@auth0/auth0-spa-js 2.18.0 → 2.18.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth0-spa-js.development.js +394 -297
- package/dist/auth0-spa-js.development.js.map +1 -1
- package/dist/auth0-spa-js.production.esm.js +1 -1
- package/dist/auth0-spa-js.production.esm.js.map +1 -1
- package/dist/auth0-spa-js.production.js +1 -1
- package/dist/auth0-spa-js.production.js.map +1 -1
- package/dist/auth0-spa-js.worker.development.js +71 -21
- package/dist/auth0-spa-js.worker.development.js.map +1 -1
- package/dist/auth0-spa-js.worker.production.js +1 -1
- package/dist/auth0-spa-js.worker.production.js.map +1 -1
- package/dist/lib/auth0-spa-js.cjs.js +417 -317
- package/dist/lib/auth0-spa-js.cjs.js.map +1 -1
- package/package.json +4 -3
- package/src/Auth0Client.ts +10 -7
- package/src/index.ts +6 -3
- package/src/utils.ts +2 -1
- package/src/version.ts +1 -1
- package/dist/typings/Auth0Client.d.ts +0 -439
- package/dist/typings/Auth0Client.utils.d.ts +0 -90
- package/dist/typings/MyAccountApiClient.d.ts +0 -92
- package/dist/typings/TokenExchange.d.ts +0 -77
- package/dist/typings/api.d.ts +0 -2
- package/dist/typings/cache/cache-localstorage.d.ts +0 -7
- package/dist/typings/cache/cache-manager.d.ts +0 -56
- package/dist/typings/cache/cache-memory.d.ts +0 -4
- package/dist/typings/cache/index.d.ts +0 -4
- package/dist/typings/cache/key-manifest.d.ts +0 -12
- package/dist/typings/cache/shared.d.ts +0 -68
- package/dist/typings/constants.d.ts +0 -58
- package/dist/typings/dpop/dpop.d.ts +0 -17
- package/dist/typings/dpop/storage.d.ts +0 -27
- package/dist/typings/dpop/utils.d.ts +0 -15
- package/dist/typings/errors.d.ts +0 -96
- package/dist/typings/fetcher.d.ts +0 -54
- package/dist/typings/global.d.ts +0 -819
- package/dist/typings/http.d.ts +0 -5
- package/dist/typings/index.d.ts +0 -23
- package/dist/typings/jwt.d.ts +0 -21
- package/dist/typings/lock.d.ts +0 -32
- package/dist/typings/mfa/MfaApiClient.d.ts +0 -225
- package/dist/typings/mfa/MfaContextManager.d.ts +0 -79
- package/dist/typings/mfa/constants.d.ts +0 -23
- package/dist/typings/mfa/errors.d.ts +0 -117
- package/dist/typings/mfa/index.d.ts +0 -4
- package/dist/typings/mfa/types.d.ts +0 -181
- package/dist/typings/mfa/utils.d.ts +0 -23
- package/dist/typings/promise-utils.d.ts +0 -2
- package/dist/typings/scope.d.ts +0 -35
- package/dist/typings/storage.d.ts +0 -26
- package/dist/typings/transaction-manager.d.ts +0 -33
- package/dist/typings/utils.d.ts +0 -36
- package/dist/typings/version.d.ts +0 -2
- package/dist/typings/worker/token.worker.d.ts +0 -1
- package/dist/typings/worker/worker.types.d.ts +0 -15
- package/dist/typings/worker/worker.utils.d.ts +0 -7
|
@@ -3,19 +3,145 @@
|
|
|
3
3
|
factory(global.auth0 = {}));
|
|
4
4
|
})(this, function(exports) {
|
|
5
5
|
"use strict";
|
|
6
|
-
function
|
|
6
|
+
function _OverloadYield(e, d) {
|
|
7
|
+
this.v = e, this.k = d;
|
|
8
|
+
}
|
|
9
|
+
function _assertClassBrand(e, t, n) {
|
|
10
|
+
if ("function" == typeof e ? e === t : e.has(t)) return arguments.length < 3 ? t : n;
|
|
11
|
+
throw new TypeError("Private element is not present on this object");
|
|
12
|
+
}
|
|
13
|
+
function _awaitAsyncGenerator(e) {
|
|
14
|
+
return new _OverloadYield(e, 0);
|
|
15
|
+
}
|
|
16
|
+
function _checkPrivateRedeclaration(e, t) {
|
|
17
|
+
if (t.has(e)) throw new TypeError("Cannot initialize the same private elements twice on an object");
|
|
18
|
+
}
|
|
19
|
+
function _classPrivateFieldGet2(s, a) {
|
|
20
|
+
return s.get(_assertClassBrand(s, a));
|
|
21
|
+
}
|
|
22
|
+
function _classPrivateFieldInitSpec(e, t, a) {
|
|
23
|
+
_checkPrivateRedeclaration(e, t), t.set(e, a);
|
|
24
|
+
}
|
|
25
|
+
function _classPrivateFieldSet2(s, a, r) {
|
|
26
|
+
return s.set(_assertClassBrand(s, a), r), r;
|
|
27
|
+
}
|
|
28
|
+
function _classPrivateMethodInitSpec(e, a) {
|
|
29
|
+
_checkPrivateRedeclaration(e, a), a.add(e);
|
|
30
|
+
}
|
|
31
|
+
function _defineProperty(e, r, t) {
|
|
32
|
+
return (r = _toPropertyKey(r)) in e ? Object.defineProperty(e, r, {
|
|
33
|
+
value: t,
|
|
34
|
+
enumerable: !0,
|
|
35
|
+
configurable: !0,
|
|
36
|
+
writable: !0
|
|
37
|
+
}) : e[r] = t, e;
|
|
38
|
+
}
|
|
39
|
+
function ownKeys(e, r) {
|
|
40
|
+
var t = Object.keys(e);
|
|
41
|
+
if (Object.getOwnPropertySymbols) {
|
|
42
|
+
var o = Object.getOwnPropertySymbols(e);
|
|
43
|
+
r && (o = o.filter(function(r) {
|
|
44
|
+
return Object.getOwnPropertyDescriptor(e, r).enumerable;
|
|
45
|
+
})), t.push.apply(t, o);
|
|
46
|
+
}
|
|
47
|
+
return t;
|
|
48
|
+
}
|
|
49
|
+
function _objectSpread2(e) {
|
|
50
|
+
for (var r = 1; r < arguments.length; r++) {
|
|
51
|
+
var t = null != arguments[r] ? arguments[r] : {};
|
|
52
|
+
r % 2 ? ownKeys(Object(t), !0).forEach(function(r) {
|
|
53
|
+
_defineProperty(e, r, t[r]);
|
|
54
|
+
}) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function(r) {
|
|
55
|
+
Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r));
|
|
56
|
+
});
|
|
57
|
+
}
|
|
58
|
+
return e;
|
|
59
|
+
}
|
|
60
|
+
function _objectWithoutProperties(e, t) {
|
|
61
|
+
if (null == e) return {};
|
|
62
|
+
var o, r, i = _objectWithoutPropertiesLoose(e, t);
|
|
63
|
+
if (Object.getOwnPropertySymbols) {
|
|
64
|
+
var n = Object.getOwnPropertySymbols(e);
|
|
65
|
+
for (r = 0; r < n.length; r++) o = n[r], -1 === t.indexOf(o) && {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]);
|
|
66
|
+
}
|
|
67
|
+
return i;
|
|
68
|
+
}
|
|
69
|
+
function _objectWithoutPropertiesLoose(r, e) {
|
|
70
|
+
if (null == r) return {};
|
|
7
71
|
var t = {};
|
|
8
|
-
for (var
|
|
9
|
-
|
|
10
|
-
|
|
72
|
+
for (var n in r) if ({}.hasOwnProperty.call(r, n)) {
|
|
73
|
+
if (-1 !== e.indexOf(n)) continue;
|
|
74
|
+
t[n] = r[n];
|
|
11
75
|
}
|
|
12
76
|
return t;
|
|
13
77
|
}
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
78
|
+
function _toPrimitive(t, r) {
|
|
79
|
+
if ("object" != typeof t || !t) return t;
|
|
80
|
+
var e = t[Symbol.toPrimitive];
|
|
81
|
+
if (void 0 !== e) {
|
|
82
|
+
var i = e.call(t, r || "default");
|
|
83
|
+
if ("object" != typeof i) return i;
|
|
84
|
+
throw new TypeError("@@toPrimitive must return a primitive value.");
|
|
85
|
+
}
|
|
86
|
+
return ("string" === r ? String : Number)(t);
|
|
87
|
+
}
|
|
88
|
+
function _toPropertyKey(t) {
|
|
89
|
+
var i = _toPrimitive(t, "string");
|
|
90
|
+
return "symbol" == typeof i ? i : i + "";
|
|
91
|
+
}
|
|
92
|
+
function _wrapAsyncGenerator(e) {
|
|
93
|
+
return function() {
|
|
94
|
+
return new AsyncGenerator(e.apply(this, arguments));
|
|
95
|
+
};
|
|
96
|
+
}
|
|
97
|
+
function AsyncGenerator(e) {
|
|
98
|
+
var t, n;
|
|
99
|
+
function resume(t, n) {
|
|
100
|
+
try {
|
|
101
|
+
var r = e[t](n), o = r.value, u = o instanceof _OverloadYield;
|
|
102
|
+
Promise.resolve(u ? o.v : o).then(function(n) {
|
|
103
|
+
if (u) {
|
|
104
|
+
var i = "return" === t && o.k ? t : "next";
|
|
105
|
+
if (!o.k || n.done) return resume(i, n);
|
|
106
|
+
n = e[i](n).value;
|
|
107
|
+
}
|
|
108
|
+
settle(!!r.done, n);
|
|
109
|
+
}, function(e) {
|
|
110
|
+
resume("throw", e);
|
|
111
|
+
});
|
|
112
|
+
} catch (e) {
|
|
113
|
+
settle(2, e);
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
function settle(e, r) {
|
|
117
|
+
2 === e ? t.reject(r) : t.resolve({
|
|
118
|
+
value: r,
|
|
119
|
+
done: e
|
|
120
|
+
}), (t = t.next) ? resume(t.key, t.arg) : n = null;
|
|
121
|
+
}
|
|
122
|
+
this._invoke = function(e, r) {
|
|
123
|
+
return new Promise(function(o, u) {
|
|
124
|
+
var i = {
|
|
125
|
+
key: e,
|
|
126
|
+
arg: r,
|
|
127
|
+
resolve: o,
|
|
128
|
+
reject: u,
|
|
129
|
+
next: null
|
|
130
|
+
};
|
|
131
|
+
n ? n = n.next = i : (t = n = i, resume(e, r));
|
|
132
|
+
});
|
|
133
|
+
}, "function" != typeof e.return && (this.return = void 0);
|
|
134
|
+
}
|
|
135
|
+
AsyncGenerator.prototype["function" == typeof Symbol && Symbol.asyncIterator || "@@asyncIterator"] = function() {
|
|
136
|
+
return this;
|
|
137
|
+
}, AsyncGenerator.prototype.next = function(e) {
|
|
138
|
+
return this._invoke("next", e);
|
|
139
|
+
}, AsyncGenerator.prototype.throw = function(e) {
|
|
140
|
+
return this._invoke("throw", e);
|
|
141
|
+
}, AsyncGenerator.prototype.return = function(e) {
|
|
142
|
+
return this._invoke("return", e);
|
|
17
143
|
};
|
|
18
|
-
var version = "2.18.
