@atcute/oauth-browser-client 1.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +17 -0
- package/README.md +159 -0
- package/dist/agents/exchange.d.ts +20 -0
- package/dist/agents/exchange.js +87 -0
- package/dist/agents/exchange.js.map +1 -0
- package/dist/agents/server-agent.d.ts +22 -0
- package/dist/agents/server-agent.js +119 -0
- package/dist/agents/server-agent.js.map +1 -0
- package/dist/agents/sessions.d.ts +11 -0
- package/dist/agents/sessions.js +107 -0
- package/dist/agents/sessions.js.map +1 -0
- package/dist/agents/user-agent.d.ts +13 -0
- package/dist/agents/user-agent.js +77 -0
- package/dist/agents/user-agent.js.map +1 -0
- package/dist/constants.d.ts +1 -0
- package/dist/constants.js +2 -0
- package/dist/constants.js.map +1 -0
- package/dist/dpop.d.ts +4 -0
- package/dist/dpop.js +118 -0
- package/dist/dpop.js.map +1 -0
- package/dist/environment.d.ts +19 -0
- package/dist/environment.js +9 -0
- package/dist/environment.js.map +1 -0
- package/dist/errors.d.ts +31 -0
- package/dist/errors.js +59 -0
- package/dist/errors.js.map +1 -0
- package/dist/index.d.ts +14 -0
- package/dist/index.js +15 -0
- package/dist/index.js.map +1 -0
- package/dist/resolvers.d.ts +52 -0
- package/dist/resolvers.js +186 -0
- package/dist/resolvers.js.map +1 -0
- package/dist/store/db.d.ts +18 -0
- package/dist/store/db.js +106 -0
- package/dist/store/db.js.map +1 -0
- package/dist/types/client.d.ts +37 -0
- package/dist/types/client.js +2 -0
- package/dist/types/client.js.map +1 -0
- package/dist/types/dpop.d.ts +7 -0
- package/dist/types/dpop.js +2 -0
- package/dist/types/dpop.js.map +1 -0
- package/dist/types/identity.d.ts +6 -0
- package/dist/types/identity.js +2 -0
- package/dist/types/identity.js.map +1 -0
- package/dist/types/par.d.ts +4 -0
- package/dist/types/par.js +2 -0
- package/dist/types/par.js.map +1 -0
- package/dist/types/server.d.ts +57 -0
- package/dist/types/server.js +2 -0
- package/dist/types/server.js.map +1 -0
- package/dist/types/store.d.ts +6 -0
- package/dist/types/store.js +2 -0
- package/dist/types/store.js.map +1 -0
- package/dist/types/token.d.ts +38 -0
- package/dist/types/token.js +2 -0
- package/dist/types/token.js.map +1 -0
- package/dist/utils/misc.d.ts +3 -0
- package/dist/utils/misc.js +10 -0
- package/dist/utils/misc.js.map +1 -0
- package/dist/utils/response.d.ts +1 -0
- package/dist/utils/response.js +4 -0
- package/dist/utils/response.js.map +1 -0
- package/dist/utils/runtime.d.ts +12 -0
- package/dist/utils/runtime.js +44 -0
- package/dist/utils/runtime.js.map +1 -0
- package/dist/utils/strings.d.ts +2 -0
- package/dist/utils/strings.js +4 -0
- package/dist/utils/strings.js.map +1 -0
- package/package.json +29 -0
package/dist/store/db.js
ADDED
|
@@ -0,0 +1,106 @@
|
|
|
1
|
+
import { locks } from '../utils/runtime.js';
|
|
2
|
+
const parse = (raw) => {
|
|
3
|
+
if (raw != null) {
|
|
4
|
+
const parsed = JSON.parse(raw);
|
|
5
|
+
if (parsed != null) {
|
|
6
|
+
return parsed;
|
|
7
|
+
}
|
|
8
|
+
}
|
|
9
|
+
return {};
|
|
10
|
