@kaapi/oauth2-auth-design 0.0.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +3 -0
  3. package/lib/flows/auth-code/authorization-route.d.ts +53 -0
  4. package/lib/flows/auth-code/authorization-route.js +202 -0
  5. package/lib/flows/auth-code/authorization-route.js.map +1 -0
  6. package/lib/flows/auth-code/open-id.d.ts +53 -0
  7. package/lib/flows/auth-code/open-id.js +199 -0
  8. package/lib/flows/auth-code/open-id.js.map +1 -0
  9. package/lib/flows/auth-code/token-route.d.ts +35 -0
  10. package/lib/flows/auth-code/token-route.js +61 -0
  11. package/lib/flows/auth-code/token-route.js.map +1 -0
  12. package/lib/flows/auth-code.ts/open-id.d.ts +52 -0
  13. package/lib/flows/auth-code.ts/open-id.js +169 -0
  14. package/lib/flows/auth-code.ts/open-id.js.map +1 -0
  15. package/lib/flows/authentication-code.d.ts +53 -0
  16. package/lib/flows/authentication-code.js +380 -0
  17. package/lib/flows/authentication-code.js.map +1 -0
  18. package/lib/flows/client-credentials.d.ts +55 -0
  19. package/lib/flows/client-credentials.js +318 -0
  20. package/lib/flows/client-credentials.js.map +1 -0
  21. package/lib/flows/common.d.ts +139 -0
  22. package/lib/flows/common.js +235 -0
  23. package/lib/flows/common.js.map +1 -0
  24. package/lib/index.d.ts +13 -0
  25. package/lib/index.js +16 -0
  26. package/lib/index.js.map +1 -0
  27. package/lib/utils/cache-set.d.ts +12 -0
  28. package/lib/utils/cache-set.js +35 -0
  29. package/lib/utils/cache-set.js.map +1 -0
  30. package/lib/utils/client-auth-methods.d.ts +77 -0
  31. package/lib/utils/client-auth-methods.js +225 -0
  32. package/lib/utils/client-auth-methods.js.map +1 -0
  33. package/lib/utils/in-memory-cache.d.ts +5 -0
  34. package/lib/utils/in-memory-cache.js +30 -0
  35. package/lib/utils/in-memory-cache.js.map +1 -0
  36. package/lib/utils/in-memory-jwks-store.d.ts +12 -0
  37. package/lib/utils/in-memory-jwks-store.js +46 -0
  38. package/lib/utils/in-memory-jwks-store.js.map +1 -0
  39. package/lib/utils/jwks-generator.d.ts +58 -0
  40. package/lib/utils/jwks-generator.js +141 -0
  41. package/lib/utils/jwks-generator.js.map +1 -0
  42. package/lib/utils/jwks-store.d.ts +13 -0
  43. package/lib/utils/jwks-store.js +3 -0
  44. package/lib/utils/jwks-store.js.map +1 -0
  45. package/lib/utils/token-types.d.ts +46 -0
  46. package/lib/utils/token-types.js +143 -0
  47. package/lib/utils/token-types.js.map +1 -0
  48. package/package.json +44 -0
  49. package/types/overrides.d.ts +14 -0
package/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2025 demingongo
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
package/README.md ADDED
@@ -0,0 +1,3 @@
1
+ # @kaapi/oauth2-auth-design
2
+
3
+ OAuth2 Auth design in kaapi.
@@ -0,0 +1,53 @@
1
+ import { Lifecycle, ReqRef, ReqRefDefaults, Request, ResponseToolkit } from '@kaapi/kaapi';
2
+ import { OAuth2Error, PathValue } from '../common';
3
+ export interface OAuth2ACAuthorizationParams {
4
+ clientId: string;
5
+ responseType: string;
6
+ redirectUri: string;
7
+ scope?: string;
8
+ state?: string;
9
+ codeChallenge?: string;
10
+ nonce?: string;
11
+ }
12
+ export type OAuth2ACAuthorizationHandler<Refs extends ReqRef = ReqRefDefaults, R extends Lifecycle.ReturnValue<any> = Lifecycle.ReturnValue<Refs>> = (params: OAuth2ACAuthorizationParams, request: Request<Refs>, h: ResponseToolkit<Refs>) => R;
13
+ export interface IOAuth2ACAuthorizationRoute<GetRefs extends ReqRef = ReqRefDefaults, PostRefs extends ReqRef = ReqRefDefaults> {
14
+ path: string;
15
+ handler: OAuth2ACAuthorizationHandler<GetRefs>;
16
+ postHandler: OAuth2ACAuthorizationHandler<PostRefs>;
17
+ }
18
+ export declare class OAuth2ACAuthorizationRoute<GetRefs extends ReqRef = ReqRefDefaults, PostRefs extends ReqRef = ReqRefDefaults> implements IOAuth2ACAuthorizationRoute<GetRefs, PostRefs> {
19
+ static buildDefault<GetRefs extends ReqRef = ReqRefDefaults, PostRefs extends ReqRef = ReqRefDefaults>(): DefaultOAuth2ACAuthorizationRoute<GetRefs, PostRefs>;
20
+ protected _path: string;
21
+ protected _handler: OAuth2ACAuthorizationHandler<GetRefs>;
22
+ protected _postHandler: OAuth2ACAuthorizationHandler<PostRefs>;
23
+ get path(): string;
24
+ get handler(): OAuth2ACAuthorizationHandler<GetRefs, Lifecycle.ReturnValue<GetRefs>>;
25
+ get postHandler(): OAuth2ACAuthorizationHandler<PostRefs, Lifecycle.ReturnValue<PostRefs>>;
26
+ constructor(path: string, handler: OAuth2ACAuthorizationHandler<GetRefs>, postHandler: OAuth2ACAuthorizationHandler<PostRefs>);
27
+ }
28
+ export type AuthErrorType = OAuth2Error | 'credentials' | 'unknown';
29
+ export type AuthResponseRenderer<Refs extends ReqRef = ReqRefDefaults> = (reason: {
30
+ code: number;
31
+ emailField: string;
32
+ passwordField: string;
33
+ error?: AuthErrorType;
34
+ errorMessage?: string;
35
+ }, params: OAuth2ACAuthorizationParams, req: Request<Refs>) => Promise<string | object> | string | object;
36
+ /**
37
+ * Return null for invalid code
38
+ */
39
+ export type AuthCodeGenerator<Refs extends ReqRef = ReqRefDefaults> = (params: OAuth2ACAuthorizationParams, req: Request<Refs>) => Promise<string | null> | string | null;
40
+ export declare class DefaultOAuth2ACAuthorizationRoute<GetRefs extends ReqRef = ReqRefDefaults, PostRefs extends ReqRef = ReqRefDefaults> extends OAuth2ACAuthorizationRoute<GetRefs, PostRefs> {
41
+ #private;
42
+ constructor();
43
+ setPath(path: PathValue): this;
44
+ validateGET(handler: OAuth2ACAuthorizationHandler<GetRefs>): this;
45
+ validatePOST(handler: OAuth2ACAuthorizationHandler<PostRefs>): this;
46
+ setGETResponseRenderer(renderer: AuthResponseRenderer<GetRefs>): this;
47
+ setPOSTResponseRenderer(renderer: AuthResponseRenderer<PostRefs>): this;
48
+ generateCode(handler: AuthCodeGenerator<PostRefs>): this;
49
+ setClientId(value: string | null): this;
50
+ setRedirectUri(value: string | null): this;
51
+ setEmailField(value: string): this;
52
+ setPasswordField(value: string): this;
53
+ }
@@ -0,0 +1,202 @@
1
+ "use strict";
2
+ var _DefaultOAuth2ACAuthorizationRoute_clientId, _DefaultOAuth2ACAuthorizationRoute_redirectUri, _DefaultOAuth2ACAuthorizationRoute_emailField, _DefaultOAuth2ACAuthorizationRoute_passwordField, _DefaultOAuth2ACAuthorizationRoute_generateCode, _DefaultOAuth2ACAuthorizationRoute_renderResponse, _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.DefaultOAuth2ACAuthorizationRoute = exports.OAuth2ACAuthorizationRoute = void 0;
5
+ const tslib_1 = require("tslib");
6
