2017-11-16 05:39:10 +00:00
|
|
|
/ * global Promise */
|
2017-02-21 21:23:22 +00:00
|
|
|
;(function (exports) {
|
|
|
|
'use strict';
|
|
|
|
|
2017-05-08 22:18:49 +00:00
|
|
|
if ('undefined' !== typeof window && 'https:' !== window.location.protocol) {
|
|
|
|
window.alert("You must use https. We suggest using caddy as your webserver (or serve-https if testing locally)");
|
|
|
|
}
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
var OAUTH3 = exports.OAUTH3 = {
|
|
|
|
clientUri: function (location) {
|
2017-03-21 05:29:03 +00:00
|
|
|
return OAUTH3.uri.normalize(location.host + (location.pathname || ''));
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
, error: {
|
|
|
|
parse: function (providerUri, params) {
|
|
|
|
var err = new Error(params.error_description || params.error.message || "Unknown error with provider '" + providerUri + "'");
|
|
|
|
err.uri = params.error_uri || params.error.uri;
|
|
|
|
err.code = params.error.code || params.error;
|
|
|
|
return err;
|
|
|
|
}
|
2017-11-30 23:12:28 +00:00
|
|
|
, create: function (opts) {
|
|
|
|
var err = new Error(opts.message);
|
|
|
|
err.code = opts.code;
|
|
|
|
err.uri = opts.uri || opts.url;
|
|
|
|
err.subErr = opts.subErr;
|
|
|
|
return err;
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-03-13 19:37:06 +00:00
|
|
|
, _binStr: {
|
|
|
|
bufferToBinStr: function (buf) {
|
|
|
|
return Array.prototype.map.call(new Uint8Array(buf), function(ch) {
|
|
|
|
return String.fromCharCode(ch);
|
|
|
|
}).join('');
|
|
|
|
}
|
|
|
|
, binStrToBuffer: function (str) {
|
|
|
|
var buf;
|
|
|
|
|
|
|
|
if ('undefined' !== typeof Uint8Array) {
|
|
|
|
buf = new Uint8Array(str.length);
|
|
|
|
} else {
|
|
|
|
buf = [];
|
|
|
|
}
|
|
|
|
|
|
|
|
Array.prototype.forEach.call(str, function (ch, ind) {
|
|
|
|
buf[ind] = ch.charCodeAt(0);
|
|
|
|
});
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, _base64: {
|
|
|
|
atob: function (base64) {
|
|
|
|
// atob must be called from the global context
|
|
|
|
// http://stackoverflow.com/questions/9677985/uncaught-typeerror-illegal-invocation-in-chrome
|
|
|
|
return (exports.atob || require('atob'))(base64);
|
|
|
|
}
|
2017-02-21 23:54:37 +00:00
|
|
|
, btoa: function (b64) {
|
|
|
|
// for directive passing in .well-known/oauth3
|
|
|
|
// http://stackoverflow.com/questions/9677985/uncaught-typeerror-illegal-invocation-in-chrome
|
|
|
|
return (exports.btoa || require('btoa'))(b64);
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, decodeUrlSafe: function (b64) {
|
|
|
|
// URL-safe Base64 to Base64
|
|
|
|
// https://en.wikipedia.org/wiki/Base64
|
|
|
|
// https://gist.github.com/catwell/3046205
|
|
|
|
var mod = b64.length % 4;
|
|
|
|
if (2 === mod) { b64 += '=='; }
|
|
|
|
if (3 === mod) { b64 += '='; }
|
|
|
|
b64 = b64.replace(/-/g, '+').replace(/_/g, '/');
|
|
|
|
return OAUTH3._base64.atob(b64);
|
|
|
|
}
|
2017-02-21 23:54:37 +00:00
|
|
|
, encodeUrlSafe: function (b64) {
|
|
|
|
// for directive passing in .well-known/oauth3
|
|
|
|
// Base64 to URL-safe Base64
|
2017-03-02 07:37:45 +00:00
|
|
|
b64 = OAUTH3._base64.btoa(b64);
|
2017-02-21 23:54:37 +00:00
|
|
|
b64 = b64.replace(/\+/g, '-').replace(/\//g, '_');
|
|
|
|
b64 = b64.replace(/=+/g, '');
|
2017-03-02 07:37:45 +00:00
|
|
|
return b64;
|
2017-02-21 23:54:37 +00:00
|
|
|
}
|
2017-03-13 19:37:06 +00:00
|
|
|
, urlSafeToBuffer: function (str) {
|
|
|
|
return OAUTH3._binStr.binStrToBuffer(OAUTH3._base64.decodeUrlSafe(str));
|
|
|
|
}
|
|
|
|
, bufferToUrlSafe: function (buf) {
|
|
|
|
return OAUTH3._base64.encodeUrlSafe(OAUTH3._binStr.bufferToBinStr(buf));
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
, uri: {
|
|
|
|
normalize: function (uri) {
|
|
|
|
if ('string' !== typeof uri) {
|
2017-07-27 00:15:09 +00:00
|
|
|
throw new Error("attempted to normalize non-string URI: "+JSON.stringify(uri));
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
// tested with
|
|
|
|
// example.com
|
|
|
|
// example.com/
|
|
|
|
// http://example.com
|
|
|
|
// https://example.com/
|
|
|
|
return uri
|
|
|
|
.replace(/^(https?:\/\/)?/i, '')
|
|
|
|
.replace(/\/?$/, '')
|
|
|
|
;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, url: {
|
|
|
|
normalize: function (url) {
|
|
|
|
if ('string' !== typeof url) {
|
2017-07-27 00:15:09 +00:00
|
|
|
throw new Error("attempted to normalize non-string URL: "+JSON.stringify(url));
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
// tested with
|
|
|
|
// example.com
|
|
|
|
// example.com/
|
|
|
|
// http://example.com
|
|
|
|
// https://example.com/
|
|
|
|
return url
|
|
|
|
.replace(/^(https?:\/\/)?/i, 'https://')
|
|
|
|
.replace(/\/?$/, '')
|
|
|
|
;
|
|
|
|
}
|
|
|
|
, resolve: function (base, next) {
|
|
|
|
if (/^https:\/\//i.test(next)) {
|
|
|
|
return next;
|
|
|
|
}
|
|
|
|
return this.normalize(base) + '/' + this._normalizePath(next);
|
|
|
|
}
|
|
|
|
, _normalizePath: function (path) {
|
|
|
|
return path.replace(/^\//, '').replace(/\/$/, '');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, query: {
|
2017-02-21 23:54:37 +00:00
|
|
|
parse: function (search) {
|
|
|
|
// needed for .well-known/oauth3
|
|
|
|
// parse a query or a hash
|
|
|
|
if (-1 !== ['#', '?'].indexOf(search[0])) {
|
|
|
|
search = search.substring(1);
|
|
|
|
}
|
|
|
|
// Solve for case of search within hash
|
|
|
|
// example: #/authorization_dialog/?state=...&redirect_uri=...
|
|
|
|
var queryIndex = search.indexOf('?');
|
|
|
|
if (-1 !== queryIndex) {
|
|
|
|
search = search.substr(queryIndex + 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
var args = search.split('&');
|
|
|
|
var argsParsed = {};
|
|
|
|
var i, arg, kvp, key, value;
|
|
|
|
|
|
|
|
for (i = 0; i < args.length; i += 1) {
|
|
|
|
arg = args[i];
|
|
|
|
if (-1 === arg.indexOf('=')) {
|
|
|
|
argsParsed[decodeURIComponent(arg).trim()] = true;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
kvp = arg.split('=');
|
|
|
|
key = decodeURIComponent(kvp[0]).trim();
|
|
|
|
value = decodeURIComponent(kvp[1]).trim();
|
|
|
|
argsParsed[key] = value;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return argsParsed;
|
|
|
|
}
|
|
|
|
, stringify: function (params) {
|
2017-02-21 21:23:22 +00:00
|
|
|
var qs = [];
|
|
|
|
|
|
|
|
Object.keys(params).forEach(function (key) {
|
|
|
|
// TODO nullify instead?
|
|
|
|
if ('undefined' === typeof params[key]) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ('scope' === key) {
|
|
|
|
params[key] = OAUTH3.scope.stringify(params[key]);
|
|
|
|
}
|
|
|
|
|
|
|
|
qs.push(encodeURIComponent(key) + '=' + encodeURIComponent(params[key]));
|
|
|
|
});
|
|
|
|
|
|
|
|
return qs.join('&');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, scope: {
|
2017-07-26 22:27:03 +00:00
|
|
|
parse: function (scope) {
|
2017-11-29 04:17:43 +00:00
|
|
|
return (scope||'').toString().split(/[+, ]+/g);
|
2017-07-26 22:27:03 +00:00
|
|
|
}
|
|
|
|
, stringify: function (scope) {
|
2017-02-21 21:23:22 +00:00
|
|
|
if (Array.isArray(scope)) {
|
2017-07-26 22:27:03 +00:00
|
|
|
scope = scope.join(',');
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
return scope;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, randomState: function () {
|
|
|
|
// TODO put in different file for browser vs node
|
|
|
|
try {
|
|
|
|
return Array.prototype.slice.call(
|
2017-03-20 23:55:00 +00:00
|
|
|
OAUTH3._browser.window.crypto.getRandomValues(new Uint8Array(16))
|
2017-02-21 21:23:22 +00:00
|
|
|
).map(function (ch) { return (ch).toString(16); }).join('');
|
|
|
|
} catch(e) {
|
|
|
|
return OAUTH3.utils._insecureRandomState();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, _insecureRandomState: function () {
|
|
|
|
var i;
|
|
|
|
var ch;
|
|
|
|
var str;
|
|
|
|
// TODO use fisher-yates on 0..255 and select [0] 16 times
|
|
|
|
// [security] https://medium.com/@betable/tifu-by-using-math-random-f1c308c4fd9d#.5qx0bf95a
|
|
|
|
// https://github.com/v8/v8/blob/b0e4dce6091a8777bda80d962df76525dc6c5ea9/src/js/math.js#L135-L144
|
|
|
|
// Note: newer versions of v8 do not have this bug, but other engines may still
|
|
|
|
console.warn('[security] crypto.getRandomValues() failed, falling back to Math.random()');
|
|
|
|
str = '';
|
|
|
|
for (i = 0; i < 32; i += 1) {
|
|
|
|
ch = Math.round(Math.random() * 255).toString(16);
|
|
|
|
if (ch.length < 2) { ch = '0' + ch; }
|
|
|
|
str += ch;
|
|
|
|
}
|
|
|
|
return str;
|
|
|
|
}
|
2017-11-30 23:12:28 +00:00
|
|
|
, jwk: {
|
|
|
|
get: function (decoded) {
|
|
|
|
return OAUTH3.discover(decoded.payload.iss).then(function (directives) {
|
2017-11-30 23:35:59 +00:00
|
|
|
var urlObj = OAUTH3.urls.jwk(directives, decoded);
|
2017-11-30 23:12:28 +00:00
|
|
|
return OAUTH3.request(urlObj).catch(function (err) {
|
2017-12-02 08:40:30 +00:00
|
|
|
return OAUTH3.PromiseA.reject({
|
2017-11-30 23:12:28 +00:00
|
|
|
message: 'failed to retrieve public key from token issuer'
|
|
|
|
, code: 'E_NO_PUB_KEY'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_NO_PUB_KEY'
|
|
|
|
, subErr: err.toString()
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}, function (err) {
|
2017-12-02 08:40:30 +00:00
|
|
|
return OAUTH3.PromiseA.reject({
|
2017-11-30 23:12:28 +00:00
|
|
|
