@ahoo-wang/fetcher-cosec 3.6.5 → 3.6.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/authorizationRequestInterceptor.d.ts.map +1 -1
- package/dist/cosecRequestInterceptor.d.ts +0 -1
- package/dist/cosecRequestInterceptor.d.ts.map +1 -1
- package/dist/index.es.js +98 -98
- package/dist/index.es.js.map +1 -1
- package/dist/index.umd.js +1 -1
- package/dist/index.umd.js.map +1 -1
- package/dist/resourceAttributionRequestInterceptor.d.ts.map +1 -1
- package/package.json +3 -3
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authorizationRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/authorizationRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,
|
|
1
|
+
{"version":3,"file":"authorizationRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/authorizationRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,EAEL,aAAa,EACb,kBAAkB,EACnB,MAAM,oBAAoB,CAAC;AAK5B,OAAO,EAAgB,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAG/D,MAAM,WAAW,+BACf,SAAQ,sBAAsB;CAC/B;AAED,eAAO,MAAM,sCAAsC,oCAChB,CAAC;AACpC,eAAO,MAAM,uCAAuC,QACc,CAAC;AAEnE;;;;;;;;;GASG;AACH,qBAAa,+BAAgC,YAAW,kBAAkB;IAS5D,OAAO,CAAC,QAAQ,CAAC,OAAO;IARpC,QAAQ,CAAC,IAAI,qCAA0C;IACvD,QAAQ,CAAC,KAAK,SAA2C;IAEzD;;;;OAIG;gBAC0B,OAAO,EAAE,+BAA+B;IAGrE;;;;;;;;;;OAUG;IACG,SAAS,CAAC,QAAQ,EAAE,aAAa,GAAG,OAAO,CAAC,IAAI,CAAC;CA6BxD"}
|
|
@@ -8,7 +8,6 @@ export interface CoSecRequestOptions extends AppIdCapable, DeviceIdStorageCapabl
|
|
|
8
8
|
export declare const COSEC_REQUEST_INTERCEPTOR_NAME = "CoSecRequestInterceptor";
|
|
9
9
|
/**
|
|
10
10
|
* The order of the CoSecRequestInterceptor.
|
|
11
|
-
* Set to REQUEST_BODY_INTERCEPTOR_ORDER + 1000 to ensure it runs after RequestBodyInterceptor.
|
|
12
11
|
*/
|
|
13
12
|
export declare const COSEC_REQUEST_INTERCEPTOR_ORDER: number;
|
|
14
13
|
export declare const IGNORE_REFRESH_TOKEN_ATTRIBUTE_KEY = "Ignore-Refresh-Token";
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cosecRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/cosecRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,
|
|
1
|
+
{"version":3,"file":"cosecRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/cosecRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,EAEL,aAAa,EACb,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAgB,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAG7E,MAAM,WAAW,mBACf,SAAQ,YAAY,EAClB,sBAAsB;CACzB;AAED;;GAEG;AACH,eAAO,MAAM,8BAA8B,4BAA4B,CAAC;AAExE;;GAEG;AACH,eAAO,MAAM,+BAA+B,QACc,CAAC;AAE3D,eAAO,MAAM,kCAAkC,yBAAyB,CAAC;AAEzE;;;;;;;;;;;;;;;GAeG;AACH,qBAAa,uBAAwB,YAAW,kBAAkB;IAChE,QAAQ,CAAC,IAAI,6BAAkC;IAC/C,QAAQ,CAAC,KAAK,SAAmC;IACjD,OAAO,CAAC,OAAO,CAAsB;IAErC;;;OAGG;gBACS,OAAO,EAAE,mBAAmB;IAIxC;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,SAAS,CAAC,QAAQ,EAAE,aAAa;CAexC"}
|
package/dist/index.es.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
import {
|
|
2
|
-
import { nanoid as
|
|
3
|
-
import { KeyStorage as
|
|
4
|
-
import { BroadcastTypedEventBus as
|
|
1
|
+
