@civic/auth 0.1.4-beta.0 → 0.1.4-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (283) hide show
  1. package/CHANGELOG.md +1 -0
  2. package/README.md +10 -8
  3. package/dist/cjs/nextjs/GetUser.d.ts.map +1 -1
  4. package/dist/cjs/nextjs/GetUser.js +2 -13
  5. package/dist/cjs/nextjs/GetUser.js.map +1 -1
  6. package/dist/cjs/nextjs/hooks/useUserCookie.d.ts +4 -1
  7. package/dist/cjs/nextjs/hooks/useUserCookie.d.ts.map +1 -1
  8. package/dist/cjs/nextjs/hooks/useUserCookie.js +4 -5
  9. package/dist/cjs/nextjs/hooks/useUserCookie.js.map +1 -1
  10. package/dist/cjs/nextjs/providers/NextAuthProvider.js +2 -2
  11. package/dist/cjs/nextjs/providers/NextAuthProvider.js.map +1 -1
  12. package/dist/cjs/nextjs/routeHandler.js +2 -2
  13. package/dist/cjs/nextjs/routeHandler.js.map +1 -1
  14. package/dist/cjs/shared/components/CivicAuthIframe.js +1 -1
  15. package/dist/cjs/shared/components/CivicAuthIframe.js.map +1 -1
  16. package/dist/cjs/shared/lib/session.d.ts +1 -1
  17. package/dist/cjs/shared/lib/session.d.ts.map +1 -1
  18. package/dist/cjs/shared/lib/session.js +12 -1
  19. package/dist/cjs/shared/lib/session.js.map +1 -1
  20. package/dist/cjs/shared/lib/util.d.ts.map +1 -1
  21. package/dist/cjs/shared/lib/util.js +1 -0
  22. package/dist/cjs/shared/lib/util.js.map +1 -1
  23. package/dist/cjs/shared/providers/UserProvider.d.ts +5 -1
  24. package/dist/cjs/shared/providers/UserProvider.d.ts.map +1 -1
  25. package/dist/cjs/shared/providers/UserProvider.js +4 -2
  26. package/dist/cjs/shared/providers/UserProvider.js.map +1 -1
  27. package/dist/cjs/types.d.ts +4 -5
  28. package/dist/cjs/types.d.ts.map +1 -1
  29. package/dist/cjs/types.js +4 -0
  30. package/dist/cjs/types.js.map +1 -1
  31. package/dist/esm/nextjs/GetUser.d.ts.map +1 -1
  32. package/dist/esm/nextjs/GetUser.js +2 -13
  33. package/dist/esm/nextjs/GetUser.js.map +1 -1
  34. package/dist/esm/nextjs/hooks/useUserCookie.d.ts +4 -1
  35. package/dist/esm/nextjs/hooks/useUserCookie.d.ts.map +1 -1
  36. package/dist/esm/nextjs/hooks/useUserCookie.js +4 -5
  37. package/dist/esm/nextjs/hooks/useUserCookie.js.map +1 -1
  38. package/dist/esm/nextjs/providers/NextAuthProvider.js +2 -2
  39. package/dist/esm/nextjs/providers/NextAuthProvider.js.map +1 -1
  40. package/dist/esm/nextjs/routeHandler.js +2 -2
  41. package/dist/esm/nextjs/routeHandler.js.map +1 -1
  42. package/dist/esm/shared/components/CivicAuthIframe.js +1 -1
  43. package/dist/esm/shared/components/CivicAuthIframe.js.map +1 -1
  44. package/dist/esm/shared/lib/session.d.ts +1 -1
  45. package/dist/esm/shared/lib/session.d.ts.map +1 -1
  46. package/dist/esm/shared/lib/session.js +12 -1
  47. package/dist/esm/shared/lib/session.js.map +1 -1
  48. package/dist/esm/shared/lib/util.d.ts.map +1 -1
  49. package/dist/esm/shared/lib/util.js +1 -0
  50. package/dist/esm/shared/lib/util.js.map +1 -1
  51. package/dist/esm/shared/providers/UserProvider.d.ts +5 -1
  52. package/dist/esm/shared/providers/UserProvider.d.ts.map +1 -1
  53. package/dist/esm/shared/providers/UserProvider.js +4 -2
  54. package/dist/esm/shared/providers/UserProvider.js.map +1 -1
  55. package/dist/esm/types.d.ts +4 -5
  56. package/dist/esm/types.d.ts.map +1 -1
  57. package/dist/esm/types.js +3 -1
  58. package/dist/esm/types.js.map +1 -1
  59. package/dist/src/browser/storage.d.ts +9 -0
  60. package/dist/src/browser/storage.d.ts.map +1 -0
  61. package/dist/src/browser/storage.js +17 -0
  62. package/dist/src/browser/storage.js.map +1 -0
  63. package/dist/src/config.d.ts.map +1 -0
  64. package/dist/src/index.d.ts.map +1 -0
  65. package/dist/src/lib/cookies.d.ts +7 -0
  66. package/dist/src/lib/cookies.d.ts.map +1 -0
  67. package/dist/src/lib/cookies.js +25 -0
  68. package/dist/src/lib/cookies.js.map +1 -0
  69. package/dist/src/lib/jwt.d.ts.map +1 -0
  70. package/dist/src/lib/oauth.d.ts.map +1 -0
  71. package/dist/src/lib/postMessage.d.ts.map +1 -0
  72. package/dist/src/lib/postMessage.js +15 -0
  73. package/dist/src/lib/postMessage.js.map +1 -0
  74. package/dist/src/lib/windowUtil.d.ts.map +1 -0
  75. package/dist/src/lib/windowUtil.js +31 -0
  76. package/dist/src/lib/windowUtil.js.map +1 -0
  77. package/dist/src/nextjs/GetUser.d.ts.map +1 -0
  78. package/dist/src/nextjs/GetUser.js +7 -0
  79. package/dist/src/nextjs/GetUser.js.map +1 -0
  80. package/dist/src/nextjs/config.d.ts.map +1 -0
  81. package/dist/src/nextjs/config.js +173 -0
  82. package/dist/src/nextjs/config.js.map +1 -0
  83. package/dist/src/nextjs/cookies.d.ts.map +1 -0
  84. package/dist/src/nextjs/hooks/index.d.ts +2 -0
  85. package/dist/src/nextjs/hooks/index.d.ts.map +1 -0
  86. package/dist/src/nextjs/hooks/index.js +2 -0
  87. package/dist/src/nextjs/hooks/index.js.map +1 -0
  88. package/dist/src/nextjs/hooks/useRefresh.d.ts +4 -0
  89. package/dist/src/nextjs/hooks/useRefresh.d.ts.map +1 -0
  90. package/dist/src/nextjs/hooks/useRefresh.js +38 -0
  91. package/dist/src/nextjs/hooks/useRefresh.js.map +1 -0
  92. package/dist/src/nextjs/hooks/useTokenCookie.d.ts +3 -0
  93. package/dist/src/nextjs/hooks/useTokenCookie.d.ts.map +1 -0
  94. package/dist/src/nextjs/hooks/useTokenCookie.js +37 -0
  95. package/dist/src/nextjs/hooks/useTokenCookie.js.map +1 -0
  96. package/dist/src/nextjs/hooks/useUserCookie.d.ts +6 -0
  97. package/dist/src/nextjs/hooks/useUserCookie.d.ts.map +1 -1
  98. package/dist/src/nextjs/hooks/useUserCookie.js +4 -5
  99. package/dist/src/nextjs/hooks/useUserCookie.js.map +1 -1
  100. package/dist/src/nextjs/index.d.ts.map +1 -0
  101. package/dist/src/nextjs/middleware/index.d.ts.map +1 -0
  102. package/dist/src/nextjs/middleware.d.ts.map +1 -0
  103. package/dist/src/nextjs/providers/NextAuthProvider.d.ts +13 -0
  104. package/dist/src/nextjs/providers/NextAuthProvider.d.ts.map +1 -0
  105. package/dist/src/nextjs/providers/NextAuthProvider.js +79 -0
  106. package/dist/src/nextjs/providers/NextAuthProvider.js.map +1 -0
  107. package/dist/src/nextjs/routeHandler.d.ts.map +1 -0
  108. package/dist/src/nextjs/routeHandler.js +212 -0
  109. package/dist/src/nextjs/routeHandler.js.map +1 -0
  110. package/dist/src/nextjs/utils.d.ts.map +1 -0
  111. package/dist/src/reactjs/components/SignInButton.d.ts.map +1 -0
  112. package/dist/src/reactjs/components/SignOutButton.d.ts.map +1 -0
  113. package/dist/src/reactjs/components/UserButton.d.ts.map +1 -0
  114. package/dist/src/reactjs/components/UserButton.js +118 -0
  115. package/dist/src/reactjs/components/UserButton.js.map +1 -0
  116. package/dist/src/reactjs/components/index.d.ts.map +1 -0
  117. package/dist/src/reactjs/hooks/index.d.ts +6 -0
  118. package/dist/src/reactjs/hooks/index.d.ts.map +1 -0
  119. package/dist/src/reactjs/hooks/index.js +6 -0
  120. package/dist/src/reactjs/hooks/index.js.map +1 -0
  121. package/dist/src/reactjs/hooks/useAuth.d.ts.map +1 -0
  122. package/dist/src/reactjs/hooks/useRefresh.d.ts +4 -0
  123. package/dist/src/reactjs/hooks/useRefresh.d.ts.map +1 -0
  124. package/dist/src/reactjs/hooks/useRefresh.js +28 -0
  125. package/dist/src/reactjs/hooks/useRefresh.js.map +1 -0
  126. package/dist/src/reactjs/hooks/useUser.d.ts.map +1 -0
  127. package/dist/src/reactjs/index.d.ts.map +1 -0
  128. package/dist/src/reactjs/providers/index.d.ts.map +1 -0
  129. package/dist/src/server/ServerAuthenticationResolver.d.ts.map +1 -0
  130. package/dist/src/server/config.d.ts.map +1 -0
  131. package/dist/src/server/index.d.ts.map +1 -0
  132. package/dist/src/server/login.d.ts.map +1 -0
  133. package/dist/src/server/refresh.d.ts.map +1 -0
  134. package/dist/src/services/AuthenticationService.d.ts +90 -0
  135. package/dist/src/services/AuthenticationService.d.ts.map +1 -0
  136. package/dist/src/services/AuthenticationService.js +243 -0
  137. package/dist/src/services/AuthenticationService.js.map +1 -0
  138. package/dist/src/services/PKCE.d.ts.map +1 -0
  139. package/dist/src/services/types.d.ts.map +1 -0
  140. package/dist/src/shared/components/BlockDisplay.d.ts +7 -0
  141. package/dist/src/shared/components/BlockDisplay.d.ts.map +1 -0
  142. package/dist/src/shared/components/BlockDisplay.js +25 -0
  143. package/dist/src/shared/components/BlockDisplay.js.map +1 -0
  144. package/dist/src/shared/components/CivicAuthIframe.d.ts.map +1 -0
  145. package/dist/src/shared/components/CivicAuthIframe.js +9 -0
  146. package/dist/src/shared/components/CivicAuthIframe.js.map +1 -0
  147. package/dist/src/shared/components/CivicAuthIframeContainer.d.ts.map +1 -0
  148. package/dist/src/shared/components/CivicAuthIframeContainer.js +138 -0
  149. package/dist/src/shared/components/CivicAuthIframeContainer.js.map +1 -0
  150. package/dist/src/shared/components/IFrameAndLoading.d.ts +7 -0
  151. package/dist/src/shared/components/IFrameAndLoading.d.ts.map +1 -0
  152. package/dist/src/shared/components/IFrameAndLoading.js +22 -0
  153. package/dist/src/shared/components/IFrameAndLoading.js.map +1 -0
  154. package/dist/src/shared/hooks/index.d.ts +9 -0
  155. package/dist/src/shared/hooks/index.d.ts.map +1 -0
  156. package/dist/src/shared/hooks/index.js +9 -0
  157. package/dist/src/shared/hooks/index.js.map +1 -0
  158. package/dist/src/shared/hooks/useAuth.d.ts.map +1 -0
  159. package/dist/src/shared/hooks/useCivicAuthConfig.d.ts +3 -0
  160. package/dist/src/shared/hooks/useCivicAuthConfig.d.ts.map +1 -0
  161. package/dist/src/shared/hooks/useCivicAuthConfig.js +10 -0
  162. package/dist/src/shared/hooks/useCivicAuthConfig.js.map +1 -0
  163. package/dist/src/shared/hooks/useClientTokenExchangeSession.d.ts +3 -0
  164. package/dist/src/shared/hooks/useClientTokenExchangeSession.d.ts.map +1 -0
  165. package/dist/src/shared/hooks/useClientTokenExchangeSession.js +13 -0
  166. package/dist/src/shared/hooks/useClientTokenExchangeSession.js.map +1 -0
  167. package/dist/src/shared/hooks/useConfig.d.ts +3 -0
  168. package/dist/src/shared/hooks/useConfig.d.ts.map +1 -0
  169. package/dist/src/shared/hooks/useConfig.js +13 -0
  170. package/dist/src/shared/hooks/useConfig.js.map +1 -0
  171. package/dist/src/shared/hooks/useCurrentUrl.d.ts +3 -0
  172. package/dist/src/shared/hooks/useCurrentUrl.d.ts.map +1 -0
  173. package/dist/src/shared/hooks/useCurrentUrl.js +24 -0
  174. package/dist/src/shared/hooks/useCurrentUrl.js.map +1 -0
  175. package/dist/src/shared/hooks/useIframe.d.ts.map +1 -0
  176. package/dist/src/shared/hooks/useIsInIframe.d.ts +3 -0
  177. package/dist/src/shared/hooks/useIsInIframe.d.ts.map +1 -0
  178. package/dist/src/shared/hooks/useIsInIframe.js +14 -0
  179. package/dist/src/shared/hooks/useIsInIframe.js.map +1 -0
  180. package/dist/src/shared/hooks/useOAuthEndpoints.d.ts +4 -0
  181. package/dist/src/shared/hooks/useOAuthEndpoints.d.ts.map +1 -0
  182. package/dist/src/shared/hooks/useOAuthEndpoints.js +14 -0
  183. package/dist/src/shared/hooks/useOAuthEndpoints.js.map +1 -0
  184. package/dist/src/shared/hooks/useRefresh.d.ts +4 -0
  185. package/dist/src/shared/hooks/useRefresh.d.ts.map +1 -0
  186. package/dist/src/shared/hooks/useRefresh.js +38 -0
  187. package/dist/src/shared/hooks/useRefresh.js.map +1 -0
  188. package/dist/src/shared/hooks/useSession.d.ts +3 -0
  189. package/dist/src/shared/hooks/useSession.d.ts.map +1 -0
  190. package/dist/src/shared/hooks/useSignIn.d.ts +14 -0
  191. package/dist/src/shared/hooks/useSignIn.d.ts.map +1 -0
  192. package/dist/src/shared/hooks/useSignIn.js +71 -0
  193. package/dist/src/shared/hooks/useSignIn.js.map +1 -0
  194. package/dist/src/shared/hooks/useToken.d.ts.map +1 -0
  195. package/dist/src/shared/lib/GenericAuthenticationRefresher.d.ts +20 -0
  196. package/dist/src/shared/lib/GenericAuthenticationRefresher.d.ts.map +1 -0
  197. package/dist/src/shared/lib/GenericAuthenticationRefresher.js +73 -0
  198. package/dist/src/shared/lib/GenericAuthenticationRefresher.js.map +1 -0
  199. package/dist/src/shared/lib/UserSession.d.ts.map +1 -0
  200. package/dist/src/shared/lib/session.d.ts +3 -0
  201. package/dist/src/shared/lib/session.d.ts.map +1 -0
  202. package/dist/src/shared/lib/session.js +21 -0
  203. package/dist/src/shared/lib/session.js.map +1 -0
  204. package/dist/src/shared/lib/storage.d.ts.map +1 -0
  205. package/dist/src/shared/lib/types.d.ts +35 -0
  206. package/dist/src/shared/lib/types.d.ts.map +1 -0
  207. package/dist/src/shared/lib/types.js +18 -0
  208. package/dist/src/shared/lib/types.js.map +1 -0
  209. package/dist/src/shared/lib/util.d.ts.map +1 -0
  210. package/dist/src/shared/lib/util.js +133 -0
  211. package/dist/src/shared/lib/util.js.map +1 -0
  212. package/dist/src/shared/providers/AuthContext.d.ts.map +1 -0
  213. package/dist/src/shared/providers/AuthProvider.d.ts +21 -0
  214. package/dist/src/shared/providers/AuthProvider.d.ts.map +1 -0
  215. package/dist/src/shared/providers/AuthProvider.js +63 -0
  216. package/dist/src/shared/providers/AuthProvider.js.map +1 -0
  217. package/dist/src/shared/providers/CivicAuthConfigContext.d.ts +16 -0
  218. package/dist/src/shared/providers/CivicAuthConfigContext.d.ts.map +1 -0
  219. package/dist/src/shared/providers/CivicAuthConfigContext.js +43 -0
  220. package/dist/src/shared/providers/CivicAuthConfigContext.js.map +1 -0
  221. package/dist/src/shared/providers/CivicAuthProvider.d.ts.map +1 -0
  222. package/dist/src/shared/providers/CivicAuthProvider.js +32 -0
  223. package/dist/src/shared/providers/CivicAuthProvider.js.map +1 -0
  224. package/dist/src/shared/providers/ClientTokenExchangeSessionProvider.d.ts +17 -0
  225. package/dist/src/shared/providers/ClientTokenExchangeSessionProvider.d.ts.map +1 -0
  226. package/dist/src/shared/providers/ClientTokenExchangeSessionProvider.js +146 -0
  227. package/dist/src/shared/providers/ClientTokenExchangeSessionProvider.js.map +1 -0
  228. package/dist/src/shared/providers/ConfigProvider.d.ts +21 -0
  229. package/dist/src/shared/providers/ConfigProvider.d.ts.map +1 -0
  230. package/dist/src/shared/providers/ConfigProvider.js +19 -0
  231. package/dist/src/shared/providers/ConfigProvider.js.map +1 -0
  232. package/dist/src/shared/providers/IframeProvider.d.ts +19 -0
  233. package/dist/src/shared/providers/IframeProvider.d.ts.map +1 -0
  234. package/dist/src/shared/providers/IframeProvider.js +29 -0
  235. package/dist/src/shared/providers/IframeProvider.js.map +1 -0
  236. package/dist/src/shared/providers/SessionProvider.d.ts +19 -0
  237. package/dist/src/shared/providers/SessionProvider.d.ts.map +1 -0
  238. package/dist/src/shared/providers/SessionProvider.js +23 -0
  239. package/dist/src/shared/providers/SessionProvider.js.map +1 -0
  240. package/dist/src/shared/providers/TokenProvider.d.ts.map +1 -0
  241. package/dist/src/shared/providers/TokenProvider.js +42 -0
  242. package/dist/src/shared/providers/TokenProvider.js.map +1 -0
  243. package/dist/src/shared/providers/UserProvider.d.ts +20 -0
  244. package/dist/src/shared/providers/UserProvider.d.ts.map +1 -0
  245. package/dist/src/shared/providers/UserProvider.js +51 -0
  246. package/dist/src/shared/providers/UserProvider.js.map +1 -0
  247. package/dist/src/types.d.ts +146 -0
  248. package/dist/src/types.d.ts.map +1 -0
  249. package/dist/src/types.js +4 -0
  250. package/dist/src/types.js.map +1 -0
  251. package/dist/test/integration/sdk.test.d.ts.map +1 -0
  252. package/dist/test/integration/sdk.test.js +189 -0
  253. package/dist/test/integration/sdk.test.js.map +1 -0
  254. package/dist/test/unit/lib/oauth.test.d.ts.map +1 -0
  255. package/dist/test/unit/nextjs/NextAuthProvider.test.d.ts.map +1 -0
  256. package/dist/test/unit/nextjs/NextAuthProvider.test.js +31 -0
  257. package/dist/test/unit/nextjs/NextAuthProvider.test.js.map +1 -0
  258. package/dist/test/unit/nextjs/config.test.d.ts.map +1 -0
  259. package/dist/test/unit/nextjs/getUser.test.d.ts.map +1 -0
  260. package/dist/test/unit/nextjs/getUser.test.js +22 -0
  261. package/dist/test/unit/nextjs/getUser.test.js.map +1 -0
  262. package/dist/test/unit/nextjs/middleware.test.d.ts.map +1 -0
  263. package/dist/test/unit/nextjs/utils.test.d.ts.map +1 -0
  264. package/dist/test/unit/publicApi/apiSnapshot.test.d.ts.map +1 -0
  265. package/dist/test/unit/react/components/SignInButton.test.d.ts.map +1 -0
  266. package/dist/test/unit/react/components/SignOutButton.test.d.ts.map +1 -0
  267. package/dist/test/unit/server/login.test.d.ts.map +1 -0
  268. package/dist/test/unit/server/refresh.test.d.ts.map +1 -0
  269. package/dist/test/unit/server/session.test.d.ts.map +1 -0
  270. package/dist/test/unit/services/AuthenticationService.test.d.ts.map +1 -0
  271. package/dist/test/unit/services/AuthenticationService.test.js +121 -0
  272. package/dist/test/unit/services/AuthenticationService.test.js.map +1 -0
  273. package/dist/test/unit/services/ServerAuthenticationResolver.test.d.ts.map +1 -0
  274. package/dist/test/unit/shared/GenericAuthenticationRefresher.test.d.ts.map +1 -0
  275. package/dist/test/unit/shared/UserSession.test.d.ts.map +1 -0
  276. package/dist/test/unit/shared/components/CivicAuthIframeContainer.test.d.ts.map +1 -0
  277. package/dist/test/unit/shared/components/CivicAuthIframeContainer.test.js +122 -0
  278. package/dist/test/unit/shared/components/CivicAuthIframeContainer.test.js.map +1 -0
  279. package/dist/test/unit/shared/storage.test.d.ts.map +1 -0
  280. package/dist/tsconfig.cjs.tsbuildinfo +1 -1
  281. package/dist/tsconfig.esm.tsbuildinfo +1 -1
  282. package/dist/tsconfig.tsbuildinfo +1 -1
  283. package/package.json +3 -3
@@ -91,11 +91,9 @@ type IdTokenPayload = JWTPayload & {
91
91
  type IdToken = Omit<JWT, "payload"> & {
92
92
  payload: IdTokenPayload;
93
93
  };
94
+ declare const tokenKeys: string[];
94
95
  type Tokens = {
95
- idToken: string;
96
- accessToken: string;
97
- refreshToken: string;
98
- forwardedTokens: ForwardedTokens;
96
+ [K in (typeof tokenKeys)[number]]: K extends "forwardedTokens" ? ForwardedTokens : string;
99
97
  };
100
98
  type BaseUser = {
101
99
  id: string;
@@ -106,7 +104,7 @@ type BaseUser = {
106
104
  picture?: string;
107
105
  updated_at?: Date;
108
106
  };
109
- type User<T extends UnknownObject = EmptyObject> = BaseUser & Partial<Tokens> & T;
107
+ type User<T extends UnknownObject = EmptyObject> = BaseUser & T;
110
108
  type OpenIdConfiguration = {
111
109
  authorization_endpoint: string;
112
110
  claims_parameter_supported: boolean;
@@ -140,6 +138,7 @@ type LoginPostMessage = {
140
138
  };
141
139
  };
142
140
  export type { LoginPostMessage, AuthSessionService, TokenService, UserInfoService, ResourceService, AuthRequest, Tokens, Endpoints, Config, SessionData, OIDCTokenResponseBody, ParsedTokens, BaseUser, User, DisplayMode, UnknownObject, EmptyObject, ForwardedTokens, ForwardedTokensJWT, JWTPayload, IdTokenPayload, IdToken, OpenIdConfiguration, };
141
+ export { tokenKeys };
143
142
  export interface AuthStorage {
144
143
  get(key: string): Promise<string | null>;
145
144
  set(key: string, value: string): Promise<void>;
@@ -1 +1 @@
1
- {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,aAAa,CAAC;AACrD,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,UAAU,CAAC;AAEpC,KAAK,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;AAC7C,KAAK,WAAW,GAAG,MAAM,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;AAGzC,KAAK,WAAW,GAAG,QAAQ,GAAG,UAAU,GAAG,SAAS,GAAG,YAAY,CAAC;AAGpE,UAAU,kBAAkB;IAE1B,oBAAoB,CAClB,gBAAgB,EAAE,MAAM,EACxB,WAAW,EAAE,WAAW,GACvB,IAAI,CAAC;IAER,mBAAmB,CACjB,MAAM,EAAE,MAAM,EAAE,EAChB,mBAAmB,EAAE,WAAW,EAChC,KAAK,CAAC,EAAE,MAAM,GACb,OAAO,CAAC,MAAM,CAAC,CAAC;IAEnB,MAAM,CACJ,WAAW,EAAE,WAAW,EACxB,MAAM,EAAE,MAAM,EAAE,EAChB,KAAK,CAAC,EAAE,MAAM,GACb,OAAO,CAAC,IAAI,CAAC,CAAC;IAEjB,aAAa,CAAC,WAAW,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;IAEzD,cAAc,IAAI,WAAW,CAAC;IAE9B,iBAAiB,CAAC,IAAI,EAAE,WAAW,GAAG,IAAI,CAAC;IAC3C,kBAAkB,IAAI,OAAO,CAAC,eAAe,CAAC,CAAC;CAChD;AAGD,UAAU,YAAY;IACpB,qBAAqB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IACzD,eAAe,CAAC,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC;IACzD,kBAAkB,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;CAC3D;AAGD,UAAU,eAAe;IACvB,WAAW,CAAC,CAAC,SAAS,aAAa,EACjC,WAAW,EAAE,MAAM,EACnB,OAAO,EAAE,MAAM,GAAG,IAAI,GACrB,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC;CAC5B;AAGD,UAAU,eAAe;IACvB,oBAAoB,CAAC,WAAW,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;CAC7D;AAGD,KAAK,WAAW,GAAG;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,WAAW,EAAE,MAAM,CAAC;IACpB,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF,KAAK,SAAS,GAAG;IACf,IAAI,EAAE,MAAM,CAAC;IACb,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,KAAK,MAAM,GAAG;IACZ,WAAW,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,EAAE,SAAS,CAAC;CACvB,CAAC;AAEF,KAAK,WAAW,GAAG;IACjB,aAAa,EAAE,OAAO,CAAC;IACvB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,WAAW,CAAC,EAAE,WAAW,CAAC;IAC1B,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,KAAK,qBAAqB,GAAG,iBAAiB,GAAG;IAC/C,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,KAAK,YAAY,GAAG;IAClB,QAAQ,EAAE,UAAU,CAAC;IACrB,YAAY,EAAE,UAAU,CAAC;IACzB,aAAa,CAAC,EAAE,MAAM,CAAC;CACxB,CAAC;AAGF,KAAK,eAAe,GAAG,MAAM,CAC3B,MAAM,EACN;IACE,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB,CACF,CAAC;AAGF,KAAK,kBAAkB,GAAG,MAAM,CAC9B,MAAM,EACN;IACE,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB,CACF,CAAC;AAEF,KAAK,UAAU,GAAG,GAAG,CAAC,SAAS,CAAC,GAAG;IACjC,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;CACb,CAAC;AAEF,KAAK,cAAc,GAAG,UAAU,GAAG;IACjC,eAAe,CAAC,EAAE,kBAAkB,CAAC;IACrC,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF,KAAK,OAAO,GAAG,IAAI,CAAC,GAAG,EAAE,SAAS,CAAC,GAAG;IACpC,OAAO,EAAE,cAAc,CAAC;CACzB,CAAC;AAEF,KAAK,MAAM,GAAG;IACZ,OAAO,EAAE,MAAM,CAAC;IAChB,WAAW,EAAE,MAAM,CAAC;IACpB,YAAY,EAAE,MAAM,CAAC;IACrB,eAAe,EAAE,eAAe,CAAC;CAClC,CAAC;AAGF,KAAK,QAAQ,GAAG;IACd,EAAE,EAAE,MAAM,CAAC;IACX,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,UAAU,CAAC,EAAE,IAAI,CAAC;CACnB,CAAC;AAEF,KAAK,IAAI,CAAC,CAAC,SAAS,aAAa,GAAG,WAAW,IAAI,QAAQ,GACzD,OAAO,CAAC,MAAM,CAAC,GACf,CAAC,CAAC;AAEJ,KAAK,mBAAmB,GAAG;IACzB,sBAAsB,EAAE,MAAM,CAAC;IAC/B,0BAA0B,EAAE,OAAO,CAAC;IACpC,gBAAgB,EAAE,MAAM,EAAE,CAAC;IAC3B,gCAAgC,EAAE,MAAM,EAAE,CAAC;IAC3C,oBAAoB,EAAE,MAAM,CAAC;IAC7B,qBAAqB,EAAE,MAAM,EAAE,CAAC;IAChC,MAAM,EAAE,MAAM,CAAC;IACf,QAAQ,EAAE,MAAM,CAAC;IACjB,8CAA8C,EAAE,OAAO,CAAC;IACxD,wBAAwB,EAAE,MAAM,EAAE,CAAC;IACnC,wBAAwB,EAAE,MAAM,EAAE,CAAC;IACnC,gBAAgB,EAAE,MAAM,EAAE,CAAC;IAC3B,uBAAuB,EAAE,MAAM,EAAE,CAAC;IAClC,qCAAqC,EAAE,MAAM,EAAE,CAAC;IAChD,gDAAgD,EAAE,MAAM,EAAE,CAAC;IAC3D,cAAc,EAAE,MAAM,CAAC;IACvB,qCAAqC,EAAE,MAAM,EAAE,CAAC;IAChD,qCAAqC,EAAE,MAAM,CAAC;IAC9C,2BAA2B,EAAE,OAAO,CAAC;IACrC,+BAA+B,EAAE,OAAO,CAAC;IACzC,iBAAiB,EAAE,MAAM,CAAC;IAC1B,qBAAqB,EAAE,MAAM,EAAE,CAAC;CACjC,CAAC;AAEF,KAAK,gBAAgB,GAAG;IACtB,MAAM,EAAE,MAAM,CAAC;IACf,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,EAAE,MAAM,CAAC;IACjB,IAAI,EAAE;QACJ,GAAG,EAAE,MAAM,CAAC;KACb,CAAC;CACH,CAAC;AACF,YAAY,EACV,gBAAgB,EAChB,kBAAkB,EAClB,YAAY,EACZ,eAAe,EACf,eAAe,EACf,WAAW,EACX,MAAM,EACN,SAAS,EACT,MAAM,EACN,WAAW,EACX,qBAAqB,EACrB,YAAY,EACZ,QAAQ,EACR,IAAI,EACJ,WAAW,EACX,aAAa,EACb,WAAW,EACX,eAAe,EACf,kBAAkB,EAClB,UAAU,EACV,cAAc,EACd,OAAO,EACP,mBAAmB,GACpB,CAAC;AAEF,MAAM,WAAW,WAAW;IAC1B,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;IACzC,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;CAChD"}
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,aAAa,CAAC;AACrD,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,UAAU,CAAC;AAEpC,KAAK,aAAa,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;AAC7C,KAAK,WAAW,GAAG,MAAM,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;AAGzC,KAAK,WAAW,GAAG,QAAQ,GAAG,UAAU,GAAG,SAAS,GAAG,YAAY,CAAC;AAGpE,UAAU,kBAAkB;IAE1B,oBAAoB,CAClB,gBAAgB,EAAE,MAAM,EACxB,WAAW,EAAE,WAAW,GACvB,IAAI,CAAC;IAER,mBAAmB,CACjB,MAAM,EAAE,MAAM,EAAE,EAChB,mBAAmB,EAAE,WAAW,EAChC,KAAK,CAAC,EAAE,MAAM,GACb,OAAO,CAAC,MAAM,CAAC,CAAC;IAEnB,MAAM,CACJ,WAAW,EAAE,WAAW,EACxB,MAAM,EAAE,MAAM,EAAE,EAChB,KAAK,CAAC,EAAE,MAAM,GACb,OAAO,CAAC,IAAI,CAAC,CAAC;IAEjB,aAAa,CAAC,WAAW,EAAE,MAAM,GAAG,OAAO,CAAC,WAAW,CAAC,CAAC;IAEzD,cAAc,IAAI,WAAW,CAAC;IAE9B,iBAAiB,CAAC,IAAI,EAAE,WAAW,GAAG,IAAI,CAAC;IAC3C,kBAAkB,IAAI,OAAO,CAAC,eAAe,CAAC,CAAC;CAChD;AAGD,UAAU,YAAY;IACpB,qBAAqB,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;IACzD,eAAe,CAAC,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC;IACzD,kBAAkB,CAAC,YAAY,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;CAC3D;AAGD,UAAU,eAAe;IACvB,WAAW,CAAC,CAAC,SAAS,aAAa,EACjC,WAAW,EAAE,MAAM,EACnB,OAAO,EAAE,MAAM,GAAG,IAAI,GACrB,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC;CAC5B;AAGD,UAAU,eAAe;IACvB,oBAAoB,CAAC,WAAW,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC;CAC7D;AAGD,KAAK,WAAW,GAAG;IACjB,QAAQ,EAAE,MAAM,CAAC;IACjB,WAAW,EAAE,MAAM,CAAC;IACpB,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;CACf,CAAC;AAEF,KAAK,SAAS,GAAG;IACf,IAAI,EAAE,MAAM,CAAC;IACb,IAAI,EAAE,MAAM,CAAC;IACb,KAAK,EAAE,MAAM,CAAC;IACd,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,KAAK,MAAM,GAAG;IACZ,WAAW,EAAE,MAAM,CAAC;IACpB,SAAS,CAAC,EAAE,SAAS,CAAC;CACvB,CAAC;AAEF,KAAK,WAAW,GAAG;IACjB,aAAa,EAAE,OAAO,CAAC;IACvB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,WAAW,CAAC,EAAE,WAAW,CAAC;IAC1B,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,KAAK,qBAAqB,GAAG,iBAAiB,GAAG;IAC/C,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB,CAAC;AAEF,KAAK,YAAY,GAAG;IAClB,QAAQ,EAAE,UAAU,CAAC;IACrB,YAAY,EAAE,UAAU,CAAC;IACzB,aAAa,CAAC,EAAE,MAAM,CAAC;CACxB,CAAC;AAGF,KAAK,eAAe,GAAG,MAAM,CAC3B,MAAM,EACN;IACE,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,YAAY,CAAC,EAAE,MAAM,CAAC;CACvB,CACF,CAAC;AAGF,KAAK,kBAAkB,GAAG,MAAM,CAC9B,MAAM,EACN;IACE,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,KAAK,CAAC,EAAE,MAAM,CAAC;CAChB,CACF,CAAC;AAEF,KAAK,UAAU,GAAG,GAAG,CAAC,SAAS,CAAC,GAAG;IACjC,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,EAAE,MAAM,CAAC;CACb,CAAC;AAEF,KAAK,cAAc,GAAG,UAAU,GAAG;IACjC,eAAe,CAAC,EAAE,kBAAkB,CAAC;IACrC,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,OAAO,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF,KAAK,OAAO,GAAG,IAAI,CAAC,GAAG,EAAE,SAAS,CAAC,GAAG;IACpC,OAAO,EAAE,cAAc,CAAC;CACzB,CAAC;AAGF,QAAA,MAAM,SAAS,UAAgE,CAAC;AAGhF,KAAK,MAAM,GAAG;KACX,CAAC,IAAI,CAAC,OAAO,SAAS,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC,SAAS,iBAAiB,GAC1D,eAAe,GACf,MAAM;CACX,CAAC;AAGF,KAAK,QAAQ,GAAG;IACd,EAAE,EAAE,MAAM,CAAC;IACX,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,UAAU,CAAC,EAAE,IAAI,CAAC;CACnB,CAAC;AAEF,KAAK,IAAI,CAAC,CAAC,SAAS,aAAa,GAAG,WAAW,IAAI,QAAQ,GAAG,CAAC,CAAC;AAEhE,KAAK,mBAAmB,GAAG;IACzB,sBAAsB,EAAE,MAAM,CAAC;IAC/B,0BAA0B,EAAE,OAAO,CAAC;IACpC,gBAAgB,EAAE,MAAM,EAAE,CAAC;IAC3B,gCAAgC,EAAE,MAAM,EAAE,CAAC;IAC3C,oBAAoB,EAAE,MAAM,CAAC;IAC7B,qBAAqB,EAAE,MAAM,EAAE,CAAC;IAChC,MAAM,EAAE,MAAM,CAAC;IACf,QAAQ,EAAE,MAAM,CAAC;IACjB,8CAA8C,EAAE,OAAO,CAAC;IACxD,wBAAwB,EAAE,MAAM,EAAE,CAAC;IACnC,wBAAwB,EAAE,MAAM,EAAE,CAAC;IACnC,gBAAgB,EAAE,MAAM,EAAE,CAAC;IAC3B,uBAAuB,EAAE,MAAM,EAAE,CAAC;IAClC,qCAAqC,EAAE,MAAM,EAAE,CAAC;IAChD,gDAAgD,EAAE,MAAM,EAAE,CAAC;IAC3D,cAAc,EAAE,MAAM,CAAC;IACvB,qCAAqC,EAAE,MAAM,EAAE,CAAC;IAChD,qCAAqC,EAAE,MAAM,CAAC;IAC9C,2BAA2B,EAAE,OAAO,CAAC;IACrC,+BAA+B,EAAE,OAAO,CAAC;IACzC,iBAAiB,EAAE,MAAM,CAAC;IAC1B,qBAAqB,EAAE,MAAM,EAAE,CAAC;CACjC,CAAC;AAEF,KAAK,gBAAgB,GAAG;IACtB,MAAM,EAAE,MAAM,CAAC;IACf,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,EAAE,MAAM,CAAC;IACjB,IAAI,EAAE;QACJ,GAAG,EAAE,MAAM,CAAC;KACb,CAAC;CACH,CAAC;AACF,YAAY,EACV,gBAAgB,EAChB,kBAAkB,EAClB,YAAY,EACZ,eAAe,EACf,eAAe,EACf,WAAW,EACX,MAAM,EACN,SAAS,EACT,MAAM,EACN,WAAW,EACX,qBAAqB,EACrB,YAAY,EACZ,QAAQ,EACR,IAAI,EACJ,WAAW,EACX,aAAa,EACb,WAAW,EACX,eAAe,EACf,kBAAkB,EAClB,UAAU,EACV,cAAc,EACd,OAAO,EACP,mBAAmB,GACpB,CAAC;AACF,OAAO,EAAE,SAAS,EAAE,CAAC;AACrB,MAAM,WAAW,WAAW;IAC1B,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,CAAC;IACzC,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC;CAChD"}
package/dist/esm/types.js CHANGED
@@ -1,2 +1,4 @@
1
- export {};
1
+ // eslint-disable-next-line @typescript-eslint/no-unused-vars
2
+ const tokenKeys = ["idToken", "accessToken", "refreshToken", "forwardedTokens"];
3
+ export { tokenKeys };
2
4
  //# sourceMappingURL=types.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/types.ts"],"names":[],"mappings":"","sourcesContent":["import type { TokenResponseBody } from \"oslo/oauth2\";\nimport type { JWT } from \"oslo/jwt\";\n\ntype UnknownObject = Record<string, unknown>;\ntype EmptyObject = Record<string, never>;\n\n// Display modes for the auth flow\ntype DisplayMode = \"iframe\" | \"redirect\" | \"new_tab\" | \"custom_tab\";\n\n// Combined Auth and Session Service\ninterface AuthSessionService {\n // TODO DK NOTES: Should be in BrowserAuthSessionService, not relevant on backend\n loadAuthorizationUrl(\n authorizationURL: string,\n displayMode: DisplayMode,\n ): void;\n // TODO DK NOTES: overrideDisplayMode parameter not appropriate here - also - do we need both this and the above in the interface?\n getAuthorizationUrl(\n scopes: string[],\n overrideDisplayMode: DisplayMode,\n nonce?: string,\n ): Promise<string>;\n // TODO DK NOTES: display mode should be in browser version only. Also, do we need this and the above two in the top-level interface?\n signIn(\n displayMode: DisplayMode,\n scopes: string[],\n nonce?: string,\n ): Promise<void>;\n // TODO DK NOTES: Input should be an auth code - do not assume it comes via an url\n tokenExchange(responseUrl: string): Promise<SessionData>;\n // TODO DK NOTES: Should be async for flexibility\n getSessionData(): SessionData;\n // TODO DK NOTES: Should be async for flexibility\n updateSessionData(data: SessionData): void;\n getUserInfoService(): Promise<UserInfoService>;\n}\n\n// Token Service\ninterface TokenService {\n exchangeCodeForTokens(authCode: string): Promise<Tokens>;\n validateIdToken(idToken: string, nonce: string): boolean;\n refreshAccessToken(refreshToken: string): Promise<Tokens>;\n}\n\n// User Info Service\ninterface UserInfoService {\n getUserInfo<T extends UnknownObject>(\n accessToken: string,\n idToken: string | null,\n ): Promise<User<T> | null>;\n}\n\n// Resource Service\ninterface ResourceService {\n getProtectedResource(accessToken: string): Promise<unknown>;\n}\n\n// Auth Request (for internal use in AuthSessionService)\ntype AuthRequest = {\n clientId: string;\n redirectUri: string;\n state: string;\n nonce: string;\n scope: string;\n};\n\ntype Endpoints = {\n jwks: string;\n auth: string;\n token: string;\n userinfo: string;\n challenge?: string;\n};\n\ntype Config = {\n oauthServer: string;\n endpoints?: Endpoints;\n};\n\ntype SessionData = {\n authenticated: boolean; // TODO can this be inferred from the presence of the tokens?\n state?: string;\n accessToken?: string;\n refreshToken?: string;\n idToken?: string;\n timestamp?: number;\n expiresIn?: number;\n codeVerifier?: string;\n displayMode?: DisplayMode;\n openerUrl?: string;\n};\n\ntype OIDCTokenResponseBody = TokenResponseBody & {\n id_token: string;\n timestamp?: number;\n};\n\ntype ParsedTokens = {\n id_token: JWTPayload;\n access_token: JWTPayload;\n refresh_token?: string;\n};\n\n// The format we expose to the frontend via hooks\ntype ForwardedTokens = Record<\n string,\n {\n idToken?: string;\n accessToken?: string;\n refreshToken?: string;\n }\n>;\n\n// The format in the JWT payload\ntype ForwardedTokensJWT = Record<\n string,\n {\n id_token?: string;\n access_token?: string;\n refresh_token?: string;\n scope?: string;\n }\n>;\n\ntype JWTPayload = JWT[\"payload\"] & {\n iss: string;\n aud: string;\n sub: string;\n iat: number;\n exp: number;\n};\n\ntype IdTokenPayload = JWTPayload & {\n forwardedTokens?: ForwardedTokensJWT;\n email?: string;\n name?: string;\n picture?: string;\n nonce: string;\n at_hash: string;\n};\n\ntype IdToken = Omit<JWT, \"payload\"> & {\n payload: IdTokenPayload;\n};\n\ntype Tokens = {\n idToken: string;\n accessToken: string;\n refreshToken: string;\n forwardedTokens: ForwardedTokens;\n};\n\n// Base user interface\ntype BaseUser = {\n id: string;\n email?: string;\n name?: string;\n given_name?: string;\n family_name?: string;\n picture?: string;\n updated_at?: Date;\n};\n\ntype User<T extends UnknownObject = EmptyObject> = BaseUser &\n Partial<Tokens> &\n T;\n\ntype OpenIdConfiguration = {\n authorization_endpoint: string;\n claims_parameter_supported: boolean;\n claims_supported: string[];\n code_challenge_methods_supported: string[];\n end_session_endpoint: string;\n grant_types_supported: string[];\n issuer: string;\n jwks_uri: string;\n authorization_response_iss_parameter_supported: boolean;\n response_modes_supported: string[];\n response_types_supported: string[];\n scopes_supported: string[];\n subject_types_supported: string[];\n token_endpoint_auth_methods_supported: string[];\n token_endpoint_auth_signing_alg_values_supported: string[];\n token_endpoint: string;\n id_token_signing_alg_values_supported: string[];\n pushed_authorization_request_endpoint: string;\n request_parameter_supported: boolean;\n request_uri_parameter_supported: boolean;\n userinfo_endpoint: string;\n claim_types_supported: string[];\n};\n\ntype LoginPostMessage = {\n source: string;\n type: string;\n clientId: string;\n data: {\n url: string;\n };\n};\nexport type {\n LoginPostMessage,\n AuthSessionService,\n TokenService,\n UserInfoService,\n ResourceService,\n AuthRequest,\n Tokens,\n Endpoints,\n Config,\n SessionData,\n OIDCTokenResponseBody,\n ParsedTokens,\n BaseUser,\n User,\n DisplayMode,\n UnknownObject,\n EmptyObject,\n ForwardedTokens,\n ForwardedTokensJWT,\n JWTPayload,\n IdTokenPayload,\n IdToken,\n OpenIdConfiguration,\n};\n\nexport interface AuthStorage {\n get(key: string): Promise<string | null>;\n set(key: string, value: string): Promise<void>;\n}\n"]}
1
+ {"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/types.ts"],"names":[],"mappings":"AAiJA,6DAA6D;AAC7D,MAAM,SAAS,GAAG,CAAC,SAAS,EAAE,aAAa,EAAE,cAAc,EAAE,iBAAiB,CAAC,CAAC;AAgFhF,OAAO,EAAE,SAAS,EAAE,CAAC","sourcesContent":["import type { TokenResponseBody } from \"oslo/oauth2\";\nimport type { JWT } from \"oslo/jwt\";\n\ntype UnknownObject = Record<string, unknown>;\ntype EmptyObject = Record<string, never>;\n\n// Display modes for the auth flow\ntype DisplayMode = \"iframe\" | \"redirect\" | \"new_tab\" | \"custom_tab\";\n\n// Combined Auth and Session Service\ninterface AuthSessionService {\n // TODO DK NOTES: Should be in BrowserAuthSessionService, not relevant on backend\n loadAuthorizationUrl(\n authorizationURL: string,\n displayMode: DisplayMode,\n ): void;\n // TODO DK NOTES: overrideDisplayMode parameter not appropriate here - also - do we need both this and the above in the interface?\n getAuthorizationUrl(\n scopes: string[],\n overrideDisplayMode: DisplayMode,\n nonce?: string,\n ): Promise<string>;\n // TODO DK NOTES: display mode should be in browser version only. Also, do we need this and the above two in the top-level interface?\n signIn(\n displayMode: DisplayMode,\n scopes: string[],\n nonce?: string,\n ): Promise<void>;\n // TODO DK NOTES: Input should be an auth code - do not assume it comes via an url\n tokenExchange(responseUrl: string): Promise<SessionData>;\n // TODO DK NOTES: Should be async for flexibility\n getSessionData(): SessionData;\n // TODO DK NOTES: Should be async for flexibility\n updateSessionData(data: SessionData): void;\n getUserInfoService(): Promise<UserInfoService>;\n}\n\n// Token Service\ninterface TokenService {\n exchangeCodeForTokens(authCode: string): Promise<Tokens>;\n validateIdToken(idToken: string, nonce: string): boolean;\n refreshAccessToken(refreshToken: string): Promise<Tokens>;\n}\n\n// User Info Service\ninterface UserInfoService {\n getUserInfo<T extends UnknownObject>(\n accessToken: string,\n idToken: string | null,\n ): Promise<User<T> | null>;\n}\n\n// Resource Service\ninterface ResourceService {\n getProtectedResource(accessToken: string): Promise<unknown>;\n}\n\n// Auth Request (for internal use in AuthSessionService)\ntype AuthRequest = {\n clientId: string;\n redirectUri: string;\n state: string;\n nonce: string;\n scope: string;\n};\n\ntype Endpoints = {\n jwks: string;\n auth: string;\n token: string;\n userinfo: string;\n challenge?: string;\n};\n\ntype Config = {\n oauthServer: string;\n endpoints?: Endpoints;\n};\n\ntype SessionData = {\n authenticated: boolean; // TODO can this be inferred from the presence of the tokens?\n state?: string;\n accessToken?: string;\n refreshToken?: string;\n idToken?: string;\n timestamp?: number;\n expiresIn?: number;\n codeVerifier?: string;\n displayMode?: DisplayMode;\n openerUrl?: string;\n};\n\ntype OIDCTokenResponseBody = TokenResponseBody & {\n id_token: string;\n timestamp?: number;\n};\n\ntype ParsedTokens = {\n id_token: JWTPayload;\n access_token: JWTPayload;\n refresh_token?: string;\n};\n\n// The format we expose to the frontend via hooks\ntype ForwardedTokens = Record<\n string,\n {\n idToken?: string;\n accessToken?: string;\n refreshToken?: string;\n }\n>;\n\n// The format in the JWT payload\ntype ForwardedTokensJWT = Record<\n string,\n {\n id_token?: string;\n access_token?: string;\n refresh_token?: string;\n scope?: string;\n }\n>;\n\ntype JWTPayload = JWT[\"payload\"] & {\n iss: string;\n aud: string;\n sub: string;\n iat: number;\n exp: number;\n};\n\ntype IdTokenPayload = JWTPayload & {\n forwardedTokens?: ForwardedTokensJWT;\n email?: string;\n name?: string;\n picture?: string;\n nonce: string;\n at_hash: string;\n};\n\ntype IdToken = Omit<JWT, \"payload\"> & {\n payload: IdTokenPayload;\n};\n\n// eslint-disable-next-line @typescript-eslint/no-unused-vars\nconst tokenKeys = [\"idToken\", \"accessToken\", \"refreshToken\", \"forwardedTokens\"];\n\n// Derive the Tokens type from the array\ntype Tokens = {\n [K in (typeof tokenKeys)[number]]: K extends \"forwardedTokens\"\n ? ForwardedTokens\n : string;\n};\n\n// Base user interface\ntype BaseUser = {\n id: string;\n email?: string;\n name?: string;\n given_name?: string;\n family_name?: string;\n picture?: string;\n updated_at?: Date;\n};\n\ntype User<T extends UnknownObject = EmptyObject> = BaseUser & T;\n\ntype OpenIdConfiguration = {\n authorization_endpoint: string;\n claims_parameter_supported: boolean;\n claims_supported: string[];\n code_challenge_methods_supported: string[];\n end_session_endpoint: string;\n grant_types_supported: string[];\n issuer: string;\n jwks_uri: string;\n authorization_response_iss_parameter_supported: boolean;\n response_modes_supported: string[];\n response_types_supported: string[];\n scopes_supported: string[];\n subject_types_supported: string[];\n token_endpoint_auth_methods_supported: string[];\n token_endpoint_auth_signing_alg_values_supported: string[];\n token_endpoint: string;\n id_token_signing_alg_values_supported: string[];\n pushed_authorization_request_endpoint: string;\n request_parameter_supported: boolean;\n request_uri_parameter_supported: boolean;\n userinfo_endpoint: string;\n claim_types_supported: string[];\n};\n\ntype LoginPostMessage = {\n source: string;\n type: string;\n clientId: string;\n data: {\n url: string;\n };\n};\nexport type {\n LoginPostMessage,\n AuthSessionService,\n TokenService,\n UserInfoService,\n ResourceService,\n AuthRequest,\n Tokens,\n Endpoints,\n Config,\n SessionData,\n OIDCTokenResponseBody,\n ParsedTokens,\n BaseUser,\n User,\n DisplayMode,\n UnknownObject,\n EmptyObject,\n ForwardedTokens,\n ForwardedTokensJWT,\n JWTPayload,\n IdTokenPayload,\n IdToken,\n OpenIdConfiguration,\n};\nexport { tokenKeys };\nexport interface AuthStorage {\n get(key: string): Promise<string | null>;\n set(key: string, value: string): Promise<void>;\n}\n"]}
@@ -0,0 +1,9 @@
1
+ import type { AuthStorage } from "@/types.js";
2
+ import { EventEmitter } from "eventemitter3";
3
+ export declare class LocalStorageAdapter implements AuthStorage {
4
+ static _emitter: EventEmitter;
5
+ static get emitter(): EventEmitter;
6
+ get(key: string): Promise<string>;
7
+ set(key: string, value: string): Promise<void>;
8
+ }
9
+ //# sourceMappingURL=storage.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"storage.d.ts","sourceRoot":"","sources":["../../../src/browser/storage.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,YAAY,CAAC;AAC9C,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAE7C,qBAAa,mBAAoB,YAAW,WAAW;IACrD,MAAM,CAAC,QAAQ,EAAE,YAAY,CAAC;IAC9B,MAAM,KAAK,OAAO,IAAI,YAAY,CAKjC;IACK,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAIjC,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAGrD"}
@@ -0,0 +1,17 @@
1
+ import { EventEmitter } from "eventemitter3";
2
+ export class LocalStorageAdapter {
3
+ static _emitter;
4
+ static get emitter() {
5
+ if (!LocalStorageAdapter._emitter) {
6
+ LocalStorageAdapter._emitter = new EventEmitter();
7
+ }
8
+ return LocalStorageAdapter._emitter;
9
+ }
10
+ async get(key) {
11
+ return Promise.resolve(localStorage.getItem(key) || "");
12
+ }
13
+ async set(key, value) {
14
+ localStorage.setItem(key, value);
15
+ }
16
+ }
17
+ //# sourceMappingURL=storage.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"storage.js","sourceRoot":"","sources":["../../../src/browser/storage.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAE7C,MAAM,OAAO,mBAAmB;IAC9B,MAAM,CAAC,QAAQ,CAAe;IAC9B,MAAM,KAAK,OAAO;QAChB,IAAI,CAAC,mBAAmB,CAAC,QAAQ,EAAE,CAAC;YAClC,mBAAmB,CAAC,QAAQ,GAAG,IAAI,YAAY,EAAE,CAAC;QACpD,CAAC;QACD,OAAO,mBAAmB,CAAC,QAAQ,CAAC;IACtC,CAAC;IACD,KAAK,CAAC,GAAG,CAAC,GAAW;QACnB,OAAO,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,CAAC;IAC1D,CAAC;IAED,KAAK,CAAC,GAAG,CAAC,GAAW,EAAE,KAAa;QAClC,YAAY,CAAC,OAAO,CAAC,GAAG,EAAE,KAAK,CAAC,CAAC;IACnC,CAAC;CACF","sourcesContent":["import type { AuthStorage } from \"@/types.js\";\nimport { EventEmitter } from \"eventemitter3\";\n\nexport class LocalStorageAdapter implements AuthStorage {\n static _emitter: EventEmitter;\n static get emitter(): EventEmitter {\n if (!LocalStorageAdapter._emitter) {\n LocalStorageAdapter._emitter = new EventEmitter();\n }\n return LocalStorageAdapter._emitter;\n }\n async get(key: string): Promise<string> {\n return Promise.resolve(localStorage.getItem(key) || \"\");\n }\n\n async set(key: string, value: string): Promise<void> {\n localStorage.setItem(key, value);\n }\n}\n"]}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"config.d.ts","sourceRoot":"","sources":["../../src/config.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,YAAY,CAAC;AAGzC,eAAO,MAAM,UAAU,EAAE,MAExB,CAAC"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAGA,YAAY,EACV,MAAM,EACN,SAAS,EACT,MAAM,EACN,IAAI,EACJ,WAAW,EACX,eAAe,EACf,WAAW,GACZ,MAAM,YAAY,CAAC;AAEpB,mBAAmB,uBAAuB,CAAC;AAE3C,YAAY,EAAE,eAAe,EAAE,MAAM,oCAAoC,CAAC"}
@@ -0,0 +1,7 @@
1
+ declare const getWindowCookieValue: (requests: {
2
+ key: string;
3
+ window: Window;
4
+ parseJson?: boolean;
5
+ }[]) => Record<string, string | Record<string, unknown>> | null;
6
+ export { getWindowCookieValue };
7
+ //# sourceMappingURL=cookies.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cookies.d.ts","sourceRoot":"","sources":["../../../src/lib/cookies.ts"],"names":[],"mappings":"AAAA,QAAA,MAAM,oBAAoB,aACd;IACR,GAAG,EAAE,MAAM,CAAC;IACZ,MAAM,EAAE,MAAM,CAAC;IACf,SAAS,CAAC,EAAE,OAAO,CAAC;CACrB,EAAE,4DAqBJ,CAAC;AACF,OAAO,EAAE,oBAAoB,EAAE,CAAC"}
@@ -0,0 +1,25 @@
1
+ const getWindowCookieValue = (requests) => {
2
+ const cookie = window.document.cookie;
3
+ if (!cookie)
4
+ return null;
5
+ const cookies = cookie.split(";");
6
+ const response = {};
7
+ for (const c of cookies) {
8
+ const [name, value] = c.trim().split("=");
9
+ const request = requests.find((r) => r.key === name);
10
+ if (value && request) {
11
+ try {
12
+ const decodeURIComponentValue = decodeURIComponent(value);
13
+ response[request.key] = request.parseJson
14
+ ? JSON.parse(decodeURIComponentValue)
15
+ : decodeURIComponentValue;
16
+ }
17
+ catch {
18
+ response[request.key] = value;
19
+ }
20
+ }
21
+ }
22
+ return response;
23
+ };
24
+ export { getWindowCookieValue };
25
+ //# sourceMappingURL=cookies.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cookies.js","sourceRoot":"","sources":["../../../src/lib/cookies.ts"],"names":[],"mappings":"AAAA,MAAM,oBAAoB,GAAG,CAC3B,QAIG,EACH,EAAE;IACF,MAAM,MAAM,GAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;IACtC,IAAI,CAAC,MAAM;QAAE,OAAO,IAAI,CAAC;IACzB,MAAM,OAAO,GAAG,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,MAAM,QAAQ,GAAqD,EAAE,CAAC;IACtE,KAAK,MAAM,CAAC,IAAI,OAAO,EAAE,CAAC;QACxB,MAAM,CAAC,IAAI,EAAE,KAAK,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAC1C,MAAM,OAAO,GAAG,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,KAAK,IAAI,CAAC,CAAC;QACrD,IAAI,KAAK,IAAI,OAAO,EAAE,CAAC;YACrB,IAAI,CAAC;gBACH,MAAM,uBAAuB,GAAG,kBAAkB,CAAC,KAAK,CAAC,CAAC;gBAC1D,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,OAAO,CAAC,SAAS;oBACvC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,uBAAuB,CAAC;oBACrC,CAAC,CAAC,uBAAuB,CAAC;YAC9B,CAAC;YAAC,MAAM,CAAC;gBACP,QAAQ,CAAC,OAAO,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;YAChC,CAAC;QACH,CAAC;IACH,CAAC;IACD,OAAO,QAAQ,CAAC;AAClB,CAAC,CAAC;AACF,OAAO,EAAE,oBAAoB,EAAE,CAAC","sourcesContent":["const getWindowCookieValue = (\n requests: {\n key: string;\n window: Window;\n parseJson?: boolean;\n }[],\n) => {\n const cookie = window.document.cookie;\n if (!cookie) return null;\n const cookies = cookie.split(\";\");\n const response: Record<string, string | Record<string, unknown>> = {};\n for (const c of cookies) {\n const [name, value] = c.trim().split(\"=\");\n const request = requests.find((r) => r.key === name);\n if (value && request) {\n try {\n const decodeURIComponentValue = decodeURIComponent(value);\n response[request.key] = request.parseJson\n ? JSON.parse(decodeURIComponentValue)\n : decodeURIComponentValue;\n } catch {\n response[request.key] = value;\n }\n }\n }\n return response;\n};\nexport { getWindowCookieValue };\n"]}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"jwt.d.ts","sourceRoot":"","sources":["../../../src/lib/jwt.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,kBAAkB,EAAE,MAAM,YAAY,CAAC;AAEtE,eAAO,MAAM,2BAA2B,gBACzB,kBAAkB,KAC9B,eAUA,CAAC"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"oauth.d.ts","sourceRoot":"","sources":["../../../src/lib/oauth.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,SAAS,EAAuB,MAAM,YAAY,CAAC;AAG9E,QAAA,MAAM,mBAAmB,WAAY,MAAM,KAAG,MAAM,EAQnD,CAAC;AAKF,QAAA,MAAM,iBAAiB,gBAAuB,MAAM,KAAG,OAAO,CAAC,SAAS,CAYvE,CAAC;AAEF;;;;GAIG;AACH,QAAA,MAAM,aAAa,gBACJ,WAAW,wBACF,OAAO,KAC5B,MAOF,CAAC;AAEF;;;;;GAKG;AACH,QAAA,MAAM,oBAAoB,UACjB,MAAM,sBACO,WAAW,GAAG,SAAS,KAC1C,WAAW,GAAG,SAQhB,CAAC;AAEF,QAAA,MAAM,4BAA4B,UAAW,MAAM,KAAG,OAAO,GAAG,SAQ/D,CAAC;AAEF,OAAO,EACL,4BAA4B,EAC5B,mBAAmB,EACnB,iBAAiB,EACjB,oBAAoB,EACpB,aAAa,GACd,CAAC"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"postMessage.d.ts","sourceRoot":"","sources":["../../../src/lib/postMessage.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAEnD,QAAA,MAAM,2BAA2B,UACxB,gBAAgB,YACb,MAAM,KACf,OAcF,CAAC;AAEF,OAAO,EAAE,2BAA2B,EAAE,CAAC"}
@@ -0,0 +1,15 @@
1
+ const validateLoginAppPostMessage = (event, clientId) => {
2
+ const caseEvent = event;
3
+ // console.log("caseEvent", caseEvent);
4
+ if (!caseEvent.clientId ||
5
+ !caseEvent.data.url ||
6
+ !caseEvent.source ||
7
+ !caseEvent.type ||
8
+ caseEvent.clientId !== clientId ||
9
+ caseEvent.source !== "civicloginApp") {
10
+ return false;
11
+ }
12
+ return true;
13
+ };
14
+ export { validateLoginAppPostMessage };
15
+ //# sourceMappingURL=postMessage.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"postMessage.js","sourceRoot":"","sources":["../../../src/lib/postMessage.ts"],"names":[],"mappings":"AAEA,MAAM,2BAA2B,GAAG,CAClC,KAAuB,EACvB,QAAgB,EACP,EAAE;IACX,MAAM,SAAS,GAAG,KAAyB,CAAC;IAC5C,uCAAuC;IACvC,IACE,CAAC,SAAS,CAAC,QAAQ;QACnB,CAAC,SAAS,CAAC,IAAI,CAAC,GAAG;QACnB,CAAC,SAAS,CAAC,MAAM;QACjB,CAAC,SAAS,CAAC,IAAI;QACf,SAAS,CAAC,QAAQ,KAAK,QAAQ;QAC/B,SAAS,CAAC,MAAM,KAAK,eAAe,EACpC,CAAC;QACD,OAAO,KAAK,CAAC;IACf,CAAC;IACD,OAAO,IAAI,CAAC;AACd,CAAC,CAAC;AAEF,OAAO,EAAE,2BAA2B,EAAE,CAAC","sourcesContent":["import type { LoginPostMessage } from \"@/types.js\";\n\nconst validateLoginAppPostMessage = (\n event: LoginPostMessage,\n clientId: string,\n): boolean => {\n const caseEvent = event as LoginPostMessage;\n // console.log(\"caseEvent\", caseEvent);\n if (\n !caseEvent.clientId ||\n !caseEvent.data.url ||\n !caseEvent.source ||\n !caseEvent.type ||\n caseEvent.clientId !== clientId ||\n caseEvent.source !== \"civicloginApp\"\n ) {\n return false;\n }\n return true;\n};\n\nexport { validateLoginAppPostMessage };\n"]}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"windowUtil.d.ts","sourceRoot":"","sources":["../../../src/lib/windowUtil.ts"],"names":[],"mappings":"AAAA,QAAA,MAAM,gBAAgB,WAAY,MAAM,KAAG,OAc1C,CAAC;AAEF,QAAA,MAAM,yBAAyB,mBAAoB,MAAM,EAAE,SAW1D,CAAC;AAEF,OAAO,EAAE,gBAAgB,EAAE,yBAAyB,EAAE,CAAC"}
@@ -0,0 +1,31 @@
1
+ const isWindowInIframe = (window) => {
2
+ if (typeof window !== "undefined") {
3
+ // use the window width to determine if we're in an iframe or not
4
+ try {
5
+ if (window?.frameElement?.id === "civic-auth-iframe") {
6
+ return true;
7
+ }
8
+ // eslint-disable-next-line @typescript-eslint/no-unused-vars
9
+ }
10
+ catch (_e) {
11
+ // If we get an error, we're not in an iframe
12
+ return false;
13
+ }
14
+ }
15
+ return false;
16
+ };
17
+ const removeParamsWithoutReload = (paramsToRemove) => {
18
+ const url = new URL(window.location.href);
19
+ paramsToRemove.forEach((param) => {
20
+ url.searchParams.delete(param);
21
+ });
22
+ try {
23
+ window.history.replaceState({}, "", url);
24
+ window.dispatchEvent(new Event("popstate"));
25
+ }
26
+ catch (error) {
27
+ console.warn("window.history.replaceState failed", error);
28
+ }
29
+ };
30
+ export { isWindowInIframe, removeParamsWithoutReload };
31
+ //# sourceMappingURL=windowUtil.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"windowUtil.js","sourceRoot":"","sources":["../../../src/lib/windowUtil.ts"],"names":[],"mappings":"AAAA,MAAM,gBAAgB,GAAG,CAAC,MAAc,EAAW,EAAE;IACnD,IAAI,OAAO,MAAM,KAAK,WAAW,EAAE,CAAC;QAClC,iEAAiE;QACjE,IAAI,CAAC;YACH,IAAI,MAAM,EAAE,YAAY,EAAE,EAAE,KAAK,mBAAmB,EAAE,CAAC;gBACrD,OAAO,IAAI,CAAC;YACd,CAAC;YACD,6DAA6D;QAC/D,CAAC;QAAC,OAAO,EAAE,EAAE,CAAC;YACZ,6CAA6C;YAC7C,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC;IACD,OAAO,KAAK,CAAC;AACf,CAAC,CAAC;AAEF,MAAM,yBAAyB,GAAG,CAAC,cAAwB,EAAE,EAAE;IAC7D,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;IAC1C,cAAc,CAAC,OAAO,CAAC,CAAC,KAAa,EAAE,EAAE;QACvC,GAAG,CAAC,YAAY,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IACjC,CAAC,CAAC,CAAC;IACH,IAAI,CAAC;QACH,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,EAAE,EAAE,EAAE,GAAG,CAAC,CAAC;QACzC,MAAM,CAAC,aAAa,CAAC,IAAI,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC;IAC9C,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,CAAC,IAAI,CAAC,oCAAoC,EAAE,KAAK,CAAC,CAAC;IAC5D,CAAC;AACH,CAAC,CAAC;AAEF,OAAO,EAAE,gBAAgB,EAAE,yBAAyB,EAAE,CAAC","sourcesContent":["const isWindowInIframe = (window: Window): boolean => {\n if (typeof window !== \"undefined\") {\n // use the window width to determine if we're in an iframe or not\n try {\n if (window?.frameElement?.id === \"civic-auth-iframe\") {\n return true;\n }\n // eslint-disable-next-line @typescript-eslint/no-unused-vars\n } catch (_e) {\n // If we get an error, we're not in an iframe\n return false;\n }\n }\n return false;\n};\n\nconst removeParamsWithoutReload = (paramsToRemove: string[]) => {\n const url = new URL(window.location.href);\n paramsToRemove.forEach((param: string) => {\n url.searchParams.delete(param);\n });\n try {\n window.history.replaceState({}, \"\", url);\n window.dispatchEvent(new Event(\"popstate\"));\n } catch (error) {\n console.warn(\"window.history.replaceState failed\", error);\n }\n};\n\nexport { isWindowInIframe, removeParamsWithoutReload };\n"]}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"GetUser.d.ts","sourceRoot":"","sources":["../../../src/nextjs/GetUser.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,YAAY,CAAC;AAIvC,eAAO,MAAM,OAAO,QAAa,OAAO,CAAC,IAAI,GAAG,IAAI,CAGnD,CAAC"}
@@ -0,0 +1,7 @@
1
+ import { NextjsClientStorage } from "@/nextjs/cookies.js";
2
+ import { getUser as getSessionUser } from "@/shared/lib/session.js";
3
+ export const getUser = async () => {
4
+ const clientStorage = new NextjsClientStorage();
5
+ return getSessionUser(clientStorage);
6
+ };
7
+ //# sourceMappingURL=GetUser.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"GetUser.js","sourceRoot":"","sources":["../../../src/nextjs/GetUser.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,OAAO,IAAI,cAAc,EAAE,MAAM,yBAAyB,CAAC;AAEpE,MAAM,CAAC,MAAM,OAAO,GAAG,KAAK,IAA0B,EAAE;IACtD,MAAM,aAAa,GAAG,IAAI,mBAAmB,EAAE,CAAC;IAChD,OAAO,cAAc,CAAC,aAAa,CAAC,CAAC;AACvC,CAAC,CAAC","sourcesContent":["/**\n * Used on the server-side to get the user object from the cookie\n */\nimport type { User } from \"@/types.js\";\nimport { NextjsClientStorage } from \"@/nextjs/cookies.js\";\nimport { getUser as getSessionUser } from \"@/shared/lib/session.js\";\n\nexport const getUser = async (): Promise<User | null> => {\n const clientStorage = new NextjsClientStorage();\n return getSessionUser(clientStorage);\n};\n"]}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"config.d.ts","sourceRoot":"","sources":["../../../src/nextjs/config.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,MAAM,CAAC;AAGvC,OAAO,EAEL,KAAK,YAAY,EAEjB,KAAK,kBAAkB,EACxB,MAAM,uBAAuB,CAAC;AAK/B,MAAM,MAAM,mBAAmB,GAAG;IAChC,MAAM,EAAE,kBAAkB,CAAC;IAC3B,IAAI,EAAE,YAAY,CAAC;CACpB,CAAC;AAEF,MAAM,MAAM,sBAAsB,GAAG;IACnC,QAAQ,EAAE,MAAM,CAAC;IACjB,WAAW,EAAE,MAAM,CAAC;IACpB,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,EAAE,MAAM,CAAC;IAClB,YAAY,EAAE,MAAM,CAAC;IACrB,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,OAAO,EAAE,mBAAmB,CAAC;CAC9B,CAAC;AAEF,MAAM,MAAM,UAAU,GAAG,OAAO,CAAC,sBAAsB,CAAC,CAAC;AAEzD,MAAM,MAAM,iBAAiB,GAAG,sBAAsB,CAAC;AAGvD;;GAEG;AACH,eAAO,MAAM,iBAAiB,EAAE,IAAI,CAAC,sBAAsB,EAAE,UAAU,CA6DtE,CAAC;AAEF;;;;;;;;;;;;;;;;GAgBG;AACH,eAAO,MAAM,iBAAiB,YACpB,UAAU,KACjB,sBA0CF,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,eAAO,MAAM,qBAAqB,eACpB,UAAU,GAAG,IAAI,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,UAAU,CAAC,mBAE1C,UAAU;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;qBAwBiub,CAAC;6BAAsG,CAAC;;;sBAAke,CAAC;yBAA4H,CAAC;;;qBAA+H,CAAC;;;;;;;;;;;;;;;;;;iBAA8pE,CAAC;;;;;;;6BAAg6C,CAAC;sBAAoC,CAAC;;aAAoC,CAAC;;6BAA0D,CAAC;oBAA8B,CAAC;0BAAkE,CAAC;;qBAA2C,CAAC;mBAAiC,CAAC;;wBAA+C,CAAC;eAAmD,CAAC;iBAA4C,CAAC;2BAAyC,CAAC;;;;;;;;;yBAA4zC,CAAC;6BAAwC,CAAC;;;eAAkD,CAAC;mBAAuB,CAAC;;;;CAD1ioB,CAAC"}
@@ -0,0 +1,173 @@
1
+ import { loggers } from "@/lib/logger.js";
2
+ import { withoutUndefined } from "@/utils.js";
3
+ import { CodeVerifier, OAuthTokens, } from "@/shared/lib/types.js";
4
+ import { DEFAULT_AUTH_SERVER } from "@/constants.js";
5
+ const logger = loggers.nextjs.handlers.auth;
6
+ const defaultServerSecure = !(process.env.NODE_ENV === "development");
7
+ /**
8
+ * Default configuration values that will be used if not overridden
9
+ */
10
+ export const defaultAuthConfig = {
11
+ oauthServer: DEFAULT_AUTH_SERVER,
12
+ callbackUrl: "/api/auth/callback",
13
+ challengeUrl: "/api/auth/challenge",
14
+ logoutUrl: "/api/auth/logout",
15
+ loginUrl: "/",
16
+ include: ["/*"],
17
+ exclude: [],
18
+ cookies: {
19
+ tokens: {
20
+ [OAuthTokens.ID_TOKEN]: {
21
+ secure: defaultServerSecure,
22
+ httpOnly: true,
23
+ sameSite: "strict",
24
+ path: "/",
25
+ },
26
+ [OAuthTokens.ACCESS_TOKEN]: {
27
+ secure: defaultServerSecure,
28
+ httpOnly: true,
29
+ sameSite: "strict",
30
+ path: "/",
31
+ },
32
+ [OAuthTokens.REFRESH_TOKEN]: {
33
+ secure: defaultServerSecure,
34
+ httpOnly: true,
35
+ sameSite: "strict",
36
+ path: "/",
37
+ },
38
+ [OAuthTokens.EXPIRES_IN]: {
39
+ secure: defaultServerSecure,
40
+ httpOnly: true,
41
+ sameSite: "strict",
42
+ path: "/",
43
+ },
44
+ [OAuthTokens.TIMESTAMP]: {
45
+ secure: defaultServerSecure,
46
+ httpOnly: true,
47
+ sameSite: "strict",
48
+ path: "/",
49
+ },
50
+ [CodeVerifier.COOKIE_NAME]: {
51
+ secure: defaultServerSecure,
52
+ httpOnly: true,
53
+ sameSite: "strict",
54
+ path: "/",
55
+ },
56
+ [CodeVerifier.APP_URL]: {
57
+ secure: defaultServerSecure,
58
+ httpOnly: true,
59
+ sameSite: "strict",
60
+ path: "/",
61
+ },
62
+ },
63
+ user: {
64
+ secure: defaultServerSecure,
65
+ httpOnly: false,
66
+ sameSite: "strict",
67
+ path: "/",
68
+ maxAge: 60 * 60, // 1 hour
69
+ },
70
+ },
71
+ };
72
+ /**
73
+ * Resolves the authentication configuration by combining:
74
+ * 1. Default values
75
+ * 2. Environment variables (set internally by the plugin)
76
+ * 3. Explicitly passed configuration
77
+ *
78
+ * Note: Developers should not set _civic_auth_* environment variables directly.
79
+ * Instead, pass configuration to the createCivicAuthPlugin in next.config.js:
80
+ *
81
+ * @example
82
+ * ```js
83
+ * // next.config.js
84
+ * export default createCivicAuthPlugin({
85
+ * callbackUrl: '/custom/callback',
86
+ * })
87
+ * ```
88
+ */
89
+ export const resolveAuthConfig = (config = {}) => {
90
+ // Read configuration that was set by the plugin via environment variables
91
+ const configFromEnv = withoutUndefined({
92
+ clientId: process.env._civic_auth_client_id,
93
+ oauthServer: process.env._civic_oauth_server,
94
+ callbackUrl: process.env._civic_auth_callback_url,
95
+ challengeUrl: process.env._civic_auth_challenge_url,
96
+ loginUrl: process.env._civic_auth_login_url,
97
+ logoutUrl: process.env._civic_auth_logout_url,
98
+ include: process.env._civic_auth_includes?.split(","),
99
+ exclude: process.env._civic_auth_excludes?.split(","),
100
+ cookies: process.env._civic_auth_cookie_config
101
+ ? JSON.parse(process.env._civic_auth_cookie_config)
102
+ : undefined,
103
+ });
104
+ const mergedConfig = {
105
+ ...defaultAuthConfig,
106
+ ...configFromEnv, // Apply plugin-set config
107
+ ...config, // Override with directly passed config
108
+ cookies: {
109
+ tokens: {
110
+ ...defaultAuthConfig.cookies.tokens,
111
+ ...(configFromEnv?.cookies?.tokens || {}),
112
+ ...(config.cookies?.tokens || {}),
113
+ },
114
+ user: {
115
+ ...defaultAuthConfig.cookies.user,
116
+ ...(configFromEnv?.cookies?.user || {}),
117
+ ...(config.cookies?.user || {}),
118
+ },
119
+ },
120
+ };
121
+ logger.debug("Config from environment:", JSON.stringify(configFromEnv, null, 2));
122
+ logger.debug("Resolved config:", JSON.stringify(mergedConfig, null, 2));
123
+ if (mergedConfig.clientId === undefined) {
124
+ throw new Error("Civic Auth client ID is required");
125
+ }
126
+ return mergedConfig;
127
+ };
128
+ /**
129
+ * Creates a Next.js plugin that handles auth configuration.
130
+ *
131
+ * This is the main configuration point for the auth system.
132
+ * Do not set _civic_auth_* environment variables directly - instead,
133
+ * pass your configuration here:
134
+ *
135
+ * @example
136
+ * ```js
137
+ * // next.config.js
138
+ * export default createCivicAuthPlugin({
139
+ * clientId: 'my-client-id',
140
+ * callbackUrl: '/custom/callback',
141
+ * loginUrl: '/custom/login',
142
+ * logoutUrl: '/custom/logout',
143
+ * include: ['/protected/*'],
144
+ * exclude: ['/public/*']
145
+ * })
146
+ * ```
147
+ *
148
+ * The plugin sets internal environment variables that are used by
149
+ * the auth system. These variables should not be set manually.
150
+ */
151
+ export const createCivicAuthPlugin = (authConfig) => {
152
+ return (nextConfig) => {
153
+ logger.debug("createCivicAuthPlugin nextConfig", JSON.stringify(nextConfig, null, 2));
154
+ const resolvedConfig = resolveAuthConfig({ ...authConfig });
155
+ return {
156
+ ...nextConfig,
157
+ env: {
158
+ ...nextConfig?.env,
159
+ // Internal environment variables - do not set these manually
160
+ _civic_auth_client_id: resolvedConfig.clientId,
161
+ _civic_oauth_server: resolvedConfig.oauthServer,
162
+ _civic_auth_callback_url: resolvedConfig.callbackUrl,
163
+ _civic_auth_challenge_url: resolvedConfig.challengeUrl,
164
+ _civic_auth_login_url: resolvedConfig.loginUrl,
165
+ _civic_auth_logout_url: resolvedConfig.logoutUrl,
166
+ _civic_auth_includes: resolvedConfig.include.join(","),
167
+ _civic_auth_excludes: resolvedConfig.exclude.join(","),
168
+ _civic_auth_cookie_config: JSON.stringify(resolvedConfig.cookies),
169
+ },
170
+ };
171
+ };
172
+ };
173
+ //# sourceMappingURL=config.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"config.js","sourceRoot":"","sources":["../../../src/nextjs/config.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,OAAO,EAAE,MAAM,iBAAiB,CAAC;AAC1C,OAAO,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAC9C,OAAO,EACL,YAAY,EAEZ,WAAW,GAEZ,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AAErD,MAAM,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;AAuB5C,MAAM,mBAAmB,GAAG,CAAC,CAAC,OAAO,CAAC,GAAG,CAAC,QAAQ,KAAK,aAAa,CAAC,CAAC;AACtE;;GAEG;AACH,MAAM,CAAC,MAAM,iBAAiB,GAA6C;IACzE,WAAW,EAAE,mBAAmB;IAChC,WAAW,EAAE,oBAAoB;IACjC,YAAY,EAAE,qBAAqB;IACnC,SAAS,EAAE,kBAAkB;IAC7B,QAAQ,EAAE,GAAG;IACb,OAAO,EAAE,CAAC,IAAI,CAAC;IACf,OAAO,EAAE,EAAE;IACX,OAAO,EAAE;QACP,MAAM,EAAE;YACN,CAAC,WAAW,CAAC,QAAQ,CAAC,EAAE;gBACtB,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;YACD,CAAC,WAAW,CAAC,YAAY,CAAC,EAAE;gBAC1B,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;YACD,CAAC,WAAW,CAAC,aAAa,CAAC,EAAE;gBAC3B,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;YACD,CAAC,WAAW,CAAC,UAAU,CAAC,EAAE;gBACxB,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;YACD,CAAC,WAAW,CAAC,SAAS,CAAC,EAAE;gBACvB,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;YACD,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBAC1B,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;YACD,CAAC,YAAY,CAAC,OAAO,CAAC,EAAE;gBACtB,MAAM,EAAE,mBAAmB;gBAC3B,QAAQ,EAAE,IAAI;gBACd,QAAQ,EAAE,QAAQ;gBAClB,IAAI,EAAE,GAAG;aACV;SACF;QACD,IAAI,EAAE;YACJ,MAAM,EAAE,mBAAmB;YAC3B,QAAQ,EAAE,KAAK;YACf,QAAQ,EAAE,QAAQ;YAClB,IAAI,EAAE,GAAG;YACT,MAAM,EAAE,EAAE,GAAG,EAAE,EAAE,SAAS;SAC3B;KACF;CACF,CAAC;AAEF;;;;;;;;;;;;;;;;GAgBG;AACH,MAAM,CAAC,MAAM,iBAAiB,GAAG,CAC/B,SAAqB,EAAE,EACC,EAAE;IAC1B,0EAA0E;IAC1E,MAAM,aAAa,GAAG,gBAAgB,CAAC;QACrC,QAAQ,EAAE,OAAO,CAAC,GAAG,CAAC,qBAAqB;QAC3C,WAAW,EAAE,OAAO,CAAC,GAAG,CAAC,mBAAmB;QAC5C,WAAW,EAAE,OAAO,CAAC,GAAG,CAAC,wBAAwB;QACjD,YAAY,EAAE,OAAO,CAAC,GAAG,CAAC,yBAAyB;QACnD,QAAQ,EAAE,OAAO,CAAC,GAAG,CAAC,qBAAqB;QAC3C,SAAS,EAAE,OAAO,CAAC,GAAG,CAAC,sBAAsB;QAC7C,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,EAAE,KAAK,CAAC,GAAG,CAAC;QACrD,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,oBAAoB,EAAE,KAAK,CAAC,GAAG,CAAC;QACrD,OAAO,EAAE,OAAO,CAAC,GAAG,CAAC,yBAAyB;YAC5C,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,GAAG,CAAC,yBAAyB,CAAC;YACnD,CAAC,CAAC,SAAS;KACd,CAAe,CAAC;IACjB,MAAM,YAAY,GAAG;QACnB,GAAG,iBAAiB;QACpB,GAAG,aAAa,EAAE,0BAA0B;QAC5C,GAAG,MAAM,EAAE,uCAAuC;QAClD,OAAO,EAAE;YACP,MAAM,EAAE;gBACN,GAAG,iBAAiB,CAAC,OAAO,CAAC,MAAM;gBACnC,GAAG,CAAC,aAAa,EAAE,OAAO,EAAE,MAAM,IAAI,EAAE,CAAC;gBACzC,GAAG,CAAC,MAAM,CAAC,OAAO,EAAE,MAAM,IAAI,EAAE,CAAC;aAClC;YACD,IAAI,EAAE;gBACJ,GAAG,iBAAiB,CAAC,OAAO,CAAC,IAAI;gBACjC,GAAG,CAAC,aAAa,EAAE,OAAO,EAAE,IAAI,IAAI,EAAE,CAAC;gBACvC,GAAG,CAAC,MAAM,CAAC,OAAO,EAAE,IAAI,IAAI,EAAE,CAAC;aAChC;SACF;KACF,CAAC;IAEF,MAAM,CAAC,KAAK,CACV,0BAA0B,EAC1B,IAAI,CAAC,SAAS,CAAC,aAAa,EAAE,IAAI,EAAE,CAAC,CAAC,CACvC,CAAC;IACF,MAAM,CAAC,KAAK,CAAC,kBAAkB,EAAE,IAAI,CAAC,SAAS,CAAC,YAAY,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;IACxE,IAAI,YAAY,CAAC,QAAQ,KAAK,SAAS,EAAE,CAAC;QACxC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;IACtD,CAAC;IACD,OAAO,YAA6D,CAAC;AACvE,CAAC,CAAC;AAEF;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAM,CAAC,MAAM,qBAAqB,GAAG,CACnC,UAA+D,EAC/D,EAAE;IACF,OAAO,CAAC,UAAuB,EAAE,EAAE;QACjC,MAAM,CAAC,KAAK,CACV,kCAAkC,EAClC,IAAI,CAAC,SAAS,CAAC,UAAU,EAAE,IAAI,EAAE,CAAC,CAAC,CACpC,CAAC;QACF,MAAM,cAAc,GAAG,iBAAiB,CAAC,EAAE,GAAG,UAAU,EAAE,CAAC,CAAC;QAC5D,OAAO;YACL,GAAG,UAAU;YACb,GAAG,EAAE;gBACH,GAAG,UAAU,EAAE,GAAG;gBAClB,6DAA6D;gBAC7D,qBAAqB,EAAE,cAAc,CAAC,QAAQ;gBAC9C,mBAAmB,EAAE,cAAc,CAAC,WAAW;gBAC/C,wBAAwB,EAAE,cAAc,CAAC,WAAW;gBACpD,yBAAyB,EAAE,cAAc,CAAC,YAAY;gBACtD,qBAAqB,EAAE,cAAc,CAAC,QAAQ;gBAC9C,sBAAsB,EAAE,cAAc,CAAC,SAAS;gBAChD,oBAAoB,EAAE,cAAc,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC;gBACtD,oBAAoB,EAAE,cAAc,CAAC,OAAO,CAAC,IAAI,CAAC,GAAG,CAAC;gBACtD,yBAAyB,EAAE,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,OAAO,CAAC;aAClE;SACF,CAAC;IACJ,CAAC,CAAC;AACJ,CAAC,CAAC","sourcesContent":["/* eslint-disable turbo/no-undeclared-env-vars */\nimport type { NextConfig } from \"next\";\nimport { loggers } from \"@/lib/logger.js\";\nimport { withoutUndefined } from \"@/utils.js\";\nimport {\n CodeVerifier,\n type CookieConfig,\n OAuthTokens,\n type TokensCookieConfig,\n} from \"@/shared/lib/types.js\";\nimport { DEFAULT_AUTH_SERVER } from \"@/constants.js\";\n\nconst logger = loggers.nextjs.handlers.auth;\n\nexport type CookiesConfigObject = {\n tokens: TokensCookieConfig;\n user: CookieConfig;\n};\n\nexport type AuthConfigWithDefaults = {\n clientId: string;\n oauthServer: string;\n callbackUrl: string;\n loginUrl: string;\n logoutUrl: string;\n challengeUrl: string;\n include: string[];\n exclude: string[];\n cookies: CookiesConfigObject;\n};\n\nexport type AuthConfig = Partial<AuthConfigWithDefaults>;\n\nexport type DefinedAuthConfig = AuthConfigWithDefaults;\n\nconst defaultServerSecure = !(process.env.NODE_ENV === \"development\");\n/**\n * Default configuration values that will be used if not overridden\n */\nexport const defaultAuthConfig: Omit<AuthConfigWithDefaults, \"clientId\"> = {\n oauthServer: DEFAULT_AUTH_SERVER,\n callbackUrl: \"/api/auth/callback\",\n challengeUrl: \"/api/auth/challenge\",\n logoutUrl: \"/api/auth/logout\",\n loginUrl: \"/\",\n include: [\"/*\"],\n exclude: [],\n cookies: {\n tokens: {\n [OAuthTokens.ID_TOKEN]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n [OAuthTokens.ACCESS_TOKEN]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n [OAuthTokens.REFRESH_TOKEN]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n [OAuthTokens.EXPIRES_IN]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n [OAuthTokens.TIMESTAMP]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n [CodeVerifier.COOKIE_NAME]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n [CodeVerifier.APP_URL]: {\n secure: defaultServerSecure,\n httpOnly: true,\n sameSite: \"strict\",\n path: \"/\",\n },\n },\n user: {\n secure: defaultServerSecure,\n httpOnly: false,\n sameSite: \"strict\",\n path: \"/\",\n maxAge: 60 * 60, // 1 hour\n },\n },\n};\n\n/**\n * Resolves the authentication configuration by combining:\n * 1. Default values\n * 2. Environment variables (set internally by the plugin)\n * 3. Explicitly passed configuration\n *\n * Note: Developers should not set _civic_auth_* environment variables directly.\n * Instead, pass configuration to the createCivicAuthPlugin in next.config.js:\n *\n * @example\n * ```js\n * // next.config.js\n * export default createCivicAuthPlugin({\n * callbackUrl: '/custom/callback',\n * })\n * ```\n */\nexport const resolveAuthConfig = (\n config: AuthConfig = {},\n): AuthConfigWithDefaults => {\n // Read configuration that was set by the plugin via environment variables\n const configFromEnv = withoutUndefined({\n clientId: process.env._civic_auth_client_id,\n oauthServer: process.env._civic_oauth_server,\n callbackUrl: process.env._civic_auth_callback_url,\n challengeUrl: process.env._civic_auth_challenge_url,\n loginUrl: process.env._civic_auth_login_url,\n logoutUrl: process.env._civic_auth_logout_url,\n include: process.env._civic_auth_includes?.split(\",\"),\n exclude: process.env._civic_auth_excludes?.split(\",\"),\n cookies: process.env._civic_auth_cookie_config\n ? JSON.parse(process.env._civic_auth_cookie_config)\n : undefined,\n }) as AuthConfig;\n const mergedConfig = {\n ...defaultAuthConfig,\n ...configFromEnv, // Apply plugin-set config\n ...config, // Override with directly passed config\n cookies: {\n tokens: {\n ...defaultAuthConfig.cookies.tokens,\n ...(configFromEnv?.cookies?.tokens || {}),\n ...(config.cookies?.tokens || {}),\n },\n user: {\n ...defaultAuthConfig.cookies.user,\n ...(configFromEnv?.cookies?.user || {}),\n ...(config.cookies?.user || {}),\n },\n },\n };\n\n logger.debug(\n \"Config from environment:\",\n JSON.stringify(configFromEnv, null, 2),\n );\n logger.debug(\"Resolved config:\", JSON.stringify(mergedConfig, null, 2));\n if (mergedConfig.clientId === undefined) {\n throw new Error(\"Civic Auth client ID is required\");\n }\n return mergedConfig as AuthConfigWithDefaults & { clientId: string };\n};\n\n/**\n * Creates a Next.js plugin that handles auth configuration.\n *\n * This is the main configuration point for the auth system.\n * Do not set _civic_auth_* environment variables directly - instead,\n * pass your configuration here:\n *\n * @example\n * ```js\n * // next.config.js\n * export default createCivicAuthPlugin({\n * clientId: 'my-client-id',\n * callbackUrl: '/custom/callback',\n * loginUrl: '/custom/login',\n * logoutUrl: '/custom/logout',\n * include: ['/protected/*'],\n * exclude: ['/public/*']\n * })\n * ```\n *\n * The plugin sets internal environment variables that are used by\n * the auth system. These variables should not be set manually.