@simulacrum/auth0-simulator 0.2.1 → 0.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +38 -0
- package/README.md +13 -9
- package/bin/index.js +2 -0
- package/dist/auth/date.js +1 -1
- package/dist/auth/date.js.map +1 -1
- package/dist/auth/jwt.d.ts +1 -1
- package/dist/auth/jwt.d.ts.map +1 -1
- package/dist/auth/jwt.js +5 -4
- package/dist/auth/jwt.js.map +1 -1
- package/dist/handlers/auth0-handlers.d.ts +1 -1
- package/dist/handlers/auth0-handlers.d.ts.map +1 -1
- package/dist/handlers/auth0-handlers.js +82 -31
- package/dist/handlers/auth0-handlers.js.map +1 -1
- package/dist/handlers/get-service-url.js +1 -1
- package/dist/handlers/get-service-url.js.map +1 -1
- package/dist/handlers/login-redirect.js +1 -1
- package/dist/handlers/login-redirect.js.map +1 -1
- package/dist/handlers/openid-handlers.js +2 -2
- package/dist/handlers/openid-handlers.js.map +1 -1
- package/dist/handlers/web-message.js +4 -4
- package/dist/handlers/web-message.js.map +1 -1
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +33 -28
- package/dist/index.js.map +1 -1
- package/dist/middleware/create-cors.js +1 -1
- package/dist/middleware/create-cors.js.map +1 -1
- package/dist/middleware/session.js +1 -1
- package/dist/middleware/session.js.map +1 -1
- package/dist/rules/parse-rules-files.js +2 -2
- package/dist/rules/parse-rules-files.js.map +1 -1
- package/dist/rules/rules-runner.js +3 -3
- package/dist/rules/rules-runner.js.map +1 -1
- package/dist/start.js +35 -3
- package/dist/start.js.map +1 -1
- package/dist/types.d.ts +21 -0
- package/dist/types.d.ts.map +1 -1
- package/dist/views/login.js +1 -1
- package/dist/views/username-password.js +1 -1
- package/dist/views/username-password.js.map +1 -1
- package/dist/views/web-message.js +1 -1
- package/dist/views/web-message.js.map +1 -1
- package/package.json +19 -13
- package/docs/create-simulation.png +0 -0
- package/docs/person.png +0 -0
- package/src/auth/constants.ts +0 -16
- package/src/auth/date.ts +0 -4
- package/src/auth/jwt.ts +0 -23
- package/src/handlers/auth0-handlers.ts +0 -219
- package/src/handlers/get-service-url.ts +0 -10
- package/src/handlers/login-redirect.ts +0 -37
- package/src/handlers/openid-handlers.ts +0 -39
- package/src/handlers/url.ts +0 -1
- package/src/handlers/web-message.ts +0 -31
- package/src/index.ts +0 -70
- package/src/middleware/create-cors.ts +0 -14
- package/src/middleware/no-cache.ts +0 -7
- package/src/middleware/session.ts +0 -14
- package/src/rules/extensionless-file-name.ts +0 -4
- package/src/rules/parse-rules-files.ts +0 -40
- package/src/rules/rules-runner.ts +0 -72
- package/src/rules/types.ts +0 -25
- package/src/start.ts +0 -19
- package/src/types.ts +0 -29
- package/src/views/login.ts +0 -107
- package/src/views/public/img/frontside-logo.png +0 -0
- package/src/views/username-password.ts +0 -54
- package/src/views/web-message.ts +0 -72
- package/test/auth0.test.ts +0 -351
- package/test/helpers.ts +0 -23
- package/test/openid-handlers.test.ts +0 -57
- package/test/rules/avatar.js +0 -13
- package/test/rules/avatar.json +0 -5
- package/tsconfig.dist.json +0 -12
- package/tsconfig.dist.tsbuildinfo +0 -2236
- package/tsconfig.json +0 -11
- package/tsconfig.watch.json +0 -9
- package/watch.ts +0 -59
|
@@ -5,7 +5,7 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
5
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
6
|
exports.createCors = void 0;
|
|
7
7
|
const cors_1 = __importDefault(require("cors"));
|
|
8
|
-
const createCors = () => cors_1.default({
|
|
8
|
+
const createCors = () => (0, cors_1.default)({
|
|
9
9
|
origin: (origin, cb) => {
|
|
10
10
|
if (typeof origin === "string") {
|
|
11
11
|
return cb(null, [origin]);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"create-cors.js","sourceRoot":"","sources":["../../src/middleware/create-cors.ts"],"names":[],"mappings":";;;;;;AACA,gDAAwB;AAEjB,MAAM,UAAU,GAAG,GAAmB,EAAE,CAC7C,cAAI,
|
|
1
|
+
{"version":3,"file":"create-cors.js","sourceRoot":"","sources":["../../src/middleware/create-cors.ts"],"names":[],"mappings":";;;;;;AACA,gDAAwB;AAEjB,MAAM,UAAU,GAAG,GAAmB,EAAE,CAC7C,IAAA,cAAI,EAAC;IACH,MAAM,EAAE,CAAC,MAAM,EAAE,EAAE,EAAE,EAAE;QACrB,IAAI,OAAO,MAAM,KAAK,QAAQ,EAAE;YAC9B,OAAO,EAAE,CAAC,IAAI,EAAE,CAAC,MAAM,CAAC,CAAC,CAAC;SAC3B;QAED,EAAE,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC;IAChB,CAAC;IACD,WAAW,EAAE,IAAI;CAClB,CAAC,CAAC;AAVQ,QAAA,UAAU,cAUlB"}
|
|
@@ -7,7 +7,7 @@ exports.createSession = void 0;
|
|
|
7
7
|
