mirror of
https://github.com/tvytlx/ai-agent-deep-dive.git
synced 2026-04-08 10:04:48 +08:00
Add extracted source directory and README navigation
This commit is contained in:
259
extracted-source/node_modules/@azure/msal-common/dist/client/AuthorizationCodeClient.mjs
generated
vendored
Normal file
259
extracted-source/node_modules/@azure/msal-common/dist/client/AuthorizationCodeClient.mjs
generated
vendored
Normal file
@@ -0,0 +1,259 @@
|
||||
/*! @azure/msal-common v15.13.1 2025-10-29 */
|
||||
'use strict';
|
||||
import { BaseClient } from './BaseClient.mjs';
|
||||
import { addClientId, addRedirectUri, addScopes, addAuthorizationCode, addLibraryInfo, addApplicationTelemetry, addThrottling, addServerTelemetry, addCodeVerifier, addClientSecret, addClientAssertion, addClientAssertionType, addGrantType, addClientInfo, addPopToken, addSshJwk, addClaims, addCcsUpn, addCcsOid, addBrokerParameters, addExtraQueryParameters, instrumentBrokerParams, addPostLogoutRedirectUri, addCorrelationId, addIdTokenHint, addState, addLogoutHint, addInstanceAware } from '../request/RequestParameterBuilder.mjs';
|
||||
import { mapToQueryString } from '../utils/UrlUtils.mjs';
|
||||
import { Separators, AuthenticationScheme, HeaderNames, GrantType } from '../utils/Constants.mjs';
|
||||
import { RETURN_SPA_CODE, CLIENT_ID } from '../constants/AADServerParamKeys.mjs';
|
||||
import { isOidcProtocolMode } from '../config/ClientConfiguration.mjs';
|
||||
import { ResponseHandler } from '../response/ResponseHandler.mjs';
|
||||
import { StringUtils } from '../utils/StringUtils.mjs';
|
||||
import { createClientAuthError } from '../error/ClientAuthError.mjs';
|
||||
import { UrlString } from '../url/UrlString.mjs';
|
||||
import { PopTokenGenerator } from '../crypto/PopTokenGenerator.mjs';
|
||||
import { nowSeconds } from '../utils/TimeUtils.mjs';
|
||||
import { buildClientInfo, buildClientInfoFromHomeAccountId } from '../account/ClientInfo.mjs';
|
||||
import { CcsCredentialType } from '../account/CcsCredential.mjs';
|
||||
import { createClientConfigurationError } from '../error/ClientConfigurationError.mjs';
|
||||
import { PerformanceEvents } from '../telemetry/performance/PerformanceEvent.mjs';
|
||||
import { invokeAsync } from '../utils/FunctionWrappers.mjs';
|
||||
import { getClientAssertion } from '../utils/ClientAssertionUtils.mjs';
|
||||
import { getRequestThumbprint } from '../network/RequestThumbprint.mjs';
|
||||
import { requestCannotBeMade } from '../error/ClientAuthErrorCodes.mjs';
|
||||
import { logoutRequestEmpty, redirectUriEmpty, missingSshJwk } from '../error/ClientConfigurationErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/**
|
||||
* Oauth2.0 Authorization Code client
|
||||
* @internal
|
||||
*/
|
||||
class AuthorizationCodeClient extends BaseClient {
|
||||
constructor(configuration, performanceClient) {
|
||||
super(configuration, performanceClient);
|
||||
// Flag to indicate if client is for hybrid spa auth code redemption
|
||||
this.includeRedirectUri = true;
|
||||
this.oidcDefaultScopes =
|
||||
this.config.authOptions.authority.options.OIDCOptions?.defaultScopes;
|
||||
}
|
||||
/**
|
||||
* API to acquire a token in exchange of 'authorization_code` acquired by the user in the first leg of the
|
||||
* authorization_code_grant
|
||||
* @param request
|
||||
*/
|
||||
async acquireToken(request, authCodePayload) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.AuthClientAcquireToken, request.correlationId);
|
||||
if (!request.code) {
|
||||
throw createClientAuthError(requestCannotBeMade);
|
||||
}
|
||||
const reqTimestamp = nowSeconds();
|
||||
const response = await invokeAsync(this.executeTokenRequest.bind(this), PerformanceEvents.AuthClientExecuteTokenRequest, this.logger, this.performanceClient, request.correlationId)(this.authority, request);
|
||||
// Retrieve requestId from response headers
|
||||
const requestId = response.headers?.[HeaderNames.X_MS_REQUEST_ID];
|
||||
const responseHandler = new ResponseHandler(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, this.config.serializableCache, this.config.persistencePlugin, this.performanceClient);
|
||||
// Validate response. This function throws a server error if an error is returned by the server.
|
||||
responseHandler.validateTokenResponse(response.body);
|
||||
return invokeAsync(responseHandler.handleServerTokenResponse.bind(responseHandler), PerformanceEvents.HandleServerTokenResponse, this.logger, this.performanceClient, request.correlationId)(response.body, this.authority, reqTimestamp, request, authCodePayload, undefined, undefined, undefined, requestId);
|
||||
}
|
||||
/**
|
||||
* Used to log out the current user, and redirect the user to the postLogoutRedirectUri.
|
||||
* Default behaviour is to redirect the user to `window.location.href`.
