@axa-fr/oidc-client 7.22.18 → 7.22.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +31 -39
- package/bin/copy-service-worker-files.mjs +24 -17
- package/dist/OidcTrustedDomains.js +14 -12
- package/dist/cache.d.ts.map +1 -1
- package/dist/checkSession.d.ts +1 -1
- package/dist/checkSession.d.ts.map +1 -1
- package/dist/checkSessionIFrame.d.ts.map +1 -1
- package/dist/crypto.d.ts.map +1 -1
- package/dist/fetch.d.ts +2 -1
- package/dist/fetch.d.ts.map +1 -1
- package/dist/index.d.ts +5 -5
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +935 -601
- package/dist/index.umd.cjs +2 -2
- package/dist/initSession.d.ts +1 -1
- package/dist/initSession.d.ts.map +1 -1
- package/dist/initWorker.d.ts +2 -2
- package/dist/initWorker.d.ts.map +1 -1
- package/dist/initWorkerOption.d.ts.map +1 -1
- package/dist/jwt.d.ts +2 -2
- package/dist/jwt.d.ts.map +1 -1
- package/dist/keepSession.d.ts.map +1 -1
- package/dist/location.d.ts.map +1 -1
- package/dist/login.d.ts +1 -1
- package/dist/login.d.ts.map +1 -1
- package/dist/logout.d.ts +1 -1
- package/dist/logout.d.ts.map +1 -1
- package/dist/oidc.d.ts +1 -1
- package/dist/oidc.d.ts.map +1 -1
- package/dist/oidcClient.d.ts +2 -2
- package/dist/oidcClient.d.ts.map +1 -1
- package/dist/parseTokens.d.ts.map +1 -1
- package/dist/renewTokens.d.ts.map +1 -1
- package/dist/requests.d.ts +1 -1
- package/dist/requests.d.ts.map +1 -1
- package/dist/silentLogin.d.ts.map +1 -1
- package/dist/timer.d.ts.map +1 -1
- package/dist/types.d.ts +1 -1
- package/dist/types.d.ts.map +1 -1
- package/dist/user.d.ts.map +1 -1
- package/dist/version.d.ts +1 -1
- package/package.json +2 -2
- package/src/cache.ts +21 -18
- package/src/checkSession.ts +89 -54
- package/src/checkSessionIFrame.ts +70 -69
- package/src/crypto.ts +27 -25
- package/src/events.ts +28 -28
- package/src/fetch.ts +40 -21
- package/src/index.ts +6 -17
- package/src/iniWorker.spec.ts +26 -16
- package/src/initSession.ts +115 -113
- package/src/initWorker.ts +299 -212
- package/src/initWorkerOption.ts +121 -114
- package/src/jwt.ts +150 -136
- package/src/keepSession.ts +100 -81
- package/src/location.ts +24 -26
- package/src/login.ts +246 -189
- package/src/logout.spec.ts +131 -76
- package/src/logout.ts +130 -115
- package/src/oidc.ts +426 -337
- package/src/oidcClient.ts +129 -105
- package/src/parseTokens.spec.ts +198 -179
- package/src/parseTokens.ts +221 -186
- package/src/renewTokens.ts +397 -284
- package/src/requests.spec.ts +5 -7
- package/src/requests.ts +142 -114
- package/src/route-utils.spec.ts +17 -19
- package/src/route-utils.ts +29 -26
- package/src/silentLogin.ts +145 -127
- package/src/timer.ts +10 -11
- package/src/types.ts +56 -46
- package/src/user.ts +17 -12
- package/src/version.ts +1 -1
package/README.md
CHANGED
|
@@ -24,15 +24,14 @@ We provide a wrapper **@axa-fr/react-oidc** for **React** (compatible next.js) a
|
|
|
24
24
|
- [Hash route](#Hash-route)
|
|
25
25
|
- [Service Worker Support](#service-worker-support)
|
|
26
26
|
|
|
27
|
-
|
|
28
27
|
## About
|
|
29
28
|
|
|
30
29
|
@axa-fr/oidc-client is:
|
|
31
30
|
|
|
32
31
|
- **Secure** :
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
32
|
+
- With Demonstrating Proof of Possession (DPoP), your access_token and refresh_token are not usable outside your browser context (big protection)
|
|
33
|
+
