@aura-stack/auth 0.1.0-rc.9 → 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (116) hide show
  1. package/dist/@types/index.cjs +15 -15
  2. package/dist/@types/index.d.ts +7 -31
  3. package/dist/@types/index.js +1 -1
  4. package/dist/@types/router.d.cjs +1 -1
  5. package/dist/@types/router.d.d.ts +7 -7
  6. package/dist/@types/utility.cjs +15 -15
  7. package/dist/@types/utility.d.ts +6 -6
  8. package/dist/@types/utility.js +1 -1
  9. package/dist/actions/callback/access-token.cjs +143 -143
  10. package/dist/actions/callback/access-token.d.ts +15 -20
  11. package/dist/actions/callback/access-token.js +8 -4
  12. package/dist/actions/callback/callback.cjs +437 -455
  13. package/dist/actions/callback/callback.d.ts +10 -12
  14. package/dist/actions/callback/callback.js +16 -12
  15. package/dist/actions/callback/userinfo.cjs +131 -134
  16. package/dist/actions/callback/userinfo.d.ts +9 -9
  17. package/dist/actions/callback/userinfo.js +10 -6
  18. package/dist/actions/csrfToken/csrfToken.cjs +162 -171
  19. package/dist/actions/csrfToken/csrfToken.d.ts +3 -3
  20. package/dist/actions/csrfToken/csrfToken.js +12 -8
  21. package/dist/actions/index.cjs +746 -773
  22. package/dist/actions/index.d.ts +13 -13
  23. package/dist/actions/index.js +34 -18
  24. package/dist/actions/session/session.cjs +149 -155
  25. package/dist/actions/session/session.d.ts +3 -3
  26. package/dist/actions/session/session.js +11 -7
  27. package/dist/actions/signIn/authorization.cjs +231 -249
  28. package/dist/actions/signIn/authorization.d.ts +12 -18
  29. package/dist/actions/signIn/authorization.js +16 -6
  30. package/dist/actions/signIn/signIn.cjs +396 -423
  31. package/dist/actions/signIn/signIn.d.ts +10 -10
  32. package/dist/actions/signIn/signIn.js +14 -10
  33. package/dist/actions/signOut/signOut.cjs +417 -440
  34. package/dist/actions/signOut/signOut.d.ts +3 -3
  35. package/dist/actions/signOut/signOut.js +15 -11
  36. package/dist/assert.cjs +35 -36
  37. package/dist/assert.d.ts +4 -4
  38. package/dist/assert.js +10 -2
  39. package/dist/chunk-256KIVJL.js +85 -96
  40. package/dist/chunk-42XB3YCW.js +19 -17
  41. package/dist/chunk-6SM22VVJ.js +13 -10
  42. package/dist/chunk-CAKJT3KS.js +84 -69
  43. package/dist/chunk-E3OXBRYF.js +19 -17
  44. package/dist/chunk-EBPE35JT.js +28 -26
  45. package/dist/chunk-FIPU4MLT.js +18 -16
  46. package/dist/chunk-FJUDBLCP.js +50 -43
  47. package/dist/chunk-FKRDCWBF.js +19 -17
  48. package/dist/chunk-GZU3RBTB.js +51 -40
  49. package/dist/chunk-HGJ4TXY4.js +132 -100
  50. package/dist/chunk-HMRKN75I.js +63 -63
  51. package/dist/chunk-IKHPGFCW.js +11 -9
  52. package/dist/chunk-JAPMIE6S.js +7 -5
  53. package/dist/chunk-KRNOMBXQ.js +19 -17
  54. package/dist/chunk-LLR722CL.js +91 -70
  55. package/dist/chunk-RLT4RFKV.js +39 -30
  56. package/dist/chunk-SJPDVKUS.js +107 -88
  57. package/dist/chunk-SMQO5WD7.js +26 -16
  58. package/dist/chunk-STHEPPUZ.js +8 -6
  59. package/dist/chunk-UJJ7R56J.js +47 -37
  60. package/dist/chunk-UTDLUEEG.js +27 -21
  61. package/dist/chunk-VFTYH33W.js +54 -37
  62. package/dist/chunk-XXJKNKGQ.js +33 -23
  63. package/dist/chunk-ZV4BH47P.js +132 -134
  64. package/dist/cookie.cjs +169 -175
  65. package/dist/cookie.d.ts +23 -51
  66. package/dist/cookie.js +34 -34
  67. package/dist/error.cjs +75 -75
