Skip to content

Instantly share code, notes, and snippets.

@rishi-raj-jain
Last active June 9, 2024 10:02
Show Gist options
  • Save rishi-raj-jain/ef5f20f61423e7fd81d2ea32b26f56a5 to your computer and use it in GitHub Desktop.
Save rishi-raj-jain/ef5f20f61423e7fd81d2ea32b26f56a5 to your computer and use it in GitHub Desktop.
Google OAuth 2.0 on the Edge with Hono and Cloudflare Workers
// Do enable nodejs_compat
// https://developers.cloudflare.com/workers/runtime-apis/nodejs/
import crypto from 'node:crypto'
import { Context, Hono } from 'hono'
const app = new Hono()
function generateJWT(payload, secret, expiresIn) {
const header = { alg: 'HS256', typ: 'JWT' }
const encodedHeader = base64UrlEncode(JSON.stringify(header))
const encodedPayload = base64UrlEncode(payload)
const signature = sign(`${encodedHeader}.${encodedPayload}`, secret)
return `${encodedHeader}.${encodedPayload}.${signature}`
}
function base64UrlEncode(str) {
const base64 = btoa(str)
return base64.replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/, '')
}
function sign(data, secret) {
const key = parseKey(secret)
const hmac = crypto.createHmac('sha256', key)
hmac.update(data)
const signature = hmac.digest('base64')
return base64UrlEncode(signature)
}
function parseKey(key) {
return crypto.createHash('sha256').update(key).digest()
}
function parseCookie(cookieHeader, cookieName) {
if (!cookieHeader) return null
const cookies = cookieHeader.split(';')
for (const cookie of cookies) {
const [name, value] = cookie.split('=')
if (name.trim() === cookieName) {
return value.trim()
}
}
return null
}
function decodeJWT(token) {
const [encodedHeader, encodedPayload] = token.split('.')
const header = JSON.parse(base64UrlDecode(encodedHeader))
const payload = JSON.parse(base64UrlDecode(encodedPayload))
return { header, payload }
}
function base64UrlDecode(str) {
const base64 = str.replace(/-/g, '+').replace(/_/g, '/')
const padding = base64.length % 4 === 0 ? 0 : 4 - (base64.length % 4)
const paddedBase64 = base64 + '==='.slice(0, padding)
return atob(paddedBase64)
}
app.get('/auth/callback/google', async (c: Context) => {
const code = new URL(c.req.raw.url).searchParams.get('code')
if (!code) return
try {
const tokenEndpoint = new URL('https://accounts.google.com/o/oauth2/token')
tokenEndpoint.searchParams.set('code', code)
tokenEndpoint.searchParams.set('grant_type', 'authorization_code')
// Get the Google Client ID from the env
tokenEndpoint.searchParams.set('client_id', c.env.GOOGLE_CLIENT_ID)
// Get the Google Secret from the env
tokenEndpoint.searchParams.set('client_secret', c.env.GOOGLE_CLIENT_SECRET )
// Add your own callback URL
tokenEndpoint.searchParams.set('redirect_uri', c.env.GOOGLE_CALLBACK_URL)
const tokenResponse = await fetch(tokenEndpoint.origin + tokenEndpoint.pathname, {
method: 'POST',
headers: {
'Content-Type': 'application/x-www-form-urlencoded',
},
body: tokenEndpoint.searchParams.toString(),
})
const tokenData = await tokenResponse.json()
// Get the access_token from the Token fetch response
const accessToken = tokenData.access_token
const userInfoResponse = await fetch('https://www.googleapis.com/oauth2/v2/userinfo', {
headers: {
Authorization: `Bearer ${accessToken}`,
},
})
// Get user info via that fetched access_token
const userInfo = await userInfoResponse.json()
// Destructure email, name, picture from the users' Google Account Info
const { email, name, picture } = userInfo
const tokenPayload = JSON.stringify({ email, name, picture })
// Create a Cookie for the payload, i.e. user info as above
// Set the expiration to say 1 hour
const cookie = generateJWT(tokenPayload, c.env.AUTH_SECRET, '1h')
return new Response(null, {
status: 302,
headers: {
Location: '/',
// This is the key here, place the cookie in the browser
'Set-Cookie': `custom_auth=${cookie}; Path=/; HttpOnly`,
},
})
} catch (error) {
console.error('Error fetching user info:', error)
}
})
app.get('/auth/google', (c: Context) => {
const authorizationUrl = new URL('https://accounts.google.com/o/oauth2/v2/auth')
// Get the Google Client ID from the env
authorizationUrl.searchParams.set('client_id', c.env.GOOGLE_CLIENT_ID)
// Add your own callback URL
authorizationUrl.searchParams.set('redirect_uri', c.env.GOOGLE_CALLBACK_URL)
authorizationUrl.searchParams.set('prompt', 'consent')
authorizationUrl.searchParams.set('response_type', 'code')
authorizationUrl.searchParams.set('scope', 'openid email profile')
authorizationUrl.searchParams.set('access_type', 'offline')
// Redirect the user to Google Login
return new Response(null, {
status: 302,
headers: {
Location: authorizationUrl.toString(),
},
})
})
app.get('/', async (c: Context) => {
// Get the cookie header in Hono
const cookieHeader = c.req.raw.headers.get('Cookie')
// Parse the custom_auth cookie to get the user auth values (if logged in)
const cookie = parseCookie(cookieHeader, 'custom_auth')
if (cookie) {
const decodedToken = decodeJWT(cookie)
// Just for demonstration purposes
if (decodedToken) return new Response(JSON.stringify(decodedToken), { headers: { 'Content-Type': 'application/json' } })
}
return new Response(JSON.stringify({}), { headers: { 'Content-Type': 'application/json' } })
})
export default app
@divofred
Copy link

divofred commented Feb 8, 2024

Error fetching user info: TypeError: crypto_default.createHash is not a function
how can i fix this?

@rishi-raj-jain
Copy link
Author

ah you need to enable nodejs_compat

@rishi-raj-jain
Copy link
Author

@divofred
Copy link

divofred commented Feb 8, 2024

Worked pretty well, thanks @rishi-raj-jain. I've been struggling with this. I was using an outdated way of enabling nodejs 😅

@rishi-raj-jain
Copy link
Author

Thanks for the kind words! Made my day! ✨

@mdhruvil
Copy link

mdhruvil commented Feb 8, 2024

@rishi-raj-jain
Copy link
Author

I think that was introduced after the time I wrote this? Not sure though...

@arnavvsinghal
Copy link

Hey @rishi-raj-jain, Why didn't you use honojs middleware for oauth ? https://github.com/honojs/middleware/tree/main/packages/oauth-providers

Hello @mdhruvil ! Are there more ways to implement "Signin using Google" in a cloudflare worker + Hono application?

@mdhruvil
Copy link

mdhruvil commented Mar 4, 2024

Hey @rishi-raj-jain, Why didn't you use honojs middleware for oauth ? https://github.com/honojs/middleware/tree/main/packages/oauth-providers

Hello @mdhruvil ! Are there more ways to implement "Signin using Google" in a cloudflare worker + Hono application?

You can use auth libraries like lucia-auth

@arnavvsinghal
Copy link

Hey @rishi-raj-jain, Why didn't you use honojs middleware for oauth ? https://github.com/honojs/middleware/tree/main/packages/oauth-providers

Hello @mdhruvil ! Are there more ways to implement "Signin using Google" in a cloudflare worker + Hono application?

You can use auth libraries like lucia-auth

Is there any sample code that is available, so that I can understand how to implement it?

@mdhruvil
Copy link

mdhruvil commented Jun 9, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment