@axa-fr/oidc-client 7.22.18 → 7.22.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (73) hide show
  1. package/README.md +31 -39
  2. package/bin/copy-service-worker-files.mjs +24 -17
  3. package/dist/OidcTrustedDomains.js +14 -12
  4. package/dist/cache.d.ts.map +1 -1
  5. package/dist/checkSession.d.ts +1 -1
  6. package/dist/checkSession.d.ts.map +1 -1
  7. package/dist/checkSessionIFrame.d.ts.map +1 -1
  8. package/dist/crypto.d.ts.map +1 -1
  9. package/dist/fetch.d.ts +2 -1
  10. package/dist/fetch.d.ts.map +1 -1
  11. package/dist/index.d.ts +5 -5
  12. package/dist/index.d.ts.map +1 -1
  13. package/dist/index.js +935 -601
  14. package/dist/index.umd.cjs +2 -2
  15. package/dist/initSession.d.ts +1 -1
  16. package/dist/initSession.d.ts.map +1 -1
  17. package/dist/initWorker.d.ts +2 -2
  18. package/dist/initWorker.d.ts.map +1 -1
  19. package/dist/initWorkerOption.d.ts.map +1 -1
  20. package/dist/jwt.d.ts +2 -2
  21. package/dist/jwt.d.ts.map +1 -1
  22. package/dist/keepSession.d.ts.map +1 -1
  23. package/dist/location.d.ts.map +1 -1
  24. package/dist/login.d.ts +1 -1
  25. package/dist/login.d.ts.map +1 -1
  26. package/dist/logout.d.ts +1 -1
  27. package/dist/logout.d.ts.map +1 -1
  28. package/dist/oidc.d.ts +1 -1
  29. package/dist/oidc.d.ts.map +1 -1
  30. package/dist/oidcClient.d.ts +2 -2
  31. package/dist/oidcClient.d.ts.map +1 -1
  32. package/dist/parseTokens.d.ts.map +1 -1
  33. package/dist/renewTokens.d.ts.map +1 -1
  34. package/dist/requests.d.ts +1 -1
  35. package/dist/requests.d.ts.map +1 -1
  36. package/dist/silentLogin.d.ts.map +1 -1
  37. package/dist/timer.d.ts.map +1 -1
  38. package/dist/types.d.ts +1 -1
  39. package/dist/types.d.ts.map +1 -1
  40. package/dist/user.d.ts.map +1 -1
  41. package/dist/version.d.ts +1 -1
  42. package/package.json +2 -2
  43. package/src/cache.ts +21 -18
  44. package/src/checkSession.ts +89 -54
  45. package/src/checkSessionIFrame.ts +70 -69
  46. package/src/crypto.ts +27 -25
  47. package/src/events.ts +28 -28
  48. package/src/fetch.ts +40 -21
  49. package/src/index.ts +6 -17
  50. package/src/iniWorker.spec.ts +26 -16
  51. package/src/initSession.ts +115 -113
  52. package/src/initWorker.ts +299 -212
  53. package/src/initWorkerOption.ts +121 -114
  54. package/src/jwt.ts +150 -136
  55. package/src/keepSession.ts +100 -81
  56. package/src/location.ts +24 -26
  57. package/src/login.ts +246 -189
  58. package/src/logout.spec.ts +131 -76
  59. package/src/logout.ts +130 -115
  60. package/src/oidc.ts +426 -337
  61. package/src/oidcClient.ts +129 -105
  62. package/src/parseTokens.spec.ts +198 -179
  63. package/src/parseTokens.ts +221 -186
  64. package/src/renewTokens.ts +397 -284
  65. package/src/requests.spec.ts +5 -7
  66. package/src/requests.ts +142 -114
  67. package/src/route-utils.spec.ts +17 -19
  68. package/src/route-utils.ts +29 -26
  69. package/src/silentLogin.ts +145 -127
  70. package/src/timer.ts +10 -11
  71. package/src/types.ts +56 -46
  72. package/src/user.ts +17 -12
  73. package/src/version.ts +1 -1
package/README.md CHANGED
@@ -24,15 +24,14 @@ We provide a wrapper **@axa-fr/react-oidc** for **React** (compatible next.js) a
24
24
  - [Hash route](#Hash-route)
25
25
  - [Service Worker Support](#service-worker-support)
26
26
 
