Socket
Socket
Sign inDemoInstall

angular-auth-oidc-client

Package Overview
Dependencies
431
Maintainers
2
Versions
177
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

Comparing version 14.1.5 to 15.0.0

esm2020/lib/utils/crypto/crypto.service.mjs

7

lib/auth-options.d.ts

@@ -9,1 +9,8 @@ export interface AuthOptions {

}
export interface LogoutAuthOptions {
customParams?: {
[key: string]: string | number | boolean;
};
urlHandler?(url: string): any;
logoffMethod?: 'GET' | 'POST';
}

8

lib/config/openid-configuration.d.ts

@@ -152,6 +152,6 @@ import { LogLevel } from '../logging/log-level';

* Enables the id_token validation, default value is `true`.
* You can disable this validation if you like to ignore the expired value in the renew process.
* You can disable this validation if you like to ignore the expired value in the renew process or not check this in the expiry check. Only the access token is used to trigger a renew.
* If no id_token is returned in using refresh tokens, set this to `false`.
*/
enableIdTokenExpiredValidationInRenew?: boolean;
triggerRefreshWhenIdTokenExpired?: boolean;
/** Controls the periodic check time interval in sections.

@@ -177,3 +177,5 @@ * Default value is 3.

allowUnsafeReuseRefreshToken?: boolean;
/** Disable validation for id_token expiry time */
/** Disable validation for id_token
* This is not recommended! You should always validate the id_token if returned.
*/
disableIdTokenValidation?: boolean;

@@ -180,0 +182,0 @@ /** Disables PKCE support.

@@ -21,2 +21,3 @@ import { Observable } from 'rxjs';

callbackHistoryAndResetJwtKeys(callbackContext: CallbackContext, config: OpenIdConfiguration, allConfigs: OpenIdConfiguration[]): Observable<CallbackContext>;
private responseHasIdToken;
private handleResultErrorFromCallback;

@@ -23,0 +24,0 @@ private historyCleanUpTurnedOn;

import { LoggerService } from '../../logging/logger.service';
import { CryptoService } from '../../utils/crypto/crypto-service';
import { CryptoService } from '../../utils/crypto/crypto.service';
import { OpenIdConfiguration } from './../../config/openid-configuration';

@@ -4,0 +4,0 @@ import * as i0 from "@angular/core";

import { AuthStateService } from '../auth-state/auth-state.service';
import { OpenIdConfiguration } from '../config/openid-configuration';
import { LoggerService } from '../logging/logger.service';
import { UserService } from '../user-data/user.service';

@@ -10,3 +11,4 @@ import { FlowsDataService } from './flows-data.service';

private readonly userService;
constructor(authStateService: AuthStateService, flowsDataService: FlowsDataService, userService: UserService);
private readonly loggerService;
constructor(authStateService: AuthStateService, flowsDataService: FlowsDataService, userService: UserService, loggerService: LoggerService);
resetAuthorizationData(currentConfiguration: OpenIdConfiguration, allConfigs: OpenIdConfiguration[]): void;

@@ -13,0 +15,0 @@ static ɵfac: i0.ɵɵFactoryDeclaration<ResetAuthDataService, never>;

import { Observable } from 'rxjs';
import { DataService } from '../api/data.service';
import { AuthOptions } from '../auth-options';
import { LogoutAuthOptions } from '../auth-options';
import { OpenIdConfiguration } from '../config/openid-configuration';

@@ -21,14 +21,13 @@ import { ResetAuthDataService } from '../flows/reset-auth-data.service';