|
||||
* @param authorityUri
|
||||
*/
|
||||
getLogoutUri(logoutRequest) {
|
||||
// Throw error if logoutRequest is null/undefined
|
||||
if (!logoutRequest) {
|
||||
throw createClientConfigurationError(logoutRequestEmpty);
|
||||
}
|
||||
const queryString = this.createLogoutUrlQueryString(logoutRequest);
|
||||
// Construct logout URI
|
||||
return UrlString.appendQueryString(this.authority.endSessionEndpoint, queryString);
|
||||
}
|
||||
/**
|
||||
* Executes POST request to token endpoint
|
||||
* @param authority
|
||||
* @param request
|
||||
*/
|
||||
async executeTokenRequest(authority, request) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.AuthClientExecuteTokenRequest, request.correlationId);
|
||||
const queryParametersString = this.createTokenQueryParameters(request);
|
||||
const endpoint = UrlString.appendQueryString(authority.tokenEndpoint, queryParametersString);
|
||||
const requestBody = await invokeAsync(this.createTokenRequestBody.bind(this), PerformanceEvents.AuthClientCreateTokenRequestBody, this.logger, this.performanceClient, request.correlationId)(request);
|
||||
let ccsCredential = undefined;
|
||||
if (request.clientInfo) {
|
||||
try {
|
||||
const clientInfo = buildClientInfo(request.clientInfo, this.cryptoUtils.base64Decode);
|
||||
ccsCredential = {
|
||||
credential: `${clientInfo.uid}${Separators.CLIENT_INFO_SEPARATOR}${clientInfo.utid}`,
|
||||
type: CcsCredentialType.HOME_ACCOUNT_ID,
|
||||
};
|
||||
}
|
||||
catch (e) {
|
||||
this.logger.verbose("Could not parse client info for CCS Header: " + e);
|
||||
}
|
||||
}
|
||||
const headers = this.createTokenRequestHeaders(ccsCredential || request.ccsCredential);
|
||||
const thumbprint = getRequestThumbprint(this.config.authOptions.clientId, request);
|
||||
return invokeAsync(this.executePostToTokenEndpoint.bind(this), PerformanceEvents.AuthorizationCodeClientExecutePostToTokenEndpoint, this.logger, this.performanceClient, request.correlationId)(endpoint, requestBody, headers, thumbprint, request.correlationId, PerformanceEvents.AuthorizationCodeClientExecutePostToTokenEndpoint);
|
||||
}
|
||||
/**
|
||||
* Generates a map for all the params to be sent to the service
|
||||
* @param request
|
||||
*/
|
||||
async createTokenRequestBody(request) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.AuthClientCreateTokenRequestBody, request.correlationId);
|
||||
const parameters = new Map();
|
||||
addClientId(parameters, request.embeddedClientId ||
|
||||
request.tokenBodyParameters?.[CLIENT_ID] ||
|
||||
this.config.authOptions.clientId);
|
||||
/*
|
||||
* For hybrid spa flow, there will be a code but no verifier
|
||||
* In this scenario, don't include redirect uri as auth code will not be bound to redirect URI
|
||||
*/
|
||||
if (!this.includeRedirectUri) {
|
||||
// Just validate
|
||||
if (!request.redirectUri) {
|
||||
throw createClientConfigurationError(redirectUriEmpty);
|
||||
}
|
||||
}
|
||||
else {
|
||||
// Validate and include redirect uri
|
||||
addRedirectUri(parameters, request.redirectUri);
|
||||
}
|
||||
// Add scope array, parameter builder will add default scopes and dedupe
|
||||
addScopes(parameters, request.scopes, true, this.oidcDefaultScopes);
|
||||
// add code: user set, not validated
|
||||
addAuthorizationCode(parameters, request.code);
|
||||
// Add library metadata
|
||||
addLibraryInfo(parameters, this.config.libraryInfo);
|
||||
addApplicationTelemetry(parameters, this.config.telemetry.application);
|
||||
addThrottling(parameters);
|
||||
if (this.serverTelemetryManager && !isOidcProtocolMode(this.config)) {
|
||||
addServerTelemetry(parameters, this.serverTelemetryManager);
|
||||
}
|
||||
// add code_verifier if passed
|
||||
if (request.codeVerifier) {
|
||||
addCodeVerifier(parameters, request.codeVerifier);
|
||||
}
|
||||
if (this.config.clientCredentials.clientSecret) {
|
||||
addClientSecret(parameters, this.config.clientCredentials.clientSecret);
|
||||
}
|
||||
if (this.config.clientCredentials.clientAssertion) {
|
||||
const clientAssertion = this.config.clientCredentials.clientAssertion;
|
||||
addClientAssertion(parameters, await getClientAssertion(clientAssertion.assertion, this.config.authOptions.clientId, request.resourceRequestUri));
|
||||
addClientAssertionType(parameters, clientAssertion.assertionType);
|
||||
}
|
||||
addGrantType(parameters, GrantType.AUTHORIZATION_CODE_GRANT);
|
||||
addClientInfo(parameters);
|
||||
if (request.authenticationScheme === AuthenticationScheme.POP) {
|
||||
const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils, this.performanceClient);
|
||||
let reqCnfData;
|
||||
if (!request.popKid) {
|
||||
const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
|
||||
reqCnfData = generatedReqCnfData.reqCnfString;
|
||||
}
|
||||
else {
|
||||
reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
|
||||
}
|
||||
// SPA PoP requires full Base64Url encoded req_cnf string (unhashed)
|
||||
addPopToken(parameters, reqCnfData);
|
||||
}
|
||||
else if (request.authenticationScheme === AuthenticationScheme.SSH) {
|
||||
if (request.sshJwk) {
|
||||
addSshJwk(parameters, request.sshJwk);
|
||||
}
|
||||
else {
|
||||