import { DEFAULT_INTERCEPTOR_ORDER_STEP as d, FetcherError as D, URL_RESOLVE_INTERCEPTOR_ORDER as U, ResultExtractors as y } from "@ahoo-wang/fetcher";
|
|
2
|
+
import { nanoid as C } from "nanoid";
|
|
3
|
+
import { KeyStorage as O, typedIdentitySerializer as m } from "@ahoo-wang/fetcher-storage";
|
|
4
|
+
import { BroadcastTypedEventBus as g, SerialTypedEventBus as _ } from "@ahoo-wang/fetcher-eventbus";
|
|
5
5
|
const a = class a {
|
|
6
6
|
};
|
|
7
7
|
a.DEVICE_ID = "CoSec-Device-Id", a.APP_ID = "CoSec-App-Id", a.AUTHORIZATION = "Authorization", a.REQUEST_ID = "CoSec-Request-Id";
|
|
@@ -10,31 +10,31 @@ const u = class u {
|
|
|
10
10
|
};
|
|
11
11
|
u.UNAUTHORIZED = 401, u.FORBIDDEN = 403;
|
|
12
12
|
let h = u;
|
|
13
|
-
const
|
|
13
|
+
const ae = {
|
|
14
14
|
ALLOW: { authorized: !0, reason: "Allow" },
|
|
15
15
|
EXPLICIT_DENY: { authorized: !1, reason: "Explicit Deny" },
|
|
16
16
|
IMPLICIT_DENY: { authorized: !1, reason: "Implicit Deny" },
|
|
17
17
|
TOKEN_EXPIRED: { authorized: !1, reason: "Token Expired" },
|
|
18
18
|
TOO_MANY_REQUESTS: { authorized: !1, reason: "Too Many Requests" }
|
|
19
19
|
};
|
|
20
|
-
class
|
|
20
|
+
class b {
|
|
21
21
|
/**
|
|
22
22
|
* Generate a unique request ID.
|
|
23
23
|
*
|
|
24
24
|
* @returns A unique request ID
|
|
25
25
|
*/
|
|
26
26
|
generateId() {
|
|
27
|
-
return
|
|
27
|
+
return C();
|
|
28
28
|
}
|
|
29
29
|
}
|
|
30
|
-
const
|
|
31
|
-
class
|
|
30
|
+
const N = new b(), M = "CoSecRequestInterceptor", k = Number.MIN_SAFE_INTEGER + d, S = "Ignore-Refresh-Token";
|
|
31
|
+
class z {
|
|
32
32
|
/**
|
|
33
33
|
* Creates a new CoSecRequestInterceptor instance.
|
|
34
34
|
* @param options - The CoSec configuration options including appId, deviceIdStorage, and tokenManager
|
|
35
35
|
*/
|
|
36
36
|
constructor(e) {
|
|
37
|
-
this.name =
|
|
37
|
+
this.name = M, this.order = k, this.options = e;
|
|
38
38
|
}
|
|
39
39
|
/**
|
|
40
40
|
* Intercept requests to add CoSec authentication headers.
|
|
@@ -59,19 +59,19 @@ class M {
|
|
|
59
59
|
* It will attempt to refresh the token before adding the Authorization header to the request.
|
|
60
60
|
*/
|
|
61
61
|
async intercept(e) {
|
|
62
|
-
const t =
|
|
62
|
+
const t = N.generateId(), r = this.options.deviceIdStorage.getOrCreate(), n = e.ensureRequestHeaders();
|
|
63
63
|
n[o.APP_ID] = this.options.appId, n[o.DEVICE_ID] = r, n[o.REQUEST_ID] = t;
|
|
64
64
|
}
|
|
65
65
|
}
|
|
66
|
-
const
|
|
67
|
-
class
|
|
66
|
+
const q = "AuthorizationRequestInterceptor", v = k + d;
|
|
67
|
+
class F {
|
|
68
68
|
/**
|
|
69
69
|
* Creates an AuthorizationRequestInterceptor instance.
|
|
70
70
|
*
|
|
71
71
|
* @param options - Configuration options containing the token manager
|
|
72
72
|
*/
|
|
73
73
|
constructor(e) {
|
|
74
|
-
this.options = e, this.name =
|
|
74
|
+
this.options = e, this.name = q, this.order = v;
|
|
75
75
|
}
|
|
76
76
|
/**
|
|
77
77
|
* Intercepts the request exchange to add authorization headers.
|
|
@@ -87,17 +87,17 @@ class v {
|
|
|
87
87
|
async intercept(e) {
|
|
88
88
|
let t = this.options.tokenManager.currentToken;
|
|
89
89
|
const r = e.ensureRequestHeaders();
|
|
90
|
-
!t || r[o.AUTHORIZATION] || (!e.attributes.has(
|
|
90
|
+
!t || r[o.AUTHORIZATION] || (!e.attributes.has(S) && t.isRefreshNeeded && t.isRefreshable && await this.options.tokenManager.refresh(), t = this.options.tokenManager.currentToken, t && (r[o.AUTHORIZATION] = `Bearer ${t.access.token}`));
|
|
91
91
|
}
|
|
92
92
|
}
|
|
93
|
-
const
|
|
93
|
+
const K = "AuthorizationResponseInterceptor", H = Number.MIN_SAFE_INTEGER + 1e3;
|
|
94
94
|
class B {
|
|
95
95
|
/**
|
|
96
96
|
* Creates a new AuthorizationResponseInterceptor instance.
|
|
97
97
|
* @param options - The CoSec configuration options including token storage and refresher
|
|
98
98
|
*/
|
|
99
99
|
constructor(e) {
|
|
100
|
-
this.options = e, this.name =
|
|
100
|
+
this.options = e, this.name = K, this.order = H;
|
|
101
101
|
}
|
|
102
102
|
/**
|
|
103
103
|
* Intercepts the response and handles unauthorized responses by refreshing tokens.
|
|
@@ -113,16 +113,16 @@ class B {
|
|
|
113
113
|
}
|
|
114
114
|
}
|
|
115
115
|
}
|
|
116
|
-
const
|
|
117
|
-
class
|
|
116
|
+
const T = "cosec-device-id";
|
|
117
|
+
class Z extends O {
|
|
118
118
|
constructor({
|
|
119
|
-
key: e =
|
|
120
|
-
eventBus: t = new
|
|
121
|
-
delegate: new
|
|
119
|
+
key: e = T,
|
|
120
|
+
eventBus: t = new g({
|
|
121
|
+
delegate: new _(T)
|
|
122
122
|
}),
|
|
123
123
|
...r
|
|
124
124
|
} = {}) {
|
|
125
|
-
super({ key: e, eventBus: t, ...r, serializer:
|
|
125
|
+
super({ key: e, eventBus: t, ...r, serializer: m() });
|
|
126
126
|
}
|
|
127
127
|
/**
|
|
128
128
|
* Generate a new device ID.
|
|
@@ -130,7 +130,7 @@ class H extends f {
|
|
|
130
130
|
* @returns A newly generated device ID
|
|
131
131
|
*/
|
|
132
132
|
generateDeviceId() {
|
|
133
|
-
return
|
|
133
|
+
return N.generateId();
|
|
134
134
|
}
|
|
135
135
|
/**
|
|
136
136
|
* Get or create a device ID.
|
|
@@ -142,8 +142,8 @@ class H extends f {
|
|
|
142
142
|
return e || (e = this.generateDeviceId(), this.set(e)), e;
|
|
143
143
|
}
|
|
144
144
|
}
|
|
145
|
-
const
|
|
146
|
-
class
|
|
145
|
+
const x = "ForbiddenErrorInterceptor", J = 0;
|
|
146
|
+
class L {
|
|
147
147
|
/**
|
|
148
148
|
* Creates a new ForbiddenErrorInterceptor instance.
|
|
149
149
|
*
|
|
@@ -162,7 +162,7 @@ class J {
|
|
|
162
162
|
* ```
|
|
163
163
|
*/
|
|
164
164
|
constructor(e) {
|
|
165
|
-
this.options = e, this.name =
|
|
165
|
+
this.options = e, this.name = x, this.order = J;
|
|
166
166
|
}
|
|
167
167
|
/**
|
|
168
168
|
* Intercepts fetch exchanges to detect and handle forbidden (403) responses.
|
|
@@ -257,18 +257,18 @@ class Q {
|
|
|
257
257
|
return this.currentToken ? this.currentToken.isRefreshable : !1;
|
|
258
258
|
}
|
|
259
259
|
}
|
|
260
|
-
const Y = "tenantId",
|
|
261
|
-
class
|
|
260
|
+
const Y = "tenantId", j = "ownerId", G = "ResourceAttributionRequestInterceptor", V = U - d;
|
|
261
|
+
class W {
|
|
262
262
|
/**
|
|
263
263
|
* Creates a new ResourceAttributionRequestInterceptor
|
|
264
264
|
* @param options - Configuration options for resource attribution including tenantId, ownerId and tokenStorage
|
|
265
265
|
*/
|
|
266
266
|
constructor({
|
|
267
267
|
tenantId: e = Y,
|
|
268
|
-
ownerId: t =
|
|
268
|
+
ownerId: t = j,
|
|
269
269
|
tokenStorage: r
|
|
270
270
|
}) {
|
|
271
|
-
this.name =
|
|
271
|
+
this.name = G, this.order = V, this.tenantIdPathKey = e, this.ownerIdPathKey = t, this.tokenStorage = r;
|
|
272
272
|
}
|
|
273
273
|
/**
|
|
274
274
|
* Intercepts outgoing requests and automatically adds tenant and owner ID path parameters
|
|
@@ -284,13 +284,13 @@ class V {
|
|
|
284
284
|
return;
|
|
285
285
|
const n = e.fetcher.urlBuilder.urlTemplateResolver.extractPathParams(
|
|
286
286
|
e.request.url
|
|
287
|
-
), c = this.tenantIdPathKey, i = e.ensureRequestUrlParams().path,
|
|
288
|
-
|
|
289
|
-
const
|
|
290
|
-
|
|
287
|
+
), c = this.tenantIdPathKey, i = e.ensureRequestUrlParams().path, I = r.tenantId;
|
|
288
|
+
I && n.includes(c) && !i[c] && (i[c] = I);
|
|
289
|
+
const R = this.ownerIdPathKey, p = r.sub;
|
|
290
|
+
p && n.includes(R) && !i[R] && (i[R] = p);
|
|
291
291
|
}
|
|
292
292
|
}
|
|
293
|
-
function
|
|
293
|
+
function A(s) {
|
|
294
294
|
try {
|
|
295
295
|
if (typeof s != "string")
|
|
296
296
|
return null;
|
|
@@ -310,14 +310,14 @@ function S(s) {
|
|
|
310
310
|
return console.error("Failed to parse JWT token", e), null;
|
|
311
311
|
}
|
|
312
312
|
}
|
|
313
|
-
function
|
|
314
|
-
const t = typeof s == "string" ?
|
|
313
|
+
function X(s, e = 0) {
|
|
314
|
+
const t = typeof s == "string" ? A(s) : s;
|
|
315
315
|
if (!t)
|
|
316
316
|
return !0;
|
|
317
317
|
const r = t.exp;
|
|
318
318
|
return r ? Date.now() / 1e3 > r - e : !1;
|
|
319
319
|
}
|
|
320
|
-
class
|
|
320
|
+
class l {
|
|
321
321
|
/**
|
|
322
322
|
* Creates a new JwtToken instance.
|
|
323
323
|
*
|
|
@@ -331,7 +331,7 @@ class T {
|
|
|
331
331
|
* @throws Will not throw but payload will be null if token parsing fails
|
|
332
332
|
*/
|
|
333
333
|
constructor(e, t = 0) {
|
|
334
|
-
this.token = e, this.earlyPeriod = t, this.payload =
|
|
334
|
+
this.token = e, this.earlyPeriod = t, this.payload = A(e);
|
|
335
335
|
}
|
|
336
336
|
/**
|
|
337
337
|
* Checks if the token is expired.
|
|
@@ -342,10 +342,10 @@ class T {
|
|
|
342
342
|
* @returns true if the token is expired or invalid, false otherwise
|
|
343
343
|
*/
|
|
344
344
|
get isExpired() {
|
|
345
|
-
return this.payload ?
|
|
345
|
+
return this.payload ? X(this.payload, this.earlyPeriod) : !0;
|
|
346
346
|
}
|
|
347
347
|
}
|
|
348
|
-
class
|
|
348
|
+
class P {
|
|
349
349
|
/**
|
|
350
350
|
* Creates a new JwtCompositeToken instance.
|
|
351
351
|
*
|
|
@@ -355,7 +355,7 @@ class A {
|
|
|
355
355
|
* @param earlyPeriod The early expiration period in milliseconds (default: 0)
|
|
356
356
|
*/
|
|
357
357
|
constructor(e, t = 0) {
|
|
358
|
-
this.token = e, this.earlyPeriod = t, this.access = new
|
|
358
|
+
this.token = e, this.earlyPeriod = t, this.access = new l(e.accessToken, t), this.refresh = new l(e.refreshToken, t);
|
|
359
359
|
}
|
|
360
360
|
/**
|
|
361
361
|
* Checks if the access token needs to be refreshed.
|
|
@@ -382,7 +382,7 @@ class A {
|
|
|
382
382
|
return !this.access.isExpired;
|
|
383
383
|
}
|
|
384
384
|
}
|
|
385
|
-
class
|
|
385
|
+
class w {
|
|
386
386
|
/**
|
|
387
387
|
* Creates a new JwtCompositeTokenSerializer instance.
|
|
388
388
|
*
|
|
@@ -403,7 +403,7 @@ class P {
|
|
|
403
403
|
*/
|
|
404
404
|
deserialize(e) {
|
|
405
405
|
const t = JSON.parse(e);
|
|
406
|
-
return new
|
|
406
|
+
return new P(t, this.earlyPeriod);
|
|
407
407
|
}
|
|
408
408
|
/**
|
|
409
409
|
* Serializes a JwtCompositeToken to a JSON string.
|
|
@@ -417,8 +417,8 @@ class P {
|
|
|
417
417
|
return JSON.stringify(e.token);
|
|
418
418
|
}
|
|
419
419
|
}
|
|
420
|
-
const
|
|
421
|
-
class
|
|
420
|
+
const ce = new w(), f = "cosec-token";
|
|
421
|
+
class $ extends O {
|
|
422
422
|
/**
|
|
423
423
|
* Creates a new TokenStorage instance.
|
|
424
424
|
* @param options - Configuration options for the token storage.
|
|
@@ -428,9 +428,9 @@ class X extends f {
|
|
|
428
428
|
* @param reset - Additional options passed to KeyStorage.
|
|
429
429
|
*/
|
|
430
430
|
constructor({
|
|
431
|
-
key: e =
|
|
432
|
-
eventBus: t = new
|
|
433
|
-
delegate: new
|
|
431
|
+
key: e = f,
|
|
432
|
+
eventBus: t = new g({
|
|
433
|
+
delegate: new _(f)
|
|
434
434
|
}),
|
|
435
435
|
earlyPeriod: r = 0,
|
|
436
436
|
...n
|
|
@@ -439,7 +439,7 @@ class X extends f {
|
|
|
439
439
|
key: e,
|
|
440
440
|
eventBus: t,
|
|
441
441
|
...n,
|
|
442
|
-
serializer: new
|
|
442
|
+
serializer: new w(r)
|
|
443
443
|
}), this.earlyPeriod = r;
|
|
444
444
|
}
|
|
445
445
|
/**
|
|
@@ -456,7 +456,7 @@ class X extends f {
|
|
|
456
456
|
* @param compositeToken - The composite token to store for authentication.
|
|
457
457
|
*/
|
|
458
458
|
signIn(e) {
|
|
459
|
-
this.set(new
|
|
459
|
+
this.set(new P(e, this.earlyPeriod));
|
|
460
460
|
}
|
|
461
461
|
/**
|
|
462
462
|
* Signs out by removing the stored token.
