angular-auth-oidc-client
Version:
An OpenID Connect Code Flow with PKCE,Implicit Flow client for Angular
674 lines • 71.4 kB
JavaScript
/**
* @fileoverview added by tsickle
* @suppress {checkTypes,extraRequire,missingOverride,missingReturn,unusedPrivateMembers,uselessCode} checked by tsc
*/
import * as tslib_1 from "tslib";
import { Injectable } from '@angular/core';
import { hextob64u, KEYUTIL, KJUR } from 'jsrsasign';
import { EqualityHelperService } from './oidc-equality-helper.service';
import { TokenHelperService } from './oidc-token-helper.service';
import { LoggerService } from './oidc.logger.service';
// http://openid.net/specs/openid-connect-implicit-1_0.html
// id_token
// id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)
// MUST exactly match the value of the iss (issuer) Claim.
//
// id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified
// by the iss (issuer) Claim as an audience.The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience,
// or if it contains additional audiences not trusted by the Client.
//
// id_token C3: If the ID Token contains multiple audiences, the Client SHOULD verify that an azp Claim is present.
//
// id_token C4: If an azp (authorized party) Claim is present, the Client SHOULD verify that its client_id is the Claim Value.
//
// id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the
// alg Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer.
//
// id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the OpenID Connect Core 1.0
// [OpenID.Core] specification.
//
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account
// for clock skew).
//
// id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
// limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
//
// id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one that was sent
// in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.The precise method for detecting replay attacks
// is Client specific.
//
// id_token C10: If the acr Claim was requested, the Client SHOULD check that the asserted Claim Value is appropriate.
// The meaning and processing of acr Claim Values is out of scope for this document.
//
// id_token C11: When a max_age request is made, the Client SHOULD check the auth_time Claim value and request re- authentication
// if it determines too much time has elapsed since the last End- User authentication.
// Access Token Validation
// access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA]
// for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256.
// access_token C2: Take the left- most half of the hash and base64url- encode it.
// access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash is present in the ID Token.
var OidcSecurityValidation = /** @class */ (function () {
function OidcSecurityValidation(arrayHelperService, tokenHelperService, loggerService) {
this.arrayHelperService = arrayHelperService;
this.tokenHelperService = tokenHelperService;
this.loggerService = loggerService;
}
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew).
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew).
/**
* @param {?} token
* @param {?=} offsetSeconds
* @return {?}
*/
OidcSecurityValidation.prototype.isTokenExpired =
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew).
/**
* @param {?} token
* @param {?=} offsetSeconds
* @return {?}
*/
function (token, offsetSeconds) {
/** @type {?} */
var decoded;
decoded = this.tokenHelperService.getPayloadFromToken(token, false);
return !this.validate_id_token_exp_not_expired(decoded, offsetSeconds);
};
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew).
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew).
/**
* @param {?} decoded_id_token
* @param {?=} offsetSeconds
* @return {?}
*/
OidcSecurityValidation.prototype.validate_id_token_exp_not_expired =
// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account for clock skew).
/**
* @param {?} decoded_id_token
* @param {?=} offsetSeconds
* @return {?}
*/
function (decoded_id_token, offsetSeconds) {
/** @type {?} */
var tokenExpirationDate = this.tokenHelperService.getTokenExpirationDate(decoded_id_token);
offsetSeconds = offsetSeconds || 0;
if (!tokenExpirationDate) {
return false;
}
/** @type {?} */
var tokenExpirationValue = tokenExpirationDate.valueOf();
/** @type {?} */
var nowWithOffset = new Date().valueOf() + offsetSeconds * 1000;
/** @type {?} */
var tokenNotExpired = tokenExpirationValue > nowWithOffset;
this.loggerService.logDebug("Token not expired?: " + tokenExpirationValue + " > " + nowWithOffset + " (" + tokenNotExpired + ")");
// Token not expired?
return tokenNotExpired;
};
// iss
// REQUIRED. Issuer Identifier for the Issuer of the response.The iss value is a case-sensitive URL using the https scheme that contains scheme, host,
// and optionally, port number and path components and no query or fragment components.
//
// sub
// REQUIRED. Subject Identifier.Locally unique and never reassigned identifier within the Issuer for the End- User,
// which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4.
// It MUST NOT exceed 255 ASCII characters in length.The sub value is a case-sensitive string.
//
// aud
// REQUIRED. Audience(s) that this ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the Relying Party as an audience value.
// It MAY also contain identifiers for other audiences.In the general case, the aud value is an array of case-sensitive strings.
// In the common special case when there is one audience, the aud value MAY be a single case-sensitive string.
//
// exp
// REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing.
// The processing of this parameter requires that the current date/ time MUST be before the expiration date/ time listed in the value.
// Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew.
// Its value is a JSON [RFC7159] number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured in UTC until the date/ time.
// See RFC 3339 [RFC3339] for details regarding date/ times in general and UTC in particular.
//
// iat
// REQUIRED. Time at which the JWT was issued. Its value is a JSON number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured
// in UTC until the date/ time.
// iss
// REQUIRED. Issuer Identifier for the Issuer of the response.The iss value is a case-sensitive URL using the https scheme that contains scheme, host,
// and optionally, port number and path components and no query or fragment components.
//
// sub
// REQUIRED. Subject Identifier.Locally unique and never reassigned identifier within the Issuer for the End- User,
// which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4.
