@ahoo-wang/fetcher-cosec 3.6.6 → 3.6.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"authorizationRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/authorizationRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,EAAE,aAAa,EAAE,kBAAkB,EAAE,MAAM,oBAAoB,CAAC;AAKvE,OAAO,EAAgB,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAG/D,MAAM,WAAW,+BACf,SAAQ,sBAAsB;CAAG;AAEnC,eAAO,MAAM,sCAAsC,oCAChB,CAAC;AACpC,eAAO,MAAM,uCAAuC,QACZ,CAAC;AAEzC;;;;;;;;;GASG;AACH,qBAAa,+BAAgC,YAAW,kBAAkB;IAS5D,OAAO,CAAC,QAAQ,CAAC,OAAO;IARpC,QAAQ,CAAC,IAAI,qCAA0C;IACvD,QAAQ,CAAC,KAAK,SAA2C;IAEzD;;;;OAIG;gBAC0B,OAAO,EAAE,+BAA+B;IAErE;;;;;;;;;;OAUG;IACG,SAAS,CAAC,QAAQ,EAAE,aAAa,GAAG,OAAO,CAAC,IAAI,CAAC;CA6BxD"}
1
+ {"version":3,"file":"authorizationRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/authorizationRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,EAEL,aAAa,EACb,kBAAkB,EACnB,MAAM,oBAAoB,CAAC;AAK5B,OAAO,EAAgB,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAG/D,MAAM,WAAW,+BACf,SAAQ,sBAAsB;CAC/B;AAED,eAAO,MAAM,sCAAsC,oCAChB,CAAC;AACpC,eAAO,MAAM,uCAAuC,QACc,CAAC;AAEnE;;;;;;;;;GASG;AACH,qBAAa,+BAAgC,YAAW,kBAAkB;IAS5D,OAAO,CAAC,QAAQ,CAAC,OAAO;IARpC,QAAQ,CAAC,IAAI,qCAA0C;IACvD,QAAQ,CAAC,KAAK,SAA2C;IAEzD;;;;OAIG;gBAC0B,OAAO,EAAE,+BAA+B;IAGrE;;;;;;;;;;OAUG;IACG,SAAS,CAAC,QAAQ,EAAE,aAAa,GAAG,OAAO,CAAC,IAAI,CAAC;CA6BxD"}
@@ -8,7 +8,6 @@ export interface CoSecRequestOptions extends AppIdCapable, DeviceIdStorageCapabl
8
8
  export declare const COSEC_REQUEST_INTERCEPTOR_NAME = "CoSecRequestInterceptor";
9
9
  /**
10
10
  * The order of the CoSecRequestInterceptor.
11
- * Set to REQUEST_BODY_INTERCEPTOR_ORDER + 1000 to ensure it runs after RequestBodyInterceptor.
12
11
  */
13
12
  export declare const COSEC_REQUEST_INTERCEPTOR_ORDER: number;
14
13
  export declare const IGNORE_REFRESH_TOKEN_ATTRIBUTE_KEY = "Ignore-Refresh-Token";
@@ -1 +1 @@
1
- {"version":3,"file":"cosecRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/cosecRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,EACL,aAAa,EAEb,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAgB,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAG7E,MAAM,WAAW,mBACf,SAAQ,YAAY,EAClB,sBAAsB;CAAG;AAE7B;;GAEG;AACH,eAAO,MAAM,8BAA8B,4BAA4B,CAAC;AAExE;;;GAGG;AACH,eAAO,MAAM,+BAA+B,QACL,CAAC;AAExC,eAAO,MAAM,kCAAkC,yBAAyB,CAAC;AAEzE;;;;;;;;;;;;;;;GAeG;AACH,qBAAa,uBAAwB,YAAW,kBAAkB;IAChE,QAAQ,CAAC,IAAI,6BAAkC;IAC/C,QAAQ,CAAC,KAAK,SAAmC;IACjD,OAAO,CAAC,OAAO,CAAsB;IAErC;;;OAGG;gBACS,OAAO,EAAE,mBAAmB;IAIxC;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,SAAS,CAAC,QAAQ,EAAE,aAAa;CAexC"}
1