|
|
@@ -480,15 +480,15 @@ class X extends f {
|
|
|
480
480
|
return this.authenticated ? this.get()?.access.payload ?? null : null;
|
|
481
481
|
}
|
|
482
482
|
}
|
|
483
|
-
const
|
|
484
|
-
class
|
|
483
|
+
const ee = "UnauthorizedErrorInterceptor", te = 0;
|
|
484
|
+
class re {
|
|
485
485
|
/**
|
|
486
486
|
* Creates a new UnauthorizedErrorInterceptor instance.
|
|
487
487
|
*
|
|
488
488
|
* @param options - Configuration options containing the callback to handle unauthorized responses
|
|
489
489
|
*/
|
|
490
490
|
constructor(e) {
|
|
491
|
-
this.options = e, this.name =
|
|
491
|
+
this.options = e, this.name = ee, this.order = te;
|
|
492
492
|
}
|
|
493
493
|
/**
|
|
494
494
|
* Intercepts fetch exchanges to detect and handle unauthorized (401) responses
|
|
@@ -517,7 +517,7 @@ class te {
|
|
|
517
517
|
(e.response?.status === h.UNAUTHORIZED || e.error instanceof E) && await this.options.onUnauthorized(e);
|
|
518
518
|
}
|
|
519
519
|
}
|
|
520
|
-
class
|
|
520
|
+
class he {
|
|
521
521
|
/**
|
|
522
522
|
* Creates a new CoSecConfigurer instance with the provided configuration.
|
|
523
523
|
*
|
|
@@ -544,7 +544,7 @@ class ce {
|
|
|
544
544
|
* ```
|
|
545
545
|
*/
|
|
546
546
|
constructor(e) {
|
|
547
|
-
this.config = e, this.tokenStorage = e.tokenStorage ?? new
|
|
547
|
+
this.config = e, this.tokenStorage = e.tokenStorage ?? new $(), this.deviceIdStorage = e.deviceIdStorage ?? new Z(), e.tokenRefresher && (this.tokenManager = new Q(
|
|
548
548
|
this.tokenStorage,
|
|
549
549
|
e.tokenRefresher
|
|
550
550
|
));
|
|
@@ -584,16 +584,16 @@ class ce {
|
|
|
584
584
|
*/
|
|
585
585
|
applyTo(e) {
|
|
586
586
|
e.interceptors.request.use(
|
|
587
|
-
new
|
|
587
|
+
new z({
|
|
588
588
|
appId: this.config.appId,
|
|
589
589
|
deviceIdStorage: this.deviceIdStorage
|
|
590
590
|
})
|
|
591
591
|
), e.interceptors.request.use(
|
|
592
|
-
new
|
|
592
|
+
new W({
|
|
593
593
|
tokenStorage: this.tokenStorage
|
|
594
594
|
})
|
|
595
595
|
), this.tokenManager && (e.interceptors.request.use(
|
|
596
|
-
new
|
|
596
|
+
new F({
|
|
597
597
|
tokenManager: this.tokenManager
|
|
598
598
|
})
|
|
599
599
|
), e.interceptors.response.use(
|
|
@@ -601,17 +601,17 @@ class ce {
|
|
|
601
601
|
tokenManager: this.tokenManager
|
|
602
602
|
})
|
|
603
603
|
)), this.config.onUnauthorized && e.interceptors.error.use(
|
|
604
|
-
new
|
|
604
|
+
new re({
|
|
605
605
|
onUnauthorized: this.config.onUnauthorized
|
|
606
606
|
})
|
|
607
607
|
), this.config.onForbidden && e.interceptors.error.use(
|
|
608
|
-
new
|
|
608
|
+
new L({
|
|
609
609
|
onForbidden: this.config.onForbidden
|
|
610
610
|
})
|
|
611
611
|
);
|
|
612
612
|
}
|
|
613
613
|
}
|
|
614
|
-
class
|
|
614
|
+
class ue {
|
|
615
615
|
/**
|
|
616
616
|
* Creates a new instance of CoSecTokenRefresher.
