@atproto/oauth-provider 0.2.0 → 0.2.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (170) hide show
  1. package/CHANGELOG.md +42 -0
  2. package/dist/account/account-store.d.ts +2 -2
  3. package/dist/assets/app/bundle-manifest.json +3 -3
  4. package/dist/assets/app/main.css +1 -1
  5. package/dist/assets/app/main.js +3 -3
  6. package/dist/assets/app/main.js.map +1 -1
  7. package/dist/assets/assets-middleware.d.ts.map +1 -1
  8. package/dist/assets/assets-middleware.js +4 -2
  9. package/dist/assets/assets-middleware.js.map +1 -1
  10. package/dist/client/client-manager.d.ts.map +1 -1
  11. package/dist/client/client-manager.js +127 -118
  12. package/dist/client/client-manager.js.map +1 -1
  13. package/dist/client/client-utils.d.ts +1 -2
  14. package/dist/client/client-utils.d.ts.map +1 -1
  15. package/dist/client/client-utils.js +3 -12
  16. package/dist/client/client-utils.js.map +1 -1
  17. package/dist/client/client.d.ts +8 -3
  18. package/dist/client/client.d.ts.map +1 -1
  19. package/dist/client/client.js +70 -1
  20. package/dist/client/client.js.map +1 -1
  21. package/dist/constants.d.ts +0 -1
  22. package/dist/constants.d.ts.map +1 -1
  23. package/dist/constants.js +1 -2
  24. package/dist/constants.js.map +1 -1
  25. package/dist/errors/access-denied-error.d.ts +4 -4
  26. package/dist/errors/access-denied-error.d.ts.map +1 -1
  27. package/dist/errors/access-denied-error.js +2 -2
  28. package/dist/errors/access-denied-error.js.map +1 -1
  29. package/dist/errors/account-selection-required-error.d.ts +2 -2
  30. package/dist/errors/account-selection-required-error.d.ts.map +1 -1
  31. package/dist/errors/account-selection-required-error.js.map +1 -1
  32. package/dist/errors/consent-required-error.d.ts +2 -2
  33. package/dist/errors/consent-required-error.d.ts.map +1 -1
  34. package/dist/errors/consent-required-error.js.map +1 -1
  35. package/dist/errors/invalid-authorization-details-error.d.ts +2 -2
  36. package/dist/errors/invalid-authorization-details-error.d.ts.map +1 -1
  37. package/dist/errors/invalid-authorization-details-error.js.map +1 -1
  38. package/dist/errors/invalid-client-id-error.d.ts +1 -1
  39. package/dist/errors/invalid-client-id-error.d.ts.map +1 -1
  40. package/dist/errors/invalid-client-id-error.js +12 -6
  41. package/dist/errors/invalid-client-id-error.js.map +1 -1
  42. package/dist/errors/invalid-client-metadata-error.d.ts +1 -1
  43. package/dist/errors/invalid-client-metadata-error.d.ts.map +1 -1
  44. package/dist/errors/invalid-client-metadata-error.js +11 -3
  45. package/dist/errors/invalid-client-metadata-error.js.map +1 -1
  46. package/dist/errors/invalid-parameters-error.d.ts +2 -2
  47. package/dist/errors/invalid-parameters-error.d.ts.map +1 -1
  48. package/dist/errors/invalid-parameters-error.js.map +1 -1
  49. package/dist/errors/invalid-scope-error.d.ts +9 -0
  50. package/dist/errors/invalid-scope-error.d.ts.map +1 -0
  51. package/dist/errors/invalid-scope-error.js +14 -0
  52. package/dist/errors/invalid-scope-error.js.map +1 -0
  53. package/dist/errors/login-required-error.d.ts +2 -2
  54. package/dist/errors/login-required-error.d.ts.map +1 -1
  55. package/dist/errors/login-required-error.js.map +1 -1
  56. package/dist/lib/html/html.d.ts +1 -1
  57. package/dist/lib/html/html.d.ts.map +1 -1
  58. package/dist/lib/html/html.js +14 -11
  59. package/dist/lib/html/html.js.map +1 -1
  60. package/dist/lib/http/parser.d.ts +9 -2
  61. package/dist/lib/http/parser.d.ts.map +1 -1
  62. package/dist/lib/http/parser.js +15 -7
  63. package/dist/lib/http/parser.js.map +1 -1
  64. package/dist/lib/http/request.d.ts +0 -23
  65. package/dist/lib/http/request.d.ts.map +1 -1
  66. package/dist/lib/http/request.js +1 -11
  67. package/dist/lib/http/request.js.map +1 -1
  68. package/dist/lib/http/stream.d.ts +28 -6
  69. package/dist/lib/http/stream.d.ts.map +1 -1