message: 'token issuer is not a valid OAuth3 provider'
|
|
|
|
, code: 'E_INVALID_ISS'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_INVALID_ISS'
|
|
|
|
, subErr: err.toString()
|
|
|
|
});
|
|
|
|
}).then(function (res) {
|
|
|
|
if (res.data.error) {
|
2017-12-02 08:40:30 +00:00
|
|
|
return OAUTH3.PromiseA.reject(res.data.error);
|
2017-11-30 23:12:28 +00:00
|
|
|
}
|
|
|
|
return res.data;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, verifyToken: function (token) {
|
|
|
|
var decoded;
|
|
|
|
|
|
|
|
if (!token) {
|
2017-12-02 08:40:30 +00:00
|
|
|
return OAUTH3.PromiseA.reject({
|
2017-11-30 23:12:28 +00:00
|
|
|
message: 'no token provided'
|
|
|
|
, code: 'E_NO_TOKEN'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_NO_TOKEN'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
decoded = OAUTH3.jwt.decode(token, {complete: true});
|
|
|
|
} catch (e) {}
|
|
|
|
if (!decoded) {
|
2017-12-02 08:40:30 +00:00
|
|
|
return OAUTH3.PromiseA.reject({
|
2017-11-30 23:12:28 +00:00
|
|
|
message: 'provided token not a JSON Web Token'
|
|
|
|
, code: 'E_NOT_JWT'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_NOT_JWT'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return OAUTH3.jwk.get(decoded).then(function (jwk) {
|
|
|
|
var opts = {};
|
|
|
|
if (Array.isArray(jwk.alg)) {
|
|
|
|
opts.algorithms = jwk.alg;
|
|
|
|
} else if (typeof jwk.alg === 'string') {
|
|
|
|
opts.algorithms = [ jwk.alg ];
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
return OAUTH3.jwt.verify(token, jwk, opts);
|
|
|
|
} catch (err) {
|
2017-12-02 08:40:30 +00:00
|
|
|
return OAUTH3.PromiseA.reject({
|
2017-11-30 23:12:28 +00:00
|
|
|
message: 'token verification failed'
|
|
|
|
, code: 'E_INVALID_TOKEN'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_INVALID_TOKEN'
|
|
|
|
, subErr: err.toString()
|
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, jwt: {
|
|
|
|
// decode only (no verification)
|
2017-07-28 19:02:36 +00:00
|
|
|
decode: function (token, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
|
|
|
|
// 'abc.qrs.xyz'
|
|
|
|
// [ 'abc', 'qrs', 'xyz' ]
|
2017-07-25 23:18:14 +00:00
|
|
|
// {}
|
2017-07-28 19:02:36 +00:00
|
|
|
var parts = token.split(/\./g);
|
2017-07-25 23:18:14 +00:00
|
|
|
var err;
|
|
|
|
if (parts.length !== 3) {
|
|
|
|
err = new Error("Invalid JWT: required 3 '.' separated components not "+parts.length);
|
|
|
|
err.code = 'E_INVALID_JWT';
|
|
|
|
throw err;
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-07-28 19:02:36 +00:00
|
|
|
if (!opts || !opts.complete) {
|
|
|
|
return JSON.parse(OAUTH3._base64.decodeUrlSafe(parts[1]));
|
|
|
|
}
|
|
|
|
return {
|
|
|
|
header: JSON.parse(OAUTH3._base64.decodeUrlSafe(parts[0]))
|
|
|
|
, payload: JSON.parse(OAUTH3._base64.decodeUrlSafe(parts[1]))
|
|
|
|
};
|
2017-03-13 19:37:06 +00:00
|
|
|
}
|
2017-11-30 23:12:28 +00:00
|
|
|
, verify: function (token, jwk/*, opts*/) {
|
2017-07-28 19:02:36 +00:00
|
|
|
if (!OAUTH3.crypto) {
|
|
|
|
return OAUTH3.PromiseA.reject(new Error("OAuth3 crypto library unavailable"));
|
|
|
|
}
|
|
|
|
jwk = jwk.publicKey || jwk;
|
|
|
|
|
2017-03-21 00:18:47 +00:00
|
|
|
var parts = token.split(/\./g);
|
2017-03-13 19:37:06 +00:00
|
|
|
var data = OAUTH3._binStr.binStrToBuffer(parts.slice(0, 2).join('.'));
|
|
|
|
var signature = OAUTH3._base64.urlSafeToBuffer(parts[2]);
|
2017-11-30 23:12:28 +00:00
|
|
|
var decoded = OAUTH3.jwt.decode(token, { complete: true });
|
2017-03-13 19:37:06 +00:00
|
|
|
|
2017-11-30 23:12:28 +00:00
|
|
|
// TODO disallow none and hmac algorithms
|
|
|
|
// https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
|
|
|
|
if (!decoded.header.alg || 'none' === decoded.header.alg.toString() || /^HS/i.test(decoded.header.alg.toString())) {
|
|
|
|
throw new Error("token algorithm '" + decoded.header.alg + "' is not accepted");
|
|
|
|
}
|
2017-07-28 19:02:36 +00:00
|
|
|
return OAUTH3.crypto.core.verify(jwk, data, signature).then(function () {
|
2017-11-30 23:12:28 +00:00
|
|
|
return decoded;
|
2017-07-28 19:02:36 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
, sign: function (payload, jwk) {
|
|
|
|
if (!OAUTH3.crypto) {
|
|
|
|
return OAUTH3.PromiseA.reject(new Error("OAuth3 crypto library unavailable"));
|
|
|
|
}
|
2017-08-01 21:08:21 +00:00
|
|
|
jwk = jwk.private_key || jwk.privateKey || jwk;
|
2017-07-28 19:02:36 +00:00
|
|
|
|
|
|
|
var prom;
|
|
|
|
if (jwk.kid) {
|
|
|
|
prom = OAUTH3.PromiseA.resolve(jwk.kid);
|
|
|
|
} else {
|
|
|
|
prom = OAUTH3.crypto.thumbprintJwk(jwk);
|
|
|
|
}
|
|
|
|
|
|
|
|
return prom.then(function (kid) {
|
|
|
|
// Currently the crypto part of the OAuth3 library only supports ES256
|
|
|
|
var header = {type: 'JWT', alg: 'ES256', kid: kid};
|
|
|
|
var input = [
|
|
|
|
OAUTH3._base64.encodeUrlSafe(JSON.stringify(header, null))
|
|
|
|
, OAUTH3._base64.encodeUrlSafe(JSON.stringify(payload, null))
|
|
|
|
].join('.');
|
|
|
|
|
|
|
|
return OAUTH3.crypto.core.sign(jwk, OAUTH3._binStr.binStrToBuffer(input))
|
|
|
|
.then(OAUTH3._base64.bufferToUrlSafe)
|
|
|
|
.then(function (signature) {
|
|
|
|
return input + '.' + signature;
|
|
|
|
});
|
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-10-19 21:27:35 +00:00
|
|
|
, freshness: function (tokenMeta, staletime, now) {
|
|
|
|
// If the token doesn't expire then it's always fresh.
|
|
|
|
if (!tokenMeta.exp) {
|
2017-02-21 21:23:22 +00:00
|
|
|
return 'fresh';
|
|
|
|
}
|
|
|
|
|
2017-10-19 21:27:35 +00:00
|
|
|
staletime = staletime || (15 * 60);
|
|
|
|
now = now || Date.now();
|
|
|
|
// This particular number used to check if time is in milliseconds or seconds will work
|
|
|
|
// for any date between the years 1973 and 5138.
|
|
|
|
if (now > 1e11) {
|
|
|
|
now = Math.round(now / 1000);
|
|
|
|
}
|
|
|
|
var exp = parseInt(tokenMeta.exp, 10) || 0;
|
|
|
|
if (exp < now) {
|
2017-02-21 21:23:22 +00:00
|
|
|
return 'expired';
|
2017-10-19 21:27:35 +00:00
|
|
|
} else if (exp < now + staletime) {
|
|
|
|
return 'stale';
|
|
|
|
} else {
|
|
|
|
return 'fresh';
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, urls: {
|
2017-11-25 08:32:13 +00:00
|
|
|
rpc: function (providerUri, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
if (!providerUri) {
|
2017-11-25 07:46:37 +00:00
|
|
|
throw new Error("cannot run rpc without providerUri");
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
if (!opts.client_id) {
|
2017-11-25 07:46:37 +00:00
|
|
|
throw new Error("cannot run rpc without options.client_id");
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
var clientId = OAUTH3.url.normalize(opts.client_id || opts.client_uri);
|
|
|
|
providerUri = OAUTH3.url.normalize(providerUri);
|
|
|
|
|
|
|
|
var params = {
|
2017-11-25 07:46:37 +00:00
|
|
|
state: opts.state || OAUTH3.utils.randomState()
|
2017-02-21 21:23:22 +00:00
|
|
|
, redirect_uri: clientId + (opts.client_callback_path || '/.well-known/oauth3/callback.html#/')
|
|
|
|
, response_type: 'rpc'
|
|
|
|
, _method: 'GET'
|
2017-11-25 07:46:37 +00:00
|
|
|
, _scheme: opts._scheme
|
|
|
|
, _pathname: opts._pathname
|
2017-02-21 21:23:22 +00:00
|
|
|
, debug: opts.debug || undefined
|
|
|
|
};
|
|
|
|
|
2017-11-20 16:26:52 +00:00
|
|
|
var toRequest = {
|
2017-02-21 21:23:22 +00:00
|
|
|
url: providerUri + '/.well-known/oauth3/#/?' + OAUTH3.query.stringify(params)
|
|
|
|
, state: params.state
|
|
|
|
, method: 'GET'
|
|
|
|
, query: params
|
|
|
|
};
|
|
|
|
|
2017-11-20 16:26:52 +00:00
|
|
|
return toRequest;
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-11-25 08:21:17 +00:00
|
|
|
, broker: function (providerUri, opts) {
|
|
|
|
opts._scheme = "localstorage:";
|
|
|
|
opts._pathname = "issuer";
|
|
|
|
return OAUTH3.urls.rpc(providerUri, opts);
|
|
|
|
}
|
2017-11-25 07:46:37 +00:00
|
|
|
, discover: function (providerUri, opts) {
|
|
|
|
return OAUTH3.urls.directives(providerUri, opts);
|
|
|
|
}
|
|
|
|
, directives: function (providerUri, opts) {
|
|
|
|
opts._pathname = ".well-known/oauth3/scopes.json";
|
|
|
|
return OAUTH3.urls.rpc(providerUri, opts);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-11-30 23:12:28 +00:00
|
|
|
, jwk: function (directives, decoded) {
|
|
|
|
var sub = decoded.payload.sub || decoded.payload.ppid || decoded.payload.appScopedId;
|
|
|
|
if (!sub) {
|
|
|
|
throw OAUTH3.error.create({
|
|
|
|
message: 'token missing sub'
|
|
|
|
, code: 'E_MISSING_SUB'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_MISSING_SUB'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
var kid = decoded.header.kid || decoded.payload.kid;
|
|
|
|
if (!kid) {
|
|
|
|
throw OAUTH3.error.create({
|
|
|
|
message: 'token missing kid'
|
|
|
|
, code: 'E_MISSING_KID'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_MISSING_KID'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
if (!decoded.payload.iss) {
|
|
|
|
throw OAUTH3.error.create({
|
|
|
|
message: 'token missing iss'
|
|
|
|
, code: 'E_MISSING_ISS'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_MISSING_ISS'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
var args = (directives || {}).retrieve_jwk;
|
|
|
|
if (typeof args === 'string') {
|
|
|
|
args = { url: args, method: 'GET' };
|
|
|
|
}
|
|
|
|
if (typeof (args || {}).url !== 'string') {