- With the use of Service Worker, your tokens (refresh_token and/or access_token) are not accessible to the JavaScript client code (if you follow good practices from [`FAQ`](https://github.com/AxaFrance/oidc-client/blob/main/FAQ.md) section)
|
|
34
|
+
- OIDC using client side Code Credential Grant with pkce only
|
|
36
35
|
- **Lightweight** : Unpacked Size on npm is **274 kB**
|
|
37
36
|
- **Simple**
|
|
38
37
|
- refresh_token and access_token are auto refreshed in background
|
|
@@ -48,7 +47,6 @@ We provide a wrapper **@axa-fr/react-oidc** for **React** (compatible next.js) a
|
|
|
48
47
|
|
|
49
48
|
The service worker catch **access_token** and **refresh_token** that will never be accessible to the client.
|
|
50
49
|
|
|
51
|
-
|
|
52
50
|
### Getting Started
|
|
53
51
|
|
|
54
52
|
```sh
|
|
@@ -63,6 +61,7 @@ node ./node_modules/@axa-fr/oidc-client/bin/copy-service-worker-files.mjs public
|
|
|
63
61
|
```
|
|
64
62
|
|
|
65
63
|
WARNING : If you use Service Worker mode, the OidcServiceWorker.js file should always be up to date with the version of the library. You may setup a postinstall script in your package.json file to update it at each npm install. For example :
|
|
64
|
+
|
|
66
65
|
```sh
|
|
67
66
|
"scripts": {
|
|
68
67
|
...
|
|
@@ -83,8 +82,8 @@ The only file you should edit is "OidcTrustedDomains.js".
|
|
|
83
82
|
// Domains used by OIDC server must be also declared here
|
|
84
83
|
const trustedDomains = {
|
|
85
84
|
default: {
|
|
86
|
-
oidcDomains
|
|
87
|
-
accessTokenDomains
|
|
85
|
+
oidcDomains: ['https://demo.duendesoftware.com'],
|
|
86
|
+
accessTokenDomains: ['https://www.myapi.com/users'],
|
|
88
87
|
},
|
|
89
88
|
};
|
|
90
89
|
|
|
@@ -92,20 +91,20 @@ const trustedDomains = {
|
|
|
92
91
|
// Ideal to hide refresh token from client JavaScript, but to retrieve access_token for some
|
|
93
92
|
// scenarios which require it. For example, to send it via websocket connection.
|
|
94
93
|
trustedDomains.config_show_access_token = {
|
|
95
|
-
oidcDomains
|
|
96
|
-
accessTokenDomains
|
|
94
|
+
oidcDomains: ['https://demo.duendesoftware.com'],
|
|
95
|
+
accessTokenDomains: ['https://www.myapi.com/users'],
|
|
97
96
|
showAccessToken: false,
|
|
98
97
|
// convertAllRequestsToCorsExceptNavigate: false, // default value is false
|
|
99
98
|
// setAccessTokenToNavigateRequests: true, // default value is true
|
|
100
99
|
};
|
|
101
100
|
|
|
102
101
|
// DPoP (Demonstrating Proof of Possession) will be activated for the following domains
|
|
103
|
-
trustedDomains.config_with_dpop = {
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
102
|
+
trustedDomains.config_with_dpop = {
|
|
103
|
+
domains: ['https://demo.duendesoftware.com'],
|
|
104
|
+
demonstratingProofOfPossession: true,
|
|
105
|
+
demonstratingProofOfPossessionOnlyWhenDpopHeaderPresent: true, // default value is false, inject DPOP token only when DPOP header is present
|
|
106
|
+
// Optional, more details bellow
|
|
107
|
+
/*demonstratingProofOfPossessionConfiguration: {
|
|
109
108
|
importKeyAlgorithm: {
|
|
110
109
|
name: 'ECDSA',
|
|
111
110
|
namedCurve: 'P-256',
|
|
@@ -123,16 +122,16 @@ trustedDomains.config_with_dpop = {
|
|
|
123
122
|
|
|
124
123
|
// Setting allowMultiTabLogin to true will enable storing login-specific parameters (state, nonce, code verifier)
|
|
125
124
|
// separately for each tab. This will prevent errors when logins are initiated from multiple tabs.