+ {"version":3,"file":"cosecRequestInterceptor.d.ts","sourceRoot":"","sources":["../src/cosecRequestInterceptor.ts"],"names":[],"mappings":"AAaA,OAAO,EAEL,aAAa,EACb,KAAK,kBAAkB,EACxB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAgB,sBAAsB,EAAE,MAAM,SAAS,CAAC;AAG7E,MAAM,WAAW,mBACf,SAAQ,YAAY,EAClB,sBAAsB;CACzB;AAED;;GAEG;AACH,eAAO,MAAM,8BAA8B,4BAA4B,CAAC;AAExE;;GAEG;AACH,eAAO,MAAM,+BAA+B,QACc,CAAC;AAE3D,eAAO,MAAM,kCAAkC,yBAAyB,CAAC;AAEzE;;;;;;;;;;;;;;;GAeG;AACH,qBAAa,uBAAwB,YAAW,kBAAkB;IAChE,QAAQ,CAAC,IAAI,6BAAkC;IAC/C,QAAQ,CAAC,KAAK,SAAmC;IACjD,OAAO,CAAC,OAAO,CAAsB;IAErC;;;OAGG;gBACS,OAAO,EAAE,mBAAmB;IAIxC;;;;;;;;;;;;;;;;;;;;;OAqBG;IACG,SAAS,CAAC,QAAQ,EAAE,aAAa;CAexC"}
package/dist/index.es.js CHANGED
@@ -1,7 +1,7 @@
1
- import { REQUEST_BODY_INTERCEPTOR_ORDER as w, FetcherError as D, ResultExtractors as U } from "@ahoo-wang/fetcher";
2
- import { nanoid as y } from "nanoid";
3
- import { KeyStorage as f, typedIdentitySerializer as C } from "@ahoo-wang/fetcher-storage";
4
- import { BroadcastTypedEventBus as O, SerialTypedEventBus as g } from "@ahoo-wang/fetcher-eventbus";
1
+ import { DEFAULT_INTERCEPTOR_ORDER_STEP as d, FetcherError as D, URL_RESOLVE_INTERCEPTOR_ORDER as U, ResultExtractors as y } from "@ahoo-wang/fetcher";
2
+ import { nanoid as C } from "nanoid";
3
+ import { KeyStorage as O, typedIdentitySerializer as m } from "@ahoo-wang/fetcher-storage";
4
+ import { BroadcastTypedEventBus as g, SerialTypedEventBus as _ } from "@ahoo-wang/fetcher-eventbus";
5
5
  const a = class a {
6
6
  };
7
7
  a.DEVICE_ID = "CoSec-Device-Id", a.APP_ID = "CoSec-App-Id", a.AUTHORIZATION = "Authorization", a.REQUEST_ID = "CoSec-Request-Id";
@@ -10,31 +10,31 @@ const u = class u {
10
10
  };
11
11
  u.UNAUTHORIZED = 401, u.FORBIDDEN = 403;
12
12
  let h = u;
13
- const ie = {
13
+ const ae = {
14
14
  ALLOW: { authorized: !0, reason: "Allow" },
15
15
  EXPLICIT_DENY: { authorized: !1, reason: "Explicit Deny" },
16
16
  IMPLICIT_DENY: { authorized: !1, reason: "Implicit Deny" },
17
17
  TOKEN_EXPIRED: { authorized: !1, reason: "Token Expired" },
18
18
  TOO_MANY_REQUESTS: { authorized: !1, reason: "Too Many Requests" }
19
19
  };
20
- class m {
20
+ class b {
21
21
  /**
22
22
  * Generate a unique request ID.
23
23
  *
24
24
  * @returns A unique request ID
25
25
  */
26
26
  generateId() {
27
- return y();
27
+ return C();
28
28
  }
29
29
  }
30
- const _ = new m(), b = "CoSecRequestInterceptor", N = w + 1e3, k = "Ignore-Refresh-Token";
31
- class M {
30
+ const N = new b(), M = "CoSecRequestInterceptor", k = Number.MIN_SAFE_INTEGER + d, S = "Ignore-Refresh-Token";
31
+ class z {
32
32
  /**
33
33
  * Creates a new CoSecRequestInterceptor instance.
