From 766a07e0a459405c24e140e4cf01b4507719233b Mon Sep 17 00:00:00 2001 From: Vasile Negru Date: Thu, 28 Jul 2022 13:21:29 +0300 Subject: [PATCH] fix-expiration-of-token-from-actual-idtoken Signed-off-by: Vasile Negru Signed-off-by: Vasile Negru Signed-off-by: Vasile Negru Signed-off-by: Vasile Negru --- server/auth/types/openid/helper.ts | 2 +- server/auth/types/openid/routes.ts | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/server/auth/types/openid/helper.ts b/server/auth/types/openid/helper.ts index 3401a1dce..0911987b0 100644 --- a/server/auth/types/openid/helper.ts +++ b/server/auth/types/openid/helper.ts @@ -126,7 +126,7 @@ export function getExpirationDate(idToken: string | undefined) { throw new Error('Invalid token'); } else { const parts = idToken.split('.'); - if (parts.length != 3) { + if (parts.length !== 3) { throw new Error('Invalid token'); } const claim = JSON.parse(Buffer.from(parts[1], 'base64').toString()); diff --git a/server/auth/types/openid/routes.ts b/server/auth/types/openid/routes.ts index 15b7e9f43..e56c3b5a3 100644 --- a/server/auth/types/openid/routes.ts +++ b/server/auth/types/openid/routes.ts @@ -156,7 +156,7 @@ export class OpenIdAuthRoutes { ); // set to cookie - let expirationDate = tokenResponse.idToken + const expirationDate = tokenResponse.idToken ? getExpirationDate(tokenResponse.idToken) : Date.now() + tokenResponse.expiresIn! * 1000; const sessionStorage: SecuritySessionCookie = {