|
|
144
|
+
var version = "2.18.1";
|
|
19
145
|
const DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS = 60;
|
|
20
146
|
const DEFAULT_POPUP_CONFIG_OPTIONS = {
|
|
21
147
|
timeoutInSeconds: DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS
|
|
@@ -128,6 +254,7 @@
|
|
|
128
254
|
let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
|
|
129
255
|
return value && !exclude.includes(value) ? value : "";
|
|
130
256
|
}
|
|
257
|
+
const _excluded$5 = [ "clientId" ];
|
|
131
258
|
const parseAuthenticationResult = queryString => {
|
|
132
259
|
if (queryString.indexOf("#") > -1) {
|
|
133
260
|
queryString = queryString.substring(0, queryString.indexOf("#"));
|
|
@@ -183,7 +310,7 @@
|
|
|
183
310
|
const top = window.screenY + (window.innerHeight - height) / 2;
|
|
184
311
|
return window.open(url, "auth0:authorize:popup", "left=".concat(left, ",top=").concat(top, ",width=").concat(width, ",height=").concat(height, ",resizable,scrollbars=yes,status=1"));
|
|
185
312
|
};
|
|
186
|
-
const runPopup = config => new Promise((resolve, reject) => {
|
|
313
|
+
const runPopup = (config, eventOrigin) => new Promise((resolve, reject) => {
|
|
187
314
|
let _popupEventListener;
|
|
188
315
|
const popupTimer = setInterval(() => {
|
|
189
316
|
if (config.popup && config.popup.closed) {
|
|
@@ -199,6 +326,7 @@
|
|
|
199
326
|
window.removeEventListener("message", _popupEventListener, false);
|
|
200
327
|
}, (config.timeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS) * 1e3);
|
|
201
328
|
_popupEventListener = function popupEventListener(e) {
|
|
329
|
+
if (e.origin !== eventOrigin) return;
|
|
202
330
|
if (!e.data || e.data.type !== "authorization_response") {
|
|
203
331
|
return;
|
|
204
332
|
}
|
|
@@ -231,7 +359,7 @@
|
|
|
231
359
|
return random;
|
|
232
360
|
};
|
|
233
361
|
const encode$2 = value => btoa(value);
|
|
234
|
-
const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) =>
|
|
362
|
+
const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => _objectSpread2(_objectSpread2({}, acc), {}, {
|
|
235
363
|
[key]: params[key]
|
|
236
364
|
}), {});
|
|
237
365
|
const ALLOWED_AUTH0CLIENT_PROPERTIES = [ {
|
|
@@ -257,9 +385,9 @@
|
|
|
257
385
|
return acc;
|
|
258
386
|
}, {});
|
|
259
387
|
};
|
|
260
|
-
const createQueryParams =
|
|
261
|
-
|
|
262
|
-
return new URLSearchParams(stripUndefined(
|
|
388
|
+
const createQueryParams = _ref => {
|
|
389
|
+
let {clientId: client_id} = _ref, params = _objectWithoutProperties(_ref, _excluded$5);
|
|
390
|
+
return new URLSearchParams(stripUndefined(_objectSpread2({
|
|
263
391
|
client_id: client_id
|
|
264
392
|
}, params))).toString();
|
|
265
393
|
};
|
|
@@ -309,8 +437,8 @@
|
|
|
309
437
|
}
|
|
310
438
|
return parseInt(value, 10) || undefined;
|
|
311
439
|
};
|
|
312
|
-
const fromEntries = iterable => [ ...iterable ].reduce((obj,
|
|
313
|
-
let [key, val] =
|
|
440
|
+
const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref2) => {
|
|
441
|
+
let [key, val] = _ref2;
|
|
314
442
|
obj[key] = val;
|
|
315
443
|
return obj;
|
|
316
444
|
}, {});
|
|
@@ -850,7 +978,9 @@
|
|
|
850
978
|
}
|
|
851
979
|
class LegacyLockManager {
|
|
852
980
|
constructor() {
|
|
853
|
-
this
|
|
981
|
+
_defineProperty(this, "lock", void 0);
|
|
982
|
+
_defineProperty(this, "activeLocks", new Set);
|
|
983
|
+
_defineProperty(this, "pagehideHandler", void 0);
|
|
854
984
|
this.lock = new _default;
|
|
855
985
|
this.pagehideHandler = () => {
|
|
856
986
|
this.activeLocks.forEach(key => this.lock.releaseLock(key));
|
|
@@ -882,8 +1012,8 @@
|
|
|
882
1012
|
}
|
|
883
1013
|
}
|
|
884
1014
|
function isWebLocksSupported() {
|
|
885
|
-
var
|
|
886
|
-
return typeof navigator !== "undefined" && typeof ((
|
|
1015
|
+
var _navigator$locks;
|
|
1016
|
+
return typeof navigator !== "undefined" && typeof ((_navigator$locks = navigator.locks) === null || _navigator$locks === void 0 ? void 0 : _navigator$locks.request) === "function";
|
|
887
1017
|
}
|
|
888
1018
|
function createLockManager() {
|
|
889
1019
|
return isWebLocksSupported() ? new WebLocksApiManager : new LegacyLockManager;
|
|
@@ -1217,6 +1347,7 @@
|
|
|
1217
1347
|
};
|
|
1218
1348
|
to.postMessage(message, [ messageChannel.port2 ]);
|
|
1219
1349
|
});
|
|
1350
|
+
const _excluded$4 = [ "error", "error_description" ];
|
|
1220
1351
|
const createAbortController = () => new AbortController;
|
|
1221
1352
|
const dofetch = async (fetchUrl, fetchOptions) => {
|
|
1222
1353
|
const response = await fetch(fetchUrl, fetchOptions);
|
|
@@ -1266,7 +1397,7 @@
|
|
|
1266
1397
|
method: options.method || "GET",
|
|
1267
1398
|
nonce: await dpop.getNonce()
|
|
1268
1399
|
});
|
|
1269
|
-
options.headers =
|
|
1400
|
+
options.headers = _objectSpread2(_objectSpread2({}, options.headers), {}, {
|
|
1270
1401
|
dpop: dpopProof
|
|
1271
1402
|
});
|
|
1272
1403
|
}
|
|
@@ -1284,7 +1415,7 @@
|
|
|
1284
1415
|
if (fetchError) {
|
|
1285
1416
|
throw fetchError;
|
|
1286
1417
|
}
|
|
1287
|
-
const
|
|
1418
|
+
const {json: {error: error, error_description: error_description}, headers: headers, ok: ok} = response, data = _objectWithoutProperties(response.json, _excluded$4);
|
|
1288
1419
|
let newDpopNonce;
|
|
1289
1420
|
if (dpop) {
|
|
1290
1421
|
newDpopNonce = headers[DPOP_NONCE_HEADER];
|
|
@@ -1310,11 +1441,12 @@
|
|
|
1310
1441
|
}
|
|
1311
1442
|
return data;
|
|
1312
1443
|
}
|
|
1313
|
-
|
|
1314
|
-
|
|
1444
|
+
const _excluded$3 = [ "baseUrl", "timeout", "audience", "scope", "auth0Client", "useFormData", "useMrrt", "dpop" ];
|
|
1445
|
+
async function oauthToken(_ref, worker) {
|
|
1446
|
+
let {baseUrl: baseUrl, timeout: timeout, audience: audience, scope: scope, auth0Client: auth0Client, useFormData: useFormData, useMrrt: useMrrt, dpop: dpop} = _ref, options = _objectWithoutProperties(_ref, _excluded$3);
|
|
1315
1447
|
const isTokenExchange = options.grant_type === "urn:ietf:params:oauth:grant-type:token-exchange";
|
|
1316
1448
|
const refreshWithMrrt = options.grant_type === "refresh_token" && useMrrt;
|
|
1317
|
-
const allParams =
|
|
1449
|
+
const allParams = _objectSpread2(_objectSpread2(_objectSpread2(_objectSpread2({}, options), isTokenExchange && audience && {
|
|
1318
1450
|
audience: audience
|
|
1319
1451
|
}), isTokenExchange && scope && {
|
|
1320
1452
|
scope: scope
|
|
@@ -1376,6 +1508,9 @@
|
|
|
1376
1508
|
let suffix = arguments.length > 2 ? arguments[2] : undefined;
|
|
1377
1509
|
this.prefix = prefix;
|
|
1378
1510
|
this.suffix = suffix;
|
|
1511
|
+
_defineProperty(this, "clientId", void 0);
|
|
1512
|
+
_defineProperty(this, "scope", void 0);
|
|
1513
|
+
_defineProperty(this, "audience", void 0);
|
|
1379
1514
|
this.clientId = data.clientId;
|
|
1380
1515
|
this.scope = data.scope;
|
|
1381
1516
|
this.audience = data.audience;
|
|
@@ -1423,7 +1558,7 @@
|
|
|
1423
1558
|
}
|
|
1424
1559
|
class InMemoryCache {
|
|
1425
1560
|
constructor() {
|
|
1426
|
-
this
|
|
1561
|
+
_defineProperty(this, "enclosedCache", function() {
|
|
1427
1562
|
let cache = {};
|
|
1428
1563
|
return {
|
|
1429
1564
|
set(key, entry) {
|
|
@@ -1443,7 +1578,7 @@
|
|
|
1443
1578
|
return Object.keys(cache);
|
|
1444
1579
|
}
|
|
1445
1580
|
};
|
|
1446
|
-
}();
|
|
1581
|
+
}());
|
|
1447
1582
|
}
|
|
1448
1583
|
}
|
|
1449
1584
|
const DEFAULT_EXPIRY_ADJUSTMENT_SECONDS = 0;
|
|
@@ -1451,16 +1586,17 @@
|
|
|
1451
1586
|
constructor(cache, keyManifest, nowProvider) {
|
|
1452
1587
|
this.cache = cache;
|
|
1453
1588
|
this.keyManifest = keyManifest;
|
|
1589
|
+
_defineProperty(this, "nowProvider", void 0);
|
|
1454
1590
|
this.nowProvider = nowProvider || DEFAULT_NOW_PROVIDER;
|
|
1455
1591
|
}
|
|
1456
1592
|
async setIdToken(clientId, idToken, decodedToken) {
|
|
1457
|
-
var
|
|
1593
|
+
var _this$keyManifest;
|
|
1458
1594
|
const cacheKey = this.getIdTokenCacheKey(clientId);
|
|
1459
1595
|
await this.cache.set(cacheKey, {
|
|
1460
1596
|
id_token: idToken,
|
|
1461
1597
|
decodedToken: decodedToken
|
|
1462
1598
|
});
|
|
1463
|
-
await ((
|
|
1599
|
+
await ((_this$keyManifest = this.keyManifest) === null || _this$keyManifest === void 0 ? void 0 : _this$keyManifest.add(cacheKey));
|
|
1464
1600
|
}
|
|
1465
1601
|
async getIdToken(cacheKey) {
|
|
1466
1602
|
const entry = await this.cache.get(this.getIdTokenCacheKey(cacheKey.clientId));
|
|
@@ -1489,7 +1625,6 @@
|
|
|
1489
1625
|
let expiryAdjustmentSeconds = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : DEFAULT_EXPIRY_ADJUSTMENT_SECONDS;
|
|
1490
1626
|
let useMrrt = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : false;
|
|
1491
1627
|
let cacheMode = arguments.length > 3 ? arguments[3] : undefined;
|
|
1492
|
-
var _a;
|
|
1493
1628
|
let wrappedEntry = await this.cache.get(cacheKey.toKey());
|
|
1494
1629
|
if (!wrappedEntry) {
|
|
1495
1630
|
const keys = await this.getCacheKeys();
|
|
@@ -1508,11 +1643,12 @@
|
|
|
1508
1643
|
const now = await this.nowProvider();
|
|
1509
1644
|
const nowSeconds = Math.floor(now / 1e3);
|
|
1510
1645
|
if (wrappedEntry.expiresAt - expiryAdjustmentSeconds < nowSeconds) {
|
|
1646
|
+
var _this$keyManifest2;
|
|
1511
1647
|
if (wrappedEntry.body.refresh_token) {
|
|
1512
1648
|
return this.modifiedCachedEntry(wrappedEntry, cacheKey);
|
|
1513
1649
|
}
|
|
1514
1650
|
await this.cache.remove(cacheKey.toKey());
|
|
1515
|
-
await ((
|
|
1651
|
+
await ((_this$keyManifest2 = this.keyManifest) === null || _this$keyManifest2 === void 0 ? void 0 : _this$keyManifest2.remove(cacheKey.toKey()));
|
|
1516
1652
|
return;
|
|
1517
1653
|
}
|
|
1518
1654
|
return wrappedEntry.body;
|
|
@@ -1531,7 +1667,7 @@
|
|
|
1531
1667
|
};
|
|
1532
1668
|
}
|
|
1533
1669
|
async set(entry) {
|
|
1534
|
-
var
|
|
1670
|
+
var _this$keyManifest3;
|
|
1535
1671
|
const cacheKey = new CacheKey({
|
|
1536
1672
|
clientId: entry.client_id,
|
|
1537
1673
|
scope: entry.scope,
|
|
@@ -1539,7 +1675,7 @@
|
|
|
1539
1675
|
});
|
|
1540
1676
|
const wrappedEntry = await this.wrapCacheEntry(entry);
|
|
1541
1677
|
await this.cache.set(cacheKey.toKey(), wrappedEntry);
|
|
1542
|
-
await ((
|
|
1678
|
+
await ((_this$keyManifest3 = this.keyManifest) === null || _this$keyManifest3 === void 0 ? void 0 : _this$keyManifest3.add(cacheKey.toKey()));
|
|
1543
1679
|
}
|
|
1544
1680
|
async remove(client_id, audience, scope) {
|
|
1545
1681
|
const cacheKey = new CacheKey({
|
|
@@ -1550,14 +1686,14 @@
|
|
|
1550
1686
|
await this.cache.remove(cacheKey.toKey());
|
|
1551
1687
|
}
|
|
1552
1688
|
async clear(clientId) {
|
|
1553
|
-
var
|
|
1689
|
+
var _this$keyManifest4;
|
|
1554
1690
|
const keys = await this.getCacheKeys();
|
|
1555
1691
|
if (!keys) return;
|
|
1556
1692
|
await keys.filter(key => clientId ? key.includes(clientId) : true).reduce(async (memo, key) => {
|
|
1557
1693
|
await memo;
|
|
1558
1694
|
await this.cache.remove(key);
|
|
1559
1695
|
}, Promise.resolve());
|
|
1560
|
-
await ((
|
|
1696
|
+
await ((_this$keyManifest4 = this.keyManifest) === null || _this$keyManifest4 === void 0 ? void 0 : _this$keyManifest4.clear());
|
|
1561
1697
|
}
|
|
1562
1698
|
async wrapCacheEntry(entry) {
|
|
1563
1699
|
const now = await this.nowProvider();
|
|
@@ -1568,9 +1704,9 @@
|
|
|
1568
1704
|
};
|
|
1569
1705
|
}
|
|
1570
1706
|
async getCacheKeys() {
|
|
1571
|
-
var _a;
|
|
1572
1707
|
if (this.keyManifest) {
|
|
1573
|
-
|
|
1708
|
+
var _await$this$keyManife;
|
|
1709
|
+
return (_await$this$keyManife = await this.keyManifest.get()) === null || _await$this$keyManife === void 0 ? void 0 : _await$this$keyManife.keys;
|
|
1574
