Skip to content

Commit c2336d7

Browse files
committed
3.0.2
1 parent f7be18d commit c2336d7

File tree

17 files changed

+29
-27
lines changed

17 files changed

+29
-27
lines changed

CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ Yay for [SemVer](http://semver.org/).
2929

3030
<!-- TOC END -->
3131
## 3.0.x
32+
### 3.0.2
33+
- [DIFF](https://github.com/panva/node-oidc-provider/compare/v3.0.1...v3.0.2)
34+
- base64url dependency replaced
35+
3236
### 3.0.1
3337
- [DIFF](https://github.com/panva/node-oidc-provider/compare/v3.0.0...v3.0.1)
3438
- dependency tree updates

README.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# oidc-provider
22

3-
[![build][travis-image]][travis-url] [![codecov][codecov-image]][codecov-url] [![snyk][snyk-image]][snyk-url]
3+
[![build][travis-image]][travis-url] [![codecov][codecov-image]][codecov-url]
44

55
oidc-provider is an OpenID Provider implementation of [OpenID Connect][openid-connect]. It allows to
66
export a complete mountable or standalone OpenID Provider implementation. This implementation does
@@ -139,8 +139,6 @@ See the list of available emitted [event names](/docs/events.md) and their descr
139139
[conformance-url]: https://github.com/panva/oidc-provider-conformance-tests
140140
[codecov-image]: https://img.shields.io/codecov/c/github/panva/node-oidc-provider/master.svg
141141
[codecov-url]: https://codecov.io/gh/panva/node-oidc-provider
142-
[snyk-image]: https://snyk.io/test/npm/oidc-provider/badge.svg
143-
[snyk-url]: https://snyk.io/test/npm/oidc-provider
144142
[npm-url]: https://www.npmjs.com/package/oidc-provider
145143
[openid-certified-link]: https://openid.net/certification/
146144
[openid-connect]: https://openid.net/connect/

lib/actions/grants/authorization_code.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
const { get } = require('lodash');
22
const assert = require('assert');
3-
const base64url = require('base64url');
3+
const base64url = require('base64-url');
44
const crypto = require('crypto');
55
const { InvalidGrantError } = require('../../helpers/errors');
66
const presence = require('../../helpers/validate_presence');
@@ -30,7 +30,7 @@ module.exports.handler = function getAuthorizationCodeHandler(provider) {
3030
assert(expected);
3131

3232
if (code.codeChallengeMethod === 'S256') {
33-
expected = base64url(crypto.createHash('sha256').update(expected).digest());
33+
expected = base64url.encode(crypto.createHash('sha256').update(expected).digest());
3434
}
3535

3636
assert.equal(code.codeChallenge, expected);

lib/helpers/jwt.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
const { encode, decode } = require('base64url');
1+
const { encode, decode } = require('base64-url');
22
const { randomBytes } = require('crypto');
33
const assert = require('assert');
44
const epochTime = require('../helpers/epoch_time');

lib/models/base_token.js

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ const IN_PAYLOAD = [
1919
const { pick } = require('lodash');
2020
const constantEquals = require('../helpers/constant_equals');
2121
const assert = require('assert');
22-
const base64url = require('base64url');
22+
const base64url = require('base64-url');
2323
const uuid = require('uuid/v4');
2424
const { randomBytes } = require('crypto');
2525

@@ -44,7 +44,7 @@ module.exports = function getBaseToken(provider) {
4444
constructor(payload) {
4545
Object.assign(this, payload);
4646

47-
this.jti = this.jti || base64url(uuid());
47+
this.jti = this.jti || base64url.encode(uuid());
4848

4949
this.kind = this.kind || this.constructor.name;
5050
assert.equal(this.kind, this.constructor.name, 'kind mismatch');
@@ -135,7 +135,7 @@ module.exports = function getBaseToken(provider) {
135135
});
136136