  68. package/dist/error.d.ts +30 -30
  69. package/dist/error.js +15 -8
  70. package/dist/headers.cjs +28 -28
  71. package/dist/headers.d.ts +2 -2
  72. package/dist/headers.js +6 -2
  73. package/dist/index-DpfbvTZ_.d.ts +249 -298
  74. package/dist/index.cjs +936 -969
  75. package/dist/index.d.ts +10 -31
  76. package/dist/index.js +70 -50
  77. package/dist/jose.cjs +61 -64
  78. package/dist/jose.d.ts +8 -8
  79. package/dist/jose.js +9 -5
  80. package/dist/oauth/bitbucket.cjs +38 -38
  81. package/dist/oauth/bitbucket.d.ts +7 -7
  82. package/dist/oauth/bitbucket.js +6 -2
  83. package/dist/oauth/discord.cjs +48 -48
  84. package/dist/oauth/discord.d.ts +7 -7
  85. package/dist/oauth/discord.js +6 -2
  86. package/dist/oauth/figma.cjs +39 -39
  87. package/dist/oauth/figma.d.ts +7 -7
  88. package/dist/oauth/figma.js +6 -2
  89. package/dist/oauth/github.cjs +31 -31
  90. package/dist/oauth/github.d.ts +7 -7
  91. package/dist/oauth/github.js +6 -2
  92. package/dist/oauth/gitlab.cjs +39 -39
  93. package/dist/oauth/gitlab.d.ts +7 -7
  94. package/dist/oauth/gitlab.js +6 -2
  95. package/dist/oauth/index.cjs +180 -180
  96. package/dist/oauth/index.d.ts +7 -26
  97. package/dist/oauth/index.js +36 -9
  98. package/dist/oauth/spotify.cjs +39 -39
  99. package/dist/oauth/spotify.d.ts +7 -7
  100. package/dist/oauth/spotify.js +6 -2
  101. package/dist/oauth/x.cjs +39 -39
  102. package/dist/oauth/x.d.ts +7 -7
  103. package/dist/oauth/x.js +6 -2
  104. package/dist/response.cjs +27 -27
  105. package/dist/response.d.ts +2 -2
  106. package/dist/response.js +6 -2
  107. package/dist/schemas.cjs +91 -91
  108. package/dist/schemas.d.ts +93 -126
  109. package/dist/schemas.js +18 -18
  110. package/dist/secure.cjs +95 -98
  111. package/dist/secure.d.ts +17 -17
  112. package/dist/secure.js +18 -4
  113. package/dist/utils.cjs +119 -132
  114. package/dist/utils.d.ts +11 -26
  115. package/dist/utils.js +21 -21
  116. package/package.json +2 -2
package/dist/schemas.js CHANGED
@@ -1,20 +1,20 @@
1
1
  import {
2
- OAuthAccessToken,
3
- OAuthAccessTokenErrorResponse,
4
- OAuthAccessTokenResponse,
5
- OAuthAuthorization,
6
- OAuthAuthorizationErrorResponse,
7
- OAuthAuthorizationResponse,
8
- OAuthErrorResponse,
9
- OAuthProviderConfigSchema,
10
- } from "./chunk-HMRKN75I.js"
2
+ OAuthAccessToken,
3
+ OAuthAccessTokenErrorResponse,
4
+ OAuthAccessTokenResponse,
5
+ OAuthAuthorization,
6
+ OAuthAuthorizationErrorResponse,
7
+ OAuthAuthorizationResponse,
8
+ OAuthErrorResponse,
9
+ OAuthProviderConfigSchema
10
+ } from "./chunk-HMRKN75I.js";
11
11
  export {
12
- OAuthAccessToken,
13
- OAuthAccessTokenErrorResponse,
14
- OAuthAccessTokenResponse,
15
- OAuthAuthorization,
16
- OAuthAuthorizationErrorResponse,
17
- OAuthAuthorizationResponse,
18
- OAuthErrorResponse,
19
- OAuthProviderConfigSchema,
20
- }
12
+ OAuthAccessToken,
13
+ OAuthAccessTokenErrorResponse,
14
+ OAuthAccessTokenResponse,
15
+ OAuthAuthorization,
16
+ OAuthAuthorizationErrorResponse,
17
+ OAuthAuthorizationResponse,
18
+ OAuthErrorResponse,
19
+ OAuthProviderConfigSchema
20
+ };
package/dist/secure.cjs CHANGED
@@ -1,123 +1,120 @@
1
- "use strict"
2
- var __create = Object.create
3
- var __defProp = Object.defineProperty
4
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor
5