1710
|
} else if (this.cache.allKeys) {
|
|
1575
1711
|
return this.cache.allKeys();
|
|
1576
1712
|
}
|
|
@@ -1582,21 +1718,21 @@
|
|
|
1582
1718
|
}
|
|
1583
1719
|
matchExistingCacheKey(keyToMatch, allKeys) {
|
|
1584
1720
|
return allKeys.filter(key => {
|
|
1585
|
-
var
|
|
1721
|
+
var _keyToMatch$scope;
|
|
1586
1722
|
const cacheKey = CacheKey.fromKey(key);
|
|
1587
1723
|
const scopeSet = new Set(cacheKey.scope && cacheKey.scope.split(" "));
|
|
1588
|
-
const scopesToMatch = ((
|
|
1724
|
+
const scopesToMatch = ((_keyToMatch$scope = keyToMatch.scope) === null || _keyToMatch$scope === void 0 ? void 0 : _keyToMatch$scope.split(" ")) || [];
|
|
1589
1725
|
const hasAllScopes = cacheKey.scope && scopesToMatch.reduce((acc, current) => acc && scopeSet.has(current), true);
|
|
1590
1726
|
return cacheKey.prefix === CACHE_KEY_PREFIX && cacheKey.clientId === keyToMatch.clientId && cacheKey.audience === keyToMatch.audience && hasAllScopes;
|
|
1591
1727
|
})[0];
|
|
1592
1728
|
}
|
|
1593
1729
|
async getEntryWithRefreshToken(keyToMatch, allKeys) {
|
|
1594
|
-
var _a;
|
|
1595
1730
|
for (const key of allKeys) {
|
|
1596
1731
|
const cacheKey = CacheKey.fromKey(key);
|
|
1597
1732
|
if (cacheKey.prefix === CACHE_KEY_PREFIX && cacheKey.clientId === keyToMatch.clientId) {
|
|
1733
|
+
var _cachedEntry$body;
|
|
1598
1734
|
const cachedEntry = await this.cache.get(key);
|
|
1599
|
-
if (
|
|
1735
|
+
if (cachedEntry !== null && cachedEntry !== void 0 && (_cachedEntry$body = cachedEntry.body) !== null && _cachedEntry$body !== void 0 && _cachedEntry$body.refresh_token) {
|
|
1600
1736
|
return this.modifiedCachedEntry(cachedEntry, keyToMatch);
|
|
1601
1737
|
}
|
|
1602
1738
|
}
|
|
@@ -1604,12 +1740,12 @@
|
|
|
1604
1740
|
return undefined;
|
|
1605
1741
|
}
|
|
1606
1742
|
async updateEntry(oldRefreshToken, newRefreshToken) {
|
|
1607
|
-
var _a;
|
|
1608
1743
|
const allKeys = await this.getCacheKeys();
|
|
1609
1744
|
if (!allKeys) return;
|
|
1610
1745
|
for (const key of allKeys) {
|
|
1746
|
+
var _entry$body;
|
|
1611
1747
|
const entry = await this.cache.get(key);
|
|
1612
|
-
if ((
|
|
1748
|
+
if ((entry === null || entry === void 0 || (_entry$body = entry.body) === null || _entry$body === void 0 ? void 0 : _entry$body.refresh_token) === oldRefreshToken) {
|
|
1613
1749
|
entry.body.refresh_token = newRefreshToken;
|
|
1614
1750
|
await this.cache.set(key, entry);
|
|
1615
1751
|
}
|
|
@@ -1622,6 +1758,7 @@
|
|
|
1622
1758
|
this.storage = storage;
|
|
1623
1759
|
this.clientId = clientId;
|
|
1624
1760
|
this.cookieDomain = cookieDomain;
|
|
1761
|
+
_defineProperty(this, "storageKey", void 0);
|
|
1625
1762
|
this.storageKey = "".concat(TRANSACTION_STORAGE_KEY_PREFIX, ".").concat(this.clientId);
|
|
1626
1763
|
}
|
|
1627
1764
|
create(transaction) {
|
|
@@ -1845,17 +1982,17 @@
|
|
|
1845
1982
|
sameSite: "none"
|
|
1846
1983
|
};
|
|
1847
1984
|
}
|
|
1848
|
-
if (options
|
|
1985
|
+
if (options !== null && options !== void 0 && options.daysUntilExpire) {
|
|
1849
1986
|
cookieAttributes.expires = options.daysUntilExpire;
|
|
1850
1987
|
}
|
|
1851
|
-
if (options
|
|
1988
|
+
if (options !== null && options !== void 0 && options.cookieDomain) {
|
|
1852
1989
|
cookieAttributes.domain = options.cookieDomain;
|
|
1853
1990
|
}
|
|
1854
1991
|
set_1(key, JSON.stringify(value), cookieAttributes);
|
|
1855
1992
|
},
|
|
1856
1993
|
remove(key, options) {
|
|
1857
1994
|
let cookieAttributes = {};
|
|
1858
|
-
if (options
|
|
1995
|
+
if (options !== null && options !== void 0 && options.cookieDomain) {
|
|
1859
1996
|
cookieAttributes.domain = options.cookieDomain;
|
|
1860
1997
|
}
|
|
1861
1998
|
remove_1(key, cookieAttributes);
|
|
@@ -1877,10 +2014,10 @@
|
|
|
1877
2014
|
secure: true
|
|
1878
2015
|
};
|
|
1879
2016
|
}
|
|
1880
|
-
if (options
|
|
2017
|
+
if (options !== null && options !== void 0 && options.daysUntilExpire) {
|
|
1881
2018
|
cookieAttributes.expires = options.daysUntilExpire;
|
|
1882
2019
|
}
|
|
1883
|
-
if (options
|
|
2020
|
+
if (options !== null && options !== void 0 && options.cookieDomain) {
|
|
1884
2021
|
cookieAttributes.domain = options.cookieDomain;
|
|
1885
2022
|
}
|
|
1886
2023
|
set_1("".concat(LEGACY_PREFIX).concat(key), JSON.stringify(value), cookieAttributes);
|
|
@@ -1888,7 +2025,7 @@
|
|
|
1888
2025
|
},
|
|
1889
2026
|
remove(key, options) {
|
|
1890
2027
|
let cookieAttributes = {};
|
|
1891
|
-
if (options
|
|
2028
|
+
if (options !== null && options !== void 0 && options.cookieDomain) {
|
|
1892
2029
|
cookieAttributes.domain = options.cookieDomain;
|
|
1893
2030
|
}
|
|
1894
2031
|
remove_1(key, cookieAttributes);
|
|
@@ -1914,12 +2051,35 @@
|
|
|
1914
2051
|
sessionStorage.removeItem(key);
|
|
1915
2052
|
}
|
|
1916
2053
|
};
|
|
1917
|
-
|
|
1918
|
-
(function(ResponseType) {
|
|
2054
|
+
let ResponseType = function(ResponseType) {
|
|
1919
2055
|
ResponseType["Code"] = "code";
|
|
1920
2056
|
ResponseType["ConnectCode"] = "connect_code";
|
|
1921
|
-
|
|
1922
|
-
|
|
2057
|
+
return ResponseType;
|
|
2058
|
+
}({});
|
|
2059
|
+
class User {
|
|
2060
|
+
constructor() {
|
|
2061
|
+
_defineProperty(this, "name", void 0);
|
|
2062
|
+
_defineProperty(this, "given_name", void 0);
|
|
2063
|
+
_defineProperty(this, "family_name", void 0);
|
|
2064
|
+
_defineProperty(this, "middle_name", void 0);
|
|
2065
|
+
_defineProperty(this, "nickname", void 0);
|
|
2066
|
+
_defineProperty(this, "preferred_username", void 0);
|
|
2067
|
+
_defineProperty(this, "profile", void 0);
|
|
2068
|
+
_defineProperty(this, "picture", void 0);
|
|
2069
|
+
_defineProperty(this, "website", void 0);
|
|
2070
|
+
_defineProperty(this, "email", void 0);
|
|
2071
|
+
_defineProperty(this, "email_verified", void 0);
|
|
2072
|
+
_defineProperty(this, "gender", void 0);
|
|
2073
|
+
_defineProperty(this, "birthdate", void 0);
|
|
2074
|
+
_defineProperty(this, "zoneinfo", void 0);
|
|
2075
|
+
_defineProperty(this, "locale", void 0);
|
|
2076
|
+
_defineProperty(this, "phone_number", void 0);
|
|
2077
|
+
_defineProperty(this, "phone_number_verified", void 0);
|
|
2078
|
+
_defineProperty(this, "address", void 0);
|
|
2079
|
+
_defineProperty(this, "updated_at", void 0);
|
|
2080
|
+
_defineProperty(this, "sub", void 0);
|
|
2081
|
+
}
|
|
2082
|
+
}
|
|
1923
2083
|
function decodeBase64$1(base64, enableUnicode) {
|
|
1924
2084
|
var binaryString = atob(base64);
|
|
1925
2085
|
if (enableUnicode) {
|
|
@@ -1949,7 +2109,7 @@
|
|
|
1949
2109
|
return new Worker(url, options);
|
|
1950
2110
|
};
|
|
1951
2111
|
}
|
|
1952
|
-
var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    function __rest(s, e) {
        var t = {};
        for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0) t[p] = s[p];
        if (s != null && typeof Object.getOwnPropertySymbols === "function") for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {
            if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i])) t[p[i]] = s[p[i]];
        }
        return t;
    }
    typeof SuppressedError === "function" ? SuppressedError : function(error, suppressed, message) {
        var e = new Error(message);
        return e.name = "SuppressedError", e.error = error, e.suppressed = suppressed, e;
    };
    const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => Object.assign(Object.assign({}, acc), {
        [key]: params[key]
    }), {});
    const createQueryParams = _a => {
        var {clientId: client_id} = _a, params = __rest(_a, [ "clientId" ]);
        return new URLSearchParams(stripUndefined(Object.assign({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref) => {
        let [key, val] = _ref;
        obj[key] = val;
        return obj;
    }, {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise(resolve => setTimeout(resolve, time));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach((val, key) => {
            parsedQuery[key] = val;
        });
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach(_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        });
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find(key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every(key => scopesKey.includes(key));
                return isSameAudience && scopesAreIncluded;
            }
        });
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                })) : JSON.stringify(Object.assign(Object.assign({}, body), {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, Object.assign({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
|
|
2112
|
+
var WorkerFactory = createBase64WorkerFactory("/* rollup-plugin-web-worker-loader */
(function() {
    "use strict";
    function _defineProperty(e, r, t) {
        return (r = _toPropertyKey(r)) in e ? Object.defineProperty(e, r, {
            value: t,
            enumerable: !0,
            configurable: !0,
            writable: !0
        }) : e[r] = t, e;
    }
    function ownKeys(e, r) {
        var t = Object.keys(e);
        if (Object.getOwnPropertySymbols) {
            var o = Object.getOwnPropertySymbols(e);
            r && (o = o.filter(function(r) {
                return Object.getOwnPropertyDescriptor(e, r).enumerable;
            })), t.push.apply(t, o);
        }
        return t;
    }
    function _objectSpread2(e) {
        for (var r = 1; r < arguments.length; r++) {
            var t = null != arguments[r] ? arguments[r] : {};
            r % 2 ? ownKeys(Object(t), !0).forEach(function(r) {
                _defineProperty(e, r, t[r]);
            }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function(r) {
                Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r));
            });
        }
        return e;
    }
    function _objectWithoutProperties(e, t) {
        if (null == e) return {};
        var o, r, i = _objectWithoutPropertiesLoose(e, t);
        if (Object.getOwnPropertySymbols) {
            var n = Object.getOwnPropertySymbols(e);
            for (r = 0; r < n.length; r++) o = n[r], -1 === t.indexOf(o) && {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]);
        }
        return i;
    }
    function _objectWithoutPropertiesLoose(r, e) {
        if (null == r) return {};
        var t = {};
        for (var n in r) if ({}.hasOwnProperty.call(r, n)) {
            if (-1 !== e.indexOf(n)) continue;
            t[n] = r[n];
        }
        return t;
    }
    function _toPrimitive(t, r) {
        if ("object" != typeof t || !t) return t;
        var e = t[Symbol.toPrimitive];
        if (void 0 !== e) {
            var i = e.call(t, r || "default");
            if ("object" != typeof i) return i;
            throw new TypeError("@@toPrimitive must return a primitive value.");
        }
        return ("string" === r ? String : Number)(t);
    }
    function _toPropertyKey(t) {
        var i = _toPrimitive(t, "string");
        return "symbol" == typeof i ? i : i + "";
    }
    class GenericError extends Error {
        constructor(error, error_description) {
            super(error_description);
            this.error = error;
            this.error_description = error_description;
            Object.setPrototypeOf(this, GenericError.prototype);
        }
        static fromPayload(_ref) {
            let {error: error, error_description: error_description} = _ref;
            return new GenericError(error, error_description);
        }
    }
    class MissingRefreshTokenError extends GenericError {
        constructor(audience, scope) {