|
|
126
|
-
trustedDomains.config_multi_tab_login = {
|
|
127
|
-
|
|
128
|
-
|
|
125
|
+
trustedDomains.config_multi_tab_login = {
|
|
126
|
+
domains: ['https://demo.duendesoftware.com'],
|
|
127
|
+
allowMultiTabLogin: true,
|
|
129
128
|
};
|
|
130
129
|
```
|
|
131
130
|
|
|
132
131
|
The code of the demo :
|
|
133
132
|
|
|
134
133
|
```js
|
|
135
|
-
import {OidcClient} from '@axa-fr/oidc-client'
|
|
134
|
+
import { OidcClient } from '@axa-fr/oidc-client';
|
|
136
135
|
|
|
137
136
|
export const configuration = {
|
|
138
137
|
client_id: 'interactive.public.short',
|
|
@@ -142,7 +141,7 @@ export const configuration = {
|
|
|
142
141
|
authority: 'https://demo.duendesoftware.com',
|
|
143
142
|
service_worker_relative_url: '/OidcServiceWorker.js', // just comment that line to disable service worker mode
|
|
144
143
|
service_worker_only: false,
|
|
145
|
-
demonstrating_proof_of_possession: false,
|
|
144
|
+
demonstrating_proof_of_possession: false,
|
|
146
145
|
};
|
|
147
146
|
|
|
148
147
|
const href = window.location.href;
|
|
@@ -155,14 +154,12 @@ const oidcFetch = oidcClient.fetchWithTokens(fetch);
|
|
|
155
154
|
// import {OidcLocation} from '@axa-fr/oidc-client'
|
|
156
155
|
// const oidcClient = OidcClient.getOrCreate(() => fetch, new OidcLocation())(configuration);
|
|
157
156
|
|
|
158
|
-
|
|
159
|
-
|
|
160
157
|
console.log(href);
|
|
161
158
|
|
|
162
159
|
oidcClient.tryKeepExistingSessionAsync().then(() => {
|
|
163
160
|
if (href.includes(configuration.redirect_uri)) {
|
|
164
161
|
oidcClient.loginCallbackAsync().then(() => {
|
|
165
|
-
window.location.href =
|
|
162
|
+
window.location.href = '/';
|
|
166
163
|
});
|
|
167
164
|
document.body.innerHTML = `<div>
|
|
168
165
|
<h1>@axa-fr/oidc-client demo</h1>
|
|
@@ -174,7 +171,6 @@ oidcClient.tryKeepExistingSessionAsync().then(() => {
|
|
|
174
171
|
let tokens = oidcClient.tokens;
|
|
175
172
|
|
|
176
173
|
if (tokens) {
|
|
177
|
-
|
|
178
174
|
// @ts-ignore
|
|
179
175
|
window.logout = () => oidcClient.logoutAsync();
|
|
180
176
|
document.body.innerHTML = `<div>
|
|
@@ -182,19 +178,16 @@ oidcClient.tryKeepExistingSessionAsync().then(() => {
|
|
|
182
178
|
<button onclick="window.logout()">Logout</button>
|
|
183
179
|
<h2>Authenticated</h2>
|
|
184
180
|
<pre>${JSON.stringify(tokens, null, '\t')}</pre>
|
|
185
|
-
</div
|
|
186
|
-
|
|
181
|
+
</div>`;
|
|
187
182
|
} else {
|
|
188
183
|
// @ts-ignore
|
|
189
|
-
window.login = () => oidcClient.loginAsync(
|
|
184
|
+
window.login = () => oidcClient.loginAsync('/');
|
|
190
185
|
document.body.innerHTML = `<div>
|
|
191
186
|
<h1>@axa-fr/oidc-client demo</h1>
|
|
192
187
|
<button onclick="window.login()">Login</button>
|
|
193
|
-
</div
|
|
188
|
+
</div>`;
|
|
194
189
|
}
|
|
195
|
-
})
|
|
196
|
-
|
|
197
|
-
|
|
190
|
+
});
|
|
198
191
|
```
|
|
199
192
|
|
|
200
193
|
## Configuration
|
|
@@ -345,7 +338,7 @@ export class OidcClient {
|
|
|
345
338
|
/**
|
|
346
339
|
* Starts the OIDC logout process with specified options.