|
|
|
|
throw OAUTH3.error.create({
|
|
|
|
message: 'token issuer does not support retrieving JWKs'
|
|
|
|
, code: 'E_INVALID_ISS'
|
|
|
|
, url: 'https://oauth3.org/docs/errors#E_INVALID_ISS'
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
var params = {
|
|
|
|
sub: sub
|
|
|
|
, kid: kid
|
|
|
|
};
|
|
|
|
var url = args.url;
|
|
|
|
var body;
|
|
|
|
Object.keys(params).forEach(function (key) {
|
|
|
|
if (url.indexOf(':'+key) !== -1) {
|
|
|
|
url = url.replace(':'+key, params[key]);
|
|
|
|
delete params[key];
|
|
|
|
}
|
|
|
|
});
|
|
|
|
if (Object.keys(params).length > 0) {
|
|
|
|
if ('GET' === (args.method || 'GET').toUpperCase()) {
|
|
|
|
url += '?' + OAUTH3.query.stringify(params);
|
|
|
|
} else {
|
|
|
|
body = params;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return {
|
|
|
|
url: OAUTH3.url.resolve(directives.api, url)
|
|
|
|
, method: args.method
|
|
|
|
, data: body
|
|
|
|
};
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, implicitGrant: function (directive, opts) {
|
|
|
|
//
|
|
|
|
// Example Implicit Grant Request
|
|
|
|
// (for generating a browser-only session, not a session on your server)
|
|
|
|
//
|
2017-08-15 20:21:54 +00:00
|
|
|
// GET https://example.com/api/issuer@oauth3.org/authorization_dialog
|
2017-02-21 21:23:22 +00:00
|
|
|
// ?response_type=token
|
|
|
|
// &scope=`encodeURIComponent('profile.login profile.email')`
|
|
|
|
// &state=`cryptoutil.random().toString('hex')`
|
|
|
|
// &client_id=xxxxxxxxxxx
|
|
|
|
// &redirect_uri=`encodeURIComponent('https://myapp.com/oauth3.html')`
|
|
|
|
//
|
|
|
|
// NOTE: `redirect_uri` itself may also contain URI-encoded components
|
|
|
|
//
|
|
|
|
|
|
|
|
opts = opts || {};
|
|
|
|
var type = 'authorization_dialog';
|
|
|
|
var responseType = 'token';
|
|
|
|
|
|
|
|
var scope = opts.scope || directive.authn_scope;
|
|
|
|
var args = directive[type];
|
|
|
|
var uri = args.url;
|
|
|
|
var state = opts.state || OAUTH3.utils.randomState();
|
|
|
|
var params = {
|
|
|
|
debug: opts.debug || undefined
|
|
|
|
, client_uri: opts.client_uri || opts.clientUri || undefined
|
|
|
|
, client_id: opts.client_id || opts.client_uri || undefined
|
2017-07-05 22:38:14 +00:00
|
|
|
, subject: opts.subject
|
2017-02-21 21:23:22 +00:00
|
|
|
, state: state
|
|
|
|
};
|
|
|
|
var result;
|
|
|
|
|
2017-07-05 22:38:14 +00:00
|
|
|
console.log('implicitGrant opts.subject: ', opts.subject);
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
params.response_type = responseType;
|
|
|
|
if (scope) {
|
|
|
|
params.scope = OAUTH3.scope.stringify(scope);
|
|
|
|
}
|
|
|
|
if (!opts.redirect_uri) {
|
|
|
|
// TODO consider making this optional
|
|
|
|
//console.warn("auto-generating redirect_uri from hard-coded callback.html"
|
|
|
|
// + " (should be configurable... but then redirect_uri could just be manually-generated)");
|
|
|
|
opts.redirect_uri = OAUTH3.url.resolve(
|
|
|
|
OAUTH3.url.normalize(params.client_uri)
|
|
|
|
, '.well-known/oauth3/callback.html'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
params.redirect_uri = opts.redirect_uri;
|
|
|
|
|
|
|
|
uri += '?' + OAUTH3.query.stringify(params);
|
|
|
|
|
|
|
|
result = {
|
|
|
|
url: uri
|
|
|
|
, state: state
|
|
|
|
, method: args.method
|
|
|
|
, query: params
|
|
|
|
};
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
, refreshToken: function (directive, opts) {
|
|
|
|
// grant_type=refresh_token
|
|
|
|
|
|
|
|
// Example Refresh Token Request
|
|
|
|
// (generally for 1st or 3rd party server-side, mobile, and desktop apps)
|
|
|
|
//
|
|
|
|
// POST https://example.com/api/oauth3/access_token
|
|
|
|
// { "grant_type": "refresh_token", "client_id": "<<id>>", "scope": "<<scope>>"
|
|
|
|
// , "username": "<<username>>", "password": "password" }
|
|
|
|
//
|
|
|
|
opts = opts || {};
|
2017-07-25 23:18:14 +00:00
|
|
|
var refresh_token = opts.refresh_token || (opts.session && opts.session.refresh_token);
|
|
|
|
var err;
|
|
|
|
if (!refresh_token) {
|
|
|
|
err = new Error('refreshing a token requires a refresh token');
|
|
|
|
err.code = 'E_NO_TOKEN';
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
if (OAUTH3.jwt.freshness(OAUTH3.jwt.decode(refresh_token)) === 'expired') {
|
|
|
|
err = new Error('refresh token has also expired, login required again');
|
|
|
|
err.code = 'E_EXPIRED_TOKEN';
|
|
|
|
throw err;
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
|
|
|
|
var scope = opts.scope || directive.authn_scope;
|
2017-07-25 23:18:14 +00:00
|
|
|
var args = directive.access_token;
|
2017-02-21 21:23:22 +00:00
|
|
|
var params = {
|
2017-07-25 23:18:14 +00:00
|
|
|
"grant_type": 'refresh_token'
|
|
|
|
, "refresh_token": refresh_token
|
2017-02-21 21:23:22 +00:00
|
|
|
, "response_type": 'token'
|
|
|
|
, "client_id": opts.client_id || opts.client_uri
|
|
|
|
, "client_uri": opts.client_uri
|
|
|
|
, debug: opts.debug || undefined
|
|
|
|
};
|
|
|
|
var uri = args.url;
|
|
|
|
var body;
|
|
|
|
|
2017-07-25 23:18:14 +00:00
|
|
|
if (opts.client_secret) {
|
2017-02-21 21:23:22 +00:00
|
|
|
// TODO not allowed in the browser
|
|
|
|
console.warn("if this is a browser, you must not use client_secret");
|
2017-07-25 23:18:14 +00:00
|
|
|
params.client_secret = opts.client_secret;
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (scope) {
|
|
|
|
params.scope = OAUTH3.scope.stringify(scope);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ('GET' === args.method.toUpperCase()) {
|
|
|
|
uri += '?' + OAUTH3.query.stringify(params);
|
|
|
|
} else {
|
|
|
|
body = params;
|
|
|
|
}
|
|
|
|
|
|
|
|
return {
|
|
|
|
url: uri
|
|
|
|
, method: args.method
|
|
|
|
, data: body
|
|
|
|
};
|
|
|
|
}
|
|
|
|
, logout: function (directive, opts) {
|
|
|
|
// action=logout
|
|
|
|
|
|
|
|
// Example Logout Request
|
|
|
|
// (generally for 1st or 3rd party server-side, mobile, and desktop apps)
|
|
|
|
//
|
|
|
|
// GET https://example.com/#/logout/
|
|
|
|
// ?client_id=<<id>>
|
|
|
|
// &access_token=<<token>>
|
|
|
|
// &sub=<<ppid>>
|
|
|
|
//
|
|
|
|
// Note that the use of # keeps certain parameters from traveling across
|
|
|
|
// the network at all (and we use https anyway)
|
|
|
|
//
|
|
|
|
opts = opts || {};
|
|
|
|
var action = 'logout';
|
|
|
|
var args = directive[action];
|
|
|
|
var state = opts.state || OAUTH3.utils.randomState();
|
|
|
|
var params = {
|
|
|
|
action: action
|
|
|
|
//, response_type: 'confirmation'
|
|
|
|
, client_id: opts.client_id || opts.client_uri
|
|
|
|
, client_uri: opts.client_uri || opts.client_id
|
|
|
|
, state: state
|
|
|
|
, redirect_uri: opts.redirect_uri = OAUTH3.url.resolve(
|
|
|
|
OAUTH3.url.normalize(opts.client_uri || opts.client_id)
|
|
|
|
, '.well-known/oauth3/callback.html'
|
|
|
|
)
|
|
|
|
, debug: opts.debug
|
|
|
|
};
|
|
|
|
var uri = args.url;
|
|
|
|
var body;
|
|
|
|
|
|
|
|
if ('GET' === args.method.toUpperCase()) {
|
|
|
|
uri += '?' + OAUTH3.query.stringify(params);
|
|
|
|
} else {
|
|
|
|
body = params;
|
|
|
|
}
|
|
|
|
|
|
|
|
return {
|
|
|
|
url: OAUTH3.url.resolve(directive.issuer, uri)
|
|
|
|
, method: args.method
|
|
|
|
, state: state
|
|
|
|
, data: body
|
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, hooks: {
|
2017-07-31 22:42:22 +00:00
|
|
|
_checkStorage: function (grpName, funcName) {
|
|
|
|
if (!OAUTH3._hooks) {
|
|
|
|
OAUTH3._hooks = {};
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
if (!OAUTH3._hooks[grpName]) {
|
|
|
|
console.log('using default storage for '+grpName+', set OAUTH3._hooks.'+grpName+' for custom storage');
|
|
|
|
OAUTH3._hooks[grpName] = OAUTH3._defaultStorage[grpName];
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
if (!OAUTH3._hooks[grpName][funcName]) {
|
|
|
|
throw new Error("'"+funcName+"' is not defined for custom "+grpName+" storage");
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
}
|
|
|
|
, directives: {
|
|
|
|
get: function (providerUri) {
|
|
|
|
OAUTH3.hooks._checkStorage('directives', 'get');
|
|
|
|
|
|
|
|
if (!providerUri) {
|
|
|
|
throw new Error("providerUri is not set");
|
2017-03-21 23:33:03 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.directives.get(OAUTH3.uri.normalize(providerUri)));
|
2017-02-24 19:18:45 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
, set: function (providerUri, directives) {
|
|
|
|
OAUTH3.hooks._checkStorage('directives', 'set');
|
|
|
|
|
|
|
|
if (!providerUri) {
|
|
|
|
throw new Error("providerUri is not set");
|
2017-03-21 23:33:03 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.directives.set(OAUTH3.uri.normalize(providerUri), directives));
|
|
|
|
}
|
|
|
|
, all: function () {
|
|
|
|
OAUTH3.hooks._checkStorage('directives', 'all');
|
|
|
|
|
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.directives.all());
|
|
|
|
}
|
|
|
|
, clear: function () {
|
|
|
|
OAUTH3.hooks._checkStorage('directives', 'clear');
|
|
|
|
|
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.directives.clear());
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
}
|
2017-11-20 16:26:52 +00:00
|
|
|
, scopes: {
|
|
|
|
get: function(providerUri) {
|
|
|
|
//TODO: retrieve cached scopes
|
|
|
|
}
|
|
|
|
, set: function(providerUri, scopes) {
|
|
|
|
//TODO: cache scopes
|
|
|
|
}
