diff --git a/README.md b/README.md
index 5fcca121..689d54db 100644
--- a/README.md
+++ b/README.md
@@ -5,7 +5,7 @@
### 1. Install the SDK
```shell
-npm i @auth0/nextjs-auth0@4.0.0-beta.9
+npm i @auth0/nextjs-auth0@4.0.0-beta.10
```
### 2. Add the environment variables
@@ -109,19 +109,21 @@ export default async function Home() {
You can customize the client by using the options below:
-| Option | Type | Description |
-| ----------------------- | ------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------- |
-| domain | `string` | The Auth0 domain for the tenant (e.g.: `example.us.auth0.com`). If it's not specified, it will be loaded from the `AUTH0_DOMAIN` environment variable. |
-| clientId | `string` | The Auth0 client ID. If it's not specified, it will be loaded from the `AUTH0_CLIENT_ID` environment variable. |
-| clientSecret | `string` | The Auth0 client secret. If it's not specified, it will be loaded from the `AUTH0_CLIENT_SECRET` environment variable. |
-| authorizationParameters | `AuthorizationParameters` | The authorization parameters to pass to the `/authorize` endpoint. See [Passing authorization parameters](#passing-authorization-parameters) for more details. |
-| appBaseUrl | `string` | The URL of your application (e.g.: `http://localhost:3000`). If it's not specified, it will be loaded from the `APP_BASE_URL` environment variable. |
-| secret | `string` | A 32-byte, hex-encoded secret used for encrypting cookies. If it's not specified, it will be loaded from the `AUTH0_SECRET` environment variable. |
-| signInReturnToPath | `string` | The path to redirect the user to after successfully authenticating. Defaults to `/`. |
-| session | `SessionConfiguration` | Configure the session timeouts and whether to use rolling sessions or not. See [Session configuration](#session-configuration) for additional details. |
-| beforeSessionSaved | `BeforeSessionSavedHook` | A method to manipulate the session before persisting it. See [beforeSessionSaved](#beforesessionsaved) for additional details. |
-| onCallback | `OnCallbackHook` | A method to handle errors or manage redirects after attempting to authenticate. See [onCallback](#oncallback) for additional details. |
-| sessionStore | `SessionStore` | A custom session store implementation used to persist sessions to a data store. See [Database sessions](#database-sessions) for additional details. |
+| Option | Type | Description |
+| --------------------------- | ------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------- |
+| domain | `string` | The Auth0 domain for the tenant (e.g.: `example.us.auth0.com`). If it's not specified, it will be loaded from the `AUTH0_DOMAIN` environment variable. |
+| clientId | `string` | The Auth0 client ID. If it's not specified, it will be loaded from the `AUTH0_CLIENT_ID` environment variable. |
+| clientSecret | `string` | The Auth0 client secret. If it's not specified, it will be loaded from the `AUTH0_CLIENT_SECRET` environment variable. |
+| authorizationParameters | `AuthorizationParameters` | The authorization parameters to pass to the `/authorize` endpoint. See [Passing authorization parameters](#passing-authorization-parameters) for more details. |
+| appBaseUrl | `string` | The URL of your application (e.g.: `http://localhost:3000`). If it's not specified, it will be loaded from the `APP_BASE_URL` environment variable. |
+| secret | `string` | A 32-byte, hex-encoded secret used for encrypting cookies. If it's not specified, it will be loaded from the `AUTH0_SECRET` environment variable. |
+| signInReturnToPath | `string` | The path to redirect the user to after successfully authenticating. Defaults to `/`. |
+| session | `SessionConfiguration` | Configure the session timeouts and whether to use rolling sessions or not. See [Session configuration](#session-configuration) for additional details. |
+| beforeSessionSaved | `BeforeSessionSavedHook` | A method to manipulate the session before persisting it. See [beforeSessionSaved](#beforesessionsaved) for additional details. |
+| onCallback | `OnCallbackHook` | A method to handle errors or manage redirects after attempting to authenticate. See [onCallback](#oncallback) for additional details. |
+| sessionStore | `SessionStore` | A custom session store implementation used to persist sessions to a data store. See [Database sessions](#database-sessions) for additional details. |
+| pushedAuthorizationRequests | `boolean` | Configure the SDK to use the Pushed Authorization Requests (PAR) protocol when communicating with the authorization server. |
+| routes | `Routes` | Configure the paths for the authentication routes. See [Custom routes](#custom-routes) for additional details. |
## Passing authorization parameters
@@ -519,3 +521,33 @@ The SDK mounts 6 routes:
4. `/auth/profile`: the route to check the user's session and return their attributes
5. `/auth/access-token`: the route to check the user's session and return an access token (which will be automatically refreshed if a refresh token is available)
6. `/auth/backchannel-logout`: the route that will receive a `logout_token` when a configured Back-Channel Logout initiator occurs
+
+### Custom routes
+
+The default paths can be set using the `routes` configuration option. For example, when instantiating the client:
+
+```ts
+import { Auth0Client } from "@auth0/nextjs-auth0/server"
+
+export const auth0 = new Auth0Client({
+ routes: {
+ login: "/login",
+ logout: "/logout",
+ callback: "/callback",
+ backChannelLogout: "/backchannel-logout",
+ },
+})
+```
+
+To configure the profile and access token routes, you must use the `NEXT_PUBLIC_PROFILE_ROUTE` and `NEXT_PUBLIC_ACCESS_TOKEN_ROUTE`, respectively. For example:
+
+```
+# .env.local
+# required environment variables...
+
+NEXT_PUBLIC_PROFILE_ROUTE=/api/me
+NEXT_PUBLIC_ACCESS_TOKEN_ROUTE=/api/auth/token
+```
+
+> [!IMPORTANT]
+> Updating the route paths will also require updating the **Allowed Callback URLs** and **Allowed Logout URLs** configured in the [Auth0 Dashboard](https://manage.auth0.com) for your client.
diff --git a/V4_MIGRATION_GUIDE.md b/V4_MIGRATION_GUIDE.md
new file mode 100644
index 00000000..cdfca621
--- /dev/null
+++ b/V4_MIGRATION_GUIDE.md
@@ -0,0 +1,241 @@
+# V4 Migration Guide
+
+Guide to migrating from `3.x` to `4.x`.
+
+## Environment variables
+
+The following environment variables are required in v4:
+
+```
+AUTH0_DOMAIN
+AUTH0_CLIENT_ID
+AUTH0_CLIENT_SECRET
+AUTH0_SECRET
+APP_BASE_URL
+```
+
+Of the required variables, the following have changed from v3:
+
+- `AUTH0_BASE_URL` has been renamed to `APP_BASE_URL` (e.g.: `http://localhost:3000`)
+- `AUTH0_ISSUER_BASE_URL` has been renamed to `AUTH0_DOMAIN` and does **not** accept a scheme (e.g.: `example.us.auth0.com`)
+
+All other configuration must be specified via the `Auth0Client` constructor.
+
+## Routes
+
+Previously, it was required to set up a dynamic Route Handler to mount the authentication endpoints to handle requests.