// It MUST NOT exceed 255 ASCII characters in length.The sub value is a case-sensitive string.
//
// aud
// REQUIRED. Audience(s) that this ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the Relying Party as an audience value.
// It MAY also contain identifiers for other audiences.In the general case, the aud value is an array of case-sensitive strings.
// In the common special case when there is one audience, the aud value MAY be a single case-sensitive string.
//
// exp
// REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing.
// The processing of this parameter requires that the current date/ time MUST be before the expiration date/ time listed in the value.
// Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew.
// Its value is a JSON [RFC7159] number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured in UTC until the date/ time.
// See RFC 3339 [RFC3339] for details regarding date/ times in general and UTC in particular.
//
// iat
// REQUIRED. Time at which the JWT was issued. Its value is a JSON number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured
// in UTC until the date/ time.
/**
* @param {?} dataIdToken
* @return {?}
*/
OidcSecurityValidation.prototype.validate_required_id_token =
// iss
// REQUIRED. Issuer Identifier for the Issuer of the response.The iss value is a case-sensitive URL using the https scheme that contains scheme, host,
// and optionally, port number and path components and no query or fragment components.
//
// sub
// REQUIRED. Subject Identifier.Locally unique and never reassigned identifier within the Issuer for the End- User,
// which is intended to be consumed by the Client, e.g., 24400320 or AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4.
// It MUST NOT exceed 255 ASCII characters in length.The sub value is a case-sensitive string.
//
// aud
// REQUIRED. Audience(s) that this ID Token is intended for. It MUST contain the OAuth 2.0 client_id of the Relying Party as an audience value.
// It MAY also contain identifiers for other audiences.In the general case, the aud value is an array of case-sensitive strings.
// In the common special case when there is one audience, the aud value MAY be a single case-sensitive string.
//
// exp
// REQUIRED. Expiration time on or after which the ID Token MUST NOT be accepted for processing.
// The processing of this parameter requires that the current date/ time MUST be before the expiration date/ time listed in the value.
// Implementers MAY provide for some small leeway, usually no more than a few minutes, to account for clock skew.
// Its value is a JSON [RFC7159] number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured in UTC until the date/ time.
// See RFC 3339 [RFC3339] for details regarding date/ times in general and UTC in particular.
//
// iat
// REQUIRED. Time at which the JWT was issued. Its value is a JSON number representing the number of seconds from 1970- 01 - 01T00: 00:00Z as measured
// in UTC until the date/ time.
/**
* @param {?} dataIdToken
* @return {?}
*/
function (dataIdToken) {
/** @type {?} */
var validated = true;
if (!dataIdToken.hasOwnProperty('iss')) {
validated = false;
this.loggerService.logWarning('iss is missing, this is required in the id_token');
}
if (!dataIdToken.hasOwnProperty('sub')) {
validated = false;
this.loggerService.logWarning('sub is missing, this is required in the id_token');
}
if (!dataIdToken.hasOwnProperty('aud')) {
validated = false;
this.loggerService.logWarning('aud is missing, this is required in the id_token');
}
if (!dataIdToken.hasOwnProperty('exp')) {
validated = false;
this.loggerService.logWarning('exp is missing, this is required in the id_token');
}
if (!dataIdToken.hasOwnProperty('iat')) {
validated = false;
this.loggerService.logWarning('iat is missing, this is required in the id_token');
}
return validated;
};
// id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
// limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
// id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
// limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
/**
* @param {?} dataIdToken
* @param {?} max_offset_allowed_in_seconds
* @param {?} disable_iat_offset_validation
* @return {?}
*/
OidcSecurityValidation.prototype.validate_id_token_iat_max_offset =
// id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,
// limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.
/**
* @param {?} dataIdToken
* @param {?} max_offset_allowed_in_seconds
* @param {?} disable_iat_offset_validation
* @return {?}
*/
function (dataIdToken, max_offset_allowed_in_seconds, disable_iat_offset_validation) {
if (disable_iat_offset_validation) {
return true;
}
if (!dataIdToken.hasOwnProperty('iat')) {
return false;
}
/** @type {?} */
var dateTime_iat_id_token = new Date(0);
dateTime_iat_id_token.setUTCSeconds(dataIdToken.iat);
max_offset_allowed_in_seconds = max_offset_allowed_in_seconds || 0;
if (dateTime_iat_id_token == null) {
return false;
}
this.loggerService.logDebug('validate_id_token_iat_max_offset: ' +
(new Date().valueOf() - dateTime_iat_id_token.valueOf()) +
' < ' +
max_offset_allowed_in_seconds * 1000);
return new Date().valueOf() - dateTime_iat_id_token.valueOf() < max_offset_allowed_in_seconds * 1000;
};
// id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one
// that was sent in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.
// The precise method for detecting replay attacks is Client specific.
// id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one
// that was sent in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.
// The precise method for detecting replay attacks is Client specific.
/**
* @param {?} dataIdToken
* @param {?} local_nonce
* @return {?}
*/
OidcSecurityValidation.prototype.validate_id_token_nonce =
// id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one
// that was sent in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.
// The precise method for detecting replay attacks is Client specific.