throw createClientConfigurationError(missingSshJwk);
|
||||
}
|
||||
}
|
||||
if (!StringUtils.isEmptyObj(request.claims) ||
|
||||
(this.config.authOptions.clientCapabilities &&
|
||||
this.config.authOptions.clientCapabilities.length > 0)) {
|
||||
addClaims(parameters, request.claims, this.config.authOptions.clientCapabilities);
|
||||
}
|
||||
let ccsCred = undefined;
|
||||
if (request.clientInfo) {
|
||||
try {
|
||||
const clientInfo = buildClientInfo(request.clientInfo, this.cryptoUtils.base64Decode);
|
||||
ccsCred = {
|
||||
credential: `${clientInfo.uid}${Separators.CLIENT_INFO_SEPARATOR}${clientInfo.utid}`,
|
||||
type: CcsCredentialType.HOME_ACCOUNT_ID,
|
||||
};
|
||||
}
|
||||
catch (e) {
|
||||
this.logger.verbose("Could not parse client info for CCS Header: " + e);
|
||||
}
|
||||
}
|
||||
else {
|
||||
ccsCred = request.ccsCredential;
|
||||
}
|
||||
// Adds these as parameters in the request instead of headers to prevent CORS preflight request
|
||||
if (this.config.systemOptions.preventCorsPreflight && ccsCred) {
|
||||
switch (ccsCred.type) {
|
||||
case CcsCredentialType.HOME_ACCOUNT_ID:
|
||||
try {
|
||||
const clientInfo = buildClientInfoFromHomeAccountId(ccsCred.credential);
|
||||
addCcsOid(parameters, clientInfo);
|
||||
}
|
||||
catch (e) {
|
||||
this.logger.verbose("Could not parse home account ID for CCS Header: " +
|
||||
e);
|
||||
}
|
||||
break;
|
||||
case CcsCredentialType.UPN:
|
||||
addCcsUpn(parameters, ccsCred.credential);
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (request.embeddedClientId) {
|
||||
addBrokerParameters(parameters, this.config.authOptions.clientId, this.config.authOptions.redirectUri);
|
||||
}
|
||||
if (request.tokenBodyParameters) {
|
||||
addExtraQueryParameters(parameters, request.tokenBodyParameters);
|
||||
}
|
||||
// Add hybrid spa parameters if not already provided
|
||||
if (request.enableSpaAuthorizationCode &&
|
||||
(!request.tokenBodyParameters ||
|
||||
!request.tokenBodyParameters[RETURN_SPA_CODE])) {
|
||||
addExtraQueryParameters(parameters, {
|
||||
[RETURN_SPA_CODE]: "1",
|
||||
});
|
||||
}
|
||||
instrumentBrokerParams(parameters, request.correlationId, this.performanceClient);
|
||||
return mapToQueryString(parameters);
|
||||
}
|
||||
/**
|
||||
* This API validates the `EndSessionRequest` and creates a URL
|
||||
* @param request
|
||||
*/
|
||||
createLogoutUrlQueryString(request) {
|
||||
const parameters = new Map();
|
||||
if (request.postLogoutRedirectUri) {
|
||||
addPostLogoutRedirectUri(parameters, request.postLogoutRedirectUri);
|
||||
}
|
||||
if (request.correlationId) {
|
||||
addCorrelationId(parameters, request.correlationId);
|
||||
}
|
||||
if (request.idTokenHint) {
|
||||
addIdTokenHint(parameters, request.idTokenHint);
|
||||
}
|
||||
if (request.state) {
|
||||
addState(parameters, request.state);
|
||||
}
|
||||
if (request.logoutHint) {
|
||||
addLogoutHint(parameters, request.logoutHint);
|
||||
}
|
||||
if (request.extraQueryParameters) {
|
||||
addExtraQueryParameters(parameters, request.extraQueryParameters);
|
||||
}
|
||||
if (this.config.authOptions.instanceAware) {
|
||||
addInstanceAware(parameters);
|
||||
}
|
||||
return mapToQueryString(parameters, this.config.authOptions.encodeExtraQueryParams, request.extraQueryParameters);
|
||||
}
|
||||
}
|
||||
|
||||
export { AuthorizationCodeClient };
|
||||
//# sourceMappingURL=AuthorizationCodeClient.mjs.map
|
||||
167
extracted-source/node_modules/@azure/msal-common/dist/client/BaseClient.mjs
generated
vendored
Normal file
167
extracted-source/node_modules/@azure/msal-common/dist/client/BaseClient.mjs
generated
vendored
Normal file
@@ -0,0 +1,167 @@
|
||||
/*! @azure/msal-common v15.13.1 2025-10-29 */
|
||||
'use strict';
|
||||
import { buildClientConfiguration } from '../config/ClientConfiguration.mjs';
|
||||
import { Logger } from '../logger/Logger.mjs';
|
||||
import { Constants, HeaderNames } from '../utils/Constants.mjs';
|
||||
import { name, version } from '../packageMetadata.mjs';
|
||||
import { CcsCredentialType } from '../account/CcsCredential.mjs';
|
||||
import { buildClientInfoFromHomeAccountId } from '../account/ClientInfo.mjs';
|
||||
import { addBrokerParameters, addExtraQueryParameters, addCorrelationId, instrumentBrokerParams } from '../request/RequestParameterBuilder.mjs';
|
||||
import { mapToQueryString } from '../utils/UrlUtils.mjs';
|
||||
import { createDiscoveredInstance } from '../authority/AuthorityFactory.mjs';
|
||||
import { PerformanceEvents } from '../telemetry/performance/PerformanceEvent.mjs';
|
||||
import { ThrottlingUtils } from '../network/ThrottlingUtils.mjs';
|
||||
import { AuthError } from '../error/AuthError.mjs';
|
||||
import { createClientAuthError } from '../error/ClientAuthError.mjs';
|
||||
import { NetworkError } from '../error/NetworkError.mjs';
|
||||
import { invokeAsync } from '../utils/FunctionWrappers.mjs';
|
||||
import { networkError } from '../error/ClientAuthErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/**
|
||||
* Base application class which will construct requests to send to and handle responses from the Microsoft STS using the authorization code flow.
