solid-server 5.8.8-8d509db1 → 5.8.8-90b76b88
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/common/js/auth-buttons.mjs +20 -20
- package/common/js/index-buttons.mjs +31 -30
- package/common/js/solid.mjs +11 -11
- package/config/defaults.mjs +1 -1
- package/config/templates/server/index.html +1 -1
- package/coverage/tmp/coverage-2252-1767784854167-0.json +1 -0
- package/coverage/tmp/{coverage-2255-1766613179053-0.json → coverage-2253-1767784832543-0.json} +1 -1
- package/default-templates/server/index.html +1 -1
- package/eslint.config.mjs +102 -0
- package/index.mjs +8 -8
- package/lib/acl-checker.mjs +1 -3
- package/lib/handlers/copy.mjs +0 -2
- package/lib/handlers/cors-proxy.mjs +2 -4
- package/lib/handlers/get.mjs +12 -8
- package/lib/handlers/index.mjs +0 -2
- package/lib/handlers/options.mjs +0 -2
- package/lib/ldp.mjs +0 -3
- package/lib/models/account-manager.mjs +2 -2
- package/lib/models/oidc-manager.mjs +0 -1
- package/lib/resource-mapper.mjs +1 -3
- package/lib/utils.mjs +0 -2
- package/lib/webid/lib/get.mjs +0 -1
- package/lib/webid/tls/index.mjs +0 -1
- package/package.json +39 -38
- package/solid-server-5.8.8.tgz +0 -0
- package/test/index.mjs +0 -1
- package/test/integration/account-manager-test.mjs +2 -3
- package/test/integration/account-template-test.mjs +0 -1
- package/test/integration/acl-oidc-test.mjs +0 -1
- package/test/integration/authentication-oidc-test.mjs +13 -8
- package/test/integration/authentication-oidc-with-strict-origins-turned-off-test.mjs +14 -9
- package/test/integration/capability-discovery-test.mjs +0 -1
- package/test/integration/oidc-manager-test.mjs +95 -2
- package/test/integration/params-test.mjs +5 -5
- package/test/integration/patch-test.mjs +29 -12
- package/test/integration/quota-test.mjs +0 -1
- package/test/integration/www-account-creation-oidc-test.mjs +0 -1
- package/test/resources/accounts/db/oidc/op/clients/{_key_30860bb5cf6ba07e80ed7b2e7178c7ad.json → _key_c1c49f6ff9e9631cf4c7018f962d2aae.json} +1 -1
- package/test/resources/accounts/db/oidc/op/provider.json +345 -1
- package/test/resources/accounts/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A3457.json +1 -1
- package/test/resources/accounts-acl/db/oidc/op/provider.json +345 -1
- package/test/resources/accounts-scenario/alice/db/oidc/op/clients/{_key_e46bcfe080c59f5cbb53a559d6a272cb.json → _key_d6a7a43b910d2811992779cde33d0364.json} +1 -1
- package/test/resources/accounts-scenario/alice/db/oidc/op/provider.json +658 -89
- package/test/resources/accounts-scenario/alice/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7000.json +1 -1
- package/test/resources/accounts-scenario/bob/db/oidc/op/clients/{_key_e7fd102ec26a3dcd5916751e01a62315.json → _key_c8d992732b9a955b6ac77873670a7d9a.json} +1 -1
- package/test/resources/accounts-scenario/bob/db/oidc/op/provider.json +658 -89
- package/test/resources/accounts-scenario/bob/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7001.json +1 -1
- package/test/resources/accounts-scenario/charlie/db/oidc/op/clients/{_key_0eec962830f849876695b69df76a3137.json → _key_4ec13ac7015e279a4449ceafe4fa19c0.json} +1 -1
- package/test/resources/accounts-scenario/charlie/db/oidc/op/provider.json +345 -1
- package/test/resources/accounts-scenario/charlie/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A5002.json +1 -1
- package/test/resources/accounts-strict-origin-off/alice/db/oidc/op/clients/{_key_7d536a1f8c6eb86f41261e171a8af79a.json → _key_26bcccb6d8af789f934ec3628e5c4b8b.json} +1 -1
- package/test/resources/accounts-strict-origin-off/alice/db/oidc/op/provider.json +345 -1
- package/test/resources/accounts-strict-origin-off/alice/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7010.json +1 -1
- package/test/resources/accounts-strict-origin-off/bob/db/oidc/op/clients/{_key_0ed30b9e076814c6f6445582302487c2.json → _key_bc54c25bdca9feab602988743c29af98.json} +1 -1
- package/test/resources/accounts-strict-origin-off/bob/db/oidc/op/provider.json +345 -1
- package/test/resources/accounts-strict-origin-off/bob/db/oidc/rp/clients/_key_https%3A%2F%2Flocalhost%3A7011.json +1 -1
- package/test/resources/config/templates/server/index.html +1 -1
- package/test/unit/account-manager-test.mjs +2 -2
- package/test/unit/account-template-test.mjs +0 -1
- package/test/unit/add-cert-request-test.mjs +0 -1
- package/test/unit/email-service-test.mjs +0 -1
- package/test/unit/email-welcome-test.mjs +1 -2
- package/test/unit/esm-imports.test.mjs +0 -1
- package/test/unit/oidc-manager-test.mjs +0 -1
- package/test/unit/solid-host-test.mjs +0 -1
- package/test/unit/user-account-test.mjs +0 -1
- package/test/unit/utils-test.mjs +1 -3
- package/test/utils/index.mjs +0 -1
- package/test/utils.mjs +3 -4
- package/test/validate-turtle.mjs +0 -1
- package/common/js/auth-buttons.js +0 -67