const cookie_session_1 = __importDefault(require("cookie-session"));
|
|
8
8
|
const twentyFourHours = 24 * 60 * 60 * 1000;
|
|
9
9
|
const createSession = () => {
|
|
10
|
-
return cookie_session_1.default({
|
|
10
|
+
return (0, cookie_session_1.default)({
|
|
11
11
|
name: "session",
|
|
12
12
|
keys: ["shhh"],
|
|
13
13
|
secure: true,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"session.js","sourceRoot":"","sources":["../../src/middleware/session.ts"],"names":[],"mappings":";;;;;;AACA,oEAA2C;AAC3C,MAAM,eAAe,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAErC,MAAM,aAAa,GAAG,GAAmB,EAAE;IAChD,OAAO,wBAAa,
|
|
1
|
+
{"version":3,"file":"session.js","sourceRoot":"","sources":["../../src/middleware/session.ts"],"names":[],"mappings":";;;;;;AACA,oEAA2C;AAC3C,MAAM,eAAe,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,CAAC;AAErC,MAAM,aAAa,GAAG,GAAmB,EAAE;IAChD,OAAO,IAAA,wBAAa,EAAC;QACnB,IAAI,EAAE,SAAS;QACf,IAAI,EAAE,CAAC,MAAM,CAAC;QACd,MAAM,EAAE,IAAI;QACZ,QAAQ,EAAE,KAAK;QACf,MAAM,EAAE,eAAe;QACvB,QAAQ,EAAE,MAAM;KAClB,CAAC,CAAC;AACJ,CAAC,CAAC;AATW,QAAA,aAAa,iBASxB"}
|
|
@@ -16,8 +16,8 @@ function parseRulesFiles(rulesPath) {
|
|
|
16
16
|
return (_a = ruleFiles
|
|
17
17
|
.map((r) => {
|
|
18
18
|
let filename = path_1.default.join(rulesPath, r);
|
|
19
|
-
let jsonFile = `${extensionless_file_name_1.extensionlessFileName(filename)}.json`;
|
|
20
|
-
assert_ts_1.assert(!!jsonFile, `no corresponding rule file for ${r}`);
|
|
19
|
+
let jsonFile = `${(0, extensionless_file_name_1.extensionlessFileName)(filename)}.json`;
|
|
20
|
+
(0, assert_ts_1.assert)(!!jsonFile, `no corresponding rule file for ${r}`);
|
|
21
21
|
let rawRule = fs_1.default.readFileSync(jsonFile, 'utf8');
|
|
22
22
|
let { enabled, order = 0, stage = "login_success", } = JSON.parse(rawRule);
|
|
23
23
|
if (!enabled) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"parse-rules-files.js","sourceRoot":"","sources":["../../src/rules/parse-rules-files.ts"],"names":[],"mappings":";;;;;;AAAA,uEAAkE;AAClE,yCAAmC;AACnC,4CAAoB;AACpB,gDAAwB;AAGxB,SAAgB,eAAe,CAAC,SAAiB;;IAC/C,IAAI,SAAS,GAAG,YAAE;SACjB,WAAW,CAAC,SAAS,CAAC;SACtB,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,cAAI,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,KAAK,CAAC,CAAC;IAE1C,OAAO,MAAA,SAAS;SACb,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACT,IAAI,QAAQ,GAAG,cAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC;QAEvC,IAAI,QAAQ,GAAG,GAAG,+CAAqB,
|
|
1
|
+
{"version":3,"file":"parse-rules-files.js","sourceRoot":"","sources":["../../src/rules/parse-rules-files.ts"],"names":[],"mappings":";;;;;;AAAA,uEAAkE;AAClE,yCAAmC;AACnC,4CAAoB;AACpB,gDAAwB;AAGxB,SAAgB,eAAe,CAAC,SAAiB;;IAC/C,IAAI,SAAS,GAAG,YAAE;SACjB,WAAW,CAAC,SAAS,CAAC;SACtB,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,cAAI,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,KAAK,CAAC,CAAC;IAE1C,OAAO,MAAA,SAAS;SACb,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;QACT,IAAI,QAAQ,GAAG,cAAI,CAAC,IAAI,CAAC,SAAS,EAAE,CAAC,CAAC,CAAC;QAEvC,IAAI,QAAQ,GAAG,GAAG,IAAA,+CAAqB,EAAC,QAAQ,CAAC,OAAO,CAAC;QAEzD,IAAA,kBAAM,EAAC,CAAC,CAAC,QAAQ,EAAE,kCAAkC,CAAC,EAAE,CAAC,CAAC;QAE1D,IAAI,OAAO,GAAG,YAAE,CAAC,YAAY,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;QAEhD,IAAI,EACF,OAAO,EACP,KAAK,GAAG,CAAC,EACT,KAAK,GAAG,eAAe,GACxB,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QAExB,IAAI,CAAC,OAAO,EAAE;YACZ,OAAO,SAAS,CAAC;SAClB;QAED,IAAI,IAAI,GAAG,YAAE,CAAC,YAAY,CAAC,QAAQ,EAAE;YACnC,QAAQ,EAAE,OAAO;SAClB,CAAC,CAAC;QAEH,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC;IAC1C,CAAC,CAAC;SACD,OAAO,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;SAC1B,IAAI,CAAC,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,mCAAI,EAAE,CAAC;AAC3D,CAAC;AAjCD,0CAiCC"}
|
|
@@ -16,8 +16,8 @@ function createRulesRunner(rulesPath) {
|
|
|
16
16
|
return callback;
|
|
17
17
|
}
|
|
18
18
|
let fullPath = path_1.default.join(process.cwd(), rulesPath);
|
|
19
|
-
assert_ts_1.assert(fs_1.default.existsSync(fullPath), `no rules directory at ${fullPath}`);
|
|
20
|
-
let rules = parse_rules_files_1.parseRulesFiles(rulesPath);
|
|
19
|
+
(0, assert_ts_1.assert)(fs_1.default.existsSync(fullPath), `no rules directory at ${fullPath}`);
|
|
20
|
+
let rules = (0, parse_rules_files_1.parseRulesFiles)(rulesPath);
|
|
21
21
|
if (rules.length === 0) {
|
|
22
22
|
return callback;
|
|
23
23
|
}
|
|
@@ -44,7 +44,7 @@ function createRulesRunner(rulesPath) {
|
|
|
44
44
|
},
|
|
45
45
|
});
|
|
46
46
|
for (let rule of rules) {
