplication) Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

type ExchangeTokenInfo JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

data TokenRequest JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

Authorization Code

mkPkceAuthorizeRequest :: (MonadIO m, HasPkceAuthorizeRequest a) => IdpApplication i a -> m (URI, CodeVerifier) Source #

Constructs Authorization Code (PKCE) request URI and the Code Verifier. https://datatracker.ietf.org/doc/html/rfc7636

Device Authorization

Token Request

class (HasOAuth2Key a, HasTokenRequestClientAuthenticationMethod a) => HasTokenRequest a Source #

Minimal complete definition

mkTokenRequestParam

Associated Types

data TokenRequest a Source #

type ExchangeTokenInfo a Source #

Instances

Instances details
HasTokenRequest AuthorizationCodeApplication Source #

https://www.rfc-editor.org/rfc/rfc6749#section-4.1.3

Instance details

Defined in Network.OAuth2.Experiment.Grants.AuthorizationCode

HasTokenRequest ClientCredentialsApplication Source #

https://www.rfc-editor.org/rfc/rfc6749#section-4.4.2

Instance details

Defined in Network.OAuth2.Experiment.Grants.ClientCredentials

HasTokenRequest DeviceAuthorizationApplication Source #

https://www.rfc-editor.org/rfc/rfc8628#section-3.4

Instance details

Defined in Network.OAuth2.Experiment.Grants.DeviceAuthorization

HasTokenRequest JwtBearerApplication Source # 
Instance details

Defined in Network.OAuth2.Experiment.Grants.JwtBearer

HasTokenRequest ResourceOwnerPasswordApplication Source #

https://www.rfc-editor.org/rfc/rfc6749#section-4.3.2

Instance details

Defined in Network.OAuth2.Experiment.Grants.ResourceOwnerPassword

data NoNeedExchangeToken Source #

Only Authorization Code Grant involves a Exchange Token (Authorization Code). ResourceOwnerPassword and Client Credentials make token request directly.

Constructors

NoNeedExchangeToken 

Refresh Token Request

UserInfo Request

conduitUserInfoRequest :: (MonadIO m, HasUserInfoRequest a, FromJSON b) => IdpApplication i a -> Manager -> AccessToken -> ExceptT ByteString m b Source #

Standard approach of fetching /userinfo

conduitUserInfoRequestWithCustomMethod :: (MonadIO m, HasUserInfoRequest a, FromJSON b) => (Manager -> AccessToken -> URI -> ExceptT ByteString m b) -> IdpApplication i a -> Manager -> AccessToken -> ExceptT ByteString m b Source #

Usually conduitUserInfoRequest is good enough. But some IdP has different approach to fetch user information rather than GET. This method gives the flexiblity.

Types

newtype ClientId Source #

Constructors

ClientId 

Fields

Instances

Instances details
IsString ClientId Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Show ClientId Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Eq ClientId Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

ToQueryParam ClientId Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

newtype ClientSecret Source #

Can be either "Client Secret" or JWT base on client authentication method

Constructors

ClientSecret 

Fields

data Idp (i :: k) Source #

Idp i consists various endpoints endpoints.

The i is actually phantom type for information only (Idp name) at this moment. And it is PolyKinds.

Hence whenever Idp i or IdpApplication i a is used as function parameter, PolyKinds need to be enabled.

Constructors

Idp 

Fields

newtype Password Source #

Constructors

Password 

Fields

Instances

Instances details
IsString Password Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Eq Password Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

ToQueryParam Password Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

newtype RedirectUri Source #

Constructors

RedirectUri 

Fields

Instances

Instances details
Eq RedirectUri Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

ToQueryParam RedirectUri Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

newtype Scope Source #

Constructors

Scope 

Fields

Instances

Instances details
IsString Scope Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Methods

fromString :: String -> Scope #

Eq Scope Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Methods

(==) :: Scope -> Scope -> Bool #

(/=) :: Scope -> Scope -> Bool #

Ord Scope Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Methods

compare :: Scope -> Scope -> Ordering #

(<) :: Scope -> Scope -> Bool #

(<=) :: Scope -> Scope -> Bool #

(>) :: Scope -> Scope -> Bool #

(>=) :: Scope -> Scope -> Bool #

max :: Scope -> Scope -> Scope #

min :: Scope -> Scope -> Scope #

ToQueryParam (Set Scope) Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

newtype Username Source #

Constructors

Username 

Fields

Instances

Instances details
IsString Username Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

Eq Username Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

ToQueryParam Username Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

newtype CodeVerifier Source #

Constructors

CodeVerifier 

Fields

Instances

Instances details
ToQueryParam CodeVerifier Source # 
Instance details

Defined in Network.OAuth2.Experiment.Types

data ClientAuthenticationMethod Source #

https://www.rfc-editor.org/rfc/rfc6749#section-2.3 According to spec:

The client MUST NOT use more than one authentication method in each request.

Which means use Authorization header or Post body.

However, I found I have to include authentication in the header all the time in real world.

In other words, ClientSecretBasic is always assured. ClientSecretPost is optional.

Maybe consider an alternative implementation that boolean kind of data type is good enough.

Utils