+ const html_entities_1 = require("html-entities");
7
+ class OAuth2ACAuthorizationRoute {
8
+ static buildDefault() {
9
+ return new DefaultOAuth2ACAuthorizationRoute();
10
+ }
11
+ get path() {
12
+ return this._path;
13
+ }
14
+ get handler() {
15
+ return this._handler;
16
+ }
17
+ get postHandler() {
18
+ return this._postHandler;
19
+ }
20
+ constructor(path, handler, postHandler) {
21
+ this._path = path;
22
+ this._handler = handler;
23
+ this._postHandler = postHandler;
24
+ }
25
+ }
26
+ exports.OAuth2ACAuthorizationRoute = OAuth2ACAuthorizationRoute;
27
+ // eslint-disable-next-line @typescript-eslint/no-explicit-any
28
+ const render = ({ error, errorMessage, emailField, passwordField }) => {
29
+ if (error && ['invalid_client'].includes(error)) {
30
+ return { error, error_description: errorMessage };
31
+ }
32
+ return `<!DOCTYPE html>
33
+ <html lang="en">
34
+ <head>
35
+ <meta charset="UTF-8">
36
+ <meta name="Generator" content="EditPlus®">
37
+ <meta name="Author" content="">
38
+ <meta name="Keywords" content="">
39
+ <meta name="Description" content="">
40
+ <title>Sign In</title>
41
+ <style>
42
+ .error {
43
+ color: red;
44
+ font-weight: bold;
45
+ }
46
+ </style>
47
+ </head>
48
+ <body>
49
+ <form method="POST">
50
+ <div class="error">
51
+ ${errorMessage || ''}
52
+ </div>
53
+ <div>
54
+ <input type="email" id="${emailField}" name="${emailField}" placeholder="${emailField}" autocomplete="${emailField}" />
55
+ <input type="password" id="${passwordField}" name="${passwordField}" placeholder="${passwordField}" />
56
+ </div>
57
+ <div>
58
+ <button type="submit">
59
+ Submit
60
+ </button>
61
+ </div>
62
+ </form>
63
+ </body>
64
+ </html>`;
65
+ };
66
+ class DefaultOAuth2ACAuthorizationRoute extends OAuth2ACAuthorizationRoute {
67
+ constructor() {
68
+ super('/oauth2/authorize', (_a, req, h) => tslib_1.__awaiter(this, void 0, void 0, function* () {
69
+ var { clientId, redirectUri } = _a, props = tslib_1.__rest(_a, ["clientId", "redirectUri"]);
70
+ if (tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_clientId, "f") && tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_clientId, "f") != clientId) {
71
+ return h.response(yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_renderResponse, "f").call(this, {
72
+ emailField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f"),
73
+ passwordField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f"),
74
+ code: 400,
75
+ error: 'invalid_client',
76
+ errorMessage: 'Bad \'client_id\' parameter'
77
+ }, Object.assign({ clientId, redirectUri }, props), req)).code(400);
78
+ }
79
+ if (tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_redirectUri, "f") && tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_redirectUri, "f") != redirectUri) {
80
+ return h.response(yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_renderResponse, "f").call(this, {
81
+ emailField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f"),
82
+ passwordField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f"),
83
+ code: 400,
84
+ error: 'invalid_client',
85
+ errorMessage: 'Bad \'redirect_uri\' parameter'
86
+ }, Object.assign({ clientId, redirectUri }, props), req)).code(400);
87
+ }
88
+ // render form
89
+ return h.response(yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_renderResponse, "f").call(this, {
90
+ emailField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f"),
91
+ passwordField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f"),
92
+ code: 200
93
+ }, Object.assign({ clientId, redirectUri }, props), req)).code(200);
94
+ }), (props, req, h) => tslib_1.__awaiter(this, void 0, void 0, function* () {
95
+ if (tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_clientId, "f") && tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_clientId, "f") != props.clientId) {
96
+ return h.response(yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse, "f").call(this, {
97
+ emailField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f"),
98
+ passwordField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f"),
99
+ code: 400,
100
+ error: 'invalid_client',
101
+ errorMessage: 'Bad \'client_id\' parameter'
102
+ }, props, req)).code(400);
103
+ }
104
+ if (tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_redirectUri, "f") && tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_redirectUri, "f") != props.redirectUri) {
105
+ return h.response(yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse, "f").call(this, {
106
+ emailField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f"),
107
+ passwordField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f"),
108
+ code: 400,
109
+ error: 'invalid_client',
110
+ errorMessage: 'Bad \'redirect_uri\' parameter'
111
+ }, props, req)).code(400);
112
+ }
113
+ let error = 'unknown';
114
+ let errorMessage = 'someting went wrong';
115
+ if (props.clientId &&
116
+ req.payload &&
117
+ typeof req.payload === 'object' &&
118
+ tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f") in req.payload &&
119
+ tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f") in req.payload) {
120
+ const code = yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_generateCode, "f").call(this, props, req);
121
+ if (code) {
122
+ return h.redirect(`${props.redirectUri}?code=${code}${props.state ? `&state=${props.state}` : ''}`);
123
+ }
124
+ else {
125
+ error = 'credentials';
126
+ errorMessage = 'wrong credentials';
127
+ }
128
+ }
129
+ else {
130
+ error = 'invalid_request';
131
+ }
132
+ // render form
133
+ return h.response(yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse, "f").call(this, {
134
+ emailField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, "f"),
135
+ passwordField: tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, "f"),
136
+ code: 400,
137
+ error: error,
138
+ errorMessage
139
+ }, props, req)).code(400);
140
+ }));
141
+ _DefaultOAuth2ACAuthorizationRoute_clientId.set(this, void 0);
142
+ _DefaultOAuth2ACAuthorizationRoute_redirectUri.set(this, void 0);
143
+ _DefaultOAuth2ACAuthorizationRoute_emailField.set(this, 'email');
144
+ _DefaultOAuth2ACAuthorizationRoute_passwordField.set(this, 'password');
145
+ _DefaultOAuth2ACAuthorizationRoute_generateCode.set(this, void 0);
146
+ _DefaultOAuth2ACAuthorizationRoute_renderResponse.set(this, void 0);
147
+ _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse.set(this, void 0);
148
+ // @TODO: generate id for user, store it in-memory, generate jwt code ?