|
|
47
|
-
assert_ts_1.assert(typeof rule !== "undefined", "undefined rule");
|
|
47
|
+
(0, assert_ts_1.assert)(typeof rule !== "undefined", "undefined rule");
|
|
48
48
|
let { code, filename } = rule;
|
|
49
49
|
console.debug(`executing rule ${path_1.default.basename(filename)}`);
|
|
50
50
|
let script = new vm_1.default.Script(`(function(exports) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"rules-runner.js","sourceRoot":"","sources":["../../src/rules/rules-runner.ts"],"names":[],"mappings":";;;;;;AAAA,gDAAwB;AACxB,4CAAoB;AACpB,4CAAoB;AACpB,yCAAmC;AACnC,2DAAsD;AAKtD,SAAgB,iBAAiB,CAAE,SAAkB;IACnD,6DAA6D;IAC7D,IAAI,QAAQ,GAAG,CAAC,KAAe,EAAE,QAAuC,EAAE,EAAE,GAAE,CAAC,CAAC;IAEhF,IAAG,OAAO,SAAS,KAAK,WAAW,EAAE;QACnC,OAAO,QAAQ,CAAC;KACjB;IAED,IAAI,QAAQ,GAAG,cAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,SAAS,CAAC,CAAC;IAEnD,kBAAM,
|
|
1
|
+
{"version":3,"file":"rules-runner.js","sourceRoot":"","sources":["../../src/rules/rules-runner.ts"],"names":[],"mappings":";;;;;;AAAA,gDAAwB;AACxB,4CAAoB;AACpB,4CAAoB;AACpB,yCAAmC;AACnC,2DAAsD;AAKtD,SAAgB,iBAAiB,CAAE,SAAkB;IACnD,6DAA6D;IAC7D,IAAI,QAAQ,GAAG,CAAC,KAAe,EAAE,QAAuC,EAAE,EAAE,GAAE,CAAC,CAAC;IAEhF,IAAG,OAAO,SAAS,KAAK,WAAW,EAAE;QACnC,OAAO,QAAQ,CAAC;KACjB;IAED,IAAI,QAAQ,GAAG,cAAI,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,EAAE,SAAS,CAAC,CAAC;IAEnD,IAAA,kBAAM,EAAC,YAAE,CAAC,UAAU,CAAC,QAAQ,CAAC,EAAE,yBAAyB,QAAQ,EAAE,CAAC,CAAC;IAErE,IAAI,KAAK,GAAG,IAAA,mCAAe,EAAC,SAAS,CAAC,CAAC;IAEvC,IAAG,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE;QACrB,OAAO,QAAQ,CAAC;KACjB;IAED,OAAO,CAAO,IAAc,EAAE,OAA0B,EAAE,EAAE;QAC1D,OAAO,CAAC,KAAK,CAAC,YAAY,KAAK,CAAC,MAAM,QAAQ,CAAC,CAAC;QAEhD,IAAI,SAAS,GAAG,YAAE,CAAC,aAAa,CAAC;YAC/B,OAAO;YACP,MAAM;YACN,cAAc;YACd,aAAa;YACb,YAAY;YACZ,YAAY;YACZ,WAAW;YACX,UAAU;YACV,OAAO;YACP,OAAO;YACP,MAAM;YACN,WAAW,EAAE;gBACX,GAAG;oBACD,IAAI;oBACJ,OAAO,EAAE,EAAE,GAAG,OAAO,GAAG;oBACxB,QAAQ;iBACT;aACF;SACF,CAAC,CAAC;QAEH,KAAK,IAAI,IAAI,IAAI,KAAK,EAAE;YACtB,IAAA,kBAAM,EAAC,OAAO,IAAI,KAAK,WAAW,EAAE,gBAAgB,CAAC,CAAC;YAEtD,IAAI,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,IAAI,CAAC;YAE9B,OAAO,CAAC,KAAK,CAAC,kBAAkB,cAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;YAE3D,IAAI,MAAM,GAAG,IAAI,YAAE,CAAC,MAAM,CACxB;eACO,IAAI;;;SAGV,CACF,CAAC;YAEF,MAAM,CAAC,YAAY,CAAC,SAAS,EAAE;gBAC7B,QAAQ;aACT,CAAC,CAAC;SACJ;IACH,CAAC,CAAC;AACJ,CAAC;AA9DD,8CA8DC"}
|
package/dist/start.js
CHANGED
|
@@ -1,17 +1,49 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
2
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
6
|
const effection_1 = require("effection");
|
|
4
7
|
const server_1 = require("@simulacrum/server");
|
|
5
8
|
const _1 = require(".");
|
|
9
|
+
const dedent_1 = __importDefault(require("dedent"));
|
|
6
10
|
const port = process.env.PORT ? parseInt(process.env.PORT) : undefined;
|
|
7
|
-
effection_1.main(function* () {
|
|
8
|
-
let server = yield server_1.createSimulationServer({
|
|
11
|
+
(0, effection_1.main)(function* () {
|
|
12
|
+
let server = yield (0, server_1.createSimulationServer)({
|
|
13
|
+
debug: true,
|
|
9
14
|
seed: 1,
|
|
10
15
|
port,
|
|
11
16
|
simulators: { auth0: _1.auth0 }
|
|
12
17
|
});
|
|
13
18
|
let url = `http://localhost:${server.address.port}`;
|
|
14
|
-
console.log(`simulation server
|
|
19
|
+
console.log((0, dedent_1.default) `Started Simulacrum simulation server on ${url}.
|
|
20
|
+
GraphiQL interface is running on ${url}/graphql.
|
|
21
|
+
|
|
22
|
+
To start auth0 simulator send the following mutation to GraphQL server.
|
|
23
|
+
|
|
24
|
+
mutation CreateSimulation {
|
|
25
|
+
createSimulation(simulator: "auth0",
|
|
26
|
+
options: {
|
|
27
|
+
options:{
|
|
28
|
+
audience: "[your audience]",
|
|
29
|
+
scope: "[your scope]",
|
|
30
|
+
clientId: "[your client-id]"
|
|
31
|
+
},
|
|
32
|
+
services:{
|
|
33
|
+
auth0:{
|
|
34
|
+
port: 4400
|
|
35
|
+
}
|
|
36
|
+
}
|
|
37
|
+
}) {
|
|
38
|
+
id
|
|
39
|
+
status
|
|
40
|
+
services {
|
|
41
|
+
url
|
|
42
|
+
name
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
}
|
|
46
|
+
`);
|
|
15
47
|
yield;
|
|
16
48
|
});
|
|
17
49
|
//# sourceMappingURL=start.js.map
|