+
};
|
|
11
|
+
export const createOAuthDatabase = ({ name }) => {
|
|
12
|
+
const controller = new AbortController();
|
|
13
|
+
const signal = controller.signal;
|
|
14
|
+
const createStore = (subname, expiresAt) => {
|
|
15
|
+
let store;
|
|
16
|
+
const storageKey = `${name}:${subname}`;
|
|
17
|
+
const persist = () => store && localStorage.setItem(storageKey, JSON.stringify(store));
|
|
18
|
+
const read = () => {
|
|
19
|
+
if (signal.aborted) {
|
|
20
|
+
throw new Error(`store closed`);
|
|
21
|
+
}
|
|
22
|
+
return (store ??= parse(localStorage.getItem(storageKey)));
|
|
23
|
+
};
|
|
24
|
+
{
|
|
25
|
+
const listener = (ev) => {
|
|
26
|
+
if (ev.key === storageKey) {
|
|
27
|
+
store = undefined;
|
|
28
|
+
}
|
|
29
|
+
};
|
|
30
|
+
window.addEventListener('storage', listener, { signal });
|
|
31
|
+
}
|
|
32
|
+
locks.request(`${storageKey}:cleanup`, { ifAvailable: true }, async (lock) => {
|
|
33
|
+
if (!lock || signal.aborted) {
|
|
34
|
+
return;
|
|
35
|
+
}
|
|
36
|
+
await new Promise((resolve) => setTimeout(resolve, 10_000));
|
|
37
|
+
if (signal.aborted) {
|
|
38
|
+
return;
|
|
39
|
+
}
|
|
40
|
+
let now = Date.now();
|
|
41
|
+
let changed = false;
|
|
42
|
+
read();
|
|
43
|
+
for (const key in store) {
|
|
44
|
+
const item = store[key];
|
|
45
|
+
const expiresAt = item.expiresAt;
|
|
46
|
+
if (expiresAt !== null && now > expiresAt) {
|
|
47
|
+
changed = true;
|
|
48
|
+
delete store[key];
|
|
49
|
+
}
|
|
50
|
+
}
|
|
51
|
+
if (changed) {
|
|
52
|
+
persist();
|
|
53
|
+
}
|
|
54
|
+
});
|
|
55
|
+
return {
|
|
56
|
+
get(key) {
|
|
57
|
+
read();
|
|
58
|
+
const item = store[key];
|
|
59
|
+
if (!item) {
|
|
60
|
+
return;
|
|
61
|
+
}
|
|
62
|
+
const expiresAt = item.expiresAt;
|
|
63
|
+
if (expiresAt !== null && Date.now() > expiresAt) {
|
|
64
|
+
delete store[key];
|
|
65
|
+
persist();
|
|
66
|
+
return;
|
|
67
|
+
}
|
|
68
|
+
return item.value;
|
|
69
|
+
},
|
|
70
|
+
set(key, value) {
|
|
71
|
+
read();
|
|
72
|
+
const item = {
|
|
73
|
+
expiresAt: expiresAt(value),
|
|
74
|
+
value: value,
|
|
75
|
+
};
|
|
76
|
+
store[key] = item;
|
|
77
|
+
persist();
|
|
78
|
+
},
|
|
79
|
+
delete(key) {
|
|
80
|
+
read();
|
|
81
|
+
if (store[key] !== undefined) {
|
|
82
|
+
delete store[key];
|
|
83
|
+
persist();
|
|
84
|
+
}
|
|
85
|
+
},
|
|
86
|
+
keys() {
|
|
87
|
+
read();
|
|
88
|
+
return Object.keys(store);
|
|
89
|
+
},
|
|
90
|
+
};
|
|
91
|
+
};
|
|
92
|
+
return {
|
|
93
|
+
dispose: () => {
|
|
94
|
+
controller.abort();
|
|
95
|
+
},
|
|
96
|
+
sessions: createStore('sessions', ({ token }) => {
|
|
97
|
+
if (token.refresh) {
|
|
98
|
+
return null;
|
|
99
|
+
}
|
|
100
|
+
return token.expires_at ?? null;
|
|
101
|
+
}),
|
|
102
|
+
states: createStore('states', (_item) => Date.now() + 10 * 60 * 1_000),
|
|
103
|
+
dpopNonces: createStore('dpopNonces', (_item) => Date.now() + 10 * 60 * 1_000),
|
|
104
|
+
};
|
|
105
|
+
};
|
|
106
|
+