149
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_generateCode, () => tslib_1.__awaiter(this, void 0, void 0, function* () { return null; }), "f");
150
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_renderResponse, render, "f");
151
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse, render, "f");
152
+ }
153
+ setPath(path) {
154
+ if (path)
155
+ this._path = path;
156
+ return this;
157
+ }
158
+ validateGET(handler) {
159
+ this._handler = handler;
160
+ return this;
161
+ }
162
+ validatePOST(handler) {
163
+ this._postHandler = handler;
164
+ return this;
165
+ }
166
+ setGETResponseRenderer(renderer) {
167
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_renderResponse, renderer, "f");
168
+ return this;
169
+ }
170
+ setPOSTResponseRenderer(renderer) {
171
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse, renderer, "f");
172
+ return this;
173
+ }
174
+ generateCode(handler) {
175
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_generateCode, handler, "f");
176
+ return this;
177
+ }
178
+ setClientId(value) {
179
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_clientId, value, "f");
180
+ return this;
181
+ }
182
+ setRedirectUri(value) {
183
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_redirectUri, value, "f");
184
+ return this;
185
+ }
186
+ setEmailField(value) {
187
+ const escaped = encodeURIComponent((0, html_entities_1.encode)(value));
188
+ if (escaped)
189
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_emailField, escaped, "f");
190
+ return this;
191
+ }
192
+ setPasswordField(value) {
193
+ const escaped = encodeURIComponent((0, html_entities_1.encode)(value));
194
+ if (escaped)
195
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACAuthorizationRoute_passwordField, escaped, "f");
196
+ return this;
197
+ }
198
+ }
199
+ exports.DefaultOAuth2ACAuthorizationRoute = DefaultOAuth2ACAuthorizationRoute;
200
+ _DefaultOAuth2ACAuthorizationRoute_clientId = new WeakMap(), _DefaultOAuth2ACAuthorizationRoute_redirectUri = new WeakMap(), _DefaultOAuth2ACAuthorizationRoute_emailField = new WeakMap(), _DefaultOAuth2ACAuthorizationRoute_passwordField = new WeakMap(), _DefaultOAuth2ACAuthorizationRoute_generateCode = new WeakMap(), _DefaultOAuth2ACAuthorizationRoute_renderResponse = new WeakMap(), _DefaultOAuth2ACAuthorizationRoute_renderPOSTResponse = new WeakMap();
201
+ //#endregion Defaults
202
+ //# sourceMappingURL=authorization-route.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"authorization-route.js","sourceRoot":"","sources":["../../../src/flows/auth-code/authorization-route.ts"],"names":[],"mappings":";;;;;AAOA,iDAAsC;AA8BtC,MAAa,0BAA0B;IAKnC,MAAM,CAAC,YAAY;QAIf,OAAO,IAAI,iCAAiC,EAAqB,CAAA;IACrE,CAAC;IAMD,IAAI,IAAI;QACJ,OAAO,IAAI,CAAC,KAAK,CAAA;IACrB,CAAC;IAED,IAAI,OAAO;QACP,OAAO,IAAI,CAAC,QAAQ,CAAA;IACxB,CAAC;IAED,IAAI,WAAW;QACX,OAAO,IAAI,CAAC,YAAY,CAAA;IAC5B,CAAC;IAED,YACI,IAAY,EACZ,OAA8C,EAC9C,WAAmD;QAEnD,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;QAClB,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAC;QACxB,IAAI,CAAC,YAAY,GAAG,WAAW,CAAC;IACpC,CAAC;CACJ;AArCD,gEAqCC;AA4BD,8DAA8D;AAC9D,MAAM,MAAM,GAA8B,CAAC,EAAE,KAAK,EAAE,YAAY,EAAE,UAAU,EAAE,aAAa,EAAE,EAAE,EAAE;IAC7F,IAAI,KAAK,IAAI,CAAC,gBAAgB,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QAC9C,OAAO,EAAE,KAAK,EAAE,iBAAiB,EAAE,YAAY,EAAqB,CAAA;IACxE,CAAC;IACD,OAAO;;;;;;;;;;;;;;;;;;;MAmBL,YAAY,IAAI,EAAE;;;4BAGI,UAAU,WAAW,UAAU,kBAAkB,UAAU,mBAAmB,UAAU;+BACrF,aAAa,WAAW,aAAa,kBAAkB,aAAa;;;;;;;;;QAS3F,CAAA;AACR,CAAC,CAAA;AAED,MAAa,iCAGX,SAAQ,0BAA6C;IAWnD;QACI,KAAK,CAAC,mBAAmB,EAAE,CAAO,EAAmC,EAAE,GAAG,EAAE,CAAC,EAAE,EAAE;gBAA/C,EAAE,QAAQ,EAAE,WAAW,OAAY,EAAP,KAAK,sBAAjC,2BAAmC,CAAF;YAC/D,IAAI,+BAAA,IAAI,mDAAU,IAAI,+BAAA,IAAI,mDAAU,IAAI,QAAQ,EAAE,CAAC;gBAC/C,OAAO,CAAC,CAAC,QAAQ,CACb,MAAM,+BAAA,IAAI,yDAAgB,MAApB,IAAI,EACN;oBACI,UAAU,EAAE,+BAAA,IAAI,qDAAY;oBAC5B,aAAa,EAAE,+BAAA,IAAI,wDAAe;oBAClC,IAAI,EAAE,GAAG;oBACT,KAAK,EAAE,gBAAgB;oBACvB,YAAY,EAAE,6BAA6B;iBAC9C,kBACC,QAAQ,EAAE,WAAW,IAAK,KAAK,GACjC,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;YAC3B,CAAC;YACD,IAAI,+BAAA,IAAI,sDAAa,IAAI,+BAAA,IAAI,sDAAa,IAAI,WAAW,EAAE,CAAC;gBACxD,OAAO,CAAC,CAAC,QAAQ,CACb,MAAM,+BAAA,IAAI,yDAAgB,MAApB,IAAI,EACN;oBACI,UAAU,EAAE,+BAAA,IAAI,qDAAY;oBAC5B,aAAa,EAAE,+BAAA,IAAI,wDAAe;oBAClC,IAAI,EAAE,GAAG;oBACT,KAAK,EAAE,gBAAgB;oBACvB,YAAY,EAAE,gCAAgC;iBACjD,kBACC,QAAQ,EAAE,WAAW,IAAK,KAAK,GACjC,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;YAC3B,CAAC;YAED,cAAc;YACd,OAAO,CAAC,CAAC,QAAQ,CACb,MAAM,+BAAA,IAAI,yDAAgB,MAApB,IAAI,EAAiB;gBACvB,UAAU,EAAE,+BAAA,IAAI