+
+For example, in v3 when using the App Router, you were required to create a Route Handler, under `/app/api/auth/[auth0]/route.ts`, with the following contents:
+
+```ts
+import { handleAuth } from "@auth0/nextjs-auth0"
+
+export const GET = handleAuth()
+```
+
+In v4, the routes are now mounted automatically by the middleware:
+
+```ts
+import type { NextRequest } from "next/server"
+
+import { auth0 } from "./lib/auth0"
+
+export async function middleware(request: NextRequest) {
+ return await auth0.middleware(request)
+}
+```
+
+For a complete example, see [the Getting Started section](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#getting-started).
+
+Additionally, in v4, the mounted routes drop the `/api` prefix. For example, the default login route is now `/auth/login` instead of `/api/auth/login`. To link to the login route, it would now be: `Log in`.
+
+> [!NOTE]
+> If you are using an existing client, you will need to update your **Allowed Callback URLs** accordingly.
+
+The complete list of routes mounted by the SDK can be found [here](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#routes).
+
+## Auth0 middleware
+
+In v4, the Auth0 middleware is a central component of the SDK. It serves a number of core functions such as registering the required authentication endpoints, providing rolling sessions functionality, keeping access tokens fresh, etc.
+
+When configuring your application to use v4 of the SDK, it is now **required** to mount the middleware:
+
+```ts
+// middleware.ts
+
+import type { NextRequest } from "next/server"
+
+import { auth0 } from "./lib/auth0"
+
+export async function middleware(request: NextRequest) {
+ return await auth0.middleware(request)
+}
+
+export const config = {
+ matcher: [
+ /*
+ * Match all request paths except for the ones starting with:
+ * - _next/static (static files)
+ * - _next/image (image optimization files)
+ * - favicon.ico, sitemap.xml, robots.txt (metadata files)
+ */
+ "/((?!_next/static|_next/image|favicon.ico|sitemap.xml|robots.txt).*)",
+ ],
+}
+```
+
+See [the Getting Started section](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#getting-started) for details on how to configure the middleware.
+
+### Protecting routes
+
+By default, **the middleware does not protect any routes**. To protect a page, you can use the `getSession()` handler in the middleware, like so:
+
+```ts
+export async function middleware(request: NextRequest) {
+ const authRes = await auth0.middleware(request)
+
+ // authentication routes — let the middleware handle it
+ if (request.nextUrl.pathname.startsWith("/auth")) {
+ return authRes
+ }
+
+ const { origin } = new URL(request.url)
+ const session = await auth0.getSession()
+
+ // user does not have a session — redirect to login
+ if (!session) {
+ return NextResponse.redirect(`${origin}/auth/login`)
+ }
+
+ return authRes
+}
+```
+
+> [!NOTE]
+> We recommend keeping the security checks as close as possible to the data source you're accessing. This is also in-line with [the recommendations from the Next.js team](https://nextjs.org/docs/app/building-your-application/authentication#optimistic-checks-with-middleware-optional).
+
+## ``
+
+The `` has been renamed to ``.
+
+Previously, when setting up your application to use v3 of the SDK, it was required to wrap your layout in the ``. **This is no longer required by default.**
+
+If you would like to pass an initial user during server rendering to be available to the `useUser()` hook, you can wrap your components with the new `` ([see example](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#auth0provider-)).
+
+## Rolling sessions
+
+In v4, rolling sessions are enabled by default and are handled automatically by the middleware with no additional configuration required.
+
+See the [session configuration section](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#session-configuration) for additional details on how to configure it.
+
+## `withPageAuthRequired` and `withApiAuthRequired`
+
+`withPageAuthRequired` and `withApiAuthRequired` have been removed from v4 of the SDK. Instead, we recommend adding a `getSession()` check or relying on `useUser()` hook where you would have previously used the helpers.
+
+On the server-side, the `getSession()` method can be used to check if the user is authenticated:
+
+```tsx
+function Page() {
+ const session = await getSession()
+
+ if (!session) {
+ // the user will be redirected to authenticate and then taken to the
+ // /dashboard route after successfully being authenticated
+ return redirect('/auth/login?returnTo=/dashboard')
+ }
+
+ return
Hello, {session.user.name}
+}
+```
+
+The `getSession()` method can be used in the App Router in Server Components, Server Routes (APIs), Server Actions, and middleware.
+
+In the Pages Router, the `getSession(req)` method takes a request object and can be used in `getServerSideProps`, API routes, and middleware.
+
+Read more about [accessing the authenticated user here](https://github.com/guabu/nextjs-auth0/tree/v4?tab=readme-ov-file#accessing-the-authenticated-user).
+
+In the browser, you can rely on the `useUser()` hook to check if the user is authenticated. For example:
+
+```tsx
+"use client"
+
+import { useUser } from "@auth0/nextjs-auth0"
+
+export default function Profile() {
+ const { user, isLoading, error } = useUser()
+
+ if (isLoading) return Loading...
+ if (!user) return Not authenticated!
+
+ return (
+
+ Profile
+
+
{JSON.stringify(user, null, 2)}
+
+
+ )
+}
+```
+
+## Passing custom authorization parameters
+
+In v3, custom authorization parameters required specifying a custom handler, like so:
+
+```ts
+import { handleAuth, handleLogin } from "@auth0/nextjs-auth0"
+
+export default handleAuth({
+ login: handleLogin({
+ authorizationParams: { audience: "urn:my-api" },
+ }),
+})
+```
+
+In v4, you can simply append the authorization parameters to the query parameter of the login endpoint and they will be automatically fowarded to the `/authorize` endpoint, like so:
+
+```html
+Login
+```
+
+Or alternatively, it can be statically configured when initializing the SDK, like so:
+
+```ts
+export const auth0 = new Auth0Client({
+ authorizationParameters: {
+ scope: "openid profile email",
+ audience: "urn:custom:api",
+ },
+})
+```
+
+Read more about [passing authorization parameters](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#passing-authorization-parameters).
+
+## ID token claims
+
+In v3, any claims added to the ID token were automatically propagated to the `user` object in the session. This resulted in the large cookies that exceeded browser limits.
+
+In v4, by default, the only claims that are persisted in the `user` object of session are:
+
+- `sub`
+- `name`
+- `nickname`
+- `given_name`
+- `family_name`
+- `picture`
+- `email`
+- `email_verified`
+- `org_id`
+
+If you'd like to customize the `user` object to include additional custom claims from the ID token, you can use the `beforeSessionSaved` hook (see [beforeSessionSaved hook](https://github.com/guabu/nextjs-auth0/tree/v4?tab=readme-ov-file#beforesessionsaved))
+
+## Additional changes
+
+- By default, v4 is edge-compatible and as such there is no longer a `@auth0/nextjs-auth0/edge` export.
+- Cookie chunking has been removed
+ - If the cookie size exceeds the browser limit of 4096 bytes, a warning will be logged
+ - To store large session data, please use a [custom data store](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#database-sessions) with a SessionStore implementation
+- All cookies set by the SDK default to `SameSite=Lax`
+- `touchSession` method was removed. The middleware enables rolling sessions by default and can be configured via the [session configuration](https://github.com/auth0/nextjs-auth0/tree/v4?tab=readme-ov-file#session-configuration).
+- `updateSession` method was removed.
