JSON config for the OIDC library @range {json}
Remaining parameters required for the factory.
Adds the necessary claims the to id and access tokens based on the Solid OIDC spec.
Pipes library errors to the provided ErrorHandler and ResponseWriter.
Sets up all the IDP routes relative to the IDP path.
Creates a Provider by building a Configuration using all the stored parameters.
Creates the route string as required by the oidc-provider
library.
In case base URL is http://test.com/foo/
, oidcPath
is /idp
and relative
is device/auth
,
this would result in /foo/idp/device/auth
.
Generates a cookie secret to be used for cookie signing. The key will be cached so subsequent calls return the same key.
Generates a JWKS using a single JWK. The JWKS will be cached so subsequent calls return the same key.
Gets a provider from the factory. Multiple calls to this function should return providers that produce the same results. This is mostly relevant for signing keys.
Creates a configuration by copying the internal configuration and adding the adapter, default audience and jwks/cookie keys.
Checks if the given token is an access token. The AccessToken interface is not exported so we have to access it like this.
Creates an OIDC Provider based on the provided configuration and parameters. The provider will be cached and returned on subsequent calls. Cookie and JWT keys will be stored in an internal storage so they can be re-used over multiple threads. Necessary claims for Solid OIDC interactions will be added. Routes will be updated based on the
baseUrl
andoidcPath
.