constructor(dataService: DataService, storagePersistenceService: StoragePersistenceService, loggerService: LoggerService, urlService: UrlService, checkSessionService: CheckSessionService, resetAuthDataService: ResetAuthDataService, redirectService: RedirectService);
logoff(config: OpenIdConfiguration, allConfigs: OpenIdConfiguration[], authOptions?: AuthOptions): void;
logoff(config: OpenIdConfiguration, allConfigs: OpenIdConfiguration[], logoutAuthOptions?: LogoutAuthOptions): Observable<unknown>;
logoffLocal(config: OpenIdConfiguration, allConfigs: OpenIdConfiguration[]): void;
logoffLocalMultiple(allConfigs: OpenIdConfiguration[]): void;
logoffAndRevokeTokens(config: OpenIdConfiguration, allConfigs: OpenIdConfiguration[], authOptions?: AuthOptions): Observable<any>;
logoffAndRevokeTokens(config: OpenIdConfiguration, allConfigs: OpenIdConfiguration[], logoutAuthOptions?: LogoutAuthOptions): Observable<any>;
revokeAccessToken(configuration: OpenIdConfiguration, accessToken?: any): Observable<any>;
revokeRefreshToken(configuration: OpenIdConfiguration, refreshToken?: any): Observable<any>;
getEndSessionUrl(configuration: OpenIdConfiguration, customParams?: {
[p: string]: string | number | boolean;
}): string | null;
private logoffInternal;
private sendRevokeRequest;
private getHeaders;
static ɵfac: i0.ɵɵFactoryDeclaration<LogoffRevocationService, never>;
static ɵprov: i0.ɵɵInjectableDeclaration<LogoffRevocationService>;
}
import { Observable } from 'rxjs';
import { AuthOptions } from './auth-options';
import { AuthOptions, LogoutAuthOptions } from './auth-options';
import { AuthenticatedResult } from './auth-state/auth-result';

@@ -63,8 +63,2 @@ import { AuthStateService } from './auth-state/auth-state.service';

get stsCallback$(): Observable<any>;
/**
* @deprecated This property should not be used. Please use the `PublicEventsService` instead. This property is removed in future versions
* Emits false when the observable, returned by one of the checkAuth() methods, emits a value, or errors. Initial value: true.
*/
get isLoading$(): Observable<boolean>;
private readonly isLoading;
constructor(checkSessionService: CheckSessionService, checkAuthService: CheckAuthService, userService: UserService, tokenHelperService: TokenHelperService, configurationService: ConfigurationService, authStateService: AuthStateService, flowsDataService: FlowsDataService, callbackService: CallbackService, logoffRevocationService: LogoffRevocationService, loginService: LoginService, refreshSessionService: RefreshSessionService, urlService: UrlService, authWellKnownService: AuthWellKnownService);

@@ -229,3 +223,3 @@ preloadAuthWellKnownDocument(configId?: string): Observable<AuthWellKnownEndpoints>;

*/
logoffAndRevokeTokens(configId?: string, authOptions?: AuthOptions): Observable<any>;
logoffAndRevokeTokens(configId?: string, logoutAuthOptions?: LogoutAuthOptions): Observable<any>;
/**

@@ -238,3 +232,3 @@ * Logs out on the server and the local client. If the server state has changed, confirmed via check session,

*/
logoff(configId?: string, authOptions?: AuthOptions): void;
logoff(configId?: string, logoutAuthOptions?: LogoutAuthOptions): Observable<unknown>;
/**

@@ -296,6 +290,4 @@ * Logs the user out of the application without logging them out of the server.

}, configId?: string): Observable<string | null>;
private readonly finishLoading;
private readonly finishLoadingOnError;
static ɵfac: i0.ɵɵFactoryDeclaration<OidcSecurityService, never>;
static ɵprov: i0.ɵɵInjectableDeclaration<OidcSecurityService>;
}

@@ -24,5 +24,9 @@ import { Observable } from 'rxjs';

getAuthorizeUrl(config: OpenIdConfiguration, authOptions?: AuthOptions): Observable<string>;
createEndSessionUrl(idTokenHint: string, configuration: OpenIdConfiguration, customParamsEndSession?: {
getEndSessionEndpoint(configuration: OpenIdConfiguration): {
url: string;
existingParams: string;
};
getEndSessionUrl(configuration: OpenIdConfiguration, customParams?: {
[p: string]: string | number | boolean;
}): string;
}): string | null;
createRevocationEndpointBodyAccessToken(token: any, configuration: OpenIdConfiguration): string;

@@ -40,2 +44,4 @@ createRevocationEndpointBodyRefreshToken(token: any, configuration: OpenIdConfiguration): string;

}): Observable<string>;
getPostLogoutRedirectUrl(configuration: OpenIdConfiguration): string;
private createEndSessionUrl;
private createAuthorizeUrl;

@@ -49,3 +55,2 @@ private createUrlImplicitFlowWithSilentRenew;

private getSilentRenewUrl;
private getPostLogoutRedirectUrl;
private getClientId;

@@ -52,0 +57,0 @@ private appendCustomParams;

