Auto-commit 2026-04-29 16:31
This commit is contained in:
208
node_modules/openid-client/lib/helpers/client.js
generated
vendored
Normal file
208
node_modules/openid-client/lib/helpers/client.js
generated
vendored
Normal file
@@ -0,0 +1,208 @@
|
||||
const jose = require('jose');
|
||||
|
||||
const { RPError } = require('../errors');
|
||||
|
||||
const { assertIssuerConfiguration } = require('./assert');
|
||||
const { random } = require('./generators');
|
||||
const now = require('./unix_timestamp');
|
||||
const request = require('./request');
|
||||
const { keystores } = require('./weak_cache');
|
||||
const merge = require('./merge');
|
||||
|
||||
// TODO: in v6.x additionally encode the `- _ . ! ~ * ' ( )` characters
|
||||
// https://github.com/panva/node-openid-client/commit/5a2ea80ef5e59ec0c03dbd97d82f551e24a9d348
|
||||
const formUrlEncode = (value) => encodeURIComponent(value).replace(/%20/g, '+');
|
||||
|
||||
async function clientAssertion(endpoint, payload) {
|
||||
let alg = this[`${endpoint}_endpoint_auth_signing_alg`];
|
||||
if (!alg) {
|
||||
assertIssuerConfiguration(
|
||||
this.issuer,
|
||||
`${endpoint}_endpoint_auth_signing_alg_values_supported`,
|
||||
);
|
||||
}
|
||||
|
||||
if (this[`${endpoint}_endpoint_auth_method`] === 'client_secret_jwt') {
|
||||
if (!alg) {
|
||||
const supported = this.issuer[`${endpoint}_endpoint_auth_signing_alg_values_supported`];
|
||||
alg =
|
||||
Array.isArray(supported) && supported.find((signAlg) => /^HS(?:256|384|512)/.test(signAlg));
|
||||
}
|
||||
|
||||
if (!alg) {
|
||||
throw new RPError(
|
||||
`failed to determine a JWS Algorithm to use for ${
|
||||
this[`${endpoint}_endpoint_auth_method`]
|
||||
} Client Assertion`,
|
||||
);
|
||||
}
|
||||
|
||||
return new jose.CompactSign(Buffer.from(JSON.stringify(payload)))
|
||||
.setProtectedHeader({ alg })
|
||||
.sign(this.secretForAlg(alg));
|
||||
}
|
||||
|
||||
const keystore = await keystores.get(this);
|
||||
|
||||
if (!keystore) {
|
||||
throw new TypeError('no client jwks provided for signing a client assertion with');
|
||||
}
|
||||
|
||||
if (!alg) {
|
||||
const supported = this.issuer[`${endpoint}_endpoint_auth_signing_alg_values_supported`];
|
||||
alg =
|
||||
Array.isArray(supported) &&
|
||||
supported.find((signAlg) => keystore.get({ alg: signAlg, use: 'sig' }));
|
||||
}
|
||||
|
||||
if (!alg) {
|
||||
throw new RPError(
|
||||
`failed to determine a JWS Algorithm to use for ${
|
||||
this[`${endpoint}_endpoint_auth_method`]
|
||||
} Client Assertion`,
|
||||
);
|
||||
}
|
||||
|
||||
const key = keystore.get({ alg, use: 'sig' });
|
||||
if (!key) {
|
||||
throw new RPError(
|
||||
`no key found in client jwks to sign a client assertion with using alg ${alg}`,
|
||||
);
|
||||
}
|
||||
|
||||
return new jose.CompactSign(Buffer.from(JSON.stringify(payload)))
|
||||
.setProtectedHeader({ alg, kid: key.jwk && key.jwk.kid })
|
||||
.sign(await key.keyObject(alg));
|
||||
}
|
||||
|
||||
async function authFor(endpoint, { clientAssertionPayload } = {}) {
|
||||
const authMethod = this[`${endpoint}_endpoint_auth_method`];
|
||||
switch (authMethod) {
|
||||
case 'self_signed_tls_client_auth':
|
||||
case 'tls_client_auth':
|
||||
case 'none':
|
||||
return { form: { client_id: this.client_id } };
|
||||
case 'client_secret_post':
|
||||
if (typeof this.client_secret !== 'string') {
|
||||
throw new TypeError(
|
||||
'client_secret_post client authentication method requires a client_secret',
|
||||
);
|
||||
}
|
||||
return { form: { client_id: this.client_id, client_secret: this.client_secret } };
|
||||
