The logs show nothing useful.
The client waits. The clock runs.
OAuth 2.0 on Raspberry Pi is simple if you strip it to its core. It is a framework for delegated access. Your Pi can authenticate users through a trusted provider without managing passwords itself. Done right, it gives secure login, controlled API calls, and a path to scale. Done wrong, it leaks data.
First, understand the OAuth 2.0 flow. A client requests authorization from the user. The user is sent to the provider. The provider returns an authorization code. The client exchanges that code for an access token. With the token, it calls APIs on behalf of the user.
On Raspberry Pi, the most common use case is linking IoT applications to cloud services. You can run Python, Go, or Node.js. The Pi acts as the client. Implement the Authorization Code Grant for web-based flows or the Client Credentials Grant for server-to-server operations. Always use HTTPS.