            super("missing_refresh_token", "Missing Refresh Token (audience: '".concat(valueOrEmptyString(audience, [ "default" ]), "', scope: '").concat(valueOrEmptyString(scope), "')"));
            this.audience = audience;
            this.scope = scope;
            Object.setPrototypeOf(this, MissingRefreshTokenError.prototype);
        }
    }
    function valueOrEmptyString(value) {
        let exclude = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : [];
        return value && !exclude.includes(value) ? value : "";
    }
    const _excluded = [ "clientId" ];
    const stripUndefined = params => Object.keys(params).filter(k => typeof params[k] !== "undefined").reduce((acc, key) => _objectSpread2(_objectSpread2({}, acc), {}, {
        [key]: params[key]
    }), {});
    const createQueryParams = _ref => {
        let {clientId: client_id} = _ref, params = _objectWithoutProperties(_ref, _excluded);
        return new URLSearchParams(stripUndefined(_objectSpread2({
            client_id: client_id
        }, params))).toString();
    };
    const fromEntries = iterable => [ ...iterable ].reduce((obj, _ref2) => {
        let [key, val] = _ref2;
        obj[key] = val;
        return obj;
    }, {});
    let refreshTokens = {};
    const cacheKey = (audience, scope) => "".concat(audience, "|").concat(scope);
    const cacheKeyContainsAudience = (audience, cacheKey) => cacheKey.startsWith("".concat(audience, "|"));
    const getRefreshToken = (audience, scope) => refreshTokens[cacheKey(audience, scope)];
    const setRefreshToken = (refreshToken, audience, scope) => refreshTokens[cacheKey(audience, scope)] = refreshToken;
    const deleteRefreshToken = (audience, scope) => delete refreshTokens[cacheKey(audience, scope)];
    const wait = time => new Promise(resolve => setTimeout(resolve, time));
    const formDataToObject = formData => {
        const queryParams = new URLSearchParams(formData);
        const parsedQuery = {};
        queryParams.forEach((val, key) => {
            parsedQuery[key] = val;
        });
        return parsedQuery;
    };
    const updateRefreshTokens = (oldRefreshToken, newRefreshToken) => {
        Object.entries(refreshTokens).forEach(_ref => {
            let [key, token] = _ref;
            if (token === oldRefreshToken) {
                refreshTokens[key] = newRefreshToken;
            }
        });
    };
    const checkDownscoping = (scope, audience) => {
        const findCoincidence = Object.keys(refreshTokens).find(key => {
            if (key !== "latest_refresh_token") {
                const isSameAudience = cacheKeyContainsAudience(audience, key);
                const scopesKey = key.split("|")[1].split(" ");
                const requestedScopes = scope.split(" ");
                const scopesAreIncluded = requestedScopes.every(key => scopesKey.includes(key));
                return isSameAudience && scopesAreIncluded;
            }
        });
        return findCoincidence ? true : false;
    };
    const messageHandler = async _ref2 => {
        let {data: {timeout: timeout, auth: auth, fetchUrl: fetchUrl, fetchOptions: fetchOptions, useFormData: useFormData, useMrrt: useMrrt}, ports: [port]} = _ref2;
        let headers = {};
        let json;
        let refreshToken;
        const {audience: audience, scope: scope} = auth || {};
        try {
            const body = useFormData ? formDataToObject(fetchOptions.body) : JSON.parse(fetchOptions.body);
            if (!body.refresh_token && body.grant_type === "refresh_token") {
                refreshToken = getRefreshToken(audience, scope);
                if (!refreshToken && useMrrt) {
                    const latestRefreshToken = refreshTokens["latest_refresh_token"];
                    const isDownscoping = checkDownscoping(scope, audience);
                    if (latestRefreshToken && !isDownscoping) {
                        refreshToken = latestRefreshToken;
                    }
                }
                if (!refreshToken) {
                    throw new MissingRefreshTokenError(audience, scope);
                }
                fetchOptions.body = useFormData ? createQueryParams(_objectSpread2(_objectSpread2({}, body), {}, {
                    refresh_token: refreshToken
                })) : JSON.stringify(_objectSpread2(_objectSpread2({}, body), {}, {
                    refresh_token: refreshToken
                }));
            }
            let abortController;
            if (typeof AbortController === "function") {
                abortController = new AbortController;
                fetchOptions.signal = abortController.signal;
            }
            let response;
            try {
                response = await Promise.race([ wait(timeout), fetch(fetchUrl, _objectSpread2({}, fetchOptions)) ]);
            } catch (error) {
                port.postMessage({
                    error: error.message
                });
                return;
            }
            if (!response) {
                if (abortController) abortController.abort();
                port.postMessage({
                    error: "Timeout when executing 'fetch'"
                });
                return;
            }
            headers = fromEntries(response.headers);
            json = await response.json();
            if (json.refresh_token) {
                if (useMrrt) {
                    refreshTokens["latest_refresh_token"] = json.refresh_token;
                    updateRefreshTokens(refreshToken, json.refresh_token);
                }
                setRefreshToken(json.refresh_token, audience, scope);
                delete json.refresh_token;
            } else {
                deleteRefreshToken(audience, scope);
            }
            port.postMessage({
                ok: response.ok,
                json: json,
                headers: headers
            });
        } catch (error) {
            port.postMessage({
                ok: false,
                json: {
                    error: error.error,
                    error_description: error.message
                },
                headers: headers
            });
        }
    };
    {
        addEventListener("message", messageHandler);
    }
})();

", null, false);
|
|
1953
2113
|
const singlePromiseMap = {};
|
|
1954
2114
|
const singlePromise = (cb, key) => {
|
|
1955
2115
|
let promise = singlePromiseMap[key];
|
|
@@ -1966,11 +2126,12 @@
|
|
|
1966
2126
|
constructor(cache, clientId) {
|
|
1967
2127
|
this.cache = cache;
|
|
1968
2128
|
this.clientId = clientId;
|
|
2129
|
+
_defineProperty(this, "manifestKey", void 0);
|
|
1969
2130
|
this.manifestKey = this.createManifestKeyFrom(this.clientId);
|
|
1970
2131
|
}
|
|
1971
2132
|
async add(key) {
|
|
1972
|
-
var
|
|
1973
|
-
const keys = new Set(((
|
|
2133
|
+
var _await$this$cache$get;
|
|
2134
|
+
const keys = new Set(((_await$this$cache$get = await this.cache.get(this.manifestKey)) === null || _await$this$cache$get === void 0 ? void 0 : _await$this$cache$get.keys) || []);
|
|
1974
2135
|
keys.add(key);
|
|
1975
2136
|
await this.cache.set(this.manifestKey, {
|
|
1976
2137
|
keys: [ ...keys ]
|
|
@@ -1999,6 +2160,7 @@
|
|
|
1999
2160
|
return "".concat(CACHE_KEY_PREFIX, "::").concat(clientId);
|
|
2000
2161
|
}
|
|
2001
2162
|
}
|
|
2163
|
+
const _excluded$2 = [ "openUrl", "onRedirect" ];
|
|
2002
2164
|
const GET_TOKEN_SILENTLY_LOCK_KEY = "auth0.lock.getTokenSilently";
|
|
2003
2165
|
const GET_TOKEN_FROM_IFRAME_LOCK_KEY = "auth0.lock.getTokenFromIFrame";
|
|
2004
2166
|
const buildGetTokenSilentlyLockKey = (clientId, audience) => "".concat(GET_TOKEN_SILENTLY_LOCK_KEY, ".").concat(clientId, ".").concat(audience);
|
|
@@ -2011,9 +2173,9 @@
|
|
|
2011
2173
|
localstorage: () => new LocalStorageCache
|
|
2012
2174
|
};
|
|
2013
2175
|
const cacheFactory = location => cacheLocationBuilders[location];
|
|
2014
|
-
const getAuthorizeParams = (clientOptions, scope, authorizationParams, state, nonce, code_challenge, redirect_uri, response_mode, thumbprint) =>
|
|
2176
|
+
const getAuthorizeParams = (clientOptions, scope, authorizationParams, state, nonce, code_challenge, redirect_uri, response_mode, thumbprint) => _objectSpread2(_objectSpread2(_objectSpread2({
|
|
2015
2177
|
client_id: clientOptions.clientId
|
|
2016
|
-
}, clientOptions.authorizationParams), authorizationParams), {
|
|
2178
|
+
}, clientOptions.authorizationParams), authorizationParams), {}, {
|
|
2017
2179
|
scope: scopesToRequest(scope, authorizationParams.scope, authorizationParams.audience),
|
|
2018
2180
|
response_type: "code",
|
|
2019
2181
|
response_mode: response_mode || "query",
|
|
@@ -2025,8 +2187,8 @@
|
|
|
2025
2187
|
dpop_jkt: thumbprint
|
|
2026
2188
|
});
|
|
2027
2189
|
const patchOpenUrlWithOnRedirect = options => {
|
|
2028
|
-
const {openUrl: openUrl, onRedirect: onRedirect} = options, originalOptions =
|
|
2029
|
-
const result =
|
|
2190
|
+
const {openUrl: openUrl, onRedirect: onRedirect} = options, originalOptions = _objectWithoutProperties(options, _excluded$2);
|
|
2191
|
+
const result = _objectSpread2(_objectSpread2({}, originalOptions), {}, {
|
|
2030
2192
|
openUrl: openUrl === false || openUrl ? openUrl : onRedirect
|
|
2031
2193
|
});
|
|
2032
2194
|
return result;
|
|
@@ -2043,13 +2205,13 @@
|
|
|
2043
2205
|
return missingScopes.join(",");
|
|
2044
2206
|
};
|
|
2045
2207
|
const getScopeToRequest = (useMrrt, authorizationParams, cachedAudience, cachedScope) => {
|
|
2046
|
-
var _a;
|
|
2047
2208
|
if (useMrrt && cachedAudience && cachedScope) {
|
|
2209
|
+
var _authorizationParams$;
|
|
2048
2210
|
if (authorizationParams.audience !== cachedAudience) {
|
|
2049
2211
|
return authorizationParams.scope;
|
|
2050
2212
|
}
|
|
2051
2213
|
const cachedScopes = cachedScope.split(" ");
|
|
2052
|
-
const newScopes = ((
|
|
2214
|
+
const newScopes = ((_authorizationParams$ = authorizationParams.scope) === null || _authorizationParams$ === void 0 ? void 0 : _authorizationParams$.split(" ")) || [];
|
|
2053
2215
|
const newScopesAreIncluded = newScopes.every(scope => cachedScopes.includes(scope));
|
|
2054
2216
|
return cachedScopes.length >= newScopes.length && newScopesAreIncluded ? cachedScope : authorizationParams.scope;
|
|
2055
2217
|
}
|
|
@@ -2070,6 +2232,8 @@
|
|
|
2070
2232
|
const AUTH0_NONCE_ID = "auth0";
|
|
2071
2233
|
class DpopStorage {
|
|
2072
2234
|
constructor(clientId) {
|
|
2235
|
+
_defineProperty(this, "clientId", void 0);
|
|
2236
|
+
_defineProperty(this, "dbHandle", void 0);
|
|
2073
2237
|
this.clientId = clientId;
|
|
2074
2238
|
}
|
|
2075
2239
|
getVersion() {
|
|
@@ -2123,7 +2287,7 @@
|
|
|
2123
2287
|
}
|
|
2124
2288
|
async deleteBy(table, predicate) {
|
|
2125
2289
|
const allKeys = await this.executeDbRequest(table, "readonly", table => table.getAllKeys());
|
|
2126
|
-
allKeys === null || allKeys === void 0
|
|
2290
|
+
allKeys === null || allKeys === void 0 || allKeys.filter(predicate).map(k => this.executeDbRequest(table, "readwrite", table => table.delete(k)));
|
|
2127
2291
|
}
|
|
2128
2292
|
deleteByClientId(table, clientId) {
|
|
2129
2293
|
return this.deleteBy(table, k => typeof k === "string" && k.startsWith("".concat(clientId, "::")));
|
|
@@ -2137,6 +2301,7 @@
|
|
|
2137
2301
|
}
|
|
2138
2302
|
class Dpop {
|
|
2139
2303
|
constructor(clientId) {
|
|
2304
|
+
_defineProperty(this, "storage", void 0);
|
|
2140
2305
|
this.storage = new DpopStorage(clientId);
|
|
2141
2306
|
}
|
|
2142
2307
|
getNonce(id) {
|
|
@@ -2155,7 +2320,7 @@
|
|
|
