2022-04-08 18:16:20 +08:00
|
|
|
import {
|
|
|
|
ApplicationType,
|
|
|
|
CustomClientMetadata,
|
|
|
|
customClientMetadataGuard,
|
|
|
|
OidcClientMetadata,
|
|
|
|
} from '@logto/schemas';
|
|
|
|
import { errors } from 'oidc-provider';
|
2021-08-18 00:24:00 +08:00
|
|
|
|
2022-01-11 11:58:58 +08:00
|
|
|
export const getApplicationTypeString = (type: ApplicationType) =>
|
2021-10-11 17:55:17 +08:00
|
|
|
type === ApplicationType.Native ? 'native' : 'web';
|
|
|
|
|
2022-01-11 11:58:58 +08:00
|
|
|
export const buildOidcClientMetadata = (metadata?: OidcClientMetadata): OidcClientMetadata => ({
|
2021-08-26 13:05:23 +08:00
|
|
|
redirectUris: [],
|
|
|
|
postLogoutRedirectUris: [],
|
2021-10-11 17:55:17 +08:00
|
|
|
...metadata,
|
2021-08-18 00:24:00 +08:00
|
|
|
});
|
2022-04-08 18:16:20 +08:00
|
|
|
|
|
|
|
export const validateCustomClientMetadata = (key: string, value: unknown) => {
|
|
|
|
const result = customClientMetadataGuard.pick({ [key]: true }).safeParse({ [key]: value });
|
|
|
|
|
|
|
|
if (!result.success) {
|
|
|
|
throw new errors.InvalidClientMetadata(key);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2022-07-05 17:36:43 +08:00
|
|
|
export const isOriginAllowed = (
|
|
|
|
origin: string,
|
|
|
|
customClientMetadata: CustomClientMetadata,
|
|
|
|
redirectUris: string[] = []
|
|
|
|
) => {
|
|
|
|
const { corsAllowedOrigins = [] } = customClientMetadata;
|
|
|
|
const redirectUriOrigins = redirectUris.map((uri) => new URL(uri).origin);
|
|
|
|
|
|
|
|
return [...corsAllowedOrigins, ...redirectUriOrigins].includes(origin);
|
|
|
|
};
|