package/dist/start.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"start.js","sourceRoot":"","sources":["../src/start.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"start.js","sourceRoot":"","sources":["../src/start.ts"],"names":[],"mappings":";;;;;AAAA,yCAAiC;AACjC,+CAAoE;AACpE,wBAA0B;AAC1B,oDAA4B;AAE5B,MAAM,IAAI,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;AAEvE,IAAA,gBAAI,EAAC,QAAQ,CAAC;IACZ,IAAI,MAAM,GAAW,MAAM,IAAA,+BAAsB,EAAC;QAChD,KAAK,EAAE,IAAI;QACX,IAAI,EAAE,CAAC;QACP,IAAI;QACJ,UAAU,EAAE,EAAE,KAAK,EAAL,QAAK,EAAE;KACtB,CAAC,CAAC;IAEH,IAAI,GAAG,GAAG,oBAAoB,MAAM,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;IAEpD,OAAO,CAAC,GAAG,CAAC,IAAA,gBAAM,EAAA,2CAA2C,GAAG;qCAC7B,GAAG;;;;;;;;;;;;;;;;;;;;;;;;;;EA0BtC,CAAC,CAAC;IAEF,KAAK,CAAC;AACR,CAAC,CAAC,CAAC"}
|
package/dist/types.d.ts
CHANGED
|
@@ -24,4 +24,25 @@ export declare type QueryParams = {
|
|
|
24
24
|
auth0Client: string;
|
|
25
25
|
audience: string;
|
|
26
26
|
};
|
|
27
|
+
export interface TokenSet {
|
|
28
|
+
access_token?: string;
|
|
29
|
+
token_type?: string;
|
|
30
|
+
id_token?: string;
|
|
31
|
+
refresh_token?: string;
|
|
32
|
+
scope?: string;
|
|
33
|
+
expires_at?: number;
|
|
34
|
+
session_state?: string;
|
|
35
|
+
[key: string]: unknown;
|
|
36
|
+
}
|
|
37
|
+
export interface IdTokenData {
|
|
38
|
+
alg: string;
|
|
39
|
+
typ: string;
|
|
40
|
+
iss: string;
|
|
41
|
+
exp: number;
|
|
42
|
+
iat: number;
|
|
43
|
+
email: string;
|
|
44
|
+
aud: string;
|
|
45
|
+
sub: string;
|
|
46
|
+
nonce?: string;
|
|
47
|
+
}
|
|
27
48
|
//# sourceMappingURL=types.d.ts.map
|
package/dist/types.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../src/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,KAAK,EAAE,MAAM,oBAAoB,CAAC;AACjE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,iBAAiB,CAAC;AAE7C,MAAM,WAAW,OAAO;IACtB,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,KAAK,CAAC;IACb,QAAQ,EAAE,KAAK,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC,CAAC;IAC7C,cAAc,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,oBAAY,aAAa,GAAG,OAAO,GAAG,aAAa,CAAC;AAEpD,oBAAY,WAAW,GAAG;IACxB,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,EAAE,MAAM,CAAC;IACb,YAAY,EAAE,MAAM,CAAC;IACrB,cAAc,EAAE,MAAM,CAAC;IACvB,KAAK,EAAE,MAAM,CAAC;IACd,SAAS,EAAE,MAAM,CAAC;IAClB,KAAK,EAAE,MAAM,CAAC;IACd,qBAAqB,EAAE,MAAM,CAAC;IAC9B,aAAa,EAAE,MAAM,CAAC;IACtB,aAAa,EAAE,aAAa,CAAC;IAC7B,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;CAClB,CAAC"}
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../src/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,KAAK,EAAE,MAAM,oBAAoB,CAAC;AACjE,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,iBAAiB,CAAC;AAE7C,MAAM,WAAW,OAAO;IACtB,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,KAAK,CAAC;IACb,QAAQ,EAAE,KAAK,CAAC,eAAe,CAAC,UAAU,CAAC,CAAC,CAAC;IAC7C,cAAc,CAAC,EAAE,MAAM,CAAC;CACzB;AAED,oBAAY,aAAa,GAAG,OAAO,GAAG,aAAa,CAAC;AAEpD,oBAAY,WAAW,GAAG;IACxB,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,EAAE,MAAM,CAAC;IACb,YAAY,EAAE,MAAM,CAAC;IACrB,cAAc,EAAE,MAAM,CAAC;IACvB,KAAK,EAAE,MAAM,CAAC;IACd,SAAS,EAAE,MAAM,CAAC;IAClB,KAAK,EAAE,MAAM,CAAC;IACd,qBAAqB,EAAE,MAAM,CAAC;IAC9B,aAAa,EAAE,MAAM,CAAC;IACtB,aAAa,EAAE,aAAa,CAAC;IAC7B,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;CAClB,CAAC;AAEF,MAAM,WAAW,QAAQ;IACvB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,KAAK,CAAC,EAAE,MAAM,CAAC;IAEf,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,aAAa,CAAC,EAAE,MAAM,CAAC;IAEvB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;CACxB;AAED,MAAM,WAAW,WAAW;IAC1B,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,KAAK,EAAE,MAAM,CAAC;IACd,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB"}
|
package/dist/views/login.js
CHANGED
|
@@ -22,7 +22,7 @@ const loginView = ({ domain, scope, redirectUri, clientId, audience, loginFailed
|
|
|
22
22
|
<img alt="frontside" class="bg-transparent object-contain h-16" src="/img/frontside-logo.png" />
|
|
23
23
|
</div>
|
|
24
24
|
<h1 class="flex justify-center text-4xl">Welcome</h1>
|
|
25
|
-
<h2 class="flex justify-center">
|
|
25
|
+
<h2 class="flex justify-center">Login to continue to frontside</h2>
|
|
26
26
|
<form id="the-form" class="mt-8 space-y-6">
|
|
27
27
|
<div class="rounded-md shadow-sm -space-y-px">
|
|
28
28
|
<div>
|
|
@@ -3,7 +3,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
3
3
|
exports.userNamePasswordForm = void 0;
|
|
4
4
|
const html_entities_1 = require("html-entities");
|
|
5
5
|
const userNamePasswordForm = ({ auth0Domain = "/login/callback", redirect_uri, state, nonce, client_id, scope, audience, connection, response_type, tenant, }) => {
|
|
6
|
-
let wctx = html_entities_1.encode(JSON.stringify({
|
|
6
|
+
let wctx = (0, html_entities_1.encode)(JSON.stringify({
|
|
7
7
|
strategy: "auth0",
|
|
8
