expo-atproto-auth
v0.1.1
Published
Atproto OAuth for Expo applications
Maintainers
Readme
Expo Atproto OAuth
This is an Expo client library for Atproto OAuth. It implements the required native crypto functions for supporting JWTs in React Native and uses
the base OAuthClient interface found in the Atproto repository.
Prerequisites
Before using this library, there are a few additional libraries that you must install within your Expo application.
- react-native-mmkv
- expo-web-browser
- @atproto/oauth-client
- event-target-polyfill (or similar)
- abortcontroller-polyfill (or similar)
Apply the two polyfills inside your application's entrypoint (usually index.ts). They should be placed before anything else in the file, and particularly before registerRootComponent(App).
[!CAUTION] As of current (Expo 53), you must apply an Expo patch for this library to work. You may use the patch found here. A fix for this has been submitted up stream and merged, so will hopefully be fixed in Expo 54 (see the PR here).
In bare React Native projects
For bare React Native projects, you must ensure that you have installed and configured the expo package
before continuing.
Installation
Once you have satisfied the prerequisites, you can simply install the library with yarn add expo-atproto-auth.
Usage
Serve your oauth-client-metadata.json
You will need to server an oauth-client-metadata.json from your application's website. An example of this metadata
would look like this:
{
"client_id": "https://hailey.at/oauth-client-metadata.json",
"client_name": "React Native OAuth Client Demo",
"client_uri": "https://hailey.at",
"redirect_uris": [
"at.hailey:/auth/callback"
],
"scope": "atproto transition:generic",
"token_endpoint_auth_method": "none",
"response_types": [
"code"
],
"grant_types": [
"authorization_code",
"refresh_token"
],
"application_type": "native",
"dpop_bound_access_tokens": true
}- The
client_idshould be the same URL as where you are serving youroauth-client-metadata.jsonfrom - The
client_urican be the home page of where you are serving your metadata from - Your
redirect_urisshould contain the native redirect URI in the first position. Additionally, the scheme must be formatted as the reverse of the domain you are serving the metadata from. Since I am serving mine fromhailey.at, I useat.haileyas the scheme. If my domain wereatproto.expo.dev, I would usedev.expo.atproto. Additionally, the scheme must contain only one trailing slash after the:.at.hailey://would be invalid. - The
application_typemust benative
For a real-world example, see Skylight's client metadata.
For more information about client metadata, see the Atproto documentation.
Create a client
Next, you want to create an ExpoOAuthClient. You will need to pass in the same client metadata to the client as you are serving in your oauth-client-metadata.json.
const client = new ExpoOAuthClient({
clientMetadata: {
client_id: 'https://hailey.at/oauth-client-metadata.json',
client_name: 'React Native OAuth Client Demo',
client_uri: 'https://hailey.at',
redirect_uris: ['at.hailey:/auth/callback'],
scope: 'atproto transition:generic',
token_endpoint_auth_method: 'none',
response_types: ['code'],
grant_types: ['authorization_code', 'refresh_token'],
application_type: 'native',
dpop_bound_access_tokens: true,
},
handleResolver: 'https://bsky.social',
})Sign a user in
Whenever you are ready, you can initiate a sign in attempt for the user using the client using client.signIn(input)
input must be one of the following:
- A valid Atproto user handle, e.g.
hailey.bsky.teamorhailey.at - A valid DID, e.g.
did:web:hailey.atordid:plc:oisofpd7lj26yvgiivf3lxsi - A valid PDS host, e.g.
https://cocoon.hailey.atorhttps://bsky.social
[!NOTE] If you wish to allow a user to create an account instead of signing in, simply use a valid PDS hostname rather than a handle. They will be presented the option to either Sign In with an existing account, or create a new one.
The response of signIn will be a promise resolving to the following:
| { status: WebBrowserResultType } // See Expo Web Browser documentation
| { status: 'error'; error: unknown }
| { status: 'success'; session: OAuthSession }For example:
const res = await client.signIn(input ?? '')
if (res.status === 'success') {
setSession(res.session)
const newAgent = new Agent(res.session)
setAgent(newAgent)
} else if (res.status === 'error') {
Alert.alert('Error', (res.error as any).toString())
} else {
Alert.alert(
'Error',
`Received unknown WebResultType: ${res.status}`
)
}Create an Agent
To interface with the various Atproto APIs, you will need to create an Agent. You will pass your OAuthSession to the Agent.
const newAgent = new Agent(res.session)Session refreshes will be handled for you for the lifetime of the agent.
Restoring a session
After, for example, closing the application, you will probably need to restore the user's session. You can do this by using the user's DID on the ExpoOAuthClient.
const restoreRes = await client.restore('did:plc:oisofpd7lj26yvgiivf3lxsi')
const newAgent = new Agent(restoreRes)If the session needs to be refreshed, .restore() will do this for you before returning a session.