/**
* @param {?} dataIdToken
* @param {?} local_nonce
* @return {?}
*/
function (dataIdToken, local_nonce) {
if (dataIdToken.nonce !== local_nonce) {
this.loggerService.logDebug('Validate_id_token_nonce failed, dataIdToken.nonce: ' + dataIdToken.nonce + ' local_nonce:' + local_nonce);
return false;
}
return true;
};
// id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)
// MUST exactly match the value of the iss (issuer) Claim.
// id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)
// MUST exactly match the value of the iss (issuer) Claim.
/**
* @param {?} dataIdToken
* @param {?} authWellKnownEndpoints_issuer
* @return {?}
*/
OidcSecurityValidation.prototype.validate_id_token_iss =
// id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)
// MUST exactly match the value of the iss (issuer) Claim.
/**
* @param {?} dataIdToken
* @param {?} authWellKnownEndpoints_issuer
* @return {?}
*/
function (dataIdToken, authWellKnownEndpoints_issuer) {
if (((/** @type {?} */ (dataIdToken.iss))) !== ((/** @type {?} */ (authWellKnownEndpoints_issuer)))) {
this.loggerService.logDebug('Validate_id_token_iss failed, dataIdToken.iss: ' +
dataIdToken.iss +
' authWellKnownEndpoints issuer:' +
authWellKnownEndpoints_issuer);
return false;
}
return true;
};
// id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified
// by the iss (issuer) Claim as an audience.
// The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, or if it contains additional audiences
// not trusted by the Client.
// id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified
// by the iss (issuer) Claim as an audience.
// The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, or if it contains additional audiences
// not trusted by the Client.
/**
* @param {?} dataIdToken
* @param {?} aud
* @return {?}
*/
OidcSecurityValidation.prototype.validate_id_token_aud =
// id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified
// by the iss (issuer) Claim as an audience.
// The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience, or if it contains additional audiences
// not trusted by the Client.
/**
* @param {?} dataIdToken
* @param {?} aud
* @return {?}
*/
function (dataIdToken, aud) {
if (dataIdToken.aud instanceof Array) {
/** @type {?} */
var result = this.arrayHelperService.areEqual(dataIdToken.aud, aud);
if (!result) {
this.loggerService.logDebug('Validate_id_token_aud array failed, dataIdToken.aud: ' + dataIdToken.aud + ' client_id:' + aud);
return false;
}
return true;
}
else if (dataIdToken.aud !== aud) {
this.loggerService.logDebug('Validate_id_token_aud failed, dataIdToken.aud: ' + dataIdToken.aud + ' client_id:' + aud);
return false;
}
return true;
};
/**
* @param {?} state
* @param {?} local_state
* @return {?}
*/
OidcSecurityValidation.prototype.validateStateFromHashCallback = /**
* @param {?} state
* @param {?} local_state
* @return {?}
*/
function (state, local_state) {
if (((/** @type {?} */ (state))) !== ((/** @type {?} */ (local_state)))) {
this.loggerService.logDebug('ValidateStateFromHashCallback failed, state: ' + state + ' local_state:' + local_state);
return false;
}
return true;
};
/**
* @param {?} id_token_sub
* @param {?} userdata_sub
* @return {?}
*/
OidcSecurityValidation.prototype.validate_userdata_sub_id_token = /**
* @param {?} id_token_sub
* @param {?} userdata_sub
* @return {?}
*/
function (id_token_sub, userdata_sub) {
if (((/** @type {?} */ (id_token_sub))) !== ((/** @type {?} */ (userdata_sub)))) {
this.loggerService.logDebug('validate_userdata_sub_id_token failed, id_token_sub: ' + id_token_sub + ' userdata_sub:' + userdata_sub);
return false;
}
return true;
};
// id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the alg
// Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer.
// id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the
// OpenID Connect Core 1.0 [OpenID.Core] specification.
// id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the alg
// Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer.
// id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the
// OpenID Connect Core 1.0 [OpenID.Core] specification.
/**
* @param {?} id_token
* @param {?} jwtkeys
* @return {?}
*/
OidcSecurityValidation.prototype.validate_signature_id_token =
// id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the alg
// Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer.
// id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the
// OpenID Connect Core 1.0 [OpenID.Core] specification.