  70. package/dist/lib/http/stream.js +21 -32
  71. package/dist/lib/http/stream.js.map +1 -1
  72. package/dist/lib/util/authorization-header.d.ts.map +1 -1
  73. package/dist/lib/util/authorization-header.js +1 -1
  74. package/dist/lib/util/authorization-header.js.map +1 -1
  75. package/dist/lib/util/hostname.d.ts +3 -2
  76. package/dist/lib/util/hostname.d.ts.map +1 -1
  77. package/dist/lib/util/hostname.js +12 -8
  78. package/dist/lib/util/hostname.js.map +1 -1
  79. package/dist/metadata/build-metadata.d.ts.map +1 -1
  80. package/dist/metadata/build-metadata.js +2 -1
  81. package/dist/metadata/build-metadata.js.map +1 -1
  82. package/dist/oauth-errors.d.ts +1 -0
  83. package/dist/oauth-errors.d.ts.map +1 -1
  84. package/dist/oauth-errors.js +3 -1
  85. package/dist/oauth-errors.js.map +1 -1
  86. package/dist/oauth-hooks.d.ts +3 -3
  87. package/dist/oauth-hooks.d.ts.map +1 -1
  88. package/dist/oauth-provider.d.ts +20 -22
  89. package/dist/oauth-provider.d.ts.map +1 -1
  90. package/dist/oauth-provider.js +234 -176
  91. package/dist/oauth-provider.js.map +1 -1
  92. package/dist/oauth-verifier.d.ts +2 -2
  93. package/dist/oauth-verifier.d.ts.map +1 -1
  94. package/dist/oauth-verifier.js.map +1 -1
  95. package/dist/output/build-authorize-data.d.ts +2 -2
  96. package/dist/output/build-authorize-data.d.ts.map +1 -1
  97. package/dist/output/send-authorize-redirect.d.ts +2 -4
  98. package/dist/output/send-authorize-redirect.d.ts.map +1 -1
  99. package/dist/output/send-authorize-redirect.js +5 -2
  100. package/dist/output/send-authorize-redirect.js.map +1 -1
  101. package/dist/request/request-data.d.ts +2 -2
  102. package/dist/request/request-data.d.ts.map +1 -1
  103. package/dist/request/request-info.d.ts +2 -2
  104. package/dist/request/request-info.d.ts.map +1 -1
  105. package/dist/request/request-manager.d.ts +4 -4
  106. package/dist/request/request-manager.d.ts.map +1 -1
  107. package/dist/request/request-manager.js +94 -60
  108. package/dist/request/request-manager.js.map +1 -1
  109. package/dist/signer/signed-token-payload.d.ts +122 -122
  110. package/dist/signer/signer.d.ts +41 -40
  111. package/dist/signer/signer.d.ts.map +1 -1
  112. package/dist/signer/signer.js +13 -15
  113. package/dist/signer/signer.js.map +1 -1
  114. package/dist/token/token-claims.d.ts +121 -121
  115. package/dist/token/token-data.d.ts +3 -3
  116. package/dist/token/token-data.d.ts.map +1 -1
  117. package/dist/token/token-manager.d.ts +4 -5
  118. package/dist/token/token-manager.d.ts.map +1 -1
  119. package/dist/token/token-manager.js +96 -72
  120. package/dist/token/token-manager.js.map +1 -1
  121. package/dist/token/verify-token-claims.d.ts +3 -3
  122. package/dist/token/verify-token-claims.d.ts.map +1 -1
  123. package/dist/token/verify-token-claims.js.map +1 -1
  124. package/package.json +7 -6
  125. package/src/assets/app/components/sign-in-form.tsx +31 -2
  126. package/src/assets/app/components/url-viewer.tsx +3 -3
  127. package/src/assets/assets-middleware.ts +4 -2
  128. package/src/client/client-manager.ts +163 -161
  129. package/src/client/client-utils.ts +7 -12
  130. package/src/client/client.ts +112 -3
  131. package/src/constants.ts +0 -2
  132. package/src/errors/access-denied-error.ts +10 -4
  133. package/src/errors/account-selection-required-error.ts +2 -2
  134. package/src/errors/consent-required-error.ts +2 -2
  135. package/src/errors/invalid-authorization-details-error.ts +2 -2
  136. package/src/errors/invalid-client-id-error.ts +15 -4
  137. package/src/errors/invalid-client-metadata-error.ts +15 -3
  138. package/src/errors/invalid-parameters-error.ts +2 -2
  139. package/src/errors/invalid-scope-error.ts +15 -0
  140. package/src/errors/login-required-error.ts +2 -2
  141. package/src/lib/html/html.ts +14 -12
  142. package/src/lib/http/parser.ts +21 -8
