@civic/auth 0.0.1-beta.18 → 0.0.1-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/README.md +0 -26
  2. package/dist/chunk-5NUJ7LFF.mjs +17 -0
  3. package/dist/chunk-5NUJ7LFF.mjs.map +1 -0
  4. package/dist/chunk-KS7ERXGZ.js +481 -0
  5. package/dist/chunk-KS7ERXGZ.js.map +1 -0
  6. package/dist/chunk-NINRO7GS.js +209 -0
  7. package/dist/chunk-NINRO7GS.js.map +1 -0
  8. package/dist/chunk-NXBKSUKI.mjs +481 -0
  9. package/dist/chunk-NXBKSUKI.mjs.map +1 -0
  10. package/dist/chunk-T7HUHQ3J.mjs +209 -0
  11. package/dist/chunk-T7HUHQ3J.mjs.map +1 -0
  12. package/dist/chunk-WZLC5B4C.js +17 -0
  13. package/dist/chunk-WZLC5B4C.js.map +1 -0
  14. package/dist/index-DoDoIY_K.d.mts +79 -0
  15. package/dist/index-DoDoIY_K.d.ts +79 -0
  16. package/dist/index.css +70 -63
  17. package/dist/index.css.map +1 -1
  18. package/dist/index.d.mts +1 -3
  19. package/dist/index.d.ts +1 -3
  20. package/dist/nextjs.d.mts +11 -10
  21. package/dist/nextjs.d.ts +11 -10
  22. package/dist/nextjs.js +173 -62
  23. package/dist/nextjs.js.map +1 -1
  24. package/dist/nextjs.mjs +171 -60
  25. package/dist/nextjs.mjs.map +1 -1
  26. package/dist/react.d.mts +65 -39
  27. package/dist/react.d.ts +65 -39
  28. package/dist/react.js +212 -433
  29. package/dist/react.js.map +1 -1
  30. package/dist/react.mjs +235 -456
  31. package/dist/react.mjs.map +1 -1
  32. package/dist/server.d.mts +12 -13
  33. package/dist/server.d.ts +12 -13
  34. package/dist/server.js +186 -3
  35. package/dist/server.js.map +1 -1
  36. package/dist/server.mjs +192 -9
  37. package/dist/server.mjs.map +1 -1
  38. package/package.json +4 -4
  39. package/dist/chunk-5XL2ST72.mjs +0 -226
  40. package/dist/chunk-5XL2ST72.mjs.map +0 -1
  41. package/dist/chunk-G3P5TIO2.mjs +0 -708
  42. package/dist/chunk-G3P5TIO2.mjs.map +0 -1
  43. package/dist/chunk-RF23Q4V6.js +0 -708
  44. package/dist/chunk-RF23Q4V6.js.map +0 -1
  45. package/dist/chunk-SEKF2WZX.js +0 -226
  46. package/dist/chunk-SEKF2WZX.js.map +0 -1
  47. package/dist/index-DTimUlkB.d.ts +0 -17
  48. package/dist/index-DvjkKpkk.d.mts +0 -17
  49. package/dist/types-HdCjGldB.d.mts +0 -58
  50. package/dist/types-HdCjGldB.d.ts +0 -58
  51. package/dist/types-b4c1koXj.d.mts +0 -19
  52. package/dist/types-b4c1koXj.d.ts +0 -19
@@ -0,0 +1,209 @@
1
+ import {
2
+ __async,
3
+ __spreadValues
4
+ } from "./chunk-RGHW4PYM.mjs";
5
+
6
+ // src/utils.ts
7
+ import { clsx } from "clsx";
8
+ import { twMerge } from "tailwind-merge";
9
+ var isPopupBlocked = () => {
10
+ const popup = window.open("", "", "width=1,height=1");
11
+ if (!popup) {
12
+ return true;
13
+ }
14
+ try {
15
+ if (typeof popup.closed === "undefined") {
16
+ throw new Error("Popup is blocked");
17
+ }
18
+ } catch (e) {
19
+ return true;
20
+ }
21
+ popup.close();
22
+ return false;
23
+ };
24
+ var cn = (...inputs) => {
25
+ return twMerge(clsx(inputs));
26
+ };
27
+ var withoutUndefined = (obj) => {
28
+ const result = {};
29
+ for (const key in obj) {
30
+ if (obj[key] !== void 0) {
31
+ result[key] = obj[key];
32
+ }
33
+ }
34
+ return result;
35
+ };
36
+
37
+ // src/shared/util.ts
38
+ import { OAuth2Client } from "oslo/oauth2";
39
+
40
+ // src/lib/oauth.ts
41
+ import { v4 as uuid } from "uuid";
42
+ var getIssuerVariations = (issuer) => {
43
+ const issuerWithoutSlash = issuer.endsWith("/") ? issuer.slice(0, issuer.length - 1) : issuer;
44
+ const issuerWithSlash = `${issuerWithoutSlash}/`;
45
+ return [issuerWithoutSlash, issuerWithSlash];
46
+ };
47
+ var addSlashIfNeeded = (url) => url.endsWith("/") ? url : `${url}/`;
48
+ var getOauthEndpoints = (oauthServer) => __async(void 0, null, function* () {
49
+ const openIdConfigResponse = yield fetch(
50
+ `${addSlashIfNeeded(oauthServer)}.well-known/openid-configuration`
51
+ );
52
+ const openIdConfig = yield openIdConfigResponse.json();
53
+ return {
54
+ jwks: openIdConfig.jwks_uri,
55
+ auth: openIdConfig.authorization_endpoint,
56
+ token: openIdConfig.token_endpoint,
57
+ userinfo: openIdConfig.userinfo_endpoint
58
+ };
59
+ });
60
+ var generateState = (displayMode) => {
61
+ const jsonString = JSON.stringify({
62
+ uuid: uuid(),
63
+ displayMode
64
+ });
65
+ return btoa(jsonString);
66
+ };
67
+ var displayModeFromState = (state, sessionDisplayMode) => {
68
+ try {
69
+ const jsonString = btoa(state);
70
+ return JSON.parse(jsonString).displayMode;
71
+ } catch (e) {
72
+ console.error("Failed to parse displayMode from state:", state);
73
+ return sessionDisplayMode;
74
+ }
75
+ };
76
+
77
+ // src/shared/util.ts
78
+ import * as jose from "jose";
79
+ function deriveCodeChallenge(codeVerifier, method = "S256") {
80
+ return __async(this, null, function* () {
81
+ if (method === "Plain") {
82
+ console.warn("Using insecure plain code challenge method");
83
+ return codeVerifier;
84
+ }
85
+ const encoder = new TextEncoder();
86
+ const data = encoder.encode(codeVerifier);
87
+ const digest = yield crypto.subtle.digest("SHA-256", data);
88
+ return btoa(String.fromCharCode(...new Uint8Array(digest))).replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
89
+ });
90
+ }
91
+ function getEndpointsWithOverrides(_0) {
92
+ return __async(this, arguments, function* (oauthServer, endpointOverrides = {}) {
93
+ const endpoints = yield getOauthEndpoints(oauthServer);
94
+ return __spreadValues(__spreadValues({}, endpoints), endpointOverrides);
95
+ });
96
+ }
97
+ function generateOauthLoginUrl(config) {
98
+ return __async(this, null, function* () {
99
+ const endpoints = yield getEndpointsWithOverrides(
100
+ config.oauthServer,
101
+ config.endpointOverrides
102
+ );
103
+ const oauth2Client = buildOauth2Client(
104
+ config.clientId,
105
+ config.redirectUrl,
106
+ endpoints
107
+ );
108
+ const challenge = yield config.pkceConsumer.getCodeChallenge();
109
+ const oAuthUrl = yield oauth2Client.createAuthorizationURL({
110
+ state: config.state,
111
+ scopes: config.scopes
112
+ });
113
+ oAuthUrl.searchParams.append("code_challenge", challenge);
114
+ oAuthUrl.searchParams.append("code_challenge_method", "S256");
115
+ return oAuthUrl;
116
+ });
117
+ }
118
+ function generateOauthLogoutUrl(config) {
119
+ return __async(this, null, function* () {
120
+ return new URL("http://localhost");
121
+ });
122
+ }
123
+ function buildOauth2Client(clientId, redirectUri, endpoints) {
124
+ return new OAuth2Client(
125
+ clientId,
126
+ endpoints.auth,
127
+ endpoints.token,
128
+ // this
129
+ { redirectURI: redirectUri }
130
+ );
131
+ }
132
+ function exchangeTokens(code, state, pkceProducer, oauth2Client, oauthServer, endpoints) {
133
+ return __async(this, null, function* () {
134
+ const codeVerifier = yield pkceProducer.getCodeVerifier();
135
+ if (!codeVerifier) throw new Error("Code verifier not found in state");
136
+ const tokens = yield oauth2Client.validateAuthorizationCode(code, {
137
+ codeVerifier
138
+ });
139
+ try {
140
+ yield validateOauth2Tokens(tokens, endpoints, oauth2Client, oauthServer);
141
+ } catch (error) {
142
+ console.error("tokenExchange error", { error, tokens });
143
+ throw new Error(
144
+ `OIDC tokens validation failed: ${error.message}`
145
+ );
146
+ }
147
+ return tokens;
148
+ });
149
+ }
150
+ function storeTokens(storage, tokens) {
151
+ storage.set("id_token", tokens.id_token);
152
+ storage.set("access_token", tokens.access_token);
153
+ if (tokens.refresh_token) storage.set("refresh_token", tokens.refresh_token);
154
+ }
155
+ function retrieveTokens(storage) {
156
+ const idToken = storage.get("id_token");
157
+ const accessToken = storage.get("access_token");
158
+ const refreshToken = storage.get("refresh_token");
159
+ if (!idToken || !accessToken) return null;
160
+ return {
161
+ id_token: idToken,
162
+ access_token: accessToken,
163
+ refresh_token: refreshToken != null ? refreshToken : void 0
164
+ };
165
+ }
166
+ function validateOauth2Tokens(tokens, endpoints, oauth2Client, oauthServer) {
167
+ return __async(this, null, function* () {
168
+ const JWKS = jose.createRemoteJWKSet(new URL(endpoints.jwks));
169
+ const idTokenResponse = yield jose.jwtVerify(
170
+ tokens.id_token,
171
+ JWKS,
172
+ {
173
+ issuer: getIssuerVariations(oauthServer),
174
+ audience: oauth2Client.clientId
175
+ }
176
+ );
177
+ const accessTokenResponse = yield jose.jwtVerify(
178
+ tokens.access_token,
179
+ JWKS,
180
+ {
181
+ issuer: getIssuerVariations(oauthServer)
182
+ }
183
+ );
184
+ return withoutUndefined({
185
+ id_token: idTokenResponse.payload,
186
+ access_token: accessTokenResponse.payload,
187
+ refresh_token: tokens.refresh_token
188
+ });
189
+ });
190
+ }
191
+
192
+ export {
193
+ getOauthEndpoints,
194
+ generateState,
195
+ displayModeFromState,
196
+ isPopupBlocked,
197
+ cn,
198
+ withoutUndefined,
199
+ deriveCodeChallenge,
200
+ getEndpointsWithOverrides,
201
+ generateOauthLoginUrl,
202
+ generateOauthLogoutUrl,
203
+ buildOauth2Client,
204
+ exchangeTokens,
205
+ storeTokens,
206
+ retrieveTokens,
207
+ validateOauth2Tokens
208
+ };
209
+ //# sourceMappingURL=chunk-T7HUHQ3J.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/utils.ts","../src/shared/util.ts","../src/lib/oauth.ts"],"sourcesContent":["import { clsx, type ClassValue } from \"clsx\";\nimport { twMerge } from \"tailwind-merge\";\n\n/**\n * Checks if a popup window is blocked by the browser.\n *\n * This function attempts to open a small popup window and then checks if it was successfully created.\n * If the popup is blocked by the browser, the function returns `true`. Otherwise, it returns `false`.\n *\n * @returns {boolean} - `true` if the popup is blocked, `false` otherwise.\n */\nconst isPopupBlocked = (): boolean => {\n // First we try to open a small popup window. It either returns a window object or null.\n const popup = window.open(\"\", \"\", \"width=1,height=1\");\n\n // If window.open() returns null, popup is definitely blocked\n if (!popup) {\n return true;\n }\n\n try {\n // Try to access a property of the popup to check if it's usable\n if (typeof popup.closed === \"undefined\") {\n throw new Error(\"Popup is blocked\");\n }\n } catch {\n // Accessing the popup's properties throws an error if the popup is blocked\n return true;\n }\n\n // Close the popup immediately if it was opened\n popup.close();\n return false;\n};\n\nconst cn = (...inputs: ClassValue[]) => {\n return twMerge(clsx(inputs));\n};\n\n// This type narrows T as far as it can by:\n// - removing all keys where the value is `undefined`\n// - making keys that are not undefined required\n// So, for example: given { a: string | undefined, b: string | undefined },\n// if you pass in { a: \"foo\" }, it returns an object of type: { a: string }\ntype WithoutUndefined<T> = {\n [K in keyof T as undefined extends T[K] ? never : K]: T[K];\n};\nexport const withoutUndefined = <T extends { [K in keyof T]: unknown }>(\n obj: T,\n): WithoutUndefined<T> => {\n const result = {} as WithoutUndefined<T>;\n\n for (const key in obj) {\n if (obj[key] !== undefined) {\n // TypeScript needs assurance that key is a valid key in WithoutUndefined<T>\n // We use type assertion here\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n (result as any)[key] = obj[key];\n }\n }\n\n return result;\n};\n\nexport { cn, isPopupBlocked };\n","// Utility functions shared by auth server and client integrations\n// Typically these functions should be used inside AuthenticationInitiator and AuthenticationResolver implementations\n\nimport {\n Endpoints,\n JWTPayload,\n OIDCTokenResponseBody,\n ParsedTokens,\n} from \"@/types.js\";\nimport { OAuth2Client } from \"oslo/oauth2\";\nimport { getIssuerVariations, getOauthEndpoints } from \"@/lib/oauth.js\";\nimport * as jose from \"jose\";\nimport { withoutUndefined } from \"@/utils.js\";\nimport { AuthStorage } from \"@/shared/storage.js\";\nimport { PKCEConsumer, PKCEProducer } from \"@/services/types.js\";\n\n/**\n * Given a PKCE code verifier, derive the code challenge using SHA\n */\nexport async function deriveCodeChallenge(\n codeVerifier: string,\n method: \"Plain\" | \"S256\" = \"S256\",\n): Promise<string> {\n if (method === \"Plain\") {\n console.warn(\"Using insecure plain code challenge method\");\n return codeVerifier;\n }\n\n const encoder = new TextEncoder();\n const data = encoder.encode(codeVerifier);\n const digest = await crypto.subtle.digest(\"SHA-256\", data);\n return btoa(String.fromCharCode(...new Uint8Array(digest)))\n .replace(/\\+/g, \"-\")\n .replace(/\\//g, \"_\")\n .replace(/=+$/, \"\");\n}\n\nexport async function getEndpointsWithOverrides(\n oauthServer: string,\n endpointOverrides: Partial<Endpoints> = {},\n) {\n const endpoints = await getOauthEndpoints(oauthServer);\n return {\n ...endpoints,\n ...endpointOverrides,\n };\n}\n\nexport async function generateOauthLoginUrl(config: {\n clientId: string;\n scopes: string[];\n state: string;\n redirectUrl: string;\n oauthServer: string;\n endpointOverrides?: Partial<Endpoints>;\n // used to get the PKCE challenge\n pkceConsumer: PKCEConsumer;\n}): Promise<URL> {\n const endpoints = await getEndpointsWithOverrides(\n config.oauthServer,\n config.endpointOverrides,\n );\n const oauth2Client = buildOauth2Client(\n config.clientId,\n config.redirectUrl,\n endpoints,\n );\n const challenge = await config.pkceConsumer.getCodeChallenge();\n const oAuthUrl = await oauth2Client.createAuthorizationURL({\n state: config.state,\n scopes: config.scopes,\n });\n // The OAuth2 client supports PKCE, but does not allow passing in a code challenge from some other source\n // It only allows passing in a code verifier which it then hashes itself.\n oAuthUrl.searchParams.append(\"code_challenge\", challenge);\n oAuthUrl.searchParams.append(\"code_challenge_method\", \"S256\");\n return oAuthUrl;\n}\n\nexport async function generateOauthLogoutUrl(config: {\n clientId: string;\n scopes: string[];\n oauthServer: string;\n endpointOverrides?: Partial<Endpoints>;\n // used to get the PKCE challenge\n pkceConsumer: PKCEConsumer;\n}): Promise<URL> {\n // TODO\n return new URL(\"http://localhost\");\n}\n\nexport function buildOauth2Client(\n clientId: string,\n redirectUri: string,\n endpoints: Endpoints,\n): OAuth2Client {\n return new OAuth2Client(\n clientId,\n endpoints.auth,\n endpoints.token,\n // this\n { redirectURI: redirectUri },\n );\n}\n\nexport async function exchangeTokens(\n code: string,\n state: string,\n pkceProducer: PKCEProducer,\n oauth2Client: OAuth2Client,\n oauthServer: string,\n endpoints: Endpoints,\n) {\n const codeVerifier = await pkceProducer.getCodeVerifier();\n if (!codeVerifier) throw new Error(\"Code verifier not found in state\");\n\n const tokens =\n await oauth2Client.validateAuthorizationCode<OIDCTokenResponseBody>(code, {\n codeVerifier,\n });\n\n // Validate relevant tokens\n try {\n await validateOauth2Tokens(tokens, endpoints, oauth2Client, oauthServer);\n } catch (error) {\n console.error(\"tokenExchange error\", { error, tokens });\n throw new Error(\n `OIDC tokens validation failed: ${(error as Error).message}`,\n );\n }\n\n return tokens;\n}\n\nexport function storeTokens(\n storage: AuthStorage,\n tokens: OIDCTokenResponseBody,\n) {\n // store tokens in storage ( TODO we should probably store them against the state to allow multiple logins )\n storage.set(\"id_token\", tokens.id_token);\n storage.set(\"access_token\", tokens.access_token);\n if (tokens.refresh_token) storage.set(\"refresh_token\", tokens.refresh_token);\n}\n\nexport function retrieveTokens(\n storage: AuthStorage,\n): OIDCTokenResponseBody | null {\n const idToken = storage.get(\"id_token\");\n const accessToken = storage.get(\"access_token\");\n const refreshToken = storage.get(\"refresh_token\");\n\n if (!idToken || !accessToken) return null;\n\n return {\n id_token: idToken,\n access_token: accessToken,\n refresh_token: refreshToken ?? undefined,\n };\n}\n\nexport async function validateOauth2Tokens(\n tokens: OIDCTokenResponseBody,\n endpoints: Endpoints,\n oauth2Client: OAuth2Client,\n oauthServer: string,\n): Promise<ParsedTokens> {\n const JWKS = jose.createRemoteJWKSet(new URL(endpoints.jwks));\n\n // validate the ID token\n const idTokenResponse = await jose.jwtVerify<JWTPayload>(\n tokens.id_token,\n JWKS,\n {\n issuer: getIssuerVariations(oauthServer),\n audience: oauth2Client.clientId,\n },\n );\n\n // validate the access token\n const accessTokenResponse = await jose.jwtVerify<JWTPayload>(\n tokens.access_token,\n JWKS,\n {\n issuer: getIssuerVariations(oauthServer),\n },\n );\n\n return withoutUndefined({\n id_token: idTokenResponse.payload,\n access_token: accessTokenResponse.payload,\n refresh_token: tokens.refresh_token,\n });\n}\n","import { DisplayMode, Endpoints, OpenIdConfiguration } from \"@/types\";\nimport { v4 as uuid } from \"uuid\";\n\nconst getIssuerVariations = (issuer: string): string[] => {\n const issuerWithoutSlash = issuer.endsWith(\"/\")\n ? issuer.slice(0, issuer.length - 1)\n : issuer;\n\n const issuerWithSlash = `${issuerWithoutSlash}/`;\n\n return [issuerWithoutSlash, issuerWithSlash];\n};\n\nconst addSlashIfNeeded = (url: string): string =>\n url.endsWith(\"/\") ? url : `${url}/`;\n\nconst getOauthEndpoints = async (oauthServer: string): Promise<Endpoints> => {\n const openIdConfigResponse = await fetch(\n `${addSlashIfNeeded(oauthServer)}.well-known/openid-configuration`,\n );\n const openIdConfig =\n (await openIdConfigResponse.json()) as OpenIdConfiguration;\n return {\n jwks: openIdConfig.jwks_uri,\n auth: openIdConfig.authorization_endpoint,\n token: openIdConfig.token_endpoint,\n userinfo: openIdConfig.userinfo_endpoint,\n };\n};\n\n/**\n * creates a state string for the OAuth2 flow, encoding the display mode too for future use\n * @param {DisplayMode} displayMode\n * @returns {string}\n */\nconst generateState = (displayMode: DisplayMode): string => {\n const jsonString = JSON.stringify({\n uuid: uuid(),\n displayMode,\n });\n\n return btoa(jsonString);\n};\n\n/**\n * parses the state string from the OAuth2 flow, decoding the display mode too\n * @param state\n * @param sessionDisplayMode\n * @returns { uuid: string, displayMode: DisplayMode }\n */\nconst displayModeFromState = (\n state: string,\n sessionDisplayMode: DisplayMode | undefined,\n): DisplayMode | undefined => {\n try {\n const jsonString = btoa(state);\n\n return JSON.parse(jsonString).displayMode;\n } catch (e) {\n console.error(\"Failed to parse displayMode from state:\", state);\n return sessionDisplayMode;\n }\n};\n\nexport {\n getIssuerVariations,\n getOauthEndpoints,\n displayModeFromState,\n generateState,\n};\n"],"mappings":";;;;;;AAAA,SAAS,YAA6B;AACtC,SAAS,eAAe;AAUxB,IAAM,iBAAiB,MAAe;AAEpC,QAAM,QAAQ,OAAO,KAAK,IAAI,IAAI,kBAAkB;AAGpD,MAAI,CAAC,OAAO;AACV,WAAO;AAAA,EACT;AAEA,MAAI;AAEF,QAAI,OAAO,MAAM,WAAW,aAAa;AACvC,YAAM,IAAI,MAAM,kBAAkB;AAAA,IACpC;AAAA,EACF,SAAQ;AAEN,WAAO;AAAA,EACT;AAGA,QAAM,MAAM;AACZ,SAAO;AACT;AAEA,IAAM,KAAK,IAAI,WAAyB;AACtC,SAAO,QAAQ,KAAK,MAAM,CAAC;AAC7B;AAUO,IAAM,mBAAmB,CAC9B,QACwB;AACxB,QAAM,SAAS,CAAC;AAEhB,aAAW,OAAO,KAAK;AACrB,QAAI,IAAI,GAAG,MAAM,QAAW;AAI1B,MAAC,OAAe,GAAG,IAAI,IAAI,GAAG;AAAA,IAChC;AAAA,EACF;AAEA,SAAO;AACT;;;ACrDA,SAAS,oBAAoB;;;ACR7B,SAAS,MAAM,YAAY;AAE3B,IAAM,sBAAsB,CAAC,WAA6B;AACxD,QAAM,qBAAqB,OAAO,SAAS,GAAG,IAC1C,OAAO,MAAM,GAAG,OAAO,SAAS,CAAC,IACjC;AAEJ,QAAM,kBAAkB,GAAG,kBAAkB;AAE7C,SAAO,CAAC,oBAAoB,eAAe;AAC7C;AAEA,IAAM,mBAAmB,CAAC,QACxB,IAAI,SAAS,GAAG,IAAI,MAAM,GAAG,GAAG;AAElC,IAAM,oBAAoB,CAAO,gBAA4C;AAC3E,QAAM,uBAAuB,MAAM;AAAA,IACjC,GAAG,iBAAiB,WAAW,CAAC;AAAA,EAClC;AACA,QAAM,eACH,MAAM,qBAAqB,KAAK;AACnC,SAAO;AAAA,IACL,MAAM,aAAa;AAAA,IACnB,MAAM,aAAa;AAAA,IACnB,OAAO,aAAa;AAAA,IACpB,UAAU,aAAa;AAAA,EACzB;AACF;AAOA,IAAM,gBAAgB,CAAC,gBAAqC;AAC1D,QAAM,aAAa,KAAK,UAAU;AAAA,IAChC,MAAM,KAAK;AAAA,IACX;AAAA,EACF,CAAC;AAED,SAAO,KAAK,UAAU;AACxB;AAQA,IAAM,uBAAuB,CAC3B,OACA,uBAC4B;AAC5B,MAAI;AACF,UAAM,aAAa,KAAK,KAAK;AAE7B,WAAO,KAAK,MAAM,UAAU,EAAE;AAAA,EAChC,SAAS,GAAG;AACV,YAAQ,MAAM,2CAA2C,KAAK;AAC9D,WAAO;AAAA,EACT;AACF;;;ADnDA,YAAY,UAAU;AAQtB,SAAsB,oBACpB,cACA,SAA2B,QACV;AAAA;AACjB,QAAI,WAAW,SAAS;AACtB,cAAQ,KAAK,4CAA4C;AACzD,aAAO;AAAA,IACT;AAEA,UAAM,UAAU,IAAI,YAAY;AAChC,UAAM,OAAO,QAAQ,OAAO,YAAY;AACxC,UAAM,SAAS,MAAM,OAAO,OAAO,OAAO,WAAW,IAAI;AACzD,WAAO,KAAK,OAAO,aAAa,GAAG,IAAI,WAAW,MAAM,CAAC,CAAC,EACvD,QAAQ,OAAO,GAAG,EAClB,QAAQ,OAAO,GAAG,EAClB,QAAQ,OAAO,EAAE;AAAA,EACtB;AAAA;AAEA,SAAsB,0BACpB,IAEA;AAAA,6CAFA,aACA,oBAAwC,CAAC,GACzC;AACA,UAAM,YAAY,MAAM,kBAAkB,WAAW;AACrD,WAAO,kCACF,YACA;AAAA,EAEP;AAAA;AAEA,SAAsB,sBAAsB,QAS3B;AAAA;AACf,UAAM,YAAY,MAAM;AAAA,MACtB,OAAO;AAAA,MACP,OAAO;AAAA,IACT;AACA,UAAM,eAAe;AAAA,MACnB,OAAO;AAAA,MACP,OAAO;AAAA,MACP;AAAA,IACF;AACA,UAAM,YAAY,MAAM,OAAO,aAAa,iBAAiB;AAC7D,UAAM,WAAW,MAAM,aAAa,uBAAuB;AAAA,MACzD,OAAO,OAAO;AAAA,MACd,QAAQ,OAAO;AAAA,IACjB,CAAC;AAGD,aAAS,aAAa,OAAO,kBAAkB,SAAS;AACxD,aAAS,aAAa,OAAO,yBAAyB,MAAM;AAC5D,WAAO;AAAA,EACT;AAAA;AAEA,SAAsB,uBAAuB,QAO5B;AAAA;AAEf,WAAO,IAAI,IAAI,kBAAkB;AAAA,EACnC;AAAA;AAEO,SAAS,kBACd,UACA,aACA,WACc;AACd,SAAO,IAAI;AAAA,IACT;AAAA,IACA,UAAU;AAAA,IACV,UAAU;AAAA;AAAA,IAEV,EAAE,aAAa,YAAY;AAAA,EAC7B;AACF;AAEA,SAAsB,eACpB,MACA,OACA,cACA,cACA,aACA,WACA;AAAA;AACA,UAAM,eAAe,MAAM,aAAa,gBAAgB;AACxD,QAAI,CAAC,aAAc,OAAM,IAAI,MAAM,kCAAkC;AAErE,UAAM,SACJ,MAAM,aAAa,0BAAiD,MAAM;AAAA,MACxE;AAAA,IACF,CAAC;AAGH,QAAI;AACF,YAAM,qBAAqB,QAAQ,WAAW,cAAc,WAAW;AAAA,IACzE,SAAS,OAAO;AACd,cAAQ,MAAM,uBAAuB,EAAE,OAAO,OAAO,CAAC;AACtD,YAAM,IAAI;AAAA,QACR,kCAAmC,MAAgB,OAAO;AAAA,MAC5D;AAAA,IACF;AAEA,WAAO;AAAA,EACT;AAAA;AAEO,SAAS,YACd,SACA,QACA;AAEA,UAAQ,IAAI,YAAY,OAAO,QAAQ;AACvC,UAAQ,IAAI,gBAAgB,OAAO,YAAY;AAC/C,MAAI,OAAO,cAAe,SAAQ,IAAI,iBAAiB,OAAO,aAAa;AAC7E;AAEO,SAAS,eACd,SAC8B;AAC9B,QAAM,UAAU,QAAQ,IAAI,UAAU;AACtC,QAAM,cAAc,QAAQ,IAAI,cAAc;AAC9C,QAAM,eAAe,QAAQ,IAAI,eAAe;AAEhD,MAAI,CAAC,WAAW,CAAC,YAAa,QAAO;AAErC,SAAO;AAAA,IACL,UAAU;AAAA,IACV,cAAc;AAAA,IACd,eAAe,sCAAgB;AAAA,EACjC;AACF;AAEA,SAAsB,qBACpB,QACA,WACA,cACA,aACuB;AAAA;AACvB,UAAM,OAAY,wBAAmB,IAAI,IAAI,UAAU,IAAI,CAAC;AAG5D,UAAM,kBAAkB,MAAW;AAAA,MACjC,OAAO;AAAA,MACP;AAAA,MACA;AAAA,QACE,QAAQ,oBAAoB,WAAW;AAAA,QACvC,UAAU,aAAa;AAAA,MACzB;AAAA,IACF;AAGA,UAAM,sBAAsB,MAAW;AAAA,MACrC,OAAO;AAAA,MACP;AAAA,MACA;AAAA,QACE,QAAQ,oBAAoB,WAAW;AAAA,MACzC;AAAA,IACF;AAEA,WAAO,iBAAiB;AAAA,MACtB,UAAU,gBAAgB;AAAA,MAC1B,cAAc,oBAAoB;AAAA,MAClC,eAAe,OAAO;AAAA,IACxB,CAAC;AAAA,EACH;AAAA;","names":[]}
@@ -0,0 +1,17 @@
1
+ "use strict";Object.defineProperty(exports, "__esModule", {value: true});// src/constants.ts
2
+ var DEFAULT_SCOPES = [
3
+ "openid",
4
+ "profile",
5
+ "email",
6
+ "forwardedTokens",
7
+ "offline_access"
8
+ ];
9
+ var IFRAME_ID = "civic-auth-iframe";
10
+ var AUTH_SERVER = "https://auth-dev.civic.com/oauth";
11
+
12
+
13
+
14
+
15
+
16
+ exports.DEFAULT_SCOPES = DEFAULT_SCOPES; exports.IFRAME_ID = IFRAME_ID; exports.AUTH_SERVER = AUTH_SERVER;
17
+ //# sourceMappingURL=chunk-WZLC5B4C.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["/Users/lucas/dev/civic/civic-auth/packages/civic-auth-client/dist/chunk-WZLC5B4C.js","../src/constants.ts"],"names":[],"mappings":"AAAA;ACAA,IAAM,eAAA,EAAiB;AAAA,EACrB,QAAA;AAAA,EACA,SAAA;AAAA,EACA,OAAA;AAAA,EACA,iBAAA;AAAA,EACA;AACF,CAAA;AACA,IAAM,UAAA,EAAY,mBAAA;AAElB,IAAM,YAAA,EAAc,kCAAA;ADCpB;AACA;AACE;AACA;AACA;AACF,0GAAC","file":"/Users/lucas/dev/civic/civic-auth/packages/civic-auth-client/dist/chunk-WZLC5B4C.js","sourcesContent":[null,"const DEFAULT_SCOPES = [\n \"openid\",\n \"profile\",\n \"email\",\n \"forwardedTokens\",\n \"offline_access\",\n];\nconst IFRAME_ID = \"civic-auth-iframe\";\n\nconst AUTH_SERVER = \"https://auth-dev.civic.com/oauth\";\n\nexport { DEFAULT_SCOPES, IFRAME_ID, AUTH_SERVER };\n"]}
@@ -0,0 +1,79 @@
1
+ import { TokenResponseBody } from 'oslo/oauth2';
2
+ import { JWT } from 'oslo/jwt';
3
+
4
+ type UnknownObject = Record<string, unknown>;
5
+ type EmptyObject = Record<string, never>;
6
+ type DisplayMode = "iframe" | "redirect" | "new_tab" | "custom_tab";
7
+ interface AuthSessionService {
8
+ loadAuthorizationUrl(authorizationURL: string, displayMode: DisplayMode): void;
9
+ getAuthorizationUrl(scopes: string[], overrideDisplayMode: DisplayMode, nonce?: string): Promise<string>;
10
+ signIn(displayMode: DisplayMode, scopes: string[], nonce?: string): Promise<void>;
11
+ tokenExchange(responseUrl: string): Promise<SessionData>;
12
+ getSessionData(): SessionData;
13
+ updateSessionData(data: SessionData): void;
14
+ getUserInfoService(): Promise<UserInfoService>;
15
+ }
16
+ interface UserInfoService {
17
+ getUserInfo<T extends UnknownObject>(accessToken: string, idToken: string | null): Promise<User<T> | null>;
18
+ }
19
+ type Endpoints = {
20
+ jwks: string;
21
+ auth: string;
22
+ token: string;
23
+ userinfo: string;
24
+ challenge?: string;
25
+ };
26
+ type Config = {
27
+ oauthServer: string;
28
+ endpoints?: Endpoints;
29
+ };
30
+ type SessionData = {
31
+ authenticated: boolean;
32
+ state?: string;
33
+ accessToken?: string;
34
+ refreshToken?: string;
35
+ idToken?: string;
36
+ timestamp?: number;
37
+ expiresIn?: number;
38
+ codeVerifier?: string;
39
+ displayMode?: DisplayMode;
40
+ openerUrl?: string;
41
+ };
42
+ type OIDCTokenResponseBody = TokenResponseBody & {
43
+ id_token: string;
44
+ };
45
+ type ParsedTokens = {
46
+ id_token: JWTPayload;
47
+ access_token: JWTPayload;
