@digipair/skill-keycloak 0.95.3 → 0.95.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.cjs.js +2 -2
- package/index.esm.js +7 -7
- package/package.json +1 -1
package/index.cjs.js
CHANGED
@@ -16768,9 +16768,9 @@ let KeycloakService = class KeycloakService {
|
|
16768
16768
|
decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
|
16769
16769
|
};
|
16770
16770
|
} else {
|
16771
|
-
context.keycloak =
|
16771
|
+
context.keycloak = {
|
16772
16772
|
isLogged: false
|
16773
|
-
}
|
16773
|
+
};
|
16774
16774
|
}
|
16775
16775
|
if (secured && !context.keycloak.decodedToken) {
|
16776
16776
|
throw new Error('Unauthorized');
|
package/index.esm.js
CHANGED
@@ -23907,14 +23907,14 @@ function indent(str, spaces) {
|
|
23907
23907
|
var match = parseIdentifier(input, i1, namePart) || namePart && parseAdditionalSymbol(input, i1) || maybeSpace && parseSpaces(input, i1);
|
23908
23908
|
// match is required
|
23909
23909
|
if (!match) {
|
23910
|
-
return
|
23910
|
+
return nextMatch = nextMatch1, tokens = tokens1, i = i1, {
|
23911
23911
|
v: nextMatch1
|
23912
23912
|
};
|
23913
23913
|
}
|
23914
23914
|
var token = match.token, offset = match.offset;
|
23915
23915
|
i1 += offset;
|
23916
23916
|
if (token === " ") {
|
23917
|
-
return
|
23917
|
+
return nextMatch = nextMatch1, tokens = tokens1, i = i1, "continue";
|
23918
23918
|
}
|
23919
23919
|
tokens1 = _to_consumable_array$3(tokens1).concat([
|
23920
23920
|
token
|
@@ -23933,7 +23933,7 @@ function indent(str, spaces) {
|
|
23933
23933
|
if (contextKeys.some(function(el) {
|
23934
23934
|
return el.startsWith(name);
|
23935
23935
|
})) {
|
23936
|
-
return
|
23936
|
+
return nextMatch = nextMatch1, tokens = tokens1, i = i1, "continue";
|
23937
23937
|
}
|
23938
23938
|
if (dateTimeIdentifiers.some(function(el) {
|
23939
23939
|
return el === name;
|
@@ -23952,9 +23952,9 @@ function indent(str, spaces) {
|
|
23952
23952
|
if (dateTimeIdentifiers.some(function(el) {
|
23953
23953
|
return el.startsWith(name);
|
23954
23954
|
})) {
|
23955
|
-
return
|
23955
|
+
return nextMatch = nextMatch1, tokens = tokens1, i = i1, "continue";
|
23956
23956
|
}
|
23957
|
-
return
|
23957
|
+
return nextMatch = nextMatch1, tokens = tokens1, i = i1, {
|
23958
23958
|
v: nextMatch1
|
23959
23959
|
};
|
23960
23960
|
};
|
@@ -44800,9 +44800,9 @@ let KeycloakService = class KeycloakService {
|
|
44800
44800
|
decodedToken: await this.decodedToken(url, realm, context.request.headers.authorization.replace(/^Bearer /, ''), (_context_protected = context.protected) == null ? void 0 : _context_protected.signal)
|
44801
44801
|
};
|
44802
44802
|
} else {
|
44803
|
-
context.keycloak =
|
44803
|
+
context.keycloak = {
|
44804
44804
|
isLogged: false
|
44805
|
-
}
|
44805
|
+
};
|
44806
44806
|
}
|
44807
44807
|
if (secured && !context.keycloak.decodedToken) {
|
44808
44808
|
throw new Error('Unauthorized');
|