@c8y/client 1020.20.0 → 1020.24.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/cjs/src/core/BearerAuth.d.ts +1 -0
- package/lib/cjs/src/core/BearerAuth.d.ts.map +1 -1
- package/lib/cjs/src/core/BearerAuth.js +8 -3
- package/lib/cjs/src/core/BearerAuth.js.map +1 -1
- package/lib/cjs/src/core/BearerAuthFromSessionStorage.d.ts +17 -0
- package/lib/cjs/src/core/BearerAuthFromSessionStorage.d.ts.map +1 -0
- package/lib/cjs/src/core/BearerAuthFromSessionStorage.js +44 -0
- package/lib/cjs/src/core/BearerAuthFromSessionStorage.js.map +1 -0
- package/lib/cjs/src/core/index.d.ts +1 -0
- package/lib/cjs/src/core/index.d.ts.map +1 -1
- package/lib/cjs/src/core/index.js +1 -0
- package/lib/cjs/src/core/index.js.map +1 -1
- package/lib/esm2015/src/core/BearerAuth.d.ts +1 -0
- package/lib/esm2015/src/core/BearerAuth.d.ts.map +1 -1
- package/lib/esm2015/src/core/BearerAuth.js +8 -3
- package/lib/esm2015/src/core/BearerAuth.js.map +1 -1
- package/lib/esm2015/src/core/BearerAuthFromSessionStorage.d.ts +17 -0
- package/lib/esm2015/src/core/BearerAuthFromSessionStorage.d.ts.map +1 -0
- package/lib/esm2015/src/core/BearerAuthFromSessionStorage.js +40 -0
- package/lib/esm2015/src/core/BearerAuthFromSessionStorage.js.map +1 -0
- package/lib/esm2015/src/core/index.d.ts +1 -0
- package/lib/esm2015/src/core/index.d.ts.map +1 -1
- package/lib/esm2015/src/core/index.js +1 -0
- package/lib/esm2015/src/core/index.js.map +1 -1
- package/lib/src/core/BearerAuth.d.ts +1 -0
- package/lib/src/core/BearerAuth.d.ts.map +1 -1
- package/lib/src/core/BearerAuthFromSessionStorage.d.ts +17 -0
- package/lib/src/core/BearerAuthFromSessionStorage.d.ts.map +1 -0
- package/lib/src/core/index.d.ts +1 -0
- package/lib/src/core/index.d.ts.map +1 -1
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"BearerAuth.d.ts","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAIhD,qBAAa,UAAW,YAAW,eAAe;gBACpC,KAAK,CAAC,EAAE,MAAM;
|
|
1
|
+
{"version":3,"file":"BearerAuth.d.ts","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAIhD,qBAAa,UAAW,YAAW,eAAe;gBACpC,KAAK,CAAC,EAAE,MAAM;IAI1B,eAAe,CAAC,OAAO,EAAE,aAAa,GAAG,aAAa;IAMtD,iBAAiB,CAAC,EAAE,KAAK,EAAE,EAAE,YAAY,GAAG,SAAS;IAKrD,kBAAkB,CAAC,MAAM,GAAE;QAAE,GAAG,CAAC,EAAE,GAAG,CAAA;KAAO;cAAV,GAAG;;IAUtC,MAAM,IAAI,IAAI;IAId,SAAS,CAAC,QAAQ,IAAI,MAAM,GAAG,SAAS;CAKzC"}
|
|
@@ -7,8 +7,7 @@ class BearerAuth {
|
|
|
7
7
|
secrets.set(this, { token });
|
|
8
8
|
}
|
|
9
9
|
getFetchOptions(options) {
|
|
10
|
-
const
|
|
11
|
-
const { token } = secret;
|
|
10
|
+
const token = this.getToken();
|
|
12
11
|
options.headers = Object.assign({ Authorization: `Bearer ${token}` }, options.headers);
|
|
13
12
|
return options;
|
|
14
13
|
}
|
|
@@ -18,7 +17,8 @@ class BearerAuth {
|
|
|
18
17
|
}
|
|
19
18
|
getCometdHandshake(config = {}) {
|
|
20
19
|
const secret = secrets.get(this);
|
|
21
|
-
const {
|
|
20
|
+
const { tfa } = secret;
|
|
21
|
+
const token = this.getToken();
|
|
22
22
|
const KEY = 'com.cumulocity.authn';
|
|
23
23
|
const ext = (config.ext = config.ext || {});
|
|
24
24
|
ext[KEY] = Object.assign(ext[KEY] || {}, { token, tfa });
|
|
@@ -27,6 +27,11 @@ class BearerAuth {
|
|
|
27
27
|
logout() {
|
|
28
28
|
secrets.set(this, {});
|
|
29
29
|
}
|
|
30
|
+
getToken() {
|
|
31
|
+
const secret = secrets.get(this);
|
|
32
|
+
const { token } = secret;
|
|
33
|
+
return token;
|
|
34
|
+
}
|
|
30
35
|
}
|
|
31
36
|
exports.BearerAuth = BearerAuth;
|
|
32
37
|
//# sourceMappingURL=BearerAuth.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"BearerAuth.js","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":";;;AAGA,MAAM,OAAO,GAAG,IAAI,OAAO,EAAE,CAAC;AAE9B,MAAa,UAAU;IACrB,YAAY,KAAc;QACxB,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAC/B,CAAC;
|
|
1
|
+
{"version":3,"file":"BearerAuth.js","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":";;;AAGA,MAAM,OAAO,GAAG,IAAI,OAAO,EAAE,CAAC;AAE9B,MAAa,UAAU;IACrB,YAAY,KAAc;QACxB,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAC/B,CAAC;IAED,eAAe,CAAC,OAAsB;QACpC,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC9B,OAAO,CAAC,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,aAAa,EAAE,UAAU,KAAK,EAAE,EAAE,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;QACvF,OAAO,OAAO,CAAC;IACjB,CAAC;IAED,iBAAiB,CAAC,EAAE,KAAK,EAAgB;QACvC,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;QAC7B,OAAO;IACT,CAAC;IAED,kBAAkB,CAAC,SAAwB,EAAE;QAC3C,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QACjC,MAAM,EAAE,GAAG,EAAE,GAAG,MAAM,CAAC;QACvB,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC9B,MAAM,GAAG,GAAG,sBAAsB,CAAC;QACnC,MAAM,GAAG,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,MAAM,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC;QAC5C,GAAG,CAAC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC,CAAC;QACzD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,MAAM;QACJ,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;IACxB,CAAC;IAES,QAAQ;QAChB,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QACjC,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,CAAC;QACzB,OAAO,KAAK,CAAC;IACf,CAAC;CACF;AAnCD,gCAmCC"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { BearerAuth } from './BearerAuth';
|
|
2
|
+
import { ICredentials } from './IAuthentication';
|
|
3
|
+
export declare class BearerAuthFromSessionStorage extends BearerAuth {
|
|
4
|
+
/**
|
|
5
|
+
* Key for the session storage used to retrieve the bearer token from.
|
|
6
|
+
*/
|
|
7
|
+
static readonly sessionStorageKey = "bearerAuthToken";
|
|
8
|
+
/**
|
|
9
|
+
* If the session storage key 'bearerAuthTokenKeep' is set to true, the token will be kept in session storage after it was found.
|
|
10
|
+
* Allows you to still refresh the page.