8
|
tenant,
|
|
9
9
|
connection,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"username-password.js","sourceRoot":"","sources":["../../src/views/username-password.ts"],"names":[],"mappings":";;;AAAA,iDAAuC;AAWhC,MAAM,oBAAoB,GAAG,CAAC,EACnC,WAAW,GAAG,iBAAiB,EAC/B,YAAY,EACZ,KAAK,EACL,KAAK,EACL,SAAS,EACT,KAAK,EACL,QAAQ,EACR,UAAU,EACV,aAAa,EACb,MAAM,GACe,EAAU,EAAE;IACjC,IAAI,IAAI,GAAG,sBAAM,
|
|
1
|
+
{"version":3,"file":"username-password.js","sourceRoot":"","sources":["../../src/views/username-password.ts"],"names":[],"mappings":";;;AAAA,iDAAuC;AAWhC,MAAM,oBAAoB,GAAG,CAAC,EACnC,WAAW,GAAG,iBAAiB,EAC/B,YAAY,EACZ,KAAK,EACL,KAAK,EACL,SAAS,EACT,KAAK,EACL,QAAQ,EACR,UAAU,EACV,aAAa,EACb,MAAM,GACe,EAAU,EAAE;IACjC,IAAI,IAAI,GAAG,IAAA,sBAAM,EACf,IAAI,CAAC,SAAS,CAAC;QACb,QAAQ,EAAE,OAAO;QACjB,MAAM;QACN,UAAU;QACV,SAAS;QACT,aAAa;QACb,KAAK;QACL,YAAY;QACZ,KAAK;QACL,KAAK;QACL,QAAQ;QACR,KAAK,EAAE,UAAU;KAClB,CAAC,CACH,CAAC;IAEF,OAAO;kDACyC,WAAW;;;;;8CAKf,IAAI;;;;;;;UAOxC,CAAC;AACX,CAAC,CAAC;AA1CW,QAAA,oBAAoB,wBA0C/B"}
|
|
@@ -6,7 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
6
6
|
exports.webMessage = void 0;
|
|
7
7
|
const jsesc_1 = __importDefault(require("jsesc"));
|
|
8
8
|
const webMessage = ({ state, code, redirect_uri, nonce, }) => {
|
|
9
|
-
let data = jsesc_1.default({
|
|
9
|
+
let data = (0, jsesc_1.default)({
|
|
10
10
|
redirect_uri,
|
|
11
11
|
}, { json: true, isScriptContext: true });
|
|
12
12
|
return `
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"web-message.js","sourceRoot":"","sources":["../../src/views/web-message.ts"],"names":[],"mappings":";;;;;;AAAA,kDAA0B;AAGnB,MAAM,UAAU,GAAG,CAAC,EACzB,KAAK,EACL,IAAI,EACJ,YAAY,EACZ,KAAK,GAIN,EAAU,EAAE;IACX,IAAI,IAAI,GAAG,eAAK,
|
|
1
|
+
{"version":3,"file":"web-message.js","sourceRoot":"","sources":["../../src/views/web-message.ts"],"names":[],"mappings":";;;;;;AAAA,kDAA0B;AAGnB,MAAM,UAAU,GAAG,CAAC,EACzB,KAAK,EACL,IAAI,EACJ,YAAY,EACZ,KAAK,GAIN,EAAU,EAAE;IACX,IAAI,IAAI,GAAG,IAAA,eAAK,EACd;QACE,YAAY;KACb,EACD,EAAE,IAAI,EAAE,IAAI,EAAE,eAAe,EAAE,IAAI,EAAE,CACtC,CAAC;IAEF,OAAO;;;;;;;gBAOO,KAAK,CAAC,CAAC,CAAC,UAAU,KAAK,GAAG,CAAC,CAAC,CAAC,EAAE;;uBAExB,IAAI;;;;;;;wBAOH,IAAI;yBACH,KAAK;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkC3B,CAAC;AACJ,CAAC,CAAC;AApEW,QAAA,UAAU,cAoErB"}
|
package/package.json
CHANGED
|
@@ -1,14 +1,15 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@simulacrum/auth0-simulator",
|
|
3
|
-
"version": "0.
|
|
3
|
+
"version": "0.4.0",
|
|
4
4
|
"description": "Simulate Auth0",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
|
+
"bin": "bin/index.js",
|
|
6
7
|
"scripts": {
|
|
7
8
|
"clean": "rimraf *.tsbuildinfo dist",
|
|
8
9
|
"test": "NODE_EXTRA_CA_CERTS=\"$(mkcert -CAROOT)/rootCA.pem\" mocha -r ts-node/register --timeout 10000 test/**/*.test.ts",
|
|
9
|
-
"prepack": "tsc --build tsconfig.dist.json && copy \"./src/views/**/*.png\" ./dist/views/",
|
|
10
|
+
"prepack": "tsc --build tsconfig.dist.json && copy-cli \"./src/views/**/*.png\" ./dist/views/",
|
|
10
11
|
"build": "npm run prepack",
|
|
11
|
-
"lint": "eslint src test",
|
|
12
|
+
"lint": "eslint src bin test",
|
|
12
13
|
"start": "node dist/start.js",
|
|
13
14
|
"watch": "ts-node -P ./tsconfig.watch.json ./watch.ts"
|
|
14
15
|
},
|
|
@@ -16,6 +17,10 @@
|
|
|
16
17
|
"type": "git",
|
|
17
18
|
"url": "git+https://github.com/thefrontside/simulacrum.git"
|
|
18
19
|
},
|
|
20
|
+
"files": [
|
|
21
|
+
"bin/**/*",
|
|
22
|
+
"dist/**/*"
|
|
23
|
+
],
|
|
19
24
|
"keywords": [
|
|
20
25
|
"simulation",
|
|
21
26
|
"emulation",
|
|
@@ -29,26 +34,28 @@
|
|
|
29
34
|
},
|
|
30
35
|
"homepage": "https://github.com/thefrontside/simulacrum#readme",
|
|
31
36
|
"dependencies": {
|
|
32
|
-
"@effection/process": "^2.0.
|
|
33
|
-
"@simulacrum/server": "0.
|
|
37
|
+
"@effection/process": "^2.0.1",
|
|
38
|
+
"@simulacrum/server": "0.4.1",
|
|
34
39
|
"@types/faker": "^5.1.7",
|
|
35
40
|
"assert-ts": "^0.3.2",
|
|
36
41
|
"base64-url": "^2.3.3",
|
|
37
42
|
"cookie-session": "^1.4.0",
|
|
38
|
-
"
|
|
43
|
+
"dedent": "^0.7.0",
|
|
44
|
+
"effection": "^2.0.1",
|
|
39
45
|
"html-entities": "^2.3.2",
|
|
40
46
|
"jsesc": "^3.0.2",
|
|
41
47
|
"jsonwebtoken": "^8.5.1"
|
|
42
48
|
},
|
|
43
49
|
"devDependencies": {
|
|
44
|
-
"@effection/atom": "^2.0.
|
|
45
|
-
"@effection/mocha": "^2.0.
|
|
46
|
-
"@frontside/eslint-config": "^
|
|
47
|
-
"@frontside/tsconfig": "^
|
|
48
|
-
"@frontside/typescript": "^
|
|
49
|
-
"@simulacrum/client": "0.5.