27
-
28
27
  ## About
29
28
 
30
29
  @axa-fr/oidc-client is:
31
30
 
32
31
  - **Secure** :
33
- - With Demonstrating Proof of Possession (DPoP), your access_token and refresh_token are not usable outside your browser context (big protection)
34
- - With the use of Service Worker, your tokens (refresh_token and/or access_token) are not accessible to the JavaScript client code (if you follow good practices from [`FAQ`](https://github.com/AxaFrance/oidc-client/blob/main/FAQ.md) section)
35
- - OIDC using client side Code Credential Grant with pkce only
32
+ - With Demonstrating Proof of Possession (DPoP), your access_token and refresh_token are not usable outside your browser context (big protection)
33
+ - With the use of Service Worker, your tokens (refresh_token and/or access_token) are not accessible to the JavaScript client code (if you follow good practices from [`FAQ`](https://github.com/AxaFrance/oidc-client/blob/main/FAQ.md) section)
34
+ - OIDC using client side Code Credential Grant with pkce only
36
35
  - **Lightweight** : Unpacked Size on npm is **274 kB**
37
36
  - **Simple**
38
37
  - refresh_token and access_token are auto refreshed in background
@@ -48,7 +47,6 @@ We provide a wrapper **@axa-fr/react-oidc** for **React** (compatible next.js) a
48
47
 
49
48
  The service worker catch **access_token** and **refresh_token** that will never be accessible to the client.
50
49
 
51
-
52
50
  ### Getting Started
53
51
 
54
52
  ```sh
@@ -63,6 +61,7 @@ node ./node_modules/@axa-fr/oidc-client/bin/copy-service-worker-files.mjs public
63
61
  ```
64
62
 
65
63
  WARNING : If you use Service Worker mode, the OidcServiceWorker.js file should always be up to date with the version of the library. You may setup a postinstall script in your package.json file to update it at each npm install. For example :
64
+
66
65
  ```sh
67
66
  "scripts": {
68
67
  ...
@@ -83,8 +82,8 @@ The only file you should edit is "OidcTrustedDomains.js".
83
82
  // Domains used by OIDC server must be also declared here
84
83
  const trustedDomains = {
85
84
  default: {
86
- oidcDomains :["https://demo.duendesoftware.com"],
87
- accessTokenDomains : ["https://www.myapi.com/users"]
85
+ oidcDomains: ['https://demo.duendesoftware.com'],
86
+ accessTokenDomains: ['https://www.myapi.com/users'],
88
87
  },
89
88
  };
90
89
 
@@ -92,20 +91,20 @@ const trustedDomains = {
92
91
  // Ideal to hide refresh token from client JavaScript, but to retrieve access_token for some
93
92
  // scenarios which require it. For example, to send it via websocket connection.
94
93
  trustedDomains.config_show_access_token = {
95
- oidcDomains :["https://demo.duendesoftware.com"],
96
- accessTokenDomains : ["https://www.myapi.com/users"],
94
+ oidcDomains: ['https://demo.duendesoftware.com'],
95
+ accessTokenDomains: ['https://www.myapi.com/users'],
97
96
  showAccessToken: false,
98
97
  // convertAllRequestsToCorsExceptNavigate: false, // default value is false
99
98
  // setAccessTokenToNavigateRequests: true, // default value is true
100
99
  };
101
100
 
102
101
  // DPoP (Demonstrating Proof of Possession) will be activated for the following domains
103
- trustedDomains.config_with_dpop = {
104
- domains: ["https://demo.duendesoftware.com"],
105
- demonstratingProofOfPossession: true,
106
- demonstratingProofOfPossessionOnlyWhenDpopHeaderPresent: true, // default value is false, inject DPOP token only when DPOP header is present
107
- // Optional, more details bellow
108
- /*demonstratingProofOfPossessionConfiguration: {
102
+ trustedDomains.config_with_dpop = {
103
+ domains: ['https://demo.duendesoftware.com'],
104
+ demonstratingProofOfPossession: true,
105
+ demonstratingProofOfPossessionOnlyWhenDpopHeaderPresent: true, // default value is false, inject DPOP token only when DPOP header is present
106
+ // Optional, more details bellow
107
+ /*demonstratingProofOfPossessionConfiguration: {
109
108
  importKeyAlgorithm: {
110
109
  name: 'ECDSA',
111
110
  namedCurve: 'P-256',
@@ -123,16 +122,16 @@ trustedDomains.config_with_dpop = {
123
122
 
124
123
  // Setting allowMultiTabLogin to true will enable storing login-specific parameters (state, nonce, code verifier)
125
124
  // separately for each tab. This will prevent errors when logins are initiated from multiple tabs.
126
- trustedDomains.config_multi_tab_login = {
127
- domains: ["https://demo.duendesoftware.com"],
128
- allowMultiTabLogin: true
125
+ trustedDomains.config_multi_tab_login = {
126
+ domains: ['https://demo.duendesoftware.com'],
127
+ allowMultiTabLogin: true,
129
128
  };
130
129
  ```
131
130
 