@@ -1,2 +0,2 @@

import { CryptoService } from '../utils/crypto/crypto-service';
import { CryptoService } from '../utils/crypto/crypto.service';
import * as i0 from "@angular/core";

@@ -3,0 +3,0 @@ export declare class JwkWindowCryptoService {

import { Observable } from 'rxjs';
import { CryptoService } from '../utils/crypto/crypto-service';
import { CryptoService } from '../utils/crypto/crypto.service';
import * as i0 from "@angular/core";

@@ -4,0 +4,0 @@ export declare class JwtWindowCryptoService {

import { Observable } from 'rxjs';
import { OpenIdConfiguration } from '../config/openid-configuration';
import { JwkExtractor } from '../extractors/jwk.extractor';
import { LoggerService } from '../logging/logger.service';
import { TokenHelperService } from '../utils/tokenHelper/token-helper.service';
import { JwkWindowCryptoService } from './jwk-window-crypto.service';
import { JwtWindowCryptoService } from './jwt-window-crypto.service';
import { JwkExtractor } from '../extractors/jwk.extractor';
import { JwkWindowCryptoService } from './jwk-window-crypto.service';
import * as i0 from "@angular/core";

@@ -19,4 +19,4 @@ export declare class TokenValidationService {

constructor(tokenHelperService: TokenHelperService, loggerService: LoggerService, jwkExtractor: JwkExtractor, jwkWindowCryptoService: JwkWindowCryptoService, jwtWindowCryptoService: JwtWindowCryptoService, document: any);
hasIdTokenExpired(token: string, configuration: OpenIdConfiguration, offsetSeconds?: number, disableIdTokenValidation?: boolean): boolean;
validateIdTokenExpNotExpired(decodedIdToken: string, configuration: OpenIdConfiguration, offsetSeconds?: number, disableIdTokenValidation?: boolean): boolean;
hasIdTokenExpired(token: string, configuration: OpenIdConfiguration, offsetSeconds?: number): boolean;
validateIdTokenExpNotExpired(decodedIdToken: string, configuration: OpenIdConfiguration, offsetSeconds?: number): boolean;
validateAccessTokenNotExpired(accessTokenExpiresAt: Date, configuration: OpenIdConfiguration, offsetSeconds?: number): boolean;

@@ -32,5 +32,2 @@ validateRequiredIdToken(dataIdToken: any, configuration: OpenIdConfiguration): boolean;

validateSignatureIdToken(idToken: string, jwtkeys: any, configuration: OpenIdConfiguration): Observable<boolean>;
private getImportAlg;
private getVerifyAlg;
private alg2kty;
validateIdTokenAtHash(accessToken: string, atHash: string, idTokenAlg: string, configuration: OpenIdConfiguration): Observable<boolean>;

@@ -37,0 +34,0 @@ private millisToMinutesAndSeconds;

@@ -6,5 +6,5 @@ {

"rxjs": "^6.5.3 || ^7.4.0",
"@angular/core": ">=13.0.0",
"@angular/common": ">=13.0.0",
"@angular/router": ">=13.0.0"
"@angular/core": ">=12.0.0",
"@angular/common": ">=12.0.0",
"@angular/router": ">=12.0.0"
},

@@ -40,3 +40,3 @@ "dependencies": {

"license": "MIT",
"version": "14.1.5",
"version": "15.0.0",
"description": "Angular Lib for OpenID Connect & OAuth2",

@@ -43,0 +43,0 @@ "schematics": "./schematics/collection.json",

@@ -135,3 +135,3 @@ # Angular Lib for OpenID Connect & OAuth2

logout() {
this.oidcSecurityService.logoff();
this.oidcSecurityService.logoff().subscribe((result) => console.log(result));
}

@@ -165,4 +165,5 @@ }

Current Version is Version 14.x
Current Version is Version 15.x
- [Info about Version 14](https://github.com/damienbod/angular-auth-oidc-client/tree/version-14)
- [Info about Version 13](https://github.com/damienbod/angular-auth-oidc-client/tree/version-13)

@@ -169,0 +170,0 @@ - [Info about Version 12](https://github.com/damienbod/angular-auth-oidc-client/tree/version-12)

@@ -8,3 +8,3 @@ "use strict";

name: 'angular-auth-oidc-client',
version: '14.1.5',
version: '15.0.0',
},

@@ -11,0 +11,0 @@ ];

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Packages

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc