Set up the GitHub OAuth App

Table of Contents
- [Setting Environment Variables](#setting-environment-variables)

To get started, we need to set up an OAuth App in Github. Within your GitHub Account Settings, click OAuth Apps under Developer Settings. Go ahead and create a "New OAuth App".

Since you are testing your app locally, you'll create a development GitHub app that redirects to localhost. Eventually you'll need to create separate OAuth Apps: one for development and a production app whose URLs will connect to the live domain. We'll circle back to the production app once when we cover hosting.

For now, fill in http://localhost:3000 for the Homepage URL. With the Authorization callback URL, enter http://localhost:3000/github/authorizing. This is the URL for an authorizing redirect page that we will create at a later step.


Once the details are filled in, Go ahead and click 'Register Application'. After creating the app, you should see a page with information such as Client ID and Client Secret. Next, we'll add those as environment variables to the project to connect this App to the Tina-GitHub helpers.

Setting Environment Variables

Environment variables are sensitive values specific to your project. The Tina-GitHub helpers will use these values to talk to your repository, enabling auth and data fetching via GitHub.

You will need a secret Signing Key, which should be a random 256-bit key. This key used server-side to encrypt and decrypt authentication tokens sent to the client.

You can generate a key by running openssl rand -base64 32 in your terminal, using the output as your Signing Key.

To set these variables, create a .env file in your project root. Add the secret and id values from the OAuth App, add your secret Signing Key, and fill in the repo name.

Do not commit this file! You will want to add .env to your .gitignore file.


# OAuth App Credentials from GitHub

# The path to your repository in GitHub

# The base branch that new changes and forks are created from. Defaults to 'master'.

# The signing key used for token encryption

You can use the dotenv package to load the .env file:

yarn add dotenv

Now, to load these .env values in the front-end, create a file called next.config.js in the root of your project. Add the code from this example:



module.exports = {
  env: {
    BASE_BRANCH: process.env.BASE_BRANCH,
  // ...

Note that we did not add GITHUB_CLIENT_SECRET or SIGNING_KEY to the exported configuration. Environment variables we add here are injected by Webpack at build time and will be present in the JavaScript bundle sent to the client. Since GITHUB_CLIENT_SECRET and SIGNING_KEY will only be used in our server-side code, and we don't want it exposed to the client, we will avoid adding it here.

Our GitHub App is up and running! Next, we will set up some API functions to handle content editing.