- var __getOwnPropNames = Object.getOwnPropertyNames
6
- var __getProtoOf = Object.getPrototypeOf
7
- var __hasOwnProp = Object.prototype.hasOwnProperty
1
+ "use strict";
2
+ var __create = Object.create;
3
+ var __defProp = Object.defineProperty;
4
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
5
+ var __getOwnPropNames = Object.getOwnPropertyNames;
6
+ var __getProtoOf = Object.getPrototypeOf;
7
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
8
8
  var __export = (target, all) => {
9
- for (var name in all) __defProp(target, name, { get: all[name], enumerable: true })
10
- }
9
+ for (var name in all)
10
+ __defProp(target, name, { get: all[name], enumerable: true });
11
+ };
11
12
  var __copyProps = (to, from, except, desc) => {
12
- if ((from && typeof from === "object") || typeof from === "function") {
13
- for (let key of __getOwnPropNames(from))
14
- if (!__hasOwnProp.call(to, key) && key !== except)
15
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable })
16
- }
17
- return to
18
- }
19
- var __toESM = (mod, isNodeMode, target) => (
20
- (target = mod != null ? __create(__getProtoOf(mod)) : {}),
21
- __copyProps(
22
- // If the importer is in node compatibility mode or this is not an ESM
23
- // file that has been converted to a CommonJS file using a Babel-
24
- // compatible transform (i.e. "__esModule" has not been set), then set
25
- // "default" to the CommonJS "module.exports" for node compatibility.
26
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
27
- mod
28
- )
29
- )
30
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod)
13
+ if (from && typeof from === "object" || typeof from === "function") {
14
+ for (let key of __getOwnPropNames(from))
15
+ if (!__hasOwnProp.call(to, key) && key !== except)
16
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
17
+ }
18
+ return to;
19
+ };
20
+ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
21
+ // If the importer is in node compatibility mode or this is not an ESM
22
+ // file that has been converted to a CommonJS file using a Babel-
23
+ // compatible transform (i.e. "__esModule" has not been set), then set
24
+ // "default" to the CommonJS "module.exports" for node compatibility.
25
+ isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
26
+ mod
27
+ ));
28
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
31
29
 
32
30
  // src/secure.ts
33
- var secure_exports = {}
31
+ var secure_exports = {};
34
32
  __export(secure_exports, {
35
- createCSRF: () => createCSRF,
36
- createDerivedSalt: () => createDerivedSalt,
37
- createHash: () => createHash,
38
- createPKCE: () => createPKCE,
39
- generateSecure: () => generateSecure,
40
- verifyCSRF: () => verifyCSRF,
41
- })
42
- module.exports = __toCommonJS(secure_exports)
43
- var import_node_crypto = __toESM(require("crypto"), 1)
33
+ createCSRF: () => createCSRF,
34
+ createDerivedSalt: () => createDerivedSalt,
35
+ createHash: () => createHash,
36
+ createPKCE: () => createPKCE,
37
+ generateSecure: () => generateSecure,
38
+ verifyCSRF: () => verifyCSRF
39
+ });
40
+ module.exports = __toCommonJS(secure_exports);
41
+ var import_node_crypto = __toESM(require("crypto"), 1);
44
42
 
45
43
  // src/utils.ts
46
- var import_router = require("@aura-stack/router")
44
+ var import_router = require("@aura-stack/router");
47
45
 
48
46
  // src/error.ts