+- `getAccessToken` can now be called in React Server Components.
diff --git a/package.json b/package.json
index cccf2eb3..b9f089b3 100644
--- a/package.json
+++ b/package.json
@@ -1,8 +1,7 @@
{
"name": "@auth0/nextjs-auth0",
- "version": "4.0.0-beta.9",
+ "version": "4.0.0-beta.10",
"description": "Auth0 Next.js SDK",
- "main": "dist/index.js",
"scripts": {
"build": "tsc",
"build:watch": "tsc -w",
@@ -69,5 +68,25 @@
},
"publishConfig": {
"access": "public"
- }
+ },
+ "typesVersions": {
+ "*": {
+ "types": [
+ "./dist/types/index.d.ts"
+ ],
+ "server": [
+ "./dist/server/index.d.ts"
+ ],
+ "errors": [
+ "./dist/errors/index.d.ts"
+ ],
+ "*": [
+ "./dist/client/*",
+ "./dist/client/index.d.ts"
+ ]
+ }
+ },
+ "files": [
+ "dist"
+ ]
}
diff --git a/src/client/helpers/get-access-token.ts b/src/client/helpers/get-access-token.ts
index 93736793..98e618db 100644
--- a/src/client/helpers/get-access-token.ts
+++ b/src/client/helpers/get-access-token.ts
@@ -1,7 +1,9 @@
import { AccessTokenError } from "../../errors"
export async function getAccessToken() {
- const tokenRes = await fetch("/auth/access-token")
+ const tokenRes = await fetch(
+ process.env.NEXT_PUBLIC_ACCESS_TOKEN_ROUTE || "/auth/access-token"
+ )
if (!tokenRes.ok) {
// try to parse it as JSON and throw the error from the API
diff --git a/src/client/hooks/use-user.ts b/src/client/hooks/use-user.ts
index 681c4461..4dfcb3cd 100644
--- a/src/client/hooks/use-user.ts
+++ b/src/client/hooks/use-user.ts
@@ -6,7 +6,7 @@ import type { User } from "../../types"
export function useUser() {
const { data, error, isLoading } = useSWR(
- "/auth/profile",
+ process.env.NEXT_PUBLIC_PROFILE_ROUTE || "/auth/profile",
(...args) =>
fetch(...args).then((res) => {
if (!res.ok) {
diff --git a/src/server/auth-client.test.ts b/src/server/auth-client.test.ts
index 614a4d9b..07af2aeb 100644
--- a/src/server/auth-client.test.ts
+++ b/src/server/auth-client.test.ts
@@ -23,6 +23,7 @@ describe("Authentication Client", async () => {
sub: "user_123",
alg: "RS256",
keyPair: await jose.generateKeyPair("RS256"),
+ requestUri: "urn:ietf:params:oauth:request_uri:6esc_11ACC5bwc014ltc14eY22c",
}
function getMockAuthorizationServer({
@@ -31,55 +32,76 @@ describe("Authentication Client", async () => {
audience,
nonce,
keyPair = DEFAULT.keyPair,
+ onParRequest,
}: {
tokenEndpointResponse?: oauth.TokenEndpointResponse | oauth.OAuth2Error
discoveryResponse?: Response
audience?: string
nonce?: string
keyPair?: jose.GenerateKeyPairResult
+ onParRequest?: (request: Request) => Promise
} = {}) {
// this function acts as a mock authorization server
- return vi.fn(async (input: RequestInfo | URL): Promise => {
- let url: URL
- if (input instanceof Request) {
- url = new URL(input.url)
- } else {
- url = new URL(input)
- }
+ return vi.fn(
+ async (
+ input: RequestInfo | URL,
+ init?: RequestInit
+ ): Promise => {
+ let url: URL
+ if (input instanceof Request) {
+ url = new URL(input.url)
+ } else {
+ url = new URL(input)
+ }
- if (url.pathname === "/oauth/token") {
- const jwt = await new jose.SignJWT({
- sid: DEFAULT.sid,
- auth_time: Date.now(),
- nonce: nonce ?? "nonce-value",
- "https://example.com/custom_claim": "value",
- })
- .setProtectedHeader({ alg: DEFAULT.alg })
- .setSubject(DEFAULT.sub)
- .setIssuedAt()
- .setIssuer(_authorizationServerMetadata.issuer)
- .setAudience(audience ?? DEFAULT.clientId)
- .setExpirationTime("2h")
- .sign(keyPair.privateKey)
-
- return Response.json(
- tokenEndpointResponse ?? {
- token_type: "Bearer",
- access_token: DEFAULT.accessToken,
- refresh_token: DEFAULT.refreshToken,
- id_token: jwt,
- expires_in: 86400, // expires in 10 days
+ if (url.pathname === "/oauth/token") {
+ const jwt = await new jose.SignJWT({
+ sid: DEFAULT.sid,
+ auth_time: Date.now(),
+ nonce: nonce ?? "nonce-value",
+ "https://example.com/custom_claim": "value",
+ })
+ .setProtectedHeader({ alg: DEFAULT.alg })
+ .setSubject(DEFAULT.sub)
+ .setIssuedAt()
+ .setIssuer(_authorizationServerMetadata.issuer)
+ .setAudience(audience ?? DEFAULT.clientId)
+ .setExpirationTime("2h")
+ .sign(keyPair.privateKey)
+ return Response.json(
+ tokenEndpointResponse ?? {
+ token_type: "Bearer",
+ access_token: DEFAULT.accessToken,
+ refresh_token: DEFAULT.refreshToken,
+ id_token: jwt,
+ expires_in: 86400, // expires in 10 days
+ }
+ )
+ }
+ // discovery URL
+ if (url.pathname === "/.well-known/openid-configuration") {
+ return (
+ discoveryResponse ?? Response.json(_authorizationServerMetadata)
+ )
+ }
+ // PAR endpoint
+ if (url.pathname === "/oauth/par") {
+ if (onParRequest) {
+ // TODO: for some reason the input here is a URL and not a request
+ await onParRequest(new Request(input, init))
}
- )
- }
- // discovery URL
- if (url.pathname === "/.well-known/openid-configuration") {
- return discoveryResponse ?? Response.json(_authorizationServerMetadata)
- }
+ return Response.json(
+ { request_uri: DEFAULT.requestUri, expires_in: 30 },
+ {
+ status: 201,
+ }
+ )
+ }
- return new Response(null, { status: 404 })
- })
+ return new Response(null, { status: 404 })
+ }
+ )
}
async function generateLogoutToken({
@@ -531,6 +553,230 @@ describe("Authentication Client", async () => {
expect(updatedSessionCookie).toBeUndefined()
})
})
+
+ describe("with custom routes", async () => {
+ it("should call the login handler when the configured route is called", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+
+ routes: {
+ login: "/custom-login",
+ },
+ })
+ const request = new NextRequest(
+ new URL("/custom-login", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ authClient.handleLogin = vi.fn()
+ await authClient.handler(request)
+ expect(authClient.handleLogin).toHaveBeenCalled()
+ })
+
+ it("should call the logout handler when the configured route is called", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+
+ routes: {
+ logout: "/custom-logout",
+ },
+ })
+ const request = new NextRequest(
+ new URL("/custom-logout", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ authClient.handleLogout = vi.fn()
+ await authClient.handler(request)
+ expect(authClient.handleLogout).toHaveBeenCalled()
+ })
+
+ it("should call the callback handler when the configured route is called", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+
+ routes: {
+ callback: "/custom-callback",
+ },
+ })
+ const request = new NextRequest(
+ new URL("/custom-callback", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ authClient.handleCallback = vi.fn()
