@civic/auth 0.0.1-beta.28 → 0.0.1-beta.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (261) hide show
  1. package/.turbo/turbo-build.log +3 -3
  2. package/.turbo/turbo-lint.log +14 -0
  3. package/.turbo/turbo-test.log +1678 -0
  4. package/civic-auth-0.0.1-beta.15.tgz +0 -0
  5. package/civic-auth-0.0.1-beta.17.tgz +0 -0
  6. package/dist/AuthProvider-BYZ8w92b.d.mts +15 -0
  7. package/dist/AuthProvider-BgOwv9h8.d.ts +15 -0
  8. package/dist/AuthProvider-Bj_Prt1x.d.ts +21 -0
  9. package/dist/AuthProvider-DUAoX4G9.d.mts +21 -0
  10. package/dist/UserProvider-BA2uflVB.d.ts +16 -0
  11. package/dist/UserProvider-Bl3j1PUO.d.mts +16 -0
  12. package/dist/UserProvider-CMLaYOUD.d.ts +16 -0
  13. package/dist/UserProvider-Cbm8MZkJ.d.mts +16 -0
  14. package/dist/chunk-4PLCDPEN.mjs +599 -0
  15. package/dist/chunk-4PLCDPEN.mjs.map +1 -0
  16. package/dist/chunk-5UQQYXCX.js +1 -0
  17. package/dist/chunk-5UQQYXCX.js.map +1 -0
  18. package/dist/chunk-63YGK3A7.mjs +223 -0
  19. package/dist/chunk-63YGK3A7.mjs.map +1 -0
  20. package/dist/chunk-6RFRDWIP.js +223 -0
  21. package/dist/chunk-6RFRDWIP.js.map +1 -0
  22. package/dist/chunk-7K3QN2AT.js +599 -0
  23. package/dist/chunk-7K3QN2AT.js.map +1 -0
  24. package/dist/chunk-AM2Y662I.js +601 -0
  25. package/dist/chunk-AM2Y662I.js.map +1 -0
  26. package/dist/chunk-AP4627CS.mjs +223 -0
  27. package/dist/chunk-AP4627CS.mjs.map +1 -0
  28. package/dist/chunk-CRTRMMJ7.js +59 -0
  29. package/dist/chunk-CRTRMMJ7.js.map +1 -0
  30. package/dist/chunk-CTVJJBBA.js +118 -0
  31. package/dist/chunk-CTVJJBBA.js.map +1 -0
  32. package/dist/chunk-EKLYHP2D.mjs +711 -0
  33. package/dist/chunk-EKLYHP2D.mjs.map +1 -0
  34. package/dist/chunk-FHRZSX3C.js +710 -0
  35. package/dist/chunk-FHRZSX3C.js.map +1 -0
  36. package/dist/chunk-GB3H3I47.js +711 -0
  37. package/dist/chunk-GB3H3I47.js.map +1 -0
  38. package/dist/chunk-JDZPCA3P.js +173 -0
  39. package/dist/chunk-JDZPCA3P.js.map +1 -0
  40. package/dist/chunk-JEOPLLWO.js +223 -0
  41. package/dist/chunk-JEOPLLWO.js.map +1 -0
  42. package/dist/chunk-MK7557NR.mjs +118 -0
  43. package/dist/chunk-MK7557NR.mjs.map +1 -0
  44. package/dist/chunk-NLRREFOX.mjs +710 -0
  45. package/dist/chunk-NLRREFOX.mjs.map +1 -0
  46. package/dist/chunk-O3WGNLRO.mjs +173 -0
  47. package/dist/chunk-O3WGNLRO.mjs.map +1 -0
  48. package/dist/chunk-OXXUQ36U.mjs +283 -0
  49. package/dist/chunk-OXXUQ36U.mjs.map +1 -0
  50. package/dist/chunk-PMJAV4JJ.mjs +1 -0
  51. package/dist/chunk-PMJAV4JJ.mjs.map +1 -0
  52. package/dist/chunk-Q7DSPTUG.mjs +601 -0
  53. package/dist/chunk-Q7DSPTUG.mjs.map +1 -0
  54. package/dist/chunk-RGHW4PYM.mjs +59 -0
  55. package/dist/chunk-RGHW4PYM.mjs.map +1 -0
  56. package/dist/chunk-TH6FI2XI.js +283 -0
  57. package/dist/chunk-TH6FI2XI.js.map +1 -0
  58. package/dist/cjs/src/browser/storage.d.ts +2 -2
  59. package/dist/cjs/src/browser/storage.d.ts.map +1 -1
  60. package/dist/cjs/src/browser/storage.js +3 -3
  61. package/dist/cjs/src/browser/storage.js.map +1 -1
  62. package/dist/cjs/src/nextjs/GetUser.d.ts +1 -1
  63. package/dist/cjs/src/nextjs/GetUser.d.ts.map +1 -1
  64. package/dist/cjs/src/nextjs/GetUser.js +3 -3
  65. package/dist/cjs/src/nextjs/GetUser.js.map +1 -1
  66. package/dist/cjs/src/nextjs/config.d.ts.map +1 -1
  67. package/dist/cjs/src/nextjs/config.js +0 -2
  68. package/dist/cjs/src/nextjs/config.js.map +1 -1
  69. package/dist/cjs/src/nextjs/cookies.d.ts +4 -4
  70. package/dist/cjs/src/nextjs/cookies.d.ts.map +1 -1
  71. package/dist/cjs/src/nextjs/cookies.js +14 -11
  72. package/dist/cjs/src/nextjs/cookies.js.map +1 -1
  73. package/dist/cjs/src/nextjs/routeHandler.d.ts.map +1 -1
  74. package/dist/cjs/src/nextjs/routeHandler.js +1 -5
  75. package/dist/cjs/src/nextjs/routeHandler.js.map +1 -1
  76. package/dist/cjs/src/reactjs/hooks/index.d.ts +0 -1
  77. package/dist/cjs/src/reactjs/hooks/index.d.ts.map +1 -1
  78. package/dist/cjs/src/reactjs/hooks/index.js +1 -3
  79. package/dist/cjs/src/reactjs/hooks/index.js.map +1 -1
  80. package/dist/cjs/src/server/ServerAuthenticationResolver.d.ts.map +1 -1
  81. package/dist/cjs/src/server/ServerAuthenticationResolver.js +2 -7
  82. package/dist/cjs/src/server/ServerAuthenticationResolver.js.map +1 -1
  83. package/dist/cjs/src/server/login.d.ts +1 -1
  84. package/dist/cjs/src/server/login.d.ts.map +1 -1
  85. package/dist/cjs/src/server/login.js +2 -2
  86. package/dist/cjs/src/server/login.js.map +1 -1
  87. package/dist/cjs/src/services/AuthenticationService.d.ts.map +1 -1
  88. package/dist/cjs/src/services/AuthenticationService.js +6 -16
  89. package/dist/cjs/src/services/AuthenticationService.js.map +1 -1
  90. package/dist/cjs/src/shared/components/CivicAuthIframeContainer.d.ts.map +1 -1
  91. package/dist/cjs/src/shared/components/CivicAuthIframeContainer.js +0 -2
  92. package/dist/cjs/src/shared/components/CivicAuthIframeContainer.js.map +1 -1
  93. package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.d.ts.map +1 -1
  94. package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.js +2 -6
  95. package/dist/cjs/src/shared/lib/GenericAuthenticationRefresher.js.map +1 -1
  96. package/dist/cjs/src/shared/lib/UserSession.d.ts +4 -4
  97. package/dist/cjs/src/shared/lib/UserSession.d.ts.map +1 -1
  98. package/dist/cjs/src/shared/lib/UserSession.js +4 -4
  99. package/dist/cjs/src/shared/lib/UserSession.js.map +1 -1
  100. package/dist/cjs/src/shared/lib/session.js +1 -1
  101. package/dist/cjs/src/shared/lib/session.js.map +1 -1
  102. package/dist/cjs/src/shared/lib/storage.d.ts +2 -2
  103. package/dist/cjs/src/shared/lib/storage.d.ts.map +1 -1
  104. package/dist/cjs/src/shared/lib/storage.js.map +1 -1
  105. package/dist/cjs/src/shared/lib/util.d.ts +4 -4
  106. package/dist/cjs/src/shared/lib/util.d.ts.map +1 -1
  107. package/dist/cjs/src/shared/lib/util.js +16 -15
  108. package/dist/cjs/src/shared/lib/util.js.map +1 -1
  109. package/dist/cjs/src/types.d.ts +2 -2
  110. package/dist/cjs/src/types.d.ts.map +1 -1
  111. package/dist/cjs/src/types.js.map +1 -1
  112. package/dist/cjs/tsconfig.cjs.tsbuildinfo +1 -1
  113. package/dist/esm/src/browser/storage.d.ts +2 -2
  114. package/dist/esm/src/browser/storage.d.ts.map +1 -1
  115. package/dist/esm/src/browser/storage.js +3 -3
  116. package/dist/esm/src/browser/storage.js.map +1 -1
  117. package/dist/esm/src/nextjs/GetUser.d.ts +1 -1
  118. package/dist/esm/src/nextjs/GetUser.d.ts.map +1 -1
  119. package/dist/esm/src/nextjs/GetUser.js +3 -3
  120. package/dist/esm/src/nextjs/GetUser.js.map +1 -1
  121. package/dist/esm/src/nextjs/config.d.ts.map +1 -1
  122. package/dist/esm/src/nextjs/config.js +0 -2
  123. package/dist/esm/src/nextjs/config.js.map +1 -1
  124. package/dist/esm/src/nextjs/cookies.d.ts +4 -4
  125. package/dist/esm/src/nextjs/cookies.d.ts.map +1 -1
  126. package/dist/esm/src/nextjs/cookies.js +14 -11
  127. package/dist/esm/src/nextjs/cookies.js.map +1 -1
  128. package/dist/esm/src/nextjs/routeHandler.d.ts.map +1 -1
  129. package/dist/esm/src/nextjs/routeHandler.js +1 -5
  130. package/dist/esm/src/nextjs/routeHandler.js.map +1 -1
  131. package/dist/esm/src/reactjs/hooks/index.d.ts +0 -1
  132. package/dist/esm/src/reactjs/hooks/index.d.ts.map +1 -1
  133. package/dist/esm/src/reactjs/hooks/index.js +0 -1
  134. package/dist/esm/src/reactjs/hooks/index.js.map +1 -1
  135. package/dist/esm/src/server/ServerAuthenticationResolver.d.ts.map +1 -1
  136. package/dist/esm/src/server/ServerAuthenticationResolver.js +2 -7
  137. package/dist/esm/src/server/ServerAuthenticationResolver.js.map +1 -1
  138. package/dist/esm/src/server/login.d.ts +1 -1
  139. package/dist/esm/src/server/login.d.ts.map +1 -1
  140. package/dist/esm/src/server/login.js +2 -2
  141. package/dist/esm/src/server/login.js.map +1 -1
  142. package/dist/esm/src/services/AuthenticationService.d.ts.map +1 -1
  143. package/dist/esm/src/services/AuthenticationService.js +6 -16
  144. package/dist/esm/src/services/AuthenticationService.js.map +1 -1
  145. package/dist/esm/src/shared/components/CivicAuthIframeContainer.d.ts.map +1 -1
  146. package/dist/esm/src/shared/components/CivicAuthIframeContainer.js +0 -2
  147. package/dist/esm/src/shared/components/CivicAuthIframeContainer.js.map +1 -1
  148. package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.d.ts.map +1 -1
  149. package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.js +2 -6
  150. package/dist/esm/src/shared/lib/GenericAuthenticationRefresher.js.map +1 -1
  151. package/dist/esm/src/shared/lib/UserSession.d.ts +4 -4
  152. package/dist/esm/src/shared/lib/UserSession.d.ts.map +1 -1
  153. package/dist/esm/src/shared/lib/UserSession.js +4 -4
  154. package/dist/esm/src/shared/lib/UserSession.js.map +1 -1
  155. package/dist/esm/src/shared/lib/session.js +1 -1
  156. package/dist/esm/src/shared/lib/session.js.map +1 -1
  157. package/dist/esm/src/shared/lib/storage.d.ts +2 -2
  158. package/dist/esm/src/shared/lib/storage.d.ts.map +1 -1
  159. package/dist/esm/src/shared/lib/storage.js.map +1 -1
  160. package/dist/esm/src/shared/lib/util.d.ts +4 -4
  161. package/dist/esm/src/shared/lib/util.d.ts.map +1 -1
  162. package/dist/esm/src/shared/lib/util.js +16 -15
  163. package/dist/esm/src/shared/lib/util.js.map +1 -1
  164. package/dist/esm/src/types.d.ts +2 -2
  165. package/dist/esm/src/types.d.ts.map +1 -1
  166. package/dist/esm/src/types.js.map +1 -1
  167. package/dist/esm/tsconfig.esm.tsbuildinfo +1 -1
  168. package/dist/index.css +340 -0
  169. package/dist/index.css.map +1 -0
  170. package/dist/index.d.mts +5 -0
  171. package/dist/index.d.ts +5 -0
  172. package/dist/index.js +3 -0
  173. package/dist/index.js.map +1 -0
  174. package/dist/index.mjs +3 -0
  175. package/dist/index.mjs.map +1 -0
  176. package/dist/nextjs/client.css +340 -0
  177. package/dist/nextjs/client.css.map +1 -0
  178. package/dist/nextjs/client.d.mts +10 -0
  179. package/dist/nextjs/client.d.ts +10 -0
  180. package/dist/nextjs/client.js +185 -0
  181. package/dist/nextjs/client.js.map +1 -0
  182. package/dist/nextjs/client.mjs +185 -0
  183. package/dist/nextjs/client.mjs.map +1 -0
  184. package/dist/nextjs.d.mts +267 -0
  185. package/dist/nextjs.d.ts +267 -0
  186. package/dist/nextjs.js +315 -0
  187. package/dist/nextjs.js.map +1 -0
  188. package/dist/nextjs.mjs +315 -0
  189. package/dist/nextjs.mjs.map +1 -0
  190. package/dist/react.d.mts +65 -0
  191. package/dist/react.d.ts +65 -0
  192. package/dist/react.js +226 -0
  193. package/dist/react.js.map +1 -0
  194. package/dist/react.mjs +226 -0
  195. package/dist/react.mjs.map +1 -0
  196. package/dist/server.d.mts +35 -0
  197. package/dist/server.d.ts +35 -0
  198. package/dist/server.js +20 -0
  199. package/dist/server.js.map +1 -0
  200. package/dist/server.mjs +20 -0
  201. package/dist/server.mjs.map +1 -0
  202. package/dist/src/shared/components/LoadingIcon.d.ts.map +1 -1
  203. package/dist/src/shared/components/LoadingIcon.js +0 -6
  204. package/dist/src/shared/components/LoadingIcon.js.map +1 -1
  205. package/dist/storage-ANmRwpZ3.d.ts +25 -0
  206. package/dist/storage-B2eAQNdv.d.ts +25 -0
  207. package/dist/storage-BJPUpxhm.d.mts +25 -0
  208. package/dist/storage-BJyqsZwC.d.mts +25 -0
  209. package/dist/tsconfig.tsbuildinfo +1 -1
  210. package/dist/types-Bqm9OCZN.d.mts +22 -0
  211. package/dist/types-Bqm9OCZN.d.ts +22 -0
  212. package/dist/types-BxAubCqO.d.mts +58 -0
  213. package/dist/types-BxAubCqO.d.ts +58 -0
  214. package/dist/types-DOfl9w7j.d.mts +23 -0
  215. package/dist/types-DOfl9w7j.d.ts +23 -0
  216. package/dist/types-HdCjGldB.d.mts +58 -0
  217. package/dist/types-HdCjGldB.d.ts +58 -0
  218. package/package.json +1 -1
  219. package/src/browser/storage.ts +3 -3
  220. package/src/nextjs/GetUser.ts +3 -3
  221. package/src/nextjs/config.ts +0 -2
  222. package/src/nextjs/cookies.ts +14 -18
  223. package/src/nextjs/routeHandler.ts +1 -5
  224. package/src/reactjs/hooks/index.ts +0 -1
  225. package/src/server/ServerAuthenticationResolver.ts +2 -7
  226. package/src/server/login.ts +2 -2
  227. package/src/services/AuthenticationService.ts +6 -16
  228. package/src/shared/components/CivicAuthIframeContainer.tsx +0 -4
  229. package/src/shared/lib/GenericAuthenticationRefresher.ts +3 -8
  230. package/src/shared/lib/UserSession.ts +6 -6
  231. package/src/shared/lib/session.ts +1 -1
  232. package/src/shared/lib/storage.ts +2 -2
  233. package/src/shared/lib/util.ts +21 -18
  234. package/src/types.ts +2 -2
  235. package/test/unit/nextjs/getUser.test.ts +8 -8
  236. package/test/unit/publicApi/__snapshots__/apiSnapshot.test.ts.snap +0 -7
  237. package/test/unit/server/login.test.ts +20 -18
  238. package/test/unit/server/session.test.ts +4 -4
  239. package/test/unit/services/AuthenticationService.test.ts +3 -3
  240. package/test/unit/services/ServerAuthenticationResolver.test.ts +11 -6
  241. package/test/unit/shared/GenericAuthenticationRefresher.test.ts +4 -4
  242. package/test/unit/shared/UserSession.test.ts +6 -6
  243. package/test/unit/shared/storage.test.ts +6 -6
  244. package/dist/cjs/src/nextjs/client/index.d.ts +0 -2
  245. package/dist/cjs/src/nextjs/client/index.d.ts.map +0 -1
  246. package/dist/cjs/src/nextjs/client/index.js +0 -6
  247. package/dist/cjs/src/nextjs/client/index.js.map +0 -1
  248. package/dist/cjs/src/styles.css +0 -387
  249. package/dist/esm/src/nextjs/client/index.d.ts +0 -2
  250. package/dist/esm/src/nextjs/client/index.d.ts.map +0 -1
  251. package/dist/esm/src/nextjs/client/index.js +0 -2
  252. package/dist/esm/src/nextjs/client/index.js.map +0 -1
  253. package/dist/esm/src/styles.css +0 -387
  254. package/dist/src/nextjs/client/index.d.ts +0 -2
  255. package/dist/src/nextjs/client/index.d.ts.map +0 -1
  256. package/dist/src/nextjs/client/index.js +0 -2
  257. package/dist/src/nextjs/client/index.js.map +0 -1
  258. package/dist/test/unit/nextjs/routeHandler.test.d.ts +0 -2
  259. package/dist/test/unit/nextjs/routeHandler.test.d.ts.map +0 -1
  260. package/dist/test/unit/nextjs/routeHandler.test.js +0 -271
  261. package/dist/test/unit/nextjs/routeHandler.test.js.map +0 -1
@@ -0,0 +1,315 @@
1
+ import {
2
+ NextjsClientStorage,
3
+ NextjsCookieStorage,
4
+ clearAuthCookies,
5
+ createCivicAuthPlugin,
6
+ createTokenCookies,
7
+ createUserInfoCookie,
8
+ defaultAuthConfig,
9
+ loggers,
10
+ resolveAuthConfig,
11
+ resolveCallbackUrl
12
+ } from "./chunk-OXXUQ36U.mjs";
13
+ import {
14
+ resolveOAuthAccessCode
15
+ } from "./chunk-63YGK3A7.mjs";
16
+ import {
17
+ GenericPublicClientPKCEProducer,
18
+ GenericUserSession,
19
+ TOKEN_EXCHANGE_SUCCESS_TEXT,
20
+ TOKEN_EXCHANGE_TRIGGER_TEXT,
21
+ getUser,
22
+ retrieveTokens,
23
+ serverTokenExchangeFromState
24
+ } from "./chunk-Q7DSPTUG.mjs";
25
+ import {
26
+ __async,
27
+ __spreadProps,
28
+ __spreadValues
29
+ } from "./chunk-RGHW4PYM.mjs";
30
+
31
+ // src/nextjs/GetUser.ts
32
+ var getUser2 = () => {
33
+ var _a;
34
+ const clientStorage = new NextjsClientStorage();
35
+ const userSession = new GenericUserSession(clientStorage);
36
+ const tokens = retrieveTokens(clientStorage);
37
+ const user = userSession.get();
38
+ if (!user || !tokens) return null;
39
+ return __spreadProps(__spreadValues({}, user), {
40
+ idToken: tokens.id_token,
41
+ accessToken: tokens.access_token,
42
+ refreshToken: (_a = tokens.refresh_token) != null ? _a : ""
43
+ });
44
+ };
45
+
46
+ // src/nextjs/middleware.ts
47
+ import { NextResponse } from "next/server.js";
48
+ import picomatch from "picomatch";
49
+ var matchGlob = (pathname, globPattern) => {
50
+ const matches = picomatch(globPattern);
51
+ return matches(pathname);
52
+ };
53
+ var matchesGlobs = (pathname, patterns) => patterns.some((pattern) => {
54
+ if (!pattern) return false;
55
+ console.log("matching", {
56
+ pattern,
57
+ pathname,
58
+ match: matchGlob(pathname, pattern)
59
+ });
60
+ return matchGlob(pathname, pattern);
61
+ });
62
+ var applyAuth = (authConfig, request) => __async(void 0, null, function* () {
63
+ const authConfigWithDefaults = resolveAuthConfig(authConfig);
64
+ const isAuthenticated = !!request.cookies.get("id_token");
65
+ if (request.nextUrl.pathname === authConfigWithDefaults.loginUrl && request.method === "GET") {
66
+ console.log("\u2192 Skipping auth check - this is the login URL");
67
+ return void 0;
68
+ }
69
+ if (!matchesGlobs(request.nextUrl.pathname, authConfigWithDefaults.include)) {
70
+ console.log("\u2192 Skipping auth check - path not in include patterns");
71
+ return void 0;
72
+ }
73
+ if (matchesGlobs(request.nextUrl.pathname, authConfigWithDefaults.exclude)) {
74
+ console.log("\u2192 Skipping auth check - path in exclude patterns");
75
+ return void 0;
76
+ }
77
+ if (!isAuthenticated) {
78
+ const loginUrl = new URL(authConfigWithDefaults.loginUrl, request.url);
79
+ console.log("\u2192 No valid token found - redirecting to login", loginUrl);
80
+ return NextResponse.redirect(loginUrl);
81
+ }
82
+ console.log("\u2192 Auth check passed");
83
+ return void 0;
84
+ });
85
+ var authMiddleware = (authConfig = defaultAuthConfig) => (request) => __async(void 0, null, function* () {
86
+ const response = yield applyAuth(authConfig, request);
87
+ if (response) return response;
88
+ return NextResponse.next();
89
+ });
90
+ function withAuth(middleware) {
91
+ return (request) => __async(this, null, function* () {
92
+ const response = yield applyAuth({}, request);
93
+ if (response) return response;
94
+ return middleware(request);
95
+ });
96
+ }
97
+ function auth(authConfig = {}) {
98
+ return (middleware) => {
99
+ return (request) => __async(this, null, function* () {
100
+ const response = yield applyAuth(authConfig, request);
101
+ if (response) return response;
102
+ return middleware(request);
103
+ });
104
+ };
105
+ }
106
+
107
+ // src/nextjs/routeHandler.ts
108
+ import { NextResponse as NextResponse2 } from "next/server.js";
109
+ import { revalidatePath } from "next/cache.js";
110
+ import { cookies } from "next/headers.js";
111
+ var logger = loggers.nextjs.handlers.auth;
112
+ var AuthError = class extends Error {
113
+ constructor(message, status = 401) {
114
+ super(message);
115
+ this.status = status;
116
+ this.name = "AuthError";
117
+ }
118
+ };
119
+ function handleChallenge(request, config) {
120
+ return __async(this, null, function* () {
121
+ var _a, _b;
122
+ const cookieStorage = new NextjsCookieStorage((_b = (_a = config.cookies) == null ? void 0 : _a.tokens) != null ? _b : {});
123
+ const pkceProducer = new GenericPublicClientPKCEProducer(cookieStorage);
124
+ const challenge = yield pkceProducer.getCodeChallenge();
125
+ const appUrl = request.nextUrl.searchParams.get("appUrl");
126
+ if (appUrl) {
127
+ cookieStorage.set("app_url" /* APP_URL */, appUrl);
128
+ }
129
+ return NextResponse2.json({ status: "success", challenge });
130
+ });
131
+ }
132
+ function performTokenExchangeAndSetCookies(request, config, code, state, appUrl) {
133
+ return __async(this, null, function* () {
134
+ const resolvedConfigs = resolveAuthConfig(config);
135
+ const cookieStorage = new NextjsCookieStorage(resolvedConfigs.cookies.tokens);
136
+ const callbackUrl = resolveCallbackUrl(resolvedConfigs, appUrl);
137
+ try {
138
+ yield resolveOAuthAccessCode(code, state, cookieStorage, __spreadProps(__spreadValues({}, resolvedConfigs), {
139
+ redirectUrl: callbackUrl
140
+ }));
141
+ } catch (error) {
142
+ logger.error("Token exchange failed:", error);
143
+ throw new AuthError("Failed to authenticate user", 401);
144
+ }
145
+ const user = yield getUser(cookieStorage);
146
+ if (!user) {
147
+ throw new AuthError("Failed to get user info", 401);
148
+ }
149
+ const clientStorage = new NextjsClientStorage();
150
+ const userSession = new GenericUserSession(clientStorage);
151
+ userSession.set(user);
152
+ });
153
+ }
154
+ function handleCallback(request, config) {
155
+ return __async(this, null, function* () {
156
+ var _a;
157
+ const resolvedConfigs = resolveAuthConfig(config);
158
+ console.log("handleCallback", { request, resolvedConfigs });
159
+ const code = request.nextUrl.searchParams.get("code");
160
+ const state = request.nextUrl.searchParams.get("state") || "";
161
+ if (!code || !state) throw new AuthError("Bad parameters", 400);
162
+ const appUrl = ((_a = request.cookies.get("app_url" /* APP_URL */)) == null ? void 0 : _a.value) || request.nextUrl.searchParams.get("appUrl");
163
+ console.log("handleCallback", {
164
+ code,
165
+ state,
166
+ cookies: cookies(),
167
+ appUrl
168
+ });
169
+ const codeVerifier = request.cookies.get("code_verifier" /* COOKIE_NAME */);
170
+ if (!codeVerifier || !appUrl) {
171
+ console.log("handleCallback no code_verifier found", {
172
+ state,
173
+ serverTokenExchange: serverTokenExchangeFromState(`${state}`)
174
+ });
175
+ let response2 = new NextResponse2(
176
+ `<html><body><span style="display:none">${TOKEN_EXCHANGE_TRIGGER_TEXT}</span></body></html>`
177
+ );
178
+ if (state && serverTokenExchangeFromState(state)) {
179
+ console.log(
180
+ "handleCallback serverTokenExchangeFromState, launching redirect page...",
181
+ {
182
+ requestUrl: request.url,
183
+ configCallbackUrl: resolvedConfigs.callbackUrl
184
+ }
185
+ );
186
+ const requestUrl = new URL(request.url);
187
+ const fetchUrl = `${resolvedConfigs.callbackUrl}?${requestUrl.searchParams.toString()}&sameDomainServerTokenExchange=true`;
188
+ response2 = new NextResponse2(
189
+ `<html>
190
+ <body>
191
+ <span style="display:none">
192
+ <script>
193
+ window.onload = function () {
194
+ const appUrl = globalThis.window?.location?.origin;
195
+ fetch('${fetchUrl}&appUrl=' + appUrl).then((response) => {
196
+ response.json().then((jsonResponse) => {
197
+ console.log('fetch jsonResponse', jsonResponse);
198
+ if (jsonResponse.redirectUrl) {
199
+ console.log('handleCallback serverTokenExchangeFromState, redirecting');
200
+ window.location.href = jsonResponse.redirectUrl;
201
+ }
202
+ });
203
+ });
204
+ };
205
+ </script>
206
+ </span>
207
+ </body>
208
+ </html>
209
+ `
210
+ );
211
+ }
212
+ response2.headers.set("Content-Type", "text/html; charset=utf-8");
213
+ console.log(
214
+ `handleCallback no code_verifier found, returning ${TOKEN_EXCHANGE_TRIGGER_TEXT}`
215
+ );
216
+ return response2;
217
+ }
218
+ yield performTokenExchangeAndSetCookies(
219
+ request,
220
+ resolvedConfigs,
221
+ code,
222
+ state,
223
+ appUrl
224
+ );
225
+ if (request.url.includes("sameDomainServerTokenExchange=true")) {
226
+ console.log(
227
+ "handleCallback sameDomainServerTokenExchange = true, returnining redirectUrl",
228
+ appUrl
229
+ );
230
+ return NextResponse2.json({
231
+ status: "success",
232
+ redirectUrl: appUrl
233
+ });
234
+ }
235
+ if (serverTokenExchangeFromState(state)) {
236
+ console.log(
237
+ "handleCallback serverTokenExchangeFromState, redirect to appUrl",
238
+ appUrl
239
+ );
240
+ if (!appUrl) {
241
+ throw new Error("appUrl undefined. Cannot redirect.");
242
+ }
243
+ return NextResponse2.redirect(`${appUrl}`);
244
+ }
245
+ const response = new NextResponse2(
246
+ `<html><span style="display:none">${TOKEN_EXCHANGE_SUCCESS_TEXT}</span></html>`
247
+ );
248
+ response.headers.set("Content-Type", "text/html; charset=utf-8");
249
+ return response;
250
+ });
251
+ }
252
+ var getAbsoluteRedirectPath = (redirectPath, currentBasePath) => new URL(redirectPath, currentBasePath).href;
253
+ function handleLogout(request, config) {
254
+ return __async(this, null, function* () {
255
+ var _a;
256
+ const resolvedConfigs = resolveAuthConfig(config);
257
+ const defaultRedirectPath = (_a = resolvedConfigs.loginUrl) != null ? _a : "/";
258
+ const redirectTarget = new URL(request.url).searchParams.get("redirect") || defaultRedirectPath;
259
+ const isAbsoluteRedirect = /^(https?:\/\/|www\.).+/i.test(redirectTarget);
260
+ const appUrl = request.nextUrl.searchParams.get("appUrl");
261
+ const finalRedirectUrl = isAbsoluteRedirect ? redirectTarget : getAbsoluteRedirectPath(
262
+ redirectTarget,
263
+ new URL(appUrl != null ? appUrl : request.url).origin
264
+ );
265
+ const response = NextResponse2.redirect(finalRedirectUrl);
266
+ clearAuthCookies(config);
267
+ try {
268
+ revalidatePath(isAbsoluteRedirect ? finalRedirectUrl : redirectTarget);
269
+ } catch (error) {
270
+ logger.warn("Failed to revalidate path after logout:", error);
271
+ }
272
+ return response;
273
+ });
274
+ }
275
+ var handler = (authConfig = {}) => (request) => __async(void 0, null, function* () {
276
+ const config = resolveAuthConfig(authConfig);
277
+ try {
278
+ const pathname = request.nextUrl.pathname;
279
+ const pathSegments = pathname.split("/");
280
+ const lastSegment = pathSegments[pathSegments.length - 1];
281
+ switch (lastSegment) {
282
+ case "challenge":
283
+ return yield handleChallenge(request, config);
284
+ case "callback":
285
+ return yield handleCallback(request, config);
286
+ case "logout":
287
+ return yield handleLogout(request, config);
288
+ default:
289
+ throw new AuthError(`Invalid auth route: ${pathname}`, 404);
290
+ }
291
+ } catch (error) {
292
+ logger.error("Auth handler error:", error);
293
+ const status = error instanceof AuthError ? error.status : 500;
294
+ const message = error instanceof Error ? error.message : "Authentication failed";
295
+ const response = NextResponse2.json({ error: message }, { status });
296
+ clearAuthCookies(config);
297
+ return response;
298
+ }
299
+ });
300
+ export {
301
+ NextjsClientStorage,
302
+ NextjsCookieStorage,
303
+ auth,
304
+ authMiddleware,
305
+ clearAuthCookies,
306
+ createCivicAuthPlugin,
307
+ createTokenCookies,
308
+ createUserInfoCookie,
309
+ defaultAuthConfig,
310
+ getUser2 as getUser,
311
+ handler,
312
+ resolveAuthConfig,
313
+ withAuth
314
+ };
315
+ //# sourceMappingURL=nextjs.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/nextjs/GetUser.ts","../src/nextjs/middleware.ts","../src/nextjs/routeHandler.ts"],"sourcesContent":["/**\n * Used on the server-side to get the user object from the cookie\n */\nimport { User } from \"@/types\";\nimport { GenericUserSession } from \"@/shared/UserSession\";\nimport { NextjsClientStorage } from \"@/nextjs/cookies\";\nimport { retrieveTokens } from \"@/shared/util\";\n\nexport const getUser = (): User | null => {\n const clientStorage = new NextjsClientStorage();\n const userSession = new GenericUserSession(clientStorage);\n const tokens = retrieveTokens(clientStorage);\n const user = userSession.get();\n if (!user || !tokens) return null;\n\n return {\n ...user!,\n idToken: tokens.id_token,\n accessToken: tokens.access_token,\n refreshToken: tokens.refresh_token ?? \"\",\n } as User;\n};\n","/**\n * Authenticates the user on all requests by checking the token cookie\n *\n * Usage:\n * Option 1: use if no other middleware (e.g. no next-intl etc)\n * export default authMiddleware();\n *\n * Option 2: use if other middleware is needed - default auth config\n * export default withAuth((request) => {\n * console.log('in custom middleware', request.nextUrl.pathname);\n * return NextResponse.next();\n * })\n *\n * Option 3: use if other middleware is needed - specifying auth config\n * const withCivicAuth = auth({ loginUrl: '/login', include: ['/[.*]/user'] })\n * export default withCivicAuth((request) => {\n * console.log('in custom middleware', request.url);\n * return NextResponse.next();\n * })\n *\n */\nimport { NextRequest, NextResponse } from \"next/server.js\";\nimport picomatch from \"picomatch\";\nimport {\n AuthConfig,\n defaultAuthConfig,\n resolveAuthConfig,\n} from \"@/nextjs/config.js\";\n\ntype Middleware = (\n request: NextRequest,\n) => Promise<NextResponse> | NextResponse;\n\n// Matches globs:\n// Examples:\n// /user\n// /user/*\n// /user/**/info\nconst matchGlob = (pathname: string, globPattern: string) => {\n const matches = picomatch(globPattern);\n return matches(pathname);\n};\n\n// Matches globs:\n// Examples:\n// /user\n// /user/*\n// /user/**/info\nconst matchesGlobs = (pathname: string, patterns: string[]) =>\n patterns.some((pattern) => {\n if (!pattern) return false;\n console.log(\"matching\", {\n pattern,\n pathname,\n match: matchGlob(pathname, pattern),\n });\n return matchGlob(pathname, pattern);\n });\n\n// internal - used by all exported functions\nconst applyAuth = async (\n authConfig: AuthConfig,\n request: NextRequest,\n): Promise<NextResponse | undefined> => {\n const authConfigWithDefaults = resolveAuthConfig(authConfig);\n // Check for any valid auth token\n const isAuthenticated = !!request.cookies.get(\"id_token\");\n\n // skip auth check for redirect to login url\n if (\n request.nextUrl.pathname === authConfigWithDefaults.loginUrl &&\n request.method === \"GET\"\n ) {\n console.log(\"→ Skipping auth check - this is the login URL\");\n return undefined;\n }\n\n if (!matchesGlobs(request.nextUrl.pathname, authConfigWithDefaults.include)) {\n console.log(\"→ Skipping auth check - path not in include patterns\");\n return undefined;\n }\n\n if (matchesGlobs(request.nextUrl.pathname, authConfigWithDefaults.exclude)) {\n console.log(\"→ Skipping auth check - path in exclude patterns\");\n return undefined;\n }\n\n // Check for either token type\n if (!isAuthenticated) {\n const loginUrl = new URL(authConfigWithDefaults.loginUrl, request.url);\n console.log(\"→ No valid token found - redirecting to login\", loginUrl);\n return NextResponse.redirect(loginUrl);\n }\n\n console.log(\"→ Auth check passed\");\n return undefined;\n};\n\n/**\n *\n * Use this when auth is the only middleware you need.\n * Usage:\n *\n * export default authMiddleware({ loginUrl = '/login' }); // or just authMiddleware();\n *\n */\nexport const authMiddleware =\n (authConfig = defaultAuthConfig) =>\n async (request: NextRequest): Promise<NextResponse> => {\n const response = await applyAuth(authConfig, request);\n if (response) return response;\n\n // NextJS doesn't do middleware chaining yet, so this does not mean\n // \"call the next middleware\" - it means \"continue to the route handler\"\n return NextResponse.next();\n };\n\n/**\n * Usage:\n *\n * export default withAuth(async (request) => {\n * console.log('my middleware');\n * return NextResponse.next();\n * })\n */\n// use this when you have your own middleware to chain\nexport function withAuth(\n middleware: Middleware,\n): (request: NextRequest) => Promise<NextResponse> {\n return async (request: NextRequest): Promise<NextResponse> => {\n const response = await applyAuth({}, request);\n if (response) return response;\n\n return middleware(request);\n };\n}\n\n/**\n * Use this when you want to configure the middleware here (an alternative is to do it in the next.config file)\n *\n * Usage:\n *\n * const withAuth = auth({ loginUrl = '/login' }); // or just auth();\n *\n * export default withAuth(async (request) => {\n * console.log('my middleware');\n * return NextResponse.next();\n * })\n *\n */\nexport function auth(authConfig: AuthConfig = {}) {\n return (\n middleware: Middleware,\n ): ((request: NextRequest) => Promise<NextResponse>) => {\n return async (request: NextRequest): Promise<NextResponse> => {\n const response = await applyAuth(authConfig, request);\n if (response) return response;\n\n return middleware(request);\n };\n };\n}\n","import { NextRequest, NextResponse } from \"next/server.js\";\nimport { revalidatePath } from \"next/cache.js\";\nimport { AuthConfig, resolveAuthConfig } from \"@/nextjs/config.js\";\nimport { loggers } from \"@/lib/logger.js\";\nimport {\n clearAuthCookies,\n NextjsClientStorage,\n NextjsCookieStorage,\n} from \"@/nextjs/cookies.js\";\nimport { GenericPublicClientPKCEProducer } from \"@/services/PKCE.js\";\nimport { resolveOAuthAccessCode } from \"@/server/login.js\";\nimport { getUser } from \"@/shared/session.js\";\nimport { resolveCallbackUrl } from \"@/nextjs/utils.js\";\nimport { GenericUserSession } from \"@/shared/UserSession.js\";\nimport {\n TOKEN_EXCHANGE_SUCCESS_TEXT,\n TOKEN_EXCHANGE_TRIGGER_TEXT,\n} from \"@/constants.js\";\nimport { serverTokenExchangeFromState } from \"@/lib/oauth.js\";\nimport { cookies } from \"next/headers.js\";\nimport { CodeVerifier } from \"@/shared/types\";\n\nconst logger = loggers.nextjs.handlers.auth;\n\nclass AuthError extends Error {\n constructor(\n message: string,\n public readonly status: number = 401,\n ) {\n super(message);\n this.name = \"AuthError\";\n }\n}\n\n/**\n * create a code verifier and challenge for PKCE\n * saving the verifier in a cookie for later use\n * @returns {Promise<NextResponse>}\n */\nasync function handleChallenge(\n request: NextRequest,\n config: AuthConfig,\n): Promise<NextResponse> {\n const cookieStorage = new NextjsCookieStorage(config.cookies?.tokens ?? {});\n const pkceProducer = new GenericPublicClientPKCEProducer(cookieStorage);\n\n const challenge = await pkceProducer.getCodeChallenge();\n const appUrl = request.nextUrl.searchParams.get(\"appUrl\");\n if (appUrl) {\n cookieStorage.set(CodeVerifier.APP_URL, appUrl);\n }\n return NextResponse.json({ status: \"success\", challenge });\n}\n\nasync function performTokenExchangeAndSetCookies(\n request: NextRequest,\n config: AuthConfig,\n code: string,\n state: string,\n appUrl: string,\n) {\n const resolvedConfigs = resolveAuthConfig(config);\n const cookieStorage = new NextjsCookieStorage(resolvedConfigs.cookies.tokens);\n\n const callbackUrl = resolveCallbackUrl(resolvedConfigs, appUrl);\n try {\n await resolveOAuthAccessCode(code, state, cookieStorage, {\n ...resolvedConfigs,\n redirectUrl: callbackUrl,\n });\n } catch (error) {\n logger.error(\"Token exchange failed:\", error);\n throw new AuthError(\"Failed to authenticate user\", 401);\n }\n\n const user = await getUser(cookieStorage);\n if (!user) {\n throw new AuthError(\"Failed to get user info\", 401);\n }\n\n const clientStorage = new NextjsClientStorage();\n const userSession = new GenericUserSession(clientStorage);\n userSession.set(user);\n}\nasync function handleCallback(\n request: NextRequest,\n config: AuthConfig,\n): Promise<NextResponse> {\n const resolvedConfigs = resolveAuthConfig(config);\n console.log(\"handleCallback\", { request, resolvedConfigs });\n const code = request.nextUrl.searchParams.get(\"code\");\n const state = request.nextUrl.searchParams.get(\"state\") || \"\";\n if (!code || !state) throw new AuthError(\"Bad parameters\", 400);\n\n // appUrl is passed from the client to the server in the query string\n // this is necessary because the server does not have access to the client's window.location.origin\n // and can not accurately determine the appUrl (specially if the app is behind a reverse proxy)\n const appUrl =\n request.cookies.get(CodeVerifier.APP_URL)?.value ||\n request.nextUrl.searchParams.get(\"appUrl\");\n\n // If we have a code_verifier cookie and the appUrl, we can do a token exchange.\n // Otherwise, just render an empty page.\n // The initial redirect back from the auth server does not send cookies, because the redirect is from a 3rd-party domain.\n // The client will make an additional call to this route with cookies included, at which point we do the token exchange.\n console.log(\"handleCallback\", {\n code,\n state,\n cookies: cookies(),\n appUrl,\n });\n\n const codeVerifier = request.cookies.get(CodeVerifier.COOKIE_NAME);\n\n if (!codeVerifier || !appUrl) {\n console.log(\"handleCallback no code_verifier found\", {\n state,\n serverTokenExchange: serverTokenExchangeFromState(`${state}`),\n });\n let response = new NextResponse(\n `<html><body><span style=\"display:none\">${TOKEN_EXCHANGE_TRIGGER_TEXT}</span></body></html>`,\n );\n\n // in server-side token exchange mode we need to launch a page that will trigger the token exchange\n // from the same domain, allowing it access to the code_verifier cookie\n // we only need to do this in redirect mode, as the iframe already triggers a client-side token exchange\n // if no code-verifier cookie is found\n if (state && serverTokenExchangeFromState(state)) {\n console.log(\n \"handleCallback serverTokenExchangeFromState, launching redirect page...\",\n {\n requestUrl: request.url,\n configCallbackUrl: resolvedConfigs.callbackUrl,\n },\n );\n // we need to replace the URL with resolved config in case the server is hosted\n // behind a reverse proxy or load balancer\n const requestUrl = new URL(request.url);\n const fetchUrl = `${resolvedConfigs.callbackUrl}?${requestUrl.searchParams.toString()}&sameDomainServerTokenExchange=true`;\n response = new NextResponse(\n `<html>\n <body>\n <span style=\"display:none\">\n <script>\n window.onload = function () {\n const appUrl = globalThis.window?.location?.origin;\n fetch('${fetchUrl}&appUrl=' + appUrl).then((response) => {\n response.json().then((jsonResponse) => {\n console.log('fetch jsonResponse', jsonResponse);\n if (jsonResponse.redirectUrl) {\n console.log('handleCallback serverTokenExchangeFromState, redirecting');\n window.location.href = jsonResponse.redirectUrl;\n }\n });\n });\n };\n </script>\n </span>\n </body>\n </html>\n `,\n );\n }\n response.headers.set(\"Content-Type\", \"text/html; charset=utf-8\");\n console.log(\n `handleCallback no code_verifier found, returning ${TOKEN_EXCHANGE_TRIGGER_TEXT}`,\n );\n return response;\n }\n\n await performTokenExchangeAndSetCookies(\n request,\n resolvedConfigs,\n code,\n state,\n appUrl,\n );\n\n if (request.url.includes(\"sameDomainServerTokenExchange=true\")) {\n console.log(\n \"handleCallback sameDomainServerTokenExchange = true, returnining redirectUrl\",\n appUrl,\n );\n return NextResponse.json({\n status: \"success\",\n redirectUrl: appUrl,\n });\n }\n\n // this is the case where a 'normal' redirect is happening\n if (serverTokenExchangeFromState(state)) {\n console.log(\n \"handleCallback serverTokenExchangeFromState, redirect to appUrl\",\n appUrl,\n );\n if (!appUrl) {\n throw new Error(\"appUrl undefined. Cannot redirect.\");\n }\n return NextResponse.redirect(`${appUrl}`);\n }\n // return an empty HTML response so the iframe doesn't show any response\n // in the short moment between the redirect and the parent window\n // acknowledging the redirect and closing the iframe\n const response = new NextResponse(\n `<html><span style=\"display:none\">${TOKEN_EXCHANGE_SUCCESS_TEXT}</span></html>`,\n );\n response.headers.set(\"Content-Type\", \"text/html; charset=utf-8\");\n return response;\n}\n\n/**\n * If redirectPath is an absolute path, return it as-is.\n * Otherwise for relative paths, append it to the current domain.\n * @param redirectPath\n * @returns\n */\nconst getAbsoluteRedirectPath = (\n redirectPath: string,\n currentBasePath: string,\n) => new URL(redirectPath, currentBasePath).href;\n\nexport async function handleLogout(\n request: NextRequest,\n config: AuthConfig,\n): Promise<NextResponse> {\n const resolvedConfigs = resolveAuthConfig(config);\n const defaultRedirectPath = resolvedConfigs.loginUrl ?? \"/\";\n const redirectTarget =\n new URL(request.url).searchParams.get(\"redirect\") || defaultRedirectPath;\n\n const isAbsoluteRedirect = /^(https?:\\/\\/|www\\.).+/i.test(redirectTarget);\n\n const appUrl = request.nextUrl.searchParams.get(\"appUrl\");\n\n const finalRedirectUrl = isAbsoluteRedirect\n ? redirectTarget\n : getAbsoluteRedirectPath(\n redirectTarget,\n new URL(appUrl ?? request.url).origin,\n );\n\n const response = NextResponse.redirect(finalRedirectUrl);\n\n clearAuthCookies(config);\n\n try {\n revalidatePath(isAbsoluteRedirect ? finalRedirectUrl : redirectTarget);\n } catch (error) {\n logger.warn(\"Failed to revalidate path after logout:\", error);\n }\n\n return response;\n}\n\n/**\n * Creates an authentication handler for Next.js API routes\n *\n * Usage:\n * ```ts\n * // app/api/auth/[...civicauth]/route.ts\n * import { handler } from '@civic/auth/nextjs'\n * export const GET = handler({\n * // optional config overrides\n * })\n * ```\n */\nexport const handler =\n (authConfig = {}) =>\n async (request: NextRequest): Promise<NextResponse> => {\n const config = resolveAuthConfig(authConfig);\n\n try {\n const pathname = request.nextUrl.pathname;\n const pathSegments = pathname.split(\"/\");\n const lastSegment = pathSegments[pathSegments.length - 1];\n\n switch (lastSegment) {\n case \"challenge\":\n return await handleChallenge(request, config);\n case \"callback\":\n return await handleCallback(request, config);\n case \"logout\":\n return await handleLogout(request, config);\n default:\n throw new AuthError(`Invalid auth route: ${pathname}`, 404);\n }\n } catch (error) {\n logger.error(\"Auth handler error:\", error);\n\n const status = error instanceof AuthError ? error.status : 500;\n const message =\n error instanceof Error ? error.message : \"Authentication failed\";\n\n const response = NextResponse.json({ error: message }, { status });\n\n clearAuthCookies(config);\n return response;\n }\n };\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAQO,IAAMA,WAAU,MAAmB;AAR1C;AASE,QAAM,gBAAgB,IAAI,oBAAoB;AAC9C,QAAM,cAAc,IAAI,mBAAmB,aAAa;AACxD,QAAM,SAAS,eAAe,aAAa;AAC3C,QAAM,OAAO,YAAY,IAAI;AAC7B,MAAI,CAAC,QAAQ,CAAC,OAAQ,QAAO;AAE7B,SAAO,iCACF,OADE;AAAA,IAEL,SAAS,OAAO;AAAA,IAChB,aAAa,OAAO;AAAA,IACpB,eAAc,YAAO,kBAAP,YAAwB;AAAA,EACxC;AACF;;;ACAA,SAAsB,oBAAoB;AAC1C,OAAO,eAAe;AAgBtB,IAAM,YAAY,CAAC,UAAkB,gBAAwB;AAC3D,QAAM,UAAU,UAAU,WAAW;AACrC,SAAO,QAAQ,QAAQ;AACzB;AAOA,IAAM,eAAe,CAAC,UAAkB,aACtC,SAAS,KAAK,CAAC,YAAY;AACzB,MAAI,CAAC,QAAS,QAAO;AACrB,UAAQ,IAAI,YAAY;AAAA,IACtB;AAAA,IACA;AAAA,IACA,OAAO,UAAU,UAAU,OAAO;AAAA,EACpC,CAAC;AACD,SAAO,UAAU,UAAU,OAAO;AACpC,CAAC;AAGH,IAAM,YAAY,CAChB,YACA,YACsC;AACtC,QAAM,yBAAyB,kBAAkB,UAAU;AAE3D,QAAM,kBAAkB,CAAC,CAAC,QAAQ,QAAQ,IAAI,UAAU;AAGxD,MACE,QAAQ,QAAQ,aAAa,uBAAuB,YACpD,QAAQ,WAAW,OACnB;AACA,YAAQ,IAAI,oDAA+C;AAC3D,WAAO;AAAA,EACT;AAEA,MAAI,CAAC,aAAa,QAAQ,QAAQ,UAAU,uBAAuB,OAAO,GAAG;AAC3E,YAAQ,IAAI,2DAAsD;AAClE,WAAO;AAAA,EACT;AAEA,MAAI,aAAa,QAAQ,QAAQ,UAAU,uBAAuB,OAAO,GAAG;AAC1E,YAAQ,IAAI,uDAAkD;AAC9D,WAAO;AAAA,EACT;AAGA,MAAI,CAAC,iBAAiB;AACpB,UAAM,WAAW,IAAI,IAAI,uBAAuB,UAAU,QAAQ,GAAG;AACrE,YAAQ,IAAI,sDAAiD,QAAQ;AACrE,WAAO,aAAa,SAAS,QAAQ;AAAA,EACvC;AAEA,UAAQ,IAAI,0BAAqB;AACjC,SAAO;AACT;AAUO,IAAM,iBACX,CAAC,aAAa,sBACd,CAAO,YAAgD;AACrD,QAAM,WAAW,MAAM,UAAU,YAAY,OAAO;AACpD,MAAI,SAAU,QAAO;AAIrB,SAAO,aAAa,KAAK;AAC3B;AAWK,SAAS,SACd,YACiD;AACjD,SAAO,CAAO,YAAgD;AAC5D,UAAM,WAAW,MAAM,UAAU,CAAC,GAAG,OAAO;AAC5C,QAAI,SAAU,QAAO;AAErB,WAAO,WAAW,OAAO;AAAA,EAC3B;AACF;AAeO,SAAS,KAAK,aAAyB,CAAC,GAAG;AAChD,SAAO,CACL,eACsD;AACtD,WAAO,CAAO,YAAgD;AAC5D,YAAM,WAAW,MAAM,UAAU,YAAY,OAAO;AACpD,UAAI,SAAU,QAAO;AAErB,aAAO,WAAW,OAAO;AAAA,IAC3B;AAAA,EACF;AACF;;;ACjKA,SAAsB,gBAAAC,qBAAoB;AAC1C,SAAS,sBAAsB;AAkB/B,SAAS,eAAe;AAGxB,IAAM,SAAS,QAAQ,OAAO,SAAS;AAEvC,IAAM,YAAN,cAAwB,MAAM;AAAA,EAC5B,YACE,SACgB,SAAiB,KACjC;AACA,UAAM,OAAO;AAFG;AAGhB,SAAK,OAAO;AAAA,EACd;AACF;AAOA,SAAe,gBACb,SACA,QACuB;AAAA;AA1CzB;AA2CE,UAAM,gBAAgB,IAAI,qBAAoB,kBAAO,YAAP,mBAAgB,WAAhB,YAA0B,CAAC,CAAC;AAC1E,UAAM,eAAe,IAAI,gCAAgC,aAAa;AAEtE,UAAM,YAAY,MAAM,aAAa,iBAAiB;AACtD,UAAM,SAAS,QAAQ,QAAQ,aAAa,IAAI,QAAQ;AACxD,QAAI,QAAQ;AACV,oBAAc,6BAA0B,MAAM;AAAA,IAChD;AACA,WAAOC,cAAa,KAAK,EAAE,QAAQ,WAAW,UAAU,CAAC;AAAA,EAC3D;AAAA;AAEA,SAAe,kCACb,SACA,QACA,MACA,OACA,QACA;AAAA;AACA,UAAM,kBAAkB,kBAAkB,MAAM;AAChD,UAAM,gBAAgB,IAAI,oBAAoB,gBAAgB,QAAQ,MAAM;AAE5E,UAAM,cAAc,mBAAmB,iBAAiB,MAAM;AAC9D,QAAI;AACF,YAAM,uBAAuB,MAAM,OAAO,eAAe,iCACpD,kBADoD;AAAA,QAEvD,aAAa;AAAA,MACf,EAAC;AAAA,IACH,SAAS,OAAO;AACd,aAAO,MAAM,0BAA0B,KAAK;AAC5C,YAAM,IAAI,UAAU,+BAA+B,GAAG;AAAA,IACxD;AAEA,UAAM,OAAO,MAAM,QAAQ,aAAa;AACxC,QAAI,CAAC,MAAM;AACT,YAAM,IAAI,UAAU,2BAA2B,GAAG;AAAA,IACpD;AAEA,UAAM,gBAAgB,IAAI,oBAAoB;AAC9C,UAAM,cAAc,IAAI,mBAAmB,aAAa;AACxD,gBAAY,IAAI,IAAI;AAAA,EACtB;AAAA;AACA,SAAe,eACb,SACA,QACuB;AAAA;AAvFzB;AAwFE,UAAM,kBAAkB,kBAAkB,MAAM;AAChD,YAAQ,IAAI,kBAAkB,EAAE,SAAS,gBAAgB,CAAC;AAC1D,UAAM,OAAO,QAAQ,QAAQ,aAAa,IAAI,MAAM;AACpD,UAAM,QAAQ,QAAQ,QAAQ,aAAa,IAAI,OAAO,KAAK;AAC3D,QAAI,CAAC,QAAQ,CAAC,MAAO,OAAM,IAAI,UAAU,kBAAkB,GAAG;AAK9D,UAAM,WACJ,aAAQ,QAAQ,2BAAwB,MAAxC,mBAA2C,UAC3C,QAAQ,QAAQ,aAAa,IAAI,QAAQ;AAM3C,YAAQ,IAAI,kBAAkB;AAAA,MAC5B;AAAA,MACA;AAAA,MACA,SAAS,QAAQ;AAAA,MACjB;AAAA,IACF,CAAC;AAED,UAAM,eAAe,QAAQ,QAAQ,qCAA4B;AAEjE,QAAI,CAAC,gBAAgB,CAAC,QAAQ;AAC5B,cAAQ,IAAI,yCAAyC;AAAA,QACnD;AAAA,QACA,qBAAqB,6BAA6B,GAAG,KAAK,EAAE;AAAA,MAC9D,CAAC;AACD,UAAIC,YAAW,IAAID;AAAA,QACjB,0CAA0C,2BAA2B;AAAA,MACvE;AAMA,UAAI,SAAS,6BAA6B,KAAK,GAAG;AAChD,gBAAQ;AAAA,UACN;AAAA,UACA;AAAA,YACE,YAAY,QAAQ;AAAA,YACpB,mBAAmB,gBAAgB;AAAA,UACrC;AAAA,QACF;AAGA,cAAM,aAAa,IAAI,IAAI,QAAQ,GAAG;AACtC,cAAM,WAAW,GAAG,gBAAgB,WAAW,IAAI,WAAW,aAAa,SAAS,CAAC;AACrF,QAAAC,YAAW,IAAID;AAAA,UACb;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,qCAM6B,QAAQ;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,QAevC;AAAA,MACF;AACA,MAAAC,UAAS,QAAQ,IAAI,gBAAgB,0BAA0B;AAC/D,cAAQ;AAAA,QACN,oDAAoD,2BAA2B;AAAA,MACjF;AACA,aAAOA;AAAA,IACT;AAEA,UAAM;AAAA,MACJ;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,IACF;AAEA,QAAI,QAAQ,IAAI,SAAS,oCAAoC,GAAG;AAC9D,cAAQ;AAAA,QACN;AAAA,QACA;AAAA,MACF;AACA,aAAOD,cAAa,KAAK;AAAA,QACvB,QAAQ;AAAA,QACR,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAGA,QAAI,6BAA6B,KAAK,GAAG;AACvC,cAAQ;AAAA,QACN;AAAA,QACA;AAAA,MACF;AACA,UAAI,CAAC,QAAQ;AACX,cAAM,IAAI,MAAM,oCAAoC;AAAA,MACtD;AACA,aAAOA,cAAa,SAAS,GAAG,MAAM,EAAE;AAAA,IAC1C;AAIA,UAAM,WAAW,IAAIA;AAAA,MACnB,oCAAoC,2BAA2B;AAAA,IACjE;AACA,aAAS,QAAQ,IAAI,gBAAgB,0BAA0B;AAC/D,WAAO;AAAA,EACT;AAAA;AAQA,IAAM,0BAA0B,CAC9B,cACA,oBACG,IAAI,IAAI,cAAc,eAAe,EAAE;AAE5C,SAAsB,aACpB,SACA,QACuB;AAAA;AAhOzB;AAiOE,UAAM,kBAAkB,kBAAkB,MAAM;AAChD,UAAM,uBAAsB,qBAAgB,aAAhB,YAA4B;AACxD,UAAM,iBACJ,IAAI,IAAI,QAAQ,GAAG,EAAE,aAAa,IAAI,UAAU,KAAK;AAEvD,UAAM,qBAAqB,0BAA0B,KAAK,cAAc;AAExE,UAAM,SAAS,QAAQ,QAAQ,aAAa,IAAI,QAAQ;AAExD,UAAM,mBAAmB,qBACrB,iBACA;AAAA,MACE;AAAA,MACA,IAAI,IAAI,0BAAU,QAAQ,GAAG,EAAE;AAAA,IACjC;AAEJ,UAAM,WAAWA,cAAa,SAAS,gBAAgB;AAEvD,qBAAiB,MAAM;AAEvB,QAAI;AACF,qBAAe,qBAAqB,mBAAmB,cAAc;AAAA,IACvE,SAAS,OAAO;AACd,aAAO,KAAK,2CAA2C,KAAK;AAAA,IAC9D;AAEA,WAAO;AAAA,EACT;AAAA;AAcO,IAAM,UACX,CAAC,aAAa,CAAC,MACf,CAAO,YAAgD;AACrD,QAAM,SAAS,kBAAkB,UAAU;AAE3C,MAAI;AACF,UAAM,WAAW,QAAQ,QAAQ;AACjC,UAAM,eAAe,SAAS,MAAM,GAAG;AACvC,UAAM,cAAc,aAAa,aAAa,SAAS,CAAC;AAExD,YAAQ,aAAa;AAAA,MACnB,KAAK;AACH,eAAO,MAAM,gBAAgB,SAAS,MAAM;AAAA,MAC9C,KAAK;AACH,eAAO,MAAM,eAAe,SAAS,MAAM;AAAA,MAC7C,KAAK;AACH,eAAO,MAAM,aAAa,SAAS,MAAM;AAAA,MAC3C;AACE,cAAM,IAAI,UAAU,uBAAuB,QAAQ,IAAI,GAAG;AAAA,IAC9D;AAAA,EACF,SAAS,OAAO;AACd,WAAO,MAAM,uBAAuB,KAAK;AAEzC,UAAM,SAAS,iBAAiB,YAAY,MAAM,SAAS;AAC3D,UAAM,UACJ,iBAAiB,QAAQ,MAAM,UAAU;AAE3C,UAAM,WAAWA,cAAa,KAAK,EAAE,OAAO,QAAQ,GAAG,EAAE,OAAO,CAAC;AAEjE,qBAAiB,MAAM;AACvB,WAAO;AAAA,EACT;AACF;","names":["getUser","NextResponse","NextResponse","response"]}
@@ -0,0 +1,65 @@
1
+ import { U as UserContextType, A as AuthContextType } from './UserProvider-Bl3j1PUO.mjs';
2
+ import { F as ForwardedTokens, C as Config, S as SessionData, D as DisplayMode } from './types-BxAubCqO.mjs';
3
+ import { RefObject, Dispatch, SetStateAction } from 'react';
4
+ import * as react_jsx_runtime from 'react/jsx-runtime';
5
+ import { A as AuthProviderProps } from './AuthProvider-BYZ8w92b.mjs';
6
+ import 'oslo/jwt';
7
+ import 'oslo/oauth2';
8
+
9
+ type TokenContextType = {
10
+ accessToken: string | null;
11
+ idToken: string | null;
12
+ forwardedTokens: ForwardedTokens;
13
+ refreshToken: () => Promise<void>;
14
+ isLoading: boolean;
15
+ error: Error | null;
16
+ };
17
+
18
+ type CivicAuthProviderProps = Omit<AuthProviderProps, "pkceConsumer">;
19
+ declare const CivicAuthProvider: ({ children, ...props }: CivicAuthProviderProps) => react_jsx_runtime.JSX.Element;
20
+
21
+ declare const useUser: <T extends Record<string, unknown> = Record<string, never>>() => UserContextType<T>;
22
+
23
+ declare const useToken: () => TokenContextType;
24
+
25
+ declare const useAuth: () => AuthContextType;
26
+
27
+ type ConfigProviderOutput = {
28
+ config: Config;
29
+ redirectUrl: string;
30
+ modalIframe: boolean;
31
+ serverTokenExchange: boolean;
32
+ };
33
+
34
+ declare const useConfig: () => ConfigProviderOutput;
35
+
36
+ type IframeProviderOutput = {
37
+ iframeRef: RefObject<HTMLIFrameElement> | null;
38
+ setAuthResponseUrl: Dispatch<SetStateAction<string | null>>;
39
+ };
40
+
41
+ declare const useIframe: () => IframeProviderOutput;
42
+
43
+ declare const useSession: () => SessionData;
44
+
45
+ type CivicAuthIframeContainerProps = {
46
+ onClose?: () => void;
47
+ closeOnRedirect?: boolean;
48
+ };
49
+ declare const CivicAuthIframeContainer: ({ onClose, closeOnRedirect, }: CivicAuthIframeContainerProps) => react_jsx_runtime.JSX.Element;
50
+
51
+ declare const UserButton: ({ displayMode, className, }: {
52
+ displayMode?: DisplayMode;
53
+ className?: string;
54
+ }) => react_jsx_runtime.JSX.Element;
55
+
56
+ declare const SignInButton: ({ displayMode, className, }: {
57
+ displayMode?: DisplayMode;
58
+ className?: string;
59
+ }) => react_jsx_runtime.JSX.Element;
60
+
61
+ declare const SignOutButton: ({ className }: {
62
+ className?: string;
63
+ }) => react_jsx_runtime.JSX.Element;
64
+
65
+ export { AuthContextType, CivicAuthIframeContainer, CivicAuthProvider, type CivicAuthProviderProps, SignInButton, SignOutButton, type TokenContextType, UserButton, UserContextType, useAuth, useConfig, useIframe, useSession, useToken, useUser };
@@ -0,0 +1,65 @@
1
+ import { U as UserContextType, A as AuthContextType } from './UserProvider-BA2uflVB.js';
2
+ import { F as ForwardedTokens, C as Config, S as SessionData, D as DisplayMode } from './types-BxAubCqO.js';
3
+ import { RefObject, Dispatch, SetStateAction } from 'react';
4
+ import * as react_jsx_runtime from 'react/jsx-runtime';
5
+ import { A as AuthProviderProps } from './AuthProvider-BgOwv9h8.js';
6
+ import 'oslo/jwt';
7
+ import 'oslo/oauth2';
8
+
9
+ type TokenContextType = {
10
+ accessToken: string | null;
11
+ idToken: string | null;
12
+ forwardedTokens: ForwardedTokens;
13
+ refreshToken: () => Promise<void>;
14
+ isLoading: boolean;
15
+ error: Error | null;
16
+ };
17
+
18
+ type CivicAuthProviderProps = Omit<AuthProviderProps, "pkceConsumer">;
19
+ declare const CivicAuthProvider: ({ children, ...props }: CivicAuthProviderProps) => react_jsx_runtime.JSX.Element;
20
+
21
+ declare const useUser: <T extends Record<string, unknown> = Record<string, never>>() => UserContextType<T>;
22
+
23
+ declare const useToken: () => TokenContextType;
24
+
25
+ declare const useAuth: () => AuthContextType;
26
+
27
+ type ConfigProviderOutput = {
28
+ config: Config;
29
+ redirectUrl: string;
30
+ modalIframe: boolean;
31
+ serverTokenExchange: boolean;
32
+ };
33
+
34
+ declare const useConfig: () => ConfigProviderOutput;
35
+
36
+ type IframeProviderOutput = {
37
+ iframeRef: RefObject<HTMLIFrameElement> | null;
38
+ setAuthResponseUrl: Dispatch<SetStateAction<string | null>>;
39
+ };
40
+
41
+ declare const useIframe: () => IframeProviderOutput;
42
+
43
+ declare const useSession: () => SessionData;
44
+
45
+ type CivicAuthIframeContainerProps = {
46
+ onClose?: () => void;
47
+ closeOnRedirect?: boolean;
48
+ };
49
+ declare const CivicAuthIframeContainer: ({ onClose, closeOnRedirect, }: CivicAuthIframeContainerProps) => react_jsx_runtime.JSX.Element;
50
+
51
+ declare const UserButton: ({ displayMode, className, }: {
52
+ displayMode?: DisplayMode;
53
+ className?: string;
54
+ }) => react_jsx_runtime.JSX.Element;
55
+
56
+ declare const SignInButton: ({ displayMode, className, }: {
57
+ displayMode?: DisplayMode;
58
+ className?: string;
59
+ }) => react_jsx_runtime.JSX.Element;
60
+
61
+ declare const SignOutButton: ({ className }: {
62
+ className?: string;
63
+ }) => react_jsx_runtime.JSX.Element;
64
+
65
+ export { AuthContextType, CivicAuthIframeContainer, CivicAuthProvider, type CivicAuthProviderProps, SignInButton, SignOutButton, type TokenContextType, UserButton, UserContextType, useAuth, useConfig, useIframe, useSession, useToken, useUser };