49
47
  var AuthError = class extends Error {
50
- constructor(type, message) {
51
- super(message)
52
- this.type = type
53
- this.name = "AuthError"
54
- }
55
- }
48
+ constructor(type, message) {
49
+ super(message);
50
+ this.type = type;
51
+ this.name = "AuthError";
52
+ }
53
+ };
56
54
  var InvalidCsrfTokenError = class extends AuthError {
57
- constructor(message = "The provided CSRF token is invalid or has expired") {
58
- super("invalid_csrf_token", message)
59
- this.name = "InvalidCsrfTokenError"
60
- }
61
- }
55
+ constructor(message = "The provided CSRF token is invalid or has expired") {
56
+ super("invalid_csrf_token", message);
57
+ this.name = "InvalidCsrfTokenError";
58
+ }
59
+ };
62
60
 
63
61
  // src/utils.ts
64
62
  var equals = (a, b) => {
65
- if (a === null || b === null || a === void 0 || b === void 0) return false
66
- return a === b
67
- }
63
+ if (a === null || b === null || a === void 0 || b === void 0) return false;
64
+ return a === b;
65
+ };
68
66
 
69
67
  // src/secure.ts
70
68
  var generateSecure = (length = 32) => {
71
- return import_node_crypto.default.randomBytes(length).toString("base64url")
72
- }
69
+ return import_node_crypto.default.randomBytes(length).toString("base64url");
70
+ };
73
71
  var createHash = (data, base = "hex") => {
74
- return import_node_crypto.default.createHash("sha256").update(data).digest().toString(base)
75
- }
72
+ return import_node_crypto.default.createHash("sha256").update(data).digest().toString(base);
73
+ };
76
74
  var createPKCE = async (verifier) => {
77
- const codeVerifier = verifier ?? generateSecure(86)
78
- const codeChallenge = createHash(codeVerifier, "base64url")
79
- return { codeVerifier, codeChallenge, method: "S256" }
80
- }
75
+ const codeVerifier = verifier ?? generateSecure(86);
76
+ const codeChallenge = createHash(codeVerifier, "base64url");
77
+ return { codeVerifier, codeChallenge, method: "S256" };
78
+ };
81
79
  var createCSRF = async (jose, csrfCookie) => {
82
- try {
83
- const token = generateSecure(32)
84
- if (csrfCookie) {
85
- await jose.verifyJWS(csrfCookie)
86
- return csrfCookie
87
- }
88
- return jose.signJWS({ token })
89
- } catch {
90
- const token = generateSecure(32)
91
- return jose.signJWS({ token })
80
+ try {
81
+ const token = generateSecure(32);
82
+ if (csrfCookie) {
83
+ await jose.verifyJWS(csrfCookie);
84
+ return csrfCookie;
92
85
  }
93
- }
86
+ return jose.signJWS({ token });
87
+ } catch {
88
+ const token = generateSecure(32);
89
+ return jose.signJWS({ token });
90
+ }
91
+ };
94
92
  var verifyCSRF = async (jose, cookie, header) => {
95
- try {
96
- const { token: cookieToken } = await jose.verifyJWS(cookie)
97
- const { token: headerToken } = await jose.verifyJWS(header)
98
- const cookieBuffer = Buffer.from(cookieToken)
99
- const headerBuffer = Buffer.from(headerToken)
100
- if (!equals(headerBuffer.length, cookieBuffer.length)) {
101
- throw new InvalidCsrfTokenError()
102
- }
103
- if (!import_node_crypto.default.timingSafeEqual(cookieBuffer, headerBuffer)) {
104
- throw new InvalidCsrfTokenError()
105
- }
106
- return true
107
- } catch {
108
- throw new InvalidCsrfTokenError()
93
+ try {
94
+ const { token: cookieToken } = await jose.verifyJWS(cookie);
95
+ const { token: headerToken } = await jose.verifyJWS(header);
96