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, session: {
|
|
|
|
refresh: function (oldSession, newSession) {
|
|
|
|
var providerUri = oldSession.provider_uri;
|
|
|
|
var clientUri = oldSession.client_uri;
|
|
|
|
|
2017-10-12 18:10:42 +00:00
|
|
|
['access_token', 'token', 'client_uri', 'refresh', 'refresh_token', 'expires_in', 'provider_uri', 'scope', 'token_type'].forEach(function (key) {
|
2017-02-21 21:23:22 +00:00
|
|
|
oldSession[key] = undefined;
|
|
|
|
});
|
|
|
|
Object.keys(newSession).forEach(function (key) {
|
|
|
|
oldSession[key] = newSession[key];
|
|
|
|
});
|
|
|
|
|
|
|
|
// info about the session of this API call
|
|
|
|
oldSession.provider_uri = providerUri; // aud
|
|
|
|
oldSession.client_uri = clientUri; // azp
|
|
|
|
|
|
|
|
// info about the newly-discovered token
|
2017-07-25 23:18:14 +00:00
|
|
|
oldSession.token = OAUTH3.jwt.decode(oldSession.access_token);
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-03-23 00:13:06 +00:00
|
|
|
oldSession.token.sub = oldSession.token.sub
|
2017-05-29 21:57:29 +00:00
|
|
|
|| (oldSession.token.acx||{}).id
|
2017-05-24 08:57:52 +00:00
|
|
|
|| ((oldSession.token.axs||[])[0]||{}).appScopedId
|
|
|
|
|| ((oldSession.token.axs||[])[0]||{}).id
|
|
|
|
;
|
2017-02-21 21:23:22 +00:00
|
|
|
oldSession.token.client_uri = clientUri;
|
|
|
|
oldSession.token.provider_uri = providerUri;
|
|
|
|
|
|
|
|
if (oldSession.refresh_token) {
|
2017-07-25 23:18:14 +00:00
|
|
|
oldSession.refresh = OAUTH3.jwt.decode(oldSession.refresh_token);
|
2017-03-23 00:13:06 +00:00
|
|
|
oldSession.refresh.sub = oldSession.refresh.sub
|
2017-05-29 21:57:29 +00:00
|
|
|
|| (oldSession.refresh.acx||{}).id
|
2017-05-24 08:57:52 +00:00
|
|
|
|| ((oldSession.refresh.axs||[])[0]||{}).appScopedId
|
|
|
|
|| ((oldSession.refresh.axs||[])[0]||{}).id
|
|
|
|
;
|
2017-02-21 21:23:22 +00:00
|
|
|
oldSession.refresh.provider_uri = providerUri;
|
|
|
|
}
|
|
|
|
|
|
|
|
// set for a set of audiences
|
2017-07-31 22:42:22 +00:00
|
|
|
return OAUTH3.hooks.session.set(providerUri, oldSession);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
, check: function (preq, opts) {
|
2017-02-28 01:19:01 +00:00
|
|
|
opts = opts || {};
|
2017-02-21 21:23:22 +00:00
|
|
|
if (!preq.session) {
|
|
|
|
return OAUTH3.PromiseA.resolve(null);
|
|
|
|
}
|
|
|
|
var freshness = OAUTH3.jwt.freshness(preq.session.token, opts.staletime);
|
|
|
|
|
|
|
|
switch (freshness) {
|
|
|
|
case 'stale':
|
|
|
|
return OAUTH3.hooks.session.stale(preq.session);
|
|
|
|
case 'expired':
|
|
|
|
return OAUTH3.hooks.session.expired(preq.session).then(function (newSession) {
|
|
|
|
preq.session = newSession;
|
|
|
|
return newSession;
|
|
|
|
});
|
|
|
|
//case 'fresh':
|
|
|
|
default:
|
|
|
|
return OAUTH3.PromiseA.resolve(preq.session);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, stale: function (staleSession) {
|
|
|
|
if (OAUTH3.hooks.session._stalePromise) {
|
|
|
|
return OAUTH3.PromiseA.resolve(staleSession);
|
|
|
|
}
|
|
|
|
|
|
|
|
OAUTH3.hooks.session._stalePromise = OAUTH3._refreshToken(
|
|
|
|
staleSession.provider_uri
|
|
|
|
, { client_uri: staleSession.client_uri
|
|
|
|
, session: staleSession
|
|
|
|
, debug: staleSession.debug
|
|
|
|
}
|
|
|
|
).then(function (newSession) {
|
|
|
|
OAUTH3.hooks.session._stalePromise = null;
|
|
|
|
return newSession; // oauth3.hooks.refreshSession(staleSession, newSession);
|
|
|
|
}, function () {
|
|
|
|
OAUTH3.hooks.session._stalePromise = null;
|
|
|
|
});
|
|
|
|
|
|
|
|
return OAUTH3.PromiseA.resolve(staleSession);
|
|
|
|
}
|
|
|
|
, expired: function (expiredSession) {
|
|
|
|
return OAUTH3._refreshToken(
|
|
|
|
expiredSession.provider_uri
|
|
|
|
, { client_uri: expiredSession.client_uri
|
|
|
|
, session: expiredSession
|
|
|
|
, debug: expiredSession.debug
|
|
|
|
}
|
|
|
|
).then(function (newSession) {
|
|
|
|
return newSession; // oauth3.hooks.refreshSession(expiredSession, newSession);
|
|
|
|
});
|
|
|
|
}
|
2017-03-21 23:33:03 +00:00
|
|
|
, set: function (providerUri, newSession, id) {
|
2017-07-31 22:42:22 +00:00
|
|
|
OAUTH3.hooks._checkStorage('sessions', 'set');
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
if (!providerUri) {
|
|
|
|
console.error(new Error('no providerUri').stack);
|
|
|
|
throw new Error("providerUri is not set");
|
|
|
|
}
|
|
|
|
providerUri = OAUTH3.uri.normalize(providerUri);
|
2017-07-31 22:42:22 +00:00
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.sessions.set(providerUri, newSession, id));
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-03-21 23:33:03 +00:00
|
|
|
, get: function (providerUri, id) {
|
2017-07-31 22:42:22 +00:00
|
|
|
OAUTH3.hooks._checkStorage('sessions', 'get');
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
if (!providerUri) {
|
|
|
|
throw new Error("providerUri is not set");
|
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
providerUri = OAUTH3.uri.normalize(providerUri);
|
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.sessions.get(providerUri, id));
|
2017-02-24 19:18:45 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
, all: function (providerUri) {
|
|
|
|
OAUTH3.hooks._checkStorage('sessions', 'all');
|
|
|
|
|
|
|
|
if (providerUri) {
|
|
|
|
providerUri = OAUTH3.uri.normalize(providerUri);
|
2017-03-21 23:33:03 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.sessions.all(providerUri));
|
2017-02-24 19:18:45 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
, clear: function (providerUri) {
|
|
|
|
OAUTH3.hooks._checkStorage('sessions', 'clear');
|
|
|
|
|
|
|
|
if (providerUri) {
|
|
|
|
providerUri = OAUTH3.uri.normalize(providerUri);
|
2017-03-21 23:33:03 +00:00
|
|
|
}
|
2017-07-31 22:42:22 +00:00
|
|
|
return OAUTH3.PromiseA.resolve(OAUTH3._hooks.sessions.clear(providerUri));
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-11-20 16:26:52 +00:00
|
|
|
, discoverScopes: function (providerUri, opts) {
|
2017-11-25 07:46:37 +00:00
|
|
|
return OAUTH.scopes(providerUri, opts);
|
|
|
|
}
|
|
|
|
, scopes: function (providerUri, opts) {
|
2017-11-16 05:39:10 +00:00
|
|
|
if (!providerUri) {
|
2017-11-20 16:26:52 +00:00
|
|
|
throw new Error('oauth3.discoverScopes(providerUri, opts) received providerUri as :', providerUri);
|
2017-11-16 05:39:10 +00:00
|
|
|
}
|
|
|
|
|
2017-11-25 07:46:37 +00:00
|
|
|
opts = opts || {};
|
|
|
|
opts._pathname = ".well-known/oauth3/scopes.json";
|
2017-11-16 05:39:10 +00:00
|
|
|
|
2017-11-20 16:26:52 +00:00
|
|
|
//TODO: add caching
|
2017-11-16 05:39:10 +00:00
|
|
|
|
2017-11-25 07:46:37 +00:00
|
|
|
return OAUTH3._rpcHelper(providerUri, opts).then(function(scopes) {
|
2017-11-20 16:26:52 +00:00
|
|
|
return scopes;
|
2017-11-16 05:39:10 +00:00
|
|
|
});
|
2017-11-25 07:46:37 +00:00
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, discover: function (providerUri, opts) {
|
2017-11-25 07:46:37 +00:00
|
|
|
return OAUTH3.directives(providerUri, opts);
|
|
|
|
}
|
|
|
|
, directives: function (providerUri, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
if (!providerUri) {
|
2017-11-16 05:39:10 +00:00
|
|
|
throw new Error('oauth3.discover(providerUri, opts) received providerUri as :', providerUri);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
2017-02-24 19:18:45 +00:00
|
|
|
return OAUTH3.hooks.directives.get(providerUri).then(function (directives) {
|
2017-02-21 21:23:22 +00:00
|
|
|
if (directives && directives.issuer) {
|
|
|
|
return directives;
|
|
|
|
}
|
2017-02-24 19:18:45 +00:00
|
|
|
|
2017-11-25 07:46:37 +00:00
|
|
|
opts._pathname = ".well-known/oauth3/directives.json";
|
|
|
|
return OAUTH3._rpcHelper(providerUri, opts).then(function (directives) {
|
2017-02-21 21:23:22 +00:00
|
|
|
directives.azp = directives.azp || OAUTH3.url.normalize(providerUri);
|
|
|
|
directives.issuer = directives.issuer || OAUTH3.url.normalize(providerUri);
|
2017-05-24 03:25:09 +00:00
|
|
|
directives.api = OAUTH3.url.normalize((directives.api||':hostname').replace(/:hostname/, OAUTH3.uri.normalize(directives.issuer) || OAUTH3.uri.normalize(providerUri)));
|
2017-02-21 21:23:22 +00:00
|
|
|
// OAUTH3.PromiseA.resolve() is taken care of because this is wrapped
|
2017-02-24 19:18:45 +00:00
|
|
|
return OAUTH3.hooks.directives.set(providerUri, directives);
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
2017-11-25 07:46:37 +00:00
|
|
|
, _rpcHelper: function(providerUri, opts) {
|
|
|
|
return OAUTH3._browser.rpc(providerUri, opts);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
, request: function (preq, opts) {
|
|
|
|
function fetch() {
|
|
|
|
if (preq.session) {
|
|
|
|
// TODO check session.token.aud against preq.url to make sure they match
|
2017-04-06 01:02:06 +00:00
|
|
|
//console.warn("[security] session audience checking has not been implemented yet (it's up to you to check)");
|
2017-02-21 21:23:22 +00:00
|
|
|
preq.headers = preq.headers || {};
|
|
|
|
preq.headers.Authorization = 'Bearer ' + (preq.session.access_token || preq.session.accessToken);
|
|
|
|
}
|
|
|
|
|
|
|
|
return OAUTH3._requestHelper(preq, opts);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!preq.session) {
|
|
|
|
return fetch();
|
|
|
|
}
|
|
|
|
|
|
|
|
return OAUTH3.hooks.session.check(preq, opts).then(fetch);