34
34
  * @param options - The CoSec configuration options including appId, deviceIdStorage, and tokenManager
35
35
  */
36
36
  constructor(e) {
37
- this.name = b, this.order = N, this.options = e;
37
+ this.name = M, this.order = k, this.options = e;
38
38
  }
39
39
  /**
40
40
  * Intercept requests to add CoSec authentication headers.
@@ -59,19 +59,19 @@ class M {
59
59
  * It will attempt to refresh the token before adding the Authorization header to the request.
60
60
  */
61
61
  async intercept(e) {
62
- const t = _.generateId(), r = this.options.deviceIdStorage.getOrCreate(), n = e.ensureRequestHeaders();
62
+ const t = N.generateId(), r = this.options.deviceIdStorage.getOrCreate(), n = e.ensureRequestHeaders();
63
63
  n[o.APP_ID] = this.options.appId, n[o.DEVICE_ID] = r, n[o.REQUEST_ID] = t;
64
64
  }
65
65
  }
66
- const z = "AuthorizationRequestInterceptor", q = N + 1e3;
67
- class v {
66
+ const q = "AuthorizationRequestInterceptor", v = k + d;
67
+ class F {
68
68
  /**
69
69
  * Creates an AuthorizationRequestInterceptor instance.
70
70
  *
71
71
  * @param options - Configuration options containing the token manager
72
72
  */
73
73
  constructor(e) {
74
- this.options = e, this.name = z, this.order = q;
74
+ this.options = e, this.name = q, this.order = v;
75
75
  }
76
76
  /**
77
77
  * Intercepts the request exchange to add authorization headers.
@@ -87,17 +87,17 @@ class v {
87
87
  async intercept(e) {
88
88
  let t = this.options.tokenManager.currentToken;
89
89
  const r = e.ensureRequestHeaders();
90
- !t || r[o.AUTHORIZATION] || (!e.attributes.has(k) && t.isRefreshNeeded && t.isRefreshable && await this.options.tokenManager.refresh(), t = this.options.tokenManager.currentToken, t && (r[o.AUTHORIZATION] = `Bearer ${t.access.token}`));
90
+ !t || r[o.AUTHORIZATION] || (!e.attributes.has(S) && t.isRefreshNeeded && t.isRefreshable && await this.options.tokenManager.refresh(), t = this.options.tokenManager.currentToken, t && (r[o.AUTHORIZATION] = `Bearer ${t.access.token}`));
91
91
  }
92
92
  }
93
- const F = "AuthorizationResponseInterceptor", K = Number.MIN_SAFE_INTEGER + 1e3;
93
+ const K = "AuthorizationResponseInterceptor", H = Number.MIN_SAFE_INTEGER + 1e3;
94
94
  class B {
95
95
  /**
96
96
  * Creates a new AuthorizationResponseInterceptor instance.
97
97
  * @param options - The CoSec configuration options including token storage and refresher
98
98
  */
99
99
  constructor(e) {
100
- this.options = e, this.name = F, this.order = K;
100
+ this.options = e, this.name = K, this.order = H;
101
101
  }
102
102
  /**
103
103
  * Intercepts the response and handles unauthorized responses by refreshing tokens.
@@ -113,16 +113,16 @@ class B {
113
113
  }
114
114
  }
115
115
  }
116
- const p = "cosec-device-id";
117
- class H extends f {
116
+ const T = "cosec-device-id";
117
+ class Z extends O {
118
118
  constructor({
119
- key: e = p,
120
- eventBus: t = new O({
121
- delegate: new g(p)
119
+ key: e = T,
120
+ eventBus: t = new g({
121
+ delegate: new _(T)
122
122
  }),
123
123
  ...r
124
124
  } = {}) {
125
- super({ key: e, eventBus: t, ...r, serializer: C() });
125
+ super({ key: e, eventBus: t, ...r, serializer: m() });
126
126
  }
127
127
  /**
128
128
  * Generate a new device ID.
@@ -130,7 +130,7 @@ class H extends f {
130
130
  * @returns A newly generated device ID
131
131
  */
132
132
  generateDeviceId() {
133
- return _.generateId();
133
+ return N.generateId();
134
134
  }
135
135
  /**
136
136
  * Get or create a device ID.
@@ -142,8 +142,8 @@ class H extends f {
142
142
  return e || (e = this.generateDeviceId(), this.set(e)), e;
143
143
  }
144
144
  }
145
- const Z = "ForbiddenErrorInterceptor", x = 0;
146
- class J {
145
+ const x = "ForbiddenErrorInterceptor", J = 0;
146
+ class L {
147
147
  /**
148
148
  * Creates a new ForbiddenErrorInterceptor instance.
149
149
  *
@@ -162,7 +162,7 @@ class J {
162
162
  * ```
163
163
  */
164
164
  constructor(e) {
165
- this.options = e, this.name = Z, this.order = x;
165
+ this.options = e, this.name = x, this.order = J;
166
166
  }
167
167
  /**
168
168
  * Intercepts fetch exchanges to detect and handle forbidden (403) responses.
@@ -257,18 +257,18 @@ class Q {
257
257
  return this.currentToken ? this.currentToken.isRefreshable : !1;
258
258
  }
259
259
  }
260
- const Y = "tenantId", L = "ownerId", j = "ResourceAttributionRequestInterceptor", G = Number.MAX_SAFE_INTEGER;
261
- class V {
260
+ const Y = "tenantId", j = "ownerId", G = "ResourceAttributionRequestInterceptor", V = U - d;
261
+ class W {
262
262
  /**
263
263
  * Creates a new ResourceAttributionRequestInterceptor
264
264
  * @param options - Configuration options for resource attribution including tenantId, ownerId and tokenStorage
265
265
  */
266
266
  constructor({
267
267
  tenantId: e = Y,
268
- ownerId: t = L,
268
+ ownerId: t = j,
269
269
  tokenStorage: r
270
270
  }) {
271
- this.name = j, this.order = G, this.tenantIdPathKey = e, this.ownerIdPathKey = t, this.tokenStorage = r;
271
+ this.name = G, this.order = V, this.tenantIdPathKey = e, this.ownerIdPathKey = t, this.tokenStorage = r;
272
272
  }
273
273
  /**
274
274
  * Intercepts outgoing requests and automatically adds tenant and owner ID path parameters
@@ -284,13 +284,13 @@ class V {
284
284
  return;
285
285
  const n = e.fetcher.urlBuilder.urlTemplateResolver.extractPathParams(
286
286
  e.request.url
287
- ), c = this.tenantIdPathKey, i = e.ensureRequestUrlParams().path, R = r.tenantId;
288
- R && n.includes(c) && !i[c] && (i[c] = R);
289
- const d = this.ownerIdPathKey, I = r.sub;
290
- I && n.includes(d) && !i[d] && (i[d] = I);
287
+ ), c = this.tenantIdPathKey, i = e.ensureRequestUrlParams().path, I = r.tenantId;
288
+ I && n.includes(c) && !i[c] && (i[c] = I);
289
+ const R = this.ownerIdPathKey, p = r.sub;
290
+ p && n.includes(R) && !i[R] && (i[R] = p);
291
291
  }
292
292
  }
293
- function S(s) {
293
+ function A(s) {
294
294
  try {
295
295
  if (typeof s != "string")
296
296
  return null;
@@ -310,14 +310,14 @@ function S(s) {
310
310
  return console.error("Failed to parse JWT token", e), null;
311
311
  }
312
312
  }
313
- function W(s, e = 0) {
314
- const t = typeof s == "string" ? S(s) : s;
313
+ function X(s, e = 0) {
314
+ const t = typeof s == "string" ? A(s) : s;
315
315
  if (!t)
316
316
  return !0;
317
317
  const r = t.exp;
318
318
  return r ? Date.now() / 1e3 > r - e : !1;
319
319
  }
320
- class T {
320
+ class l {
321
321
  /**
322
322
  * Creates a new JwtToken instance.
323
323
  *
@@ -331,7 +331,7 @@ class T {
331
331
  * @throws Will not throw but payload will be null if token parsing fails
332
332
  */
333
333
  constructor(e, t = 0) {
334
- this.token = e, this.earlyPeriod = t, this.payload = S(e);
334
+ this.token = e, this.earlyPeriod = t, this.payload = A(e);
335
335
  }
336
336
  /**
337
337
  * Checks if the token is expired.
@@ -342,10 +342,10 @@ class T {
342
342
  * @returns true if the token is expired or invalid, false otherwise
343
343
  */
344
344
  get isExpired() {
345
- return this.payload ? W(this.payload, this.earlyPeriod) : !0;
345
+ return this.payload ? X(this.payload, this.earlyPeriod) : !0;
346
346
  }
347
347
  }
348
- class A {
348
+ class P {
349
349
  /**
350
350
  * Creates a new JwtCompositeToken instance.
351
351
  *
@@ -355,7 +355,7 @@ class A {
355
355
  * @param earlyPeriod The early expiration period in milliseconds (default: 0)
356
356
  */
357
357
  constructor(e, t = 0) {
358
- this.token = e, this.earlyPeriod = t, this.access = new T(e.accessToken, t), this.refresh = new T(e.refreshToken, t);
358
+ this.token = e, this.earlyPeriod = t, this.access = new l(e.accessToken, t), this.refresh = new l(e.refreshToken, t);
359
359
  }
360
360
  /**
361
361
  * Checks if the access token needs to be refreshed.
@@ -382,7 +382,7 @@ class A {
382
382
  return !this.access.isExpired;
383
383
  }
384
384
  }
385
- class P {
385
+ class w {
386
386
  /**
387
387
  * Creates a new JwtCompositeTokenSerializer instance.
388
388
  *
@@ -403,7 +403,7 @@ class P {
403
403
  */
404
404
  deserialize(e) {
405
405
  const t = JSON.parse(e);
406
- return new A(t, this.earlyPeriod);
406
+ return new P(t, this.earlyPeriod);
407
407
  }
408
408
  /**
409
409
  * Serializes a JwtCompositeToken to a JSON string.
@@ -417,8 +417,8 @@ class P {
417
417
  return JSON.stringify(e.token);
418
418
  }
419
419
  }
420
- const ae = new P(), l = "cosec-token";
421
- class X extends f {
420
+ const ce = new w(), f = "cosec-token";
421
+ class $ extends O {
422
422
  /**
423
423
  * Creates a new TokenStorage instance.
424
424
  * @param options - Configuration options for the token storage.
@@ -428,9 +428,9 @@ class X extends f {
428
428
  * @param reset - Additional options passed to KeyStorage.
429
429
  */
430
430
  constructor({
431
- key: e = l,
432
- eventBus: t = new O({
433
- delegate: new g(l)
431
+ key: e = f,
432
+ eventBus: t = new g({
433
+ delegate: new _(f)
434
434
  }),
435
435
  earlyPeriod: r = 0,
436
436
  ...n
@@ -439,7 +439,7 @@ class X extends f {
439
439
  key: e,
440
440
  eventBus: t,
441
441
  ...n,
442
- serializer: new P(r)
442
+ serializer: new w(r)
443
443
  }), this.earlyPeriod = r;
444
444
  }
445
445
  /**
@@ -456,7 +456,7 @@ class X extends f {
456
456
  * @param compositeToken - The composite token to store for authentication.
457
457
  */
458
458
  signIn(e) {
459
- this.set(new A(e, this.earlyPeriod));
459
+ this.set(new P(e, this.earlyPeriod));
460
460
  }
461
461
  /**
462
462
  * Signs out by removing the stored token.
@@ -480,15 +480,15 @@ class X extends f {
480
480
  return this.authenticated ? this.get()?.access.payload ?? null : null;
481
481
  }
482
482
  }
483
- const $ = "UnauthorizedErrorInterceptor", ee = 0;
484
- class te {
483
+ const ee = "UnauthorizedErrorInterceptor", te = 0;
484
+ class re {
485
485
  /**
486
486
  * Creates a new UnauthorizedErrorInterceptor instance.
487
487
  *
488
488
  * @param options - Configuration options containing the callback to handle unauthorized responses
489
489
  */
490
490
  constructor(e) {
491
- this.options = e, this.name = $, this.order = ee;
491
+ this.options = e, this.name = ee, this.order = te;
492
492
  }
493
493
  /**
494
494
  * Intercepts fetch exchanges to detect and handle unauthorized (401) responses
@@ -517,7 +517,7 @@ class te {
517
517
  (e.response?.status === h.UNAUTHORIZED || e.error instanceof E) && await this.options.onUnauthorized(e);
518
518
  }
519
519
  }
520
- class ce {
520
+ class he {
521
521
  /**
522
522
  * Creates a new CoSecConfigurer instance with the provided configuration.
523
523
  *
@@ -544,7 +544,7 @@ class ce {
544
544
  * ```
545
545
  */
546
546
  constructor(e) {
547
- this.config = e, this.tokenStorage = e.tokenStorage ?? new X(), this.deviceIdStorage = e.deviceIdStorage ?? new H(), e.tokenRefresher && (this.tokenManager = new Q(
547
+ this.config = e, this.tokenStorage = e.tokenStorage ?? new $(), this.deviceIdStorage = e.deviceIdStorage ?? new Z(), e.tokenRefresher && (this.tokenManager = new Q(
548
548
  this.tokenStorage,
549
549
  e.tokenRefresher
550
550
  ));
@@ -584,16 +584,16 @@ class ce {
584
584
  */
585
585
  applyTo(e) {
586
586
  e.interceptors.request.use(
587
- new M({
587
+ new z({
588
588
  appId: this.config.appId,
589
589
  deviceIdStorage: this.deviceIdStorage
590
590
  })
591
591
  ), e.interceptors.request.use(
592
- new V({
592
+ new W({
593
593
  tokenStorage: this.tokenStorage
594
594
  })
595
595
  ), this.tokenManager && (e.interceptors.request.use(
596
- new v({
596
+ new F({
597
597
  tokenManager: this.tokenManager
598
598
  })
599
599
  ), e.interceptors.response.use(
@@ -601,17 +601,17 @@ class ce {
601
601
  tokenManager: this.tokenManager
602
602
  })
603
603
  )), this.config.onUnauthorized && e.interceptors.error.use(
604
- new te({
604
+ new re({
605
605
  onUnauthorized: this.config.onUnauthorized
606
606
  })
607
607
  ), this.config.onForbidden && e.interceptors.error.use(
608
- new J({
608
+ new L({
609
609
  onForbidden: this.config.onForbidden
610
610
  })
611
611
  );
612
612
  }
613
613
  }
614
- class he {
614
+ class ue {
615
615
  /**
616
616
  * Creates a new instance of CoSecTokenRefresher.