+ await authClient.handler(request)
+ expect(authClient.handleCallback).toHaveBeenCalled()
+ })
+
+ it("should call the backChannelLogout handler when the configured route is called", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+
+ routes: {
+ backChannelLogout: "/custom-backchannel-logout",
+ },
+ })
+ const request = new NextRequest(
+ new URL("/custom-backchannel-logout", DEFAULT.appBaseUrl),
+ {
+ method: "POST",
+ }
+ )
+
+ authClient.handleBackChannelLogout = vi.fn()
+ await authClient.handler(request)
+ expect(authClient.handleBackChannelLogout).toHaveBeenCalled()
+ })
+
+ it("should call the profile handler when the configured route is called", async () => {
+ process.env.NEXT_PUBLIC_PROFILE_ROUTE = "/custom-profile"
+
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+ })
+ const request = new NextRequest(
+ new URL("/custom-profile", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ authClient.handleProfile = vi.fn()
+ await authClient.handler(request)
+ expect(authClient.handleProfile).toHaveBeenCalled()
+
+ delete process.env.NEXT_PUBLIC_PROFILE_ROUTE
+ })
+
+ it("should call the access-token handler when the configured route is called", async () => {
+ process.env.NEXT_PUBLIC_ACCESS_TOKEN_ROUTE = "/custom-access-token"
+
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+ })
+ const request = new NextRequest(
+ new URL("/custom-access-token", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ authClient.handleAccessToken = vi.fn()
+ await authClient.handler(request)
+ expect(authClient.handleAccessToken).toHaveBeenCalled()
+
+ delete process.env.NEXT_PUBLIC_ACCESS_TOKEN_ROUTE
+ })
+ })
})
describe("handleLogin", async () => {
@@ -1093,6 +1339,259 @@ describe("Authentication Client", async () => {
returnTo: "/dashboard",
})
})
+
+ describe("with pushed authorization requests", async () => {
+ it("should return an error if the authorization server does not support PAR", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+ pushedAuthorizationRequests: true,
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+ fetch: getMockAuthorizationServer({
+ discoveryResponse: Response.json(
+ {
+ ..._authorizationServerMetadata,
+ pushed_authorization_request_endpoint: null,
+ },
+ {
+ status: 200,
+ headers: {
+ "content-type": "application/json",
+ },
+ }
+ ),
+ }),
+ })
+
+ const request = new NextRequest(
+ new URL("/auth/login", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+ const response = await authClient.handleLogin(request)
+
+ expect(response.status).toEqual(500)
+ expect(await response.text()).toEqual(
+ "An error occured while trying to initiate the login request."
+ )
+ })
+
+ it("should redirect to the authorization server with the request_uri and store the transaction state", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+ pushedAuthorizationRequests: true,
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+ fetch: getMockAuthorizationServer({
+ onParRequest: async (request) => {
+ const params = new URLSearchParams(await request.text())
+ expect(params.get("client_id")).toEqual(DEFAULT.clientId)
+ expect(params.get("redirect_uri")).toEqual(
+ `${DEFAULT.appBaseUrl}/auth/callback`
+ )
+ expect(params.get("response_type")).toEqual("code")
+ expect(params.get("code_challenge")).toEqual(expect.any(String))
+ expect(params.get("code_challenge_method")).toEqual("S256")
+ expect(params.get("state")).toEqual(expect.any(String))
+ expect(params.get("nonce")).toEqual(expect.any(String))
+ expect(params.get("scope")).toEqual(
+ "openid profile email offline_access"
+ )
+ },
+ }),
+ })
+
+ const request = new NextRequest(
+ new URL("/auth/login", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ const response = await authClient.handleLogin(request)
+ expect(response.status).toEqual(307)
+ expect(response.headers.get("Location")).not.toBeNull()
+
+ const authorizationUrl = new URL(response.headers.get("Location")!)
+ expect(authorizationUrl.origin).toEqual(`https://${DEFAULT.domain}`)
+ // query parameters should only include the `request_uri` and not the standard auth params
+ expect(authorizationUrl.searchParams.get("request_uri")).toEqual(
+ DEFAULT.requestUri
+ )
+ expect(authorizationUrl.searchParams.get("client_id")).toEqual(
+ DEFAULT.clientId
+ )
+ expect(authorizationUrl.searchParams.get("redirect_uri")).toBeNull()
+ expect(authorizationUrl.searchParams.get("response_type")).toBeNull()
+ expect(authorizationUrl.searchParams.get("code_challenge")).toBeNull()
+ expect(
+ authorizationUrl.searchParams.get("code_challenge_method")
+ ).toBeNull()
+ expect(authorizationUrl.searchParams.get("state")).toBeNull()
+ expect(authorizationUrl.searchParams.get("nonce")).toBeNull()
+ expect(authorizationUrl.searchParams.get("scope")).toBeNull()
+
+ // transaction state
+ const transactionCookies = response.cookies
+ .getAll()
+ .filter((c) => c.name.startsWith("__txn_"))
+ expect(transactionCookies.length).toEqual(1)
+ const transactionCookie = transactionCookies[0]
+ const state = transactionCookie.name.replace("__txn_", "")
+ expect(transactionCookie).toBeDefined()
+ expect(await decrypt(transactionCookie!.value, secret)).toEqual({
+ nonce: expect.any(String),
+ codeVerifier: expect.any(String),
+ responseType: "code",
+ state,
+ returnTo: "/",
+ })
+ })
+
+ it("should forward any custom parameters to the authorization server in the PAR request", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+
+ // set custom parameters in the login URL which should be forwarded to the authorization server (in PAR request)
+ const loginUrl = new URL("/auth/login", DEFAULT.appBaseUrl)
+ loginUrl.searchParams.set("ext-custom_param", "custom_value")
+ loginUrl.searchParams.set("audience", "urn:mystore:api")
+ const request = new NextRequest(loginUrl, {
+ method: "GET",
+ })
+
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+ pushedAuthorizationRequests: true,
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+ fetch: getMockAuthorizationServer({
+ onParRequest: async (request) => {
+ const params = new URLSearchParams(await request.text())
+ expect(params.get("ext-custom_param")).toEqual("custom_value")
+ expect(params.get("audience")).toEqual("urn:mystore:api")
+ },
+ }),
+ })
+
+ const response = await authClient.handleLogin(request)
+ expect(response.status).toEqual(307)
+ expect(response.headers.get("Location")).not.toBeNull()
+ const authorizationUrl = new URL(response.headers.get("Location")!)
+ expect(authorizationUrl.origin).toEqual(`https://${DEFAULT.domain}`)
+ // query parameters should only include the `request_uri` and not the standard auth params
+ expect(authorizationUrl.searchParams.get("request_uri")).toEqual(
+ DEFAULT.requestUri
+ )
+ expect(authorizationUrl.searchParams.get("client_id")).toEqual(
+ DEFAULT.clientId
+ )
+ expect(authorizationUrl.searchParams.get("redirect_uri")).toBeNull()
+ expect(authorizationUrl.searchParams.get("response_type")).toBeNull()
+ expect(authorizationUrl.searchParams.get("code_challenge")).toBeNull()
+ expect(
+ authorizationUrl.searchParams.get("code_challenge_method")
+ ).toBeNull()
+ expect(authorizationUrl.searchParams.get("state")).toBeNull()
+ expect(authorizationUrl.searchParams.get("nonce")).toBeNull()
+ expect(authorizationUrl.searchParams.get("scope")).toBeNull()
+
+ // transaction state
+ const transactionCookies = response.cookies
+ .getAll()
+ .filter((c) => c.name.startsWith("__txn_"))
+ expect(transactionCookies.length).toEqual(1)
+ const transactionCookie = transactionCookies[0]
+ const state = transactionCookie.name.replace("__txn_", "")
+ expect(transactionCookie).toBeDefined()
+ expect(await decrypt(transactionCookie!.value, secret)).toEqual({
+ nonce: expect.any(String),
+ codeVerifier: expect.any(String),
+ responseType: "code",
+ state,
+ returnTo: "/",
+ })
+ })
+ })
+
+ describe("with custom callback route", async () => {
+ it("should redirect to the custom callback route after login", async () => {
+ const secret = await generateSecret(32)
+ const transactionStore = new TransactionStore({
+ secret,
+ })
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ })
+ const authClient = new AuthClient({
+ transactionStore,
+ sessionStore,
+
+ domain: DEFAULT.domain,
+ clientId: DEFAULT.clientId,
+ clientSecret: DEFAULT.clientSecret,
+
+ secret,
+ appBaseUrl: DEFAULT.appBaseUrl,
+
+ fetch: getMockAuthorizationServer(),
+
+ routes: {
+ callback: "/custom-callback",
+ },
+ })
+ const request = new NextRequest(
+ new URL("/auth/login", DEFAULT.appBaseUrl),
+ {
+ method: "GET",
+ }
+ )
+
+ const response = await authClient.handleLogin(request)
+ expect(response.status).toEqual(307)
+ expect(response.headers.get("Location")).not.toBeNull()
+
+ const authorizationUrl = new URL(response.headers.get("Location")!)
+ expect(authorizationUrl.origin).toEqual(`https://${DEFAULT.domain}`)
+
+ // query parameters
+ expect(authorizationUrl.searchParams.get("redirect_uri")).toEqual(
+ `${DEFAULT.appBaseUrl}/custom-callback`
+ )
+ })
+ })
})
describe("handleLogout", async () => {
@@ -3442,4 +3941,5 @@ const _authorizationServerMetadata = {
backchannel_logout_supported: true,
backchannel_logout_session_supported: true,
end_session_endpoint: "https://guabu.us.auth0.com/oidc/logout",
+ pushed_authorization_request_endpoint: "https://guabu.us.auth0.com/oauth/par",
}
diff --git a/src/server/auth-client.ts b/src/server/auth-client.ts
index f298e8c8..fa6a4448 100644
--- a/src/server/auth-client.ts
+++ b/src/server/auth-client.ts
@@ -67,6 +67,18 @@ export interface AuthorizationParameters {
[key: string]: unknown
}
+interface Routes {
+ login: string
+ logout: string
+ callback: string
+ profile: string
+ accessToken: string
+ backChannelLogout: string
+}
+export type RoutesOptions = Partial<
+ Pick
+>
+
export interface AuthClientOptions {
transactionStore: TransactionStore
sessionStore: AbstractSessionStore
@@ -75,6 +87,7 @@ export interface AuthClientOptions {
clientId: string
clientSecret: string
authorizationParameters?: AuthorizationParameters
+ pushedAuthorizationRequests?: boolean
secret: string
appBaseUrl: string
@@ -83,6 +96,8 @@ export interface AuthClientOptions {
beforeSessionSaved?: BeforeSessionSavedHook
onCallback?: OnCallbackHook
+ routes?: RoutesOptions
+
// custom fetch implementation to allow for dependency injection
fetch?: typeof fetch
jwksCache?: jose.JWKSCacheInput
@@ -96,6 +111,7 @@ export class AuthClient {
private clientSecret: string
private issuer: string
private authorizationParameters: AuthorizationParameters
+ private pushedAuthorizationRequests: boolean
private appBaseUrl: string
private signInReturnToPath: string
@@ -103,6 +119,8 @@ export class AuthClient {
private beforeSessionSaved?: BeforeSessionSavedHook
private onCallback: OnCallbackHook
+ private routes: Routes
+
private fetch: typeof fetch
private jwksCache: jose.JWKSCacheInput
@@ -122,6 +140,8 @@ export class AuthClient {
this.authorizationParameters = options.authorizationParameters || {
scope: DEFAULT_SCOPES,
}
+ this.pushedAuthorizationRequests =
+ options.pushedAuthorizationRequests ?? false
if (!this.authorizationParameters.scope) {
this.authorizationParameters.scope = DEFAULT_SCOPES
@@ -143,23 +163,38 @@ export class AuthClient {
// hooks
this.beforeSessionSaved = options.beforeSessionSaved
this.onCallback = options.onCallback || this.defaultOnCallback
+
+ // routes
+ this.routes = {
+ login: "/auth/login",
+ logout: "/auth/logout",
+ callback: "/auth/callback",
+ backChannelLogout: "/auth/backchannel-logout",
+ profile: process.env.NEXT_PUBLIC_PROFILE_ROUTE || "/auth/profile",
+ accessToken:
+ process.env.NEXT_PUBLIC_ACCESS_TOKEN_ROUTE || "/auth/access-token",
+ ...options.routes,
+ }
}
async handler(req: NextRequest): Promise {
const { pathname } = req.nextUrl
const method = req.method
- if (method === "GET" && pathname === "/auth/login") {
+ if (method === "GET" && pathname === this.routes.login) {
return this.handleLogin(req)
- } else if (method === "GET" && pathname === "/auth/logout") {
+ } else if (method === "GET" && pathname === this.routes.logout) {
return this.handleLogout(req)
- } else if (method === "GET" && pathname === "/auth/callback") {
+ } else if (method === "GET" && pathname === this.routes.callback) {
return this.handleCallback(req)
- } else if (method === "GET" && pathname === "/auth/profile") {
+ } else if (method === "GET" && pathname === this.routes.profile) {
return this.handleProfile(req)
- } else if (method === "GET" && pathname === "/auth/access-token") {
+ } else if (method === "GET" && pathname === this.routes.accessToken) {
return this.handleAccessToken(req)
- } else if (method === "POST" && pathname === "/auth/backchannel-logout") {
+ } else if (
+ method === "POST" &&
+ pathname === this.routes.backChannelLogout
+ ) {
return this.handleBackChannelLogout(req)
} else {
// no auth handler found, simply touch the sessions
@@ -191,19 +226,7 @@ export class AuthClient {
}
async handleLogin(req: NextRequest): Promise {
- const [discoveryError, authorizationServerMetadata] =
- await this.discoverAuthorizationServerMetadata()
-
- if (discoveryError) {
- return new NextResponse(
- "An error occured while trying to initiate the login request.",
- {
- status: 500,
- }
- )
- }
-
- const redirectUri = new URL("/auth/callback", this.appBaseUrl) // must be registed with the authorization server
+ const redirectUri = new URL(this.routes.callback, this.appBaseUrl) // must be registed with the authorization server
const returnTo =
req.nextUrl.searchParams.get("returnTo") || this.signInReturnToPath
@@ -213,22 +236,14 @@ export class AuthClient {
const state = oauth.generateRandomState()
const nonce = oauth.generateRandomNonce()
- const authorizationUrl = new URL(
- authorizationServerMetadata.authorization_endpoint!
- )
- authorizationUrl.searchParams.set(
- "client_id",
- this.clientMetadata.client_id
- )
- authorizationUrl.searchParams.set("redirect_uri", redirectUri.toString())
- authorizationUrl.searchParams.set("response_type", "code")
- authorizationUrl.searchParams.set("code_challenge", codeChallenge)
- authorizationUrl.searchParams.set(
- "code_challenge_method",
- codeChallengeMethod
- )
- authorizationUrl.searchParams.set("state", state)
- authorizationUrl.searchParams.set("nonce", nonce)
+ const authorizationParams = new URLSearchParams()
+ authorizationParams.set("client_id", this.clientMetadata.client_id)
+ authorizationParams.set("redirect_uri", redirectUri.toString())
+ authorizationParams.set("response_type", "code")
+ authorizationParams.set("code_challenge", codeChallenge)
+ authorizationParams.set("code_challenge_method", codeChallengeMethod)
+ authorizationParams.set("state", state)
+ authorizationParams.set("nonce", nonce)
// any custom params to forward to /authorize defined as configuration
Object.entries(this.authorizationParameters).forEach(([key, val]) => {
@@ -237,14 +252,14 @@ export class AuthClient {
return
}
- authorizationUrl.searchParams.set(key, String(val))
+ authorizationParams.set(key, String(val))
}
})
// any custom params to forward to /authorize passed as query parameters
req.nextUrl.searchParams.forEach((val, key) => {
if (!INTERNAL_AUTHORIZE_PARAMS.includes(key)) {
- authorizationUrl.searchParams.set(key, val)
+ authorizationParams.set(key, val)
}
})
@@ -257,6 +272,17 @@ export class AuthClient {
returnTo,
}
+ const [error, authorizationUrl] =
+ await this.authorizationUrl(authorizationParams)
+ if (error) {
+ return new NextResponse(
+ "An error occured while trying to initiate the login request.",
+ {
+ status: 500,
+ }
+ )
+ }
+
const res = NextResponse.redirect(authorizationUrl.toString())
await this.transactionStore.save(res.cookies, transactionState)
@@ -350,7 +376,7 @@ export class AuthClient {
)
}
- const redirectUri = new URL("/auth/callback", this.appBaseUrl) // must be registed with the authorization server
+ const redirectUri = new URL(this.routes.callback, this.appBaseUrl) // must be registed with the authorization server
const codeGrantResponse = await oauth.authorizationCodeGrantRequest(
authorizationServerMetadata,
this.clientMetadata,
@@ -607,6 +633,10 @@ export class AuthClient {
return [null, authorizationServerMetadata]
} catch (e) {
+ console.error(
+ `An error occured while performing the discovery request. Please make sure the AUTH0_DOMAIN environment variable is correctly configured — the format must be 'example.us.auth0.com'. issuer=${issuer.toString()}, error:`,
+ e
+ )
return [
new DiscoveryError(
"Discovery failed for the OpenID Connect configuration."
@@ -725,4 +755,80 @@ export class AuthClient {
},
]
}
+
+ private async authorizationUrl(
+ params: URLSearchParams
+ ): Promise<[null, URL] | [Error, null]> {
+ const [discoveryError, authorizationServerMetadata] =
+ await this.discoverAuthorizationServerMetadata()
+ if (discoveryError) {
+ return [discoveryError, null]
+ }
+
+ if (
+ this.pushedAuthorizationRequests &&
+ !authorizationServerMetadata.pushed_authorization_request_endpoint
+ ) {
+ console.error(
+ "The Auth0 tenant does not have pushed authorization requests enabled. Learn how to enable it here: https://auth0.com/docs/get-started/applications/configure-par"
+ )
+ return [
+ new Error(
+ "The authorization server does not support pushed authorization requests."
+ ),
+ null,
+ ]
+ }
+
+ const authorizationUrl = new URL(
+ authorizationServerMetadata.authorization_endpoint!
+ )
+
+ if (this.pushedAuthorizationRequests) {
+ // push the request params to the authorization server
+ const response = await oauth.pushedAuthorizationRequest(
+ authorizationServerMetadata,
+ this.clientMetadata,
+ oauth.ClientSecretPost(this.clientSecret),
+ params,
+ {
+ [oauth.customFetch]: this.fetch,
+ }
+ )
+
+ let parRes: oauth.PushedAuthorizationResponse
+ try {
+ parRes = await oauth.processPushedAuthorizationResponse(
+ authorizationServerMetadata,
+ this.clientMetadata,
+ response
+ )
+ } catch (e: any) {
+ return [
+ new AuthorizationError({
+ cause: new OAuth2Error({
+ code: e.error,
+ message: e.error_description,
+ }),
+ message:
+ "An error occured while pushing the authorization request.",
+ }),
+ null,
+ ]
+ }
+
+ authorizationUrl.searchParams.set("request_uri", parRes.request_uri)
+ authorizationUrl.searchParams.set(
+ "client_id",
+ this.clientMetadata.client_id
+ )
+
+ return [null, authorizationUrl]
+ }
+
+ // append the query parameters to the authorization URL for the normal flow
+ authorizationUrl.search = params.toString()
+
+ return [null, authorizationUrl]
+ }
}
diff --git a/src/server/client.ts b/src/server/client.ts
index e5b9c529..689f2fe7 100644
--- a/src/server/client.ts
+++ b/src/server/client.ts
@@ -9,6 +9,7 @@ import {
AuthorizationParameters,
BeforeSessionSavedHook,
OnCallbackHook,
+ RoutesOptions,
} from "./auth-client"
import { RequestCookies } from "./cookies"
import {
@@ -40,8 +41,14 @@ interface Auth0ClientOptions {
* If it's not specified, it will be loaded from the `AUTH0_CLIENT_SECRET` environment variable.
*/
clientSecret?: string
-
+ /**
+ * Additional parameters to send to the `/authorize` endpoint.
+ */
authorizationParameters?: AuthorizationParameters
+ /**
+ * If enabled, the SDK will use the Pushed Authorization Requests (PAR) protocol when communicating with the authorization server.
+ */
+ pushedAuthorizationRequests?: boolean
// application configuration
/**
@@ -90,6 +97,13 @@ interface Auth0ClientOptions {
* See [Database sessions](https://github.com/auth0/nextjs-auth0#database-sessions) for additional details.
