@bc-koenro/oauth2-client
Version:
OAuth2 client for browsers and Node.js. Tiny footprint, PKCE support
385 lines (309 loc) • 11.7 kB
text/typescript
import { OAuth2Token } from './token';
import {
AuthorizationCodeRequest,
ClientCredentialsRequest,
IntrospectionRequest,
IntrospectionResponse,
PasswordRequest,
RefreshRequest,
ServerMetadataResponse,
TokenResponse,
} from './messages';
import { OAuth2Error } from './error';
import { OAuth2AuthorizationCodeClient } from './client/authorization-code';
export interface ClientSettings {
/**
* The hostname of the OAuth2 server.
* If provided, we'll attempt to discover all the other related endpoints.
*
* If this is not desired, just specify the other endpoints manually.
*
* This url will also be used as the base URL for all other urls. This lets
* you specify all the other urls as relative.
*/
server?: string;
/**
* OAuth2 clientId
*/
clientId: string;
/**
* OAuth2 clientSecret
*
* This is required when using the 'client_secret_basic' authenticationMethod
* for the client_credentials and password flows, but not authorization_code
* or implicit.
*/
clientSecret?: string;
/**
* The /authorize endpoint.
*
* Required only for the browser-portion of the authorization_code flow.
*/
authorizationEndpoint?: string;
/**
* The token endpoint.
*
* Required for most grant types and refreshing tokens.
*/
tokenEndpoint?: string;
/**
* Introspection endpoint.
*
* Required for, well, introspecting tokens.
* If not provided we'll try to discover it, or otherwise default to /introspect
*/
introspectionEndpoint?: string;
/**
* OAuth 2.0 Authorization Server Metadata endpoint or OpenID
* Connect Discovery 1.0 endpoint.
*
* If this endpoint is provided it can be used to automatically figure
* out all the other endpoints.
*
* Usually the URL for this is: https://server/.well-known/oauth-authorization-server
*/
discoveryEndpoint?: string;
/**
* Fetch implementation to use.
*
* Set this if you wish to explicitly set the fetch implementation, e.g. to
* implement middlewares or set custom headers.
*/
fetch?: typeof fetch;
/**
* Client authentication method that is used to authenticate
* when using the token endpoint.
*
* Can be one of 'client_secret_basic' | 'client_secret_post'.
*
* The default value is 'client_secret_basic' if not provided.
*/
authenticationMethod?: string;
}
type OAuth2Endpoint = 'tokenEndpoint' | 'authorizationEndpoint' | 'discoveryEndpoint' | 'introspectionEndpoint';
export class OAuth2Client {
settings: ClientSettings;
constructor(clientSettings: ClientSettings) {
if (!clientSettings?.fetch) {
clientSettings.fetch = fetch.bind(globalThis);
}
this.settings = clientSettings;
}
/**
* Refreshes an existing token, and returns a new one.
*/
async refreshToken(token: OAuth2Token): Promise<OAuth2Token> {
if (!token.refreshToken) {
throw new Error('This token didn\'t have a refreshToken. It\'s not possible to refresh this');
}
const body: RefreshRequest = {
grant_type: 'refresh_token',
refresh_token: token.refreshToken,
};
if (!this.settings.clientSecret) {
// If there's no secret, send the clientId in the body.
body.client_id = this.settings.clientId;
}
return tokenResponseToOAuth2Token(this.request('tokenEndpoint', body));
}
/**
* Retrieves an OAuth2 token using the client_credentials grant.
*/
async clientCredentials(params?: { scope?: string[]; extraParams?: Record<string, string> }): Promise<OAuth2Token> {
const disallowed = ['client_id', 'client_secret', 'grant_type', 'scope'];
if (params?.extraParams && Object.keys(params.extraParams).filter((key) => disallowed.includes(key)).length > 0) {
throw new Error(`The following extraParams are disallowed: '${disallowed.join("', '")}'`);
}
const body: ClientCredentialsRequest = {
grant_type: 'client_credentials',
scope: params?.scope?.join(' '),
...params?.extraParams
};
if (!this.settings.clientSecret) {
throw new Error('A clientSecret must be provided to use client_credentials');
}
return tokenResponseToOAuth2Token(this.request('tokenEndpoint', body));
}
/**
* Retrieves an OAuth2 token using the 'password' grant'.
*/
async password(params: { username: string; password: string; scope?: string[] }): Promise<OAuth2Token> {
const body: PasswordRequest = {
grant_type: 'password',
...params,
scope: params.scope?.join(' '),
};
return tokenResponseToOAuth2Token(this.request('tokenEndpoint', body));
}
/**
* Returns the helper object for the `authorization_code` grant.
*/
get authorizationCode(): OAuth2AuthorizationCodeClient {
return new OAuth2AuthorizationCodeClient(
this,
);
}
/**
* Introspect a token
*
* This will give information about the validity, owner, which client
* created the token and more.
*
* @see https://datatracker.ietf.org/doc/html/rfc7662
*/
async introspect(token: OAuth2Token): Promise<IntrospectionResponse> {
const body: IntrospectionRequest = {
token: token.accessToken,
token_type_hint: 'access_token',
};
return this.request('introspectionEndpoint', body);
}
/**
* Returns a url for an OAuth2 endpoint.
*
* Potentially fetches a discovery document to get it.
*/
async getEndpoint(endpoint: OAuth2Endpoint): Promise<string> {
if (this.settings[endpoint] !== undefined) {
return resolve(this.settings[endpoint] as string, this.settings.server);
}
if (endpoint !== 'discoveryEndpoint') {
// This condition prevents infinite loops.
await this.discover();
if (this.settings[endpoint] !== undefined) {
return resolve(this.settings[endpoint] as string, this.settings.server);
}
}
// If we got here it means we need to 'guess' the endpoint.
if (!this.settings.server) {
throw new Error(`Could not determine the location of ${endpoint}. Either specify ${endpoint} in the settings, or the "server" endpoint to let the client discover it.`);
}
switch (endpoint) {
case 'authorizationEndpoint':
return resolve('/authorize', this.settings.server);
case 'tokenEndpoint':
return resolve('/token', this.settings.server);
case 'discoveryEndpoint':
return resolve('/.well-known/oauth-authorization-server', this.settings.server);
case 'introspectionEndpoint':
return resolve('/introspect', this.settings.server);
}
}
private discoveryDone = false;
private serverMetadata: ServerMetadataResponse | null = null;
/**
* Fetches the OAuth2 discovery document
*/
private async discover(): Promise<void> {
// Never discover twice
if (this.discoveryDone) return;
this.discoveryDone = true;
let discoverUrl;
try {
discoverUrl = await this.getEndpoint('discoveryEndpoint');
} catch (err) {
console.warn('[oauth2] OAuth2 discovery endpoint could not be determined. Either specify the "server" or "discoveryEndpoint');
return;
}
const resp = await this.settings.fetch!(discoverUrl, { headers: { Accept: 'application/json' }});
if (!resp.ok) return;
if (!resp.headers.get('Content-Type')?.startsWith('application/json')) {
console.warn('[oauth2] OAuth2 discovery endpoint was not a JSON response. Response is ignored');
return;
}
this.serverMetadata = await resp.json();
const urlMap = [
['authorization_endpoint', 'authorizationEndpoint'],
['token_endpoint', 'tokenEndpoint'],
['introspection_endpoint', 'introspectionEndpoint'],
] as const;
if (this.serverMetadata === null) return;
for (const [property, setting] of urlMap) {
if (!this.serverMetadata[property]) continue;
this.settings[setting] = resolve(this.serverMetadata[property]!, discoverUrl);
}
if (this.serverMetadata.token_endpoint_auth_methods_supported && !this.settings.authenticationMethod) {
this.settings.authenticationMethod = this.serverMetadata.token_endpoint_auth_methods_supported[0];
}
}
/**
* Does a HTTP request on the 'token' endpoint.
*/
async request(endpoint: 'tokenEndpoint', body: RefreshRequest | ClientCredentialsRequest | PasswordRequest | AuthorizationCodeRequest): Promise<TokenResponse>;
async request(endpoint: 'introspectionEndpoint', body: IntrospectionRequest): Promise<IntrospectionResponse>;
async request(endpoint: OAuth2Endpoint, body: Record<string, any>): Promise<unknown> {
const uri = await this.getEndpoint(endpoint);
const headers: Record<string, string> = {
'Content-Type': 'application/x-www-form-urlencoded',
};
let authMethod = this.settings.authenticationMethod;
if (!authMethod) {
authMethod = this.settings.clientSecret ? 'client_secret_basic' : 'client_secret_post';
}
switch(authMethod) {
case 'client_secret_basic' :
headers.Authorization = 'Basic ' +
btoa(this.settings.clientId + ':' + this.settings.clientSecret);
break;
case 'client_secret_post' :
body.client_id = this.settings.clientId;
if (this.settings.clientSecret) {
body.client_secret = this.settings.clientSecret;
}
break;
default:
throw new Error('Authentication method not yet supported:' + authMethod + '. Open a feature request if you want this!');
}
const resp = await this.settings.fetch!(uri, {
method: 'POST',
body: generateQueryString(body),
headers,
});
if (resp.ok) {
return await resp.json();
}
let jsonError;
let errorMessage;
let oauth2Code;
if (resp.headers.has('Content-Type') && resp.headers.get('Content-Type')!.startsWith('application/json')) {
jsonError = await resp.json();
}
if (jsonError?.error) {
// This is likely an OAUth2-formatted error
errorMessage = 'OAuth2 error ' + jsonError.error + '.';
if (jsonError.error_description) {
errorMessage += ' ' + jsonError.error_description;
}
oauth2Code = jsonError.error;
} else {
errorMessage = 'HTTP Error ' + resp.status + ' ' + resp.statusText;
if (resp.status === 401 && this.settings.clientSecret) {
errorMessage += '. It\'s likely that the clientId and/or clientSecret was incorrect';
}
oauth2Code = null;
}
throw new OAuth2Error(errorMessage, oauth2Code, resp.status);
}
}
function resolve(uri: string, base?: string): string {
return new URL(uri, base).toString();
}
export function tokenResponseToOAuth2Token(resp: Promise<TokenResponse>): Promise<OAuth2Token> {
return resp.then(body => ({
accessToken: body.access_token,
expiresAt: body.expires_in ? Date.now() + (body.expires_in * 1000) : null,
refreshToken: body.refresh_token ?? null,
}));
}
/**
* Generates a query string.
*
* This function filters out any undefined values.
*/
export function generateQueryString(params: Record<string, undefined | number | string>): string {
return new URLSearchParams(
Object.fromEntries(
Object.entries(params).filter(([k, v]) => v !== undefined)
) as Record<string, string>
).toString();
}