|
|
50
|
+
"@effection/atom": "^2.0.1",
|
|
51
|
+
"@effection/mocha": "^2.0.1",
|
|
52
|
+
"@frontside/eslint-config": "^3.0.0",
|
|
53
|
+
"@frontside/tsconfig": "^3.0.0",
|
|
54
|
+
"@frontside/typescript": "^3.0.0",
|
|
55
|
+
"@simulacrum/client": "0.5.3",
|
|
50
56
|
"@types/base64-url": "^2.2.0",
|
|
51
57
|
"@types/cookie-session": "^2.0.42",
|
|
58
|
+
"@types/dedent": "^0.7.0",
|
|
52
59
|
"@types/jsesc": "^2.5.1",
|
|
53
60
|
"@types/jsonwebtoken": "^8.5.1",
|
|
54
61
|
"@types/mocha": "^8.2.1",
|
|
@@ -59,7 +66,6 @@
|
|
|
59
66
|
"mocha": "^8.0.0",
|
|
60
67
|
"rimraf": "^3.0.2",
|
|
61
68
|
"ts-node": "^9.1.1",
|
|
62
|
-
"typescript": "^4.2.3",
|
|
63
69
|
"ws": "^7.4.4"
|
|
64
70
|
},
|
|
65
71
|
"volta": {
|
|
Binary file
|
package/docs/person.png
DELETED
|
Binary file
|
package/src/auth/constants.ts
DELETED
|
@@ -1,16 +0,0 @@
|
|
|
1
|
-
export const PRIVATE_KEY =
|
|
2
|
-
"-----BEGIN RSA PRIVATE KEY-----~~MIIEpAIBAAKCAQEAwzwwEqR5p7a6CaG61i3od+GLTyype3t/f0pwwtoA9NsZANcj~~HaAUR/qzqlNRQlLI687vF1OfbETYLeHIT5V36QGrMfrYR/tYAoaKFixC/wOjt8EB~~PoeHgaTOAyGf3V3YNwocNU+StyV1X4hPmDjCrapNYpbKIcAJwq5Ij0WBKGNXBcUU~~bAceRtLqgzf/6x2vcQJeE5nJK5gd41f/jtlK9Xge0Ig6CcdKOI7U3agyI/iNF3SL~~0bnCfvtDRIkgAzzeN5Yj4S3Z4rJVQ1RgzZmqBmnjw8h06G8wDyaQPf19u4F///gF~~+dL1md/fVRKL5UL7OZg42hIZzwzdhrxOGcXUFQIDAQABAoIBAQCSwHUqLjO722Av~~yT/VqqBpLEI4+0tSJFyL4/qqnI/HfcFnnk8o/6D/EfVm/EXCYtPgXKXflN3q1jzh~~ECwvlhySKszyPqnAQa/ABj1ZuV+KrMOtZgh3Zgx3aNfqBqZSES5rANB/ShbwT9nQ~~O3gI5fF/9NlCWDIL+HvduH+WIhqZrfHbTQrntr0sMvYTNE8PkAsB1GGZ5VO8gGGT~~Tg3kKOpNGWAJUYape/1Mb0Z1W8E1YDEaQKCnVY+Whr3+ZuLveDmyTuvLrUi+MAA4~~EaISkBZQo3ehUMjXm/0PdG4U9f2otAOhdwa2eT9irTkNS0TU+bi7VDEEhTmRKyfO~~yyVAGzTpAoGBAOmPbnMBAJYLk0SiQVspxIT+LW3tDWc7aFr/TtqAXkEVxI2xG6wA~~dEyRasBbPJDSWEljMre4g/6GG1fsPj0l5n2S8azy6jIu49ANvZPrrrBsuVYStR18~~MibzxjWWUht3vOCZBKtbqgHbC/oc49jMLPO5XrDFMTJPU5GkWRRLRZArAoGBANX+~~H6NQ7fUg8TUerXEB1WqA+FH4zVqJ/NKjbqaj9FPFWG59AjBVqQ335QzDWNCs/LjD~~REF/6qMeP2adehNhEVv2nK3rS+po9b4yLkiSysLivFPry9AxMGzFr3XzgoDb+y+y~~T02zj2k7nkGlNSSSanIxsp+TzTKsIY7ZbGx6d8y/AoGAS/kSDmq3DBe70cmNxN+z~~QyeDE4zWnUvfyCngNocnIbi49PY1cB+9tOJgfS2wZ9NkUIrqBoUIupRY9KKuJCnd~~7d8MqhtiPuytwhGWJzW030KejvcK3wp1LeKCCRBaqQCr+csMj8kDZhMgtD0NiInx~~3V3hBVM/i4PuRSPWrhlGCX0CgYEAq/xR8TBaD2kqc0b0np6ap75/1WHhqaK9T42K~~oOOkuq8hI6vU1oQCGvfhXyChgRWHB/foI7xrGC53RkHKm0ioawEJa75whTVWTEaI~~bEuOKpOQSOJ6LBlckg9PtbzAZlBm0S6+DfUCjdEcoCXnUD1cz+qhZR+lC9TMI8Mb~~IRRMtIECgYBrVlenf/rHK1UMC3FDmkOzH7agShcDHqzFMR1/NcMDolZNXXFy/u4t~~nDxci1smAUQr4oNs1lk9UzCdt0+pVCjmhbriBngwsS6sazOesDft53w6RTczsRpa~~09YDfcXhnI5yT+vd5r4xA5HhyniY7W1ahSzGDYIGlVm5IReC3P6Caw==~~-----END RSA PRIVATE KEY-----~~";
|
|
3
|
-
|
|
4
|
-
export const JWKS = {
|
|
5
|
-
keys: [
|
|
6
|
-
{
|
|
7
|
-
kty: "RSA",
|
|
8
|
-
n:
|
|
9
|
-
"wzwwEqR5p7a6CaG61i3od-GLTyype3t_f0pwwtoA9NsZANcjHaAUR_qzqlNRQlLI687vF1OfbETYLeHIT5V36QGrMfrYR_tYAoaKFixC_wOjt8EBPoeHgaTOAyGf3V3YNwocNU-StyV1X4hPmDjCrapNYpbKIcAJwq5Ij0WBKGNXBcUUbAceRtLqgzf_6x2vcQJeE5nJK5gd41f_jtlK9Xge0Ig6CcdKOI7U3agyI_iNF3SL0bnCfvtDRIkgAzzeN5Yj4S3Z4rJVQ1RgzZmqBmnjw8h06G8wDyaQPf19u4F___gF-dL1md_fVRKL5UL7OZg42hIZzwzdhrxOGcXUFQ",
|
|
10
|
-
e: "AQAB",
|
|
11
|
-
alg: "RS256",
|
|
12
|
-
kid: "NkRGQjI5N0RBNUUwMTYwOEMxQUVGQkJBQTJBODBGNTE2MDA5NDM5RA",
|
|
13
|
-
use: "sig",
|
|
14
|
-
},
|
|
15
|
-
],
|
|
16
|
-
};
|
package/src/auth/date.ts
DELETED
package/src/auth/jwt.ts
DELETED
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
import { sign, SignOptions } from "jsonwebtoken";
|
|
2
|
-
import { JWKS, PRIVATE_KEY } from "./constants";
|
|
3
|
-
|
|
4
|
-
export const parseKey = (key: string): string => key.split("~~").join("\n");
|
|
5
|
-
|
|
6
|
-
export const createJsonWebToken = (
|
|
7
|
-
payload: Record<string, unknown>,
|
|
8
|
-
privateKey = parseKey(PRIVATE_KEY),
|
|
9
|
-
options: SignOptions = {
|
|
10
|
-
algorithm: "RS256",
|
|
11
|
-
keyid: JWKS.keys[0].kid,
|
|
12
|
-
}
|
|
13
|
-
): string => {
|
|
14
|
-
return sign(payload, privateKey, options);
|
|
15
|
-
};
|
|
16
|
-
|
|
17
|
-
export function createAuthJWT(authNamespace: string, audience: string): string {
|
|
18
|
-
return createJsonWebToken({
|
|
19
|
-
[`${authNamespace}`]: 'decorate token',
|
|
20
|
-
aud: audience,
|
|
21
|
-
iss: authNamespace,
|
|
22
|
-
});
|
|
23
|
-
}
|
|
@@ -1,219 +0,0 @@
|
|
|
1
|
-
import { HttpHandler, Middleware, Person, Store } from '@simulacrum/server';
|
|
2
|
-
import { Options, QueryParams, ResponseModes } from '../types';
|
|
3
|
-
import { createLoginRedirectHandler } from './login-redirect';
|
|
4
|
-