2155
2320
|
}
|
|
2156
2321
|
async generateProof(params) {
|
|
2157
2322
|
const keyPair = await this.getOrGenerateKeyPair();
|
|
2158
|
-
return generateProof(
|
|
2323
|
+
return generateProof(_objectSpread2({
|
|
2159
2324
|
keyPair: keyPair
|
|
2160
2325
|
}, params));
|
|
2161
2326
|
}
|
|
@@ -2167,15 +2332,17 @@
|
|
|
2167
2332
|
await Promise.all([ this.storage.clearNonces(), this.storage.clearKeyPairs() ]);
|
|
2168
2333
|
}
|
|
2169
2334
|
}
|
|
2170
|
-
var TokenType
|
|
2171
|
-
(function(TokenType) {
|
|
2335
|
+
var TokenType = function(TokenType) {
|
|
2172
2336
|
TokenType["Bearer"] = "Bearer";
|
|
2173
2337
|
TokenType["DPoP"] = "DPoP";
|
|
2174
|
-
|
|
2338
|
+
return TokenType;
|
|
2339
|
+
}(TokenType || {});
|
|
2175
2340
|
class Fetcher {
|
|
2176
2341
|
constructor(config, hooks) {
|
|
2342
|
+
_defineProperty(this, "config", void 0);
|
|
2343
|
+
_defineProperty(this, "hooks", void 0);
|
|
2177
2344
|
this.hooks = hooks;
|
|
2178
|
-
this.config =
|
|
2345
|
+
this.config = _objectSpread2(_objectSpread2({}, config), {}, {
|
|
2179
2346
|
fetch: config.fetch || (typeof window === "undefined" ? fetch : window.fetch.bind(window))
|
|
2180
2347
|
});
|
|
2181
2348
|
}
|
|
@@ -2283,7 +2450,7 @@
|
|
|
2283
2450
|
}
|
|
2284
2451
|
fetchWithAuth(info, init, authParams) {
|
|
2285
2452
|
const callbacks = {
|
|
2286
|
-
onUseDpopNonceError: () => this.internalFetchWithAuth(info, init,
|
|
2453
|
+
onUseDpopNonceError: () => this.internalFetchWithAuth(info, init, _objectSpread2(_objectSpread2({}, callbacks), {}, {
|
|
2287
2454
|
onUseDpopNonceError: undefined
|
|
2288
2455
|
}), authParams)
|
|
2289
2456
|
};
|
|
@@ -2339,6 +2506,11 @@
|
|
|
2339
2506
|
constructor(_ref) {
|
|
2340
2507
|
let {type: type, status: status, title: title, detail: detail, validation_errors: validation_errors} = _ref;
|
|
2341
2508
|
super(detail);
|
|
2509
|
+
_defineProperty(this, "type", void 0);
|
|
2510
|
+
_defineProperty(this, "status", void 0);
|
|
2511
|
+
_defineProperty(this, "title", void 0);
|
|
2512
|
+
_defineProperty(this, "detail", void 0);
|
|
2513
|
+
_defineProperty(this, "validation_errors", void 0);
|
|
2342
2514
|
this.name = "MyAccountApiError";
|
|
2343
2515
|
this.type = type;
|
|
2344
2516
|
this.status = status;
|
|
@@ -2376,7 +2548,7 @@
|
|
|
2376
2548
|
};
|
|
2377
2549
|
function getAuthJsEnrollParams(params) {
|
|
2378
2550
|
const mapping = FACTOR_MAPPING[params.factorType];
|
|
2379
|
-
return
|
|
2551
|
+
return _objectSpread2(_objectSpread2(_objectSpread2({
|
|
2380
2552
|
mfaToken: params.mfaToken,
|
|
2381
2553
|
authenticatorTypes: mapping.authenticatorTypes
|
|
2382
2554
|
}, mapping.oobChannels && {
|
|
@@ -2399,144 +2571,6 @@
|
|
|
2399
2571
|
}
|
|
2400
2572
|
return undefined;
|
|
2401
2573
|
}
|
|
2402
|
-
function _OverloadYield(e, d) {
|
|
2403
|
-
this.v = e, this.k = d;
|
|
2404
|
-
}
|
|
2405
|
-
function _assertClassBrand(e, t, n) {
|
|
2406
|
-
if ("function" == typeof e ? e === t : e.has(t)) return arguments.length < 3 ? t : n;
|
|
2407
|
-
throw new TypeError("Private element is not present on this object");
|
|
2408
|
-
}
|
|
2409
|
-
function _awaitAsyncGenerator(e) {
|
|
2410
|
-
return new _OverloadYield(e, 0);
|
|
2411
|
-
}
|
|
2412
|
-
function _checkPrivateRedeclaration(e, t) {
|
|
2413
|
-
if (t.has(e)) throw new TypeError("Cannot initialize the same private elements twice on an object");
|
|
2414
|
-
}
|
|
2415
|
-
function _classPrivateFieldGet2(s, a) {
|
|
2416
|
-
return s.get(_assertClassBrand(s, a));
|
|
2417
|
-
}
|
|
2418
|
-
function _classPrivateFieldInitSpec(e, t, a) {
|
|
2419
|
-
_checkPrivateRedeclaration(e, t), t.set(e, a);
|
|
2420
|
-
}
|
|
2421
|
-
function _classPrivateFieldSet2(s, a, r) {
|
|
2422
|
-
return s.set(_assertClassBrand(s, a), r), r;
|
|
2423
|
-
}
|
|
2424
|
-
function _classPrivateMethodInitSpec(e, a) {
|
|
2425
|
-
_checkPrivateRedeclaration(e, a), a.add(e);
|
|
2426
|
-
}
|
|
2427
|
-
function _defineProperty(e, r, t) {
|
|
2428
|
-
return (r = _toPropertyKey(r)) in e ? Object.defineProperty(e, r, {
|
|
2429
|
-
value: t,
|
|
2430
|
-
enumerable: !0,
|
|
2431
|
-
configurable: !0,
|
|
2432
|
-
writable: !0
|
|
2433
|
-
}) : e[r] = t, e;
|
|
2434
|
-
}
|
|
2435
|
-
function ownKeys(e, r) {
|
|
2436
|
-
var t = Object.keys(e);
|
|
2437
|
-
if (Object.getOwnPropertySymbols) {
|
|
2438
|
-
var o = Object.getOwnPropertySymbols(e);
|
|
2439
|
-
r && (o = o.filter(function(r) {
|
|
2440
|
-
return Object.getOwnPropertyDescriptor(e, r).enumerable;
|
|
2441
|
-
})), t.push.apply(t, o);
|
|
2442
|
-
}
|
|
2443
|
-
return t;
|
|
2444
|
-
}
|
|
2445
|
-
function _objectSpread2(e) {
|
|
2446
|
-
for (var r = 1; r < arguments.length; r++) {
|
|
2447
|
-
var t = null != arguments[r] ? arguments[r] : {};
|
|
2448
|
-
r % 2 ? ownKeys(Object(t), !0).forEach(function(r) {
|
|
2449
|
-
_defineProperty(e, r, t[r]);
|
|
2450
|
-
}) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function(r) {
|
|
2451
|
-
Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r));
|
|
2452
|
-
});
|
|
2453
|
-
}
|
|
2454
|
-
return e;
|
|
2455
|
-
}
|
|
2456
|
-
function _objectWithoutProperties(e, t) {
|
|
2457
|
-
if (null == e) return {};
|
|
2458
|
-
var o, r, i = _objectWithoutPropertiesLoose(e, t);
|
|
2459
|
-
if (Object.getOwnPropertySymbols) {
|
|
2460
|
-
var n = Object.getOwnPropertySymbols(e);
|
|
2461
|
-
for (r = 0; r < n.length; r++) o = n[r], -1 === t.indexOf(o) && {}.propertyIsEnumerable.call(e, o) && (i[o] = e[o]);
|
|
2462
|
-
}
|
|
2463
|
-
return i;
|
|
2464
|
-
}
|
|
2465
|
-
function _objectWithoutPropertiesLoose(r, e) {
|
|
2466
|
-
if (null == r) return {};
|
|
2467
|
-
var t = {};
|
|
2468
|
-
for (var n in r) if ({}.hasOwnProperty.call(r, n)) {
|
|
2469
|
-
if (-1 !== e.indexOf(n)) continue;
|
|
2470
|
-
t[n] = r[n];
|
|
2471
|
-
}
|
|
2472
|
-
return t;
|
|
2473
|
-
}
|
|
2474
|
-
function _toPrimitive(t, r) {
|
|
2475
|
-
if ("object" != typeof t || !t) return t;
|
|
2476
|
-
var e = t[Symbol.toPrimitive];
|
|
2477
|
-
if (void 0 !== e) {
|
|
2478
|
-
var i = e.call(t, r || "default");
|
|
2479
|
-
if ("object" != typeof i) return i;
|
|
2480
|
-
throw new TypeError("@@toPrimitive must return a primitive value.");
|
|
2481
|
-
}
|
|
2482
|
-
return ("string" === r ? String : Number)(t);
|
|
2483
|
-
}
|
|
2484
|
-
function _toPropertyKey(t) {
|
|
2485
|
-
var i = _toPrimitive(t, "string");
|
|
2486
|
-
return "symbol" == typeof i ? i : i + "";
|
|
2487
|
-
}
|
|
2488
|
-
function _wrapAsyncGenerator(e) {
|
|
2489
|
-
return function() {
|
|
2490
|
-
return new AsyncGenerator(e.apply(this, arguments));
|
|
2491
|
-
};
|
|
2492
|
-
}
|
|
2493
|
-
function AsyncGenerator(e) {
|
|
2494
|
-
var t, n;
|
|
2495
|
-
function resume(t, n) {
|
|
2496
|
-
try {
|
|
2497
|
-
var r = e[t](n), o = r.value, u = o instanceof _OverloadYield;
|
|
2498
|
-
Promise.resolve(u ? o.v : o).then(function(n) {
|
|
2499
|
-
if (u) {
|
|
2500
|
-
var i = "return" === t && o.k ? t : "next";
|
|
2501
|
-
if (!o.k || n.done) return resume(i, n);
|
|
2502
|
-
n = e[i](n).value;
|
|
2503
|
-
}
|
|
2504
|
-
settle(!!r.done, n);
|
|
2505
|
-
}, function(e) {
|
|
2506
|
-
resume("throw", e);
|
|
2507
|
-
});
|
|
2508
|
-
} catch (e) {
|
|
2509
|
-
settle(2, e);
|
|
2510
|
-
}
|
|
2511
|
-
}
|
|
2512
|
-
function settle(e, r) {
|
|
2513
|
-
2 === e ? t.reject(r) : t.resolve({
|
|
2514
|
-
value: r,
|
|
2515
|
-
done: e
|
|
2516
|
-
}), (t = t.next) ? resume(t.key, t.arg) : n = null;
|
|
2517
|
-
}
|
|
2518
|
-
this._invoke = function(e, r) {
|
|
2519
|
-
return new Promise(function(o, u) {
|
|
2520
|
-
var i = {
|
|
2521
|
-
key: e,
|
|
2522
|
-
arg: r,
|
|
2523
|
-
resolve: o,
|
|
2524
|
-
reject: u,
|
|
2525
|
-
next: null
|
|
2526
|
-
};
|
|
2527
|
-
n ? n = n.next = i : (t = n = i, resume(e, r));
|
|
2528
|
-
});
|
|
2529
|
-
}, "function" != typeof e.return && (this.return = void 0);
|
|
2530
|
-
}
|
|
2531
|
-
AsyncGenerator.prototype["function" == typeof Symbol && Symbol.asyncIterator || "@@asyncIterator"] = function() {
|
|
2532
|
-
return this;
|
|
2533
|
-
}, AsyncGenerator.prototype.next = function(e) {
|
|
2534
|
-
return this._invoke("next", e);
|
|
2535
|
-
}, AsyncGenerator.prototype.throw = function(e) {
|
|
2536
|
-
return this._invoke("throw", e);
|
|
2537
|
-
}, AsyncGenerator.prototype.return = function(e) {
|
|
2538
|
-
return this._invoke("return", e);
|
|
2539
|
-
};
|
|
2540
2574
|
var _navigator$userAgent$2, _navigator$userAgent$$2;
|
|
2541
2575
|
let USER_AGENT$2;
|
|
2542
2576
|
if (typeof navigator === "undefined" || !((_navigator$userAgent$2 = navigator.userAgent) !== null && _navigator$userAgent$2 !== void 0 && (_navigator$userAgent$$2 = _navigator$userAgent$2.startsWith) !== null && _navigator$userAgent$$2 !== void 0 && _navigator$userAgent$$2.call(_navigator$userAgent$2, "Mozilla/5.0 "))) {
|
|
@@ -6492,7 +6526,7 @@
|
|
|
6492
6526
|
});
|
|
6493
6527
|
return remoteJWKSet;
|
|
6494
6528
|
}
|
|
6495
|
-
const _excluded = [ "mfaToken" ], _excluded2 = [ "mfaToken" ];
|
|
6529
|
+
const _excluded$1 = [ "mfaToken" ], _excluded2$1 = [ "mfaToken" ];
|
|
6496
6530
|
var _baseUrl, _clientId, _customFetch, _entries, _ttlMs, _maxEntries, _configuration, _serverMetadata, _clientAuthPromise, _options, _customFetch2, _jwks, _discoveryCache, _inFlightDiscovery, _jwksCache, _Class9_brand;
|
|
6497
6531
|
var NotSupportedError = class NotSupportedError extends Error {
|
|
6498
6532
|
constructor(code, message) {
|
|
@@ -6533,6 +6567,12 @@
|
|
|
6533
6567
|
this.name = "TokenByRefreshTokenError";
|
|
6534
6568
|
}
|
|
6535
6569
|
};
|
|
6570
|
+
var TokenByPasswordError = class extends ApiError {
|
|
6571
|
+
constructor(message, cause) {
|
|
6572
|
+
super("token_by_password_error", message, cause);
|
|
6573
|
+
this.name = "TokenByPasswordError";
|
|
6574
|
+
}
|
|
6575
|
+
};
|
|
6536
6576
|
var TokenForConnectionError = class extends ApiError {
|
|
6537
6577
|
constructor(message, cause) {
|
|
6538
6578
|
super("token_for_connection_error", message, cause);
|
|
@@ -6706,7 +6746,7 @@
|
|
|
6706
6746
|
}
|
|
6707
6747
|
async enrollAuthenticator(options) {
|
|
6708
6748
|
const url = "".concat(_classPrivateFieldGet2(_baseUrl, this), "/mfa/associate");
|
|
6709
|
-
const {mfaToken: mfaToken} = options, sdkParams = _objectWithoutProperties(options, _excluded);
|
|
6749
|
+
const {mfaToken: mfaToken} = options, sdkParams = _objectWithoutProperties(options, _excluded$1);
|
|
6710
6750
|
const apiParams = {
|
|
6711
6751
|
authenticator_types: sdkParams.authenticatorTypes
|
|
6712
6752
|
};
|
|
@@ -6751,7 +6791,7 @@
|
|
|
6751
6791
|
}
|
|
6752
6792
|
async challengeAuthenticator(options) {
|
|
6753
6793
|
const url = "".concat(_classPrivateFieldGet2(_baseUrl, this), "/mfa/challenge");
|
|
6754
|
-
const {mfaToken: mfaToken} = options, challengeParams = _objectWithoutProperties(options, _excluded2);
|
|
6794
|
+
const {mfaToken: mfaToken} = options, challengeParams = _objectWithoutProperties(options, _excluded2$1);
|
|
6755
6795
|
const body = {
|
|
6756
6796
|
mfa_token: mfaToken,
|
|
6757
6797
|
client_id: _classPrivateFieldGet2(_clientId, this),
|
|
@@ -6806,7 +6846,7 @@
|
|
|
6806
6846
|
return {
|
|
6807
6847
|
enabled: true,
|
|
6808
6848
|
name: (_config$name = config === null || config === void 0 ? void 0 : config.name) !== null && _config$name !== void 0 ? _config$name : "@auth0/auth0-auth-js",
|
|
6809
|
-
version: (_config$version = config === null || config === void 0 ? void 0 : config.version) !== null && _config$version !== void 0 ? _config$version : "1.