132
131
  The code of the demo :
133
132
 
134
133
  ```js
135
- import {OidcClient} from '@axa-fr/oidc-client'
134
+ import { OidcClient } from '@axa-fr/oidc-client';
136
135
 
137
136
  export const configuration = {
138
137
  client_id: 'interactive.public.short',
@@ -142,7 +141,7 @@ export const configuration = {
142
141
  authority: 'https://demo.duendesoftware.com',
143
142
  service_worker_relative_url: '/OidcServiceWorker.js', // just comment that line to disable service worker mode
144
143
  service_worker_only: false,
145
- demonstrating_proof_of_possession: false,
144
+ demonstrating_proof_of_possession: false,
146
145
  };
147
146
 
148
147
  const href = window.location.href;
@@ -155,14 +154,12 @@ const oidcFetch = oidcClient.fetchWithTokens(fetch);
155
154
  // import {OidcLocation} from '@axa-fr/oidc-client'
156
155
  // const oidcClient = OidcClient.getOrCreate(() => fetch, new OidcLocation())(configuration);
157
156
 
158
-
159
-
160
157
  console.log(href);
161
158
 
162
159
  oidcClient.tryKeepExistingSessionAsync().then(() => {
163
160
  if (href.includes(configuration.redirect_uri)) {
164
161
  oidcClient.loginCallbackAsync().then(() => {
165
- window.location.href = "/";
162
+ window.location.href = '/';
166
163
  });
167
164
  document.body.innerHTML = `<div>
168
165
  <h1>@axa-fr/oidc-client demo</h1>
@@ -174,7 +171,6 @@ oidcClient.tryKeepExistingSessionAsync().then(() => {
174
171
  let tokens = oidcClient.tokens;
175
172
 
176
173
  if (tokens) {
177
-
178
174
  // @ts-ignore
179
175
  window.logout = () => oidcClient.logoutAsync();
180
176
  document.body.innerHTML = `<div>
@@ -182,19 +178,16 @@ oidcClient.tryKeepExistingSessionAsync().then(() => {
182
178
  <button onclick="window.logout()">Logout</button>
183
179
  <h2>Authenticated</h2>
184
180
  <pre>${JSON.stringify(tokens, null, '\t')}</pre>
185
- </div>`
186
-
181
+ </div>`;
187
182
  } else {
188
183
  // @ts-ignore
189
- window.login = () => oidcClient.loginAsync("/");
184
+ window.login = () => oidcClient.loginAsync('/');
190
185
  document.body.innerHTML = `<div>
191
186
  <h1>@axa-fr/oidc-client demo</h1>
192
187
  <button onclick="window.login()">Login</button>
193
- </div>`
188
+ </div>`;
194
189
  }
195
- })
196
-
197
-
190
+ });
198
191
  ```
199
192
 
200
193
  ## Configuration
@@ -345,7 +338,7 @@ export class OidcClient {
345
338
  /**
346
339
  * Starts the OIDC logout process with specified options.
347
340
  * @param callbackPathOrUrl The callback path or URL to use after logout.
348
- * @param extras Additional parameters to send to the OIDC server during the logout request.
341
+ * @param extras Additional parameters to send to the OIDC server during the logout request.
349
342
  * {"no_reload:oidc":"true"} to avoid the page reload after logout.
350
343
  * you can add extras like {"client_secret:revoke_refresh_token":"secret"} to revoke the refresh token with extra client secret. Any key ending with ":revoke_refresh_token" will be used to revoke the refresh token.
351
344
  * you can add extras like {"client_secret:revoke_access_token":"secret"} to revoke the access token with extra client secret. Any key ending with ":revoke_access_token" will be used to revoke the access token.
@@ -451,14 +444,13 @@ More information about OIDC
451
444
 
452
445
  ```javascript
453
446
  export const configurationIdentityServerWithHash = {
454
- client_id: "interactive.public.short",
455
- redirect_uri: window.location.origin + "#authentication-callback",
456
- silent_redirect_uri:
457
- window.location.origin + "#authentication-silent-callback",
458
- scope: "openid profile email api offline_access",
459
- authority: "https://demo.duendesoftware.com",
447
+ client_id: 'interactive.public.short',
448
+ redirect_uri: window.location.origin + '#authentication-callback',
449
+ silent_redirect_uri: window.location.origin + '#authentication-silent-callback',
450
+ scope: 'openid profile email api offline_access',
451
+ authority: 'https://demo.duendesoftware.com',
460
452
  refresh_time_before_tokens_expiration_in_second: 70,
461
- service_worker_relative_url: "/OidcServiceWorker.js",
453
+ service_worker_relative_url: '/OidcServiceWorker.js',
462
454
  service_worker_only: false,
463
455
  };
464
456
  ```
@@ -1,18 +1,19 @@
1
- import path from 'path';
1
+ /* global console, process */
2
+ /* eslint no-console: "off" */
2
3
  import fs from 'fs';
4
+ import path from 'path';
3
5
  import { fileURLToPath } from 'url';
4
6
 
5
7
  try {
6
-
7
8
  /**
8
9
  * Script to run after npm install
9
10
  *
10
11
  * Copy selected files to user's directory
11
12
  */
12
- const script_prefix= 'oidc-client';
13
+ const script_prefix = 'oidc-client';
13
14
 
14
15
  const copyFile = async (src, dest, overwrite) => {
15
- if(!fileExists(src)) {
16
+ if (!fileExists(src)) {
16
17
  console.log(`[${script_prefix}:skip] file does not exist ${src}`);
17
18
  return false;
18
19
  }
@@ -24,17 +25,24 @@ try {
24
25
  }
25
26
  await fs.promises.copyFile(src, dest);
26
27
  console.log(`[${script_prefix}:copy] ${dest}`);
27
- return true
28
+ return true;
28
29
  };
29
30
 
30
- const fileExists = (path) => {
31
+ const fileExists = path => {
31
32
  return !!fs.existsSync(path);
32
33
  };
33
34
 
34
35
  const initPath = process.cwd();
35
36
  const __dirname = path.dirname(fileURLToPath(import.meta.url));
36
- const srcDir = path.join(__dirname, ".." , ".." ,'oidc-client-service-worker', 'dist');
37
- const srcDirFallback = path.join(__dirname, "..", 'node_modules', '@axa-fr' ,'oidc-client-service-worker', 'dist');
37
+ const srcDir = path.join(__dirname, '..', '..', 'oidc-client-service-worker', 'dist');
38
+ const srcDirFallback = path.join(
39
+ __dirname,
40
+ '..',
41
+ 'node_modules',
42
+ '@axa-fr',
43
+ 'oidc-client-service-worker',
44
+ 'dist',
45
+ );
38
46
  const destinationFolder = process.argv.length >= 3 ? process.argv[2] : 'public';
39
47
  const destinationDir = path.join(initPath, destinationFolder);
40
48
 