case 'private_key_jwt':
|
||||
case 'client_secret_jwt': {
|
||||
const timestamp = now();
|
||||
|
||||
const assertion = await clientAssertion.call(this, endpoint, {
|
||||
iat: timestamp,
|
||||
exp: timestamp + 60,
|
||||
jti: random(),
|
||||
iss: this.client_id,
|
||||
sub: this.client_id,
|
||||
aud: this.issuer.issuer,
|
||||
...clientAssertionPayload,
|
||||
});
|
||||
|
||||
return {
|
||||
form: {
|
||||
client_id: this.client_id,
|
||||
client_assertion: assertion,
|
||||
client_assertion_type: 'urn:ietf:params:oauth:client-assertion-type:jwt-bearer',
|
||||
},
|
||||
};
|
||||
}
|
||||
case 'client_secret_basic': {
|
||||
// This is correct behaviour, see https://tools.ietf.org/html/rfc6749#section-2.3.1 and the
|
||||
// related appendix. (also https://github.com/panva/node-openid-client/pull/91)
|
||||
// > The client identifier is encoded using the
|
||||
// > "application/x-www-form-urlencoded" encoding algorithm per
|
||||
// > Appendix B, and the encoded value is used as the username; the client
|
||||
// > password is encoded using the same algorithm and used as the
|
||||
// > password.
|
||||
if (typeof this.client_secret !== 'string') {
|
||||
throw new TypeError(
|
||||
'client_secret_basic client authentication method requires a client_secret',
|
||||
);
|
||||
}
|
||||
const encoded = `${formUrlEncode(this.client_id)}:${formUrlEncode(this.client_secret)}`;
|
||||
const value = Buffer.from(encoded).toString('base64');
|
||||
return { headers: { Authorization: `Basic ${value}` } };
|
||||
}
|
||||
default: {
|
||||
throw new TypeError(`missing, or unsupported, ${endpoint}_endpoint_auth_method`);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
function resolveResponseType() {
|
||||
const { length, 0: value } = this.response_types;
|
||||
|
||||
if (length === 1) {
|
||||
return value;
|
||||
}
|
||||
|
||||
return undefined;
|
||||
}
|
||||
|
||||
function resolveRedirectUri() {
|
||||
const { length, 0: value } = this.redirect_uris || [];
|
||||
|
||||
if (length === 1) {
|
||||
return value;
|
||||
}
|
||||
|
||||
return undefined;
|
||||
}
|
||||
|
||||
async function authenticatedPost(
|
||||
endpoint,
|
||||
opts,
|
||||
{ clientAssertionPayload, endpointAuthMethod = endpoint, DPoP } = {},
|
||||
) {
|
||||
const auth = await authFor.call(this, endpointAuthMethod, { clientAssertionPayload });
|
||||
const requestOpts = merge(opts, auth);
|
||||
|
||||
const mTLS =
|
||||
this[`${endpointAuthMethod}_endpoint_auth_method`].includes('tls_client_auth') ||
|
||||
(endpoint === 'token' && this.tls_client_certificate_bound_access_tokens);
|
||||
|
||||
let targetUrl;
|
||||
if (mTLS && this.issuer.mtls_endpoint_aliases) {
|
||||
targetUrl = this.issuer.mtls_endpoint_aliases[`${endpoint}_endpoint`];
|
||||
}
|
||||
|
||||
targetUrl = targetUrl || this.issuer[`${endpoint}_endpoint`];
|
||||
|
||||
if ('form' in requestOpts) {
|
||||
for (const [key, value] of Object.entries(requestOpts.form)) {
|
||||
if (typeof value === 'undefined') {
|
||||
delete requestOpts.form[key];
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return request.call(
|
||||
this,
|
||||
{
|
||||
...requestOpts,
|
||||
method: 'POST',
|
||||
url: targetUrl,
|
||||
headers: {
|
||||
...(endpoint !== 'revocation'
|
||||
? {
|
||||
Accept: 'application/json',
|
||||
}
|
||||
: undefined),
|
||||
...requestOpts.headers,
|
||||
},
|
||||
},
|
||||
{ mTLS, DPoP },
|
||||
);
|
||||
}
|
||||
|
||||
module.exports = {
|
||||
resolveResponseType,
|
||||
resolveRedirectUri,
|
||||
authFor,
|
||||
authenticatedPost,
|
||||
};
|
||||
Reference in New Issue
Block a user