|
|
6849
|
+
version: (_config$version = config === null || config === void 0 ? void 0 : config.version) !== null && _config$version !== void 0 ? _config$version : "1.6.0"
|
|
6810
6850
|
};
|
|
6811
6851
|
}
|
|
6812
6852
|
var TokenResponse = class _TokenResponse {
|
|
@@ -7155,6 +7195,38 @@
|
|
|
7155
7195
|
throw new TokenByRefreshTokenError("The access token has expired and there was an error while trying to refresh it.", e);
|
|
7156
7196
|
}
|
|
7157
7197
|
}
|
|
7198
|
+
async getTokenByPassword(options) {
|
|
7199
|
+
const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
|
|
7200
|
+
const params = new URLSearchParams({
|
|
7201
|
+
username: options.username,
|
|
7202
|
+
password: options.password
|
|
7203
|
+
});
|
|
7204
|
+
if (options.audience) {
|
|
7205
|
+
params.append("audience", options.audience);
|
|
7206
|
+
}
|
|
7207
|
+
if (options.scope) {
|
|
7208
|
+
params.append("scope", options.scope);
|
|
7209
|
+
}
|
|
7210
|
+
if (options.realm) {
|
|
7211
|
+
params.append("realm", options.realm);
|
|
7212
|
+
}
|
|
7213
|
+
let requestConfig = configuration;
|
|
7214
|
+
if (options.auth0ForwardedFor) {
|
|
7215
|
+
const clientAuth = await _assertClassBrand(_Class9_brand, this, _getClientAuth).call(this);
|
|
7216
|
+
requestConfig = new Configuration(configuration.serverMetadata(), _classPrivateFieldGet2(_options, this).clientId, _classPrivateFieldGet2(_options, this).clientSecret, clientAuth);
|
|
7217
|
+
requestConfig[customFetch$1] = (url, init) => _classPrivateFieldGet2(_customFetch2, this).call(this, url, _objectSpread2(_objectSpread2({}, init), {}, {
|
|
7218
|
+
headers: _objectSpread2(_objectSpread2({}, init.headers), {}, {
|
|
7219
|
+
"auth0-forwarded-for": options.auth0ForwardedFor
|
|
7220
|
+
})
|
|
7221
|
+
}));
|
|
7222
|
+
}
|
|
7223
|
+
try {
|
|
7224
|
+
const tokenEndpointResponse = await genericGrantRequest(requestConfig, "password", params);
|
|
7225
|
+
return TokenResponse.fromTokenEndpointResponse(tokenEndpointResponse);
|
|
7226
|
+
} catch (e) {
|
|
7227
|
+
throw new TokenByPasswordError("There was an error while trying to request a token.", e);
|
|
7228
|
+
}
|
|
7229
|
+
}
|
|
7158
7230
|
async getTokenByClientCredentials(options) {
|
|
7159
7231
|
const {configuration: configuration} = await _assertClassBrand(_Class9_brand, this, _discover).call(this);
|
|
7160
7232
|
try {
|
|
@@ -7439,12 +7511,13 @@
|
|
|
7439
7511
|
class MfaContextManager {
|
|
7440
7512
|
constructor() {
|
|
7441
7513
|
let ttlMs = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : DEFAULT_TTL_MS;
|
|
7442
|
-
this
|
|
7514
|
+
_defineProperty(this, "contexts", new Map);
|
|
7515
|
+
_defineProperty(this, "ttlMs", void 0);
|
|
7443
7516
|
this.ttlMs = ttlMs;
|
|
7444
7517
|
}
|
|
7445
7518
|
set(mfaToken, context) {
|
|
7446
7519
|
this.cleanup();
|
|
7447
|
-
this.contexts.set(mfaToken,
|
|
7520
|
+
this.contexts.set(mfaToken, _objectSpread2(_objectSpread2({}, context), {}, {
|
|
7448
7521
|
createdAt: Date.now()
|
|
7449
7522
|
}));
|
|
7450
7523
|
}
|
|
@@ -7476,6 +7549,9 @@
|
|
|
7476
7549
|
}
|
|
7477
7550
|
class MfaApiClient {
|
|
7478
7551
|
constructor(authJsMfaClient, auth0Client) {
|
|
7552
|
+
_defineProperty(this, "authJsMfaClient", void 0);
|
|
7553
|
+
_defineProperty(this, "auth0Client", void 0);
|
|
7554
|
+
_defineProperty(this, "contextManager", void 0);
|
|
7479
7555
|
this.authJsMfaClient = authJsMfaClient;
|
|
7480
7556
|
this.auth0Client = auth0Client;
|
|
7481
7557
|
this.contextManager = new MfaContextManager;
|
|
@@ -7488,9 +7564,9 @@
|
|
|
7488
7564
|
});
|
|
7489
7565
|
}
|
|
7490
7566
|
async getAuthenticators(mfaToken) {
|
|
7491
|
-
var
|
|
7567
|
+
var _context$mfaRequireme;
|
|
7492
7568
|
const context = this.contextManager.get(mfaToken);
|
|
7493
|
-
if (!(
|
|
7569
|
+
if (!(context !== null && context !== void 0 && (_context$mfaRequireme = context.mfaRequirements) !== null && _context$mfaRequireme !== void 0 && _context$mfaRequireme.challenge) || context.mfaRequirements.challenge.length === 0) {
|
|
7494
7570
|
throw new MfaListAuthenticatorsError("invalid_request", "challengeType is required and must contain at least one challenge type, please check mfa_required error payload");
|
|
7495
7571
|
}
|
|
7496
7572
|
const challengeTypes = context.mfaRequirements.challenge.map(c => c.type);
|
|
@@ -7504,25 +7580,25 @@
|
|
|
7504
7580
|
});
|
|
7505
7581
|
} catch (error) {
|
|
7506
7582
|
if (error instanceof MfaListAuthenticatorsError$1) {
|
|
7507
|
-
|
|
7583
|
+
var _error$cause;
|
|
7584
|
+
throw new MfaListAuthenticatorsError((_error$cause = error.cause) === null || _error$cause === void 0 ? void 0 : _error$cause.error, error.message);
|
|
7508
7585
|
}
|
|
7509
7586
|
throw error;
|
|
7510
7587
|
}
|
|
7511
7588
|
}
|
|
7512
7589
|
async enroll(params) {
|
|
7513
|
-
var _a;
|
|
7514
7590
|
const authJsParams = getAuthJsEnrollParams(params);
|
|
7515
7591
|
try {
|
|
7516
7592
|
return await this.authJsMfaClient.enrollAuthenticator(authJsParams);
|
|
7517
7593
|
} catch (error) {
|
|
7518
7594
|
if (error instanceof MfaEnrollmentError$1) {
|
|
7519
|
-
|
|
7595
|
+
var _error$cause2;
|
|
7596
|
+
throw new MfaEnrollmentError((_error$cause2 = error.cause) === null || _error$cause2 === void 0 ? void 0 : _error$cause2.error, error.message);
|
|
7520
7597
|
}
|
|
7521
7598
|
throw error;
|
|
7522
7599
|
}
|
|
7523
7600
|
}
|
|
7524
7601
|
async challenge(params) {
|
|
7525
|
-
var _a;
|
|
7526
7602
|
try {
|
|
7527
7603
|
const authJsParams = {
|
|
7528
7604
|
challengeType: params.challengeType,
|
|
@@ -7534,7 +7610,8 @@
|
|
|
7534
7610
|
return await this.authJsMfaClient.challengeAuthenticator(authJsParams);
|
|
7535
7611
|
} catch (error) {
|
|
7536
7612
|
if (error instanceof MfaChallengeError$1) {
|
|
7537
|
-
|
|
7613
|
+
var _error$cause3;
|
|
7614
|
+
throw new MfaChallengeError((_error$cause3 = error.cause) === null || _error$cause3 === void 0 ? void 0 : _error$cause3.error, error.message);
|
|
7538
7615
|
}
|
|
7539
7616
|
throw error;
|
|
7540
7617
|
}
|
|
@@ -7583,18 +7660,37 @@
|
|
|
7583
7660
|
}
|
|
7584
7661
|
}
|
|
7585
7662
|
}
|
|
7663
|
+
const _excluded = [ "openUrl", "fragment", "appState" ], _excluded2 = [ "url" ], _excluded3 = [ "cacheMode" ], _excluded4 = [ "federated" ], _excluded5 = [ "openUrl" ], _excluded6 = [ "id_token", "decodedToken" ], _excluded7 = [ "mfaToken" ];
|
|
7586
7664
|
class Auth0Client {
|
|
7587
7665
|
constructor(options) {
|
|
7588
|
-
this
|
|
7589
|
-
this
|
|
7666
|
+
_defineProperty(this, "transactionManager", void 0);
|
|
7667
|
+
_defineProperty(this, "cacheManager", void 0);
|
|
7668
|
+
_defineProperty(this, "lockManager", void 0);
|
|
7669
|
+
_defineProperty(this, "domainUrl", void 0);
|
|
7670
|
+
_defineProperty(this, "tokenIssuer", void 0);
|
|
7671
|
+
_defineProperty(this, "scope", void 0);
|
|
7672
|
+
_defineProperty(this, "cookieStorage", void 0);
|
|
7673
|
+
_defineProperty(this, "dpop", void 0);
|
|
7674
|
+
_defineProperty(this, "sessionCheckExpiryDays", void 0);
|
|
7675
|
+
_defineProperty(this, "orgHintCookieName", void 0);
|
|
7676
|
+
_defineProperty(this, "isAuthenticatedCookieName", void 0);
|
|
7677
|
+
_defineProperty(this, "nowProvider", void 0);
|
|
7678
|
+
_defineProperty(this, "httpTimeoutMs", void 0);
|
|
7679
|
+
_defineProperty(this, "options", void 0);
|
|
7680
|
+
_defineProperty(this, "userCache", (new InMemoryCache).enclosedCache);
|
|
7681
|
+
_defineProperty(this, "myAccountApi", void 0);
|
|
7682
|
+
_defineProperty(this, "mfa", void 0);
|
|
7683
|
+
_defineProperty(this, "worker", void 0);
|
|
7684
|
+
_defineProperty(this, "authJsClient", void 0);
|
|
7685
|
+
_defineProperty(this, "defaultOptions", {
|
|
7590
7686
|
authorizationParams: {
|
|
7591
7687
|
scope: DEFAULT_SCOPE
|
|
7592
7688
|
},
|
|
7593
7689
|
useRefreshTokensFallback: false,
|
|
7594
7690
|
useFormData: true
|
|
7595
|
-
};
|
|
7596
|
-
this.options =
|
|
7597
|
-
authorizationParams:
|
|
7691
|
+
});
|
|
7692
|
+
this.options = _objectSpread2(_objectSpread2(_objectSpread2({}, this.defaultOptions), options), {}, {
|
|
7693
|
+
authorizationParams: _objectSpread2(_objectSpread2({}, this.defaultOptions.authorizationParams), options.authorizationParams)
|
|
7598
7694
|
});
|
|
7599
7695
|
typeof window !== "undefined" && validateCrypto();
|
|
7600
7696
|
this.lockManager = getLockManager();
|
|
@@ -7626,9 +7722,9 @@
|
|
|
7626
7722
|
this.domainUrl = getDomain(this.options.domain);
|
|
7627
7723
|
this.tokenIssuer = getTokenIssuer(this.options.issuer, this.domainUrl);
|
|
7628
7724
|
const myAccountApiIdentifier = "".concat(this.domainUrl, "/me/");
|
|
7629
|
-
const myAccountFetcher = this.createFetcher(
|
|
7725
|
+
const myAccountFetcher = this.createFetcher(_objectSpread2(_objectSpread2({}, this.options.useDpop && {
|
|
7630
7726
|
dpopNonceId: "__auth0_my_account_api__"
|
|
7631
|
-
}), {
|
|
7727
|
+
}), {}, {
|
|
7632
7728
|
getAccessToken: () => this.getTokenSilently({
|
|
7633
7729
|
authorizationParams: {
|
|
7634
7730
|
scope: "create:me:connected_accounts",
|
|
@@ -7702,7 +7798,7 @@
|
|
|
7702
7798
|
url.searchParams.delete(paramName);
|
|
7703
7799
|
window.history.replaceState({}, "", url.toString());
|
|
7704
7800
|
}
|
|
7705
|
-
} catch (
|
|
7801
|
+
} catch (_unused) {}
|
|
7706
7802
|
}
|
|
7707
7803
|
_applySessionTransferToken(authorizationParams) {
|
|
7708
7804
|
const paramName = this.options.sessionTransferTokenQueryParamName;
|
|
@@ -7712,18 +7808,18 @@
|
|
|
7712
7808
|
const token = this._extractSessionTransferToken(paramName);
|
|
7713
7809
|
if (!token) return authorizationParams;
|
|
7714
7810
|
this._clearSessionTransferTokenFromUrl(paramName);
|
|
7715
|
-
return
|
|
7811
|
+
return _objectSpread2(_objectSpread2({}, authorizationParams), {}, {
|
|
7716
7812
|
session_transfer_token: token
|
|
7717
7813
|
});
|
|
7718
7814
|
}
|
|
7719
7815
|
async _prepareAuthorizeUrl(authorizationParams, authorizeOptions, fallbackRedirectUri) {
|
|
7720
|
-
var
|
|
7816
|
+
var _this$dpop;
|
|
7721
7817
|
const state = encode$2(createRandomString());
|
|
7722
7818
|
const nonce = encode$2(createRandomString());
|
|
7723
7819
|
const code_verifier = createRandomString();
|
|
7724
7820
|
const code_challengeBuffer = await sha256(code_verifier);
|
|
7725
7821
|
const code_challenge = bufferToBase64UrlEncoded(code_challengeBuffer);
|
|
7726
|
-
const thumbprint = await ((
|
|
7822
|
+
const thumbprint = await ((_this$dpop = this.dpop) === null || _this$dpop === void 0 ? void 0 : _this$dpop.calculateThumbprint());
|
|
7727
7823
|
const params = getAuthorizeParams(this.options, this.scope, authorizationParams, state, nonce, code_challenge, authorizationParams.redirect_uri || this.options.authorizationParams.redirect_uri || fallbackRedirectUri, authorizeOptions === null || authorizeOptions === void 0 ? void 0 : authorizeOptions.response_mode, thumbprint);
|
|
7728
7824
|
const url = this._authorizeUrl(params);
|
|
7729
7825
|
return {
|
|
@@ -7737,7 +7833,7 @@
|
|
|
7737
7833
|
};
|
|
7738
7834
|
}
|
|
7739
7835
|
async loginWithPopup(options, config) {
|
|
7740
|
-
var
|
|
7836
|
+
var _options$authorizatio;
|
|
7741
7837
|
options = options || {};
|
|
7742
7838
|
config = config || {};