|
|
617
617
|
*
|
|
@@ -670,50 +670,50 @@ class he {
|
|
|
670
670
|
body: e
|
|
671
671
|
},
|
|
672
672
|
{
|
|
673
|
-
resultExtractor:
|
|
674
|
-
attributes: /* @__PURE__ */ new Map([[
|
|
673
|
+
resultExtractor: y.Json,
|
|
674
|
+
attributes: /* @__PURE__ */ new Map([[S, !0]])
|
|
675
675
|
}
|
|
676
676
|
);
|
|
677
677
|
}
|
|
678
678
|
}
|
|
679
679
|
export {
|
|
680
|
-
|
|
681
|
-
|
|
682
|
-
|
|
683
|
-
|
|
684
|
-
|
|
680
|
+
q as AUTHORIZATION_REQUEST_INTERCEPTOR_NAME,
|
|
681
|
+
v as AUTHORIZATION_REQUEST_INTERCEPTOR_ORDER,
|
|
682
|
+
K as AUTHORIZATION_RESPONSE_INTERCEPTOR_NAME,
|
|
683
|
+
H as AUTHORIZATION_RESPONSE_INTERCEPTOR_ORDER,
|
|
684
|
+
F as AuthorizationRequestInterceptor,
|
|
685
685
|
B as AuthorizationResponseInterceptor,
|
|
686
|
-
|
|
687
|
-
|
|
688
|
-
|
|
689
|
-
|
|
686
|
+
ae as AuthorizeResults,
|
|
687
|
+
M as COSEC_REQUEST_INTERCEPTOR_NAME,
|
|
688
|
+
k as COSEC_REQUEST_INTERCEPTOR_ORDER,
|
|
689
|
+
he as CoSecConfigurer,
|
|
690
690
|
o as CoSecHeaders,
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
|
|
697
|
-
|
|
698
|
-
|
|
699
|
-
|
|
700
|
-
|
|
701
|
-
|
|
702
|
-
|
|
691
|
+
z as CoSecRequestInterceptor,
|
|
692
|
+
ue as CoSecTokenRefresher,
|
|
693
|
+
T as DEFAULT_COSEC_DEVICE_ID_KEY,
|
|
694
|
+
f as DEFAULT_COSEC_TOKEN_KEY,
|
|
695
|
+
Z as DeviceIdStorage,
|
|
696
|
+
x as FORBIDDEN_ERROR_INTERCEPTOR_NAME,
|
|
697
|
+
J as FORBIDDEN_ERROR_INTERCEPTOR_ORDER,
|
|
698
|
+
L as ForbiddenErrorInterceptor,
|
|
699
|
+
S as IGNORE_REFRESH_TOKEN_ATTRIBUTE_KEY,
|
|
700
|
+
P as JwtCompositeToken,
|
|
701
|
+
w as JwtCompositeTokenSerializer,
|
|
702
|
+
l as JwtToken,
|
|
703
703
|
Q as JwtTokenManager,
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
704
|
+
b as NanoIdGenerator,
|
|
705
|
+
G as RESOURCE_ATTRIBUTION_REQUEST_INTERCEPTOR_NAME,
|
|
706
|
+
V as RESOURCE_ATTRIBUTION_REQUEST_INTERCEPTOR_ORDER,
|
|
707
707
|
E as RefreshTokenError,
|
|
708
|
-
|
|
708
|
+
W as ResourceAttributionRequestInterceptor,
|
|
709
709
|
h as ResponseCodes,
|
|
710
|
-
|
|
711
|
-
|
|
712
|
-
|
|
713
|
-
|
|
714
|
-
|
|
715
|
-
|
|
716
|
-
|
|
717
|
-
|
|
710
|
+
$ as TokenStorage,
|
|
711
|
+
ee as UNAUTHORIZED_ERROR_INTERCEPTOR_NAME,
|
|
712
|
+
te as UNAUTHORIZED_ERROR_INTERCEPTOR_ORDER,
|
|
713
|
+
re as UnauthorizedErrorInterceptor,
|
|
714
|
+
N as idGenerator,
|
|
715
|
+
X as isTokenExpired,
|
|
716
|
+
ce as jwtCompositeTokenSerializer,
|
|
717
|
+
A as parseJwtPayload
|
|
718
718
|
};
|
|
719
719
|
//# sourceMappingURL=index.es.js.map
|