|
|
11
|
+
*/
|
|
12
|
+
static readonly sessionStorageKeyToKeepToken = "bearerAuthTokenKeep";
|
|
13
|
+
constructor(throwIfNoTokenPresent?: boolean);
|
|
14
|
+
updateCredentials({ token }: ICredentials): undefined;
|
|
15
|
+
protected getToken(): string | undefined;
|
|
16
|
+
}
|
|
17
|
+
//# sourceMappingURL=BearerAuthFromSessionStorage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"BearerAuthFromSessionStorage.d.ts","sourceRoot":"","sources":["../../../../src/core/BearerAuthFromSessionStorage.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC;AAC1C,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAEjD,qBAAa,4BAA6B,SAAQ,UAAU;IAC1D;;OAEG;IACH,MAAM,CAAC,QAAQ,CAAC,iBAAiB,qBAAqB;IACtD;;;OAGG;IACH,MAAM,CAAC,QAAQ,CAAC,4BAA4B,yBAAyB;gBACzD,qBAAqB,UAAO;IAQxC,iBAAiB,CAAC,EAAE,KAAK,EAAE,EAAE,YAAY,GAAG,SAAS;IAQrD,SAAS,CAAC,QAAQ,IAAI,MAAM,GAAG,SAAS;CAgBzC"}
|
|
@@ -0,0 +1,44 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.BearerAuthFromSessionStorage = void 0;
|
|
4
|
+
const BearerAuth_1 = require("./BearerAuth");
|
|
5
|
+
class BearerAuthFromSessionStorage extends BearerAuth_1.BearerAuth {
|
|
6
|
+
/**
|
|
7
|
+
* Key for the session storage used to retrieve the bearer token from.
|
|
8
|
+
*/
|
|
9
|
+
static { this.sessionStorageKey = 'bearerAuthToken'; }
|
|
10
|
+
/**
|
|
11
|
+
* If the session storage key 'bearerAuthTokenKeep' is set to true, the token will be kept in session storage after it was found.
|
|
12
|
+
* Allows you to still refresh the page.
|
|
13
|
+
*/
|
|
14
|
+
static { this.sessionStorageKeyToKeepToken = `bearerAuthTokenKeep`; }
|
|
15
|
+
constructor(throwIfNoTokenPresent = true) {
|
|
16
|
+
super();
|
|
17
|
+
const token = this.getToken();
|
|
18
|
+
if (!token && throwIfNoTokenPresent) {
|
|
19
|
+
throw new Error('No token present in session storage');
|
|
20
|
+
}
|
|
21
|
+
}
|
|
22
|
+
updateCredentials({ token }) {
|
|
23
|
+
if (!token) {
|
|
24
|
+
return;
|
|
25
|
+
}
|
|
26
|
+
super.updateCredentials({ token });
|
|
27
|
+
return;
|
|
28
|
+
}
|
|
29
|
+
getToken() {
|
|
30
|
+
const token = sessionStorage.getItem(BearerAuthFromSessionStorage.sessionStorageKey);
|
|
31
|
+
if (token) {
|
|
32
|
+
const shouldKeepToken = sessionStorage.getItem(BearerAuthFromSessionStorage.sessionStorageKeyToKeepToken) ===
|
|
33
|
+
'true';
|
|
34
|
+
if (!shouldKeepToken) {
|
|
35
|
+
sessionStorage.removeItem(BearerAuthFromSessionStorage.sessionStorageKey);
|
|
36
|
+
}
|
|
37
|
+
this.updateCredentials({ token });
|
|
38
|
+
return token;
|
|
39
|
+
}
|
|
40
|
+
return super.getToken();
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
exports.BearerAuthFromSessionStorage = BearerAuthFromSessionStorage;
|
|
44
|
+