,qDAAY;gBAC5B,aAAa,EAAE,+BAAA,IAAI,wDAAe;gBAClC,IAAI,EAAE,GAAG;aACZ,kBAAI,QAAQ,EAAE,WAAW,IAAK,KAAK,GAAI,GAAG,CAAC,CAC/C,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;QACf,CAAC,CAAA,EAAE,CAAO,KAAK,EAAE,GAAG,EAAE,CAAC,EAAE,EAAE;YACvB,IAAI,+BAAA,IAAI,mDAAU,IAAI,+BAAA,IAAI,mDAAU,IAAI,KAAK,CAAC,QAAQ,EAAE,CAAC;gBACrD,OAAO,CAAC,CAAC,QAAQ,CACb,MAAM,+BAAA,IAAI,6DAAoB,MAAxB,IAAI,EACN;oBACI,UAAU,EAAE,+BAAA,IAAI,qDAAY;oBAC5B,aAAa,EAAE,+BAAA,IAAI,wDAAe;oBAClC,IAAI,EAAE,GAAG;oBACT,KAAK,EAAE,gBAAgB;oBACvB,YAAY,EAAE,6BAA6B;iBAC9C,EACD,KAAK,EACL,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;YAC3B,CAAC;YACD,IAAI,+BAAA,IAAI,sDAAa,IAAI,+BAAA,IAAI,sDAAa,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;gBAC9D,OAAO,CAAC,CAAC,QAAQ,CACb,MAAM,+BAAA,IAAI,6DAAoB,MAAxB,IAAI,EACN;oBACI,UAAU,EAAE,+BAAA,IAAI,qDAAY;oBAC5B,aAAa,EAAE,+BAAA,IAAI,wDAAe;oBAClC,IAAI,EAAE,GAAG;oBACT,KAAK,EAAE,gBAAgB;oBACvB,YAAY,EAAE,gCAAgC;iBACjD,EACD,KAAK,EACL,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;YAC3B,CAAC;YAED,IAAI,KAAK,GAAkB,SAAS,CAAA;YACpC,IAAI,YAAY,GAAG,qBAAqB,CAAA;YAExC,IACI,KAAK,CAAC,QAAQ;gBACd,GAAG,CAAC,OAAO;gBACX,OAAO,GAAG,CAAC,OAAO,KAAK,QAAQ;gBAC/B,+BAAA,IAAI,qDAAY,IAAI,GAAG,CAAC,OAAO;gBAC/B,+BAAA,IAAI,wDAAe,IAAI,GAAG,CAAC,OAAO,EACpC,CAAC;gBACC,MAAM,IAAI,GAAG,MAAM,+BAAA,IAAI,uDAAc,MAAlB,IAAI,EAAe,KAAK,EAAE,GAAG,CAAC,CAAA;gBACjD,IAAI,IAAI,EAAE,CAAC;oBACP,OAAO,CAAC,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,WAAW,SAAS,IAAI,GAAG,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,UAAU,KAAK,CAAC,KAAK,EAAE,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAA;gBACvG,CAAC;qBAAM,CAAC;oBACJ,KAAK,GAAG,aAAa,CAAA;oBACrB,YAAY,GAAG,mBAAmB,CAAA;gBACtC,CAAC;YACL,CAAC;iBAAM,CAAC;gBACJ,KAAK,GAAG,iBAAiB,CAAA;YAC7B,CAAC;YAED,cAAc;YACd,OAAO,CAAC,CAAC,QAAQ,CACb,MAAM,+BAAA,IAAI,6DAAoB,MAAxB,IAAI,EACN;gBACI,UAAU,EAAE,+BAAA,IAAI,qDAAY;gBAC5B,aAAa,EAAE,+BAAA,IAAI,wDAAe;gBAClC,IAAI,EAAE,GAAG;gBACT,KAAK,EAAE,KAAK;gBACZ,YAAY;aACf,EACD,KAAK,EACL,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;QAC3B,CAAC,CAAA,CAAC,CAAA;QA5GN,8DAAyB;QACzB,iEAA4B;QAE5B,wDAAc,OAAO,EAAA;QACrB,2DAAiB,UAAU,EAAA;QAE3B,kEAA0C;QAC1C,oEAA8C;QAC9C,wEAAmD;QAsG/C,uEAAuE;QACvE,+BAAA,IAAI,mDAAiB,GAAS,EAAE,wDAAC,OAAA,IAAI,CAAA,GAAA,MAAA,CAAA;QACrC,+BAAA,IAAI,qDAAmB,MAAM,MAAA,CAAA;QAC7B,+BAAA,IAAI,yDAAuB,MAAM,MAAA,CAAA;IACrC,CAAC;IAED,OAAO,CAAC,IAAe;QACnB,IAAI,IAAI;YACJ,IAAI,CAAC,KAAK,GAAG,IAAI,CAAA;QACrB,OAAO,IAAI,CAAA;IACf,CAAC;IAED,WAAW,CAAC,OAA8C;QACtD,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAA;QACvB,OAAO,IAAI,CAAA;IACf,CAAC;IAED,YAAY,CAAC,OAA+C;QACxD,IAAI,CAAC,YAAY,GAAG,OAAO,CAAA;QAC3B,OAAO,IAAI,CAAA;IACf,CAAC;IAED,sBAAsB,CAAC,QAAuC;QAC1D,+BAAA,IAAI,qDAAmB,QAAQ,MAAA,CAAA;QAC/B,OAAO,IAAI,CAAA;IACf,CAAC;IAED,uBAAuB,CAAC,QAAwC;QAC5D,+BAAA,IAAI,yDAAuB,QAAQ,MAAA,CAAA;QACnC,OAAO,IAAI,CAAA;IACf,CAAC;IAED,YAAY,CAAC,OAAoC;QAC7C,+BAAA,IAAI,mDAAiB,OAAO,MAAA,CAAA;QAC5B,OAAO,IAAI,CAAA;IACf,CAAC;IAED,WAAW,CAAC,KAAoB;QAC5B,+BAAA,IAAI,+CAAa,KAAK,MAAA,CAAA;QACtB,OAAO,IAAI,CAAA;IACf,CAAC;IAED,cAAc,CAAC,KAAoB;QAC/B,+BAAA,IAAI,kDAAgB,KAAK,MAAA,CAAA;QACzB,OAAO,IAAI,CAAA;IACf,CAAC;IAED,aAAa,CAAC,KAAa;QACvB,MAAM,OAAO,GAAG,kBAAkB,CAAC,IAAA,sBAAM,EAAC,KAAK,CAAC,CAAC,CAAA;QACjD,IAAI,OAAO;YACP,+BAAA,IAAI,iDAAe,OAAO,MAAA,CAAA;QAC9B,OAAO,IAAI,CAAA;IACf,CAAC;IAED,gBAAgB,CAAC,KAAa;QAC1B,MAAM,OAAO,GAAG,kBAAkB,CAAC,IAAA,sBAAM,EAAC,KAAK,CAAC,CAAC,CAAA;QACjD,IAAI,OAAO;YACP,+BAAA,IAAI,oDAAkB,OAAO,MAAA,CAAA;QACjC,OAAO,IAAI,CAAA;IACf,CAAC;CACJ;AA9KD,8EA8KC;;AAED,qBAAqB"}
@@ -0,0 +1,53 @@
1
+ import { SecuritySchemeObject } from '@novice1/api-doc-generator/lib/generators/openapi/definitions';
2
+ import { OAuth2Util } from '@novice1/api-doc-generator';
3
+ import { OAuth2AuthorizationCode, OAuth2AuthorizationCodeArg } from '../authentication-code';
4
+ import { KaapiTools, Lifecycle, ReqRef, Request, ReqRefDefaults, ResponseToolkit } from '@kaapi/kaapi';
5
+ import { JWKS } from '../../utils/jwks-store';
6
+ export declare class OpenIDAuthUtil extends OAuth2Util {
7
+ setHost(host: string): this;
8
+ toOpenAPI(): Record<string, SecuritySchemeObject>;
9
+ }
10
+ export interface OpenIDJWKSParams {
11
+ jwks: JWKS;
12
+ }
13
+ export type OpenIDJWKSHandler<Refs extends ReqRef = ReqRefDefaults, R extends Lifecycle.ReturnValue<any> = Lifecycle.ReturnValue<Refs>> = (params: OpenIDJWKSParams, request: Request<Refs>, h: ResponseToolkit<Refs>) => R;
14
+ export interface IOpenIDJWKSRoute<Refs extends ReqRef = ReqRefDefaults> {
15
+ path: string;
16
+ handler?: OpenIDJWKSHandler<Refs>;
17
+ }
18
+ export declare class OpenIDJWKSRoute<Refs extends ReqRef = ReqRefDefaults> implements IOpenIDJWKSRoute<Refs> {