48
+ refresh_token?: string;
49
+ };
50
+ type ForwardedTokens = Record<string, {
51
+ idToken?: string;
52
+ accessToken?: string;
53
+ refreshToken?: string;
54
+ }>;
55
+ type JWTPayload = JWT["payload"] & {
56
+ iss: string;
57
+ aud: string;
58
+ sub: string;
59
+ iat: number;
60
+ exp: number;
61
+ };
62
+ type Tokens = {
63
+ idToken: string;
64
+ accessToken: string;
65
+ refreshToken: string;
66
+ forwardedTokens: ForwardedTokens;
67
+ };
68
+ type BaseUser = {
69
+ id: string;
70
+ email?: string;
71
+ name?: string;
72
+ given_name?: string;
73
+ family_name?: string;
74
+ picture?: string;
75
+ updated_at?: Date;
76
+ };
77
+ type User<T extends UnknownObject = EmptyObject> = BaseUser & Tokens & T;
78
+
79
+ export type { AuthSessionService as A, Config as C, DisplayMode as D, Endpoints as E, ForwardedTokens as F, OIDCTokenResponseBody as O, ParsedTokens as P, SessionData as S, Tokens as T, User as U, UnknownObject as a, UserInfoService as b };
@@ -0,0 +1,79 @@
1
+ import { TokenResponseBody } from 'oslo/oauth2';
2
+ import { JWT } from 'oslo/jwt';
3
+
4
+ type UnknownObject = Record<string, unknown>;
5
+ type EmptyObject = Record<string, never>;
6
+ type DisplayMode = "iframe" | "redirect" | "new_tab" | "custom_tab";
7
+ interface AuthSessionService {
8
+ loadAuthorizationUrl(authorizationURL: string, displayMode: DisplayMode): void;
9
+ getAuthorizationUrl(scopes: string[], overrideDisplayMode: DisplayMode, nonce?: string): Promise<string>;
10
+ signIn(displayMode: DisplayMode, scopes: string[], nonce?: string): Promise<void>;
11
+ tokenExchange(responseUrl: string): Promise<SessionData>;
12
+ getSessionData(): SessionData;
13
+ updateSessionData(data: SessionData): void;
14
+ getUserInfoService(): Promise<UserInfoService>;
15
+ }
16
+ interface UserInfoService {
17
+ getUserInfo<T extends UnknownObject>(accessToken: string, idToken: string | null): Promise<User<T> | null>;
18
+ }
19
+ type Endpoints = {
20
+ jwks: string;
21
+ auth: string;
22
+ token: string;
23
+ userinfo: string;
24
+ challenge?: string;
25
+ };
26
+ type Config = {
27
+ oauthServer: string;
28
+ endpoints?: Endpoints;
29
+ };
30
+ type SessionData = {
31
+ authenticated: boolean;
32
+ state?: string;
33
+ accessToken?: string;
34
+ refreshToken?: string;
35
+ idToken?: string;
36
+ timestamp?: number;
37
+ expiresIn?: number;
38
+ codeVerifier?: string;
39
+ displayMode?: DisplayMode;
40
+ openerUrl?: string;
41
+ };
42
+ type OIDCTokenResponseBody = TokenResponseBody & {
43
+ id_token: string;
44
+ };
45
+ type ParsedTokens = {
46
+ id_token: JWTPayload;
47
+ access_token: JWTPayload;
48
+ refresh_token?: string;
49
+ };
50
+ type ForwardedTokens = Record<string, {
51
+ idToken?: string;
52
+ accessToken?: string;
53
+ refreshToken?: string;
54
+ }>;
55
+ type JWTPayload = JWT["payload"] & {
56
+ iss: string;
57
+ aud: string;
58
+ sub: string;
59
+ iat: number;
60
+ exp: number;
61
+ };
62
+ type Tokens = {
63
+ idToken: string;
64
+ accessToken: string;
65
+ refreshToken: string;
66
+ forwardedTokens: ForwardedTokens;
67
+ };
68
+ type BaseUser = {
69
+ id: string;
70
+ email?: string;
71
+ name?: string;
72
+ given_name?: string;
73
+ family_name?: string;
74
+ picture?: string;
75
+ updated_at?: Date;
76
+ };
77
+ type User<T extends UnknownObject = EmptyObject> = BaseUser & Tokens & T;
78
+
79
+ export type { AuthSessionService as A, Config as C, DisplayMode as D, Endpoints as E, ForwardedTokens as F, OIDCTokenResponseBody as O, ParsedTokens as P, SessionData as S, Tokens as T, User as U, UnknownObject as a, UserInfoService as b };