//# sourceMappingURL=BearerAuthFromSessionStorage.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"BearerAuthFromSessionStorage.js","sourceRoot":"","sources":["../../../../src/core/BearerAuthFromSessionStorage.ts"],"names":[],"mappings":";;;AAAA,6CAA0C;AAG1C,MAAa,4BAA6B,SAAQ,uBAAU;IAC1D;;OAEG;aACa,sBAAiB,GAAG,iBAAiB,CAAC;IACtD;;;OAGG;aACa,iCAA4B,GAAG,qBAAqB,CAAC;IACrE,YAAY,qBAAqB,GAAG,IAAI;QACtC,KAAK,EAAE,CAAC;QACR,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC9B,IAAI,CAAC,KAAK,IAAI,qBAAqB,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;IACH,CAAC;IAED,iBAAiB,CAAC,EAAE,KAAK,EAAgB;QACvC,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO;QACT,CAAC;QACD,KAAK,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;QACnC,OAAO;IACT,CAAC;IAES,QAAQ;QAChB,MAAM,KAAK,GAAG,cAAc,CAAC,OAAO,CAAC,4BAA4B,CAAC,iBAAiB,CAAC,CAAC;QACrF,IAAI,KAAK,EAAE,CAAC;YACV,MAAM,eAAe,GACnB,cAAc,CAAC,OAAO,CAAC,4BAA4B,CAAC,4BAA4B,CAAC;gBACjF,MAAM,CAAC;YACT,IAAI,CAAC,eAAe,EAAE,CAAC;gBACrB,cAAc,CAAC,UAAU,CAAC,4BAA4B,CAAC,iBAAiB,CAAC,CAAC;YAC5E,CAAC;YAED,IAAI,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;YAClC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,OAAO,KAAK,CAAC,QAAQ,EAAE,CAAC;IAC1B,CAAC;;AAzCH,oEA0CC"}
|
|
@@ -3,6 +3,7 @@ export * from './FetchClient';
|
|
|
3
3
|
export * from './IAuthentication';
|
|
4
4
|
export * from './BasicAuth';
|
|
5
5
|
export * from './BearerAuth';
|
|
6
|
+
export * from './BearerAuthFromSessionStorage';
|
|
6
7
|
export * from './CookieAuth';
|
|
7
8
|
export * from './MicroserviceClientRequestAuth';
|
|
8
9
|
export * from './NodeJSCookieAuth';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,gCAAgC,CAAC;AAC/C,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
@@ -6,6 +6,7 @@ tslib_1.__exportStar(require("./FetchClient"), exports);
|
|
|
6
6
|
tslib_1.__exportStar(require("./IAuthentication"), exports);
|
|
7
7
|
tslib_1.__exportStar(require("./BasicAuth"), exports);
|
|
8
8
|
tslib_1.__exportStar(require("./BearerAuth"), exports);
|
|
9
|
+
tslib_1.__exportStar(require("./BearerAuthFromSessionStorage"), exports);
|
|
9
10
|
tslib_1.__exportStar(require("./CookieAuth"), exports);
|
|
10
11
|
tslib_1.__exportStar(require("./MicroserviceClientRequestAuth"), exports);
|
|
11
12
|
tslib_1.__exportStar(require("./NodeJSCookieAuth"), exports);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":";;;AAAA,oDAA0B;AAC1B,wDAA8B;AAC9B,4DAAkC;AAClC,sDAA4B;AAC5B,uDAA6B;AAC7B,uDAA6B;AAC7B,0EAAgD;AAChD,6DAAmC;AACnC,wDAA8B;AAC9B,mDAAyB;AACzB,oDAA0B;AAC1B,wDAA8B;AAC9B,0DAAgC;AAChC,2DAAiC;AACjC,yDAA+B;AAC/B,uEAA6C;AAC7C,mDAAyB;AACzB,oDAA0B;AAC1B,qDAA2B;AAC3B,8DAAoC;AACpC,iEAAuC;AACvC,wDAA8B"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":";;;AAAA,oDAA0B;AAC1B,wDAA8B;AAC9B,4DAAkC;AAClC,sDAA4B;AAC5B,uDAA6B;AAC7B,yEAA+C;AAC/C,uDAA6B;AAC7B,0EAAgD;AAChD,6DAAmC;AACnC,wDAA8B;AAC9B,mDAAyB;AACzB,oDAA0B;AAC1B,wDAA8B;AAC9B,0DAAgC;AAChC,2DAAiC;AACjC,yDAA+B;AAC/B,uEAA6C;AAC7C,mDAAyB;AACzB,oDAA0B;AAC1B,qDAA2B;AAC3B,8DAAoC;AACpC,iEAAuC;AACvC,wDAA8B"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"BearerAuth.d.ts","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAIhD,qBAAa,UAAW,YAAW,eAAe;gBACpC,KAAK,CAAC,EAAE,MAAM;
|
|
1
|
+
{"version":3,"file":"BearerAuth.d.ts","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAIhD,qBAAa,UAAW,YAAW,eAAe;gBACpC,KAAK,CAAC,EAAE,MAAM;IAI1B,eAAe,CAAC,OAAO,EAAE,aAAa,GAAG,aAAa;IAMtD,iBAAiB,CAAC,EAAE,KAAK,EAAE,EAAE,YAAY,GAAG,SAAS;IAKrD,kBAAkB,CAAC,MAAM,GAAE;QAAE,GAAG,CAAC,EAAE,GAAG,CAAA;KAAO;cAAV,GAAG;;IAUtC,MAAM,IAAI,IAAI;IAId,SAAS,CAAC,QAAQ,IAAI,MAAM,GAAG,SAAS;CAKzC"}