//# sourceMappingURL=db.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"db.js","sourceRoot":"","sources":["../../lib/store/db.ts"],"names":[],"mappings":"AAMA,OAAO,EAAE,KAAK,EAAE,MAAM,qBAAqB,CAAC;AAkC5C,MAAM,KAAK,GAAG,CAAC,GAAkB,EAAE,EAAE;IACpC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QACjB,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAC/B,IAAI,MAAM,IAAI,IAAI,EAAE,CAAC;YACpB,OAAO,MAAM,CAAC;QACf,CAAC;IACF,CAAC;IAED,OAAO,EAAE,CAAC;AACX,CAAC,CAAC;AAIF,MAAM,CAAC,MAAM,mBAAmB,GAAG,CAAC,EAAE,IAAI,EAAwB,EAAE,EAAE;IACrE,MAAM,UAAU,GAAG,IAAI,eAAe,EAAE,CAAC;IACzC,MAAM,MAAM,GAAG,UAAU,CAAC,MAAM,CAAC;IAEjC,MAAM,WAAW,GAAG,CACnB,OAAU,EACV,SAAsD,EACF,EAAE;QACtD,IAAI,KAAU,CAAC;QAEf,MAAM,UAAU,GAAG,GAAG,IAAI,IAAI,OAAO,EAAE,CAAC;QAExC,MAAM,OAAO,GAAG,GAAG,EAAE,CAAC,KAAK,IAAI,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC,CAAC;QACvF,MAAM,IAAI,GAAG,GAAG,EAAE;YACjB,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;gBACpB,MAAM,IAAI,KAAK,CAAC,cAAc,CAAC,CAAC;YACjC,CAAC;YAED,OAAO,CAAC,KAAK,KAAK,KAAK,CAAC,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;QAC5D,CAAC,CAAC;QAEF,CAAC;YACA,MAAM,QAAQ,GAAG,CAAC,EAAgB,EAAE,EAAE;gBACrC,IAAI,EAAE,CAAC,GAAG,KAAK,UAAU,EAAE,CAAC;oBAC3B,KAAK,GAAG,SAAS,CAAC;gBACnB,CAAC;YACF,CAAC,CAAC;YAEF,MAAM,CAAC,gBAAgB,CAAC,SAAS,EAAE,QAAQ,EAAE,EAAE,MAAM,EAAE,CAAC,CAAC;QAC1D,CAAC;QAED,KAAK,CAAC,OAAO,CAAC,GAAG,UAAU,UAAU,EAAE,EAAE,WAAW,EAAE,IAAI,EAAE,EAAE,KAAK,EAAE,IAAI,EAAE,EAAE;YAC5E,IAAI,CAAC,IAAI,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;gBAC7B,OAAO;YACR,CAAC;YAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE,CAAC,UAAU,CAAC,OAAO,EAAE,MAAM,CAAC,CAAC,CAAC;YAC5D,IAAI,MAAM,CAAC,OAAO,EAAE,CAAC;gBACpB,OAAO;YACR,CAAC;YAED,IAAI,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;YACrB,IAAI,OAAO,GAAG,KAAK,CAAC;YAEpB,IAAI,EAAE,CAAC;YAEP,KAAK,MAAM,GAAG,IAAI,KAAK,EAAE,CAAC;gBACzB,MAAM,IAAI,GAAG,KAAK,CAAC,GAAG,CAAC,CAAC;gBACxB,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEjC,IAAI,SAAS,KAAK,IAAI,IAAI,GAAG,GAAG,SAAS,EAAE,CAAC;oBAC3C,OAAO,GAAG,IAAI,CAAC;oBACf,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC;gBACnB,CAAC;YACF,CAAC;YAED,IAAI,OAAO,EAAE,CAAC;gBACb,OAAO,EAAE,CAAC;YACX,CAAC;QACF,CAAC,CAAC,CAAC;QAEH,OAAO;YACN,GAAG,CAAC,GAAG;gBACN,IAAI,EAAE,CAAC;gBAEP,MAAM,IAAI,GAAmC,KAAK,CAAC,GAAG,CAAC,CAAC;gBACxD,IAAI,CAAC,IAAI,EAAE,CAAC;oBACX,OAAO;gBACR,CAAC;gBAED,MAAM,SAAS,GAAG,IAAI,CAAC,SAAS,CAAC;gBACjC,IAAI,SAAS,KAAK,IAAI,IAAI,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,EAAE,CAAC;oBAClD,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC;oBAClB,OAAO,EAAE,CAAC;oBAEV,OAAO;gBACR,CAAC;gBAED,OAAO,IAAI,CAAC,KAAK,CAAC;YACnB,CAAC;YACD,GAAG,CAAC,GAAG,EAAE,KAAK;gBACb,IAAI,EAAE,CAAC;gBAEP,MAAM,IAAI,GAAmC;oBAC5C,SAAS,EAAE,SAAS,CAAC,KAAK,CAAC;oBAC3B,KAAK,EAAE,KAAK;iBACZ,CAAC;gBAEF,KAAK,CAAC,GAAG,CAAC,GAAG,IAAI,CAAC;gBAClB,OAAO,EAAE,CAAC;YACX,CAAC;YACD,MAAM,CAAC,GAAG;gBACT,IAAI,EAAE,CAAC;gBAEP,IAAI,KAAK,CAAC,GAAG,CAAC,KAAK,SAAS,EAAE,CAAC;oBAC9B,OAAO,KAAK,CAAC,GAAG,CAAC,CAAC;oBAClB,OAAO,EAAE,CAAC;gBACX,CAAC;YACF,CAAC;YACD,IAAI;gBACH,IAAI,EAAE,CAAC;gBAEP,OAAO,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC3B,CAAC;SACD,CAAC;IACH,CAAC,CAAC;IAEF,OAAO;QACN,OAAO,EAAE,GAAG,EAAE;YACb,UAAU,CAAC,KAAK,EAAE,CAAC;QACpB,CAAC;QAED,QAAQ,EAAE,WAAW,CAAC,UAAU,EAAE,CAAC,EAAE,KAAK,EAAE,EAAE,EAAE;YAC/C,IAAI,KAAK,CAAC,OAAO,EAAE,CAAC;gBACnB,OAAO,IAAI,CAAC;YACb,CAAC;YAED,OAAO,KAAK,CAAC,UAAU,IAAI,IAAI,CAAC;QACjC,CAAC,CAAC;QACF,MAAM,EAAE,WAAW,CAAC,QAAQ,EAAE,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,KAAK,CAAC;QACtE,UAAU,EAAE,WAAW,CAAC,YAAY,EAAE,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,KAAK,CAAC;KAC9E,CAAC;AACH,CAAC,CAAC"}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
export interface ClientMetadata {
|
|
2
|
+
redirect_uris: string[];
|
|
3
|
+
response_types: ('code' | 'token' | 'none' | 'code id_token token' | 'code id_token' | 'code token' | 'id_token token' | 'id_token')[];
|
|
4
|
+
grant_types: ('authorization_code' | 'implicit' | 'refresh_token' | 'password' | 'client_credentials' | 'urn:ietf:params:oauth:grant-type:jwt-bearer' | 'urn:ietf:params:oauth:grant-type:saml2-bearer')[];
|
|
5
|
+
scope?: string;
|
|
6
|
+
token_endpoint_auth_method?: 'none' | 'client_secret_basic' | 'client_secret_jwt' | 'client_secret_post' | 'private_key_jwt' | 'self_signed_tls_client_auth' | 'tls_client_auth';
|
|
7
|
+
token_endpoint_auth_signing_alg?: string;
|
|
8
|
+
introspection_endpoint_auth_method?: 'none' | 'client_secret_basic' | 'client_secret_jwt' | 'client_secret_post' | 'private_key_jwt' | 'self_signed_tls_client_auth' | 'tls_client_auth';
|
|
9
|
+
introspection_endpoint_auth_signing_alg?: string;
|
|
10
|
+
revocation_endpoint_auth_method?: 'none' | 'client_secret_basic' | 'client_secret_jwt' | 'client_secret_post' | 'private_key_jwt' | 'self_signed_tls_client_auth' | 'tls_client_auth';
|
|
11
|
+
revocation_endpoint_auth_signing_alg?: string;
|
|
12
|
+
pushed_authorization_request_endpoint_auth_method?: 'none' | 'client_secret_basic' | 'client_secret_jwt' | 'client_secret_post' | 'private_key_jwt' | 'self_signed_tls_client_auth' | 'tls_client_auth';
|
|
13
|
+
pushed_authorization_request_endpoint_auth_signing_alg?: string;
|
|
14
|
+
userinfo_signed_response_alg?: string;
|
|
15
|
+
userinfo_encrypted_response_alg?: string;
|
|
16
|
+
jwks_uri?: string;
|
|
17
|
+
jwks?: unknown;
|
|
18
|
+
application_type?: 'web' | 'native';
|
|
19
|
+
subject_type?: 'public' | 'pairwise';
|
|
20
|
+
request_object_signing_alg?: string;
|
|
21
|
+
id_token_signed_response_alg?: string;
|
|
22
|
+
authorization_signed_response_alg?: string;
|
|
23
|
+
authorization_encrypted_response_enc?: 'A128CBC-HS256';
|
|
24
|
+
authorization_encrypted_response_alg?: string;
|
|
25
|
+
client_id?: string;
|
|
26
|
+
client_name?: string;
|
|
27
|
+
client_uri?: string;
|
|
28
|
+
policy_uri?: string;
|
|
29
|
+
tos_uri?: string;
|
|
30
|
+
logo_uri?: string;
|
|
31
|
+
default_max_age?: number;
|
|
32
|
+
require_auth_time?: boolean;
|
|
33
|
+
contacts?: string[];
|
|
34
|
+
tls_client_certificate_bound_access_tokens?: boolean;
|
|
35
|
+
dpop_bound_access_tokens?: boolean;
|