|
|
347
340
|
* @param callbackPathOrUrl The callback path or URL to use after logout.
|
|
348
|
-
* @param extras Additional parameters to send to the OIDC server during the logout request.
|
|
341
|
+
* @param extras Additional parameters to send to the OIDC server during the logout request.
|
|
349
342
|
* {"no_reload:oidc":"true"} to avoid the page reload after logout.
|
|
350
343
|
* you can add extras like {"client_secret:revoke_refresh_token":"secret"} to revoke the refresh token with extra client secret. Any key ending with ":revoke_refresh_token" will be used to revoke the refresh token.
|
|
351
344
|
* you can add extras like {"client_secret:revoke_access_token":"secret"} to revoke the access token with extra client secret. Any key ending with ":revoke_access_token" will be used to revoke the access token.
|
|
@@ -451,14 +444,13 @@ More information about OIDC
|
|
|
451
444
|
|
|
452
445
|
```javascript
|
|
453
446
|
export const configurationIdentityServerWithHash = {
|
|
454
|
-
client_id:
|
|
455
|
-
redirect_uri: window.location.origin +
|
|
456
|
-
silent_redirect_uri:
|
|
457
|
-
|
|
458
|
-
|
|
459
|
-
authority: "https://demo.duendesoftware.com",
|
|
447
|
+
client_id: 'interactive.public.short',
|
|
448
|
+
redirect_uri: window.location.origin + '#authentication-callback',
|
|
449
|
+
silent_redirect_uri: window.location.origin + '#authentication-silent-callback',
|
|
450
|
+
scope: 'openid profile email api offline_access',
|
|
451
|
+
authority: 'https://demo.duendesoftware.com',
|
|
460
452
|
refresh_time_before_tokens_expiration_in_second: 70,
|
|
461
|
-
service_worker_relative_url:
|
|
453
|
+
service_worker_relative_url: '/OidcServiceWorker.js',
|
|
462
454
|
service_worker_only: false,
|
|
463
455
|
};
|
|
464
456
|
```
|
|
@@ -1,18 +1,19 @@
|
|
|
1
|
-
|
|
1
|
+
/* global console, process */
|
|
2
|
+
/* eslint no-console: "off" */
|
|
2
3
|
import fs from 'fs';
|
|
4
|
+
import path from 'path';
|
|
3
5
|
import { fileURLToPath } from 'url';
|
|
4
6
|
|
|
5
7
|
try {
|
|
6
|
-
|
|
7
8
|
/**
|
|
8
9
|
* Script to run after npm install
|
|
9
10
|
*
|
|
10
11
|
* Copy selected files to user's directory
|
|
11
12
|
*/
|
|
12
|
-
const script_prefix= 'oidc-client';
|
|
13
|
+
const script_prefix = 'oidc-client';
|
|
13
14
|
|
|
14
15
|
const copyFile = async (src, dest, overwrite) => {
|
|
15
|
-
if(!fileExists(src)) {
|
|
16
|
+
if (!fileExists(src)) {
|
|
16
17
|
console.log(`[${script_prefix}:skip] file does not exist ${src}`);
|
|
17
18
|
return false;
|
|
18
19
|
}
|
|
@@ -24,17 +25,24 @@ try {
|
|
|
24
25
|
}
|
|
25
26
|
await fs.promises.copyFile(src, dest);
|
|
26
27
|
console.log(`[${script_prefix}:copy] ${dest}`);
|
|
27
|
-
return true
|
|