/**
* @param {?} id_token
* @param {?} jwtkeys
* @return {?}
*/
function (id_token, jwtkeys) {
var e_1, _a, e_2, _b, e_3, _c;
if (!jwtkeys || !jwtkeys.keys) {
return false;
}
/** @type {?} */
var header_data = this.tokenHelperService.getHeaderFromToken(id_token, false);
if (Object.keys(header_data).length === 0 && header_data.constructor === Object) {
this.loggerService.logWarning('id token has no header data');
return false;
}
/** @type {?} */
var kid = header_data.kid;
/** @type {?} */
var alg = header_data.alg;
if ('RS256' !== ((/** @type {?} */ (alg)))) {
this.loggerService.logWarning('Only RS256 supported');
return false;
}
/** @type {?} */
var isValid = false;
if (!header_data.hasOwnProperty('kid')) {
// exactly 1 key in the jwtkeys and no kid in the Jose header
// kty "RSA" use "sig"
/** @type {?} */
var amountOfMatchingKeys = 0;
try {
for (var _d = tslib_1.__values(jwtkeys.keys), _e = _d.next(); !_e.done; _e = _d.next()) {
var key = _e.value;
if (((/** @type {?} */ (key.kty))) === 'RSA' && ((/** @type {?} */ (key.use))) === 'sig') {
amountOfMatchingKeys = amountOfMatchingKeys + 1;
}
}
}
catch (e_1_1) { e_1 = { error: e_1_1 }; }
finally {
try {
if (_e && !_e.done && (_a = _d.return)) _a.call(_d);
}
finally { if (e_1) throw e_1.error; }
}
if (amountOfMatchingKeys === 0) {
this.loggerService.logWarning('no keys found, incorrect Signature, validation failed for id_token');
return false;
}
else if (amountOfMatchingKeys > 1) {
this.loggerService.logWarning('no ID Token kid claim in JOSE header and multiple supplied in jwks_uri');
return false;
}
else {
try {
for (var _f = tslib_1.__values(jwtkeys.keys), _g = _f.next(); !_g.done; _g = _f.next()) {
var key = _g.value;
if (((/** @type {?} */ (key.kty))) === 'RSA' && ((/** @type {?} */ (key.use))) === 'sig') {
/** @type {?} */
var publickey = KEYUTIL.getKey(key);
isValid = KJUR.jws.JWS.verify(id_token, publickey, ['RS256']);
if (!isValid) {
this.loggerService.logWarning('incorrect Signature, validation failed for id_token');
}
return isValid;
}
}
}
catch (e_2_1) { e_2 = { error: e_2_1 }; }
finally {
try {
if (_g && !_g.done && (_b = _f.return)) _b.call(_f);
}
finally { if (e_2) throw e_2.error; }
}
}
}
else {
try {
// kid in the Jose header of id_token
for (var _h = tslib_1.__values(jwtkeys.keys), _j = _h.next(); !_j.done; _j = _h.next()) {
var key = _j.value;
if (((/** @type {?} */ (key.kid))) === ((/** @type {?} */ (kid)))) {
/** @type {?} */
var publickey = KEYUTIL.getKey(key);
isValid = KJUR.jws.JWS.verify(id_token, publickey, ['RS256']);
if (!isValid) {
this.loggerService.logWarning('incorrect Signature, validation failed for id_token');
}
return isValid;
}
}
}
catch (e_3_1) { e_3 = { error: e_3_1 }; }
finally {
try {
if (_j && !_j.done && (_c = _h.return)) _c.call(_h);
}
finally { if (e_3) throw e_3.error; }
}
}
return isValid;
};
/**
* @param {?} response_type
* @return {?}
*/
OidcSecurityValidation.prototype.config_validate_response_type = /**
* @param {?} response_type
* @return {?}
*/
function (response_type) {
if (response_type === 'id_token token' || response_type === 'id_token') {
return true;
}
if (response_type === 'code') {
return true;
}
this.loggerService.logWarning('module configure incorrect, invalid response_type:' + response_type);
return false;
};
// Accepts ID Token without 'kid' claim in JOSE header if only one JWK supplied in 'jwks_url'
//// private validate_no_kid_in_header_only_one_allowed_in_jwtkeys(header_data: any, jwtkeys: any): boolean {
//// this.oidcSecurityCommon.logDebug('amount of jwtkeys.keys: ' + jwtkeys.keys.length);
//// if (!header_data.hasOwnProperty('kid')) {
//// // no kid defined in Jose header
//// if (jwtkeys.keys.length != 1) {
//// this.oidcSecurityCommon.logDebug('jwtkeys.keys.length != 1 and no kid in header');
//// return false;
//// }
//// }
//// return true;
//// }
// Access Token Validation
// access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA]
// for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256.
// access_token C2: Take the left- most half of the hash and base64url- encode it.
// access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash
// is present in the ID Token.
// Accepts ID Token without 'kid' claim in JOSE header if only one JWK supplied in 'jwks_url'
//// private validate_no_kid_in_header_only_one_allowed_in_jwtkeys(header_data: any, jwtkeys: any): boolean {
//// this.oidcSecurityCommon.logDebug('amount of jwtkeys.keys: ' + jwtkeys.keys.length);
//// if (!header_data.hasOwnProperty('kid')) {
//// // no kid defined in Jose header
//// if (jwtkeys.keys.length != 1) {
//// this.oidcSecurityCommon.logDebug('jwtkeys.keys.length != 1 and no kid in header');
//// return false;
//// }
//// }
//// return true;
//// }
// Access Token Validation
// access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA]
// for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256.
// access_token C2: Take the left- most half of the hash and base64url- encode it.
// access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash
// is present in the ID Token.
/**
* @param {?} access_token
* @param {?} at_hash
* @param {?} isCodeFlow
* @return {?}
*/
OidcSecurityValidation.prototype.validate_id_token_at_hash =
// Accepts ID Token without 'kid' claim in JOSE header if only one JWK supplied in 'jwks_url'
//// private validate_no_kid_in_header_only_one_allowed_in_jwtkeys(header_data: any, jwtkeys: any): boolean {
//// this.oidcSecurityCommon.logDebug('amount of jwtkeys.keys: ' + jwtkeys.keys.length);
//// if (!header_data.hasOwnProperty('kid')) {
//// // no kid defined in Jose header
//// if (jwtkeys.keys.length != 1) {
//// this.oidcSecurityCommon.logDebug('jwtkeys.keys.length != 1 and no kid in header');
//// return false;
//// }
//// }
//// return true;
//// }
// Access Token Validation
// access_token C1: Hash the octets of the ASCII representation of the access_token with the hash algorithm specified in JWA[JWA]
// for the alg Header Parameter of the ID Token's JOSE Header. For instance, if the alg is RS256, the hash algorithm used is SHA-256.