|
36
|
+
authorization_details_types?: string[];
|
|
37
|
+
}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"client.js","sourceRoot":"","sources":["../../lib/types/client.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"dpop.js","sourceRoot":"","sources":["../../lib/types/dpop.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"identity.js","sourceRoot":"","sources":["../../lib/types/identity.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"par.js","sourceRoot":"","sources":["../../lib/types/par.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,57 @@
|
|
|
1
|
+
export interface ProtectedResourceMetadata {
|
|
2
|
+
resource: string;
|
|
3
|
+
jwks_uri?: string;
|
|
4
|
+
authorization_servers?: string[];
|
|
5
|
+
scopes_supported?: string[];
|
|
6
|
+
bearer_methods_supported?: ('header' | 'body' | 'query')[];
|
|
7
|
+
resource_signing_alg_values_supported?: string[];
|
|
8
|
+
resource_documentation?: string;
|
|
9
|
+
resource_policy_uri?: string;
|
|
10
|
+
resource_tos_uri?: string;
|
|
11
|
+
}
|
|
12
|
+
export interface AuthorizationServerMetadata {
|
|
13
|
+
issuer: string;
|
|
14
|
+
authorization_endpoint: string;
|
|
15
|
+
token_endpoint: string;
|
|
16
|
+
jwks_uri?: string;
|
|
17
|
+
scopes_supported?: string[];
|
|
18
|
+
claims_supported?: string[];
|
|
19
|
+
claims_locales_supported?: string[];
|
|
20
|
+
claims_parameter_supported?: boolean;
|
|
21
|
+
request_parameter_supported?: boolean;
|
|
22
|
+
request_uri_parameter_supported?: boolean;
|
|
23
|
+
require_request_uri_registration?: boolean;
|
|
24
|
+
subject_types_supported?: string[];
|
|
25
|
+
response_types_supported?: string[];
|
|
26
|
+
response_modes_supported?: string[];
|
|
27
|
+
grant_types_supported?: string[];
|
|
28
|
+
code_challenge_methods_supported?: string[];
|
|
29
|
+
ui_locales_supported?: string[];
|
|
30
|
+
id_token_signing_alg_values_supported?: string[];
|
|
31
|
+
display_values_supported?: string[];
|
|
32
|
+
request_object_signing_alg_values_supported?: string[];
|
|
33
|
+
authorization_response_iss_parameter_supported?: boolean;
|
|
34
|
+
authorization_details_types_supported?: string[];
|
|
35
|
+
request_object_encryption_alg_values_supported?: string[];
|
|
36
|
+
request_object_encryption_enc_values_supported?: string[];
|
|
37
|
+
token_endpoint_auth_methods_supported?: string[];
|
|
38
|
+
token_endpoint_auth_signing_alg_values_supported?: string[];
|
|
39
|
+
revocation_endpoint?: string;
|
|
40
|
+
revocation_endpoint_auth_methods_supported?: string[];
|
|
41
|
+
revocation_endpoint_auth_signing_alg_values_supported?: string[];
|
|
42
|
+
introspection_endpoint?: string;
|
|
43
|
+
introspection_endpoint_auth_methods_supported?: string[];
|
|
44
|
+
introspection_endpoint_auth_signing_alg_values_supported?: string[];
|
|
45
|
+
pushed_authorization_request_endpoint?: string;
|
|
46
|
+
pushed_authorization_request_endpoint_auth_methods_supported?: string[];
|
|
47
|
+
pushed_authorization_request_endpoint_auth_signing_alg_values_supported?: string[];