\n */\nexport const createCivicAuthPlugin = (\n authConfig: AuthConfig & Pick<Required<AuthConfig>, \"clientId\">,\n) => {\n return (nextConfig?: NextConfig) => {\n logger.debug(\n \"createCivicAuthPlugin nextConfig\",\n JSON.stringify(nextConfig, null, 2),\n );\n const resolvedConfig = resolveAuthConfig({ ...authConfig });\n return {\n ...nextConfig,\n env: {\n ...nextConfig?.env,\n // Internal environment variables - do not set these manually\n _civic_auth_client_id: resolvedConfig.clientId,\n _civic_oauth_server: resolvedConfig.oauthServer,\n _civic_auth_callback_url: resolvedConfig.callbackUrl,\n _civic_auth_challenge_url: resolvedConfig.challengeUrl,\n _civic_auth_login_url: resolvedConfig.loginUrl,\n _civic_auth_logout_url: resolvedConfig.logoutUrl,\n _civic_auth_includes: resolvedConfig.include.join(\",\"),\n _civic_auth_excludes: resolvedConfig.exclude.join(\",\"),\n _civic_auth_cookie_config: JSON.stringify(resolvedConfig.cookies),\n },\n };\n };\n};\n"]}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cookies.d.ts","sourceRoot":"","sources":["../../../src/nextjs/cookies.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,aAAa,EAAE,IAAI,EAAE,MAAM,YAAY,CAAC;AACnE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AAIrD,OAAO,KAAK,EACV,YAAY,EAEZ,WAAW,EACX,kBAAkB,EACnB,MAAM,uBAAuB,CAAC;AAC/B,OAAO,EACL,aAAa,EACb,KAAK,qBAAqB,EAC3B,MAAM,yBAAyB,CAAC;AAEjC;;GAEG;AACH,QAAA,MAAM,kBAAkB,aACZ,QAAQ,eACL,WAAW,UAChB,UAAU,SA4BnB,CAAC;AAcF;;GAEG;AACH,QAAA,MAAM,oBAAoB,aACd,QAAQ,QACZ,IAAI,CAAC,aAAa,CAAC,GAAG,IAAI,eACnB,WAAW,UAChB,UAAU,SAyBnB,CAAC;AAEF;;GAEG;AACH,QAAA,MAAM,gBAAgB,WAAkB,UAAU,kBASjD,CAAC;AAEF,KAAK,SAAS,GAAG,WAAW,GAAG,YAAY,CAAC;AAC5C,cAAM,mBAAoB,SAAQ,aAAa;IACjC,QAAQ,CAAC,MAAM,EAAE,OAAO,CAAC,kBAAkB,CAAC;gBAAnC,MAAM,GAAE,OAAO,CAAC,kBAAkB,CAAM;IAOvD,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAKxC,GAAG,CAAC,GAAG,EAAE,SAAS,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAOxD;AAED,cAAM,mBAAoB,SAAQ,aAAa;gBACjC,MAAM,GAAE,OAAO,CAAC,qBAAqB,CAAM;IAQjD,GAAG,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC;IAKxC,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC;CAIrD;AAED,OAAO,EACL,kBAAkB,EAClB,oBAAoB,EACpB,gBAAgB,EAChB,mBAAmB,EACnB,mBAAmB,GACpB,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { useUserCookie } from "@/nextjs/hooks/useUserCookie.js";
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/nextjs/hooks/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,iCAAiC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export { useUserCookie } from "@/nextjs/hooks/useUserCookie.js";
2
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../src/nextjs/hooks/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,MAAM,iCAAiC,CAAC","sourcesContent":["export { useUserCookie } from \"@/nextjs/hooks/useUserCookie.js\";\n"]}
@@ -0,0 +1,4 @@
1
+ import type { SessionData } from "@/types.js";
2
+ declare const useRefresh: (session: SessionData | null) => void;
3
+ export { useRefresh };
4
+ //# sourceMappingURL=useRefresh.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useRefresh.d.ts","sourceRoot":"","sources":["../../../../src/nextjs/hooks/useRefresh.ts"],"names":[],"mappings":"AAGA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,YAAY,CAAC;AAG9C,QAAA,MAAM,UAAU,YAAa,WAAW,GAAG,IAAI,SAuC9C,CAAC;AAEF,OAAO,EAAE,UAAU,EAAE,CAAC"}
@@ -0,0 +1,38 @@
1
+ import { LocalStorageAdapter } from "@/browser/storage.js";
2
+ import { useEffect, useMemo, useState } from "react";
3
+ import { GenericAuthenticationRefresher } from "@/shared/lib/GenericAuthenticationRefresher.js";
4
+ import { useCivicAuthConfig } from "@/shared/hooks/useCivicAuthConfig.js";
5
+ const useRefresh = (session) => {
6
+ const authConfig = useCivicAuthConfig();
7
+ const storage = useMemo(() => new LocalStorageAdapter(), []);
8
+ // setup token autorefresh
9
+ const [refresher, setRefresher] = useState(undefined);
10
+ useEffect(() => {
11
+ if (!authConfig)
12
+ return;
13
+ const abortController = new AbortController();
14
+ const currentRefresher = refresher;
15
+ GenericAuthenticationRefresher.build({ ...authConfig }, storage).then((newRefresher) => {
16
+ if (abortController.signal.aborted)
17
+ return;
18
+ currentRefresher?.clearAutorefresh();
19
+ setRefresher(newRefresher);
20
+ });
21
+ return () => {
22
+ abortController.abort();
23
+ currentRefresher?.clearAutorefresh();
24
+ };
25
+ // eslint-disable-next-line react-hooks/exhaustive-deps
26
+ }, [authConfig, storage]); // Only depend on what actually changes
27
+ useEffect(() => {
28
+ if (session?.authenticated) {
29
+ refresher?.setupAutorefresh();
30
+ }
31
+ else {
32
+ refresher?.clearAutorefresh();
33
+ }
34
+ return () => refresher?.clearAutorefresh();
35
+ }, [refresher, session?.authenticated]);
36
+ };
37
+ export { useRefresh };
38
+ //# sourceMappingURL=useRefresh.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useRefresh.js","sourceRoot":"","sources":["../../../../src/nextjs/hooks/useRefresh.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,mBAAmB,EAAE,MAAM,sBAAsB,CAAC;AAC3D,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,QAAQ,EAAE,MAAM,OAAO,CAAC;AACrD,OAAO,EAAE,8BAA8B,EAAE,MAAM,gDAAgD,CAAC;AAEhG,OAAO,EAAE,kBAAkB,EAAE,MAAM,sCAAsC,CAAC;AAE1E,MAAM,UAAU,GAAG,CAAC,OAA2B,EAAE,EAAE;IACjD,MAAM,UAAU,GAAG,kBAAkB,EAAE,CAAC;IACxC,MAAM,OAAO,GAAG,OAAO,CAAC,GAAG,EAAE,CAAC,IAAI,mBAAmB,EAAE,EAAE,EAAE,CAAC,CAAC;IAE7D,0BAA0B;IAC1B,MAAM,CAAC,SAAS,EAAE,YAAY,CAAC,GAAG,QAAQ,CAExC,SAAS,CAAC,CAAC;IAEb,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,CAAC,UAAU;YAAE,OAAO;QACxB,MAAM,eAAe,GAAG,IAAI,eAAe,EAAE,CAAC;QAC9C,MAAM,gBAAgB,GAAG,SAAS,CAAC;QAEnC,8BAA8B,CAAC,KAAK,CAAC,EAAE,GAAG,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC,IAAI,CACnE,CAAC,YAAY,EAAE,EAAE;YACf,IAAI,eAAe,CAAC,MAAM,CAAC,OAAO;gBAAE,OAAO;YAE3C,gBAAgB,EAAE,gBAAgB,EAAE,CAAC;YACrC,YAAY,CAAC,YAAY,CAAC,CAAC;QAC7B,CAAC,CACF,CAAC;QAEF,OAAO,GAAG,EAAE;YACV,eAAe,CAAC,KAAK,EAAE,CAAC;YACxB,gBAAgB,EAAE,gBAAgB,EAAE,CAAC;QACvC,CAAC,CAAC;QACF,uDAAuD;IACzD,CAAC,EAAE,CAAC,UAAU,EAAE,OAAO,CAAC,CAAC,CAAC,CAAC,uCAAuC;IAElE,SAAS,CAAC,GAAG,EAAE;QACb,IAAI,OAAO,EAAE,aAAa,EAAE,CAAC;YAC3B,SAAS,EAAE,gBAAgB,EAAE,CAAC;QAChC,CAAC;aAAM,CAAC;YACN,SAAS,EAAE,gBAAgB,EAAE,CAAC;QAChC,CAAC;QAED,OAAO,GAAG,EAAE,CAAC,SAAS,EAAE,gBAAgB,EAAE,CAAC;IAC7C,CAAC,EAAE,CAAC,SAAS,EAAE,OAAO,EAAE,aAAa,CAAC,CAAC,CAAC;AAC1C,CAAC,CAAC;AAEF,OAAO,EAAE,UAAU,EAAE,CAAC","sourcesContent":["import { LocalStorageAdapter } from \"@/browser/storage.js\";\nimport { useEffect, useMemo, useState } from \"react\";\nimport { GenericAuthenticationRefresher } from \"@/shared/lib/GenericAuthenticationRefresher.js\";\nimport type { SessionData } from \"@/types.js\";\nimport { useCivicAuthConfig } from \"@/shared/hooks/useCivicAuthConfig.js\";\n\nconst useRefresh = (session: SessionData | null) => {\n const authConfig = useCivicAuthConfig();\n const storage = useMemo(() => new LocalStorageAdapter(), []);\n\n // setup token autorefresh\n const [refresher, setRefresher] = useState<\n GenericAuthenticationRefresher | undefined\n >(undefined);\n\n useEffect(() => {\n if (!authConfig) return;\n const abortController = new AbortController();\n const currentRefresher = refresher;\n\n GenericAuthenticationRefresher.build({ ...authConfig }, storage).then(\n (newRefresher) => {\n if (abortController.signal.aborted) return;\n\n currentRefresher?.clearAutorefresh();\n setRefresher(newRefresher);\n },\n );\n\n return () => {\n abortController.abort();\n currentRefresher?.clearAutorefresh();\n };\n // eslint-disable-next-line react-hooks/exhaustive-deps\n }, [authConfig, storage]); // Only depend on what actually changes\n\n useEffect(() => {\n if (session?.authenticated) {\n refresher?.setupAutorefresh();\n } else {\n refresher?.clearAutorefresh();\n }\n\n return () => refresher?.clearAutorefresh();\n }, [refresher, session?.authenticated]);\n};\n\nexport { useRefresh };\n"]}
@@ -0,0 +1,3 @@
1
+ import type { OAuthTokens } from "@/shared/lib/types.js";
2
+ export declare const useTokenCookie: (tokenName: OAuthTokens) => string | null;
3
+ //# sourceMappingURL=useTokenCookie.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useTokenCookie.d.ts","sourceRoot":"","sources":["../../../../src/nextjs/hooks/useTokenCookie.ts"],"names":[],"mappings":"AAKA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,uBAAuB,CAAC;AAUzD,eAAO,MAAM,cAAc,cAAe,WAAW,KAAG,MAAM,GAAG,IAyBhE,CAAC"}
@@ -0,0 +1,37 @@
1
+ "use client";
2
+ import { useEffect, useRef } from "react";
3
+ import { useRouter } from "next/navigation.js";
4
+ import { useQuery } from "@tanstack/react-query";
5
+ import { getWindowCookieValue } from "@/lib/cookies.js";
6
+ const getTokenFromCookie = (tokenName) => {
7
+ return getWindowCookieValue({
8
+ key: tokenName,
9
+ window: globalThis.window,
10
+ parseJson: false,
11
+ });
12
+ };
13
+ export const useTokenCookie = (tokenName) => {
14
+ const hasRunRef = useRef(false);
15
+ const router = useRouter();
16
+ const { data: token } = useQuery({
17
+ queryKey: ["token", tokenName],
18
+ queryFn: () => getTokenFromCookie(tokenName) || null,
19
+ refetchInterval: 2000,
20
+ refetchIntervalInBackground: true,
21
+ enabled: !hasRunRef.current,
22
+ refetchOnWindowFocus: true,
23
+ });
24
+ useEffect(() => {
25
+ if (token) {
26
+ if (!hasRunRef.current) {
27
+ hasRunRef.current = true;
28
+ router.refresh();
29
+ }
30
+ }
31
+ else {
32
+ hasRunRef.current = false;
33
+ }
34
+ }, [token, router]);
35
+ return token ?? null;
36
+ };
37
+ //# sourceMappingURL=useTokenCookie.js.map