137137
const [header, payload] = jwt.split('.');
138-
const signature = base64url(randomBytes(64));
138+
const signature = base64url.encode(randomBytes(64));
139139

140140
return [`${this.jti}${signature}`, {
141141
header,

lib/models/client.js

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ const crypto = require('crypto');
44
const { JWK: { createKeyStore } } = require('node-jose');
55
const LRU = require('lru-cache');
66
const assert = require('assert');
7-
const base64url = require('base64url');
7+
const base64url = require('base64-url');
88
const httpRequest = require('../helpers/http');
99
const uuid = require('uuid/v4');
1010

@@ -209,15 +209,15 @@ module.exports = function getClient(provider) {
209209
.compact()
210210
.forEach((alg) => {
211211
if (alg.startsWith('HS')) {
212-
promises.push(client.keystore.add({ alg, kty: 'oct', k: base64url(client.clientSecret) }));
212+
promises.push(client.keystore.add({ alg, kty: 'oct', k: base64url.encode(client.clientSecret) }));
213213
} else if (alg.match(/^(?:A|PBES2.+)(\d{3})(?:GCM)?KW$/)) {
214214
const len = parseInt(RegExp.$1, 10) / 8;
215215
const key = crypto.createHash('sha256')
216216
.update(client.clientSecret)
217217
.digest()
218218
.slice(0, len);
219219

220-
promises.push(client.keystore.add({ alg, kty: 'oct', k: base64url(key) }));
220+
promises.push(client.keystore.add({ alg, kty: 'oct', k: base64url.encode(key) }));
221221
}
222222
return undefined;
223223
})

lib/shared/find_client_id.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
const base64url = require('base64url');
1+
const base64url = require('base64-url');
22
const { InvalidRequestError, InvalidClientError } = require('../helpers/errors');
33

44
// see https://tools.ietf.org/html/rfc6749#appendix-B

package.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "oidc-provider",
3-
"version": "3.0.1",
3+
"version": "3.0.2",
44
"description": "OpenID Provider (OP) implementation for Node.js OpenID Connect servers.",
55
"keywords": [
66
"auth",
@@ -44,7 +44,7 @@
4444
"lint"
4545
],
4646
"dependencies": {
47-
"base64url": "^2.0.0",
47+
"base64-url": "^2.2.0",
4848
"debug": "^3.1.0",
4949
"delegates": "^1.0.0",
5050
"ejs": "^2.6.1",
@@ -57,7 +57,7 @@
5757
"lodash": "^4.17.10",
5858
"lru-cache": "^4.1.3",
5959
"node-jose": "^0.11.0",
60-
"oidc-token-hash": "^2.0.0",
60+
"oidc-token-hash": "^3.0.0",
6161
"raw-body": "^2.3.3",
6262
"uuid": "^3.2.1"
6363
},

test/backchannel_logout/backchannel_logout.test.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ const bootstrap = require('../test_helper');
22
const sinon = require('sinon');
33
const { expect } = require('chai');
44
const { parse: parseUrl } = require('url');
5-
const base64url = require('base64url');
5+
const base64url = require('base64-url');
66
const nock = require('nock');
77
const Provider = require('../../lib');
88

test/base_token/base_token.test.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
const sinon = require('sinon');
22
const { expect } = require('chai');
33
const bootstrap = require('../test_helper');
4-
const base64url = require('base64url');
4+
const base64url = require('base64-url');
55

66
const fail = () => { throw new Error('expected promise to be rejected'); };
77

@@ -32,7 +32,7 @@ describe('BaseToken', () => {
3232
const stored = this.adapter.syncFind(jti);
3333
const payload = JSON.parse(base64url.decode(stored.payload));
3434
payload.exp = 0;
35-
stored.payload = base64url(JSON.stringify(payload));
35+
stored.payload = base64url.encode(JSON.stringify(payload));
3636
expect(await this.provider.AccessToken.find(token)).to.be.undefined;
3737
});
3838

0 commit comments

Comments
 (0)