|
|
7743
7839
|
if (!config.popup) {
|
|
@@ -7751,13 +7847,13 @@
|
|
|
7751
7847
|
response_mode: "web_message"
|
|
7752
7848
|
}, window.location.origin);
|
|
7753
7849
|
config.popup.location.href = params.url;
|
|
7754
|
-
const codeResult = await runPopup(
|
|
7850
|
+
const codeResult = await runPopup(_objectSpread2(_objectSpread2({}, config), {}, {
|
|
7755
7851
|
timeoutInSeconds: config.timeoutInSeconds || this.options.authorizeTimeoutInSeconds || DEFAULT_AUTHORIZE_TIMEOUT_IN_SECONDS
|
|
7756
|
-
}));
|
|
7852
|
+
}), new URL(params.url).origin);
|
|
7757
7853
|
if (params.state !== codeResult.state) {
|
|
7758
7854
|
throw new GenericError("state_mismatch", "Invalid state");
|
|
7759
7855
|
}
|
|
7760
|
-
const organization = ((
|
|
7856
|
+
const organization = ((_options$authorizatio = options.authorizationParams) === null || _options$authorizatio === void 0 ? void 0 : _options$authorizatio.organization) || this.options.authorizationParams.organization;
|
|
7761
7857
|
await this._requestToken({
|
|
7762
7858
|
audience: params.audience,
|
|
7763
7859
|
scope: params.scope,
|
|
@@ -7771,26 +7867,26 @@
|
|
|
7771
7867
|
});
|
|
7772
7868
|
}
|
|
7773
7869
|
async getUser() {
|
|
7774
|
-
var
|
|
7870
|
+
var _cache$decodedToken;
|
|
7775
7871
|
const cache = await this._getIdTokenFromCache();
|
|
7776
|
-
return
|
|
7872
|
+
return cache === null || cache === void 0 || (_cache$decodedToken = cache.decodedToken) === null || _cache$decodedToken === void 0 ? void 0 : _cache$decodedToken.user;
|
|
7777
7873
|
}
|
|
7778
7874
|
async getIdTokenClaims() {
|
|
7779
|
-
var
|
|
7875
|
+
var _cache$decodedToken2;
|
|
7780
7876
|
const cache = await this._getIdTokenFromCache();
|
|
7781
|
-
return
|
|
7877
|
+
return cache === null || cache === void 0 || (_cache$decodedToken2 = cache.decodedToken) === null || _cache$decodedToken2 === void 0 ? void 0 : _cache$decodedToken2.claims;
|
|
7782
7878
|
}
|
|
7783
7879
|
async loginWithRedirect() {
|
|
7880
|
+
var _urlOptions$authoriza;
|
|
7784
7881
|
let options = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
|
|
7785
|
-
|
|
7786
|
-
const
|
|
7787
|
-
const organization = ((_a = urlOptions.authorizationParams) === null || _a === void 0 ? void 0 : _a.organization) || this.options.authorizationParams.organization;
|
|
7882
|
+
const _patchOpenUrlWithOnRe = patchOpenUrlWithOnRedirect(options), {openUrl: openUrl, fragment: fragment, appState: appState} = _patchOpenUrlWithOnRe, urlOptions = _objectWithoutProperties(_patchOpenUrlWithOnRe, _excluded);
|
|
7883
|
+
const organization = ((_urlOptions$authoriza = urlOptions.authorizationParams) === null || _urlOptions$authoriza === void 0 ? void 0 : _urlOptions$authoriza.organization) || this.options.authorizationParams.organization;
|
|
7788
7884
|
const authorizationParams = this._applySessionTransferToken(urlOptions.authorizationParams || {});
|
|
7789
|
-
const
|
|
7790
|
-
this.transactionManager.create(
|
|
7885
|
+
const _await$this$_prepareA = await this._prepareAuthorizeUrl(authorizationParams), {url: url} = _await$this$_prepareA, transaction = _objectWithoutProperties(_await$this$_prepareA, _excluded2);
|
|
7886
|
+
this.transactionManager.create(_objectSpread2(_objectSpread2({}, transaction), {}, {
|
|
7791
7887
|
appState: appState,
|
|
7792
|
-
response_type:
|
|
7793
|
-
}
|
|
7888
|
+
response_type: ResponseType.Code
|
|
7889
|
+
}, organization && {
|
|
7794
7890
|
organization: organization
|
|
7795
7891
|
}));
|
|
7796
7892
|
const urlWithFragment = fragment ? "".concat(url, "#").concat(fragment) : url;
|
|
@@ -7812,7 +7908,7 @@
|
|
|
7812
7908
|
}
|
|
7813
7909
|
this.transactionManager.remove();
|
|
7814
7910
|
const authenticationResult = parseAuthenticationResult(queryStringFragments.join(""));
|
|
7815
|
-
if (transaction.response_type ===
|
|
7911
|
+
if (transaction.response_type === ResponseType.ConnectCode) {
|
|
7816
7912
|
return this._handleConnectAccountRedirectCallback(authenticationResult, transaction);
|
|
7817
7913
|
}
|
|
7818
7914
|
return this._handleLoginRedirectCallback(authenticationResult, transaction);
|
|
@@ -7828,7 +7924,7 @@
|
|
|
7828
7924
|
const organization = transaction.organization;
|
|
7829
7925
|
const nonceIn = transaction.nonce;
|
|
7830
7926
|
const redirect_uri = transaction.redirect_uri;
|
|
7831
|
-
await this._requestToken(
|
|
7927
|
+
await this._requestToken(_objectSpread2({
|
|
7832
7928
|
audience: transaction.audience,
|
|
7833
7929
|
scope: transaction.scope,
|
|
7834
7930
|
code_verifier: transaction.code_verifier,
|
|
@@ -7842,7 +7938,7 @@
|
|
|
7842
7938
|
});
|
|
7843
7939
|
return {
|
|
7844
7940
|
appState: transaction.appState,
|
|
7845
|
-
response_type:
|
|
7941
|
+
response_type: ResponseType.Code
|
|
7846
7942
|
};
|
|
7847
7943
|
}
|
|
7848
7944
|
async _handleConnectAccountRedirectCallback(connectResult, transaction) {
|
|
@@ -7862,9 +7958,9 @@
|
|
|
7862
7958
|
redirect_uri: transaction.redirect_uri,
|
|
7863
7959
|
code_verifier: transaction.code_verifier
|
|
7864
7960
|
});
|
|
7865
|
-
return
|
|
7961
|
+
return _objectSpread2(_objectSpread2({}, data), {}, {
|
|
7866
7962
|
appState: transaction.appState,
|
|
7867
|
-
response_type:
|
|
7963
|
+
response_type: ResponseType.ConnectCode
|
|
7868
7964
|
});
|
|
7869
7965
|
}
|
|
7870
7966
|
async checkSession(options) {
|
|
@@ -7884,20 +7980,20 @@
|
|
|
7884
7980
|
} catch (_) {}
|
|
7885
7981
|
}
|
|
7886
7982
|
async getTokenSilently() {
|
|
7983
|
+
var _options$authorizatio2, _options$authorizatio3;
|
|
7887
7984
|
let options = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
|
|
7888
|
-
|
|
7889
|
-
const localOptions = Object.assign(Object.assign({
|
|
7985
|
+
const localOptions = _objectSpread2(_objectSpread2({
|
|
7890
7986
|
cacheMode: "on"
|
|
7891
|
-
}, options), {
|
|
7892
|
-
authorizationParams:
|
|
7893
|
-
scope: scopesToRequest(this.scope, (
|
|
7987
|
+
}, options), {}, {
|
|
7988
|
+
authorizationParams: _objectSpread2(_objectSpread2(_objectSpread2({}, this.options.authorizationParams), options.authorizationParams), {}, {
|
|
7989
|
+
scope: scopesToRequest(this.scope, (_options$authorizatio2 = options.authorizationParams) === null || _options$authorizatio2 === void 0 ? void 0 : _options$authorizatio2.scope, ((_options$authorizatio3 = options.authorizationParams) === null || _options$authorizatio3 === void 0 ? void 0 : _options$authorizatio3.audience) || this.options.authorizationParams.audience)
|
|
7894
7990
|
})
|
|
7895
7991
|
});
|
|
7896
7992
|
const result = await singlePromise(() => this._getTokenSilently(localOptions), "".concat(this.options.clientId, "::").concat(localOptions.authorizationParams.audience, "::").concat(localOptions.authorizationParams.scope));
|
|
7897
7993
|
return options.detailedResponse ? result : result === null || result === void 0 ? void 0 : result.access_token;
|
|
7898
7994
|
}
|
|
7899
7995
|
async _getTokenSilently(options) {
|
|
7900
|
-
const {cacheMode: cacheMode} = options, getTokenOptions =
|
|
7996
|
+
const {cacheMode: cacheMode} = options, getTokenOptions = _objectWithoutProperties(options, _excluded3);
|
|
7901
7997
|
if (cacheMode !== "off") {
|
|
7902
7998
|
const entry = await this._getEntryFromCache({
|
|
7903
7999
|
scope: getTokenOptions.authorizationParams.scope,
|
|
@@ -7927,13 +8023,13 @@
|
|
|
7927
8023
|
}
|
|
7928
8024
|
const authResult = this.options.useRefreshTokens ? await this._getTokenUsingRefreshToken(getTokenOptions) : await this._getTokenFromIFrame(getTokenOptions);
|
|
7929
8025
|
const {id_token: id_token, token_type: token_type, access_token: access_token, oauthTokenScope: oauthTokenScope, expires_in: expires_in} = authResult;
|
|
7930
|
-
return
|
|
8026
|
+
return _objectSpread2(_objectSpread2({
|
|
7931
8027
|
id_token: id_token,
|
|
7932
8028
|
token_type: token_type,
|
|
7933
8029
|
access_token: access_token
|
|
7934
8030
|
}, oauthTokenScope ? {
|
|
7935
8031
|
scope: oauthTokenScope
|
|
7936
|
-
} : null), {
|
|
8032
|
+
} : null), {}, {
|
|
7937
8033
|
expires_in: expires_in
|
|
7938
8034
|
});
|
|
7939
8035
|
});
|
|
@@ -7969,15 +8065,15 @@
|
|
|
7969
8065
|
}
|
|
7970
8066
|
}
|
|
7971
8067
|
async getTokenWithPopup() {
|
|
8068
|
+
var _options$authorizatio4, _options$authorizatio5;
|
|
7972
8069
|
let options = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
|
|
7973
8070
|
let config = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
|
|
7974
|
-
|
|
7975
|
-
|
|
7976
|
-
|
|
7977
|
-
scope: scopesToRequest(this.scope, (_a = options.authorizationParams) === null || _a === void 0 ? void 0 : _a.scope, ((_b = options.authorizationParams) === null || _b === void 0 ? void 0 : _b.audience) || this.options.authorizationParams.audience)
|
|
8071
|
+
const localOptions = _objectSpread2(_objectSpread2({}, options), {}, {
|
|
8072
|
+
authorizationParams: _objectSpread2(_objectSpread2(_objectSpread2({}, this.options.authorizationParams), options.authorizationParams), {}, {
|
|
8073
|
+
scope: scopesToRequest(this.scope, (_options$authorizatio4 = options.authorizationParams) === null || _options$authorizatio4 === void 0 ? void 0 : _options$authorizatio4.scope, ((_options$authorizatio5 = options.authorizationParams) === null || _options$authorizatio5 === void 0 ? void 0 : _options$authorizatio5.audience) || this.options.authorizationParams.audience)
|
|
7978
8074
|
})
|
|
7979
8075
|
});
|
|
7980
|
-
config =
|
|
8076
|
+
config = _objectSpread2(_objectSpread2({}, DEFAULT_POPUP_CONFIG_OPTIONS), config);
|
|
7981
8077
|
await this.loginWithPopup(localOptions, config);
|
|
7982
8078
|
const cache = await this.cacheManager.get(new CacheKey({
|
|
7983
8079
|
scope: localOptions.authorizationParams.scope,
|
|
@@ -7996,17 +8092,17 @@
|
|
|
7996
8092
|
} else {
|
|
7997
8093
|
delete options.clientId;
|
|
7998
8094
|
}
|
|
7999
|
-
const
|
|
8095
|
+
const _ref = options.logoutParams || {}, {federated: federated} = _ref, logoutOptions = _objectWithoutProperties(_ref, _excluded4);
|
|
8000
8096
|
const federatedQuery = federated ? "&federated" : "";
|
|
8001
|
-
const url = this._url("/v2/logout?".concat(createQueryParams(
|
|
8097
|
+
const url = this._url("/v2/logout?".concat(createQueryParams(_objectSpread2({
|
|
8002
8098
|
clientId: options.clientId
|
|
8003
8099
|
}, logoutOptions))));
|
|
8004
8100
|
return url + federatedQuery;
|
|
8005
8101
|
}
|
|
8006
8102
|
async logout() {
|
|
8103
|
+
var _this$dpop2;
|
|
8007
8104
|
let options = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
|
|
8008
|
-
|
|
8009
|
-
const _b = patchOpenUrlWithOnRedirect(options), {openUrl: openUrl} = _b, logoutOptions = __rest(_b, [ "openUrl" ]);
|
|
8105
|
+
const _patchOpenUrlWithOnRe2 = patchOpenUrlWithOnRedirect(options), {openUrl: openUrl} = _patchOpenUrlWithOnRe2, logoutOptions = _objectWithoutProperties(_patchOpenUrlWithOnRe2, _excluded5);
|
|
8010
8106
|
if (options.clientId === null) {
|
|
8011
8107
|
await this.cacheManager.clear();
|
|
8012
8108
|
} else {
|
|
@@ -8019,7 +8115,7 @@
|
|
|
8019
8115
|
cookieDomain: this.options.cookieDomain
|
|
8020
8116
|
});
|
|
8021
8117
|
this.userCache.remove(CACHE_KEY_ID_TOKEN_SUFFIX);
|
|
8022
|
-
await ((
|
|
8118
|
+