- package/common/js/index-buttons.js +0 -44
- package/config/defaults.js +0 -25
- package/config/templates/emails/delete-account.js +0 -49
- package/config/templates/emails/invalid-username.js +0 -30
- package/config/templates/emails/reset-password.js +0 -49
- package/config/templates/emails/welcome.js +0 -39
- package/coverage/tmp/coverage-2254-1766613200322-0.json +0 -1
- package/default-templates/emails/delete-account.js +0 -49
- package/default-templates/emails/invalid-username.js +0 -30
- package/default-templates/emails/reset-password.js +0 -49
- package/default-templates/emails/welcome.js +0 -39
|
@@ -414,6 +414,350 @@
|
|
|
414
414
|
}
|
|
415
415
|
}
|
|
416
416
|
},
|
|
417
|
-
"jwkSet": "{\"keys\":[{\"kid\":\"QXv-I1cn_YU\",\"kty\":\"RSA\",\"alg\":\"RS256\",\"n\":\"siMc_WZIcylWwv6_0mtLKKkH-jDLIsREie9KRannw_BxVvM96CaFlUHywVu1Nkyw_hqCYFXyr91JnQ7YN_fB7OpcBcx6rjbExlD_piewy2X_vXq5_0YN5a3aPb5P6JSmRF-nS257jdteucmEVJeFHzSqXAU2K5Y_2ZXse9hGTg9MJMnzof4jntb19q02E0qBOGeBqDoMXQU0RJB2uncqUzXp7EJeB4UVwvcS107LTYwPX7BAHwyGorpgWc_DYutZq-4DxycQgvIlO3_hGiFjaWhVOHHkO1DGcWTGOM9DcFels7Abf_XkCPIrgeALlOaqUe6dnK-yFCGwBeJhZupP_Q\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"TxrWAv0g4Yk\",\"kty\":\"RSA\",\"alg\":\"RS384\",\"n\":\"7d5w1iTgbqF5L8wLqFxS72vXfhmOCRHxOzoxFuAJKDtgceguvIZKcA8Krlm4qE10_Fjm3v2BhTBqKaMWeMMqM2KPCeOOm_APcOEqHLltmU301ErcEU7XJFH90HFJVlPDMbuPvX1_0mi904J-TNQ_XX1s4d1OBgJbEn-4RfongbIQK2Fv1LRclZ3n1__dVikrnngSZEWazdidEMFDlI5KNJv6jbGdQAfPzLWzq_9Fl-wbmGu4Up6COLeQDdGybmPCv3a0id9-jVlyZRauUc2RtO3mJdQaOUZNOuDFe2WT0xmhPhoLXKEWhlF1udJGzm0beY7s0pwg4QjhGi7T75d3lQ\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"-tvrpKoUfPU\",\"kty\":\"RSA\",\"alg\":\"RS512\",\"n\":\"sGoD0dZ3-F4NaAKQQrPhSGAbkBvJ0OsA3PQiwAhWXMrdOj0n9o2QDQfICdayIHcRwsisQaOz7B-L-pYcYFgMcdhj-yWOYVUMHXJCTqJeiz4zdGqjlCxkOF9ebauahRk_IoXp_hDyx3hqB98giajTn1gpW9G36Hcau4PutfM_jeyxi4iVeQSm8-p7qLCm-qD7ot0vzCqvsIt9cDvm9o5DVwG-LoAzeyZlEDmuDpFrLsFLz-D9rxLfSSdAethycrDA0Fhe1j7Az15NYUItJIkvyM5AsC6X0xyjO1LJWoJfbl9cbfaJQ0c3XKRc_NuxPYcDuM15gw0FaTkgUOYezuALPQ\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"DA4MU9NJoDo\",\"kty\":\"RSA\",\"alg\":\"RS256\",\"n\":\"vaugR-F0yLkwgUyJPrIxjUrncPFoGlFyfPWYfVlU4OleYqNnEofoUNI2afIqRQlZgMgfxhknAi6IEhQKdNQGOAqzKoBxEvVK30x4XxMyVPMYYWbTCEEX2K5Kna0wJQ39rsajBWBRusxge_bLydt0dun4ZX4lv_BaCkdKn4TB6x3sQtwPyYrkOj7nykBiLzpcNGYKYbL5B5HGJHbcjXqX6ttvUn7B7E_idcyJbFfcwzrSj87Zdp5aj5LSiIqHtih8Sm2Mch5VQDT_U55UT4n8Rc9K_fJ1bQirXQdZZ9CgU4zcjXx8PnaEpeq18EcXxXsdfCN8o4EBUN7YWog1-65CLw\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"re686ijoKyE\",\"kty\":\"RSA\",\"alg\":\"RS384\",\"n\":\"p3SLWJT-PyQn6n-fvj_s5dNqRJQauAZCC8JFnwUUP6n_LUfCG5tpfRLzZ0yXtsaPfN-z9c8JbXIbsF0HJN3NLTaBOWaZ04yjl3S29_8y-KwOMKlOafuRbYy7sXkicvCnjXRIcV85pAewrpwwHBcI2wDPDbkflwI3m6nurThQAQBDxPWz83QnC_iQ_V3pJGoGYItUGH_sJC06mqATV05dVzHSS0VZSFhEoyEtpykZNnhzgZCOACi4V8P07y0jsxQtqdPYYpqt9qg0Tjp81r-tIIDY7LEWv949rbR3Oad-QBcQC0f4CEapT2nbcVcadODtqPv1pQzSL7sSJ42zATGSxQ\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"jGE5qoPDlnI\",\"kty\":\"RSA\",\"alg\":\"RS512\",\"n\":\"-WuAFX1DLbsMHagMw_NDJA6yxCcIm2SDgbMmDKOwCN4dR0YWdwKzDJ31EeoakDg-T85HaU48R4Kcx1WQUYnly98vDymMFl4Xe6zS9je-Uh3IVfkYJV3pwVKr2gj1hrX7QglIktLg0o0iWulFe1K1NQ5u7Jbe7ZZhOaetlTFH8KUgS78fajfhcFtrXBliqxHTiBz2lMYCj2ntqX8K8ue3_lVLBXm53AJG3T-ymnUd-nxJ-NsdFMSIzQO1-KUona9OgxDpu1cFoQ-YzOteSz2OP58wDl3gL5urIhzK7Hvu3I3okzlL2TyCHmOhLn6HMHr2-mwEgsYYnsEQwzu6bbY8hw\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"PhN1R2mze2k\",\"kty\":\"RSA\",\"alg\":\"RS256\",\"n\":\"yGhTYJWPKU-n1gnPQPf1_Nr8HBJ6F-IT6PyxLJoURWrd_DvuW0EFQD1JolKAYWakuJAIWGtb8CXjRdzXrEVYNfshb-bBGYGotISxAD2z_KzEtcBya_TwywAQiMYildsAPRZR7HqvxnUw2iFUwec_gw6aBvu3rPcLnj6z2KKDJDFC1P4LHNDArh4EquhkgtzeD5h6-8cCI1iKpb-Op5nCe1DjUNg49L5NZhNtDlhCEb8P2LEbcV8vldIz9gJu0MSf94zzWu2JGsVtVQ29XPO8SQqrKQ5TKClmR1jIIGCF7t4AUoaaL6AA81F3cyEhKB3vN_D8DzEsr7tuwomLFZXmBw\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true}]}"
|
|
417
|
+
"jwkSet": "{\"keys\":[{\"kid\":\"QXv-I1cn_YU\",\"kty\":\"RSA\",\"alg\":\"RS256\",\"n\":\"siMc_WZIcylWwv6_0mtLKKkH-jDLIsREie9KRannw_BxVvM96CaFlUHywVu1Nkyw_hqCYFXyr91JnQ7YN_fB7OpcBcx6rjbExlD_piewy2X_vXq5_0YN5a3aPb5P6JSmRF-nS257jdteucmEVJeFHzSqXAU2K5Y_2ZXse9hGTg9MJMnzof4jntb19q02E0qBOGeBqDoMXQU0RJB2uncqUzXp7EJeB4UVwvcS107LTYwPX7BAHwyGorpgWc_DYutZq-4DxycQgvIlO3_hGiFjaWhVOHHkO1DGcWTGOM9DcFels7Abf_XkCPIrgeALlOaqUe6dnK-yFCGwBeJhZupP_Q\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"TxrWAv0g4Yk\",\"kty\":\"RSA\",\"alg\":\"RS384\",\"n\":\"7d5w1iTgbqF5L8wLqFxS72vXfhmOCRHxOzoxFuAJKDtgceguvIZKcA8Krlm4qE10_Fjm3v2BhTBqKaMWeMMqM2KPCeOOm_APcOEqHLltmU301ErcEU7XJFH90HFJVlPDMbuPvX1_0mi904J-TNQ_XX1s4d1OBgJbEn-4RfongbIQK2Fv1LRclZ3n1__dVikrnngSZEWazdidEMFDlI5KNJv6jbGdQAfPzLWzq_9Fl-wbmGu4Up6COLeQDdGybmPCv3a0id9-jVlyZRauUc2RtO3mJdQaOUZNOuDFe2WT0xmhPhoLXKEWhlF1udJGzm0beY7s0pwg4QjhGi7T75d3lQ\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