|
|
@@ -4,8 +4,7 @@ export class BearerAuth {
|
|
|
4
4
|
secrets.set(this, { token });
|
|
5
5
|
}
|
|
6
6
|
getFetchOptions(options) {
|
|
7
|
-
const
|
|
8
|
-
const { token } = secret;
|
|
7
|
+
const token = this.getToken();
|
|
9
8
|
options.headers = Object.assign({ Authorization: `Bearer ${token}` }, options.headers);
|
|
10
9
|
return options;
|
|
11
10
|
}
|
|
@@ -15,7 +14,8 @@ export class BearerAuth {
|
|
|
15
14
|
}
|
|
16
15
|
getCometdHandshake(config = {}) {
|
|
17
16
|
const secret = secrets.get(this);
|
|
18
|
-
const {
|
|
17
|
+
const { tfa } = secret;
|
|
18
|
+
const token = this.getToken();
|
|
19
19
|
const KEY = 'com.cumulocity.authn';
|
|
20
20
|
const ext = (config.ext = config.ext || {});
|
|
21
21
|
ext[KEY] = Object.assign(ext[KEY] || {}, { token, tfa });
|
|
@@ -24,5 +24,10 @@ export class BearerAuth {
|
|
|
24
24
|
logout() {
|
|
25
25
|
secrets.set(this, {});
|
|
26
26
|
}
|
|
27
|
+
getToken() {
|
|
28
|
+
const secret = secrets.get(this);
|
|
29
|
+
const { token } = secret;
|
|
30
|
+
return token;
|
|
31
|
+
}
|
|
27
32
|
}
|
|
28
33
|
//# sourceMappingURL=BearerAuth.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"BearerAuth.js","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAGA,MAAM,OAAO,GAAG,IAAI,OAAO,EAAE,CAAC;AAE9B,MAAM,OAAO,UAAU;IACrB,YAAY,KAAc;QACxB,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAC/B,CAAC;
|
|
1
|
+
{"version":3,"file":"BearerAuth.js","sourceRoot":"","sources":["../../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAGA,MAAM,OAAO,GAAG,IAAI,OAAO,EAAE,CAAC;AAE9B,MAAM,OAAO,UAAU;IACrB,YAAY,KAAc;QACxB,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;IAC/B,CAAC;IAED,eAAe,CAAC,OAAsB;QACpC,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC9B,OAAO,CAAC,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,EAAE,aAAa,EAAE,UAAU,KAAK,EAAE,EAAE,EAAE,OAAO,CAAC,OAAO,CAAC,CAAC;QACvF,OAAO,OAAO,CAAC;IACjB,CAAC;IAED,iBAAiB,CAAC,EAAE,KAAK,EAAgB;QACvC,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,KAAK,EAAE,CAAC,CAAC;QAC7B,OAAO;IACT,CAAC;IAED,kBAAkB,CAAC,SAAwB,EAAE;QAC3C,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QACjC,MAAM,EAAE,GAAG,EAAE,GAAG,MAAM,CAAC;QACvB,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC9B,MAAM,GAAG,GAAG,sBAAsB,CAAC;QACnC,MAAM,GAAG,GAAG,CAAC,MAAM,CAAC,GAAG,GAAG,MAAM,CAAC,GAAG,IAAI,EAAE,CAAC,CAAC;QAC5C,GAAG,CAAC,GAAG,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,EAAE,KAAK,EAAE,GAAG,EAAE,CAAC,CAAC;QACzD,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,MAAM;QACJ,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC;IACxB,CAAC;IAES,QAAQ;QAChB,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC;QACjC,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,CAAC;QACzB,OAAO,KAAK,CAAC;IACf,CAAC;CACF"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { BearerAuth } from './BearerAuth';
|
|
2
|
+
import { ICredentials } from './IAuthentication';
|
|
3
|
+
export declare class BearerAuthFromSessionStorage extends BearerAuth {
|
|
4
|
+
/**
|
|
5
|
+
* Key for the session storage used to retrieve the bearer token from.