@@ -51,19 +59,18 @@ try {
51
59
 
52
60
  for await (const file of files) {
53
61
  const success = await copyFile(
54
- path.join(srcDir, file.fileName),
55
- path.join(destinationDir, file.fileName),
56
- file.overwrite
62
+ path.join(srcDir, file.fileName),
63
+ path.join(destinationDir, file.fileName),
64
+ file.overwrite,
57
65
  );
58
- if(!success){
66
+ if (!success) {
59
67
  await copyFile(
60
- path.join(srcDirFallback, file.fileName),
61
- path.join(destinationDir, file.fileName),
62
- file.overwrite
68
+ path.join(srcDirFallback, file.fileName),
69
+ path.join(destinationDir, file.fileName),
70
+ file.overwrite,
63
71
  );
64
72
  }
65
73
  }
66
-
67
74
  } catch (err) {
68
75
  console.warn(err);
69
- }
76
+ }
@@ -5,23 +5,25 @@
5
5
  // Domains used by OIDC server must be also declared here
6
6
  // eslint-disable-next-line @typescript-eslint/no-unused-vars
7
7
  const trustedDomains = {
8
- default: ['https://demo.duendesoftware.com', 'https://kdhttps.auth0.com'],
9
- config_classic: ['https://demo.duendesoftware.com'],
10
- config_without_silent_login: ['https://demo.duendesoftware.com'],
11
- config_without_refresh_token: ['https://demo.duendesoftware.com'],
12
- config_without_refresh_token_silent_login: ['https://demo.duendesoftware.com'],
13
- config_google: ['https://oauth2.googleapis.com', 'https://openidconnect.googleapis.com'],
14
- config_with_hash: ['https://demo.duendesoftware.com'],
8
+ default: ['https://demo.duendesoftware.com', 'https://kdhttps.auth0.com'],
9
+ config_classic: ['https://demo.duendesoftware.com'],
10
+ config_without_silent_login: ['https://demo.duendesoftware.com'],
11
+ config_without_refresh_token: ['https://demo.duendesoftware.com'],
12
+ config_without_refresh_token_silent_login: ['https://demo.duendesoftware.com'],
13
+ config_google: ['https://oauth2.googleapis.com', 'https://openidconnect.googleapis.com'],
14
+ config_with_hash: ['https://demo.duendesoftware.com'],
15
15
  };
16
16
 
17
17
  // Service worker will continue to give access token to the JavaScript client
18
18
  // Ideal to hide refresh token from client JavaScript, but to retrieve access_token for some
19
19
  // scenarios which require it. For example, to send it via websocket connection.
20
- trustedDomains.config_show_access_token = { domains : ["https://demo.duendesoftware.com"], showAccessToken: true };
21
-
20
+ trustedDomains.config_show_access_token = {
21
+ domains: ['https://demo.duendesoftware.com'],
22
+ showAccessToken: true,
23
+ };
22
24
 
23
25
  // This example defines domains used by OIDC server separately from domains to which access tokens will be injected.
24
26
  trustedDomains.config_separate_oidc_access_token_domains = {
25
- oidcDomains: ["https://demo.duendesoftware.com"],
26
- accessTokenDomains: ["https://myapi"]
27
- };
27
+ oidcDomains: ['https://demo.duendesoftware.com'],
28
+ accessTokenDomains: ['https://myapi'],
29
+ };
@@ -1 +1 @@
1
- {"version":3,"file":"cache.d.ts","sourceRoot":"","sources":["../src/cache.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,YAAY,uEAexB,CAAC;AAEF,eAAO,MAAM,QAAQ,gEAMpB,CAAC"}
1
+ {"version":3,"file":"cache.d.ts","sourceRoot":"","sources":["../src/cache.ts"],"names":[],"mappings":"AAEA,eAAO,MAAM,YAAY,uEAkBxB,CAAC;AAEF,eAAO,MAAM,QAAQ,gEAMpB,CAAC"}
@@ -1,6 +1,6 @@
1
1
  import { CheckSessionIFrame } from './checkSessionIFrame.js';
2
- import { OidcConfiguration } from './types.js';
3
2
  import { default as Oidc } from './oidc';
3
+ import { OidcConfiguration } from './types.js';
4
4
 