|
|
|
|
}
|
|
|
|
, _requestHelper: function (preq, opts) {
|
2017-03-16 21:41:33 +00:00
|
|
|
/*
|
|
|
|
if (opts && opts.directives) {
|
|
|
|
preq.url = OAUTH3.url.resolve(opts.directives.issuer, preq.url);
|
|
|
|
}
|
|
|
|
*/
|
2017-02-21 21:23:22 +00:00
|
|
|
return OAUTH3._browser.request(preq, opts);
|
|
|
|
}
|
2017-11-25 09:10:54 +00:00
|
|
|
, issuer: function (opts) {
|
|
|
|
if (!opts) { opts = {}; }
|
|
|
|
|
|
|
|
// TODO this will default to browserlogin.org
|
2017-11-29 02:09:00 +00:00
|
|
|
var broker = opts.broker || 'https://new.oauth3.org';
|
|
|
|
//var broker = opts.broker || 'https://broker.oauth3.org';
|
2017-11-25 09:10:54 +00:00
|
|
|
|
|
|
|
opts._rpc = "broker";
|
|
|
|
opts._scheme = "localstorage:";
|
|
|
|
opts._pathname = "issuer";
|
|
|
|
|
|
|
|
return OAUTH3._rpcHelper(broker, opts).then(function(issuer) {
|
|
|
|
return issuer;
|
|
|
|
});
|
|
|
|
}
|
2017-11-14 23:39:14 +00:00
|
|
|
, implicitGrant: function (directives, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
var promise;
|
|
|
|
var providerUri = directives.azp || directives.issuer || directives;
|
|
|
|
|
|
|
|
if (opts.broker) {
|
|
|
|
// Discovery can happen in-flow because we know that this is
|
|
|
|
// a valid oauth3 provider
|
|
|
|
promise = OAUTH3._discoverThenImplicitGrant(providerUri, opts);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// Discovery must take place before calling implicitGrant
|
2017-11-09 02:03:28 +00:00
|
|
|
promise = OAUTH3.hooks.directives.get(providerUri).then(function (directives) {
|
|
|
|
return OAUTH3._implicitGrant(directives, opts);
|
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return promise.then(function (tokens) {
|
|
|
|
// TODO abstract browser bits away
|
|
|
|
try {
|
|
|
|
OAUTH3._browser.closeFrame(tokens.state || opts._state, opts);
|
|
|
|
} catch(e) {
|
|
|
|
console.warn("[implicitGrant] TODO abstract browser bits away");
|
|
|
|
}
|
|
|
|
opts._state = undefined;
|
2017-08-30 19:23:33 +00:00
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
return OAUTH3.hooks.session.refresh(
|
|
|
|
opts.session || {
|
|
|
|
provider_uri: providerUri
|
|
|
|
, client_id: opts.client_id
|
|
|
|
, client_uri: opts.client_uri || opts.clientUri
|
|
|
|
}
|
|
|
|
, tokens
|
2017-08-30 19:23:33 +00:00
|
|
|
).then(function (session) {
|
|
|
|
// TODO set cookie with JWT and TTL
|
|
|
|
return OAUTH3.request({
|
|
|
|
method: 'POST'
|
|
|
|
, url: OAUTH3.url.normalize(
|
|
|
|
(directives.assets || 'https://assets.:hostname/assets/issuer@oauth3.org/session')
|
|
|
|
.replace(/:hostname/, OAUTH3.uri.normalize(directives.issuer) || OAUTH3.uri.normalize(providerUri))
|
|
|
|
)
|
|
|
|
, session: session
|
|
|
|
}).then(function () {
|
|
|
|
return session;
|
2017-09-01 16:18:42 +00:00
|
|
|
}, function (/*err*/) {
|
|
|
|
return session;
|
2017-08-30 19:23:33 +00:00
|
|
|
});
|
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
, _discoverThenImplicitGrant: function(providerUri, opts) {
|
|
|
|
opts.windowType = opts.windowType || 'popup';
|
|
|
|
return OAUTH3.discover(providerUri, opts).then(function (directives) {
|
|
|
|
return OAUTH3._implicitGrant(directives, opts).then(function (tokens) {
|
|
|
|
return tokens;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, _implicitGrant: function(directives, opts) {
|
|
|
|
// TODO this may need to be synchronous for browser security policy
|
|
|
|
// Do some stuff
|
|
|
|
var authReq = OAUTH3.urls.implicitGrant(
|
|
|
|
directives
|
|
|
|
, { redirect_uri: opts.redirect_uri
|
|
|
|
, client_id: opts.client_id || opts.client_uri
|
|
|
|
, client_uri: opts.client_uri || opts.client_id
|
2017-05-08 23:39:56 +00:00
|
|
|
, scope: opts.scope
|
2017-07-05 22:38:14 +00:00
|
|
|
, subject: opts.subject
|
2017-02-21 21:23:22 +00:00
|
|
|
, state: opts._state || undefined
|
|
|
|
, debug: opts.debug
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
if (opts.debug) {
|
|
|
|
window.alert("DEBUG MODE: Pausing so you can look at logs and whatnot :) Fire at will!");
|
|
|
|
}
|
|
|
|
|
|
|
|
return OAUTH3._browser.frameRequest(
|
|
|
|
OAUTH3.url.resolve(directives.issuer, authReq.url)
|
|
|
|
, authReq.state // state should recycle params
|
|
|
|
, { windowType: opts.windowType
|
|
|
|
, reuseWindow: opts.broker && '-broker'
|
|
|
|
, debug: opts.debug
|
|
|
|
}
|
|
|
|
).then(function (tokens) {
|
|
|
|
if (tokens.error) {
|
|
|
|
// TODO directives.audience
|
|
|
|
return OAUTH3.PromiseA.reject(OAUTH3.error.parse(directives.issuer /*providerUri*/, tokens));
|
|
|
|
}
|
|
|
|
|
|
|
|
return tokens;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, _refreshToken: function (providerUri, opts) {
|
2017-05-30 01:14:09 +00:00
|
|
|
return OAUTH3.discover(providerUri, opts).then(function (directives) {
|
|
|
|
var prequest = OAUTH3.urls.refreshToken(directives, opts);
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-05-30 01:14:09 +00:00
|
|
|
prequest.url = OAUTH3.url.resolve(directives.api, prequest.url);
|
2017-03-16 21:41:33 +00:00
|
|
|
return OAUTH3.request(prequest/*, { directives: directive }*/).then(function (req) {
|
2017-02-21 21:23:22 +00:00
|
|
|
var data = req.data;
|
|
|
|
data.provider_uri = providerUri;
|
|
|
|
if (data.error) {
|
|
|
|
return OAUTH3.PromiseA.reject(OAUTH3.error.parse(providerUri, data));
|
|
|
|
}
|
2017-02-24 20:05:07 +00:00
|
|
|
return OAUTH3.hooks.session.refresh(
|
|
|
|
opts.session || { provider_uri: providerUri, client_uri: opts.client_uri || opts.clientUri }
|
|
|
|
, data
|
|
|
|
);
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
2017-11-29 05:30:22 +00:00
|
|
|
, logout: function(issuerUri, opts) {
|
|
|
|
var directives;
|
|
|
|
if ('string' !== typeof issuerUri) {
|
|
|
|
directives = issuerUri;
|
|
|
|
return OAUTH3._logoutHelper(directives, opts);
|
|
|
|
}
|
|
|
|
|
|
|
|
return OAUTH3.hooks.directives.get(issuerUri).then(function (directives) {
|
2017-11-09 02:03:28 +00:00
|
|
|
return OAUTH3._logoutHelper(directives, opts);
|
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-11-29 05:30:22 +00:00
|
|
|
, _logoutHelper: function(directives, opts) {
|
|
|
|
var issuerUri = directives.issuer_uri || directives.provider_uri;
|
2017-02-21 21:23:22 +00:00
|
|
|
var logoutReq = OAUTH3.urls.logout(
|
|
|
|
directives
|
|
|
|
, { client_id: (opts.client_id || opts.client_uri || OAUTH3.clientUri(OAUTH3._browser.window.location))
|
2017-10-25 20:12:41 +00:00
|
|
|
, windowType: 'popup' // TODO: figure out background later
|
2017-02-21 21:23:22 +00:00
|
|
|
, broker: opts.broker
|
|
|
|
//, state: opts._state
|
|
|
|
, debug: opts.debug
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
return OAUTH3._browser.frameRequest(
|
|
|
|
OAUTH3.url.resolve(directives.issuer, logoutReq.url)
|
|
|
|
, logoutReq.state // state should recycle params
|
|
|
|
, { windowType: 'popup'
|
|
|
|
, reuseWindow: opts.broker && '-broker'
|
|
|
|
, debug: opts.debug
|
|
|
|
}
|
|
|
|
).then(function (params) {
|
|
|
|
OAUTH3._browser.closeFrame(params.state || opts._state, opts);
|
|
|
|
|
|
|
|
if (params.error) {
|
|
|
|
// TODO directives.audience
|
2017-11-29 05:30:22 +00:00
|
|
|
return OAUTH3.PromiseA.reject(OAUTH3.error.parse(directives.issuer /*issuerUri*/, params));
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
2017-11-29 05:30:22 +00:00
|
|
|
OAUTH3.hooks.session.clear(issuerUri);
|
2017-02-21 21:23:22 +00:00
|
|
|
return params;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// Let the Code Waste begin!!
|
|
|
|
//
|
|
|
|
, _browser: {
|
2017-03-20 23:55:00 +00:00
|
|
|
window: 'undefined' !== typeof window ? window : null
|
2017-11-25 07:46:37 +00:00
|
|
|
, rpc: function(providerUri, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
opts = opts || {};
|
|
|
|
providerUri = OAUTH3.url.normalize(providerUri);
|
|
|
|
|
2017-11-25 07:46:37 +00:00
|
|
|
// TODO SECURITY should we whitelist our own self?
|
2017-08-02 01:06:33 +00:00
|
|
|
if (OAUTH3.uri.normalize(providerUri).replace(/\/.*/, '') === OAUTH3.uri.normalize(OAUTH3._browser.window.location.hostname)) {
|
2017-11-25 07:46:37 +00:00
|
|
|
console.warn("It looks like you're a provider trying to run rpc on yourself,"
|
2017-02-21 21:23:22 +00:00
|
|
|
+ " so we we're just gonna use"
|
2017-11-20 16:26:52 +00:00
|
|
|
+ " OAUTH3.request({ method: 'GET', url: "
|
2017-11-25 07:46:37 +00:00
|
|
|
+ "'" + opts._pathname + "' })");
|
2017-11-20 16:26:52 +00:00
|
|
|
|
2017-11-25 07:46:37 +00:00
|
|
|
if (/localstorage/i.test(opts._scheme)) {
|
|
|
|
return OAUTH3.PromiseA.resolve(localStorage.getItem(opts._pathname));
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
return OAUTH3.request({
|
|
|
|
method: 'GET'
|
2017-11-28 02:26:31 +00:00
|
|
|
, url: OAUTH3.url.normalize(providerUri) + '/' + opts._pathname // '/.well-known/oauth3/' + discoverFile
|
2017-11-25 07:46:37 +00:00
|
|
|
}).then(function (resp) {
|
|
|
|
return resp.data;
|
|
|
|
});
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
2017-11-25 09:10:54 +00:00
|
|
|
if (!(opts.client_id || opts.client_uri || '').match(OAUTH3._browser.window.location.hostname)) {
|
2017-02-21 21:23:22 +00:00
|
|
|
console.warn("It looks like your client_id doesn't match your current window..."