+ const cookieBuffer = Buffer.from(cookieToken);
97
+ const headerBuffer = Buffer.from(headerToken);
98
+ if (!equals(headerBuffer.length, cookieBuffer.length)) {
99
+ throw new InvalidCsrfTokenError();
100
+ }
101
+ if (!import_node_crypto.default.timingSafeEqual(cookieBuffer, headerBuffer)) {
102
+ throw new InvalidCsrfTokenError();
109
103
  }
110
- }
104
+ return true;
105
+ } catch {
106
+ throw new InvalidCsrfTokenError();
107
+ }
108
+ };
111
109
  var createDerivedSalt = (secret) => {
112
- return import_node_crypto.default.createHash("sha256").update(secret).update("aura-auth-salt").digest("hex")
113
- }
110
+ return import_node_crypto.default.createHash("sha256").update(secret).update("aura-auth-salt").digest("hex");
111
+ };
114
112
  // Annotate the CommonJS export names for ESM import in node:
115
- 0 &&
116
- (module.exports = {
117
- createCSRF,
118
- createDerivedSalt,
119
- createHash,
120
- createPKCE,
121
- generateSecure,
122
- verifyCSRF,
123
- })
113
+ 0 && (module.exports = {
114
+ createCSRF,
115
+ createDerivedSalt,
116
+ createHash,
117
+ createPKCE,
118
+ generateSecure,
119
+ verifyCSRF
120
+ });
package/dist/secure.d.ts CHANGED
@@ -1,13 +1,13 @@
1
- import { A as AuthRuntimeConfig } from "./index-DpfbvTZ_.js"
2
- import "zod/v4"
3
- import "@aura-stack/jose/jose"
4
- import "./schemas.js"
5
- import "zod/v4/core"
6
- import "cookie"
7
- import "./@types/utility.js"
1
+ import { A as AuthRuntimeConfig } from './index-DpfbvTZ_.js';
2
+ import 'zod/v4';
3
+ import '@aura-stack/jose/jose';
4
+ import './schemas.js';
5
+ import 'zod/v4/core';
6
+ import 'cookie';
7
+ import './@types/utility.js';
8
8
 
9
- declare const generateSecure: (length?: number) => string
10
- declare const createHash: (data: string, base?: "hex" | "base64" | "base64url") => string
9
+ declare const generateSecure: (length?: number) => string;
10
+ declare const createHash: (data: string, base?: "hex" | "base64" | "base64url") => string;
11
11
  /**
12
12
  * Creates the code challenge flow for PKCE OAuth flow. It generates a code verifier and its corresponding
13
13
  * code challenge using SHA-256 hashing.
@@ -18,24 +18,24 @@ declare const createHash: (data: string, base?: "hex" | "base64" | "base64url")
18
18
  * @see https://datatracker.ietf.org/doc/html/rfc7636#section-4.1
19
19
  */
20
20
  declare const createPKCE: (verifier?: string) => Promise<{
21
- codeVerifier: string
22
- codeChallenge: string
23
- method: string
24
- }>
21
+ codeVerifier: string;
22
+ codeChallenge: string;
23
+ method: string;
24
+ }>;
25
25
  /**
26
26
  * Creates a CSRF token to be used in OAuth flows to prevent cross-site request forgery attacks.
27
27
  *
28
28
  * @param csrfCookie - Optional existing CSRF cookie to verify and reuse
29
29
  * @returns Signed CSRF token
30
30
  */
31
- declare const createCSRF: (jose: AuthRuntimeConfig["jose"], csrfCookie?: string) => Promise<string>
32
- declare const verifyCSRF: (jose: AuthRuntimeConfig["jose"], cookie: string, header: string) => Promise<boolean>
31
+ declare const createCSRF: (jose: AuthRuntimeConfig["jose"], csrfCookie?: string) => Promise<string>;
32
+ declare const verifyCSRF: (jose: AuthRuntimeConfig["jose"], cookie: string, header: string) => Promise<boolean>;
33
33
  /**
34
34
  * Creates a deterministic derived salt from the provided secret.