5
5
  export declare const startCheckSessionAsync: (oidc: Oidc, oidcDatabase: any, configuration: OidcConfiguration) => (checkSessionIFrameUri: any, clientId: any, sessionState: any, isSilentSignin?: boolean) => Promise<CheckSessionIFrame>;
6
6
  //# sourceMappingURL=checkSession.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"checkSession.d.ts","sourceRoot":"","sources":["../src/checkSession.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAE7D,OAAO,EAAE,iBAAiB,EAAE,MAAM,YAAY,CAAC;AAC/C,OAAO,IAAI,MAAM,QAAQ,CAAC;AAG1B,eAAO,MAAM,sBAAsB,SAAS,IAAI,gBAAe,GAAG,iBAAiB,iBAAiB,4HAyDnG,CAAC"}
1
+ {"version":3,"file":"checkSession.d.ts","sourceRoot":"","sources":["../src/checkSession.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,yBAAyB,CAAC;AAC7D,OAAO,IAAI,MAAM,QAAQ,CAAC;AAE1B,OAAO,EAAE,iBAAiB,EAAE,MAAM,YAAY,CAAC;AAE/C,eAAO,MAAM,sBAAsB,SAC1B,IAAI,gBAAgB,GAAG,iBAAiB,iBAAiB,4HA4F/D,CAAC"}
@@ -1 +1 @@
1
- {"version":3,"file":"checkSessionIFrame.d.ts","sourceRoot":"","sources":["../src/checkSessionIFrame.ts"],"names":[],"mappings":"AAIA,qBAAa,kBAAkB;IAC3B,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAM;IACjC,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAM;IAChC,OAAO,CAAC,IAAI,CAAM;IAClB,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAS;IACnC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAU;IACvC,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAS;IACvC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAoB;IAC3C,OAAO,CAAC,kBAAkB,CAAM;IAChC,OAAO,CAAC,MAAM,CAAS;gBACX,QAAQ,KAAA,EAAE,SAAS,KAAA,EAAE,GAAG,KAAA,EAAE,QAAQ,SAAkB,EAAE,WAAW,UAAO;IAoBpF,IAAI;IAWJ,QAAQ,CAAC,CAAC,KAAA;IAoBV,KAAK,CAAC,aAAa,KAAA;IAUnB,IAAI;CAOP"}
1
+ {"version":3,"file":"checkSessionIFrame.d.ts","sourceRoot":"","sources":["../src/checkSessionIFrame.ts"],"names":[],"mappings":"AAIA,qBAAa,kBAAkB;IAC7B,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAM;IACjC,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAM;IAChC,OAAO,CAAC,IAAI,CAAM;IAClB,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAS;IACnC,OAAO,CAAC,QAAQ,CAAC,YAAY,CAAU;IACvC,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAS;IACvC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAoB;IAC3C,OAAO,CAAC,kBAAkB,CAAM;IAChC,OAAO,CAAC,MAAM,CAAS;gBACX,QAAQ,KAAA,EAAE,SAAS,KAAA,EAAE,GAAG,KAAA,EAAE,QAAQ,SAAkB,EAAE,WAAW,UAAO;IAoBpF,IAAI;IAWJ,QAAQ,CAAC,CAAC,KAAA;IAkBV,KAAK,CAAC,aAAa,KAAA;IAanB,IAAI;CAOL"}
@@ -1 +1 @@
1
- {"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AAmBA,eAAO,MAAM,cAAc,SAAU,MAAM,WAYxC,CAAC;AAEJ,wBAAgB,cAAc,CAAC,GAAG,EAAE,MAAM,cAQzC;AAED,wBAAgB,mCAAmC,CAAC,IAAI,EAAE,MAAM,GAAE,OAAO,CAAC,MAAM,CAAC,CAMhF;AAED,eAAO,MAAM,oBAAoB,SAAU,MAAM,KAAG,QAAQ,MAAM,CAUjE,CAAC"}
1
+ {"version":3,"file":"crypto.d.ts","sourceRoot":"","sources":["../src/crypto.ts"],"names":[],"mappings":"AAkBA,eAAO,MAAM,cAAc,SAAU,MAAM,WAY1C,CAAC;AAEF,wBAAgB,cAAc,CAAC,GAAG,EAAE,MAAM,cAQzC;AAED,wBAAgB,mCAAmC,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CASjF;AAED,eAAO,MAAM,oBAAoB,SAAU,MAAM,KAAG,QAAQ,MAAM,CAUjE,CAAC"}
package/dist/fetch.d.ts CHANGED
@@ -1,4 +1,5 @@
1
+ import { default as Oidc } from './oidc';
1
2
  import { Fetch } from './types';
2
3
 