"-tvrpKoUfPU\",\"kty\":\"RSA\",\"alg\":\"RS512\",\"n\":\"sGoD0dZ3-F4NaAKQQrPhSGAbkBvJ0OsA3PQiwAhWXMrdOj0n9o2QDQfICdayIHcRwsisQaOz7B-L-pYcYFgMcdhj-yWOYVUMHXJCTqJeiz4zdGqjlCxkOF9ebauahRk_IoXp_hDyx3hqB98giajTn1gpW9G36Hcau4PutfM_jeyxi4iVeQSm8-p7qLCm-qD7ot0vzCqvsIt9cDvm9o5DVwG-LoAzeyZlEDmuDpFrLsFLz-D9rxLfSSdAethycrDA0Fhe1j7Az15NYUItJIkvyM5AsC6X0xyjO1LJWoJfbl9cbfaJQ0c3XKRc_NuxPYcDuM15gw0FaTkgUOYezuALPQ\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"DA4MU9NJoDo\",\"kty\":\"RSA\",\"alg\":\"RS256\",\"n\":\"vaugR-F0yLkwgUyJPrIxjUrncPFoGlFyfPWYfVlU4OleYqNnEofoUNI2afIqRQlZgMgfxhknAi6IEhQKdNQGOAqzKoBxEvVK30x4XxMyVPMYYWbTCEEX2K5Kna0wJQ39rsajBWBRusxge_bLydt0dun4ZX4lv_BaCkdKn4TB6x3sQtwPyYrkOj7nykBiLzpcNGYKYbL5B5HGJHbcjXqX6ttvUn7B7E_idcyJbFfcwzrSj87Zdp5aj5LSiIqHtih8Sm2Mch5VQDT_U55UT4n8Rc9K_fJ1bQirXQdZZ9CgU4zcjXx8PnaEpeq18EcXxXsdfCN8o4EBUN7YWog1-65CLw\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"re686ijoKyE\",\"kty\":\"RSA\",\"alg\":\"RS384\",\"n\":\"p3SLWJT-PyQn6n-fvj_s5dNqRJQauAZCC8JFnwUUP6n_LUfCG5tpfRLzZ0yXtsaPfN-z9c8JbXIbsF0HJN3NLTaBOWaZ04yjl3S29_8y-KwOMKlOafuRbYy7sXkicvCnjXRIcV85pAewrpwwHBcI2wDPDbkflwI3m6nurThQAQBDxPWz83QnC_iQ_V3pJGoGYItUGH_sJC06mqATV05dVzHSS0VZSFhEoyEtpykZNnhzgZCOACi4V8P07y0jsxQtqdPYYpqt9qg0Tjp81r-tIIDY7LEWv949rbR3Oad-QBcQC0f4CEapT2nbcVcadODtqPv1pQzSL7sSJ42zATGSxQ\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"jGE5qoPDlnI\",\"kty\":\"RSA\",\"alg\":\"RS512\",\"n\":\"-WuAFX1DLbsMHagMw_NDJA6yxCcIm2SDgbMmDKOwCN4dR0YWdwKzDJ31EeoakDg-T85HaU48R4Kcx1WQUYnly98vDymMFl4Xe6zS9je-Uh3IVfkYJV3pwVKr2gj1hrX7QglIktLg0o0iWulFe1K1NQ5u7Jbe7ZZhOaetlTFH8KUgS78fajfhcFtrXBliqxHTiBz2lMYCj2ntqX8K8ue3_lVLBXm53AJG3T-ymnUd-nxJ-NsdFMSIzQO1-KUona9OgxDpu1cFoQ-YzOteSz2OP58wDl3gL5urIhzK7Hvu3I3okzlL2TyCHmOhLn6HMHr2-mwEgsYYnsEQwzu6bbY8hw\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true},{\"kid\":\"PhN1R2mze2k\",\"kty\":\"RSA\",\"alg\":\"RS256\",\"n\":\"yGhTYJWPKU-n1gnPQPf1_Nr8HBJ6F-IT6PyxLJoURWrd_DvuW0EFQD1JolKAYWakuJAIWGtb8CXjRdzXrEVYNfshb-bBGYGotISxAD2z_KzEtcBya_TwywAQiMYildsAPRZR7HqvxnUw2iFUwec_gw6aBvu3rPcLnj6z2KKDJDFC1P4LHNDArh4EquhkgtzeD5h6-8cCI1iKpb-Op5nCe1DjUNg49L5NZhNtDlhCEb8P2LEbcV8vldIz9gJu0MSf94zzWu2JGsVtVQ29XPO8SQqrKQ5TKClmR1jIIGCF7t4AUoaaL6AA81F3cyEhKB3vN_D8DzEsr7tuwomLFZXmBw\",\"e\":\"AQAB\",\"key_ops\":[\"verify\"],\"ext\":true}]}",
|
|
418
|
+
"_crypto": {
|
|
419
|
+
"subtle": {
|
|
420
|
+
"providers": {
|
|
421
|
+
"items": {
|
|
422
|
+
"aes-cbc": {
|
|
423
|
+
"name": "AES-CBC",
|
|
424
|
+
"usages": [
|
|
425
|
+
"encrypt",
|
|
426
|
+
"decrypt",
|
|
427
|
+
"wrapKey",
|
|
428
|
+
"unwrapKey"
|
|
429
|
+
]
|
|
430
|
+
},
|
|
431
|
+
"aes-ctr": {
|
|
432
|
+
"name": "AES-CTR",
|
|
433
|
+
"usages": [
|
|
434
|
+
"encrypt",
|
|
435
|
+
"decrypt",
|
|
436
|
+
"wrapKey",
|
|
437
|
+
"unwrapKey"
|
|
438
|
+
]
|
|
439
|
+
},
|
|
440
|
+
"aes-gcm": {
|
|
441
|
+
"name": "AES-GCM",
|
|
442
|
+
"usages": [
|
|
443
|
+
"encrypt",
|
|
444
|
+
"decrypt",
|
|
445
|
+
"wrapKey",
|
|
446
|
+
"unwrapKey"
|
|
447
|
+
]
|
|
448
|
+
},
|
|
449
|
+
"aes-cmac": {
|
|
450
|
+
"name": "AES-CMAC",
|
|
451
|
+
"usages": [
|
|
452
|
+
"sign",
|
|
453
|
+
"verify"
|
|
454
|
+
]
|
|
455
|
+
},
|
|
456
|
+
"aes-kw": {
|
|
457
|
+
"name": "AES-KW",
|
|
458
|
+
"usages": [
|
|
459
|
+
"wrapKey",
|
|
460
|
+
"unwrapKey"
|
|
461
|
+
]
|
|
462
|
+
},
|
|
463
|
+
"aes-ecb": {
|
|
464
|
+
"name": "AES-ECB",
|
|
465
|
+
"usages": [
|
|
466
|
+
"encrypt",
|
|
467
|
+
"decrypt",
|
|
468
|
+
"wrapKey",
|
|
469
|
+
"unwrapKey"
|
|
470
|
+
]
|
|
471
|
+
},
|
|
472
|
+
"des-ede3-cbc": {
|
|
473
|
+
"usages": [
|
|
474
|
+
"encrypt",
|
|
475
|
+
"decrypt",
|
|
476
|
+
"wrapKey",
|
|
477
|
+
"unwrapKey"
|
|
478
|
+
],
|
|
479
|
+
"keySizeBits": 192,
|
|
480
|
+
"ivSize": 8,
|
|
481
|
+
"name": "DES-EDE3-CBC"
|
|
482
|
+
},
|
|
483
|
+
"rsassa-pkcs1-v1_5": {
|
|
484
|
+
"hashAlgorithms": [
|
|
485
|
+
"SHA-1",
|
|
486
|
+
"SHA-256",
|
|
487
|
+
"SHA-384",
|
|
488
|
+
"SHA-512",
|
|
489
|
+
"shake128",
|
|
490
|
+
"shake256",
|
|
491
|
+
"SHA3-256",
|
|
492
|
+
"SHA3-384",
|
|
493
|
+
"SHA3-512"
|
|
494
|
+
],
|
|
495
|
+
"name": "RSASSA-PKCS1-v1_5",
|
|
496
|
+
"usages": {
|
|
497
|
+
"privateKey": [
|
|
498
|
+
"sign"
|
|
499
|
+
],
|
|
500
|
+
"publicKey": [
|
|
501
|
+
"verify"
|
|
502
|
+
]
|
|
503
|
+
}
|
|
504
|
+
},
|
|
505
|
+
"rsa-pss": {
|
|
506
|
+
"hashAlgorithms": [
|
|
507
|
+
"SHA-1",
|
|
508
|
+
"SHA-256",
|
|
509
|
+
"SHA-384",
|
|
510
|
+
"SHA-512",
|
|
511
|
+
"shake128",
|
|
512
|
+
"shake256",
|
|
513
|
+
"SHA3-256",
|
|
514
|
+
"SHA3-384",
|
|
515
|
+
"SHA3-512"
|
|
516
|
+
],
|
|
517
|
+
"name": "RSA-PSS",
|
|
518
|
+
"usages": {
|
|
519
|
+
"privateKey": [
|
|
520
|
+
"sign"
|
|
521
|
+
],
|
|
522
|
+
"publicKey": [
|
|
523
|
+
"verify"
|
|
524
|
+
]
|
|
525
|
+
}
|
|
526
|
+
},
|
|
527
|
+
"rsa-oaep": {
|
|
528
|
+