  143. package/src/lib/http/request.ts +1 -23
  144. package/src/lib/http/stream.ts +29 -60
  145. package/src/lib/util/authorization-header.ts +5 -2
  146. package/src/lib/util/hostname.ts +9 -5
  147. package/src/metadata/build-metadata.ts +3 -1
  148. package/src/oauth-errors.ts +1 -0
  149. package/src/oauth-hooks.ts +3 -3
  150. package/src/oauth-provider.ts +368 -269
  151. package/src/oauth-verifier.ts +2 -2
  152. package/src/output/build-authorize-data.ts +2 -2
  153. package/src/output/send-authorize-redirect.ts +7 -6
  154. package/src/request/request-data.ts +2 -2
  155. package/src/request/request-info.ts +2 -2
  156. package/src/request/request-manager.ts +129 -103
  157. package/src/signer/signer.ts +24 -25
  158. package/src/token/token-data.ts +3 -3
  159. package/src/token/token-manager.ts +141 -99
  160. package/src/token/verify-token-claims.ts +3 -3
  161. package/dist/request/types.d.ts +0 -328
  162. package/dist/request/types.d.ts.map +0 -1
  163. package/dist/request/types.js +0 -27
  164. package/dist/request/types.js.map +0 -1
  165. package/dist/token/types.d.ts +0 -250
  166. package/dist/token/types.d.ts.map +0 -1
  167. package/dist/token/types.js +0 -36
  168. package/dist/token/types.js.map +0 -1
  169. package/src/request/types.ts +0 -48
  170. package/src/token/types.ts +0 -86
@@ -1,8 +1,12 @@
1
1
  import { isSignedJwt } from '@atproto/jwk'
2
2
  import {
3
- AccessToken,
4
3
  CLIENT_ASSERTION_TYPE_JWT_BEARER,
5
- OAuthAuthenticationRequestParameters,
4
+ OAuthAccessToken,
5
+ OAuthAuthorizationRequestParameters,
6
+ OAuthAuthorizationCodeGrantTokenRequest,
7
+ OAuthClientCredentialsGrantTokenRequest,
8
+ OAuthPasswordGrantTokenRequest,
9
+ OAuthRefreshTokenGrantTokenRequest,
6
10
  OAuthTokenResponse,
7
11
  OAuthTokenType,
8
12
  } from '@atproto/oauth-types'
@@ -27,11 +31,14 @@ import { InvalidGrantError } from '../errors/invalid-grant-error.js'
27
31
  import { InvalidRequestError } from '../errors/invalid-request-error.js'
28
32
  import { InvalidTokenError } from '../errors/invalid-token-error.js'
29
33
  import { dateToEpoch, dateToRelativeSeconds } from '../lib/util/date.js'
30
- import { compareRedirectUri } from '../lib/util/redirect-uri.js'
31
34
  import { OAuthHooks } from '../oauth-hooks.js'
32
- import { isCode } from '../request/code.js'
35
+ import { Code, isCode } from '../request/code.js'
33
36
  import { Signer } from '../signer/signer.js'
34
- import { generateRefreshToken, isRefreshToken } from './refresh-token.js'
37
+ import {
38
+ generateRefreshToken,
39
+ isRefreshToken,
40
+ refreshTokenSchema,
41
+ } from './refresh-token.js'
35
42
  import { TokenClaims } from './token-claims.js'
36
43
  import { TokenData } from './token-data.js'
37
44
  import {
@@ -41,7 +48,6 @@ import {
41
48
  tokenIdSchema,
42
49
  } from './token-id.js'
43
50
  import { TokenInfo, TokenStore } from './token-store.js'
44
- import { CodeGrantRequest, RefreshGrantRequest } from './types.js'
45
51
  import {
46
52
  VerifyTokenClaimsOptions,
47
53
  VerifyTokenClaimsResult,
@@ -78,18 +84,25 @@ export class TokenManager {
78
84
  clientAuth: ClientAuth,
79
85
  account: Account,
80
86
  device: null | { id: DeviceId; info: DeviceAccountInfo },
81
- parameters: OAuthAuthenticationRequestParameters,
82
- input: CodeGrantRequest,
87
+ parameters: OAuthAuthorizationRequestParameters,
88
+ input:
89
+ | OAuthAuthorizationCodeGrantTokenRequest
90
+ | OAuthClientCredentialsGrantTokenRequest
91
+ | OAuthPasswordGrantTokenRequest,
83
92
  dpopJkt: null | string,
84
93
  ): Promise<OAuthTokenResponse> {
94
+ // @NOTE the atproto specific DPoP requirement is enforced though the
95
+ // "dpop_bound_access_tokens" metadata, which is enforced by the
96
+ // ClientManager class.
85
97
  if (client.metadata.dpop_bound_access_tokens && !dpopJkt) {
86
98
  throw new InvalidDpopProofError('DPoP proof required')
87
99
  }
88
100
 