|
|
48
|
+
require_pushed_authorization_requests?: boolean;
|
|
49
|
+
userinfo_endpoint?: string;
|
|
50
|
+
end_session_endpoint?: string;
|
|
51
|
+
registration_endpoint?: string;
|
|
52
|
+
dpop_signing_alg_values_supported?: string[];
|
|
53
|
+
protected_resources?: string[];
|
|
54
|
+
client_id_metadata_document_supported?: boolean;
|
|
55
|
+
}
|
|
56
|
+
export interface PersistedAuthorizationServerMetadata extends Pick<AuthorizationServerMetadata, 'issuer' | 'authorization_endpoint' | 'introspection_endpoint' | 'pushed_authorization_request_endpoint' | 'revocation_endpoint' | 'token_endpoint'> {
|
|
57
|
+
}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"server.js","sourceRoot":"","sources":["../../lib/types/server.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"store.js","sourceRoot":"","sources":["../../lib/types/store.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
import type { At } from '@atcute/client/lexicons';
|
|
2
|
+
import type { DPoPKey } from './dpop.js';
|
|
3
|
+
import type { PersistedAuthorizationServerMetadata } from './server.js';
|
|
4
|
+
export interface OAuthTokenResponse {
|
|
5
|
+
access_token: string;
|
|
6
|
+
token_type: string;
|
|
7
|
+
issuer?: string;
|
|
8
|
+
sub?: string;
|
|
9
|
+
scope?: string;
|
|
10
|
+
id_token?: `${string}.${string}.${string}`;
|
|
11
|
+
refresh_token?: string;
|
|
12
|
+
expires_in?: number;
|
|
13
|
+
authorization_details?: {
|
|
14
|
+
type: string;
|
|
15
|
+
locations?: string[];
|
|
16
|
+
actions?: string[];
|
|
17
|
+
datatypes?: string[];
|
|
18
|
+
identifier?: string;
|
|
19
|
+
privileges?: string[];
|
|
20
|
+
}[] | undefined;
|
|
21
|
+
}
|
|
22
|
+
export interface TokenInfo {
|
|
23
|
+
scope: string;
|
|
24
|
+
type: string;
|
|
25
|
+
expires_at?: number;
|
|
26
|
+
refresh?: string;
|
|
27
|
+
access: string;
|
|
28
|
+
}
|
|
29
|
+
export interface ExchangeInfo {
|
|
30
|
+
sub: At.DID;
|
|
31
|
+
aud: string;
|
|
32
|
+
server: PersistedAuthorizationServerMetadata;
|
|
33
|
+
}
|
|
34
|
+
export interface Session {
|
|
35
|
+
dpopKey: DPoPKey;
|
|
36
|
+
info: ExchangeInfo;
|
|
37
|
+
token: TokenInfo;
|
|
38
|
+
}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"token.js","sourceRoot":"","sources":["../../lib/types/token.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"misc.js","sourceRoot":"","sources":["../../lib/utils/misc.ts"],"names":[],"mappings":"AAEA,MAAM,CAAC,MAAM,IAAI,GAAG,CAA2B,GAAM,EAAE,IAAO,EAA2B,EAAE;IAC1F,MAAM,MAAM,GAAG,EAAE,CAAC;IAElB,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,IAAI,CAAC,MAAM,EAAE,GAAG,GAAG,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC;QACvD,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,CAAC;QAEtB,mBAAmB;QACnB,MAAM,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC,GAAG,CAAC,CAAC;IACxB,CAAC;IAED,OAAO,MAAiC,CAAC;AAC1C,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