"hashAlgorithms": [
|
|
529
|
+
"SHA-1",
|
|
530
|
+
"SHA-256",
|
|
531
|
+
"SHA-384",
|
|
532
|
+
"SHA-512"
|
|
533
|
+
],
|
|
534
|
+
"name": "RSA-OAEP",
|
|
535
|
+
"usages": {
|
|
536
|
+
"privateKey": [
|
|
537
|
+
"decrypt",
|
|
538
|
+
"unwrapKey"
|
|
539
|
+
],
|
|
540
|
+
"publicKey": [
|
|
541
|
+
"encrypt",
|
|
542
|
+
"wrapKey"
|
|
543
|
+
]
|
|
544
|
+
}
|
|
545
|
+
},
|
|
546
|
+
"rsaes-pkcs1-v1_5": {
|
|
547
|
+
"name": "RSAES-PKCS1-v1_5",
|
|
548
|
+
"usages": {
|
|
549
|
+
"publicKey": [
|
|
550
|
+
"encrypt",
|
|
551
|
+
"wrapKey"
|
|
552
|
+
],
|
|
553
|
+
"privateKey": [
|
|
554
|
+
"decrypt",
|
|
555
|
+
"unwrapKey"
|
|
556
|
+
]
|
|
557
|
+
}
|
|
558
|
+
},
|
|
559
|
+
"ecdsa": {
|
|
560
|
+
"name": "ECDSA",
|
|
561
|
+
"hashAlgorithms": [
|
|
562
|
+
"SHA-1",
|
|
563
|
+
"SHA-256",
|
|
564
|
+
"SHA-384",
|
|
565
|
+
"SHA-512",
|
|
566
|
+
"shake128",
|
|
567
|
+
"shake256",
|
|
568
|
+
"SHA3-256",
|
|
569
|
+
"SHA3-384",
|
|
570
|
+
"SHA3-512"
|
|
571
|
+
],
|
|
572
|
+
"usages": {
|
|
573
|
+
"privateKey": [
|
|
574
|
+
"sign"
|
|
575
|
+
],
|
|
576
|
+
"publicKey": [
|
|
577
|
+
"verify"
|
|
578
|
+
]
|
|
579
|
+
},
|
|
580
|
+
"namedCurves": [
|
|
581
|
+
"P-256",
|
|
582
|
+
"P-384",
|
|
583
|
+
"P-521",
|
|
584
|
+
"K-256",
|
|
585
|
+
"brainpoolP160r1",
|
|
586
|
+
"brainpoolP160t1",
|
|
587
|
+
"brainpoolP192r1",
|
|
588
|
+
"brainpoolP192t1",
|
|
589
|
+
"brainpoolP224r1",
|
|
590
|
+
"brainpoolP224t1",
|
|
591
|
+
"brainpoolP256r1",
|
|
592
|
+
"brainpoolP256t1",
|
|
593
|
+
"brainpoolP320r1",
|
|
594
|
+
"brainpoolP320t1",
|
|
595
|
+
"brainpoolP384r1",
|
|
596
|
+
"brainpoolP384t1",
|
|
597
|
+
"brainpoolP512r1",
|
|
598
|
+
"brainpoolP512t1"
|
|
599
|
+
]
|
|
600
|
+
},
|
|
601
|
+
"ecdh": {
|
|
602
|
+
"name": "ECDH",
|
|
603
|
+
"usages": {
|
|
604
|
+
"privateKey": [
|
|
605
|
+
"deriveBits",
|
|
606
|
+
"deriveKey"
|
|
607
|
+
],
|
|
608
|
+
"publicKey": []
|
|
609
|
+
},
|
|
610
|
+
"namedCurves": [
|
|
611
|
+
"P-256",
|
|
612
|
+
"P-384",
|
|
613
|
+
"P-521",
|
|
614
|
+
"K-256",
|
|
615
|
+
"brainpoolP160r1",
|
|
616
|
+
"brainpoolP160t1",
|
|
617
|
+
"brainpoolP192r1",
|
|
618
|
+
"brainpoolP192t1",
|
|
619
|
+
"brainpoolP224r1",
|
|
620
|
+
"brainpoolP224t1",
|
|
621
|
+
"brainpoolP256r1",
|
|
622
|
+
"brainpoolP256t1",
|
|
623
|
+
"brainpoolP320r1",
|
|
624
|
+
"brainpoolP320t1",
|
|
625
|
+
"brainpoolP384r1",
|
|
626
|
+
"brainpoolP384t1",
|
|
627
|
+
"brainpoolP512r1",
|
|
628
|
+
"brainpoolP512t1"
|
|
629
|
+
]
|
|
630
|
+
},
|
|
631
|
+
"sha-1": {
|
|
632
|
+
"name": "SHA-1",
|
|
633
|
+
"usages": []
|
|
634
|
+
},
|
|
635
|
+
"sha-256": {
|
|
636
|
+
"name": "SHA-256",
|
|
637
|
+
"usages": []
|
|
638
|
+
},
|
|
639
|
+
"sha-384": {
|
|
640
|
+
"name": "SHA-384",
|
|
641
|
+
"usages": []
|
|
642
|
+
},
|
|
643
|
+
"sha-512": {
|
|
644
|
+
"name": "SHA-512",
|
|
645
|
+
"usages": []
|
|
646
|
+
},
|
|
647
|
+
"pbkdf2": {
|
|
648
|
+
"name": "PBKDF2",
|
|
649
|
+
"hashAlgorithms": [
|
|
650
|
+
"SHA-1",
|
|
651
|
+
"SHA-256",
|
|
652
|
+
"SHA-384",
|
|
653
|
+
"SHA-512"
|
|
654
|
+
],
|
|
655
|
+
"usages": [
|
|
656
|
+
"deriveBits",
|
|
657
|
+
"deriveKey"
|
|
658
|
+
]
|
|
659
|
+
},
|
|
660
|
+
"hmac": {
|
|
661
|
+
"name": "HMAC",
|
|
662
|
+
"hashAlgorithms": [
|
|
663
|
+
"SHA-1",
|
|
664
|
+
"SHA-256",
|
|
665
|
+
"SHA-384",
|
|
666
|
+
"SHA-512"
|
|
667
|
+
],
|
|
668
|
+
"usages": [
|
|
669
|
+
"sign",
|
|
670
|
+
"verify"
|
|
671
|
+
]
|
|
672
|
+
},
|
|
673
|
+
"hkdf": {
|
|
674
|
+
"name": "HKDF",
|
|
675
|
+
"hashAlgorithms": [
|
|
676
|
+
"SHA-1",
|
|
677
|
+
"SHA-256",
|
|
678
|
+
"SHA-384",
|
|
679
|
+
"SHA-512"
|
|
680
|
+
],
|
|
681
|
+
"usages": [
|
|
682
|
+
"deriveKey",
|
|
683
|
+
"deriveBits"
|
|
684
|
+
]
|
|
685
|
+
},
|
|
686
|
+
"shake128": {
|
|
687
|
+
"usages": [],
|
|
688
|
+
"defaultLength": 16,
|
|
689
|
+
"name": "shake128"
|
|
690
|
+
},
|
|
691
|
+
"shake256": {
|
|
692
|
+
"usages": [],
|
|
693
|
+
"defaultLength": 32,
|
|
694
|
+
"name": "shake256"
|
|
695
|
+
},
|
|
696
|
+
"sha3-256": {
|
|
697
|
+
"name": "SHA3-256",
|
|
698
|
+
"usages": []
|
|
699
|
+
},
|
|
700
|
+
"sha3-384": {
|
|
701
|
+
"name": "SHA3-384",
|
|
702
|
+
"usages": []
|
|
703
|
+
},
|
|
704
|
+
"sha3-512": {
|
|
705
|
+
"name": "SHA3-512",
|
|
706
|
+
"usages": []
|
|
707
|
+
},
|
|
708
|
+
"eddsa": {
|
|
709
|
+
"name": "EdDSA",
|
|
710
|
+
"usages": {
|
|
711
|
+
"privateKey": [
|
|
712
|
+
"sign"
|
|
713
|
+
],
|
|
714
|
+
"publicKey": [
|
|
715
|
+
"verify"
|
|
716
|
+
]
|
|
717
|
+
},
|
|
718
|
+
"namedCurves": [
|
|
719
|
+
"Ed25519",
|
|
720
|
+
"Ed448"
|
|
721
|
+
]
|
|
722
|
+
},
|
|
723
|
+
"ecdh-es": {
|
|
724
|
+
"name": "ECDH-ES",
|
|
725
|
+
"usages": {
|
|
726
|
+
"privateKey": [
|
|
727
|
+
"deriveBits",
|
|
728
|
+
"deriveKey"
|
|
729
|
+
],
|
|
730
|
+
"publicKey": []