89
101
  if (!parameters.dpop_jkt) {
102
+ // Allow clients to bind their access tokens to a DPoP key during
103
+ // token request if they didn't provide a "dpop_jkt" during the
104
+ // authorization request.
90
105
  if (dpopJkt) parameters = { ...parameters, dpop_jkt: dpopJkt }
91
- } else if (!dpopJkt) {
92
- throw new InvalidDpopProofError('DPoP proof required')
93
106
  } else if (parameters.dpop_jkt !== dpopJkt) {
94
107
  throw new InvalidDpopKeyBindingError()
95
108
  }
@@ -109,78 +122,80 @@ export class TokenManager {
109
122
  )
110
123
  }
111
124
 
125
+ let code: Code | null = null
126
+
112
127
  switch (input.grant_type) {
113
- case 'authorization_code':
114
- if (!parameters.code_challenge || !parameters.code_challenge_method) {
115
- throw new InvalidGrantError('PKCE is required')
128
+ case 'authorization_code': {
129
+ if (!isCode(input.code)) {
130
+ throw new InvalidGrantError('Invalid code')
116
131
  }
117
132
 
118
- if (!parameters.redirect_uri) {
119
- const redirect_uri = client.metadata.redirect_uris.find((uri) =>
120
- compareRedirectUri(uri, input.redirect_uri),
121
- )
122
- if (redirect_uri) {
123
- parameters = { ...parameters, redirect_uri }
124
- } else {
125
- throw new InvalidGrantError(`Invalid redirect_uri`)
126
- }
127
- } else if (parameters.redirect_uri !== input.redirect_uri) {
128
- throw new InvalidGrantError(
129
- 'This code was issued for another redirect_uri',
130
- )
133
+ const tokenInfo = await this.store.findTokenByCode(input.code)
134
+ if (tokenInfo) {
135
+ await this.store.deleteToken(tokenInfo.id)
136
+ throw new InvalidGrantError(`Code replayed`)
131
137
  }
132
138
 
133
- break
139
+ code = input.code
134
140
 
135
- default:
136
- throw new Error(`Unsupported grant type "${input.grant_type}"`)
137
- }
141
+ if (parameters.redirect_uri !== input.redirect_uri) {
142
+ throw new InvalidGrantError(
143
+ 'The redirect_uri parameter must match the one used in the authorization request',
144
+ )
145
+ }
138
146
 