35
35
  *
36
36
  * @param secret the base secret to derive the salt from
37
37
  * @returns the derived salt as a hexadecimal string
38
38
  */
39
- declare const createDerivedSalt: (secret: string) => string
39
+ declare const createDerivedSalt: (secret: string) => string;
40
40
 
41
- export { createCSRF, createDerivedSalt, createHash, createPKCE, generateSecure, verifyCSRF }
41
+ export { createCSRF, createDerivedSalt, createHash, createPKCE, generateSecure, verifyCSRF };
package/dist/secure.js CHANGED
@@ -1,4 +1,18 @@
1
- import { createCSRF, createDerivedSalt, createHash, createPKCE, generateSecure, verifyCSRF } from "./chunk-GZU3RBTB.js"
2
- import "./chunk-256KIVJL.js"
3
- import "./chunk-FJUDBLCP.js"
4
- export { createCSRF, createDerivedSalt, createHash, createPKCE, generateSecure, verifyCSRF }
1
+ import {
2
+ createCSRF,
3
+ createDerivedSalt,
4
+ createHash,
5
+ createPKCE,
6
+ generateSecure,
7
+ verifyCSRF
8
+ } from "./chunk-GZU3RBTB.js";
9
+ import "./chunk-256KIVJL.js";
10
+ import "./chunk-FJUDBLCP.js";
11
+ export {
12
+ createCSRF,
13
+ createDerivedSalt,
14
+ createHash,
15
+ createPKCE,
16
+ generateSecure,
17
+ verifyCSRF
18
+ };
package/dist/utils.cjs CHANGED
@@ -1,154 +1,141 @@
1
- "use strict"
2
- var __defProp = Object.defineProperty
3
- var __getOwnPropDesc = Object.getOwnPropertyDescriptor
4
- var __getOwnPropNames = Object.getOwnPropertyNames
5
- var __hasOwnProp = Object.prototype.hasOwnProperty
1
+ "use strict";
2
+ var __defProp = Object.defineProperty;
3
+ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
+ var __getOwnPropNames = Object.getOwnPropertyNames;
5
+ var __hasOwnProp = Object.prototype.hasOwnProperty;
6
6
  var __export = (target, all) => {
7
- for (var name in all) __defProp(target, name, { get: all[name], enumerable: true })
8
- }
7
+ for (var name in all)
8
+ __defProp(target, name, { get: all[name], enumerable: true });
9
+ };
9
10
  var __copyProps = (to, from, except, desc) => {
10
- if ((from && typeof from === "object") || typeof from === "function") {
11
- for (let key of __getOwnPropNames(from))
12
- if (!__hasOwnProp.call(to, key) && key !== except)
13
- __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable })
14
- }
15
- return to
16
- }
17
- var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod)
11
+ if (from && typeof from === "object" || typeof from === "function") {
12
+ for (let key of __getOwnPropNames(from))
13
+ if (!__hasOwnProp.call(to, key) && key !== except)
14
+ __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
15
+ }
16
+ return to;
17
+ };
18
+ var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
18
19
 
19
20
  // src/utils.ts
20
- var utils_exports = {}
21
+ var utils_exports = {};
21
22
  __export(utils_exports, {
22
- equals: () => equals,
23
- getNormalizedOriginPath: () => getNormalizedOriginPath,
24
- isValidRelativePath: () => isValidRelativePath,
25
- onErrorHandler: () => onErrorHandler,
26
- sanitizeURL: () => sanitizeURL,
27
- toCastCase: () => toCastCase,
28
- toISOString: () => toISOString,
29
- toSnakeCase: () => toSnakeCase,
30
- toUpperCase: () => toUpperCase,
31
- })
32
- module.exports = __toCommonJS(utils_exports)
33
- var import_router = require("@aura-stack/router")
23
+ equals: () => equals,
24
+ getNormalizedOriginPath: () => getNormalizedOriginPath,
25
+ isValidRelativePath: () => isValidRelativePath,
26
+ onErrorHandler: () => onErrorHandler,
27
+ sanitizeURL: () => sanitizeURL,
28
+ toCastCase: () => toCastCase,
29
+ toISOString: () => toISOString,
30
+ toSnakeCase: () => toSnakeCase,
31
+ toUpperCase: () => toUpperCase
32
+ });
33
