Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/trivago/Heimdallr.swift
Easy to use OAuth 2 library for iOS, written in Swift.
https://github.com/trivago/Heimdallr.swift
oauth2 swift
Last synced: 3 months ago
JSON representation
Easy to use OAuth 2 library for iOS, written in Swift.
- Host: GitHub
- URL: https://github.com/trivago/Heimdallr.swift
- Owner: trivago
- License: apache-2.0
- Created: 2015-02-10T07:49:32.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2024-01-04T09:06:39.000Z (10 months ago)
- Last Synced: 2024-04-30T23:13:44.727Z (6 months ago)
- Topics: oauth2, swift
- Language: Swift
- Homepage:
- Size: 4.46 MB
- Stars: 635
- Watchers: 34
- Forks: 84
- Open Issues: 27
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
- awesome-ios - Heimdallr.swift - Easy to use OAuth 2 library for iOS, written in Swift. (Authentication)
- awesome-swift - Heimdallr.swift - Easy to use OAuth 2 library for iOS. (Libs / Network)
- awesome-swift - Heimdallr.swift - Easy to use OAuth 2 library for iOS. (Libs / Network)
- awesome-ios-star - Heimdallr.swift - Easy to use OAuth 2 library for iOS, written in Swift. (Authentication)
- fucking-awesome-swift - Heimdallr.swift - Easy to use OAuth 2 library for iOS. (Libs / Network)
- fucking-awesome-ios - Heimdallr.swift - Easy to use OAuth 2 library for iOS, written in Swift. (Authentication)
- fucking-awesome-ios - Heimdallr.swift - Easy to use OAuth 2 library for iOS, written in Swift. (Authentication)
- awesome-swift - Heimdallr.swift - Easy to use OAuth 2 library for iOS, written in Swift. ` 📝 5 months ago ` (Network [🔝](#readme))
README
> [!NOTE]
> Sadly, this repository is no longer able to be actively maintained. If you would like to take over the repo please
> feel free to get in touch.# Heimdallr
Heimdallr is an [OAuth 2.0](https://tools.ietf.org/html/rfc6749) client specifically designed for easy usage. It currently supports the [resource owner password credentials grant](https://tools.ietf.org/html/rfc6749#section-4.3) flow, [refreshing an access token](https://tools.ietf.org/html/rfc6749#section-6), as well as [extension grants](https://tools.ietf.org/html/rfc6749#section-4.5).
If you are an Android Developer, please take a look at the [Android version of Heimdallr](https://github.com/trivago/Heimdall.droid).
[![Build Status](https://github.com/trivago/Heimdallr.swift/actions/workflows/heimdallr.yml/badge.svg)](https://github.com/trivago/Heimdallr.swift/actions/workflows/heimdallr.yml)
[![Carthage compatible](https://img.shields.io/badge/Carthage-compatible-4BC51D.svg?style=flat)](https://github.com/Carthage/Carthage)
![Cocoapods platforms](https://img.shields.io/cocoapods/p/Heimdallr?label=CocoaPods)
![GitHub release (latest by date)](https://img.shields.io/github/v/release/trivago/Heimdallr.swift)## Example
Before requesting an access token, the client must be configured appropriately:
```swift
let tokenURL = URL(string: "https://example.com/oauth/v2/token")!
let heimdallr = Heimdallr(tokenURL: tokenURL)
```On login, the resource owner's password credentials are used to request an access token:
```swift
heimdallr.requestAccessToken(username: "johndoe", password: "A3ddj3w") { result in
switch result {
case .success:
print("success")
case .failure(let error):
print("failure: \(error.localizedDescription)")
}
}
```Heimdallr automatically persists the access token. Afterwards, any `URLRequest` can be easily authenticated using the received access token:
```swift
var session: URLSession!
var request: URLRequest!heimdallr.authenticateRequest(request) { result in
switch result {
case .success(let request):
let task = session.dataTask(with: request) { data, response, error in
// ...
}
task.resume()
case .failure(let error):
print("failure: \(error.localizedDescription)")
}
}
```## Installation
Installation is possible via Swift Package Manager, Carthage, or CocoaPods, see below for either method:
### Swift Package Manager
In Xcode:
1. Navigate to `File -> Swift Packages -> Add Package Dependency` to add the Swift package.2. Paste the repository URL into the search box `https://github.com/trivago/Heimdallr.swift.git`.
3. Select the version, branch, or commit to install.
4. Select the product and the target to attach it to.
### Carthage
[Carthage](https://github.com/Carthage/Carthage) is a simple, decentralized dependency manager for Cocoa.