139
- if (parameters.code_challenge) {
140
- if (!('code_verifier' in input) || !input.code_verifier) {
141
- throw new InvalidGrantError('code_verifier is required')
142
- }
143
- // Prevent client from generating too short code_verifiers
144
- if (input.code_verifier.length < 43) {
145
- throw new InvalidGrantError('code_verifier too short')
146
- }
147
- switch (parameters.code_challenge_method) {
148
- case undefined: // Default is "plain" (per spec)
149
- case 'plain': {
150
- if (parameters.code_challenge !== input.code_verifier) {
151
- throw new InvalidGrantError('Invalid code_verifier')
147
+ if (parameters.code_challenge) {
148
+ if (!input.code_verifier) {
149
+ throw new InvalidGrantError('code_verifier is required')
152
150
  }
153
- break
154
- }
155
- case 'S256': {
156
- // Because the code_challenge is base64url-encoded, we will decode
157
- // it in order to compare based on bytes.
158
- const inputChallenge = Buffer.from(
159
- parameters.code_challenge,
160
- 'base64',
161
- )
162
- const computedChallenge = createHash('sha256')
163
- .update(input.code_verifier)
164
- .digest()
165
- if (inputChallenge.compare(computedChallenge) !== 0) {
166
- throw new InvalidGrantError('Invalid code_verifier')
151
+ if (input.code_verifier.length < 43) {
152
+ throw new InvalidGrantError('code_verifier too short')
167
153
  }
168
- break
169
- }
170
- default: {
154
+ switch (parameters.code_challenge_method ?? 'plain') {
155
+ case 'plain': {
156
+ if (parameters.code_challenge !== input.code_verifier) {
157
+ throw new InvalidGrantError('Invalid code_verifier')
158
+ }
159
+ break
160
+ }
161
+ case 'S256': {
162
+ const inputChallenge = Buffer.from(
163
+ parameters.code_challenge,
164
+ 'base64',
165
+ )
166
+ const computedChallenge = createHash('sha256')
167
+ .update(input.code_verifier)
168
+ .digest()
169
+ if (inputChallenge.compare(computedChallenge) !== 0) {
170
+ throw new InvalidGrantError('Invalid code_verifier')
171
+ }
172
+ break
173
+ }
174
+ default: {
175
+ // Should never happen (because request validation should catch this)
176
+ throw new Error(`Unsupported code_challenge_method`)
177
+ }
178
+ }
179
+ } else if (input.code_verifier !== undefined) {
171
180
  throw new InvalidRequestError(
172
- `Unsupported code_challenge_method ${parameters.code_challenge_method}`,
181
+ "code_challenge parameter wasn't provided",
173
182
  )
174
183
  }
184
+
185
+ if (!device) {
186
+ // Fool-proofing (authorization_code grant should always have a device)
187
+ throw new InvalidRequestError('consent was not given for this device')
188
+ }
189
+
190
+ break
175
191
  }
176
- }
177
192
 
178
- const code = 'code' in input ? input.code : undefined
179
- if (code) {
180
- const tokenInfo = await this.store.findTokenByCode(code)
181
- if (tokenInfo) {
182
- await this.store.deleteToken(tokenInfo.id)
183
- throw new InvalidGrantError(`Code replayed`)
193
+ default: {
194
+ // Other grants (e.g "password", "client_credentials") could be added
195
+ // here in the future...
196
+ throw new InvalidRequestError(
197
+ `Unsupported grant type "${input.grant_type}"`,
198
+ )
184
199
  }
185
200
  }
186
201
 
@@ -207,41 +222,50 @@ export class TokenManager {
207
222
  sub: account.sub,
208
223
  parameters,
209
224
  details: authorizationDetails ?? null,
210
- code: code ?? null,
225
+ code,
211
226
  }
212
227
 
213
228
  await this.store.createToken(tokenId, tokenData, refreshToken)
214
229
 
215
- const accessToken: AccessToken = !this.useJwtAccessToken(account)
216
- ? tokenId
217
- : await this.signer.accessToken(client, parameters, account, {
218
- // We don't specify the alg here. We suppose the Resource server will be
219
- // able to verify the token using any alg.
220
- alg: undefined,
221
- exp: expiresAt,
222
- iat: now,
223
- jti: tokenId,
224
- cnf: parameters.dpop_jkt ? { jkt: parameters.dpop_jkt } : undefined,
225
- authorization_details: authorizationDetails,
226
- })
230
+ try {
231
+ const accessToken: OAuthAccessToken = !this.useJwtAccessToken(account)
232
+ ? tokenId
233
+ : await this.signer.accessToken(client, parameters, {
234
+ // We don't specify the alg here. We suppose the Resource server will be
235
+ // able to verify the token using any alg.
236
+ aud: account.aud,
237
+ sub: account.sub,
238
+ alg: undefined,
239
+ exp: expiresAt,
240
+ iat: now,
241
+ jti: tokenId,
242
+ cnf: parameters.dpop_jkt ? { jkt: parameters.dpop_jkt } : undefined,
243
+ authorization_details: authorizationDetails,
244
+ })
227
245
 
228
- return this.buildTokenResponse(
229
- client,
230
- accessToken,
231
- refreshToken,
232
- expiresAt,
233
- parameters,
234
- account,
235
- authorizationDetails,
236
- )
246
+ return this.buildTokenResponse(
247
+ client,
248
+ accessToken,
249
+ refreshToken,
250
+ expiresAt,
251
+ parameters,
252
+ account,
253
+ authorizationDetails,
254
+ )
255
+ } catch (err) {
256
+ // Just in case the token could not be issued, we delete it from the store
257
+ await this.store.deleteToken(tokenId)
258
+
259
+ throw err
260
+ }
237
261
  }
238
262
 