28
|
+
return true;
|
|
28
29
|
};
|
|
29
30
|
|
|
30
|
-
const fileExists =
|
|
31
|
+
const fileExists = path => {
|
|
31
32
|
return !!fs.existsSync(path);
|
|
32
33
|
};
|
|
33
34
|
|
|
34
35
|
const initPath = process.cwd();
|
|
35
36
|
const __dirname = path.dirname(fileURLToPath(import.meta.url));
|
|
36
|
-
const srcDir = path.join(__dirname,
|
|
37
|
-
const srcDirFallback = path.join(
|
|
37
|
+
const srcDir = path.join(__dirname, '..', '..', 'oidc-client-service-worker', 'dist');
|
|
38
|
+
const srcDirFallback = path.join(
|
|
39
|
+
__dirname,
|
|
40
|
+
'..',
|
|
41
|
+
'node_modules',
|
|
42
|
+
'@axa-fr',
|
|
43
|
+
'oidc-client-service-worker',
|
|
44
|
+
'dist',
|
|
45
|
+
);
|
|
38
46
|
const destinationFolder = process.argv.length >= 3 ? process.argv[2] : 'public';
|
|
39
47
|
const destinationDir = path.join(initPath, destinationFolder);
|
|
40
48
|
|
|
@@ -51,19 +59,18 @@ try {
|
|
|
51
59
|
|
|
52
60
|
for await (const file of files) {
|
|
53
61
|
const success = await copyFile(
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
62
|
+
path.join(srcDir, file.fileName),
|
|
63
|
+
path.join(destinationDir, file.fileName),
|
|
64
|
+
file.overwrite,
|
|
57
65
|
);
|
|
58
|
-
if(!success){
|
|
66
|
+
if (!success) {
|
|
59
67
|
await copyFile(
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
68
|
+
path.join(srcDirFallback, file.fileName),
|
|
69
|
+
path.join(destinationDir, file.fileName),
|
|
70
|
+
file.overwrite,
|
|
63
71
|
);
|
|
64
72
|
}
|
|
65
73
|
}
|
|
66
|
-
|
|
67
74
|
} catch (err) {
|
|
68
75
|
console.warn(err);
|
|
69
|
-
}
|
|
76
|
+
}
|
|
@@ -5,23 +5,25 @@
|
|
|
5
5
|
// Domains used by OIDC server must be also declared here
|
|
6
6
|
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
|
7
7
|
const trustedDomains = {
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
8
|
+
default: ['https://demo.duendesoftware.com', 'https://kdhttps.auth0.com'],
|
|
9
|
+
config_classic: ['https://demo.duendesoftware.com'],
|
|
10
|
+
config_without_silent_login: ['https://demo.duendesoftware.com'],
|
|
11
|
+
config_without_refresh_token: ['https://demo.duendesoftware.com'],
|
|
12
|
+
config_without_refresh_token_silent_login: ['https://demo.duendesoftware.com'],
|
|
13
|
+
config_google: ['https://oauth2.googleapis.com', 'https://openidconnect.googleapis.com'],
|
|
14
|
+
config_with_hash: ['https://demo.duendesoftware.com'],
|
|
15
15
|
};
|
|
16
16
|
|
|
17
17
|
// Service worker will continue to give access token to the JavaScript client
|
|
18
18
|
// Ideal to hide refresh token from client JavaScript, but to retrieve access_token for some
|
|
19
19
|
// scenarios which require it. For example, to send it via websocket connection.