// access_token C2: Take the left- most half of the hash and base64url- encode it.
// access_token C3: The value of at_hash in the ID Token MUST match the value produced in the previous step if at_hash
// is present in the ID Token.
/**
* @param {?} access_token
* @param {?} at_hash
* @param {?} isCodeFlow
* @return {?}
*/
function (access_token, at_hash, isCodeFlow) {
this.loggerService.logDebug('at_hash from the server:' + at_hash);
// The at_hash is optional for the code flow
if (isCodeFlow) {
if (!((/** @type {?} */ (at_hash)))) {
this.loggerService.logDebug('Code Flow active, and no at_hash in the id_token, skipping check!');
return true;
}
}
/** @type {?} */
var testdata = this.generate_at_hash('' + access_token);
this.loggerService.logDebug('at_hash client validation not decoded:' + testdata);
if (testdata === ((/** @type {?} */ (at_hash)))) {
return true; // isValid;
}
else {
/** @type {?} */
var testValue = this.generate_at_hash('' + decodeURIComponent(access_token));
this.loggerService.logDebug('-gen access--' + testValue);
if (testValue === ((/** @type {?} */ (at_hash)))) {
return true; // isValid
}
}
return false;
};
/**
* @private
* @param {?} access_token
* @return {?}
*/
OidcSecurityValidation.prototype.generate_at_hash = /**
* @private
* @param {?} access_token
* @return {?}
*/
function (access_token) {
/** @type {?} */
var hash = KJUR.crypto.Util.hashString(access_token, 'sha256');
/** @type {?} */
var first128bits = hash.substr(0, hash.length / 2);
/** @type {?} */
var testdata = hextob64u(first128bits);
return testdata;
};
/**
* @param {?} code_challenge
* @return {?}
*/
OidcSecurityValidation.prototype.generate_code_verifier = /**
* @param {?} code_challenge
* @return {?}
*/
function (code_challenge) {
/** @type {?} */
var hash = KJUR.crypto.Util.hashString(code_challenge, 'sha256');
/** @type {?} */
var testdata = hextob64u(hash);
return testdata;
};
OidcSecurityValidation.decorators = [
{ type: Injectable }
];
/** @nocollapse */
OidcSecurityValidation.ctorParameters = function () { return [
{ type: EqualityHelperService },
{ type: TokenHelperService },
{ type: LoggerService }
]; };
return OidcSecurityValidation;
}());
export { OidcSecurityValidation };
if (false) {
/**
* @type {?}
* @private
*/
OidcSecurityValidation.prototype.arrayHelperService;
/**
* @type {?}
* @private
*/
OidcSecurityValidation.prototype.tokenHelperService;
/**
* @type {?}
* @private
*/
OidcSecurityValidation.prototype.loggerService;
}
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"oidc.security.validation.js","sourceRoot":"ng://angular-auth-oidc-client/","sources":["lib/services/oidc.security.validation.ts"],"names":[],"mappings":";;;;;AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,eAAe,CAAC;AAC3C,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,WAAW,CAAC;AACrD,OAAO,EAAE,qBAAqB,EAAE,MAAM,gCAAgC,CAAC;AACvE,OAAO,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,uBAAuB,CAAC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AA4CtD;IAEI,gCACY,kBAAyC,EACzC,kBAAsC,EACtC,aAA4B;QAF5B,uBAAkB,GAAlB,kBAAkB,CAAuB;QACzC,uBAAkB,GAAlB,kBAAkB,CAAoB;QACtC,kBAAa,GAAb,aAAa,CAAe;IACrC,CAAC;IAEJ,0JAA0J;;;;;;;IAC1J,+CAAc;;;;;;;IAAd,UAAe,KAAa,EAAE,aAAsB;;YAC5C,OAAY;QAChB,OAAO,GAAG,IAAI,CAAC,kBAAkB,CAAC,mBAAmB,CAAC,KAAK,EAAE,KAAK,CAAC,CAAC;QAEpE,OAAO,CAAC,IAAI,CAAC,iCAAiC,CAAC,OAAO,EAAE,aAAa,CAAC,CAAC;IAC3E,CAAC;IAED,0JAA0J;;;;;;;IAC1J,kEAAiC;;;;;;;IAAjC,UAAkC,gBAAwB,EAAE,aAAsB;;YACxE,mBAAmB,GAAG,IAAI,CAAC,kBAAkB,CAAC,sBAAsB,CAAC,gBAAgB,CAAC;QAC5F,aAAa,GAAG,aAAa,IAAI,CAAC,CAAC;QAEnC,IAAI,CAAC,mBAAmB,EAAE;YACtB,OAAO,KAAK,CAAC;SAChB;;YAEK,oBAAoB,GAAG,mBAAmB,CAAC,OAAO,EAAE;;YACpD,aAAa,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,aAAa,GAAG,IAAI;;YAC3D,eAAe,GAAG,oBAAoB,GAAG,aAAa;QAE5D,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,yBAAuB,oBAAoB,WAAM,aAAa,WAAM,eAAe,MAAG,CAAC,CAAC;QAEpH,qBAAqB;QACrB,OAAO,eAAe,CAAC;IAC3B,CAAC;IAED,MAAM;IACN,sJAAsJ;IACtJ,uFAAuF;IACvF,EAAE;IACF,MAAM;IACN,mHAAmH;IACnH,6GAA6G;IAC7G,8FAA8F;IAC9F,EAAE;IACF,MAAM;IACN,+IAA+I;IAC/I,gIAAgI;IAChI,8GAA8G;IAC9G,EAAE;IACF,MAAM;IACN,gGAAgG;IAChG,sIAAsI;IACtI,iHAAiH;IACjH,iJAAiJ;IACjJ,6FAA6F;IAC7F,EAAE;IACF,MAAM;IACN,sJAAsJ;IACtJ,+BAA+B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;IAC/B,2DAA0B;;;;;;;;;;;;;;;;;;;;;;;;;;;;;IAA1B,UAA2B,WAAgB;;YACnC,SAAS,GAAG,IAAI;QACpB,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,SAAS,GAAG,KAAK,CAAC;YAClB,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,kDAAkD,CAAC,CAAC;SACrF;QAED,OAAO,SAAS,CAAC;IACrB,CAAC;IAED,+GAA+G;IAC/G,wHAAwH;;;;;;;;;IACxH,iEAAgC;;;;;;;;;IAAhC,UAAiC,WAAgB,EAC7C,6BAAqC,EACrC,6BAAsC;QAEtC,IAAI,6BAA6B,EAAE;YAC/B,OAAO,IAAI,CAAC;SACf;QAED,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;YACpC,OAAO,KAAK,CAAC;SAChB;;YAEK,qBAAqB,GAAG,IAAI,IAAI,CAAC,CAAC,CAAC;QACzC,qBAAqB,CAAC,aAAa,CAAC,WAAW,CAAC,GAAG,CAAC,CAAC;QAErD,6BAA6B,GAAG,6BAA6B,IAAI,CAAC,CAAC;QAEnE,IAAI,qBAAqB,IAAI,IAAI,EAAE;YAC/B,OAAO,KAAK,CAAC;SAChB;QAED,IAAI,CAAC,aAAa,CAAC,QAAQ,CACvB,oCAAoC;YAChC,CAAC,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,qBAAqB,CAAC,OAAO,EAAE,CAAC;YACxD,KAAK;YACL,6BAA6B,GAAG,IAAI,CAC3C,CAAC;QACF,OAAO,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,GAAG,qBAAqB,CAAC,OAAO,EAAE,GAAG,6BAA6B,GAAG,IAAI,CAAC;IACzG,CAAC;IAED,2GAA2G;IAC3G,0GAA0G;IAC1G,sEAAsE;;;;;;;;;IACtE,wDAAuB;;;;;;;;;IAAvB,UAAwB,WAAgB,EAAE,WAAgB;QACtD,IAAI,WAAW,CAAC,KAAK,KAAK,WAAW,EAAE;YACnC,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,qDAAqD,GAAG,WAAW,CAAC,KAAK,GAAG,eAAe,GAAG,WAAW,CAAC,CAAC;YACvI,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,4GAA4G;IAC5G,0DAA0D;;;;;;;;IAC1D,sDAAqB;;;;;;;;IAArB,UAAsB,WAAgB,EAAE,6BAAkC;QACtE,IAAI,CAAC,mBAAA,WAAW,CAAC,GAAG,EAAU,CAAC,KAAK,CAAC,mBAAA,6BAA6B,EAAU,CAAC,EAAE;YAC3E,IAAI,CAAC,aAAa,CAAC,QAAQ,CACvB,iDAAiD;gBAC7C,WAAW,CAAC,GAAG;gBACf,iCAAiC;gBACjC,6BAA6B,CACpC,CAAC;YACF,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,uIAAuI;IACvI,4CAA4C;IAC5C,qIAAqI;IACrI,6BAA6B;;;;;;;;;;IAC7B,sDAAqB;;;;;;;;;;IAArB,UAAsB,WAAgB,EAAE,GAAQ;QAC5C,IAAI,WAAW,CAAC,GAAG,YAAY,KAAK,EAAE;;gBAC5B,MAAM,GAAG,IAAI,CAAC,kBAAkB,CAAC,QAAQ,CAAC,WAAW,CAAC,GAAG,EAAE,GAAG,CAAC;YAErE,IAAI,CAAC,MAAM,EAAE;gBACT,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,wDAAwD,GAAG,WAAW,CAAC,GAAG,GAAG,aAAa,GAAG,GAAG,CAAC,CAAC;gBAC9H,OAAO,KAAK,CAAC;aAChB;YAED,OAAO,IAAI,CAAC;SACf;aAAM,IAAI,WAAW,CAAC,GAAG,KAAK,GAAG,EAAE;YAChC,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,iDAAiD,GAAG,WAAW,CAAC,GAAG,GAAG,aAAa,GAAG,GAAG,CAAC,CAAC;YAEvH,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;;;;;;IAED,8DAA6B;;;;;IAA7B,UAA8B,KAAU,EAAE,WAAgB;QACtD,IAAI,CAAC,mBAAA,KAAK,EAAU,CAAC,KAAK,CAAC,mBAAA,WAAW,EAAU,CAAC,EAAE;YAC/C,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,+CAA+C,GAAG,KAAK,GAAG,eAAe,GAAG,WAAW,CAAC,CAAC;YACrH,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;;;;;;IAED,+DAA8B;;;;;IAA9B,UAA+B,YAAiB,EAAE,YAAiB;QAC/D,IAAI,CAAC,mBAAA,YAAY,EAAU,CAAC,KAAK,CAAC,mBAAA,YAAY,EAAU,CAAC,EAAE;YACvD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,uDAAuD,GAAG,YAAY,GAAG,gBAAgB,GAAG,YAAY,CAAC,CAAC;YACtI,OAAO,KAAK,CAAC;SAChB;QAED