|
|
731
|
+
},
|
|
732
|
+
"namedCurves": [
|
|
733
|
+
"X25519",
|
|
734
|
+
"X448"
|
|
735
|
+
]
|
|
736
|
+
},
|
|
737
|
+
"ed25519": {
|
|
738
|
+
"name": "Ed25519",
|
|
739
|
+
"usages": {
|
|
740
|
+
"privateKey": [
|
|
741
|
+
"sign"
|
|
742
|
+
],
|
|
743
|
+
"publicKey": [
|
|
744
|
+
"verify"
|
|
745
|
+
]
|
|
746
|
+
}
|
|
747
|
+
},
|
|
748
|
+
"x25519": {
|
|
749
|
+
"name": "X25519",
|
|
750
|
+
"usages": {
|
|
751
|
+
"privateKey": [
|
|
752
|
+
"deriveKey",
|
|
753
|
+
"deriveBits"
|
|
754
|
+
],
|
|
755
|
+
"publicKey": []
|
|
756
|
+
}
|
|
757
|
+
}
|
|
758
|
+
}
|
|
759
|
+
}
|
|
760
|
+
}
|
|
761
|
+
}
|
|
418
762
|
}
|
|
419
763
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"provider":{"url":"https://localhost:7011","configuration":{"issuer":"https://localhost:7011","jwks_uri":"https://localhost:7011/jwks","scopes_supported":["openid","offline_access"],"response_types_supported":["code","code token","code id_token","id_token","id_token token","code id_token token","none"],"token_types_supported":["legacyPop","dpop"],"response_modes_supported":["query","fragment"],"grant_types_supported":["authorization_code","implicit","refresh_token","client_credentials"],"subject_types_supported":["public"],"id_token_signing_alg_values_supported":["RS256","RS384","RS512","none"],"token_endpoint_auth_methods_supported":["client_secret_basic"],"token_endpoint_auth_signing_alg_values_supported":["RS256"],"display_values_supported":[],"claim_types_supported":["normal"],"claims_supported":[],"claims_parameter_supported":false,"request_parameter_supported":true,"request_uri_parameter_supported":false,"require_request_uri_registration":false,"check_session_iframe":"https://localhost:7011/session","end_session_endpoint":"https://localhost:7011/logout","authorization_endpoint":"https://localhost:7011/authorize","token_endpoint":"https://localhost:7011/token","userinfo_endpoint":"https://localhost:7011/userinfo","registration_endpoint":"https://localhost:7011/register"},"jwks":{"keys":[{"kid":"QXv-I1cn_YU","kty":"RSA","alg":"RS256","n":"siMc_WZIcylWwv6_0mtLKKkH-jDLIsREie9KRannw_BxVvM96CaFlUHywVu1Nkyw_hqCYFXyr91JnQ7YN_fB7OpcBcx6rjbExlD_piewy2X_vXq5_0YN5a3aPb5P6JSmRF-nS257jdteucmEVJeFHzSqXAU2K5Y_2ZXse9hGTg9MJMnzof4jntb19q02E0qBOGeBqDoMXQU0RJB2uncqUzXp7EJeB4UVwvcS107LTYwPX7BAHwyGorpgWc_DYutZq-4DxycQgvIlO3_hGiFjaWhVOHHkO1DGcWTGOM9DcFels7Abf_XkCPIrgeALlOaqUe6dnK-yFCGwBeJhZupP_Q","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"TxrWAv0g4Yk","kty":"RSA","alg":"RS384","n":"7d5w1iTgbqF5L8wLqFxS72vXfhmOCRHxOzoxFuAJKDtgceguvIZKcA8Krlm4qE10_Fjm3v2BhTBqKaMWeMMqM2KPCeOOm_APcOEqHLltmU301ErcEU7XJFH90HFJVlPDMbuPvX1_0mi904J-TNQ_XX1s4d1OBgJbEn-4RfongbIQK2Fv1LRclZ3n1__dVikrnngSZEWazdidEMFDlI5KNJv6jbGdQAfPzLWzq_9Fl-wbmGu4Up6COLeQDdGybmPCv3a0id9-jVlyZRauUc2RtO3mJdQaOUZNOuDFe2WT0xmhPhoLXKEWhlF1udJGzm0beY7s0pwg4QjhGi7T75d3lQ","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"-tvrpKoUfPU","kty":"RSA","alg":"RS512","n":"sGoD0dZ3-F4NaAKQQrPhSGAbkBvJ0OsA3PQiwAhWXMrdOj0n9o2QDQfICdayIHcRwsisQaOz7B-L-pYcYFgMcdhj-yWOYVUMHXJCTqJeiz4zdGqjlCxkOF9ebauahRk_IoXp_hDyx3hqB98giajTn1gpW9G36Hcau4PutfM_jeyxi4iVeQSm8-p7qLCm-qD7ot0vzCqvsIt9cDvm9o5DVwG-LoAzeyZlEDmuDpFrLsFLz-D9rxLfSSdAethycrDA0Fhe1j7Az15NYUItJIkvyM5AsC6X0xyjO1LJWoJfbl9cbfaJQ0c3XKRc_NuxPYcDuM15gw0FaTkgUOYezuALPQ","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"DA4MU9NJoDo","kty":"RSA","alg":"RS256","n":"vaugR-F0yLkwgUyJPrIxjUrncPFoGlFyfPWYfVlU4OleYqNnEofoUNI2afIqRQlZgMgfxhknAi6IEhQKdNQGOAqzKoBxEvVK30x4XxMyVPMYYWbTCEEX2K5Kna0wJQ39rsajBWBRusxge_bLydt0dun4ZX4lv_BaCkdKn4TB6x3sQtwPyYrkOj7nykBiLzpcNGYKYbL5B5HGJHbcjXqX6ttvUn7B7E_idcyJbFfcwzrSj87Zdp5aj5LSiIqHtih8Sm2Mch5VQDT_U55UT4n8Rc9K_fJ1bQirXQdZZ9CgU4zcjXx8PnaEpeq18EcXxXsdfCN8o4EBUN7YWog1-65CLw","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"re686ijoKyE","kty":"RSA","alg":"RS384","n":"p3SLWJT-PyQn6n-fvj_s5dNqRJQauAZCC8JFnwUUP6n_LUfCG5tpfRLzZ0yXtsaPfN-z9c8JbXIbsF0HJN3NLTaBOWaZ04yjl3S29_8y-KwOMKlOafuRbYy7sXkicvCnjXRIcV85pAewrpwwHBcI2wDPDbkflwI3m6nurThQAQBDxPWz83QnC_iQ_V3pJGoGYItUGH_sJC06mqATV05dVzHSS0VZSFhEoyEtpykZNnhzgZCOACi4V8P07y0jsxQtqdPYYpqt9qg0Tjp81r-tIIDY7LEWv949rbR3Oad-QBcQC0f4CEapT2nbcVcadODtqPv1pQzSL7sSJ42zATGSxQ","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"jGE5qoPDlnI","kty":"RSA","alg":"RS512","n":"-WuAFX1DLbsMHagMw_NDJA6yxCcIm2SDgbMmDKOwCN4dR0YWdwKzDJ31EeoakDg-T85HaU48R4Kcx1WQUYnly98vDymMFl4Xe6zS9je-Uh3IVfkYJV3pwVKr2gj1hrX7QglIktLg0o0iWulFe1K1NQ5u7Jbe7ZZhOaetlTFH8KUgS78fajfhcFtrXBliqxHTiBz2lMYCj2ntqX8K8ue3_lVLBXm53AJG3T-ymnUd-nxJ-NsdFMSIzQO1-KUona9OgxDpu1cFoQ-YzOteSz2OP58wDl3gL5urIhzK7Hvu3I3okzlL2TyCHmOhLn6HMHr2-mwEgsYYnsEQwzu6bbY8hw","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"PhN1R2mze2k","kty":"RSA","alg":"RS256","n":"yGhTYJWPKU-n1gnPQPf1_Nr8HBJ6F-IT6PyxLJoURWrd_DvuW0EFQD1JolKAYWakuJAIWGtb8CXjRdzXrEVYNfshb-bBGYGotISxAD2z_KzEtcBya_TwywAQiMYildsAPRZR7HqvxnUw2iFUwec_gw6aBvu3rPcLnj6z2KKDJDFC1P4LHNDArh4EquhkgtzeD5h6-8cCI1iKpb-Op5nCe1DjUNg49L5NZhNtDlhCEb8P2LEbcV8vldIz9gJu0MSf94zzWu2JGsVtVQ29XPO8SQqrKQ5TKClmR1jIIGCF7t4AUoaaL6AA81F3cyEhKB3vN_D8DzEsr7tuwomLFZXmBw","e":"AQAB","key_ops":["verify"],"ext":true}]}},"defaults":{},"registration":{"redirect_uris":["https://localhost:7011/api/oidc/rp/https%3A%2F%2Flocalhost%3A7011"],"client_id":"