|
||||
* @internal
|
||||
*/
|
||||
class BaseClient {
|
||||
constructor(configuration, performanceClient) {
|
||||
// Set the configuration
|
||||
this.config = buildClientConfiguration(configuration);
|
||||
// Initialize the logger
|
||||
this.logger = new Logger(this.config.loggerOptions, name, version);
|
||||
// Initialize crypto
|
||||
this.cryptoUtils = this.config.cryptoInterface;
|
||||
// Initialize storage interface
|
||||
this.cacheManager = this.config.storageInterface;
|
||||
// Set the network interface
|
||||
this.networkClient = this.config.networkInterface;
|
||||
// Set TelemetryManager
|
||||
this.serverTelemetryManager = this.config.serverTelemetryManager;
|
||||
// set Authority
|
||||
this.authority = this.config.authOptions.authority;
|
||||
// set performance telemetry client
|
||||
this.performanceClient = performanceClient;
|
||||
}
|
||||
/**
|
||||
* Creates default headers for requests to token endpoint
|
||||
*/
|
||||
createTokenRequestHeaders(ccsCred) {
|
||||
const headers = {};
|
||||
headers[HeaderNames.CONTENT_TYPE] = Constants.URL_FORM_CONTENT_TYPE;
|
||||
if (!this.config.systemOptions.preventCorsPreflight && ccsCred) {
|
||||
switch (ccsCred.type) {
|
||||
case CcsCredentialType.HOME_ACCOUNT_ID:
|
||||
try {
|
||||
const clientInfo = buildClientInfoFromHomeAccountId(ccsCred.credential);
|
||||
headers[HeaderNames.CCS_HEADER] = `Oid:${clientInfo.uid}@${clientInfo.utid}`;
|
||||
}
|
||||
catch (e) {
|
||||
this.logger.verbose("Could not parse home account ID for CCS Header: " +
|
||||
e);
|
||||
}
|
||||
break;
|
||||
case CcsCredentialType.UPN:
|
||||
headers[HeaderNames.CCS_HEADER] = `UPN: ${ccsCred.credential}`;
|
||||
break;
|
||||
}
|
||||
}
|
||||
return headers;
|
||||
}
|
||||
/**
|
||||
* Http post to token endpoint
|
||||
* @param tokenEndpoint
|
||||
* @param queryString
|
||||
* @param headers
|
||||
* @param thumbprint
|
||||
*/
|
||||
async executePostToTokenEndpoint(tokenEndpoint, queryString, headers, thumbprint, correlationId, queuedEvent) {
|
||||
if (queuedEvent) {
|
||||
this.performanceClient?.addQueueMeasurement(queuedEvent, correlationId);
|
||||
}
|
||||
const response = await this.sendPostRequest(thumbprint, tokenEndpoint, { body: queryString, headers: headers }, correlationId);
|
||||
if (this.config.serverTelemetryManager &&
|
||||
response.status < 500 &&
|
||||
response.status !== 429) {
|
||||
// Telemetry data successfully logged by server, clear Telemetry cache
|
||||
this.config.serverTelemetryManager.clearTelemetryCache();
|
||||
}
|
||||
return response;
|
||||
}
|
||||
/**
|
||||
* Wraps sendPostRequestAsync with necessary preflight and postflight logic
|
||||
* @param thumbprint - Request thumbprint for throttling
|
||||
* @param tokenEndpoint - Endpoint to make the POST to
|
||||
* @param options - Body and Headers to include on the POST request
|
||||
* @param correlationId - CorrelationId for telemetry
|
||||
*/
|
||||
async sendPostRequest(thumbprint, tokenEndpoint, options, correlationId) {
|
||||
ThrottlingUtils.preProcess(this.cacheManager, thumbprint, correlationId);
|
||||
let response;
|
||||
try {
|
||||
response = await invokeAsync((this.networkClient.sendPostRequestAsync.bind(this.networkClient)), PerformanceEvents.NetworkClientSendPostRequestAsync, this.logger, this.performanceClient, correlationId)(tokenEndpoint, options);
|
||||
const responseHeaders = response.headers || {};
|
||||
this.performanceClient?.addFields({
|
||||
refreshTokenSize: response.body.refresh_token?.length || 0,
|
||||
httpVerToken: responseHeaders[HeaderNames.X_MS_HTTP_VERSION] || "",
|
||||
requestId: responseHeaders[HeaderNames.X_MS_REQUEST_ID] || "",
|
||||
}, correlationId);
|
||||
}
|
||||
catch (e) {
|
||||
if (e instanceof NetworkError) {
|
||||
const responseHeaders = e.responseHeaders;
|
||||
if (responseHeaders) {
|
||||
this.performanceClient?.addFields({
|
||||
httpVerToken: responseHeaders[HeaderNames.X_MS_HTTP_VERSION] || "",
|
||||
requestId: responseHeaders[HeaderNames.X_MS_REQUEST_ID] ||
|
||||
"",
|
||||
contentTypeHeader: responseHeaders[HeaderNames.CONTENT_TYPE] ||
|
||||
undefined,
|
||||
contentLengthHeader: responseHeaders[HeaderNames.CONTENT_LENGTH] ||
|
||||
undefined,
|
||||
httpStatus: e.httpStatus,
|
||||
}, correlationId);
|
||||
}
|
||||
throw e.error;
|
||||
}
|
||||
if (e instanceof AuthError) {
|
||||
throw e;
|
||||
}
|
||||
else {
|
||||
throw createClientAuthError(networkError);
|
||||
}
|
||||
}
|
||||
ThrottlingUtils.postProcess(this.cacheManager, thumbprint, response, correlationId);
|
||||
return response;
|
||||
}
|
||||
/**
|
||||
* Updates the authority object of the client. Endpoint discovery must be completed.