|
|
|
|
+ " this probably won't end well");
|
|
|
|
console.warn(opts.client_id || opts.client_uri, OAUTH3._browser.window.location.hostname);
|
|
|
|
}
|
|
|
|
|
2017-11-25 09:10:54 +00:00
|
|
|
var discReq = OAUTH3.urls[opts._rpc || 'rpc'](
|
2017-02-21 21:23:22 +00:00
|
|
|
providerUri
|
|
|
|
, { client_id: (opts.client_id || opts.client_uri || OAUTH3.clientUri(OAUTH3._browser.window.location))
|
|
|
|
, windowType: opts.broker && opts.windowType || 'background'
|
|
|
|
, broker: opts.broker
|
|
|
|
, state: opts._state || undefined
|
|
|
|
, debug: opts.debug
|
2017-11-25 07:46:37 +00:00
|
|
|
, _scheme: opts._scheme
|
|
|
|
, _pathname: opts._pathname
|
|
|
|
, _method: opts._method
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
);
|
|
|
|
opts._state = discReq.state;
|
2017-11-25 07:46:37 +00:00
|
|
|
//var discReq = OAUTH3.urls.rpc(providerUri, opts);
|
2017-02-21 21:23:22 +00:00
|
|
|
|
|
|
|
// hmm... we're gonna need a broker for this since switching windows is distracting,
|
|
|
|
// popups are obnoxious, iframes are sometimes blocked, and most servers don't implement CORS
|
|
|
|
// eventually it should be the browser (and postMessage may be a viable option now), but whatever...
|
|
|
|
|
|
|
|
// TODO allow postMessage from providerUri in addition to callback
|
|
|
|
// TODO allow node to open a desktop browser window
|
|
|
|
opts._windowType = opts.windowType;
|
|
|
|
opts.windowType = opts.windowType || 'background';
|
2017-11-23 07:25:35 +00:00
|
|
|
return OAUTH3._browser.testPixel(providerUri).then(function () {
|
|
|
|
return OAUTH3._browser.frameRequest(
|
|
|
|
OAUTH3.url.resolve(providerUri, discReq.url)
|
|
|
|
, discReq.state
|
|
|
|
// why not just pass opts whole?
|
|
|
|
, { windowType: opts.windowType
|
|
|
|
, reuseWindow: opts.broker && '-broker'
|
|
|
|
, debug: opts.debug
|
|
|
|
}
|
|
|
|
).then(function (params) {
|
|
|
|
opts.windowType = opts._windowType;
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-11-23 07:25:35 +00:00
|
|
|
// caller will call OAUTH3._browser.closeFrame(discReq.state, { debug: opts.debug || params.debug });
|
|
|
|
if (params.error) {
|
|
|
|
// TODO directives.issuer || directives.audience
|
|
|
|
return OAUTH3.PromiseA.reject(OAUTH3.error.parse(providerUri, params));
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-11-23 07:25:35 +00:00
|
|
|
// TODO params should have response_type indicating json, binary, etc
|
2017-11-25 09:10:54 +00:00
|
|
|
var result;
|
|
|
|
try {
|
|
|
|
result = JSON.parse(OAUTH3._base64.decodeUrlSafe(params.data || params.result || params.directives));
|
|
|
|
} catch(e) {
|
|
|
|
result = params.data || params.result;
|
|
|
|
}
|
|
|
|
|
|
|
|
console.log('result:', result);
|
2017-11-23 07:25:35 +00:00
|
|
|
// caller will call OAUTH3.hooks.directives.set(providerUri, directives);
|
2017-11-25 08:15:44 +00:00
|
|
|
return result;
|
2017-11-23 07:25:35 +00:00
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
, request: function (preq, _sys) {
|
|
|
|
return new OAUTH3.PromiseA(function (resolve, reject) {
|
|
|
|
var xhr;
|
2017-08-25 23:47:31 +00:00
|
|
|
var headers = preq.headers || {};
|
|
|
|
var multipart;
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
try {
|
|
|
|
xhr = new XMLHttpRequest(_sys);
|
|
|
|
} catch(e) {
|
|
|
|
xhr = new XMLHttpRequest();
|
|
|
|
}
|
|
|
|
xhr.onreadystatechange = function () {
|
|
|
|
if (xhr.readyState !== XMLHttpRequest.DONE) {
|
|
|
|
// nothing to do here
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-09-28 19:50:52 +00:00
|
|
|
var data, err;
|
2017-02-21 21:23:22 +00:00
|
|
|
if (xhr.status !== 200) {
|
2017-09-28 19:50:52 +00:00
|
|
|
err = new Error('bad status code: ' + xhr.status);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
data = JSON.parse(xhr.responseText);
|
|
|
|
} catch(e) {
|
|
|
|
data = xhr.responseText;
|
|
|
|
}
|
|
|
|
|
2017-09-28 19:50:52 +00:00
|
|
|
if (data.error) {
|
|
|
|
err = new Error(data.error.message || data.error_description || JSON.stringify(data.error));
|
2017-10-25 20:13:01 +00:00
|
|
|
Object.assign(err, data.error);
|
2017-09-28 19:50:52 +00:00
|
|
|
}
|
|
|
|
if (err) {
|
2017-10-25 20:13:01 +00:00
|
|
|
err._request = xhr;
|
|
|
|
err.status = xhr.status;
|
|
|
|
err.data = data;
|
2017-09-28 19:50:52 +00:00
|
|
|
reject(err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
resolve({
|
2017-03-21 07:02:41 +00:00
|
|
|
_request: xhr
|
|
|
|
, headers: null // TODO
|
2017-02-21 21:23:22 +00:00
|
|
|
, data: data
|
|
|
|
, status: xhr.status
|
|
|
|
});
|
|
|
|
};
|
2017-10-25 20:12:41 +00:00
|
|
|
xhr.ontimeout = function () {
|
|
|
|
var err = new Error('ETIMEDOUT');
|
|
|
|
err.code = 'ETIMEDOUT';
|
|
|
|
reject(err);
|
|
|
|
};
|
2017-08-25 23:47:31 +00:00
|
|
|
|
|
|
|
if (preq.progress) {
|
|
|
|
xhr.upload.onprogress = function (ev) {
|
|
|
|
preq.progress({
|
|
|
|
loaded: ev.loaded
|
|
|
|
, total: ev.total
|
|
|
|
});
|
|
|
|
if (OAUTH3._digest) {
|
|
|
|
// $rootScope.$digest();
|
|
|
|
OAUTH3._digest();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
2017-02-21 23:54:37 +00:00
|
|
|
xhr.open(preq.method || 'GET', preq.url, true);
|
2017-08-30 21:47:13 +00:00
|
|
|
// For assets.example.com/assets
|
|
|
|
xhr.withCredentials = true;
|
2017-08-12 02:09:28 +00:00
|
|
|
|
2017-10-25 20:12:41 +00:00
|
|
|
if (preq.timeout) {
|
|
|
|
xhr.timeout = preq.timeout;
|
|
|
|
}
|
2017-02-22 01:38:45 +00:00
|
|
|
if (preq.data) {
|
|
|
|
headers['Content-Type'] = 'application/json'; // TODO XXX TODO utf8
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
Object.keys(headers).forEach(function (key) {
|
|
|
|
xhr.setRequestHeader(key, headers[key]);
|
|
|
|
});
|
2017-08-12 02:09:28 +00:00
|
|
|
if (preq.multipart && !(preq.multipart instanceof window.FormData)) {
|
|
|
|
multipart = new window.FormData();
|
|
|
|
Object.keys(preq.multipart).forEach(function (key) {
|
|
|
|
multipart.append(key, preq.multipart[key]);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
multipart = preq.multipart;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (multipart) {
|
|
|
|
xhr.send(multipart);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
xhr.send(JSON.stringify(preq.data));
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
}
|
2017-11-23 07:25:35 +00:00
|
|
|
, testPixel: function (targetUri) {
|
|
|
|
var url = OAUTH3.url.resolve(OAUTH3.url.normalize(targetUri), '.well-known/oauth3/clear.gif');
|
|
|
|
return new OAUTH3.PromiseA(function (resolve, reject) {
|
|
|
|
var img = document.createElement('img');
|
|
|
|
img.addEventListener('load', function () {
|
|
|
|
resolve();
|
|
|
|
});
|
|
|
|
img.addEventListener('error', function () {
|
2017-11-24 00:59:37 +00:00
|
|
|
var err = new Error("OAuth3 support not detected: '" + url + "' not found");
|
2017-11-23 07:25:35 +00:00
|
|
|
err.code = 'E_NOT_SUPPORTED';
|
|
|
|
reject(err);
|
|
|
|
});
|
|
|
|
// works with CSP
|
|
|
|
img.style.position = 'absolute';
|
|
|
|
img.style.left = '-2px';
|
|
|
|
img.style.bottom = '-2px';
|
|
|
|
img.className = 'js-oauth3-discover';
|
|
|
|
img.src = url;
|
|
|
|
document.body.appendChild(img);
|
|
|
|
console.log('img', img);
|
|
|
|
});
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, frameRequest: function (url, state, opts) {
|
|
|
|
opts = opts || {};
|
|
|
|
var previousFrame = OAUTH3._browser._frames[state];
|
|
|
|
|
|
|
|
var windowType = opts.windowType;
|
|
|
|
if (!windowType) {
|
|
|
|
windowType = 'popup';
|
|
|
|
}
|
|
|
|
|
|
|
|
var timeout = opts.timeout;
|
2017-11-24 00:49:35 +00:00
|
|
|
if ('background' === windowType) {
|
|
|
|
if (!timeout) {
|
|
|
|
timeout = 7 * 1000;
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return new OAUTH3.PromiseA(function (resolve, reject) {
|
|
|
|
// TODO periodically garbage collect expired handlers from window object
|
|
|
|
var tok;
|
|
|
|
|
|
|
|
function cleanup() {
|
|
|
|
delete window['--oauth3-callback-' + state];
|
|
|
|
clearTimeout(tok);
|
|
|
|
tok = null;
|
|
|
|
// the actual close is done later (by the caller) so that the window/frame
|
|
|
|
// can be reused or self-closes synchronously itself / by parent
|
|
|
|
// (probably won't ever happen, but that's a negotiable implementation detail)
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
window['--oauth3-callback-' + state] = function (params) {
|
|
|
|
resolve(params);
|
|
|
|
cleanup();
|
|
|
|
};
|
|
|
|
|
2017-11-24 00:50:26 +00:00
|
|
|
if (timeout) {
|
|
|
|
tok = setTimeout(function () {
|
|
|
|
var err = new Error(
|
|
|
|
"the '" + windowType + "' request did not complete within " + Math.round(timeout / 1000) + "s"
|
|
|
|
);
|
|
|
|
err.code = "E_TIMEOUT";
|
|
|
|
reject(err);
|
|
|
|
cleanup();
|
|
|
|
}, timeout);
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
|
|
|
|
setTimeout(function () {
|
|
|
|
if (!OAUTH3._browser._frames[state]) {
|
|
|
|
reject(new Error("TODO: open the iframe first and discover oauth3 directives before popup"));
|
|
|
|
cleanup();
|
|
|
|
}
|
|
|
|
}, 0);
|
|
|
|
|
|
|
|
if ('background' === windowType) {
|
|
|
|
if (previousFrame) {
|
|
|
|
previousFrame.location = url;
|
|
|
|
//promise = previousFrame.promise;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
OAUTH3._browser._frames[state] = OAUTH3._browser.iframe(url, state, opts);
|
|
|
|
}
|
|
|
|
} else if ('popup' === windowType) {