|
|
20
|
-
trustedDomains.config_show_access_token = {
|
|
21
|
-
|
|
20
|
+
trustedDomains.config_show_access_token = {
|
|
21
|
+
domains: ['https://demo.duendesoftware.com'],
|
|
22
|
+
showAccessToken: true,
|
|
23
|
+
};
|
|
22
24
|
|
|
23
25
|
// This example defines domains used by OIDC server separately from domains to which access tokens will be injected.
|
|
24
26
|
trustedDomains.config_separate_oidc_access_token_domains = {
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
};
|
|
27
|
+
oidcDomains: ['https://demo.duendesoftware.com'],
|
|
28
|
+
accessTokenDomains: ['https://myapi'],
|
|
29
|
+
};
|
package/dist/cache.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"cache.d.ts","sourceRoot":"","sources":["../src/cache.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,YAAY,
|
|
1
|
+
{"version":3,"file":"cache.d.ts","sourceRoot":"","sources":["../src/cache.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,YAAY,uEAkBxB,CAAC;AAEF,eAAO,MAAM,QAAQ,gEAMpB,CAAC"}
|
package/dist/checkSession.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { CheckSessionIFrame } from './checkSessionIFrame.js';
|
|
2
|
-
import { OidcConfiguration } from './types.js';
|
|
3
2
|
import { default as Oidc } from './oidc';
|
|
3
|
+
import { OidcConfiguration } from './types.js';
|
|
4
4
|
|
|
5
5
|
export declare const startCheckSessionAsync: (oidc: Oidc, oidcDatabase: any, configuration: OidcConfiguration) => (checkSessionIFrameUri: any, clientId: any, sessionState: any, isSilentSignin?: boolean) => Promise<CheckSessionIFrame>;
|
|
6
6
|
//# sourceMappingURL=checkSession.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"checkSession.d.ts","sourceRoot":"","sources":["../src/checkSession.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;
|
|
1
|
+
{"version":3,"file":"checkSession.d.ts","sourceRoot":"","sources":["../src/checkSession.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAC7D,OAAO,IAAI,MAAM,QAAQ,CAAC;AAE1B,OAAO,EAAE,iBAAiB,EAAE,MAAM,YAAY,CAAC;AAE/C,eAAO,MAAM,sBAAsB,SAC1B,IAAI,gBAAgB,GAAG,iBAAiB,iBAAiB,4HA4F/D,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"checkSessionIFrame.d.ts","sourceRoot":"","sources":["../src/checkSessionIFrame.ts"],"names":[],"mappings":"AAIA,qBAAa,kBAAkB;
|
|
1
|
+
{"version":3,"file":"checkSessionIFrame.d.ts","sourceRoot":"","sources":["../src/checkSessionIFrame.ts"],"names":[],"mappings":"AAIA,qBAAa,kBAAkB;IAC7B,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAM;IACjC,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAM;IAChC,OAAO,CAAC,IAAI,CAAM;IAClB,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAS;IACnC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAU;IACvC,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAS;IACvC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAoB;IAC3C,OAAO,CAAC,kBAAkB,CAAM;IAChC,OAAO,CAAC,MAAM,CAAS;gBACX,QAAQ,KAAA,EAAE,SAAS,KAAA,EAAE,GAAG,KAAA,EAAE,QAAQ,SAAkB,EAAE,WAAW,UAAO;IAoBpF,IAAI;IAWJ,QAAQ,CAAC,CAAC,KAAA;IAkBV,KAAK,CAAC,aAAa,KAAA;IAanB,IAAI;CAOL"}