|
||||
* @param updatedAuthority
|
||||
*/
|
||||
async updateAuthority(cloudInstanceHostname, correlationId) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.UpdateTokenEndpointAuthority, correlationId);
|
||||
const cloudInstanceAuthorityUri = `https://${cloudInstanceHostname}/${this.authority.tenant}/`;
|
||||
const cloudInstanceAuthority = await createDiscoveredInstance(cloudInstanceAuthorityUri, this.networkClient, this.cacheManager, this.authority.options, this.logger, correlationId, this.performanceClient);
|
||||
this.authority = cloudInstanceAuthority;
|
||||
}
|
||||
/**
|
||||
* Creates query string for the /token request
|
||||
* @param request
|
||||
*/
|
||||
createTokenQueryParameters(request) {
|
||||
const parameters = new Map();
|
||||
if (request.embeddedClientId) {
|
||||
addBrokerParameters(parameters, this.config.authOptions.clientId, this.config.authOptions.redirectUri);
|
||||
}
|
||||
if (request.tokenQueryParameters) {
|
||||
addExtraQueryParameters(parameters, request.tokenQueryParameters);
|
||||
}
|
||||
addCorrelationId(parameters, request.correlationId);
|
||||
instrumentBrokerParams(parameters, request.correlationId, this.performanceClient);
|
||||
return mapToQueryString(parameters);
|
||||
}
|
||||
}
|
||||
|
||||
export { BaseClient };
|
||||
//# sourceMappingURL=BaseClient.mjs.map
|
||||
236
extracted-source/node_modules/@azure/msal-common/dist/client/RefreshTokenClient.mjs
generated
vendored
Normal file
236
extracted-source/node_modules/@azure/msal-common/dist/client/RefreshTokenClient.mjs
generated
vendored
Normal file
@@ -0,0 +1,236 @@
|
||||
/*! @azure/msal-common v15.13.1 2025-10-29 */
|
||||
'use strict';
|
||||
import { isOidcProtocolMode } from '../config/ClientConfiguration.mjs';
|
||||
import { BaseClient } from './BaseClient.mjs';
|
||||
import { addClientId, addRedirectUri, addScopes, addGrantType, addClientInfo, addLibraryInfo, addApplicationTelemetry, addThrottling, addServerTelemetry, addRefreshToken, addClientSecret, addClientAssertion, addClientAssertionType, addPopToken, addSshJwk, addClaims, addCcsUpn, addCcsOid, addBrokerParameters, addExtraQueryParameters, instrumentBrokerParams } from '../request/RequestParameterBuilder.mjs';
|
||||
import { mapToQueryString } from '../utils/UrlUtils.mjs';
|
||||
import { AuthenticationScheme, HeaderNames, Errors, GrantType } from '../utils/Constants.mjs';
|
||||
import { CLIENT_ID } from '../constants/AADServerParamKeys.mjs';
|
||||
import { ResponseHandler } from '../response/ResponseHandler.mjs';
|
||||
import { PopTokenGenerator } from '../crypto/PopTokenGenerator.mjs';
|
||||
import { StringUtils } from '../utils/StringUtils.mjs';
|
||||
import { createClientConfigurationError } from '../error/ClientConfigurationError.mjs';
|
||||
import { createClientAuthError } from '../error/ClientAuthError.mjs';
|
||||
import { ServerError } from '../error/ServerError.mjs';
|
||||
import { nowSeconds, isTokenExpired } from '../utils/TimeUtils.mjs';
|
||||
import { UrlString } from '../url/UrlString.mjs';
|
||||
import { CcsCredentialType } from '../account/CcsCredential.mjs';
|
||||
import { buildClientInfoFromHomeAccountId } from '../account/ClientInfo.mjs';
|
||||
import { createInteractionRequiredAuthError, InteractionRequiredAuthError } from '../error/InteractionRequiredAuthError.mjs';
|
||||
import { PerformanceEvents } from '../telemetry/performance/PerformanceEvent.mjs';
|
||||
import { invokeAsync, invoke } from '../utils/FunctionWrappers.mjs';
|
||||
import { getClientAssertion } from '../utils/ClientAssertionUtils.mjs';
|
||||
import { getRequestThumbprint } from '../network/RequestThumbprint.mjs';
|
||||
import { badToken, noTokensFound, refreshTokenExpired } from '../error/InteractionRequiredAuthErrorCodes.mjs';
|
||||
import { tokenRequestEmpty, missingSshJwk } from '../error/ClientConfigurationErrorCodes.mjs';
|
||||
import { noAccountInSilentRequest } from '../error/ClientAuthErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
const DEFAULT_REFRESH_TOKEN_EXPIRATION_OFFSET_SECONDS = 300; // 5 Minutes
|
||||
/**
|
||||
* OAuth2.0 refresh token client
|
||||
* @internal
|
||||
*/
|
||||
class RefreshTokenClient extends BaseClient {
|
||||
constructor(configuration, performanceClient) {
|
||||
super(configuration, performanceClient);
|
||||
}
|
||||
async acquireToken(request) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireToken, request.correlationId);
|
||||
const reqTimestamp = nowSeconds();
|
||||
const response = await invokeAsync(this.executeTokenRequest.bind(this), PerformanceEvents.RefreshTokenClientExecuteTokenRequest, this.logger, this.performanceClient, request.correlationId)(request, this.authority);
|
||||
// Retrieve requestId from response headers
|
||||
const requestId = response.headers?.[HeaderNames.X_MS_REQUEST_ID];
|
||||
const responseHandler = new ResponseHandler(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, this.config.serializableCache, this.config.persistencePlugin);
|
||||
responseHandler.validateTokenResponse(response.body);
|
||||
return invokeAsync(responseHandler.handleServerTokenResponse.bind(responseHandler), PerformanceEvents.HandleServerTokenResponse, this.logger, this.performanceClient, request.correlationId)(response.body, this.authority, reqTimestamp, request, undefined, undefined, true, request.forceCache, requestId);
|
||||
}
|
||||
/**
|
||||
* Gets cached refresh token and attaches to request, then calls acquireToken API
|
||||
* @param request
|
||||
*/
|
||||
async acquireTokenByRefreshToken(request) {
|
||||
// Cannot renew token if no request object is given.