export declare const extractContentType: (headers: Headers) => string | undefined;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"response.js","sourceRoot":"","sources":["../../lib/utils/response.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,kBAAkB,GAAG,CAAC,OAAgB,EAAsB,EAAE;IAC1E,OAAO,OAAO,CAAC,GAAG,CAAC,cAAc,CAAC,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;AACnD,CAAC,CAAC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
export declare const encoder: TextEncoder;
|
|
2
|
+
export declare const locks: LockManager;
|
|
3
|
+
export declare const toBase64Url: (input: Uint8Array) => string;
|
|
4
|
+
export declare const fromBase64Url: (input: string) => Uint8Array;
|
|
5
|
+
export declare const toSha256: (input: string) => Promise<string>;
|
|
6
|
+
export declare const randomBytes: (length: number) => string;
|
|
7
|
+
export declare const generateState: () => string;
|
|
8
|
+
export declare const generatePKCE: () => Promise<{
|
|
9
|
+
verifier: string;
|
|
10
|
+
challenge: string;
|
|
11
|
+
method: string;
|
|
12
|
+
}>;
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
export const encoder = new TextEncoder();
|
|
2
|
+
export const locks = navigator.locks;
|
|
3
|
+
export const toBase64Url = (input) => {
|
|
4
|
+
const CHUNK_SIZE = 0x8000;
|
|
5
|
+
const arr = [];
|
|
6
|
+
for (let i = 0; i < input.byteLength; i += CHUNK_SIZE) {
|
|
7
|
+
// @ts-expect-error
|
|
8
|
+
arr.push(String.fromCharCode.apply(null, input.subarray(i, i + CHUNK_SIZE)));
|
|
9
|
+
}
|
|
10
|
+
return btoa(arr.join('')).replace(/=/g, '').replace(/\+/g, '-').replace(/\//g, '_');
|
|
11
|
+
};
|
|
12
|
+
export const fromBase64Url = (input) => {
|
|
13
|
+
try {
|
|
14
|
+
const binary = atob(input.replace(/-/g, '+').replace(/_/g, '/').replace(/\s/g, ''));
|
|
15
|
+
const bytes = new Uint8Array(binary.length);
|
|
16
|
+
for (let i = 0; i < binary.length; i++) {
|
|
17
|
+
bytes[i] = binary.charCodeAt(i);
|
|
18
|
+
}
|
|
19
|
+
return bytes;
|
|
20
|
+
}
|
|
21
|
+
catch (err) {
|
|
22
|
+
throw new TypeError(`invalid base64url`, { cause: err });
|
|
23
|
+
}
|
|
24
|
+
};
|
|
25
|
+
export const toSha256 = async (input) => {
|
|
26
|
+
const bytes = encoder.encode(input);
|
|
27
|
+
const digest = await crypto.subtle.digest('SHA-256', bytes);
|
|
28
|
+
return toBase64Url(new Uint8Array(digest));
|
|
29
|
+
};
|
|
30
|
+
export const randomBytes = (length) => {
|
|
31
|
+
return toBase64Url(crypto.getRandomValues(new Uint8Array(length)));
|
|
32
|
+
};
|
|
33
|
+
export const generateState = () => {
|
|
34
|
+
return randomBytes(16);
|
|
35
|
+
};
|
|
36
|
+
export const generatePKCE = async () => {
|
|
37
|
+
const verifier = randomBytes(32);
|
|
38
|
+
return {
|
|
39
|
+
verifier: verifier,
|
|
40
|
+
challenge: await toSha256(verifier),
|
|
41
|
+
method: 'S256',
|
|
42
|
+
};
|
|
43
|
+
};
|
|
44
|
+