,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,sIAAsI;IACtI,2FAA2F;IAC3F,sHAAsH;IACtH,uDAAuD;;;;;;;;;;IACvD,4DAA2B;;;;;;;;;;IAA3B,UAA4B,QAAa,EAAE,OAAY;;QACnD,IAAI,CAAC,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE;YAC3B,OAAO,KAAK,CAAC;SAChB;;YAEK,WAAW,GAAG,IAAI,CAAC,kBAAkB,CAAC,kBAAkB,CAAC,QAAQ,EAAE,KAAK,CAAC;QAE/E,IAAI,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,MAAM,KAAK,CAAC,IAAI,WAAW,CAAC,WAAW,KAAK,MAAM,EAAE;YAC7E,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,6BAA6B,CAAC,CAAC;YAC7D,OAAO,KAAK,CAAC;SAChB;;YAEK,GAAG,GAAG,WAAW,CAAC,GAAG;;YACrB,GAAG,GAAG,WAAW,CAAC,GAAG;QAE3B,IAAI,OAAO,KAAK,CAAC,mBAAA,GAAG,EAAU,CAAC,EAAE;YAC7B,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,sBAAsB,CAAC,CAAC;YACtD,OAAO,KAAK,CAAC;SAChB;;YAEG,OAAO,GAAG,KAAK;QAEnB,IAAI,CAAC,WAAW,CAAC,cAAc,CAAC,KAAK,CAAC,EAAE;;;;gBAGhC,oBAAoB,GAAG,CAAC;;gBAC5B,KAAkB,IAAA,KAAA,iBAAA,OAAO,CAAC,IAAI,CAAA,gBAAA,4BAAE;oBAA3B,IAAM,GAAG,WAAA;oBACV,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,EAAE;wBAChE,oBAAoB,GAAG,oBAAoB,GAAG,CAAC,CAAC;qBACnD;iBACJ;;;;;;;;;YAED,IAAI,oBAAoB,KAAK,CAAC,EAAE;gBAC5B,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,oEAAoE,CAAC,CAAC;gBACpG,OAAO,KAAK,CAAC;aAChB;iBAAM,IAAI,oBAAoB,GAAG,CAAC,EAAE;gBACjC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,wEAAwE,CAAC,CAAC;gBACxG,OAAO,KAAK,CAAC;aAChB;iBAAM;;oBACH,KAAkB,IAAA,KAAA,iBAAA,OAAO,CAAC,IAAI,CAAA,gBAAA,4BAAE;wBAA3B,IAAM,GAAG,WAAA;wBACV,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,KAAK,EAAE;;gCAC1D,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC;4BACrC,OAAO,GAAG,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC;4BAC9D,IAAI,CAAC,OAAO,EAAE;gCACV,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,qDAAqD,CAAC,CAAC;6BACxF;4BACD,OAAO,OAAO,CAAC;yBAClB;qBACJ;;;;;;;;;aACJ;SACJ;aAAM;;gBACH,qCAAqC;gBACrC,KAAkB,IAAA,KAAA,iBAAA,OAAO,CAAC,IAAI,CAAA,gBAAA,4BAAE;oBAA3B,IAAM,GAAG,WAAA;oBACV,IAAI,CAAC,mBAAA,GAAG,CAAC,GAAG,EAAU,CAAC,KAAK,CAAC,mBAAA,GAAG,EAAU,CAAC,EAAE;;4BACnC,SAAS,GAAG,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC;wBACrC,OAAO,GAAG,IAAI,CAAC,GAAG,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,EAAE,CAAC,OAAO,CAAC,CAAC,CAAC;wBAC9D,IAAI,CAAC,OAAO,EAAE;4BACV,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,qDAAqD,CAAC,CAAC;yBACxF;wBACD,OAAO,OAAO,CAAC;qBAClB;iBACJ;;;;;;;;;SACJ;QAED,OAAO,OAAO,CAAC;IACnB,CAAC;;;;;IAED,8DAA6B;;;;IAA7B,UAA8B,aAAqB;QAC/C,IAAI,aAAa,KAAK,gBAAgB,IAAI,aAAa,KAAK,UAAU,EAAE;YACpE,OAAO,IAAI,CAAC;SACf;QAED,IAAI,aAAa,KAAK,MAAM,EAAE;YAC1B,OAAO,IAAI,CAAC;SACf;QAED,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,oDAAoD,GAAG,aAAa,CAAC,CAAC;QACpG,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,6FAA6F;IAC7F,6GAA6G;IAC7G,2FAA2F;IAC3F,iDAAiD;IACjD,4CAA4C;IAC5C,2CAA2C;IAC3C,kGAAkG;IAClG,6BAA6B;IAC7B,aAAa;IACb,SAAS;IAET,oBAAoB;IACpB,MAAM;IAEN,0BAA0B;IAC1B,iIAAiI;IACjI,qIAAqI;IACrI,kFAAkF;IAClF,sHAAsH;IACtH,8BAA8B;;;;;;;;;;;;;;;;;;;;;;;;;IAC9B,0DAAyB;;;;;;;;;;;;;;;;;;;;;;;;;IAAzB,UAA0B,YAAiB,EAAE,OAAY,EAAE,UAAmB;QAC1E,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,0BAA0B,GAAG,OAAO,CAAC,CAAC;QAElE,4CAA4C;QAC5C,IAAI,UAAU,EAAE;YACZ,IAAI,CAAC,CAAC,mBAAA,OAAO,EAAU,CAAC,EAAE;gBACtB,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,mEAAmE,CAAC,CAAC;gBACjG,OAAO,IAAI,CAAC;aACf;SACJ;;YAEK,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,EAAE,GAAG,YAAY,CAAC;QACzD,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,wCAAwC,GAAG,QAAQ,CAAC,CAAC;QACjF,IAAI,QAAQ,KAAK,CAAC,mBAAA,OAAO,EAAU,CAAC,EAAE;YAClC,OAAO,IAAI,CAAC,CAAC,WAAW;SAC3B;aAAM;;gBACG,SAAS,GAAG,IAAI,CAAC,gBAAgB,CAAC,EAAE,GAAG,kBAAkB,CAAC,YAAY,CAAC,CAAC;YAC9E,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAC,eAAe,GAAG,SAAS,CAAC,CAAC;YACzD,IAAI,SAAS,KAAK,CAAC,mBAAA,OAAO,EAAU,CAAC,EAAE;gBACnC,OAAO,IAAI,CAAC,CAAC,UAAU;aAC1B;SACJ;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;;;;;;IAEO,iDAAgB;;;;;IAAxB,UAAyB,YAAiB;;YAChC,IAAI,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,YAAY,EAAE,QAAQ,CAAC;;YAC1D,YAAY,GAAG,IAAI,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,MAAM,GAAG,CAAC,CAAC;;YAC9C,QAAQ,GAAG,SAAS,CAAC,YAAY,CAAC;QAExC,OAAO,QAAQ,CAAC;IACpB,CAAC;;;;;IAED,uDAAsB;;;;IAAtB,UAAuB,cAAmB;;YAChC,IAAI,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,cAAc,EAAE,QAAQ,CAAC;;YAC5D,QAAQ,GAAG,SAAS,CAAC,IAAI,CAAC;QAEhC,OAAO,QAAQ,CAAC;IACpB,CAAC;;gBA7UJ,UAAU;;;;gBA9CF,qBAAqB;gBACrB,kBAAkB;gBAClB,aAAa;;IA0XtB,6BAAC;CAAA,AA9UD,IA8UC;SA7UY,sBAAsB;;;;;;IAE3B,oDAAiD;;;;;IACjD,oDAA8C;;;;;IAC9C,+CAAoC","sourcesContent":["import { Injectable } from '@angular/core';\nimport { hextob64u, KEYUTIL, KJUR } from 'jsrsasign';\nimport { EqualityHelperService } from './oidc-equality-helper.service';\nimport { TokenHelperService } from './oidc-token-helper.service';\nimport { LoggerService } from './oidc.logger.service';\n\n// http://openid.net/specs/openid-connect-implicit-1_0.html\n\n// id_token\n// id_token C1: The Issuer Identifier for the OpenID Provider (which is typically obtained during Discovery)\n// MUST exactly match the value of the iss (issuer) Claim.\n//\n// id_token C2: The Client MUST validate that the aud (audience) Claim contains its client_id value registered at the Issuer identified\n// by the iss (issuer) Claim as an audience.The ID Token MUST be rejected if the ID Token does not list the Client as a valid audience,\n// or if it contains additional audiences not trusted by the Client.\n//\n// id_token C3: If the ID Token contains multiple audiences, the Client SHOULD verify that an azp Claim is present.\n//\n// id_token C4: If an azp (authorized party) Claim is present, the Client SHOULD verify that its client_id is the Claim Value.\n//\n// id_token C5: The Client MUST validate the signature of the ID Token according to JWS [JWS] using the algorithm specified in the\n// alg Header Parameter of the JOSE Header.The Client MUST use the keys provided by the Issuer.\n//\n// id_token C6: The alg value SHOULD be RS256. Validation of tokens using other signing algorithms is described in the OpenID Connect Core 1.0\n// [OpenID.Core] specification.\n//\n// id_token C7: The current time MUST be before the time represented by the exp Claim (possibly allowing for some small leeway to account\n// for clock skew).\n//\n// id_token C8: The iat Claim can be used to reject tokens that were issued too far away from the current time,\n// limiting the amount of time that nonces need to be stored to prevent attacks.The acceptable range is Client specific.\n//\n// id_token C9: The value of the nonce Claim MUST be checked to verify that it is the same value as the one that was sent\n// in the Authentication Request.The Client SHOULD check the nonce value for replay attacks.The precise method for detecting replay attacks\n// is Client specific.\n//\n// id_token C10: If the acr Claim was requested, the Client SHOULD check that the asserted Claim Value is appropriate.\n// The meaning and processing of acr Claim Values is out of scope for this document.\n//\n// id_token C11: When a max_age request is made, the Client SHOULD check the auth_time Claim va