|
|
|
|
if (previousFrame) {
|
|
|
|
previousFrame.location = url;
|
|
|
|
if (opts.debug) {
|
|
|
|
previousFrame.focus();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
OAUTH3._browser._frames[state] = OAUTH3._browser.frame(url, state, opts);
|
|
|
|
}
|
|
|
|
} else if ('inline' === windowType) {
|
|
|
|
// callback function will never execute and would need to redirect back to current page
|
|
|
|
// rather than the callback.html
|
|
|
|
url += '&original_url=' + OAUTH3._browser.window.location.href;
|
|
|
|
OAUTH3._browser.window.location = url;
|
|
|
|
//promise = OAUTH3.PromiseA.resolve({ url: url });
|
|
|
|
return;
|
|
|
|
} else {
|
|
|
|
throw new Error("login framing method options.windowType="
|
|
|
|
+ opts.windowType + " not type yet implemented");
|
|
|
|
}
|
|
|
|
|
|
|
|
}).then(function (params) {
|
|
|
|
if (params.error) {
|
|
|
|
// TODO directives.issuer || directives.audience
|
|
|
|
return OAUTH3.PromiseA.reject(OAUTH3.error.parse('https://oauth3.org', params));
|
|
|
|
}
|
|
|
|
return params;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, closeFrame: function (state, opts) {
|
|
|
|
opts = opts || {};
|
|
|
|
function close() {
|
|
|
|
try {
|
|
|
|
OAUTH3._browser._frames[state].close();
|
|
|
|
} catch(e) {
|
|
|
|
try {
|
|
|
|
OAUTH3._browser._frames[state].remove();
|
|
|
|
} catch(e) {
|
|
|
|
console.error(new Error("Could not clase window/iframe. closeFrame may have been called twice."));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
delete OAUTH3._browser._frames[state];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (opts.debug) {
|
|
|
|
if (window.confirm("DEBUG MODE: okay to close oauth3 window?")) {
|
|
|
|
close();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
close();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, _frames: {}
|
|
|
|
, iframe: function (url, state, opts) {
|
|
|
|
var framesrc = '<iframe class="js-oauth3-iframe" src="' + url + '" ';
|
|
|
|
if (opts.debug) {
|
|
|
|
framesrc += ' width="' + (opts.height || 600) + 'px"'
|
|
|
|
+ ' height="' + (opts.width || 720) + 'px"'
|
|
|
|
+ ' style="opacity: 0.8;" frameborder="1"';
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
framesrc += ' width="1px" height="1px" frameborder="0"';
|
|
|
|
}
|
|
|
|
framesrc += '></iframe>';
|
|
|
|
|
|
|
|
var frame = OAUTH3._browser.window.document.createElement('div');
|
|
|
|
frame.innerHTML = framesrc;
|
|
|
|
OAUTH3._browser.window.document.body.appendChild(frame);
|
|
|
|
|
|
|
|
return frame;
|
|
|
|
}
|
|
|
|
, frame: function (url, state, opts) {
|
|
|
|
|
|
|
|
// TODO allow size changes (via directive even)
|
|
|
|
return window.open(
|
|
|
|
url
|
|
|
|
, 'oauth3-login-' + (opts.reuseWindow || state)
|
|
|
|
, 'height=' + (opts.height || 720) + ',width=' + (opts.width || 620)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2017-02-28 01:19:01 +00:00
|
|
|
, api: function (providerUri, opts) {
|
|
|
|
if (!OAUTH3.api[opts.api]) {
|
2017-04-04 22:43:28 +00:00
|
|
|
return OAUTH3.PromiseA.reject(new Error("No API for '" + opts.api + "'"));
|
2017-02-28 01:19:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return OAUTH3.api[opts.api](providerUri, opts);
|
|
|
|
}
|
2017-08-12 02:09:28 +00:00
|
|
|
, _pkgs: {}
|
|
|
|
, pkg: function (providerUri, pkgname, method, opts) {
|
|
|
|
if (!OAUTH3._pkgs[pkgname]) {
|
|
|
|
return OAUTH3.PromiseA.reject(new Error("No Package for '" + pkgname + "'"));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!OAUTH3._pkgs[pkgname][method]) {
|
|
|
|
return OAUTH3.PromiseA.reject(new Error("No method '" + method + "' in package '" + pkgname + "'"));
|
|
|
|
}
|
|
|
|
// opts = { audience: providerUri }
|
|
|
|
return OAUTH3._pkgs[pkgname][method](opts);
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
};
|
|
|
|
OAUTH3.login = OAUTH3.implicitGrant;
|
|
|
|
|
2017-07-31 22:42:22 +00:00
|
|
|
OAUTH3._defaultStorage = {
|
|
|
|
_getStorageKeys: function (prefix, storage) {
|
|
|
|
storage = storage || window.localStorage;
|
|
|
|
var matching = [];
|
|
|
|
var ind, key;
|
|
|
|
for (ind = 0; ind < storage.length; ind++) {
|
|
|
|
key = storage.key(ind);
|
|
|
|
if (key.indexOf(prefix || '') === 0) {
|
|
|
|
matching.push(key);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return matching;
|
|
|
|
}
|
|
|
|
, directives: {
|
|
|
|
prefix: 'directives-'
|
|
|
|
, get: function (providerUri) {
|
|
|
|
var result = JSON.parse(window.localStorage.getItem(this.prefix + providerUri) || '{}');
|
|
|
|
return OAUTH3.PromiseA.resolve(result);
|
|
|
|
}
|
|
|
|
, set: function (providerUri, directives) {
|
|
|
|
window.localStorage.setItem(this.prefix + providerUri, JSON.stringify(directives));
|
|
|
|
return this.get(providerUri);
|
|
|
|
}
|
|
|
|
, all: function () {
|
|
|
|
var prefix = this.prefix;
|
|
|
|
var result = {};
|
|
|
|
OAUTH3._defaultStorage._getStorageKeys(prefix).forEach(function (key) {
|
|
|
|
result[key.replace(prefix, '')] = JSON.parse(window.localStorage.getItem(key) || '{}');
|
|
|
|
});
|
|
|
|
return OAUTH3.PromiseA.resolve(result);
|
|
|
|
}
|
|
|
|
, clear: function () {
|
|
|
|
OAUTH3._defaultStorage._getStorageKeys(this.prefix).forEach(function (key) {
|
|
|
|
window.localStorage.removeItem(key);
|
|
|
|
});
|
|
|
|
return OAUTH3.PromiseA.resolve();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
, sessions: {
|
|
|
|
prefix: 'session-'
|
|
|
|
, get: function (providerUri, id) {
|
|
|
|
var result;
|
|
|
|
if (id) {
|
|
|
|
result = JSON.parse(window.sessionStorage.getItem(this.prefix + providerUri+id) || 'null');
|
|
|
|
} else {
|
|
|
|
result = JSON.parse(window.sessionStorage.getItem(this.prefix + providerUri) || 'null');
|
|
|
|
}
|
|
|
|
return OAUTH3.PromiseA.resolve(result);
|
|
|
|
}
|
|
|
|
, set: function (providerUri, newSession, id) {
|
|
|
|
var str = JSON.stringify(newSession);
|
|
|
|
window.sessionStorage.setItem(this.prefix + providerUri, str);
|
2017-08-01 21:08:21 +00:00
|
|
|
id = id || newSession.id || newSession.token.sub || newSession.token.id;
|
2017-07-31 22:42:22 +00:00
|
|
|
if (id) {
|
|
|
|
window.sessionStorage.setItem(this.prefix + providerUri + id, str);
|
|
|
|
}
|
|
|
|
return this.get(providerUri, id);
|
|
|
|
}
|
|
|
|
, all: function (providerUri) {
|
|
|
|
var prefix = this.prefix + (providerUri || '');
|
|
|
|
var result = {};
|
|
|
|
OAUTH3._defaultStorage._getStorageKeys(prefix, window.sessionStorage).forEach(function (key) {
|
2017-08-01 21:08:21 +00:00
|
|
|
result[key.replace(prefix, '')] = JSON.parse(window.sessionStorage.getItem(key) || 'null');
|
2017-07-31 22:42:22 +00:00
|
|
|
});
|
|
|
|
return OAUTH3.PromiseA.resolve(result);
|
|
|
|
}
|
|
|
|
, clear: function (providerUri) {
|
|
|
|
var prefix = this.prefix + (providerUri || '');
|
|
|
|
OAUTH3._defaultStorage._getStorageKeys(prefix, window.sessionStorage).forEach(function (key) {
|
2017-08-01 21:08:21 +00:00
|
|
|
window.sessionStorage.removeItem(key);
|
2017-07-31 22:42:22 +00:00
|
|
|
});
|
|
|
|
return OAUTH3.PromiseA.resolve();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2017-02-21 21:23:22 +00:00
|
|
|
// TODO get rid of these
|
|
|
|
OAUTH3.utils = {
|
|
|
|
clientUri: OAUTH3.clientUri
|
|
|
|
, query: OAUTH3.query
|
2017-11-23 07:25:35 +00:00
|
|
|
, parseSubject: function (sub) {
|
|
|
|
var parts = sub.split('@');
|
|
|
|
var issuer;
|
|
|
|
var subject;
|
|
|
|
|
|
|
|
if (/@/.test(sub)) {
|
|
|
|
// The username may have a single @, the provider may not
|
|
|
|
// user@thing.com@whatever.com -> user@thing.com, whatever.com
|
|
|
|
issuer = parts.pop();
|
2017-11-24 01:27:24 +00:00
|
|
|
subject = parts.join('@');
|
2017-11-23 07:25:35 +00:00
|
|
|
} else {
|
|
|
|
//subject = '';
|
2017-11-24 01:27:24 +00:00
|
|
|
issuer = parts.join('@');
|
2017-11-23 07:25:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return { subject: subject, issuer: issuer };
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, scope: OAUTH3.scope
|
|
|
|
, uri: OAUTH3.uri
|
|
|
|
, url: OAUTH3.url
|
|
|
|
, _error: OAUTH3.error
|
|
|
|
, _formatError: OAUTH3.error
|
|
|
|
, _urlSafeBase64ToBase64: OAUTH3._urlSafeBase64ToBase64
|
|
|
|
, randomState: OAUTH3.randomState
|
|
|
|
, _insecureRandomState: OAUTH3._insecureRandomState
|
|
|
|
};
|
|
|
|
|
|
|
|
if ('undefined' !== typeof Promise) {
|
|
|
|
OAUTH3.PromiseA = Promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
// this is not necessary, but it's relatively small
|
|
|
|
// and gives people the 3-line examples they love so much
|
2017-03-24 16:13:15 +00:00
|
|
|
OAUTH3.create = function (location, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
if (!location) {
|
|
|
|
location = OAUTH3._browser.window.location;
|
|
|
|
}
|
|
|
|
|
2017-02-21 22:32:45 +00:00
|
|
|
var result = {
|
2017-02-21 21:23:22 +00:00
|
|
|
_clientUri: OAUTH3.clientUri(location)
|
2017-06-14 22:32:21 +00:00
|
|
|
, _identityProviderUri: null
|
|
|
|
, _resourceProviderUri: null
|
|
|
|
, _identityProviderDirectives: null
|
|
|
|
, _resourceProviderDirectives: null
|
2017-08-15 20:21:54 +00:00
|
|
|
//, _resourceProviderMap: null // map between xyz.com and domains@oauth3.org
|
2017-03-24 16:13:15 +00:00
|
|
|
, _init: function (location, opts) {
|
2017-02-21 21:23:22 +00:00
|
|
|
var me = this;
|
2017-08-10 20:35:24 +00:00
|
|
|
if (!opts) {
|
|
|
|
opts = location;
|
|
|
|
}
|
|
|
|
if (location && location.location) {
|
|
|
|
location = location.location;
|
|
|
|
}
|
|
|
|
if (opts && opts.location) {
|
|
|
|
me._clientUri = OAUTH3.clientUri(opts.location);
|
|
|
|
}
|
|
|
|
if (location && (location.host || location.hostname)) {
|
2017-03-24 16:13:15 +00:00
|
|
|
me._clientUri = OAUTH3.clientUri(location);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-03-24 16:13:15 +00:00
|
|
|
if (opts) {
|
|
|
|
if (opts.providerUri) {
|
2017-06-14 22:32:21 +00:00
|
|
|
me._identityProviderUri = opts.providerUri;
|
|
|
|
me._resourceProviderUri = opts.providerUri;
|
|
|
|
}
|
2017-08-10 20:35:24 +00:00
|
|
|
if (opts.issuer || opts.identityProviderUri) {
|
|
|
|
me._identityProviderUri = opts.issuer || opts.identityProviderUri;
|
2017-06-14 22:32:21 +00:00
|
|
|
}
|
2017-08-10 20:35:24 +00:00
|
|
|
if (opts.audience || opts.resourceProviderUri) {
|
|
|
|
me._resourceProviderUri = opts.audience || opts.resourceProviderUri;
|
2017-03-24 16:13:15 +00:00
|
|
|
}
|
|
|
|
if (opts.session) {
|
2017-06-14 22:32:21 +00:00
|
|
|
if (!me._identityProviderUri) {
|
2017-03-24 16:15:03 +00:00
|
|
|
throw new Error("'providerUri' was not supplied");
|
|
|
|
}
|
2017-06-14 22:32:21 +00:00
|
|
|
opts.session.provider_uri = me._identityProviderUri;
|
2017-05-24 03:25:09 +00:00
|
|
|
opts.session.client_uri = me._clientUri;
|
2017-03-24 16:13:15 +00:00
|
|
|
me.session(opts.session, opts.sessionId);
|
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-03-24 16:13:15 +00:00
|
|
|
}
|
2017-10-12 18:10:42 +00:00
|
|
|
, _initClient: function () {
|
2017-08-16 21:44:36 +00:00
|
|
|
var me = this;
|
|
|
|
return OAUTH3.discover(me._clientUri, { client_id: me._clientUri }).then(function (clientDirectives) {
|
|
|
|
me._clientDirectives = clientDirectives;
|
|
|
|
return clientDirectives;
|
|
|
|
});
|
|
|
|
}
|
2017-03-24 16:13:15 +00:00
|
|
|
, init: function (location/*, opts*/) {
|
|
|
|
var me = this;
|
2017-06-14 22:32:21 +00:00
|
|
|
var p1 = OAUTH3.PromiseA.resolve();
|
|
|
|
var p2 = OAUTH3.PromiseA.resolve();
|
2017-03-24 16:13:15 +00:00
|
|
|
|
|
|
|
me._init(location, opts);
|
|
|
|
|
2017-06-14 22:32:21 +00:00
|
|
|
if (me._identityProviderUri) {
|
2017-03-21 07:02:41 +00:00
|
|
|
// returns directives
|
2017-08-16 21:44:36 +00:00
|
|
|
p1 = me.setIssuer(me._identityProviderUri);
|
2017-06-14 22:32:21 +00:00
|
|
|
}
|
|
|
|
if (me._resourceProviderUri) {
|
|
|
|
// returns directives
|
2017-08-16 21:44:36 +00:00
|
|
|
p2 = me.setAudience(me._resourceProviderUri);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
|
2017-06-14 22:32:21 +00:00
|
|
|
return p1.then(function () {
|
|
|
|
return p2.then(function () {
|
2017-08-16 21:44:36 +00:00
|
|
|
return me._initClient();
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, setProvider: function (providerUri) {
|
|
|
|
var me = this;
|
2017-08-16 21:44:36 +00:00
|
|
|
return me._initClient().then(function () {
|
2017-06-14 22:32:21 +00:00
|
|
|
return me.setIdentityProvider(providerUri).then(function () {
|
2017-08-15 20:21:54 +00:00
|
|
|
// TODO how to say "Use xyz.com for domains@oauth3.org, but abc.com for dns@oauth3.org"?
|
2017-06-14 22:32:21 +00:00
|
|
|
return me.setResourceProvider(providerUri);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, setIdentityProvider: function (providerUri) {
|
|
|
|
var me = this;
|
|
|
|
me._identityProviderUri = providerUri;
|
2017-08-16 21:44:36 +00:00
|
|
|
return me._initClient().then(function () {
|
2017-06-14 22:32:21 +00:00
|
|
|
// this should be synchronous the second time around
|
|
|
|
return OAUTH3.discover(me._identityProviderUri, { client_id: me._clientUri }).then(function (directives) {
|
|
|
|
me._identityProviderDirectives = directives;
|
|
|
|
return directives;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
, setResourceProvider: function (providerUri) {
|
|
|
|
var me = this;
|
|
|
|
me._resourceProviderUri = providerUri;
|
2017-08-16 21:44:36 +00:00
|
|
|
return me._initClient().then(function () {
|
2017-02-21 21:23:22 +00:00
|
|
|
// this should be synchronous the second time around
|
2017-06-14 22:32:21 +00:00
|
|
|
return OAUTH3.discover(me._resourceProviderUri, { client_id: me._clientUri }).then(function (directives) {
|
|
|
|
me._resourceProviderDirectives = directives;
|
2017-02-21 21:23:22 +00:00
|
|
|
return directives;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
2017-03-02 07:37:45 +00:00
|
|
|
, checkSession: function () {
|
2017-06-14 22:32:21 +00:00
|
|
|
return OAUTH3.hooks.session.get(this._identityProviderUri);
|
2017-03-02 07:37:45 +00:00
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
, login: function (opts) {
|
|
|
|
var me = this;
|
2017-11-09 02:03:28 +00:00
|
|
|
return OAUTH3.hooks.session.get(me._identityProviderUri).then(function (session) {
|
|
|
|
if (session) {
|
|
|
|
me._session = true;
|
|
|
|
return session;
|
|
|
|
}
|
2017-03-02 07:37:45 +00:00
|
|
|
|
2017-11-09 02:03:28 +00:00
|
|
|
opts = opts || {};
|
|
|
|
opts.client_uri = me._clientUri;
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-11-09 02:03:28 +00:00
|
|
|
return OAUTH3.implicitGrant(me._identityProviderDirectives, opts).then(function (session) {
|
|
|
|
me._session = true;
|
|
|
|
return session;
|
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
});
|
|
|
|
}
|
2017-03-24 15:59:22 +00:00
|
|
|
, session: function (session, id) {
|
|
|
|
if (!session) {
|
2017-11-09 02:03:28 +00:00
|
|
|
return OAUTH3.hooks.session.get(this._identityProviderUri);
|
2017-03-24 15:59:22 +00:00
|
|
|
}
|
2017-06-14 22:32:21 +00:00
|
|
|
return OAUTH3.hooks.session.set(this._identityProviderUri, session, id);
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-02-28 01:19:01 +00:00
|
|
|
, request: function (preq, opts) {
|
|
|
|
opts = opts || {};
|
2017-02-21 21:23:22 +00:00
|
|
|
preq.client_uri = this._clientUri;
|
|
|
|
preq.client_id = this._clientUri;
|
2017-02-21 23:54:37 +00:00
|
|
|
preq.method = preq.method || 'GET';
|
|
|
|
// TODO maybe use a baseUrl from the directives file?
|
2017-06-14 22:32:21 +00:00
|
|
|
preq.url = OAUTH3.url.resolve(this._resourceProviderUri, preq.url);
|
2017-03-16 21:41:33 +00:00
|
|
|
|
2017-11-09 02:03:28 +00:00
|
|
|
if (preq.session || !this._session) {
|
|
|
|
return OAUTH3.request(preq, opts);
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.session().then(function (session) {
|
|
|
|
preq.session = session;
|
|
|
|
return OAUTH3.request(preq, opts);
|
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
|
|
|
, logout: function (opts) {
|
2017-11-13 20:56:58 +00:00
|
|
|
var me = this;
|
|
|
|
me._session = false;
|
2017-02-21 21:23:22 +00:00
|
|
|
opts = opts || {};
|
2017-11-13 20:56:58 +00:00
|
|
|
return OAUTH3.hooks.session.get(me._identityProviderUri).then(function (session) {
|
|
|
|
opts.client_uri = me._clientUri;
|
|
|
|
opts.client_id = me._clientUri;
|
2017-11-09 02:03:28 +00:00
|
|
|
opts.session = session;
|
2017-02-21 21:23:22 +00:00
|
|
|
|
2017-11-13 20:56:58 +00:00
|
|
|
return OAUTH3.logout(me._identityProviderUri, opts);
|
2017-11-09 02:03:28 +00:00
|
|
|
});
|
2017-02-21 21:23:22 +00:00
|
|
|
}
|
2017-02-28 01:19:01 +00:00
|
|
|
, api: function (api, opts) {
|
2017-11-13 20:56:58 +00:00
|
|
|
var me = this;
|
2017-02-28 01:19:01 +00:00
|
|
|
opts = opts || {};
|
2017-11-13 20:56:58 +00:00
|
|
|
return OAUTH3.hooks.session.get(me._identityProviderUri).then(function (session) {
|
2017-11-09 02:03:28 +00:00
|
|
|
opts.api = api;
|
|
|
|
opts.session = session;
|
2017-03-26 07:43:06 +00:00
|
|
|
|
2017-11-13 20:56:58 +00:00
|
|
|
return OAUTH3.api(me._resourceProviderDirectives.api, opts);
|
2017-11-09 02:03:28 +00:00
|
|
|
});
|
2017-02-28 01:19:01 +00:00
|
|
|
}
|
2017-08-12 02:09:28 +00:00
|
|
|
, pkg: function (pkgname) {
|
|
|
|
var me = this;
|
2017-08-23 16:16:18 +00:00
|
|
|
var issuer = me._identityProviderUri;
|
|
|
|
var audience = me._resourceProviderDirectives.api;
|
2017-08-12 02:09:28 +00:00
|
|
|
var pkg;
|
|
|
|
var result = {};
|
|
|
|
|
|
|
|
// TODO dynamically load package? https://publisher.com/.well-known/packages.js@oauth3.org/pkg@publisher.com.json
|
|
|
|
if (!OAUTH3._pkgs[pkgname]) {
|
|
|
|
return OAUTH3.PromiseA.reject(new Error("No Package for '" + pkgname + "'"));
|
|
|
|
}
|
|
|
|
|
2017-11-09 02:03:28 +00:00
|
|
|
return OAUTH3.hooks.session.get(issuer).then(function (session) {
|
|
|
|
pkg = OAUTH3._pkgs[pkgname];
|
|
|
|
Object.keys(pkg).forEach(function (key) {
|
|
|
|
result[key] = function (opts) {
|
|
|
|
opts = opts || {};
|
|
|
|
opts.session = session;
|
|
|
|
opts.audience = audience;
|
|
|
|
return pkg[key](opts);
|
|
|
|
};
|
|
|
|
});
|
2017-08-12 02:09:28 +00:00
|
|
|
|
2017-11-09 02:03:28 +00:00
|
|
|
return result;
|
|
|
|
});
|
2017-08-12 02:09:28 +00:00
|
|
|
}
|
2017-02-21 21:23:22 +00:00
|
|
|
};
|
2017-08-09 17:28:03 +00:00
|
|
|
result.setIssuer = result.setIdentityProvider;
|
|
|
|
result.setAudience = result.setResourceProvider;
|
2017-02-21 22:32:45 +00:00
|
|
|
result.authenticate = result.login;
|
|
|
|
result.authorize = result.login;
|
|
|
|
result.expire = result.logout;
|
2017-03-24 16:13:15 +00:00
|
|
|
|
|
|
|
result._init(location, opts);
|
|
|
|
|
2017-02-21 22:32:45 +00:00
|
|
|
return result;
|
2017-02-21 21:23:22 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
}('undefined' !== typeof exports ? exports : window));
|