1. Add Heimdallr to your [Cartfile](https://github.com/Carthage/Carthage/blob/master/Documentation/Artifacts.md#cartfile):
```
github "trivago/Heimdallr.swift" ~> 3.6.1
```2. Run `carthage update` to fetch and build Heimdallr and its dependencies.
3. [Make sure your application's target links against `Heimdallr.framework` and copies all relevant frameworks into its application bundle (iOS); or embeds the binaries of all relevant frameworks (Mac).](https://github.com/carthage/carthage#getting-started)
### CocoaPods
1. Add Heimdallr to your [Podfile](https://guides.cocoapods.org/syntax/podfile.html):
```ruby
pod 'Heimdallr', '~> 3.6.1'
```2. Run `pod install` to fetch and build Heimdallr and its dependencies.
## Usage### OAuthClientCredentials
The client credentials, consisting of the client's identifier and optionally its secret, are used for authenticating with the token endpoint:
```swift
var identifier: String!
var secret: String!let credentials = OAuthClientCredentials(id: identifier)
// OAuthClientCredentials(id: identifier, secret: secret)
```*Please note that native applications are considered to be [public clients](https://tools.ietf.org/html/rfc6749#section-2.1).*
### OAuthAccessTokenStore
An access token store is used to (persistently) store an access token received from the token endpoint. It must implement the following storage and retrieval methods:
```swift
protocol OAuthAccessTokenStore {
func storeAccessToken(accessToken: OAuthAccessToken?)
func retrieveAccessToken() -> OAuthAccessToken?
}
```Heimdallr ships with an already built-in persistent keychain-based access token store. The service is configurable:
```swift
var service: String!let accessTokenStore = OAuthAccessTokenKeychainStore(service: service)
```### HeimdallrHTTPClient
An HTTP client that can be used by Heimdallr for requesting access tokens. It must implement the following `sendRequest` method:
```swift
protocol HeimdallrHTTPClient {
func sendRequest(request: URLRequest, completion: (data: Data!, response: URLResponse!, error: Error?) -> ())
}
```For convenience, a default HTTP client named `HeimdallrHTTPClientURLSession` and based on `URLSession` is provided. It may be configured with an `URLSession`:
```swift
var urlSession: URLSession!let httpClient = HeimdallrHTTPClientURLSession(urlSession: session)
```### OAuthAccessTokenParser
You can provide your own parser to handle the access token response of the server. It can be useful for parsing additional parameters sent in the response that your application may need. The parser must implement the following `parse` method:
```swift
protocol OAuthAccessTokenParser {
func parse(data: Data) -> Result
}
```### Heimdallr
Heimdallr must be initialized with the token endpoint URL and can optionally be configured with client credentials, an access token store and an HTTP client:
```swift
var tokenURL: URL!let heimdallr = Heimdallr(tokenURL: tokenURL)
// Heimdallr(tokenURL: tokenURL, credentials: credentials)
// Heimdallr(tokenURL: tokenURL, credentials: credentials, accessTokenStore: accessTokenStore)
// Heimdallr(tokenURL: tokenURL, credentials: credentials, accessTokenStore: accessTokenStore, accessTokenParser: accessTokenParser)
// Heimdallr(tokenURL: tokenURL, credentials: credentials, accessTokenStore: accessTokenStore, accessTokenParser: accessTokenParser, httpClient: httpClient)
// Heimdallr(tokenURL: tokenURL, credentials: credentials, accessTokenStore: accessTokenStore, accessTokenParser: accessTokenParser, httpClient: httpClient, resourceRequestAuthenticator: resourceRequestAuthenticator)
```Whether the client's access token store currently holds an access token can be checked using the `hasAccessToken` property. *It's not checked whether the stored access token, if any, has already expired.*
The `authorize` method takes the resource owner's password credentials as parameters and uses them to request an access token from the token endpoint:
```swift
var username: String!
var password: String!heimdallr.requestAccessToken(username: username, password: password) { result in
// ...
}
```*The `completion` closure may be invoked on any thread.*
Once successfully authorized, any `URLRequest` can be easily altered to include authentication via the received access token:
```swift
var request: URLRequest!heimdallr.authenticateRequest(request) { result in
// ...
}
```If the access token has already expired and a refresh token is available, Heimdallr will automatically refresh the access token. *Refreshing requires network I/O.* *The `completion` closure may be invoked on any thread.*
### HeimdallrResourceRequestAuthenticator
By default, Heimdallr authenticates a request by setting the HTTP header field `Authorization`. This behavior can be changed by passing another resource request authenticator implementing `HeimdallrResourceRequestAuthenticator` to the initializer.
## About
Heimdallr was built by [trivago](http://www.trivago.com) 🏭
## Credits
Contains code for query string escaping taken from [Alamofire](https://github.com/Alamofire/Alamofire/) (MIT License)