+ module.exports = __toCommonJS(utils_exports);
34
+ var import_router = require("@aura-stack/router");
34
35
 
35
36
  // src/error.ts
36
37
  var AuthError = class extends Error {
37
- constructor(type, message) {
38
- super(message)
39
- this.type = type
40
- this.name = "AuthError"
41
- }
42
- }
38
+ constructor(type, message) {
39
+ super(message);
40
+ this.type = type;
41
+ this.name = "AuthError";
42
+ }
43
+ };
43
44
  var isAuthError = (error) => {
44
- return error instanceof AuthError
45
- }
45
+ return error instanceof AuthError;
46
+ };
46
47
 
47
48
  // src/utils.ts
48
49
  var toSnakeCase = (str) => {
49
- return str
50
- .replace(/([a-z0-9])([A-Z])/g, "$1_$2")
51
- .replace(/([A-Z]+)([A-Z][a-z])/g, "$1_$2")
52
- .toLowerCase()
53
- .replace(/^_+/, "")
54
- }
50
+ return str.replace(/([a-z0-9])([A-Z])/g, "$1_$2").replace(/([A-Z]+)([A-Z][a-z])/g, "$1_$2").toLowerCase().replace(/^_+/, "");
51
+ };
55
52
  var toUpperCase = (str) => {
56
- return str.toUpperCase()
57
- }
53
+ return str.toUpperCase();
54
+ };
58
55
  var toCastCase = (obj, type = "snake") => {
59
- return Object.entries(obj).reduce((previous, [key, value]) => {
60
- const newKey = type === "snake" ? toSnakeCase(key) : toUpperCase(key)
61
- return { ...previous, [newKey]: value }
62
- }, {})
63
- }
56
+ return Object.entries(obj).reduce((previous, [key, value]) => {
57
+ const newKey = type === "snake" ? toSnakeCase(key) : toUpperCase(key);
58
+ return { ...previous, [newKey]: value };
59
+ }, {});
60
+ };
64
61
  var equals = (a, b) => {
65
- if (a === null || b === null || a === void 0 || b === void 0) return false
66
- return a === b
67
- }
62
+ if (a === null || b === null || a === void 0 || b === void 0) return false;
63
+ return a === b;
64
+ };
68
65
  var sanitizeURL = (url) => {
69
- try {
70
- let decodedURL = decodeURIComponent(url).trim()
71
- const protocolMatch = decodedURL.match(/^([a-zA-Z][a-zA-Z0-9+.-]*:\/\/)/)
72
- let protocol = ""
73
- let rest = decodedURL
74
- if (protocolMatch) {
75
- protocol = protocolMatch[1]
76
- rest = decodedURL.slice(protocol.length)
77
- const slashIndex = rest.indexOf("/")
78
- if (slashIndex === -1) {
79
- return protocol + rest
80
- }
81
- const domain = rest.slice(0, slashIndex)
82
- let path = rest
83
- .slice(slashIndex)
84
- .replace(/\/\.\.\//g, "/")
85
- .replace(/\/\.\.$/, "")
86
- .replace(/\.{2,}/g, "")
87
- .replace(/\/{2,}/g, "/")
88
- if (path !== "/" && path.endsWith("/")) {
89
- path = path.replace(/\/+$/, "/")
90
- } else if (path !== "/") {
91
- path = path.replace(/\/+$/, "")
92
- }
93
- return protocol + domain + path
94
- }
95
- let sanitized = decodedURL
96
- .replace(/\/\.\.\//g, "/")
97
- .replace(/\/\.\.$/, "")
98
- .replace(/\.{2,}/g, "")
99
- .replace(/\/{2,}/g, "/")
100
- if (sanitized !== "/" && sanitized.endsWith("/")) {
101
- sanitized = sanitized.replace(/\/+$/, "/")
102
- } else if (sanitized !== "/") {
103
- sanitized = sanitized.replace(/\/+$/, "")
104
- }
105
- return sanitized
106
- } catch {
107
- return url.trim()
66
+ try {
67
+ let decodedURL = decodeURIComponent(url).trim();
68
+ const protocolMatch = decodedURL.match(/^([a-zA-Z][a-zA-Z0-9+.-]*:\/\/)/);
69
+ let protocol = "";
70
+ let rest = decodedURL;
71
+ if (protocolMatch) {
72
+ protocol = protocolMatch[1];
73
+ rest = decodedURL.slice(protocol.length);
74
+ const slashIndex = rest.indexOf("/");
75
+ if (slashIndex === -1) {
76
+ return protocol + rest;
77
+ }
78
+ const domain = rest.slice(0, slashIndex);
79
+ let path = rest.slice(slashIndex).replace(/\/\.\.\//g, "/").replace(/\/\.\.$/, "").replace(/\.{2,}/g, "").replace(/\/{2,}/g, "/");