3
- export declare const fetchWithTokens: (fetch: Fetch, oidcClient: Oidc | null, demonstrating_proof_of_possession?: boolean) => Fetch;
4
+ export declare const fetchWithTokens: (fetch: Fetch, oidc: Oidc | null, demonstrating_proof_of_possession?: boolean) => Fetch;
4
5
  //# sourceMappingURL=fetch.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"fetch.d.ts","sourceRoot":"","sources":["../src/fetch.ts"],"names":[],"mappings":"AAAA,OAAO,EAAC,KAAK,EAAC,MAAM,SAAS,CAAC;AAK9B,eAAO,MAAM,eAAe,UAAW,KAAK,cAAc,IAAI,GAAG,IAAI,sCAAoC,OAAO,KAAU,KA+BzH,CAAC"}
1
+ {"version":3,"file":"fetch.d.ts","sourceRoot":"","sources":["../src/fetch.ts"],"names":[],"mappings":"AAAA,OAAO,IAAI,MAAM,QAAQ,CAAC;AAE1B,OAAO,EAAC,KAAK,EAAqC,MAAM,SAAS,CAAC;AAGlE,eAAO,MAAM,eAAe,UAEjB,KAAK,QACN,IAAI,GAAG,IAAI,sCACkB,OAAO,KACzC,KA6CF,CAAC"}
package/dist/index.d.ts CHANGED
@@ -1,11 +1,11 @@
1
+ export type { ILOidcLocation } from './location.js';
2
+ export { OidcLocation } from './location.js';
1
3
  export { getFetchDefault } from './oidc.js';
4
+ export type { OidcUserInfo } from './oidcClient.js';
5
+ export { OidcClient } from './oidcClient.js';
6
+ export type { Tokens } from './parseTokens.js';
2
7
  export { TokenRenewMode } from './parseTokens.js';
3
8
  export { getParseQueryStringFromLocation, getPath } from './route-utils';
4
- export type { Tokens } from './parseTokens.js';
5
9
  export type { AuthorityConfiguration, Fetch, OidcConfiguration, StringMap } from './types.js';
6
- export { OidcLocation } from './location.js';
7
- export type { ILOidcLocation } from './location.js';
8
10
  export { TokenAutomaticRenewMode } from './types.js';
9
- export { OidcClient } from './oidcClient.js';
10
- export type { OidcUserInfo } from './oidcClient.js';
11
11
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,eAAe,EAAE,MAAM,WAAW,CAAC;AAC5C,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,+BAA+B,EAAE,OAAO,EAAE,MAAM,eAAe,CAAC;AAEzE,YAAY,EACV,MAAM,EACP,MAAM,kBAAkB,CAAC;AAE1B,YAAY,EACV,sBAAsB,EACtB,KAAK,EACL,iBAAiB,EACjB,SAAS,EACV,MAAM,YAAY,CAAC;AAEpB,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAC7C,YAAY,EAAE,cAAc,EAAE,MAAM,eAAe,CAAC;AACpD,OAAO,EAAE,uBAAuB,EAAE,MAAM,YAAY,CAAC;AACrD,OAAO,EAAE,UAAU,EAAE,MAAM,iBAAiB,CAAC;AAC7C,YAAY,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,YAAY,EAAE,cAAc,EAAE,MAAM,eAAe,CAAC;AACpD,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAC7C,OAAO,EAAE,eAAe,EAAE,MAAM,WAAW,CAAC;AAC5C,YAAY,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAC;AACpD,OAAO,EAAE,UAAU,EAAE,MAAM,iBAAiB,CAAC;AAC7C,YAAY,EAAE,MAAM,EAAE,MAAM,kBAAkB,CAAC;AAC/C,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,+BAA+B,EAAE,OAAO,EAAE,MAAM,eAAe,CAAC;AACzE,YAAY,EAAE,sBAAsB,EAAE,KAAK,EAAE,iBAAiB,EAAE,SAAS,EAAE,MAAM,YAAY,CAAC;AAC9F,OAAO,EAAE,uBAAuB,EAAE,MAAM,YAAY,CAAC"}