import { createWebMessageHandler } from './web-message';
|
|
5
|
-
import { loginView } from '../views/login';
|
|
6
|
-
import { assert } from 'assert-ts';
|
|
7
|
-
import { stringify } from 'querystring';
|
|
8
|
-
import { decode, encode } from "base64-url";
|
|
9
|
-
import { userNamePasswordForm } from '../views/username-password';
|
|
10
|
-
import { expiresAt } from '../auth/date';
|
|
11
|
-
import { createAuthJWT, createJsonWebToken } from '../auth/jwt';
|
|
12
|
-
import { getServiceUrl } from './get-service-url';
|
|
13
|
-
import { createRulesRunner } from '../rules/rules-runner';
|
|
14
|
-
import { RuleUser } from '../rules/types';
|
|
15
|
-
|
|
16
|
-
export type Routes =
|
|
17
|
-
| '/heartbeat'
|
|
18
|
-
| '/authorize'
|
|
19
|
-
| '/login'
|
|
20
|
-
| '/usernamepassword/login'
|
|
21
|
-
| '/login/callback'
|
|
22
|
-
| '/oauth/token'
|
|
23
|
-
| '/v2/logout'
|
|
24
|
-
|
|
25
|
-
type Predicate<T> = (this: void, value: [string, T], index: number, obj: [string, T][]) => boolean;
|
|
26
|
-
|
|
27
|
-
const getServiceUrlFromOptions = (options: Options) => {
|
|
28
|
-
let service = options.services.get().find(({ name }) => name === 'auth0' );
|
|
29
|
-
assert(!!service, `did not find auth0 service in set of running services`);
|
|
30
|
-
|
|
31
|
-
return new URL(service.url);
|
|
32
|
-
};
|
|
33
|
-
|
|
34
|
-
const createPersonQuery = (store: Store) => (predicate: Predicate<Person>) => {
|
|
35
|
-
let people = store.slice('people').get() ?? [];
|
|
36
|
-
|
|
37
|
-
let entry = Object.entries(people as unknown as Person[]).find(predicate);
|
|
38
|
-
|
|
39
|
-
if(!entry) {
|
|
40
|
-
return undefined;
|
|
41
|
-
}else {
|
|
42
|
-
let [,person] = entry;
|
|
43
|
-
|
|
44
|
-
return person;
|
|
45
|
-
}
|
|
46
|
-
};
|
|
47
|
-
|
|
48
|
-
export const createAuth0Handlers = (options: Options): Record<Routes, HttpHandler> => {
|
|
49
|
-
let { audience, scope, store, clientId, rulesDirectory } = options;
|
|
50
|
-
let personQuery = createPersonQuery(store);
|
|
51
|
-
let rulesRunner = createRulesRunner(rulesDirectory);
|
|
52
|
-
|
|
53
|
-
let authorizeHandlers: Record<ResponseModes, Middleware> = {
|
|
54
|
-
query: createLoginRedirectHandler(options),
|
|
55
|
-
web_message: createWebMessageHandler()
|
|
56
|
-
};
|
|
57
|
-
|
|
58
|
-
return {
|
|
59
|
-
['/heartbeat']: function *(_, res) {
|
|
60
|
-
res.status(200).json({ ok: true });
|
|
61
|
-
},
|
|
62
|
-
|
|
63
|
-
['/authorize']: function *(req, res) {
|
|
64
|
-
let responseMode = (req.query.response_mode ?? 'query') as ResponseModes;
|
|
65
|
-
|
|
66
|
-
assert(['query', 'web_message'].includes(responseMode), `unknown response_mode ${responseMode}`);
|
|
67
|
-
|
|
68
|
-
let handler = authorizeHandlers[responseMode];
|
|
69
|
-
|
|
70
|
-
yield handler(req, res);
|
|
71
|
-
|
|
72
|
-
return;
|
|
73
|
-
},
|
|
74
|
-
|
|
75
|
-
['/login']: function* (req, res) {
|
|
76
|
-
let { redirect_uri } = req.query as QueryParams;
|
|
77
|
-
|
|
78
|
-
let url = getServiceUrl(options);
|
|
79
|
-
|
|
80
|
-
assert(!!clientId, `no clientId assigned`);
|
|
81
|
-
|
|
82
|
-
let html = loginView({
|
|
83
|
-
domain: url.host,
|
|
84
|
-
scope,
|
|
85
|
-
redirectUri: redirect_uri,
|
|
86
|
-
clientId,
|
|
87
|
-
audience,
|
|
88
|
-
loginFailed: false
|
|
89
|
-
});
|
|
90
|
-
|
|
91
|
-
res.set("Content-Type", "text/html");
|
|
92
|
-
|
|
93
|
-
res.status(200).send(Buffer.from(html));
|
|
94
|
-
},
|
|
95
|
-
|
|
96
|
-
['/usernamepassword/login']: function* (req, res) {
|
|
97
|
-
let { username, nonce, password } = req.body;
|
|
98
|
-
|
|
99
|
-
assert(!!username, 'no username in /usernamepassword/login');
|
|
100
|
-
assert(!!nonce, 'no nonce in /usernamepassword/login');
|
|
101
|
-
assert(!!req.session, "no session");
|
|
102
|
-
|
|
103
|
-
let user = personQuery(([, person]) => person.email?.toLowerCase() === username.toLowerCase() && person.password === password);
|
|
104
|
-
|
|
105
|
-
if(!user) {
|
|
106
|
-
let { redirect_uri } = req.query as QueryParams;
|
|
107
|
-
|
|
108
|
-
let url = getServiceUrlFromOptions(options);
|
|
109
|
-
|
|
110
|
-
assert(!!clientId, `no clientId assigned`);
|
|
111
|
-
|
|
112
|
-
let html = loginView({
|
|
113
|
-
domain: url.host,
|
|
114
|
-
scope,
|
|
115
|
-
redirectUri: redirect_uri,
|
|
116
|
-
clientId,
|
|
117
|
-
audience,
|
|
118
|
-
loginFailed: true
|
|
119
|
-
});
|
|
120
|
-
|
|
121
|
-
res.set("Content-Type", "text/html");
|
|
122
|
-
|
|
123
|
-
res.status(400).send(html);
|
|
124
|
-
return;
|
|
125
|
-
}
|
|
126
|
-