|
package/dist/crypto.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AAkBA,eAAO,MAAM,cAAc,SAAU,MAAM,WAY1C,CAAC;AAEF,wBAAgB,cAAc,CAAC,GAAG,EAAE,MAAM,cAQzC;AAED,wBAAgB,mCAAmC,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CASjF;AAED,eAAO,MAAM,oBAAoB,SAAU,MAAM,KAAG,QAAQ,MAAM,CAUjE,CAAC"}
|
package/dist/fetch.d.ts
CHANGED
|
@@ -1,4 +1,5 @@
|
|
|
1
|
+
import { default as Oidc } from './oidc';
|
|
1
2
|
import { Fetch } from './types';
|
|
2
3
|
|
|
3
|
-
export declare const fetchWithTokens: (fetch: Fetch,
|
|
4
|
+
export declare const fetchWithTokens: (fetch: Fetch, oidc: Oidc | null, demonstrating_proof_of_possession?: boolean) => Fetch;
|
|
4
5
|
//# sourceMappingURL=fetch.d.ts.map
|
package/dist/fetch.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"fetch.d.ts","sourceRoot":"","sources":["../src/fetch.ts"],"names":[],"mappings":"AAAA,OAAO,EAAC,KAAK,
|
|
1
|
+
{"version":3,"file":"fetch.d.ts","sourceRoot":"","sources":["../src/fetch.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,QAAQ,CAAC;AAE1B,OAAO,EAAC,KAAK,EAAqC,MAAM,SAAS,CAAC;AAGlE,eAAO,MAAM,eAAe,UAEjB,KAAK,QACN,IAAI,GAAG,IAAI,sCACkB,OAAO,KACzC,KA6CF,CAAC"}
|
package/dist/index.d.ts
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
|
+
export type { ILOidcLocation } from './location.js';
|
|
2
|
+
export { OidcLocation } from './location.js';
|
|
1
3
|
export { getFetchDefault } from './oidc.js';
|
|
4
|
+
export type { OidcUserInfo } from './oidcClient.js';
|
|
5
|
+
export { OidcClient } from './oidcClient.js';
|
|
6
|
+
export type { Tokens } from './parseTokens.js';
|
|
2
7
|
export { TokenRenewMode } from './parseTokens.js';
|
|
3
8
|
export { getParseQueryStringFromLocation, getPath } from './route-utils';
|
|
4
|
-
export type { Tokens } from './parseTokens.js';
|
|
5
9
|
export type { AuthorityConfiguration, Fetch, OidcConfiguration, StringMap } from './types.js';
|
|
6
|
-
export { OidcLocation } from './location.js';
|
|
7
|
-
export type { ILOidcLocation } from './location.js';
|
|
8
10
|
export { TokenAutomaticRenewMode } from './types.js';
|
|
9
|
-
export { OidcClient } from './oidcClient.js';
|
|
10
|
-
export type { OidcUserInfo } from './oidcClient.js';
|
|
11
11
|
//# sourceMappingURL=index.d.ts.map
|
package/dist/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,YAAY,EAAE,cAAc,EAAE,MAAM,eAAe,CAAC;AACpD,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAC7C,OAAO,EAAE,eAAe,EAAE,MAAM,WAAW,CAAC;AAC5C,YAAY,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAC;AACpD,OAAO,EAAE,UAAU,EAAE,MAAM,iBAAiB,CAAC;AAC7C,YAAY,EAAE,MAAM,EAAE,MAAM,kBAAkB,CAAC;AAC/C,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,+BAA+B,EAAE,OAAO,EAAE,MAAM,eAAe,CAAC;AACzE,YAAY,EAAE,sBAAsB,EAAE,KAAK,EAAE,iBAAiB,EAAE,SAAS,EAAE,MAAM,YAAY,CAAC;AAC9F,OAAO,EAAE,uBAAuB,EAAE,MAAM,YAAY,CAAC"}
|