UNPKG

auth0

Version:

Auth0 Node.js SDK for the Management API v2.

159 lines (158 loc) 8.64 kB
"use strict"; var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || (function () { var ownKeys = function(o) { ownKeys = Object.getOwnPropertyNames || function (o) { var ar = []; for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k; return ar; }; return ownKeys(o); }; return function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]); __setModuleDefault(result, mod); return result; }; })(); var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; Object.defineProperty(exports, "__esModule", { value: true }); exports.IDTokenValidator = exports.IdTokenValidatorError = void 0; const jose = __importStar(require("jose")); const DEFAULT_CLOCK_TOLERANCE = 60; // secs class IdTokenValidatorError extends Error { } exports.IdTokenValidatorError = IdTokenValidatorError; class IDTokenValidator { constructor({ domain, clientId, clientSecret, headers, timeoutDuration, idTokenSigningAlg = "RS256", clockTolerance = DEFAULT_CLOCK_TOLERANCE, }) { this.jwks = jose.createRemoteJWKSet(new URL(`https://${domain}/.well-known/jwks.json`), { timeoutDuration, headers, }); this.alg = idTokenSigningAlg; this.audience = clientId; this.secret = new TextEncoder().encode(clientSecret); this.issuer = `https://${domain}/`; this.clockTolerance = clockTolerance; } validate(idToken_1) { return __awaiter(this, arguments, void 0, function* (idToken, { nonce, maxAge, organization } = {}) { const secret = this.alg === "HS256" ? this.secret : this.jwks; const header = jose.decodeProtectedHeader(idToken); const payload = jose.decodeJwt(idToken); // Check algorithm if (header.alg !== "RS256" && header.alg !== "HS256") { throw new Error(`Signature algorithm of "${header.alg}" is not supported. Expected the ID token to be signed with "RS256" or "HS256".`); } // Issuer if (!payload.iss || typeof payload.iss !== "string") { throw new IdTokenValidatorError("Issuer (iss) claim must be a string present in the ID token"); } if (payload.iss !== this.issuer) { throw new IdTokenValidatorError(`Issuer (iss) claim mismatch in the ID token; expected "${this.issuer}", found "${payload.iss}"`); } // Subject if (!payload.sub || typeof payload.sub !== "string") { throw new IdTokenValidatorError("Subject (sub) claim must be a string present in the ID token"); } // Audience if (!payload.aud || !(typeof payload.aud === "string" || Array.isArray(payload.aud))) { throw new IdTokenValidatorError("Audience (aud) claim must be a string or array of strings present in the ID token"); } if (Array.isArray(payload.aud) && !payload.aud.includes(this.audience)) { throw new IdTokenValidatorError(`Audience (aud) claim mismatch in the ID token; expected "${this.audience}" but was not one of "${payload.aud.join(", ")}"`); } else if (typeof payload.aud === "string" && payload.aud !== this.audience) { throw new IdTokenValidatorError(`Audience (aud) claim mismatch in the ID token; expected "${this.audience}" but found "${payload.aud}"`); } // Organization if (organization) { if (organization.indexOf("org_") === 0) { if (!payload.org_id || typeof payload.org_id !== "string") { throw new Error("Organization Id (org_id) claim must be a string present in the ID token"); } } else { if (!payload.org_name || typeof payload.org_name !== "string") { throw new Error("Organization Name (org_name) claim must be a string present in the ID token"); } } } // Time validation (epoch) const now = Math.floor(Date.now() / 1000); // Expires at if (!payload.exp || typeof payload.exp !== "number") { throw new IdTokenValidatorError("Expiration Time (exp) claim must be a number present in the ID token"); } const expTime = payload.exp + this.clockTolerance; if (now > expTime) { throw new IdTokenValidatorError(`Expiration Time (exp) claim error in the ID token; current time (${now}) is after expiration time (${expTime})`); } // Issued at if (!payload.iat || typeof payload.iat !== "number") { throw new IdTokenValidatorError("Issued At (iat) claim must be a number present in the ID token"); } // Nonce if (nonce || payload.nonce) { if (!payload.nonce || typeof payload.nonce !== "string") { throw new IdTokenValidatorError("Nonce (nonce) claim must be a string present in the ID token"); } if (payload.nonce !== nonce) { throw new IdTokenValidatorError(`Nonce (nonce) claim mismatch in the ID token; expected "${nonce}", found "${payload.nonce}"`); } } // Authorized party if (Array.isArray(payload.aud) && payload.aud.length > 1) { if (!payload.azp || typeof payload.azp !== "string") { throw new IdTokenValidatorError("Authorized Party (azp) claim must be a string present in the ID token when Audience (aud) claim has multiple values"); } if (payload.azp !== this.audience) { throw new IdTokenValidatorError(`Authorized Party (azp) claim mismatch in the ID token; expected "${this.audience}", found "${payload.azp}"`); } } // Authentication time if (maxAge) { if (!payload.auth_time || typeof payload.auth_time !== "number") { throw new IdTokenValidatorError("Authentication Time (auth_time) claim must be a number present in the ID token when Max Age (max_age) is specified"); } const authValidUntil = payload.auth_time + maxAge + this.clockTolerance; if (now > authValidUntil) { throw new IdTokenValidatorError(`Authentication Time (auth_time) claim in the ID token indicates that too much time has passed since the last end-user authentication. Currrent time (${now}) is after last auth at ${authValidUntil}`); } } yield jose.jwtVerify(idToken, secret, { issuer: this.issuer, audience: this.audience, clockTolerance: this.clockTolerance, maxTokenAge: maxAge, algorithms: ["HS256", "RS256"], }); }); } } exports.IDTokenValidator = IDTokenValidator;