await ((_this$dpop2 = this.dpop) === null || _this$dpop2 === void 0 ? void 0 : _this$dpop2.clear());
|
|
8023
8119
|
const url = this._buildLogoutUrl(logoutOptions);
|
|
8024
8120
|
if (openUrl) {
|
|
8025
8121
|
await openUrl(url);
|
|
@@ -8031,7 +8127,7 @@
|
|
|
8031
8127
|
const iframeLockKey = buildIframeLockKey(this.options.clientId);
|
|
8032
8128
|
try {
|
|
8033
8129
|
return await this.lockManager.runWithLock(iframeLockKey, 5e3, async () => {
|
|
8034
|
-
const params =
|
|
8130
|
+
const params = _objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
|
|
8035
8131
|
prompt: "none"
|
|
8036
8132
|
});
|
|
8037
8133
|
const orgHint = this.cookieStorage.get(this.orgHintCookieName);
|
|
@@ -8048,14 +8144,14 @@
|
|
|
8048
8144
|
let eventOrigin;
|
|
8049
8145
|
try {
|
|
8050
8146
|
eventOrigin = new URL(this.domainUrl).origin;
|
|
8051
|
-
} catch (
|
|
8147
|
+
} catch (_unused2) {
|
|
8052
8148
|
eventOrigin = this.domainUrl;
|
|
8053
8149
|
}
|
|
8054
8150
|
const codeResult = await runIframe(url, eventOrigin, authorizeTimeout);
|
|
8055
8151
|
if (stateIn !== codeResult.state) {
|
|
8056
8152
|
throw new GenericError("state_mismatch", "Invalid state");
|
|
8057
8153
|
}
|
|
8058
|
-
const tokenResult = await this._requestToken(
|
|
8154
|
+
const tokenResult = await this._requestToken(_objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
|
|
8059
8155
|
code_verifier: code_verifier,
|
|
8060
8156
|
code: codeResult.code,
|
|
8061
8157
|
grant_type: "authorization_code",
|
|
@@ -8065,7 +8161,7 @@
|
|
|
8065
8161
|
nonceIn: nonceIn,
|
|
8066
8162
|
organization: params.organization
|
|
8067
8163
|
});
|
|
8068
|
-
return
|
|
8164
|
+
return _objectSpread2(_objectSpread2({}, tokenResult), {}, {
|
|
8069
8165
|
scope: scope,
|
|
8070
8166
|
oauthTokenScope: tokenResult.scope,
|
|
8071
8167
|
audience: audience
|
|
@@ -8084,7 +8180,6 @@
|
|
|
8084
8180
|
}
|
|
8085
8181
|
}
|
|
8086
8182
|
async _getTokenUsingRefreshToken(options) {
|
|
8087
|
-
var _a, _b;
|
|
8088
8183
|
const cache = await this.cacheManager.get(new CacheKey({
|
|
8089
8184
|
scope: options.authorizationParams.scope,
|
|
8090
8185
|
audience: options.authorizationParams.audience || DEFAULT_AUDIENCE,
|
|
@@ -8100,16 +8195,16 @@
|
|
|
8100
8195
|
const timeout = typeof options.timeoutInSeconds === "number" ? options.timeoutInSeconds * 1e3 : null;
|
|
8101
8196
|
const scopesToRequest = getScopeToRequest(this.options.useMrrt, options.authorizationParams, cache === null || cache === void 0 ? void 0 : cache.audience, cache === null || cache === void 0 ? void 0 : cache.scope);
|
|
8102
8197
|
try {
|
|
8103
|
-
const tokenResult = await this._requestToken(
|
|
8198
|
+
const tokenResult = await this._requestToken(_objectSpread2(_objectSpread2({}, options.authorizationParams), {}, {
|
|
8104
8199
|
grant_type: "refresh_token",
|
|
8105
8200
|
refresh_token: cache && cache.refresh_token,
|
|
8106
8201
|
redirect_uri: redirect_uri
|
|
8107
|
-
}
|
|
8202
|
+
}, timeout && {
|
|
8108
8203
|
timeout: timeout
|
|
8109
8204
|
}), {
|
|
8110
8205
|
scopesToRequest: scopesToRequest
|
|
8111
8206
|
});
|
|
8112
|
-
if (tokenResult.refresh_token &&
|
|
8207
|
+
if (tokenResult.refresh_token && cache !== null && cache !== void 0 && cache.refresh_token) {
|
|
8113
8208
|
await this.cacheManager.updateEntry(cache.refresh_token, tokenResult.refresh_token);
|
|
8114
8209
|
}
|
|
8115
8210
|
if (this.options.useMrrt) {
|
|
@@ -8126,7 +8221,7 @@
|
|
|
8126
8221
|
}
|
|
8127
8222
|
}
|
|
8128
8223
|
}
|
|
8129
|
-
return
|
|
8224
|
+
return _objectSpread2(_objectSpread2({}, tokenResult), {}, {
|
|
8130
8225
|
scope: options.authorizationParams.scope,
|
|
8131
8226
|
oauthTokenScope: tokenResult.scope,
|
|
8132
8227
|
audience: options.authorizationParams.audience || DEFAULT_AUDIENCE
|
|
@@ -8144,13 +8239,14 @@
|
|
|
8144
8239
|
}
|
|
8145
8240
|
}
|
|
8146
8241
|
if (e instanceof MfaRequiredError) {
|
|
8147
|
-
|
|
8242
|
+
var _options$authorizatio6, _options$authorizatio7;
|
|
8243
|
+
this.mfa.setMFAAuthDetails(e.mfa_token, (_options$authorizatio6 = options.authorizationParams) === null || _options$authorizatio6 === void 0 ? void 0 : _options$authorizatio6.scope, (_options$authorizatio7 = options.authorizationParams) === null || _options$authorizatio7 === void 0 ? void 0 : _options$authorizatio7.audience, e.mfa_requirements);
|
|
8148
8244
|
}
|
|
8149
8245
|
throw e;
|
|
8150
8246
|
}
|
|
8151
8247
|
}
|
|
8152
8248
|
async _saveEntryInCache(entry) {
|
|
8153
|
-
const {id_token: id_token, decodedToken: decodedToken} = entry, entryWithoutIdToken =
|
|
8249
|
+
const {id_token: id_token, decodedToken: decodedToken} = entry, entryWithoutIdToken = _objectWithoutProperties(entry, _excluded6);
|
|
8154
8250
|
this.userCache.set(CACHE_KEY_ID_TOKEN_SUFFIX, {
|
|
8155
8251
|
id_token: id_token,
|
|
8156
8252
|
decodedToken: decodedToken
|
|
@@ -8173,8 +8269,8 @@
|
|
|
8173
8269
|
this.userCache.set(CACHE_KEY_ID_TOKEN_SUFFIX, cache);
|
|
8174
8270
|
return cache;
|
|
8175
8271
|
}
|
|
8176
|
-
async _getEntryFromCache(
|
|
8177
|
-
let {scope: scope, audience: audience, clientId: clientId, cacheMode: cacheMode} =
|
|
8272
|
+
async _getEntryFromCache(_ref2) {
|
|
8273
|
+
let {scope: scope, audience: audience, clientId: clientId, cacheMode: cacheMode} = _ref2;
|
|
8178
8274
|
const entry = await this.cacheManager.get(new CacheKey({
|
|
8179
8275
|
scope: scope,
|
|
8180
8276
|
audience: audience,
|
|
@@ -8183,21 +8279,20 @@
|
|
|
8183
8279
|
if (entry && entry.access_token) {
|
|
8184
8280
|
const {token_type: token_type, access_token: access_token, oauthTokenScope: oauthTokenScope, expires_in: expires_in} = entry;
|
|
8185
8281
|
const cache = await this._getIdTokenFromCache();
|
|
8186
|
-
return cache &&
|
|
8282
|
+
return cache && _objectSpread2(_objectSpread2({
|
|
8187
8283
|
id_token: cache.id_token,
|
|
8188
8284
|
token_type: token_type ? token_type : "Bearer",
|
|
8189
8285
|
access_token: access_token
|
|
8190
8286
|
}, oauthTokenScope ? {
|
|
8191
8287
|
scope: oauthTokenScope
|
|
8192
|
-
} : null), {
|
|
8288
|
+
} : null), {}, {
|
|
8193
8289
|
expires_in: expires_in
|
|
8194
8290
|
});
|
|
8195
8291
|
}
|
|
8196
8292
|
}
|
|
8197
8293
|
async _requestToken(options, additionalParameters) {
|
|
8198
|
-
var _a, _b;
|
|
8199
8294
|
const {nonceIn: nonceIn, organization: organization, scopesToRequest: scopesToRequest} = additionalParameters || {};
|
|
8200
|
-
const authResult = await oauthToken(
|
|
8295
|
+
const authResult = await oauthToken(_objectSpread2(_objectSpread2({
|
|
8201
8296
|
baseUrl: this.domainUrl,
|
|
8202
8297
|
client_id: this.options.clientId,
|
|
8203
8298
|
auth0Client: this.options.auth0Client,
|
|
@@ -8205,24 +8300,25 @@
|
|
|
8205
8300
|
timeout: this.httpTimeoutMs,
|
|
8206
8301
|
useMrrt: this.options.useMrrt,
|
|
8207
8302
|
dpop: this.dpop
|
|
8208
|
-
}, options), {
|
|
8303
|
+
}, options), {}, {
|
|
8209
8304
|
scope: scopesToRequest || options.scope
|
|
8210
8305
|
}), this.worker);
|
|
8211
8306
|
const decodedToken = await this._verifyIdToken(authResult.id_token, nonceIn, organization);
|
|
8212
8307
|
if (options.grant_type === "authorization_code") {
|
|
8308
|
+
var _existingIdToken$deco;
|
|
8213
8309
|
const existingIdToken = await this._getIdTokenFromCache();
|
|
8214
|
-
if (
|
|
8310
|
+
if (existingIdToken !== null && existingIdToken !== void 0 && (_existingIdToken$deco = existingIdToken.decodedToken) !== null && _existingIdToken$deco !== void 0 && (_existingIdToken$deco = _existingIdToken$deco.claims) !== null && _existingIdToken$deco !== void 0 && _existingIdToken$deco.sub && existingIdToken.decodedToken.claims.sub !== decodedToken.claims.sub) {
|
|
8215
8311
|
await this.cacheManager.clear(this.options.clientId);
|
|
8216
8312
|
this.userCache.remove(CACHE_KEY_ID_TOKEN_SUFFIX);
|
|
8217
8313
|
}
|
|
8218
8314
|
}
|
|
8219
|
-
await this._saveEntryInCache(
|
|
8315
|
+
await this._saveEntryInCache(_objectSpread2(_objectSpread2(_objectSpread2({}, authResult), {}, {
|
|
8220
8316
|
decodedToken: decodedToken,
|
|
8221
8317
|
scope: options.scope,
|
|
8222
8318
|
audience: options.audience || DEFAULT_AUDIENCE
|
|
8223
|
-
}
|
|
8319
|
+
}, authResult.scope ? {
|
|
8224
8320
|
oauthTokenScope: authResult.scope
|
|
8225
|
-
} : null), {
|
|
8321
|
+
} : null), {}, {
|
|
8226
8322
|
client_id: this.options.clientId
|
|
8227
8323
|
}));
|
|
8228
8324
|
this.cookieStorage.save(this.isAuthenticatedCookieName, true, {
|
|
@@ -8230,12 +8326,12 @@
|
|
|
8230
8326
|
cookieDomain: this.options.cookieDomain
|
|
8231
8327
|
});
|
|
8232
8328
|
this._processOrgHint(organization || decodedToken.claims.org_id);
|
|
8233
|
-
return
|
|
8329
|
+
return _objectSpread2(_objectSpread2({}, authResult), {}, {
|
|
8234
8330
|
decodedToken: decodedToken
|
|
8235
8331
|
});
|
|
8236
8332
|
}
|
|
8237
8333
|
async loginWithCustomTokenExchange(options) {
|
|
8238
|
-
return this._requestToken(
|
|
8334
|
+
return this._requestToken(_objectSpread2(_objectSpread2({}, options), {}, {
|
|
8239
8335
|
grant_type: "urn:ietf:params:oauth:grant-type:token-exchange",
|
|
8240
8336
|
subject_token: options.subject_token,
|
|
8241
8337
|
subject_token_type: options.subject_token_type,
|
|
@@ -8269,10 +8365,10 @@
|
|
|
8269
8365
|
return new Fetcher(config, {
|
|
8270
8366
|
isDpopEnabled: () => !!this.options.useDpop,
|
|
8271
8367
|
getAccessToken: authParams => {
|
|
8272
|
-
var
|
|
8368
|
+
var _authParams$scope;
|
|
8273
8369
|
return this.getTokenSilently({
|
|
8274
8370
|
authorizationParams: {
|
|
8275
|
-
scope:
|
|
8371
|
+
scope: authParams === null || authParams === void 0 || (_authParams$scope = authParams.scope) === null || _authParams$scope === void 0 ? void 0 : _authParams$scope.join(" "),
|
|
8276
8372
|
audience: authParams === null || authParams === void 0 ? void 0 : authParams.audience
|
|
8277
8373
|
},
|
|
8278
8374
|
detailedResponse: true
|
|
@@ -8308,7 +8404,7 @@
|
|
|
8308
8404
|
redirect_uri: redirectUri,
|
|
8309
8405
|
appState: appState,
|
|
8310
8406
|
connection: connection,
|
|
8311
|
-
response_type:
|
|
8407
|
+
response_type: ResponseType.ConnectCode
|
|
8312
8408
|
});
|
|
8313
8409
|
const url = new URL(connect_uri);
|
|
8314
8410
|
url.searchParams.set("ticket", connect_params.ticket);
|
|
@@ -8319,8 +8415,8 @@
|
|
|
8319
8415
|
}
|
|
8320
8416
|
}
|
|
8321
8417
|
async _requestTokenForMfa(options, additionalParameters) {
|
|
8322
|
-
const {mfaToken: mfaToken} = options, restOptions =
|
|
8323
|
-
return this._requestToken(
|
|
8418
|
+
const {mfaToken: mfaToken} = options, restOptions = _objectWithoutProperties(options, _excluded7);
|
|
8419
|
+
return this._requestToken(_objectSpread2(_objectSpread2({}, restOptions), {}, {
|
|
8324
8420
|
mfa_token: mfaToken
|
|
8325
8421
|
}), additionalParameters);
|
|
8326
8422
|
}
|
|
@@ -8350,6 +8446,7 @@
|
|
|
8350
8446
|
exports.PopupCancelledError = PopupCancelledError;
|
|
8351
8447
|
exports.PopupOpenError = PopupOpenError;
|
|
8352
8448
|
exports.PopupTimeoutError = PopupTimeoutError;
|
|
8449
|
+
exports.ResponseType = ResponseType;
|
|
8353
8450
|
exports.TimeoutError = TimeoutError;
|
|
8354
8451
|
exports.UseDpopNonceError = UseDpopNonceError;
|
|
8355
8452
|
exports.User = User;
|