19
+ protected _path: string;
20
+ protected _handler: OpenIDJWKSHandler<Refs> | undefined;
21
+ get path(): string;
22
+ get handler(): OpenIDJWKSHandler<Refs, Lifecycle.ReturnValue<Refs>> | undefined;
23
+ constructor(path: string, handler?: OpenIDJWKSHandler<Refs>);
24
+ }
25
+ export type OpenIDUserInfoHandler<Refs extends ReqRef = ReqRefDefaults, R extends Lifecycle.ReturnValue<any> = Lifecycle.ReturnValue<Refs>> = (request: Request<Refs>, h: ResponseToolkit<Refs>) => R;
26
+ export interface IOpenIDUserInfoRoute<Refs extends ReqRef = ReqRefDefaults> {
27
+ path: string;
28
+ handler: OpenIDUserInfoHandler<Refs>;
29
+ }
30
+ export declare class OpenIDUserInfoRoute<Refs extends ReqRef = ReqRefDefaults> implements IOpenIDUserInfoRoute<Refs> {
31
+ protected _path: string;
32
+ protected _handler: OpenIDUserInfoHandler<Refs>;
33
+ get path(): string;
34
+ get handler(): OpenIDUserInfoHandler<Refs, Lifecycle.ReturnValue<Refs>>;
35
+ constructor(path: string, handler: OpenIDUserInfoHandler<Refs>);
36
+ }
37
+ export interface OpenIDAuthDesignArg extends OAuth2AuthorizationCodeArg {
38
+ jwksRoute: IOpenIDJWKSRoute<any>;
39
+ userInfoRoute?: IOpenIDUserInfoRoute<any>;
40
+ /**
41
+ * Override the configuration served at /.well-known/openid-configuration
42
+ */
43
+ openidConfiguration?: Record<string, unknown>;
44
+ }
45
+ export declare class OpenIDAuthDesign extends OAuth2AuthorizationCode {
46
+ protected jwksRoute: IOpenIDJWKSRoute<any>;
47
+ protected userInfoRoute?: IOpenIDUserInfoRoute<any>;
48
+ protected openidConfiguration: Record<string, unknown>;
49
+ constructor(params: OpenIDAuthDesignArg);
50
+ getScopes(): Record<string, string>;
51
+ integrateHook(t: KaapiTools): void;
52
+ docs(): OAuth2Util;
53
+ }
@@ -0,0 +1,199 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.OpenIDAuthDesign = exports.OpenIDUserInfoRoute = exports.OpenIDJWKSRoute = exports.OpenIDAuthUtil = void 0;
4
+ const tslib_1 = require("tslib");
5
+ const api_doc_generator_1 = require("@novice1/api-doc-generator");
6
+ const authentication_code_1 = require("../authentication-code");
7
+ //#region OpenIDAuthUtil
8
+ class OpenIDAuthUtil extends api_doc_generator_1.OAuth2Util {
9
+ setHost(host) {
10
+ super.setHost(host);
11
+ return this;
12
+ }
13
+ toOpenAPI() {
14
+ const host = this.getHost();
15
+ return {
16
+ [this.securitySchemeName]: {
17
+ type: 'openIdConnect',
18
+ openIdConnectUrl: `${host || ''}/.well-known/openid-configuration`
19
+ }
20
+ };
21
+ }
22
+ }
23
+ exports.OpenIDAuthUtil = OpenIDAuthUtil;
24
+ class OpenIDJWKSRoute {
25
+ get path() {
26
+ return this._path;
27
+ }
28
+ get handler() {
29
+ return this._handler;
30
+ }
31
+ constructor(path, handler) {
32
+ this._path = path;
33
+ this._handler = handler;
34
+ }
35
+ }
36
+ exports.OpenIDJWKSRoute = OpenIDJWKSRoute;
37
+ class OpenIDUserInfoRoute {
38
+ get path() {
39
+ return this._path;
40
+ }
41
+ get handler() {
42
+ return this._handler;
43
+ }
44
+ constructor(path, handler) {
45
+ this._path = path;
46
+ this._handler = handler;
47
+ }
48
+ }
49
+ exports.OpenIDUserInfoRoute = OpenIDUserInfoRoute;
50
+ class OpenIDAuthDesign extends authentication_code_1.OAuth2AuthorizationCode {
51
+ constructor(params) {
52
+ const { strategyName, openidConfiguration, jwksRoute, userInfoRoute } = params, props = tslib_1.__rest(params, ["strategyName", "openidConfiguration", "jwksRoute", "userInfoRoute"]);
53
+ super(props);
54
+ this.openidConfiguration = {};
55
+ this.withPkce();
56
+ this.strategyName = strategyName || 'open-id-auth-design';
57
+ this.jwksRoute = jwksRoute;
58
+ this.userInfoRoute = userInfoRoute;
59
+ if (openidConfiguration)
60
+ this.openidConfiguration = openidConfiguration;
61
+ }
62
+ getScopes() {
63
+ let scopes = {
64
+ openid: 'enable OpenID Connect'
65
+ };
66
+ if (this.scopes) {
67
+ if ('openid' in this.scopes) {
68
+ scopes = this.scopes;
69
+ }
70
+ else {
71
+ scopes = Object.assign(Object.assign({}, this.scopes), scopes);
72
+ }
73
+ }
74
+ return scopes;
75
+ }
76
+ integrateHook(t) {
77
+ var _a, _b;
78
+ super.integrateHook(t);
79
+ const docs = this.docs();
80
+ const challengeAlgo = docs.getChallengeAlgorithm();
81
+ const host = ((_a = t.postman) === null || _a === void 0 ? void 0 : _a.getHost()[0]) || '';
82
+ t.route({
83
+ path: '/.well-known/openid-configuration',
84
+ method: 'GET',
85
+ options: {
86
+ plugins: {
87
+ kaapi: {
88
+ docs: false
89
+ }
90
+ }
91
+ },
92
+ handler: () => {
93
+ var _a, _b, _c, _d;
94
+ const wellKnownOpenIDConfig = {
95
+ issuer: host,