|
|
1
|
+
{"provider":{"url":"https://localhost:7011","configuration":{"issuer":"https://localhost:7011","jwks_uri":"https://localhost:7011/jwks","scopes_supported":["openid","offline_access"],"response_types_supported":["code","code token","code id_token","id_token","id_token token","code id_token token","none"],"token_types_supported":["legacyPop","dpop"],"response_modes_supported":["query","fragment"],"grant_types_supported":["authorization_code","implicit","refresh_token","client_credentials"],"subject_types_supported":["public"],"id_token_signing_alg_values_supported":["RS256","RS384","RS512","none"],"token_endpoint_auth_methods_supported":["client_secret_basic"],"token_endpoint_auth_signing_alg_values_supported":["RS256"],"display_values_supported":[],"claim_types_supported":["normal"],"claims_supported":[],"claims_parameter_supported":false,"request_parameter_supported":true,"request_uri_parameter_supported":false,"require_request_uri_registration":false,"check_session_iframe":"https://localhost:7011/session","end_session_endpoint":"https://localhost:7011/logout","authorization_endpoint":"https://localhost:7011/authorize","token_endpoint":"https://localhost:7011/token","userinfo_endpoint":"https://localhost:7011/userinfo","registration_endpoint":"https://localhost:7011/register"},"jwks":{"keys":[{"kid":"QXv-I1cn_YU","kty":"RSA","alg":"RS256","n":"siMc_WZIcylWwv6_0mtLKKkH-jDLIsREie9KRannw_BxVvM96CaFlUHywVu1Nkyw_hqCYFXyr91JnQ7YN_fB7OpcBcx6rjbExlD_piewy2X_vXq5_0YN5a3aPb5P6JSmRF-nS257jdteucmEVJeFHzSqXAU2K5Y_2ZXse9hGTg9MJMnzof4jntb19q02E0qBOGeBqDoMXQU0RJB2uncqUzXp7EJeB4UVwvcS107LTYwPX7BAHwyGorpgWc_DYutZq-4DxycQgvIlO3_hGiFjaWhVOHHkO1DGcWTGOM9DcFels7Abf_XkCPIrgeALlOaqUe6dnK-yFCGwBeJhZupP_Q","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"TxrWAv0g4Yk","kty":"RSA","alg":"RS384","n":"7d5w1iTgbqF5L8wLqFxS72vXfhmOCRHxOzoxFuAJKDtgceguvIZKcA8Krlm4qE10_Fjm3v2BhTBqKaMWeMMqM2KPCeOOm_APcOEqHLltmU301ErcEU7XJFH90HFJVlPDMbuPvX1_0mi904J-TNQ_XX1s4d1OBgJbEn-4RfongbIQK2Fv1LRclZ3n1__dVikrnngSZEWazdidEMFDlI5KNJv6jbGdQAfPzLWzq_9Fl-wbmGu4Up6COLeQDdGybmPCv3a0id9-jVlyZRauUc2RtO3mJdQaOUZNOuDFe2WT0xmhPhoLXKEWhlF1udJGzm0beY7s0pwg4QjhGi7T75d3lQ","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"-tvrpKoUfPU","kty":"RSA","alg":"RS512","n":"sGoD0dZ3-F4NaAKQQrPhSGAbkBvJ0OsA3PQiwAhWXMrdOj0n9o2QDQfICdayIHcRwsisQaOz7B-L-pYcYFgMcdhj-yWOYVUMHXJCTqJeiz4zdGqjlCxkOF9ebauahRk_IoXp_hDyx3hqB98giajTn1gpW9G36Hcau4PutfM_jeyxi4iVeQSm8-p7qLCm-qD7ot0vzCqvsIt9cDvm9o5DVwG-LoAzeyZlEDmuDpFrLsFLz-D9rxLfSSdAethycrDA0Fhe1j7Az15NYUItJIkvyM5AsC6X0xyjO1LJWoJfbl9cbfaJQ0c3XKRc_NuxPYcDuM15gw0FaTkgUOYezuALPQ","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"DA4MU9NJoDo","kty":"RSA","alg":"RS256","n":"vaugR-F0yLkwgUyJPrIxjUrncPFoGlFyfPWYfVlU4OleYqNnEofoUNI2afIqRQlZgMgfxhknAi6IEhQKdNQGOAqzKoBxEvVK30x4XxMyVPMYYWbTCEEX2K5Kna0wJQ39rsajBWBRusxge_bLydt0dun4ZX4lv_BaCkdKn4TB6x3sQtwPyYrkOj7nykBiLzpcNGYKYbL5B5HGJHbcjXqX6ttvUn7B7E_idcyJbFfcwzrSj87Zdp5aj5LSiIqHtih8Sm2Mch5VQDT_U55UT4n8Rc9K_fJ1bQirXQdZZ9CgU4zcjXx8PnaEpeq18EcXxXsdfCN8o4EBUN7YWog1-65CLw","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"re686ijoKyE","kty":"RSA","alg":"RS384","n":"p3SLWJT-PyQn6n-fvj_s5dNqRJQauAZCC8JFnwUUP6n_LUfCG5tpfRLzZ0yXtsaPfN-z9c8JbXIbsF0HJN3NLTaBOWaZ04yjl3S29_8y-KwOMKlOafuRbYy7sXkicvCnjXRIcV85pAewrpwwHBcI2wDPDbkflwI3m6nurThQAQBDxPWz83QnC_iQ_V3pJGoGYItUGH_sJC06mqATV05dVzHSS0VZSFhEoyEtpykZNnhzgZCOACi4V8P07y0jsxQtqdPYYpqt9qg0Tjp81r-tIIDY7LEWv949rbR3Oad-QBcQC0f4CEapT2nbcVcadODtqPv1pQzSL7sSJ42zATGSxQ","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"jGE5qoPDlnI","kty":"RSA","alg":"RS512","n":"-WuAFX1DLbsMHagMw_NDJA6yxCcIm2SDgbMmDKOwCN4dR0YWdwKzDJ31EeoakDg-T85HaU48R4Kcx1WQUYnly98vDymMFl4Xe6zS9je-Uh3IVfkYJV3pwVKr2gj1hrX7QglIktLg0o0iWulFe1K1NQ5u7Jbe7ZZhOaetlTFH8KUgS78fajfhcFtrXBliqxHTiBz2lMYCj2ntqX8K8ue3_lVLBXm53AJG3T-ymnUd-nxJ-NsdFMSIzQO1-KUona9OgxDpu1cFoQ-YzOteSz2OP58wDl3gL5urIhzK7Hvu3I3okzlL2TyCHmOhLn6HMHr2-mwEgsYYnsEQwzu6bbY8hw","e":"AQAB","key_ops":["verify"],"ext":true},{"kid":"PhN1R2mze2k","kty":"RSA","alg":"RS256","n":"yGhTYJWPKU-n1gnPQPf1_Nr8HBJ6F-IT6PyxLJoURWrd_DvuW0EFQD1JolKAYWakuJAIWGtb8CXjRdzXrEVYNfshb-bBGYGotISxAD2z_KzEtcBya_TwywAQiMYildsAPRZR7HqvxnUw2iFUwec_gw6aBvu3rPcLnj6z2KKDJDFC1P4LHNDArh4EquhkgtzeD5h6-8cCI1iKpb-Op5nCe1DjUNg49L5NZhNtDlhCEb8P2LEbcV8vldIz9gJu0MSf94zzWu2JGsVtVQ29XPO8SQqrKQ5TKClmR1jIIGCF7t4AUoaaL6AA81F3cyEhKB3vN_D8DzEsr7tuwomLFZXmBw","e":"AQAB","key_ops":["verify"],"ext":true}]}},"defaults":{},"registration":{"redirect_uris":["https://localhost:7011/api/oidc/rp/https%3A%2F%2Flocalhost%3A7011"],"client_id":"bc54c25bdca9feab602988743c29af98","client_secret":"8d18dd1c93514d55e4168170239b475f","response_types":["code","id_token