|
||||
if (!request) {
|
||||
throw createClientConfigurationError(tokenRequestEmpty);
|
||||
}
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenByRefreshToken, request.correlationId);
|
||||
// We currently do not support silent flow for account === null use cases; This will be revisited for confidential flow usecases
|
||||
if (!request.account) {
|
||||
throw createClientAuthError(noAccountInSilentRequest);
|
||||
}
|
||||
// try checking if FOCI is enabled for the given application
|
||||
const isFOCI = this.cacheManager.isAppMetadataFOCI(request.account.environment);
|
||||
// if the app is part of the family, retrive a Family refresh token if present and make a refreshTokenRequest
|
||||
if (isFOCI) {
|
||||
try {
|
||||
return await invokeAsync(this.acquireTokenWithCachedRefreshToken.bind(this), PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, this.logger, this.performanceClient, request.correlationId)(request, true);
|
||||
}
|
||||
catch (e) {
|
||||
const noFamilyRTInCache = e instanceof InteractionRequiredAuthError &&
|
||||
e.errorCode ===
|
||||
noTokensFound;
|
||||
const clientMismatchErrorWithFamilyRT = e instanceof ServerError &&
|
||||
e.errorCode === Errors.INVALID_GRANT_ERROR &&
|
||||
e.subError === Errors.CLIENT_MISMATCH_ERROR;
|
||||
// if family Refresh Token (FRT) cache acquisition fails or if client_mismatch error is seen with FRT, reattempt with application Refresh Token (ART)
|
||||
if (noFamilyRTInCache || clientMismatchErrorWithFamilyRT) {
|
||||
return invokeAsync(this.acquireTokenWithCachedRefreshToken.bind(this), PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, this.logger, this.performanceClient, request.correlationId)(request, false);
|
||||
// throw in all other cases
|
||||
}
|
||||
else {
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
}
|
||||
// fall back to application refresh token acquisition
|
||||
return invokeAsync(this.acquireTokenWithCachedRefreshToken.bind(this), PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, this.logger, this.performanceClient, request.correlationId)(request, false);
|
||||
}
|
||||
/**
|
||||
* makes a network call to acquire tokens by exchanging RefreshToken available in userCache; throws if refresh token is not cached
|
||||
* @param request
|
||||
*/
|
||||
async acquireTokenWithCachedRefreshToken(request, foci) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.RefreshTokenClientAcquireTokenWithCachedRefreshToken, request.correlationId);
|
||||
// fetches family RT or application RT based on FOCI value
|
||||
const refreshToken = invoke(this.cacheManager.getRefreshToken.bind(this.cacheManager), PerformanceEvents.CacheManagerGetRefreshToken, this.logger, this.performanceClient, request.correlationId)(request.account, foci, request.correlationId, undefined, this.performanceClient);
|
||||
if (!refreshToken) {
|
||||
throw createInteractionRequiredAuthError(noTokensFound);
|
||||
}
|
||||
if (refreshToken.expiresOn &&
|
||||
isTokenExpired(refreshToken.expiresOn, request.refreshTokenExpirationOffsetSeconds ||
|
||||
DEFAULT_REFRESH_TOKEN_EXPIRATION_OFFSET_SECONDS)) {
|
||||
this.performanceClient?.addFields({ rtExpiresOnMs: Number(refreshToken.expiresOn) }, request.correlationId);
|
||||
throw createInteractionRequiredAuthError(refreshTokenExpired);
|
||||
}
|
||||
// attach cached RT size to the current measurement
|
||||
const refreshTokenRequest = {
|
||||
...request,
|
||||
refreshToken: refreshToken.secret,
|
||||
authenticationScheme: request.authenticationScheme || AuthenticationScheme.BEARER,
|
||||
ccsCredential: {
|
||||
credential: request.account.homeAccountId,
|
||||
type: CcsCredentialType.HOME_ACCOUNT_ID,
|
||||
},
|
||||
};
|
||||
try {
|
||||
return await invokeAsync(this.acquireToken.bind(this), PerformanceEvents.RefreshTokenClientAcquireToken, this.logger, this.performanceClient, request.correlationId)(refreshTokenRequest);
|
||||
}
|
||||
catch (e) {
|
||||
if (e instanceof InteractionRequiredAuthError) {
|
||||
this.performanceClient?.addFields({ rtExpiresOnMs: Number(refreshToken.expiresOn) }, request.correlationId);
|
||||
if (e.subError === badToken) {
|
||||
// Remove bad refresh token from cache
|
||||
this.logger.verbose("acquireTokenWithRefreshToken: bad refresh token, removing from cache");
|
||||
const badRefreshTokenKey = this.cacheManager.generateCredentialKey(refreshToken);
|
||||
this.cacheManager.removeRefreshToken(badRefreshTokenKey, request.correlationId);
|
||||
}
|
||||
}
|
||||
throw e;
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Constructs the network message and makes a NW call to the underlying secure token service
|
||||
* @param request
|
||||
* @param authority
|
||||
*/
|
||||
async executeTokenRequest(request, authority) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.RefreshTokenClientExecuteTokenRequest, request.correlationId);
|
||||
const queryParametersString = this.createTokenQueryParameters(request);
|
||||
const endpoint = UrlString.appendQueryString(authority.tokenEndpoint, queryParametersString);
|
||||
const requestBody = await invokeAsync(this.createTokenRequestBody.bind(this), PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, this.logger, this.performanceClient, request.correlationId)(request);
|
||||
const headers = this.createTokenRequestHeaders(request.ccsCredential);
|
||||
const thumbprint = getRequestThumbprint(this.config.authOptions.clientId, request);
|
||||
return invokeAsync(this.executePostToTokenEndpoint.bind(this), PerformanceEvents.RefreshTokenClientExecutePostToTokenEndpoint, this.logger, this.performanceClient, request.correlationId)(endpoint, requestBody, headers, thumbprint, request.correlationId, PerformanceEvents.RefreshTokenClientExecutePostToTokenEndpoint);