96
+ authorization_endpoint: `${host}${this.authorizationRoute.path}`,
97
+ token_endpoint: `${host}${this.tokenRoute.path}`,
98
+ userinfo_endpoint: this.userInfoRoute ? `${host}${this.userInfoRoute.path}` : undefined,
99
+ jwks_uri: `${host}${this.jwksRoute.path}`,
100
+ claims_supported: [
101
+ 'aud',
102
+ 'exp',
103
+ 'iat',
104
+ 'iss',
105
+ 'sub'
106
+ ],
107
+ grant_types_supported: [
108
+ 'authorization_code'
109
+ ],
110
+ response_types_supported: [
111
+ 'code',
112
+ 'token',
113
+ 'code token',
114
+ 'code token id_token'
115
+ ],
116
+ scopes_supported: Object.keys(docs.getScopes()),
117
+ subject_types_supported: [
118
+ 'public'
119
+ ],
120
+ id_token_signing_alg_values_supported: [
121
+ 'RS256'
122
+ ],
123
+ code_challenge_methods_supported: challengeAlgo ? [
124
+ challengeAlgo
125
+ ] : [],
126
+ token_endpoint_auth_methods_supported: this.getTokenEndpointAuthMethods()
127
+ };
128
+ if ((_b = (_a = this.clientAuthMethods.client_secret_jwt) === null || _a === void 0 ? void 0 : _a.algorithms) === null || _b === void 0 ? void 0 : _b.length) {
129
+ wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported = wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported || [];
130
+ wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported = [
131
+ ...wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported,
132
+ ...this.clientAuthMethods.client_secret_jwt.algorithms
133
+ ];
134
+ }
135
+ if ((_d = (_c = this.clientAuthMethods.private_key_jwt) === null || _c === void 0 ? void 0 : _c.algorithms) === null || _d === void 0 ? void 0 : _d.length) {
136
+ wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported = wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported || [];
137
+ wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported = [
138
+ ...wellKnownOpenIDConfig.token_endpoint_auth_signing_alg_values_supported,
139
+ ...this.clientAuthMethods.private_key_jwt.algorithms
140
+ ];
141
+ }
142
+ return Object.assign(Object.assign({}, wellKnownOpenIDConfig), this.openidConfiguration);
143
+ }
144
+ });
145
+ t.route({
146
+ path: this.jwksRoute.path,
147
+ method: 'GET',
148
+ options: {
149
+ plugins: {
150
+ kaapi: {
151
+ docs: false
152
+ }
153
+ }
154
+ },
155
+ handler: (req, h) => tslib_1.__awaiter(this, void 0, void 0, function* () {
156
+ const jwks = yield this.jwksGenerator.generateIfEmpty();
157
+ if (this.jwksRoute.handler) {
158
+ return this.jwksRoute.handler({
159
+ jwks
160
+ }, req, h);
161
+ }
162
+ return jwks;
163
+ })
164
+ });
165
+ if ((_b = this.userInfoRoute) === null || _b === void 0 ? void 0 : _b.path) {
166
+ t.route({
167
+ path: this.userInfoRoute.path,
168
+ method: 'GET',
169
+ auth: true,
170
+ options: {
171
+ auth: {
172
+ strategy: this.strategyName,
173
+ mode: 'required'
174
+ }
175
+ },
176
+ handler: this.userInfoRoute.handler.bind(this.userInfoRoute)
177
+ });
178
+ }
179
+ }
180
+ docs() {
181
+ var _a;
182
+ const docs = new OpenIDAuthUtil(this.strategyName)
183
+ .setGrantType(this.isWithPkce() ? api_doc_generator_1.GrantType.authorizationCodeWithPkce : api_doc_generator_1.GrantType.authorizationCode)
184
+ .setScopes(this.getScopes())
185
+ .setAuthUrl(this.authorizationRoute.path)
186
+ .setAccessTokenUrl(this.tokenRoute.path || '')
187
+ .setChallengeAlgorithm(api_doc_generator_1.ChallengeAlgorithm.S256);
188
+ if ((_a = this.refreshTokenRoute) === null || _a === void 0 ? void 0 : _a.path) {
189
+ docs.setRefreshUrl(this.refreshTokenRoute.path);
190
+ }
191
+ if (this.description) {
192
+ docs.setDescription(this.description);
193
+ }
194
+ return docs;
195
+ }
196
+ }
197
+ exports.OpenIDAuthDesign = OpenIDAuthDesign;
198
+ //#endregion OpenIDAuthDesign
199
+ //# sourceMappingURL=open-id.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"open-id.js","sourceRoot":"","sources":["../../../src/flows/auth-code/open-id.ts"],"names":[],"mappings":";;;;AACA,kEAAuF;AACvF,gEAA6F;AAI7F,wBAAwB;AAExB,MAAa,cAAe,SAAQ,8BAAU;IAE1C,OAAO,CAAC,IAAY;QAChB,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,CAAA;QACnB,OAAO,IAAI,CAAA;IACf,CAAC;IAED,SAAS;QACL,MAAM,IAAI,GAAG,IAAI,CAAC,OAAO,EAAE,CAAA;QAC3B,OAAO;YACH,CAAC,IAAI,CAAC,kBAAkB,CAAC,EAAE;gBACvB,IAAI,EAAE,eAAe;gBACrB,gBAAgB,EAAE,GAAG,IAAI,IAAI,EAAE,mCAAmC;aACrE;SACJ,CAAA;IACL,CAAC;CACJ;AAhBD,wCAgBC;AAuBD,MAAa,eAAe;IAMxB,IAAI,IAAI;QACJ,OAAO,IAAI,CAAC,KAAK,CAAA;IACrB,CAAC;IAED,IAAI,OAAO;QACP,OAAO,IAAI,CAAC,QAAQ,CAAA;IACxB,CAAC;IAED,YACI,IAAY,EACZ,OAAiC;QAEjC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;QAClB,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAC;IAC5B,CAAC;CACJ;AArBD,0CAqBC;AAmBD,MAAa,mBAAmB;IAM5B,IAAI,IAAI;QACJ,OAAO,IAAI,CAAC,KAAK,CAAA;IACrB,CAAC;IAED,IAAI,OAAO;QACP,OAAO,IAAI,CAAC,QAAQ,CAAA;IACxB,CAAC;IAED,YACI,IAAY,EACZ,OAAoC;QAEpC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;QAClB,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAC;IAC5B,CAAC;CACJ;AArBD,kDAqBC;AAmBD,MAAa,gBAAiB,SAAQ,6CAAuB;IASzD,YACI,MAA2B;QAE3B,MAAM,EAAE,YAAY,EAAE,mBAAmB,EAAE,SAAS,EAAE,aAAa,KAAe,MAAM,EAAhB,KAAK,kBAAK,MAAM,EAAlF,qEAAyE,CAAS,CAAA;QAExF,KAAK,CAAC,KAAK,CAAC,CAAA;QAPN,wBAAmB,GAA4B,EAAE,CAAA;QASvD,IAAI,CAAC,QAAQ,EAAE,CAAA;QACf,IAAI,CAAC,YAAY,GAAG,YAAY,IAAI,qBAAqB,CAAA;QACzD,IAAI,CAAC,SAAS,GAAG,SAAS,CAAA;QAC1B,IAAI,CAAC,aAAa,GAAG,aAAa,CAAA;QAElC,IAAI,mBAAmB;YACnB,IAAI,CAAC,mBAAmB,GAAG,mBAAmB,CAAA;IACtD,CAAC;IAED,SAAS;QACL,IAAI,MAAM,GAA2B;YACjC,MAAM,EAAE,uBAAuB;SAClC,CAAA;QACD,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;YACd,IAAI,QAAQ,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;gBAC1B,MAAM,GAAG,IAAI,CAAC,MAAM,CAAA;YACxB,CAAC;iBAAM,CAAC;gBACJ,MAAM,mCAAQ,IAAI,CAAC,MAAM,GAAK,MAAM,CAAE,CAAA;YAC1C,CAAC;QACL,CAAC;QACD,OAAO,MAAM,CAAA;IACjB,CAAC;IAED,aAAa,CAAC,CAAa;;QACvB,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,CAAA;QAEtB,MAAM,IAAI,GAAG,IAAI,CAAC,IAAI,EAAE,CAAA;QACxB,MAAM,aAAa,GAAG,IAAI,CAAC,qBAAqB,EAAE,CAAA;QAClD,MAAM,IAAI,GAAG,CAAA,MAAA,CAAC,CAAC,OAAO,0CAAE,OAAO,GAAG,CAAC,CAAC,KAAI,EAAE,CAAA;QAE1C,CAAC,CAAC,KAAK,CAAC;YACJ,IAAI,EAAE,mCAAmC;YACzC,MAAM,EAAE,KAAK;YACb,OAAO,EAAE;gBACL,OAAO,EAAE;oBACL,KAAK,EAAE;wBACH,IAAI,EAAE,KAAK;qBACd;iBACJ;aACJ;YACD,OAAO,EAAE,GAAG,EAAE;;gBACV,MAAM,qBAAqB,GAAkD;oBACzE,MAAM,EAAE,IAAI;oBACZ,sBAAsB,EAAE,GAAG,IAAI,GAAG,IAAI,CAAC,kBAAkB,CAAC,IAAI,EAAE;oBAChE,cAAc,EAAE,GAAG,IAAI,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE;oBAChD,iBAAiB,EAAE,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,GAAG,IAAI,GAAG,IAAI,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,SAAS;oBACvF,QAAQ,EAAE,GAAG,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC,IAAI,EAAE;oBACzC,gBAAgB,EAAE;wBACd,KAAK;wBACL,KAAK;wBACL,KAAK;wBACL,KAAK;wBACL,KAAK;qBACR;oBACD,qBAAqB,EAAE;wBACnB,oBAAoB;qBACvB;oBACD,wBAAwB,EAAE;wBACtB,MAAM;wBACN,OAAO;wBACP,YAAY;wBACZ,qBAAqB;qBACxB;oBACD,gBAAgB,EAAE,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;oBAC/C,uBAAuB,EAAE;wBACrB,QAAQ;qBACX;oBACD,qCAAqC,EAAE;wBACnC,OAAO;qBACV;oBACD,gCAAgC,EAAE,aAAa,CAAC,CAAC,CAAC;wBAC9C,aAAa;qBAChB,CAAC,CAAC,CAAC,EAAE;oBACN,qCAAqC,EAAE,IAAI,CAAC,2BAA2B,EAAE;iBAC5E,CAAA;gBAED,IAAI,MAAA,MAAA,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,0CAAE,UAAU,0CAAE,MAAM,EAAE,CAAC;oBAC/D,qBAAqB,CAAC,gDAAgD,GAAG,qBAAqB,CAAC,gDAAgD,IAAI,EAAE,CAAA;oBACrJ,qBAAqB,CAAC,gDAAgD,GAAG;wBACrE,GAAG,qBAAqB,CAAC,gDAAgD;wBACzE,GAAG,IAAI,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,UAAU;qBACzD,CAAA;gBACL,CAAC;gBACD,IAAI,MAAA,MAAA,IAAI,CAAC,iBAAiB,CAAC,eAAe,0CAAE,UAAU,0CAAE,MAAM,EAAE,CAAC;oBAC7D,qBAAqB,CAAC,gDAAgD,GAAG,qBAAqB,CAAC,gDAAgD,IAAI,EAAE,CAAA;oBACrJ,qBAAqB,CAAC,gDAAgD,GAAG;wBACrE,GAAG,qBAAqB,CAAC,gDAAgD;wBACzE,GAAG,IAAI,CAAC,iBAAiB,CAAC,eAAe,CAAC,UAAU;qBACvD,CAAA;gBACL,CAAC;gBAED,uCAAY,qBAAqB,GAAK,IAAI,CAAC,mBAAmB,EAAE;YACpE,CAAC;SACJ,CAAC,CAAA;QAEF,CAAC,CAAC,KAAK,CAAC;YACJ,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC,IAAI;YACzB,MAAM,EAAE,KAAK;YACb,OAAO,EAAE;gBACL,OAAO,EAAE;oBACL,KAAK,EAAE;wBACH,IAAI,EAAE,KAAK;qBACd;iBACJ;aACJ;YACD,OAAO,EAAE,CAAO,GAAG,EAAE,CAAC,EAAE,EAAE;gBAEtB,MAAM,IAAI,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,eAAe,EAAU,CAAA;gBAE/D,IAAI,IAAI,CAAC,SAAS,CAAC,OAAO,EAAE,CAAC;oBACzB,OAAO,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC;wBAC1B,IAAI;qBACP,EAAE,GAAG,EAAE,CAAC,CAAC,CAAA;gBACd,CAAC;gBAED,OAAO,IAAI,CAAA;YACf,CAAC,CAAA;SACJ,CAAC,CAAA;QAEF,IAAI,MAAA,IAAI,CAAC,aAAa,0CAAE,IAAI,EAAE,CAAC;YAC3B,CAAC,CAAC,KAAK,CAAC;gBACJ,IAAI,EAAE,IAAI,CAAC,aAAa,CAAC,IAAI;gBAC7B,MAAM,EAAE,KAAK;gBACb,IAAI,EAAE,IAAI;gBACV,OAAO,EAAE;oBACL,IAAI,EAAE;wBACF,QAAQ,EAAE,IAAI,CAAC,YAAY;wBAC3B,IAAI,EAAE,UAAU;qBACnB;iBACJ;gBACD,OAAO,EAAE,IAAI,CAAC,aAAa,CAAC,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC;aAC/D,CAAC,CAAA;QACN,CAAC;IACL,CAAC;IAED,IAAI;;QACA,MAAM,IAAI,GAAG,IAAI,cAAc,CAAC,IAAI,CAAC,YAAY,CAAC;aAC7C,YAAY,CAAC,IAAI,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC,6BAAS,CAAC,yBAAyB,CAAC,CAAC,CAAC,6BAAS,CAAC,iBAAiB,CAAC;aACnG,SAAS,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC;aAC3B,UAAU,CAAC,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC;aACxC,iBAAiB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,IAAI,EAAE,CAAC;aAC7C,qBAAqB,CAAC,sCAAkB,CAAC,IAAI,CAAC,CAAC;QAEpD,IAAI,MAAA,IAAI,CAAC,iBAAiB,0CAAE,IAAI,EAAE,CAAC;YAC/B,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAA;QACnD,CAAC;QAED,IAAI,IAAI,CAAC,WAAW,EAAE,CAAC;YACnB,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,WAAW,CAAC,CAAA;QACzC,CAAC;QAED,OAAO,IAAI,CAAA;IACf,CAAC;CACJ;AAzKD,4CAyKC;AAED,6BAA6B"}