token","code id_token token"],"grant_types":["authorization_code","implicit","refresh_token","client_credentials"],"application_type":"web","client_name":"Solid OIDC RP for https://localhost:7011","id_token_signed_response_alg":"RS256","token_endpoint_auth_method":"client_secret_basic","default_max_age":86400,"post_logout_redirect_uris":["https://localhost:7011/goodbye"],"registration_access_token":"eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJodHRwczovL2xvY2FsaG9zdDo3MDExIiwiYXVkIjoiYmM1NGMyNWJkY2E5ZmVhYjYwMjk4ODc0M2MyOWFmOTgiLCJzdWIiOiJiYzU0YzI1YmRjYTlmZWFiNjAyOTg4NzQzYzI5YWY5OCJ9.Ppe3aHFk_0f2VW_y3wYPS9naWh4OEvKG2MFTDt7A8HUppzwf9jGRR9qdgzqCs0lxBF6zHkPFx1eoZ-OQLADzz0YCPfcjgXzIsevoRyGG0xUQCesQbuIeSv-QGtpZI1hUFdzU7s95reu26HBFSng8ZO2uVPwEHzExocFsnFUARXsHBKz5r1OUPXwPOp8jVu2IMp4bDsFnf8alyRsEa5cyJWqR_NcId7x2cPgxygpvJOEq5qcHOnYiNsZwtVqEOt5jID1fwoFNMrXhMoBYaOgwcRePIzAGhMHgOrh8H2gPanpcqByq_ekKFd4yRR1ED4msGDKpJSOYFluF-9gAMxtDJg","registration_client_uri":"https://localhost:7011/register/bc54c25bdca9feab602988743c29af98","client_id_issued_at":1767784836,"client_secret_expires_at":0},"store":{}}
|
|
@@ -497,7 +497,7 @@ describe('AccountManager', () => {
|
|
|
497
497
|
expect(accountManager.passwordResetUrl)
|
|
498
498
|
.to.have.been.calledWith(resetToken, returnToUrl)
|
|
499
499
|
expect(emailService.sendWithTemplate)
|
|
500
|
-
.to.have.been.calledWith('reset-password', expectedEmailData)
|
|
500
|
+
.to.have.been.calledWith('reset-password.mjs', expectedEmailData)
|
|
501
501
|
})
|
|
502
502
|
})
|
|
503
503
|
|
|
@@ -607,4 +607,4 @@ describe('AccountManager', () => {
|
|
|
607
607
|
})
|
|
608
608
|
})
|
|
609
609
|
})
|
|
610
|
-
})
|
|
610
|
+
})
|
|
@@ -1,4 +1,3 @@
|
|
|
1
|
-
/* eslint-disable no-unused-expressions */
|
|
2
1
|
import { fileURLToPath } from 'url'
|
|
3
2
|
import path from 'path'
|
|
4
3
|
import chai from 'chai'
|
|
@@ -74,7 +73,7 @@ describe('Account Creation Welcome Email', () => {
|
|
|
74
73
|
|
|
75
74
|
return accountManager.sendWelcomeEmail(newUser)
|
|
76
75
|
.then(result => {
|
|
77
|
-
expect(sendWithTemplate).to.be.calledWith('welcome', expectedEmailData)
|
|
76
|
+
expect(sendWithTemplate).to.be.calledWith('welcome.mjs', expectedEmailData)
|
|
78
77
|
})
|
|
79
78
|
})
|
|
80
79
|
})
|
package/test/unit/utils-test.mjs
CHANGED
|
@@ -1,9 +1,7 @@
|
|
|
1
1
|
import { describe, it } from 'mocha'
|
|
2
2
|
import { assert } from 'chai'
|
|
3
|
-
import fetch from 'node-fetch'
|
|
4
3
|
|
|
5
4
|
import * as utils from '../../lib/utils.mjs'
|
|
6
|
-
const { Headers } = fetch
|
|
7
5
|
|
|
8
6
|
const {
|
|
9
7
|
pathBasename,
|
|
@@ -111,4 +109,4 @@ describe('Utility functions', function () {
|
|
|
111
109
|
})
|
|
112
110
|
})
|
|
113
111
|
})
|
|
114
|
-
})
|
|
112
|
+
})
|
package/test/utils/index.mjs
CHANGED
package/test/utils.mjs
CHANGED
|
@@ -5,7 +5,6 @@ import path from 'path'
|
|
|
5
5
|
import dns from 'dns'
|
|
6
6
|
import https from 'https'
|
|
7
7
|
import { createRequire } from 'module'
|
|
8
|
-
import fetch from 'node-fetch'
|
|
9
8
|
import rimraf from 'rimraf'
|
|
10
9
|
import fse from 'fs-extra'
|
|
11
10
|
import Provider from '@solid/oidc-op'
|
|
@@ -50,7 +49,7 @@ export function cleanDir (dirPath) {
|
|
|
50
49
|
}
|
|
51
50
|
|
|
52
51
|
export function write (text, file) {
|
|
53
|
-
console.log('Writing to', path.join(TEST_ROOT, file))
|
|
52
|
+
// console.log('Writing to', path.join(TEST_ROOT, file))
|
|
54
53
|
// fs.mkdirSync(path.dirname(path.join(TEST_ROOT, file), { recursive: true }))
|
|
55
54
|
return fs.writeFileSync(path.join(TEST_ROOT, file), text)
|
|
56
55
|
}
|
|
@@ -62,7 +61,7 @@ export function cp (src, dest) {
|
|
|
62
61
|
}
|
|
63
62
|
|
|
64
63
|
export function read (file) {
|
|
65
|
-
console.log('Reading from', path.join(TEST_ROOT, file))
|
|
64
|
+
// console.log('Reading from', path.join(TEST_ROOT, file))
|
|
66
65
|
return fs.readFileSync(path.join(TEST_ROOT, file), {
|
|
67
66
|
encoding: 'utf8'
|
|
68
67
|
})
|
|
@@ -114,7 +113,7 @@ export function loadProvider (configPath) {
|
|
|
114
113
|
}
|
|
115
114
|
|
|
116
115
|
export function createServer (options) {
|
|
117
|
-
console.log('Creating server with root:', options.root || process.cwd())
|
|
116
|
+
// console.log('Creating server with root:', options.root || process.cwd())
|
|
118
117
|
return ldnode.createServer(options)
|
|
119
118
|
}
|
|
120
119
|
|
package/test/validate-turtle.mjs
CHANGED
|
@@ -1,67 +0,0 @@
|
|
|
1
|
-
/* global location, alert, solid */
|
|
2
|
-
/* Provide functionality for authentication buttons */