*/
sessionStore?: SessionDataStore
+
+ /**
+ * Configure the paths for the authentication routes.
+ *
+ * See [Custom routes](https://github.com/auth0/nextjs-auth0#custom-routes) for additional details.
+ */
+ routes?: RoutesOptions
}
type PagesRouterRequest = Pick
@@ -109,9 +123,32 @@ export class Auth0Client {
process.env.APP_BASE_URL) as string
const secret = (options.secret || process.env.AUTH0_SECRET) as string
+ const cookieOptions = {
+ secure: false,
+ }
+ if (appBaseUrl) {
+ const { protocol } = new URL(appBaseUrl)
+ if (protocol === "https:") {
+ cookieOptions.secure = true
+ }
+
+ if (process.env.NODE_ENV === "production" && !cookieOptions.secure) {
+ console.warn(
+ `The application's base URL (${appBaseUrl}) is not set to HTTPS. This is not recommended for production environments.`
+ )
+ }
+ }
+
+ if (domain && domain.includes("://")) {
+ throw new Error(
+ "The Auth0 domain should not contain a protocol. Please ensure the AUTH0_DOMAIN environment variable or `domain` configuration option uses the correct format (`example.us.auth0.com`)."
+ )
+ }
+
this.transactionStore = new TransactionStore({
...options.session,
secret,
+ cookieOptions,
})
this.sessionStore = options.sessionStore
@@ -119,10 +156,12 @@ export class Auth0Client {
...options.session,
secret,
store: options.sessionStore,
+ cookieOptions,
})
: new StatelessSessionStore({
...options.session,
secret,
+ cookieOptions,
})
this.authClient = new AuthClient({
@@ -133,6 +172,7 @@ export class Auth0Client {
clientId,
clientSecret,
authorizationParameters: options.authorizationParameters,
+ pushedAuthorizationRequests: options.pushedAuthorizationRequests,
appBaseUrl,
secret,
@@ -140,6 +180,8 @@ export class Auth0Client {
beforeSessionSaved: options.beforeSessionSaved,
onCallback: options.onCallback,
+
+ routes: options.routes,
})
}
diff --git a/src/server/session/abstract-session-store.ts b/src/server/session/abstract-session-store.ts
index e33975d5..72098081 100644
--- a/src/server/session/abstract-session-store.ts
+++ b/src/server/session/abstract-session-store.ts
@@ -1,5 +1,6 @@
import type { SessionData } from "../../types"
import {
+ CookieOptions,
ReadonlyRequestCookies,
RequestCookies,
ResponseCookies,
@@ -60,6 +61,8 @@ export interface SessionConfiguration {
interface SessionStoreOptions extends SessionConfiguration {
secret: string
store?: SessionDataStore
+
+ cookieOptions?: Partial>
}
export abstract class AbstractSessionStore {
@@ -72,12 +75,7 @@ export abstract class AbstractSessionStore {
public store?: SessionDataStore
- public cookieConfig = {
- httpOnly: true,
- sameSite: "lax",
- secure: process.env.NODE_ENV === "production",
- path: "/",
- } as const
+ public cookieConfig: CookieOptions
constructor({
secret,
@@ -86,6 +84,8 @@ export abstract class AbstractSessionStore {
absoluteDuration = 60 * 60 * 24 * 30, // 30 days in seconds
inactivityDuration = 60 * 60 * 24 * 7, // 7 days in seconds
store,
+
+ cookieOptions,
}: SessionStoreOptions) {
this.secret = secret
@@ -93,6 +93,13 @@ export abstract class AbstractSessionStore {
this.absoluteDuration = absoluteDuration
this.inactivityDuration = inactivityDuration
this.store = store
+
+ this.cookieConfig = {
+ httpOnly: true,
+ sameSite: "lax",
+ secure: cookieOptions?.secure ?? false,
+ path: "/",
+ }
}
abstract get(
diff --git a/src/server/session/stateful-session-store.test.ts b/src/server/session/stateful-session-store.test.ts
index ef203208..8db78911 100644
--- a/src/server/session/stateful-session-store.test.ts
+++ b/src/server/session/stateful-session-store.test.ts
@@ -168,6 +168,7 @@ describe("Stateful Session Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(1800)
+ expect(cookie?.secure).toEqual(false)
expect(store.set).toHaveBeenCalledOnce()
expect(store.set).toHaveBeenCalledWith(cookieValue.id, session)
@@ -221,6 +222,7 @@ describe("Stateful Session Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(0) // cookie should expire immedcreatedAtely
+ expect(cookie?.secure).toEqual(false)
expect(store.set).toHaveBeenCalledOnce()
expect(store.set).toHaveBeenCalledWith(cookieValue.id, session)
@@ -268,6 +270,7 @@ describe("Stateful Session Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(3600)
+ expect(cookie?.secure).toEqual(false)
expect(store.set).toHaveBeenCalledOnce()
expect(store.set).toHaveBeenCalledWith(cookieValue.id, session)
@@ -324,6 +327,58 @@ describe("Stateful Session Store", async () => {
expect(store.set).toHaveBeenCalledWith(cookieValue.id, session) // a new session ID should be generated
})
})
+
+ describe("with cookieOptions", async () => {
+ it("should apply the secure attribute to the cookie", async () => {
+ const currentTime = Date.now()
+ const createdAt = Math.floor(currentTime / 1000)
+ const secret = await generateSecret(32)
+ const session: SessionData = {
+ user: { sub: "user_123" },
+ tokenSet: {
+ accessToken: "at_123",
+ refreshToken: "rt_123",
+ expiresAt: 123456,
+ },
+ internal: {
+ sid: "auth0-sid",
+ createdAt,
+ },
+ }
+ const store = {
+ get: vi.fn().mockResolvedValue(session),
+ set: vi.fn(),
+ delete: vi.fn(),
+ }
+
+ const requestCookies = new RequestCookies(new Headers())
+ const responseCookies = new ResponseCookies(new Headers())
+
+ const sessionStore = new StatefulSessionStore({
+ secret,
+ store,
+ rolling: true,
+ absoluteDuration: 3600,
+ inactivityDuration: 1800,
+
+ cookieOptions: {
+ secure: true,
+ },
+ })
+ await sessionStore.set(requestCookies, responseCookies, session)
+
+ const cookie = responseCookies.get("__session")
+ const cookieValue = await decrypt(cookie!.value, secret)
+
+ expect(cookie).toBeDefined()
+ expect(cookieValue).toHaveProperty("id")
+ expect(cookie?.path).toEqual("/")
+ expect(cookie?.httpOnly).toEqual(true)
+ expect(cookie?.sameSite).toEqual("lax")
+ expect(cookie?.maxAge).toEqual(1800)
+ expect(cookie?.secure).toEqual(true)
+ })
+ })
})
describe("delete", async () => {
diff --git a/src/server/session/stateful-session-store.ts b/src/server/session/stateful-session-store.ts
index f4b57283..674e9b46 100644
--- a/src/server/session/stateful-session-store.ts
+++ b/src/server/session/stateful-session-store.ts
@@ -19,6 +19,8 @@ interface StatefulSessionStoreOptions {
inactivityDuration?: number // defaults to 7 days