80
+ if (path !== "/" && path.endsWith("/")) {
81
+ path = path.replace(/\/+$/, "/");
82
+ } else if (path !== "/") {
83
+ path = path.replace(/\/+$/, "");
84
+ }
85
+ return protocol + domain + path;
86
+ }
87
+ let sanitized = decodedURL.replace(/\/\.\.\//g, "/").replace(/\/\.\.$/, "").replace(/\.{2,}/g, "").replace(/\/{2,}/g, "/");
88
+ if (sanitized !== "/" && sanitized.endsWith("/")) {
89
+ sanitized = sanitized.replace(/\/+$/, "/");
90
+ } else if (sanitized !== "/") {
91
+ sanitized = sanitized.replace(/\/+$/, "");
108
92
  }
109
- }
93
+ return sanitized;
94
+ } catch {
95
+ return url.trim();
96
+ }
97
+ };
110
98
  var isValidRelativePath = (path) => {
111
- if (!path || typeof path !== "string") return false
112
- if (!path.startsWith("/") || path.includes("://") || path.includes("\r") || path.includes("\n")) return false
113
- if (/[\x00-\x1F\x7F]/.test(path) || path.includes("\0")) return false
114
- const sanitized = sanitizeURL(path)
115
- if (sanitized.includes("..")) return false
116
- return true
117
- }
99
+ if (!path || typeof path !== "string") return false;
100
+ if (!path.startsWith("/") || path.includes("://") || path.includes("\r") || path.includes("\n")) return false;
101
+ if (/[\x00-\x1F\x7F]/.test(path) || path.includes("\0")) return false;
102
+ const sanitized = sanitizeURL(path);
103
+ if (sanitized.includes("..")) return false;
104
+ return true;
105
+ };
118
106
  var onErrorHandler = (error) => {
119
- if ((0, import_router.isRouterError)(error)) {
120
- const { message, status, statusText } = error
121
- return Response.json({ error: "invalid_request", error_description: message }, { status, statusText })
122
- }
123
- if (isAuthError(error)) {
124
- const { type, message } = error
125
- return Response.json({ error: type, error_description: message }, { status: 400 })
126
- }
127
- return Response.json({ error: "server_error", error_description: "An unexpected error occurred" }, { status: 500 })
128
- }
107
+ if ((0, import_router.isRouterError)(error)) {
108
+ const { message, status, statusText } = error;
109
+ return Response.json({ error: "invalid_request", error_description: message }, { status, statusText });
110
+ }
111
+ if (isAuthError(error)) {
112
+ const { type, message } = error;
113
+ return Response.json({ error: type, error_description: message }, { status: 400 });
114
+ }
115
+ return Response.json({ error: "server_error", error_description: "An unexpected error occurred" }, { status: 500 });
116
+ };
129
117
  var getNormalizedOriginPath = (path) => {
130
- try {
131
- const url = new URL(path)
132
- url.hash = ""
133
- url.search = ""
134
- return `${url.origin}${url.pathname}`
135
- } catch {
136
- return sanitizeURL(path)
137
- }
138
- }
118
+ try {
119
+ const url = new URL(path);
120
+ url.hash = "";
121
+ url.search = "";
122
+ return `${url.origin}${url.pathname}`;
123
+ } catch {
124
+ return sanitizeURL(path);
125
+ }
126
+ };
139
127
  var toISOString = (date) => {
140
- return new Date(date).toISOString()
141
- }
128
+ return new Date(date).toISOString();
129
+ };
142
130
  // Annotate the CommonJS export names for ESM import in node:
143
- 0 &&
144
- (module.exports = {
145
- equals,
146
- getNormalizedOriginPath,
147
- isValidRelativePath,
148
- onErrorHandler,
149
- sanitizeURL,
150
- toCastCase,
151
- toISOString,
152
- toSnakeCase,
153
- toUpperCase,
154
- })
131
+ 0 && (module.exports = {
132
+ equals,
133
+ getNormalizedOriginPath,
134
+ isValidRelativePath,
135
+ onErrorHandler,
136
+ sanitizeURL,
137
+ toCastCase,
138
+ toISOString,
139
+ toSnakeCase,
140
+ toUpperCase
141
+ });