A progressive Node.js framework for building efficient and scalable server-side applications.
Nest framework TypeScript starter repository.
$ npm install
# development
$ npm run start
# watch mode
$ npm run start:dev
# production mode
$ npm run start:prod
# unit tests
$ npm run test
# e2e tests
$ npm run test:e2e
# test coverage
$ npm run test:cov
Nest is an MIT-licensed open source project. It can grow thanks to the sponsors and support by the amazing backers. If you'd like to join them, please read more here.
- Author - Kamil Myśliwiec
- Website - https://nestjs.com
- Twitter - @nestframework
Nest is MIT licensed.
-
Create an .env file at the root of your repo (near package.json) with content exactly as in .env.example. SECURE_KEY can be generated by command
$ npm run gen:secure-key
-
update username and password for your local mysql database in ormconfig.json
-
run
$ npm run start:dev
this will create necessary tables in database for you as well as start the application
-
Add client metadata that will be used to access our oidc provider by insert to
client
table the following contentINSERT INTO `oauth`.`client` (`id`, `data`) VALUES ('foo', '{"client_id":"foo","client_secret":"foobar","redirect_uris":["https://jwt.io"],"response_types":["code"],"grant_types":["authorization_code"],"token_endpoint_auth_method\":"client_secret_basic"}');
this will create a client with client_id=foo and client_secret=foobar
-
register a user by POST request (using POSTMAN or curl to the following endpoint)
curl --location --request POST 'localhost:3000/user/register' \ --header 'Content-Type: application/json' \ --data-raw '{ "email": "[email protected]", "password": "sup233erWE-!@#", "fullName": "Random" }'
-
now open in browser the following url:
https://localhost:3000/oidc/auth?client_id=foo&response_type=code&redirect_uri=https%3A%2F%2Fjwt.io&scope=openid&nonce=foobar&code_challenge=LOqTgN1kQhLnRWXY8LQbXN032SBJqCxgCYdTcIoUyto&code_challenge_method=S256
-
this will open login page, use the email and password registered earlier to authenticate
-
after clicking Authorize you will be redirect to jwt.io (specified in client metadata and in auth url) with authorization_code in url
-
copy that code and use it to obtain token with following POST request (Basic Authorization header is composed using base64Encode(client_id:client_secret)) replace authorization_code with what you obtained from previous step
curl --location --request POST 'https://localhost:3000/oidc/token' \ --header 'Authorization: Basic Zm9vOmZvb2Jhcg==' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'code=<AUTHORIZATION_CODE_GOES_HERE>' \ --data-urlencode 'grant_type=authorization_code' \ --data-urlencode 'redirect_uri=https://jwt.io' \ --data-urlencode 'code_verifier=_z9u~RxevCk0jbFOfky1xEJcT-60Wgsl2QrU8DvBaNp755VNt8P_vbMKSWn6GIUShBwS~LT5vULj7Qnmt0bk38T8aeOiG3MOLPY~0_5fxW6p3SLbyw0Px.z9JW_hqs6E'
-
response should look like this
{ "access_token": "RvKSmu8UjUm_USTOoJQcnxOdXy-M1_MsDPMSy1XzpZ7", "expires_in": 3600, "id_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6Im5JTkxnSkh2UWZVQTVJSWJxR2hNbTJGWDlSNmNMbGJWS182c1FvQXJqMzAifQ.eyJzdWIiOiJsZWR1eW1pbmg0OEBnbWFpbC5jb20iLCJub25jZSI6ImZvb2JhciIsImF0X2hhc2giOiJ2OVNQbWVFTnU4ZXVXZjFyS2pTaDd3IiwiYXVkIjoiZm9vIiwiZXhwIjoxNjI2NTU1MjE4LCJpYXQiOjE2MjY1NTE2MTgsImlzcyI6Imh0dHBzOi8vbG9naW4uZXBhbS5jb20ifQ.kzCqR4KnWfAaLZfnfV3fsvlq4lgl_GaqAB7UuNki5Jx2i_lft4h543XVnwYTm5mVYE9C5i5dgjlXDNSOutNj0ulG0EfzcsVZeE-u3KKf1IgTOL06iH2GNhAaHOSYCbTHDW-icTtC5s5CGNUukBHMcBwPd1Y435YmNTe7NDFBIltiqxRDb4IVOk3Y9a3bdQcSDMqHcCo3PSXc-zaS2z0FcxODc_8_zH_4--lzdBNeDWPZxJx0_i2YPwwm14DeaK7UlJh6euBAkZWQk00XU6KktqVMkGCJFKi6hyjwN5kthEepgSGKEeY8rOoMUS-QnaWGs_JObCB1HNnavseplLDs3g", "scope": "openid", "token_type": "Bearer" }
-
copy id_token to jwt.io debugger, and you can retrieve user_info authenticated earlier
-
this flow can be implemented simply by using oidc-client library