239
263
  protected async buildTokenResponse(
240
264
  client: Client,
241
- accessToken: AccessToken,
265
+ accessToken: OAuthAccessToken,
242
266
  refreshToken: string | undefined,
243
267
  expiresAt: Date,
244
- parameters: OAuthAuthenticationRequestParameters,
268
+ parameters: OAuthAuthorizationRequestParameters,
245
269
  account: Account,
246
270
  authorizationDetails: null | any,
247
271
  ): Promise<OAuthTokenResponse> {
@@ -289,12 +313,16 @@ export class TokenManager {
289
313
  async refresh(
290
314
  client: Client,
291
315
  clientAuth: ClientAuth,
292
- input: RefreshGrantRequest,
316
+ input: OAuthRefreshTokenGrantTokenRequest,
293
317
  dpopJkt: null | string,
294
318
  ): Promise<OAuthTokenResponse> {
295
- const tokenInfo = await this.store.findTokenByRefreshToken(
296
- input.refresh_token,
297
- )
319
+ const refreshTokenParsed = refreshTokenSchema.safeParse(input.refresh_token)
320
+ if (!refreshTokenParsed.success) {
321
+ throw new InvalidRequestError('Invalid refresh token')
322
+ }
323
+ const refreshToken = refreshTokenParsed.data
324
+
325
+ const tokenInfo = await this.store.findTokenByRefreshToken(refreshToken)
298
326
  if (!tokenInfo?.currentRefreshToken) {
299
327
  throw new InvalidGrantError(`Invalid refresh token`)
300
328
  }
@@ -303,12 +331,24 @@ export class TokenManager {
303
331
  const { parameters } = data
304
332
 
305
333
  try {
306
- if (tokenInfo.currentRefreshToken !== input.refresh_token) {
334
+ if (tokenInfo.currentRefreshToken !== refreshToken) {
307
335
  throw new InvalidGrantError(`refresh token replayed`)
308
336
  }
309
337
 
310
338
  await this.validateAccess(client, clientAuth, tokenInfo)
311
339
 
340
+ if (input.grant_type !== 'refresh_token') {
341
+ // Fool-proofing (should never happen)
342
+ throw new InvalidGrantError(`Invalid grant type`)
343
+ }
344
+
345
+ if (!client.metadata.grant_types.includes(input.grant_type)) {
346
+ // In case the client metadata was updated after the token was issued
347
+ throw new InvalidGrantError(
348
+ `This client is not allowed to use the "${input.grant_type}" grant type`,
349
+ )
350
+ }
351
+
312
352
  if (parameters.dpop_jkt) {
313
353
  if (!dpopJkt) {
314
354
  throw new InvalidDpopProofError('DPoP proof required')
@@ -370,11 +410,13 @@ export class TokenManager {
370
410
  },
371
411
  )
372
412
 
373
- const accessToken: AccessToken = !this.useJwtAccessToken(account)
413
+ const accessToken: OAuthAccessToken = !this.useJwtAccessToken(account)
374
414
  ? nextTokenId
375
- : await this.signer.accessToken(client, parameters, account, {
415
+ : await this.signer.accessToken(client, parameters, {
376
416
  // We don't specify the alg here. We suppose the Resource server will be
377
417
  // able to verify the token using any alg.
418
+ aud: account.aud,
419
+ sub: account.sub,
378
420
  alg: undefined,
379
421
  exp: expiresAt,
380
422
  iat: now,
@@ -1,4 +1,4 @@
1
- import { AccessToken, OAuthTokenType } from '@atproto/oauth-types'
1
+ import { OAuthAccessToken, OAuthTokenType } from '@atproto/oauth-types'
2
2
 
3
3
  import { InvalidDpopKeyBindingError } from '../errors/invalid-dpop-key-binding-error.js'
4
4
  import { InvalidDpopProofError } from '../errors/invalid-dpop-proof-error.js'
@@ -15,14 +15,14 @@ export type VerifyTokenClaimsOptions = {
15
15
  }
16
16
 
17
17
  export type VerifyTokenClaimsResult = {
18
- token: AccessToken
18
+ token: OAuthAccessToken
19
19
  tokenId: TokenId
20
20
  tokenType: OAuthTokenType
21
21
  claims: TokenClaims
22
22
  }
23
23
 
24
24
  export function verifyTokenClaims(
25
- token: AccessToken,
25
+ token: OAuthAccessToken,
26
26
  tokenId: TokenId,
27
27
  tokenType: OAuthTokenType,
28
28
  dpopJkt: string | null,