//# sourceMappingURL=runtime.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"runtime.js","sourceRoot":"","sources":["../../lib/utils/runtime.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,OAAO,GAAG,IAAI,WAAW,EAAE,CAAC;AAEzC,MAAM,CAAC,MAAM,KAAK,GAAG,SAAS,CAAC,KAAK,CAAC;AAErC,MAAM,CAAC,MAAM,WAAW,GAAG,CAAC,KAAiB,EAAU,EAAE;IACxD,MAAM,UAAU,GAAG,MAAM,CAAC;IAC1B,MAAM,GAAG,GAAG,EAAE,CAAC;IAEf,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,UAAU,EAAE,CAAC,IAAI,UAAU,EAAE,CAAC;QACvD,mBAAmB;QACnB,GAAG,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,CAAC,KAAK,CAAC,IAAI,EAAE,KAAK,CAAC,QAAQ,CAAC,CAAC,EAAE,CAAC,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;IAC9E,CAAC;IAED,OAAO,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;AACrF,CAAC,CAAC;AAEF,MAAM,CAAC,MAAM,aAAa,GAAG,CAAC,KAAa,EAAc,EAAE;IAC1D,IAAI,CAAC;QACJ,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC,CAAC;QACpF,MAAM,KAAK,GAAG,IAAI,UAAU,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;QAE5C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACxC,KAAK,CAAC,CAAC,CAAC,GAAG,MAAM,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC;QACjC,CAAC;QAED,OAAO,KAAK,CAAC;IACd,CAAC;IAAC,OAAO,GAAG,EAAE,CAAC;QACd,MAAM,IAAI,SAAS,CAAC,mBAAmB,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC,CAAC;IAC1D,CAAC;AACF,CAAC,CAAC;AAEF,MAAM,CAAC,MAAM,QAAQ,GAAG,KAAK,EAAE,KAAa,EAAmB,EAAE;IAChE,MAAM,KAAK,GAAG,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACpC,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;IAE5D,OAAO,WAAW,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC;AAC5C,CAAC,CAAC;AAEF,MAAM,CAAC,MAAM,WAAW,GAAG,CAAC,MAAc,EAAU,EAAE;IACrD,OAAO,WAAW,CAAC,MAAM,CAAC,eAAe,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC;AACpE,CAAC,CAAC;AAEF,MAAM,CAAC,MAAM,aAAa,GAAG,GAAW,EAAE;IACzC,OAAO,WAAW,CAAC,EAAE,CAAC,CAAC;AACxB,CAAC,CAAC;AAEF,MAAM,CAAC,MAAM,YAAY,GAAG,KAAK,IAAsE,EAAE;IACxG,MAAM,QAAQ,GAAG,WAAW,CAAC,EAAE,CAAC,CAAC;IAEjC,OAAO;QACN,QAAQ,EAAE,QAAQ;QAClB,SAAS,EAAE,MAAM,QAAQ,CAAC,QAAQ,CAAC;QACnC,MAAM,EAAE,MAAM;KACd,CAAC;AACH,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"strings.js","sourceRoot":"","sources":["../../lib/utils/strings.ts"],"names":[],"mappings":"AAEA,MAAM,CAAC,MAAM,KAAK,GAAG,CAAC,KAAa,EAAmB,EAAE;IACvD,OAAO,KAAK,CAAC,UAAU,CAAC,MAAM,CAAC,CAAC;AACjC,CAAC,CAAC"}
|
package/package.json
ADDED
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
{
|
|
2
|
+
"type": "module",
|
|
3
|
+
"name": "@atcute/oauth-browser-client",
|
|
4
|
+
"version": "1.0.1",
|
|
5
|
+
"description": "minimal OAuth browser client implementation for AT Protocol",
|
|
6
|
+
"license": "MIT",
|
|
7
|
+
"repository": {
|
|
8
|
+
"url": "https://codeberg.org/mary-ext/atcute"
|
|
9
|
+
},
|
|
10
|
+
"files": [
|
|
11
|
+
"dist/"
|
|
12
|
+
],
|
|
13
|
+
"exports": {
|
|
14
|
+
".": "./dist/index.js"
|
|
15
|
+
},
|
|
16
|
+
"sideEffects": false,
|
|
17
|
+
"dependencies": {
|
|
18
|
+
"nanoid": "^5.0.7",
|
|
19
|
+
"@atcute/client": "^2.0.3"
|
|
20
|
+
},
|
|
21
|
+
"devDependencies": {
|
|
22
|
+
"@types/bun": "^1.1.10"
|
|
23
|
+
},
|
|
24
|
+
"scripts": {
|
|
25
|
+
"build": "tsc --project tsconfig.build.json",
|
|
26
|
+
"test": "bun test --coverage",
|
|
27
|
+
"prepublish": "rm -rf dist; pnpm run build"
|
|
28
|
+
}
|
|
29
|
+
}
|