617
617
  *
@@ -670,50 +670,50 @@ class he {
670
670
  body: e
671
671
  },
672
672
  {
673
- resultExtractor: U.Json,
674
- attributes: /* @__PURE__ */ new Map([[k, !0]])
673
+ resultExtractor: y.Json,
674
+ attributes: /* @__PURE__ */ new Map([[S, !0]])
675
675
  }
676
676
  );
677
677
  }
678
678
  }
679
679
  export {
680
- z as AUTHORIZATION_REQUEST_INTERCEPTOR_NAME,
681
- q as AUTHORIZATION_REQUEST_INTERCEPTOR_ORDER,
682
- F as AUTHORIZATION_RESPONSE_INTERCEPTOR_NAME,
683
- K as AUTHORIZATION_RESPONSE_INTERCEPTOR_ORDER,
684
- v as AuthorizationRequestInterceptor,
680
+ q as AUTHORIZATION_REQUEST_INTERCEPTOR_NAME,
681
+ v as AUTHORIZATION_REQUEST_INTERCEPTOR_ORDER,
682
+ K as AUTHORIZATION_RESPONSE_INTERCEPTOR_NAME,
683
+ H as AUTHORIZATION_RESPONSE_INTERCEPTOR_ORDER,
684
+ F as AuthorizationRequestInterceptor,
685
685
  B as AuthorizationResponseInterceptor,
686
- ie as AuthorizeResults,
687
- b as COSEC_REQUEST_INTERCEPTOR_NAME,
688
- N as COSEC_REQUEST_INTERCEPTOR_ORDER,
689
- ce as CoSecConfigurer,
686
+ ae as AuthorizeResults,
687
+ M as COSEC_REQUEST_INTERCEPTOR_NAME,
688
+ k as COSEC_REQUEST_INTERCEPTOR_ORDER,
689
+ he as CoSecConfigurer,
690
690
  o as CoSecHeaders,
691
- M as CoSecRequestInterceptor,
692
- he as CoSecTokenRefresher,
693
- p as DEFAULT_COSEC_DEVICE_ID_KEY,
694
- l as DEFAULT_COSEC_TOKEN_KEY,
695
- H as DeviceIdStorage,
696
- Z as FORBIDDEN_ERROR_INTERCEPTOR_NAME,
697
- x as FORBIDDEN_ERROR_INTERCEPTOR_ORDER,
698
- J as ForbiddenErrorInterceptor,
699
- k as IGNORE_REFRESH_TOKEN_ATTRIBUTE_KEY,
700
- A as JwtCompositeToken,
701
- P as JwtCompositeTokenSerializer,
702
- T as JwtToken,
691
+ z as CoSecRequestInterceptor,
692
+ ue as CoSecTokenRefresher,
693
+ T as DEFAULT_COSEC_DEVICE_ID_KEY,
694
+ f as DEFAULT_COSEC_TOKEN_KEY,
695
+ Z as DeviceIdStorage,
696
+ x as FORBIDDEN_ERROR_INTERCEPTOR_NAME,
697
+ J as FORBIDDEN_ERROR_INTERCEPTOR_ORDER,
698
+ L as ForbiddenErrorInterceptor,
699
+ S as IGNORE_REFRESH_TOKEN_ATTRIBUTE_KEY,
700
+ P as JwtCompositeToken,
701
+ w as JwtCompositeTokenSerializer,
702
+ l as JwtToken,
703
703
  Q as JwtTokenManager,
704
- m as NanoIdGenerator,
705
- j as RESOURCE_ATTRIBUTION_REQUEST_INTERCEPTOR_NAME,
706
- G as RESOURCE_ATTRIBUTION_REQUEST_INTERCEPTOR_ORDER,
704
+ b as NanoIdGenerator,
705
+ G as RESOURCE_ATTRIBUTION_REQUEST_INTERCEPTOR_NAME,
706
+ V as RESOURCE_ATTRIBUTION_REQUEST_INTERCEPTOR_ORDER,
707
707
  E as RefreshTokenError,
708
- V as ResourceAttributionRequestInterceptor,
708
+ W as ResourceAttributionRequestInterceptor,
709
709
  h as ResponseCodes,
710
- X as TokenStorage,
711
- $ as UNAUTHORIZED_ERROR_INTERCEPTOR_NAME,
712
- ee as UNAUTHORIZED_ERROR_INTERCEPTOR_ORDER,
713
- te as UnauthorizedErrorInterceptor,
714
- _ as idGenerator,
715
- W as isTokenExpired,
716
- ae as jwtCompositeTokenSerializer,
717
- S as parseJwtPayload
710
+ $ as TokenStorage,
711
+ ee as UNAUTHORIZED_ERROR_INTERCEPTOR_NAME,
712
+ te as UNAUTHORIZED_ERROR_INTERCEPTOR_ORDER,
713
+ re as UnauthorizedErrorInterceptor,
714
+ N as idGenerator,
715
+ X as isTokenExpired,
716
+ ce as jwtCompositeTokenSerializer,
717
+ A as parseJwtPayload
718
718
  };
719
719
  //# sourceMappingURL=index.es.js.map