|
|
6
|
+
*/
|
|
7
|
+
static readonly sessionStorageKey = "bearerAuthToken";
|
|
8
|
+
/**
|
|
9
|
+
* If the session storage key 'bearerAuthTokenKeep' is set to true, the token will be kept in session storage after it was found.
|
|
10
|
+
* Allows you to still refresh the page.
|
|
11
|
+
*/
|
|
12
|
+
static readonly sessionStorageKeyToKeepToken = "bearerAuthTokenKeep";
|
|
13
|
+
constructor(throwIfNoTokenPresent?: boolean);
|
|
14
|
+
updateCredentials({ token }: ICredentials): undefined;
|
|
15
|
+
protected getToken(): string | undefined;
|
|
16
|
+
}
|
|
17
|
+
//# sourceMappingURL=BearerAuthFromSessionStorage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"BearerAuthFromSessionStorage.d.ts","sourceRoot":"","sources":["../../../../src/core/BearerAuthFromSessionStorage.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC;AAC1C,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAEjD,qBAAa,4BAA6B,SAAQ,UAAU;IAC1D;;OAEG;IACH,MAAM,CAAC,QAAQ,CAAC,iBAAiB,qBAAqB;IACtD;;;OAGG;IACH,MAAM,CAAC,QAAQ,CAAC,4BAA4B,yBAAyB;gBACzD,qBAAqB,UAAO;IAQxC,iBAAiB,CAAC,EAAE,KAAK,EAAE,EAAE,YAAY,GAAG,SAAS;IAQrD,SAAS,CAAC,QAAQ,IAAI,MAAM,GAAG,SAAS;CAgBzC"}
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
import { BearerAuth } from './BearerAuth';
|
|
2
|
+
export class BearerAuthFromSessionStorage extends BearerAuth {
|
|
3
|
+
constructor(throwIfNoTokenPresent = true) {
|
|
4
|
+
super();
|
|
5
|
+
const token = this.getToken();
|
|
6
|
+
if (!token && throwIfNoTokenPresent) {
|
|
7
|
+
throw new Error('No token present in session storage');
|
|
8
|
+
}
|
|
9
|
+
}
|
|
10
|
+
updateCredentials({ token }) {
|
|
11
|
+
if (!token) {
|
|
12
|
+
return;
|
|
13
|
+
}
|
|
14
|
+
super.updateCredentials({ token });
|
|
15
|
+
return;
|
|
16
|
+
}
|
|
17
|
+
getToken() {
|
|
18
|
+
const token = sessionStorage.getItem(BearerAuthFromSessionStorage.sessionStorageKey);
|
|
19
|
+
if (token) {
|
|
20
|
+
const shouldKeepToken = sessionStorage.getItem(BearerAuthFromSessionStorage.sessionStorageKeyToKeepToken) ===
|
|
21
|
+
'true';
|
|
22
|
+
if (!shouldKeepToken) {
|
|
23
|
+
sessionStorage.removeItem(BearerAuthFromSessionStorage.sessionStorageKey);
|
|
24
|
+
}
|
|
25
|
+
this.updateCredentials({ token });
|
|
26
|
+
return token;
|
|
27
|
+
}
|
|
28
|
+
return super.getToken();
|
|
29
|
+
}
|
|
30
|
+
}
|
|
31
|
+
/**
|
|
32
|
+
* Key for the session storage used to retrieve the bearer token from.