@@ -0,0 +1,35 @@
1
+ import { Lifecycle, ReqRef, ReqRefDefaults, Request, ResponseToolkit } from '@kaapi/kaapi';
2
+ import { IOAuth2TokenResponse, OAuth2TokenResponseBody, OAuth2ErrorBody, OpenIDHelpers, PathValue } from '../common';
3
+ export interface OAuth2ACTokenParams extends Partial<OpenIDHelpers> {
4
+ grantType: string;
5
+ code: string;
6
+ clientId: string;
7
+ clientSecret?: string;
8
+ codeVerifier?: string;
9
+ redirectUri?: string;
10
+ readonly ttl?: number;
11
+ }
12
+ export type OAuth2ACTokenHandler<Refs extends ReqRef = ReqRefDefaults, R extends Lifecycle.ReturnValue<any> = Lifecycle.ReturnValue<Refs>> = (params: OAuth2ACTokenParams, request: Request<Refs>, h: ResponseToolkit<Refs>) => R;
13
+ export interface IOAuth2ACTokenRoute<Refs extends ReqRef = ReqRefDefaults> {
14
+ path: string;
15
+ handler: OAuth2ACTokenHandler<Refs>;
16
+ }
17
+ export declare class OAuth2ACTokenRoute<Refs extends ReqRef = ReqRefDefaults> implements IOAuth2ACTokenRoute<Refs> {
18
+ static buildDefault<Refs extends ReqRef = ReqRefDefaults>(): DefaultOAuth2ACTokenRoute<Refs>;
19
+ protected _path: string;
20
+ protected _handler: OAuth2ACTokenHandler<Refs>;
21
+ get path(): string;
22
+ get handler(): OAuth2ACTokenHandler<Refs, Lifecycle.ReturnValue<Refs>>;
23
+ constructor(path: string, handler: OAuth2ACTokenHandler<Refs>);
24
+ }
25
+ /**
26
+ * Return null for invalid request
27
+ */
28
+ export type AuthCodeTokenGenerator<Refs extends ReqRef = ReqRefDefaults> = (params: OAuth2ACTokenParams, req: Request<Refs>) => Promise<OAuth2TokenResponseBody | IOAuth2TokenResponse | OAuth2ErrorBody | null> | OAuth2TokenResponseBody | IOAuth2TokenResponse | OAuth2ErrorBody | null;
29
+ export declare class DefaultOAuth2ACTokenRoute<Refs extends ReqRef = ReqRefDefaults> extends OAuth2ACTokenRoute<Refs> {
30
+ #private;
31
+ constructor();
32
+ setPath(path: PathValue): this;
33
+ validate(handler: OAuth2ACTokenHandler<Refs>): this;
34
+ generateToken(handler: AuthCodeTokenGenerator<Refs>): this;
35
+ }
@@ -0,0 +1,61 @@
1
+ "use strict";
2
+ var _DefaultOAuth2ACTokenRoute_generateToken;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.DefaultOAuth2ACTokenRoute = exports.OAuth2ACTokenRoute = void 0;
5
+ const tslib_1 = require("tslib");
6
+ class OAuth2ACTokenRoute {
7
+ static buildDefault() {
8
+ return new DefaultOAuth2ACTokenRoute();
9
+ }
10
+ get path() {
11
+ return this._path;
12
+ }
13
+ get handler() {
14
+ return this._handler;
15
+ }
16
+ constructor(path, handler) {
17
+ this._path = path;
18
+ this._handler = handler;
19
+ }
20
+ }
21
+ exports.OAuth2ACTokenRoute = OAuth2ACTokenRoute;
22
+ class DefaultOAuth2ACTokenRoute extends OAuth2ACTokenRoute {
23
+ constructor() {
24
+ super('/oauth2/token', (props, req, h) => tslib_1.__awaiter(this, void 0, void 0, function* () {
25
+ if (!props.clientSecret && !props.codeVerifier) {
26
+ return h.response({ error: 'invalid_request', error_description: 'Token request was missing \'client_secret\' or \'code_verifier\'.' }).code(400);
27
+ }
28
+ let r = null;
29
+ try {
30
+ r = yield tslib_1.__classPrivateFieldGet(this, _DefaultOAuth2ACTokenRoute_generateToken, "f").call(this, props, req);
31
+ }
32
+ catch (err) {
33
+ return h.response({ error: 'invalid_request', error_description: `${err}` }).code(400);
34
+ }
35
+ if (!r)
36
+ return h.response({ error: 'invalid_request' }).code(400);
37
+ if ('error' in r)
38
+ return h.response(r).code(400);
39
+ return h.response(r).code(200);
40
+ }));
41
+ _DefaultOAuth2ACTokenRoute_generateToken.set(this, void 0);
42
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACTokenRoute_generateToken, () => tslib_1.__awaiter(this, void 0, void 0, function* () { return ({ error: 'invalid_request' }); }), "f");
43
+ }
44
+ setPath(path) {
45
+ if (path)
46
+ this._path = path;
47
+ return this;
48
+ }
49
+ validate(handler) {
50
+ this._handler = handler;
51
+ return this;
52
+ }
53
+ generateToken(handler) {
54
+ tslib_1.__classPrivateFieldSet(this, _DefaultOAuth2ACTokenRoute_generateToken, handler, "f");
55
+ return this;
56
+ }
57
+ }
58
+ exports.DefaultOAuth2ACTokenRoute = DefaultOAuth2ACTokenRoute;
59
+ _DefaultOAuth2ACTokenRoute_generateToken = new WeakMap();
60
+ //#endregion Defaults
61
+ //# sourceMappingURL=token-route.js.map