|
|
127
|
-
req.session.username = username;
|
|
128
|
-
|
|
129
|
-
store.slice('auth0').set({
|
|
130
|
-
[nonce]: {
|
|
131
|
-
username,
|
|
132
|
-
nonce
|
|
133
|
-
}
|
|
134
|
-
});
|
|
135
|
-
|
|
136
|
-
res.status(200).send(userNamePasswordForm(req.body));
|
|
137
|
-
},
|
|
138
|
-
|
|
139
|
-
['/login/callback']: function* (req, res) {
|
|
140
|
-
let wctx = JSON.parse(req.body.wctx);
|
|
141
|
-
|
|
142
|
-
let { redirect_uri, state, nonce } = wctx;
|
|
143
|
-
|
|
144
|
-
let { username } = store.slice('auth0', nonce).get();
|
|
145
|
-
|
|
146
|
-
let encodedNonce = encode(`${nonce}:${username}`);
|
|
147
|
-
|
|
148
|
-
let qs = stringify({ code: encodedNonce, state, nonce });
|
|
149
|
-
|
|
150
|
-
let routerUrl = `${redirect_uri}?${qs}`;
|
|
151
|
-
|
|
152
|
-
return res.status(302).redirect(routerUrl);
|
|
153
|
-
},
|
|
154
|
-
|
|
155
|
-
['/oauth/token']: function* (req, res) {
|
|
156
|
-
let { code } = req.body;
|
|
157
|
-
|
|
158
|
-
let [nonce, username] = decode(code).split(":");
|
|
159
|
-
|
|
160
|
-
if (!username) {
|
|
161
|
-
res.status(400).send(`no nonce in store for ${code}`);
|
|
162
|
-
return;
|
|
163
|
-
}
|
|
164
|
-
|
|
165
|
-
let user = personQuery(([, person]) => {
|
|
166
|
-
assert(!!person.email, `no email defined on person scenario`);
|
|
167
|
-
|
|
168
|
-
return person.email.toLowerCase() === username.toLowerCase();
|
|
169
|
-
});
|
|
170
|
-
|
|
171
|
-
if(!user) {
|
|
172
|
-
res.status(401).send('Unauthorized');
|
|
173
|
-
return;
|
|
174
|
-
}
|
|
175
|
-
|
|
176
|
-
let url = getServiceUrlFromOptions(options).toString();
|
|
177
|
-
|
|
178
|
-
let idTokenData = {
|
|
179
|
-
alg: "RS256",
|
|
180
|
-
typ: "JWT",
|
|
181
|
-
iss: url,
|
|
182
|
-
exp: expiresAt(),
|
|
183
|
-
iat: Date.now(),
|
|
184
|
-
mail: username,
|
|
185
|
-
aud: clientId,
|
|
186
|
-
sub: user.id,
|
|
187
|
-
nonce,
|
|
188
|
-
};
|
|
189
|
-
|
|
190
|
-
assert(!!clientId, 'no clientId in options');
|
|
191
|
-
|
|
192
|
-
let accessToken = {
|
|
193
|
-
scope,
|
|
194
|
-
};
|
|
195
|
-
|
|
196
|
-
let userData = {} as RuleUser;
|
|
197
|
-
let context = { clientID: clientId, accessToken, idToken: idTokenData };
|
|
198
|
-
|
|
199
|
-
rulesRunner(userData, context);
|
|
200
|
-
|
|
201
|
-
let idToken = createJsonWebToken({ ...userData, ...context.idToken, ...context.accessToken });
|
|
202
|
-
|
|
203
|
-
res.status(200).json({
|
|
204
|
-
access_token: createAuthJWT(url, audience),
|
|
205
|
-
id_token: idToken,
|
|
206
|
-
expires_in: 86400,
|
|
207
|
-
token_type: "Bearer",
|
|
208
|
-
});
|
|
209
|
-
},
|
|
210
|
-
|
|
211
|
-
['/v2/logout']: function *(req, res) {
|
|
212
|
-
assert(typeof req.query.returnTo === 'string', `unexpected ${req.query.returnTo} for returnTo`);
|
|
213
|
-
|
|
214
|
-
req.session = null;
|
|
215
|
-
|
|
216
|
-
res.redirect(req.query.returnTo);
|
|
217
|
-
}
|
|
218
|
-
};
|
|
219
|
-
};
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
import { Options } from '../types';
|
|
2
|
-
import { assert } from 'assert-ts';
|
|
3
|
-
|
|
4
|
-
export const getServiceUrl = (options: Options): URL => {
|
|
5
|
-
let service = options.services.get().find(({ name }) => name === 'auth0' );
|
|
6
|
-
|
|
7
|
-
assert(!!service, `did not find auth0 service in set of running services`);
|
|
8
|
-
|
|
9
|
-
return new URL(service.url);
|
|
10
|
-
};
|
|
@@ -1,37 +0,0 @@
|
|
|
1
|
-
import type { Request, Response } from 'express';
|
|
2
|
-
import { Options, QueryParams } from '../types';
|
|
3
|
-
import { stringify } from "querystring";
|
|
4
|
-
import { Middleware } from '@simulacrum/server';
|
|
5
|
-
|
|
6
|
-
export const createLoginRedirectHandler = (options: Options): Middleware =>
|
|
7
|
-
function* loginRedirect (req: Request, res: Response) {
|
|
8
|
-
let {
|
|
9
|
-
client_id,
|
|
10
|
-
redirect_uri,
|
|
11
|
-
scope,
|
|
12
|
-
state,
|
|
13
|
-
nonce,
|
|
14
|
-
response_mode,
|
|
15
|
-
code_challenge,
|
|
16
|
-
code_challenge_method,
|
|
17
|
-
auth0Client,
|
|
18
|
-
response_type,
|
|
19
|
-
} = req.query as QueryParams;
|
|
20
|
-
|
|
21
|
-
res.status(302).redirect(
|
|
22
|
-
`/login?${stringify({
|
|
23
|
-
state,
|
|
24
|
-
redirect_uri,
|
|
25
|
-
client: client_id,
|
|
26
|
-
protocol: "oauth2",
|
|
27
|
-
scope,
|
|
28
|
-
response_type,
|
|
29
|
-
response_mode,
|
|
30
|
-
nonce,
|
|
31
|
-
code_challenge,
|
|
32
|
-
code_challenge_method,
|
|
33
|
-
auth0Client,
|
|
34
|
-
audience: options.audience,
|
|
35
|
-
})}`
|
|
36
|
-
);
|
|
37
|
-
};
|