|
|
33
|
+
*/
|
|
34
|
+
BearerAuthFromSessionStorage.sessionStorageKey = 'bearerAuthToken';
|
|
35
|
+
/**
|
|
36
|
+
* If the session storage key 'bearerAuthTokenKeep' is set to true, the token will be kept in session storage after it was found.
|
|
37
|
+
* Allows you to still refresh the page.
|
|
38
|
+
*/
|
|
39
|
+
BearerAuthFromSessionStorage.sessionStorageKeyToKeepToken = `bearerAuthTokenKeep`;
|
|
40
|
+
//# sourceMappingURL=BearerAuthFromSessionStorage.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"BearerAuthFromSessionStorage.js","sourceRoot":"","sources":["../../../../src/core/BearerAuthFromSessionStorage.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC;AAG1C,MAAM,OAAO,4BAA6B,SAAQ,UAAU;IAU1D,YAAY,qBAAqB,GAAG,IAAI;QACtC,KAAK,EAAE,CAAC;QACR,MAAM,KAAK,GAAG,IAAI,CAAC,QAAQ,EAAE,CAAC;QAC9B,IAAI,CAAC,KAAK,IAAI,qBAAqB,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;QACzD,CAAC;IACH,CAAC;IAED,iBAAiB,CAAC,EAAE,KAAK,EAAgB;QACvC,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO;QACT,CAAC;QACD,KAAK,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;QACnC,OAAO;IACT,CAAC;IAES,QAAQ;QAChB,MAAM,KAAK,GAAG,cAAc,CAAC,OAAO,CAAC,4BAA4B,CAAC,iBAAiB,CAAC,CAAC;QACrF,IAAI,KAAK,EAAE,CAAC;YACV,MAAM,eAAe,GACnB,cAAc,CAAC,OAAO,CAAC,4BAA4B,CAAC,4BAA4B,CAAC;gBACjF,MAAM,CAAC;YACT,IAAI,CAAC,eAAe,EAAE,CAAC;gBACrB,cAAc,CAAC,UAAU,CAAC,4BAA4B,CAAC,iBAAiB,CAAC,CAAC;YAC5E,CAAC;YAED,IAAI,CAAC,iBAAiB,CAAC,EAAE,KAAK,EAAE,CAAC,CAAC;YAClC,OAAO,KAAK,CAAC;QACf,CAAC;QAED,OAAO,KAAK,CAAC,QAAQ,EAAE,CAAC;IAC1B,CAAC;;AAxCD;;GAEG;AACa,8CAAiB,GAAG,iBAAiB,CAAC;AACtD;;;GAGG;AACa,yDAA4B,GAAG,qBAAqB,CAAC"}
|
|
@@ -3,6 +3,7 @@ export * from './FetchClient';
|
|
|
3
3
|
export * from './IAuthentication';
|
|
4
4
|
export * from './BasicAuth';
|
|
5
5
|
export * from './BearerAuth';
|
|
6
|
+
export * from './BearerAuthFromSessionStorage';
|
|
6
7
|
export * from './CookieAuth';
|
|
7
8
|
export * from './MicroserviceClientRequestAuth';
|
|
8
9
|
export * from './NodeJSCookieAuth';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,gCAAgC,CAAC;AAC/C,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
@@ -3,6 +3,7 @@ export * from './FetchClient';
|
|
|
3
3
|
export * from './IAuthentication';
|
|
4
4
|
export * from './BasicAuth';
|
|
5
5
|
export * from './BearerAuth';
|
|
6
|
+
export * from './BearerAuthFromSessionStorage';
|
|
6
7
|
export * from './CookieAuth';
|
|
7
8
|
export * from './MicroserviceClientRequestAuth';
|
|
8
9
|
export * from './NodeJSCookieAuth';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,gCAAgC,CAAC;AAC/C,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"BearerAuth.d.ts","sourceRoot":"","sources":["../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAIhD,qBAAa,UAAW,YAAW,eAAe;gBACpC,KAAK,CAAC,EAAE,MAAM;
|
|
1
|
+
{"version":3,"file":"BearerAuth.d.ts","sourceRoot":"","sources":["../../../src/core/BearerAuth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,eAAe,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,iBAAiB,CAAC;AAIhD,qBAAa,UAAW,YAAW,eAAe;gBACpC,KAAK,CAAC,EAAE,MAAM;IAI1B,eAAe,CAAC,OAAO,EAAE,aAAa,GAAG,aAAa;IAMtD,iBAAiB,CAAC,EAAE,KAAK,EAAE,EAAE,YAAY,GAAG,SAAS;IAKrD,kBAAkB,CAAC,MAAM,GAAE;QAAE,GAAG,CAAC,EAAE,GAAG,CAAA;KAAO;cAAV,GAAG;;IAUtC,MAAM,IAAI,IAAI;IAId,SAAS,CAAC,QAAQ,IAAI,MAAM,GAAG,SAAS;CAKzC"}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
import { BearerAuth } from './BearerAuth';
|
|
2
|
+
import { ICredentials } from './IAuthentication';
|
|
3
|
+
export declare class BearerAuthFromSessionStorage extends BearerAuth {
|
|
4
|
+
/**
|
|
5
|
+
* Key for the session storage used to retrieve the bearer token from.
|
|
6
|
+
*/
|
|
7
|
+
static readonly sessionStorageKey = "bearerAuthToken";
|
|
8
|
+
/**
|
|
9
|
+
* If the session storage key 'bearerAuthTokenKeep' is set to true, the token will be kept in session storage after it was found.
|
|
10
|
+
* Allows you to still refresh the page.
|
|
11
|
+
*/
|
|
12
|
+
static readonly sessionStorageKeyToKeepToken = "bearerAuthTokenKeep";
|
|
13
|
+
constructor(throwIfNoTokenPresent?: boolean);
|
|
14
|
+
updateCredentials({ token }: ICredentials): undefined;
|
|
15
|
+
protected getToken(): string | undefined;
|
|
16
|
+
}
|
|
17
|
+
//# sourceMappingURL=BearerAuthFromSessionStorage.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"BearerAuthFromSessionStorage.d.ts","sourceRoot":"","sources":["../../../src/core/BearerAuthFromSessionStorage.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,cAAc,CAAC;AAC1C,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AAEjD,qBAAa,4BAA6B,SAAQ,UAAU;IAC1D;;OAEG;IACH,MAAM,CAAC,QAAQ,CAAC,iBAAiB,qBAAqB;IACtD;;;OAGG;IACH,MAAM,CAAC,QAAQ,CAAC,4BAA4B,yBAAyB;gBACzD,qBAAqB,UAAO;IAQxC,iBAAiB,CAAC,EAAE,KAAK,EAAE,EAAE,YAAY,GAAG,SAAS;IAQrD,SAAS,CAAC,QAAQ,IAAI,MAAM,GAAG,SAAS;CAgBzC"}
|
package/lib/src/core/index.d.ts
CHANGED
|
@@ -3,6 +3,7 @@ export * from './FetchClient';
|
|
|
3
3
|
export * from './IAuthentication';
|
|
4
4
|
export * from './BasicAuth';
|
|
5
5
|
export * from './BearerAuth';
|
|
6
|
+
export * from './BearerAuthFromSessionStorage';
|
|
6
7
|
export * from './CookieAuth';
|
|
7
8
|
export * from './MicroserviceClientRequestAuth';
|
|
8
9
|
export * from './NodeJSCookieAuth';
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/core/index.ts"],"names":[],"mappings":"AAAA,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,gCAAgC,CAAC;AAC/C,cAAc,cAAc,CAAC;AAC7B,cAAc,iCAAiC,CAAC;AAChD,cAAc,oBAAoB,CAAC;AACnC,cAAc,eAAe,CAAC;AAC9B,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,eAAe,CAAC;AAC9B,cAAc,iBAAiB,CAAC;AAChC,cAAc,kBAAkB,CAAC;AACjC,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC;AAC7C,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,YAAY,CAAC;AAC3B,cAAc,qBAAqB,CAAC;AACpC,cAAc,wBAAwB,CAAC;AACvC,cAAc,eAAe,CAAC"}
|
package/package.json
CHANGED