store: SessionDataStore
+
+ cookieOptions?: Partial>
}
const generateId = () => {
@@ -38,12 +40,14 @@ export class StatefulSessionStore extends AbstractSessionStore {
rolling,
absoluteDuration,
inactivityDuration,
+ cookieOptions,
}: StatefulSessionStoreOptions) {
super({
secret,
rolling,
absoluteDuration,
inactivityDuration,
+ cookieOptions,
})
this.store = store
diff --git a/src/server/session/stateless-session-store.test.ts b/src/server/session/stateless-session-store.test.ts
index 8e1cf2e6..775ecc35 100644
--- a/src/server/session/stateless-session-store.test.ts
+++ b/src/server/session/stateless-session-store.test.ts
@@ -96,6 +96,7 @@ describe("Stateless Session Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(1800) // should be extended by inactivity duration
+ expect(cookie?.secure).toEqual(false)
})
it("should not exceed the absolute timeout duration", async () => {
@@ -137,6 +138,7 @@ describe("Stateless Session Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(0) // cookie should expire immediately
+ expect(cookie?.secure).toEqual(false)
})
})
@@ -173,6 +175,47 @@ describe("Stateless Session Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(3600)
+ expect(cookie?.secure).toEqual(false)
+ })
+ })
+
+ describe("with cookieOptions", async () => {
+ it("should apply the secure attribute to the cookie", async () => {
+ const secret = await generateSecret(32)
+ const session: SessionData = {
+ user: { sub: "user_123" },
+ tokenSet: {
+ accessToken: "at_123",
+ refreshToken: "rt_123",
+ expiresAt: 123456,
+ },
+ internal: {
+ sid: "auth0-sid",
+ createdAt: Math.floor(Date.now() / 1000),
+ },
+ }
+ const requestCookies = new RequestCookies(new Headers())
+ const responseCookies = new ResponseCookies(new Headers())
+
+ const sessionStore = new StatelessSessionStore({
+ secret,
+ rolling: false,
+ absoluteDuration: 3600,
+ cookieOptions: {
+ secure: true,
+ },
+ })
+ await sessionStore.set(requestCookies, responseCookies, session)
+
+ const cookie = responseCookies.get("__session")
+
+ expect(cookie).toBeDefined()
+ expect(await decrypt(cookie!.value, secret)).toEqual(session)
+ expect(cookie?.path).toEqual("/")
+ expect(cookie?.httpOnly).toEqual(true)
+ expect(cookie?.sameSite).toEqual("lax")
+ expect(cookie?.maxAge).toEqual(3600)
+ expect(cookie?.secure).toEqual(true)
})
})
})
diff --git a/src/server/session/stateless-session-store.ts b/src/server/session/stateless-session-store.ts
index d1d4eb5f..ce4dd4ed 100644
--- a/src/server/session/stateless-session-store.ts
+++ b/src/server/session/stateless-session-store.ts
@@ -8,6 +8,8 @@ interface StatelessSessionStoreOptions {
rolling?: boolean // defaults to true
absoluteDuration?: number // defaults to 30 days
inactivityDuration?: number // defaults to 7 days
+
+ cookieOptions?: Partial>
}
export class StatelessSessionStore extends AbstractSessionStore {
@@ -16,12 +18,14 @@ export class StatelessSessionStore extends AbstractSessionStore {
rolling,
absoluteDuration,
inactivityDuration,
+ cookieOptions,
}: StatelessSessionStoreOptions) {
super({
secret,
rolling,
absoluteDuration,
inactivityDuration,
+ cookieOptions,
})
}
diff --git a/src/server/transaction-store.test.ts b/src/server/transaction-store.test.ts
index f616244e..b5bf4617 100644
--- a/src/server/transaction-store.test.ts
+++ b/src/server/transaction-store.test.ts
@@ -93,6 +93,7 @@ describe("Transaction Store", async () => {
expect(cookie?.httpOnly).toEqual(true)
expect(cookie?.sameSite).toEqual("lax")
expect(cookie?.maxAge).toEqual(3600)
+ expect(cookie?.secure).toEqual(false)
})
it("should throw an error if the transaction does not contain a state", async () => {
@@ -118,6 +119,44 @@ describe("Transaction Store", async () => {
transactionStore.save(responseCookies, transactionState)
).rejects.toThrowError()
})
+
+ describe("with cookieOptions", async () => {
+ it("should apply the secure attribute to the cookie", async () => {
+ const secret = await generateSecret(32)
+ const codeVerifier = oauth.generateRandomCodeVerifier()
+ const nonce = oauth.generateRandomNonce()
+ const state = oauth.generateRandomState()
+ const transactionState: TransactionState = {
+ nonce,
+ maxAge: 3600,
+ codeVerifier: codeVerifier,
+ responseType: "code",
+ state,
+ returnTo: "/dashboard",
+ }
+ const headers = new Headers()
+ const responseCookies = new ResponseCookies(headers)
+
+ const transactionStore = new TransactionStore({
+ secret,
+ cookieOptions: {
+ secure: true,
+ },
+ })
+ await transactionStore.save(responseCookies, transactionState)
+
+ const cookieName = `__txn_${state}`
+ const cookie = responseCookies.get(cookieName)
+
+ expect(cookie).toBeDefined()
+ expect(await decrypt(cookie!.value, secret)).toEqual(transactionState)
+ expect(cookie?.path).toEqual("/")
+ expect(cookie?.httpOnly).toEqual(true)
+ expect(cookie?.sameSite).toEqual("lax")
+ expect(cookie?.maxAge).toEqual(3600)
+ expect(cookie?.secure).toEqual(true)
+ })
+ })
})
describe("delete", async () => {
diff --git a/src/server/transaction-store.ts b/src/server/transaction-store.ts
index 5aa7b82d..ee9a2478 100644
--- a/src/server/transaction-store.ts
+++ b/src/server/transaction-store.ts
@@ -15,6 +15,7 @@ export interface TransactionState extends jose.JWTPayload {
interface TransactionStoreOptions {
secret: string
+ cookieOptions?: Partial>
}
/**
@@ -26,12 +27,12 @@ export class TransactionStore {
private secret: string
private cookieConfig: cookies.CookieOptions
- constructor({ secret }: TransactionStoreOptions) {
+ constructor({ secret, cookieOptions }: TransactionStoreOptions) {
this.secret = secret
this.cookieConfig = {
httpOnly: true,
sameSite: "lax", // required to allow the cookie to be sent on the callback request
- secure: process.env.NODE_ENV === "production",
+ secure: cookieOptions?.secure ?? false,
path: "/",
maxAge: 60 * 60, // 1 hour in seconds
}
diff --git a/vitest.config.mts b/vitest.config.mts
index fd28d74b..7de0b577 100644
--- a/vitest.config.mts
+++ b/vitest.config.mts
@@ -4,7 +4,7 @@ import { configDefaults } from "vitest/config"
export default defineConfig({
test: {
- exclude: [...configDefaults.exclude, "e2e/*"],
+ exclude: [...configDefaults.exclude, "e2e/*", "examples/*"],
coverage: {
include: ["src/**/*"],
},