|
|
3
|
-
|
|
4
|
-
(({ auth }) => {
|
|
5
|
-
// Wire up DOM elements
|
|
6
|
-
const [
|
|
7
|
-
loginButton,
|
|
8
|
-
logoutButton,
|
|
9
|
-
registerButton,
|
|
10
|
-
accountSettings,
|
|
11
|
-
loggedInContainer,
|
|
12
|
-
profileLink
|
|
13
|
-
] = [
|
|
14
|
-
'login',
|
|
15
|
-
'logout',
|
|
16
|
-
'register',
|
|
17
|
-
'account-settings',
|
|
18
|
-
'loggedIn',
|
|
19
|
-
'profileLink'
|
|
20
|
-
].map(id => document.getElementById(id) || document.createElement('a'))
|
|
21
|
-
loginButton.addEventListener('click', login)
|
|
22
|
-
logoutButton.addEventListener('click', logout)
|
|
23
|
-
registerButton.addEventListener('click', register)
|
|
24
|
-
|
|
25
|
-
// Track authentication status and update UI
|
|
26
|
-
auth.trackSession(session => {
|
|
27
|
-
const loggedIn = !!session
|
|
28
|
-
const isOwner = loggedIn && new URL(session.webId).origin === location.origin
|
|
29
|
-
loginButton.classList.toggle('hidden', loggedIn)
|
|
30
|
-
logoutButton.classList.toggle('hidden', !loggedIn)
|
|
31
|
-
registerButton.classList.toggle('hidden', loggedIn)
|
|
32
|
-
accountSettings.classList.toggle('hidden', !isOwner)
|
|
33
|
-
loggedInContainer.classList.toggle('hidden', !loggedIn)
|
|
34
|
-
if (session) {
|
|
35
|
-
profileLink.href = session.webId
|
|
36
|
-
profileLink.innerText = session.webId
|
|
37
|
-
}
|
|
38
|
-
})
|
|
39
|
-
|
|
40
|
-
// Log the user in on the client and the server
|
|
41
|
-
async function login () {
|
|
42
|
-
alert(`login from this page is no more possible.\n\nYou must ask the pod owner to modify this page or remove it.`)
|
|
43
|
-
/* deprecated since inrupt/solid-auth-client
|
|
44
|
-
const session = await auth.popupLogin()
|
|
45
|
-
if (session) {
|
|
46
|
-
// Make authenticated request to the server to establish a session cookie
|
|
47
|
-
const { status } = await auth.fetch(location, { method: 'HEAD' })
|
|
48
|
-
if (status === 401) {
|
|
49
|
-
alert(`Invalid login.\n\nDid you set ${session.idp} as your OIDC provider in your profile ${session.webId}?`)
|
|
50
|
-
await auth.logout()
|
|
51
|
-
}
|
|
52
|
-
location.reload()
|
|
53
|
-
} */
|
|
54
|
-
}
|
|
55
|
-
|
|
56
|
-
// Log the user out from the client and the server
|
|
57
|
-
async function logout () {
|
|
58
|
-
await auth.logout()
|
|
59
|
-
location.reload()
|
|
60
|
-
}
|
|
61
|
-
|
|
62
|
-
// Redirect to the registration page
|
|
63
|
-
function register () {
|
|
64
|
-
const registration = new URL('/register', location)
|
|
65
|
-
location.href = registration
|
|
66
|
-
}
|
|
67
|
-
})(solid)
|
|
@@ -1,44 +0,0 @@
|
|
|
1
|
-
'use strict'
|
|
2
|
-
var keyname = 'SolidServerRootRedirectLink';
|
|
3
|
-
function register() {
|
|
4
|
-
alert(2); window.location.href = "/register";
|
|
5
|
-
}
|
|
6
|
-
document.addEventListener('DOMContentLoaded', async function() {
|
|
7
|
-
const authn = UI.authn
|
|
8
|
-
const authSession = UI.authn.authSession
|
|
9
|
-
|
|
10
|
-
if (!authn.currentUser()) await authn.checkUser();
|
|
11
|
-
let user = authn.currentUser();
|
|
12
|
-
|
|
13
|
-
// IF LOGGED IN: SET SolidServerRootRedirectLink. LOGOUT
|
|
14
|
-
if( user ) {
|
|
15
|
-
window.localStorage.setItem(keyname, user.uri);
|
|
16
|
-
await authSession.logout();
|
|
17
|
-
}
|
|
18
|
-
else {
|
|
19
|
-
let webId = window.localStorage.getItem(keyname);
|
|
20
|
-
|
|
21
|
-
// IF NOT LOGGED IN AND COOKIE EXISTS: REMOVE COOKIE, HIDE WELCOME, SHOW LINK TO PROFILE
|
|
22
|
-
if( webId ) {
|
|
23
|
-
window.localStorage.removeItem(keyname);
|
|
24
|
-
document.getElementById('loggedIn').style.display = "block";
|
|
25
|
-
document.getElementById('loggedIn').innerHTML = `<p>Your WebID is : <a href="${webId}">${webId}</a>.</p> <p>Visit your profile to log into your Pod.</p>`;
|
|
26
|
-
}
|
|
27
|
-
|
|
28
|
-
// IF NOT LOGGED IN AND COOKIE DOES NOT EXIST
|
|
29
|
-
// SHOW WELCOME, SHOW LOGIN BUTTON
|
|
30
|
-
// HIDE LOGIN BUTTON, ADD REGISTER BUTTON
|
|
31
|
-
else {
|
|
32
|
-
let loginArea = document.getElementById('loginStatusArea');
|
|
33
|
-
let html = `<input type="button" onclick="window.location.href='/register'" value="Register to get a Pod" class="register-button" style="padding: 1em; border-radius:0.2em; font-size: 100%;margin: 0.75em 0 0.75em 0.5em !important; padding: 0.5em !important;background-color: #efe;">`
|
|
34
|
-
let span = document.createElement("span")
|
|
35
|
-
span.innerHTML = html
|
|
36
|
-
loginArea.appendChild(span);
|
|
37
|
-
loginArea.appendChild(UI.login.loginStatusBox(document, null, {}))
|
|
38
|
-
const logInButton = loginArea.querySelectorAll('input')[1];
|
|
39
|
-
logInButton.value = "Log in to see your WebID";
|
|
40
|
-
const signUpButton = loginArea.querySelectorAll('input')[2];
|
|
41
|
-
signUpButton.style.display = "none";
|
|
42
|
-
}
|
|
43
|
-
}
|
|
44
|
-
})
|