|
||||
}
|
||||
/**
|
||||
* Helper function to create the token request body
|
||||
* @param request
|
||||
*/
|
||||
async createTokenRequestBody(request) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.RefreshTokenClientCreateTokenRequestBody, request.correlationId);
|
||||
const parameters = new Map();
|
||||
addClientId(parameters, request.embeddedClientId ||
|
||||
request.tokenBodyParameters?.[CLIENT_ID] ||
|
||||
this.config.authOptions.clientId);
|
||||
if (request.redirectUri) {
|
||||
addRedirectUri(parameters, request.redirectUri);
|
||||
}
|
||||
addScopes(parameters, request.scopes, true, this.config.authOptions.authority.options.OIDCOptions?.defaultScopes);
|
||||
addGrantType(parameters, GrantType.REFRESH_TOKEN_GRANT);
|
||||
addClientInfo(parameters);
|
||||
addLibraryInfo(parameters, this.config.libraryInfo);
|
||||
addApplicationTelemetry(parameters, this.config.telemetry.application);
|
||||
addThrottling(parameters);
|
||||
if (this.serverTelemetryManager && !isOidcProtocolMode(this.config)) {
|
||||
addServerTelemetry(parameters, this.serverTelemetryManager);
|
||||
}
|
||||
addRefreshToken(parameters, request.refreshToken);
|
||||
if (this.config.clientCredentials.clientSecret) {
|
||||
addClientSecret(parameters, this.config.clientCredentials.clientSecret);
|
||||
}
|
||||
if (this.config.clientCredentials.clientAssertion) {
|
||||
const clientAssertion = this.config.clientCredentials.clientAssertion;
|
||||
addClientAssertion(parameters, await getClientAssertion(clientAssertion.assertion, this.config.authOptions.clientId, request.resourceRequestUri));
|
||||
addClientAssertionType(parameters, clientAssertion.assertionType);
|
||||
}
|
||||
if (request.authenticationScheme === AuthenticationScheme.POP) {
|
||||
const popTokenGenerator = new PopTokenGenerator(this.cryptoUtils, this.performanceClient);
|
||||
let reqCnfData;
|
||||
if (!request.popKid) {
|
||||
const generatedReqCnfData = await invokeAsync(popTokenGenerator.generateCnf.bind(popTokenGenerator), PerformanceEvents.PopTokenGenerateCnf, this.logger, this.performanceClient, request.correlationId)(request, this.logger);
|
||||
reqCnfData = generatedReqCnfData.reqCnfString;
|
||||
}
|
||||
else {
|
||||
reqCnfData = this.cryptoUtils.encodeKid(request.popKid);
|
||||
}
|
||||
// SPA PoP requires full Base64Url encoded req_cnf string (unhashed)
|
||||
addPopToken(parameters, reqCnfData);
|
||||
}
|
||||
else if (request.authenticationScheme === AuthenticationScheme.SSH) {
|
||||
if (request.sshJwk) {
|
||||
addSshJwk(parameters, request.sshJwk);
|
||||
}
|
||||
else {
|
||||
throw createClientConfigurationError(missingSshJwk);
|
||||
}
|
||||
}
|
||||
if (!StringUtils.isEmptyObj(request.claims) ||
|
||||
(this.config.authOptions.clientCapabilities &&
|
||||
this.config.authOptions.clientCapabilities.length > 0)) {
|
||||
addClaims(parameters, request.claims, this.config.authOptions.clientCapabilities);
|
||||
}
|
||||
if (this.config.systemOptions.preventCorsPreflight &&
|
||||
request.ccsCredential) {
|
||||
switch (request.ccsCredential.type) {
|
||||
case CcsCredentialType.HOME_ACCOUNT_ID:
|
||||
try {
|
||||
const clientInfo = buildClientInfoFromHomeAccountId(request.ccsCredential.credential);
|
||||
addCcsOid(parameters, clientInfo);
|
||||
}
|
||||
catch (e) {
|
||||
this.logger.verbose("Could not parse home account ID for CCS Header: " +
|
||||
e);
|
||||
}
|
||||
break;
|
||||
case CcsCredentialType.UPN:
|
||||
addCcsUpn(parameters, request.ccsCredential.credential);
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (request.embeddedClientId) {
|
||||
addBrokerParameters(parameters, this.config.authOptions.clientId, this.config.authOptions.redirectUri);
|
||||
}
|
||||
if (request.tokenBodyParameters) {
|
||||
addExtraQueryParameters(parameters, request.tokenBodyParameters);
|
||||
}
|
||||
instrumentBrokerParams(parameters, request.correlationId, this.performanceClient);
|
||||
return mapToQueryString(parameters);
|
||||
}
|
||||
}
|
||||
|
||||
export { RefreshTokenClient };
|
||||
//# sourceMappingURL=RefreshTokenClient.mjs.map
|
||||
112
extracted-source/node_modules/@azure/msal-common/dist/client/SilentFlowClient.mjs
generated
vendored
Normal file
112
extracted-source/node_modules/@azure/msal-common/dist/client/SilentFlowClient.mjs
generated
vendored
Normal file
@@ -0,0 +1,112 @@
|
||||
/*! @azure/msal-common v15.13.1 2025-10-29 */
|
||||
'use strict';
|
||||
import { BaseClient } from './BaseClient.mjs';
|
||||
import { wasClockTurnedBack, isTokenExpired } from '../utils/TimeUtils.mjs';
|
||||
import { createClientAuthError } from '../error/ClientAuthError.mjs';
|
||||
import { ResponseHandler } from '../response/ResponseHandler.mjs';
|
||||
import { CacheOutcome } from '../utils/Constants.mjs';
|
||||
import { StringUtils } from '../utils/StringUtils.mjs';
|
||||
import { extractTokenClaims, checkMaxAge } from '../account/AuthToken.mjs';
|
||||
import { PerformanceEvents } from '../telemetry/performance/PerformanceEvent.mjs';
|
||||
import { invokeAsync } from '../utils/FunctionWrappers.mjs';
|
||||
import { getTenantFromAuthorityString } from '../authority/Authority.mjs';
|
||||
import { tokenRefreshRequired, noAccountInSilentRequest, authTimeNotFound } from '../error/ClientAuthErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/** @internal */
|
||||
class SilentFlowClient extends BaseClient {
|
||||
constructor(configuration, performanceClient) {
|
||||
super(configuration, performanceClient);
|
||||
}
|
||||
/**
|
||||
* Retrieves token from cache or throws an error if it must be refreshed.
|
||||
* @param request
|
||||
*/
|
||||
async acquireCachedToken(request) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.SilentFlowClientAcquireCachedToken, request.correlationId);
|
||||
let lastCacheOutcome = CacheOutcome.NOT_APPLICABLE;
|
||||
if (request.forceRefresh ||
|
||||
(!this.config.cacheOptions.claimsBasedCachingEnabled &&
|
||||
!StringUtils.isEmptyObj(request.claims))) {
|
||||
// Must refresh due to present force_refresh flag.
|
||||
this.setCacheOutcome(CacheOutcome.FORCE_REFRESH_OR_CLAIMS, request.correlationId);
|
||||
throw createClientAuthError(tokenRefreshRequired);
|
||||
}
|
||||
// We currently do not support silent flow for account === null use cases; This will be revisited for confidential flow usecases
|
||||
if (!request.account) {
|
||||
throw createClientAuthError(noAccountInSilentRequest);
|
||||
}
|
||||
const requestTenantId = request.account.tenantId ||
|
||||
getTenantFromAuthorityString(request.authority);
|
||||
const tokenKeys = this.cacheManager.getTokenKeys();
|
||||
const cachedAccessToken = this.cacheManager.getAccessToken(request.account, request, tokenKeys, requestTenantId);
|
||||
if (!cachedAccessToken) {
|
||||
// must refresh due to non-existent access_token
|
||||
this.setCacheOutcome(CacheOutcome.NO_CACHED_ACCESS_TOKEN, request.correlationId);
|
||||
throw createClientAuthError(tokenRefreshRequired);
|
||||
}
|
||||
else if (wasClockTurnedBack(cachedAccessToken.cachedAt) ||
|
||||
isTokenExpired(cachedAccessToken.expiresOn, this.config.systemOptions.tokenRenewalOffsetSeconds)) {
|
||||
// must refresh due to the expires_in value
|
||||
this.setCacheOutcome(CacheOutcome.CACHED_ACCESS_TOKEN_EXPIRED, request.correlationId);
|
||||
throw createClientAuthError(tokenRefreshRequired);
|
||||
}
|
||||
else if (cachedAccessToken.refreshOn &&
|
||||
isTokenExpired(cachedAccessToken.refreshOn, 0)) {
|
||||
// must refresh (in the background) due to the refresh_in value
|
||||
lastCacheOutcome = CacheOutcome.PROACTIVELY_REFRESHED;
|
||||
// don't throw ClientAuthError.createRefreshRequiredError(), return cached token instead
|
||||
}
|
||||
const environment = request.authority || this.authority.getPreferredCache();
|
||||
const cacheRecord = {
|
||||
account: this.cacheManager.getAccount(this.cacheManager.generateAccountKey(request.account), request.correlationId),
|
||||
accessToken: cachedAccessToken,
|
||||
idToken: this.cacheManager.getIdToken(request.account, request.correlationId, tokenKeys, requestTenantId, this.performanceClient),
|
||||
refreshToken: null,
|
||||
appMetadata: this.cacheManager.readAppMetadataFromCache(environment),
|
||||
};
|
||||
this.setCacheOutcome(lastCacheOutcome, request.correlationId);
|
||||
if (this.config.serverTelemetryManager) {
|
||||
this.config.serverTelemetryManager.incrementCacheHits();
|
||||
}
|
||||
return [
|
||||
await invokeAsync(this.generateResultFromCacheRecord.bind(this), PerformanceEvents.SilentFlowClientGenerateResultFromCacheRecord, this.logger, this.performanceClient, request.correlationId)(cacheRecord, request),
|
||||
lastCacheOutcome,
|
||||
];
|
||||
}
|
||||
setCacheOutcome(cacheOutcome, correlationId) {
|
||||
this.serverTelemetryManager?.setCacheOutcome(cacheOutcome);
|
||||
this.performanceClient?.addFields({
|
||||
cacheOutcome: cacheOutcome,
|
||||
}, correlationId);
|
||||
if (cacheOutcome !== CacheOutcome.NOT_APPLICABLE) {
|
||||
this.logger.info(`Token refresh is required due to cache outcome: ${cacheOutcome}`);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Helper function to build response object from the CacheRecord
|
||||
* @param cacheRecord
|
||||
*/
|
||||
async generateResultFromCacheRecord(cacheRecord, request) {
|
||||
this.performanceClient?.addQueueMeasurement(PerformanceEvents.SilentFlowClientGenerateResultFromCacheRecord, request.correlationId);
|
||||
let idTokenClaims;
|
||||
if (cacheRecord.idToken) {
|
||||
idTokenClaims = extractTokenClaims(cacheRecord.idToken.secret, this.config.cryptoInterface.base64Decode);
|
||||
}
|
||||
// token max_age check
|
||||
if (request.maxAge || request.maxAge === 0) {
|
||||
const authTime = idTokenClaims?.auth_time;
|
||||
if (!authTime) {
|
||||
throw createClientAuthError(authTimeNotFound);
|
||||
}
|
||||
checkMaxAge(authTime, request.maxAge);
|
||||
}
|
||||
return ResponseHandler.generateAuthenticationResult(this.cryptoUtils, this.authority, cacheRecord, true, request, idTokenClaims);
|
||||
}
|
||||
}
|
||||
|
||||
export { SilentFlowClient };
|
||||
//# sourceMappingURL=SilentFlowClient.mjs.map
|
||||
Reference in New Issue
Block a user