@djangocfg/api 2.1.333 → 2.1.334
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth-server.cjs +113 -6
- package/dist/auth-server.cjs.map +1 -1
- package/dist/auth-server.mjs +113 -6
- package/dist/auth-server.mjs.map +1 -1
- package/dist/auth.cjs +113 -6
- package/dist/auth.cjs.map +1 -1
- package/dist/auth.mjs +113 -6
- package/dist/auth.mjs.map +1 -1
- package/dist/clients.cjs +50 -0
- package/dist/clients.cjs.map +1 -1
- package/dist/clients.d.cts +21 -0
- package/dist/clients.d.ts +21 -0
- package/dist/clients.mjs +50 -0
- package/dist/clients.mjs.map +1 -1
- package/dist/index.cjs +113 -6
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +51 -0
- package/dist/index.d.ts +51 -0
- package/dist/index.mjs +113 -6
- package/dist/index.mjs.map +1 -1
- package/package.json +2 -2
- package/src/_api/generated/_cfg_accounts/api.ts +12 -0
- package/src/_api/generated/_cfg_centrifugo/api.ts +12 -0
- package/src/_api/generated/_cfg_totp/api.ts +12 -0
- package/src/_api/generated/helpers/auth.ts +103 -4
package/dist/clients.cjs
CHANGED
|
@@ -122,6 +122,7 @@ var _apiKeyOverride = null;
|
|
|
122
122
|
var _baseUrlOverride = null;
|
|
123
123
|
var _withCredentials = true;
|
|
124
124
|
var _onUnauthorized = null;
|
|
125
|
+
var _refreshHandler = null;
|
|
125
126
|
var _client = null;
|
|
126
127
|
function pushClientConfig() {
|
|
127
128
|
if (!_client) return;
|
|
@@ -200,8 +201,30 @@ var auth = {
|
|
|
200
201
|
pushClientConfig();
|
|
201
202
|
},
|
|
202
203
|
// ── 401 handler ───────────────────────────────────────────────────
|
|
204
|
+
/**
|
|
205
|
+
* Fired when the server returns 401 AND no refresh path recovers it
|
|
206
|
+
* (no refresh token, no refresh handler, refresh failed, or retry
|
|
207
|
+
* still 401). The app should clear local state and redirect to login.
|
|
208
|
+
*
|
|
209
|
+
* NOT fired for 401 that gets transparently recovered by the refresh
|
|
210
|
+
* handler — those are invisible to callers.
|
|
211
|
+
*/
|
|
203
212
|
onUnauthorized(cb) {
|
|
204
213
|
_onUnauthorized = cb;
|
|
214
|
+
},
|
|
215
|
+
/**
|
|
216
|
+
* Register the refresh strategy. The handler receives the current
|
|
217
|
+
* refresh token and must call your refresh endpoint, returning
|
|
218
|
+
* `{ access, refresh? }` on success or `null` on failure.
|
|
219
|
+
*
|
|
220
|
+
* @example
|
|
221
|
+
* auth.setRefreshHandler(async (refresh) => {
|
|
222
|
+
* const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
|
|
223
|
+
* return data ? { access: data.access, refresh: data.refresh } : null;
|
|
224
|
+
* });
|
|
225
|
+
*/
|
|
226
|
+
setRefreshHandler(fn) {
|
|
227
|
+
_refreshHandler = fn;
|
|
205
228
|
}
|
|
206
229
|
};
|
|
207
230
|
|
|
@@ -351,6 +374,15 @@ var API = class {
|
|
|
351
374
|
setApiKey(key) {
|
|
352
375
|
auth.setApiKey(key);
|
|
353
376
|
}
|
|
377
|
+
// ── 401 handling ────────────────────────────────────────────────────────
|
|
378
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
379
|
+
onUnauthorized(cb) {
|
|
380
|
+
auth.onUnauthorized(cb);
|
|
381
|
+
}
|
|
382
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
383
|
+
setRefreshHandler(fn) {
|
|
384
|
+
auth.setRefreshHandler(fn);
|
|
385
|
+
}
|
|
354
386
|
};
|
|
355
387
|
|
|
356
388
|
// src/_api/generated/_cfg_centrifugo/api.ts
|
|
@@ -405,6 +437,15 @@ var API2 = class {
|
|
|
405
437
|
setApiKey(key) {
|
|
406
438
|
auth.setApiKey(key);
|
|
407
439
|
}
|
|
440
|
+
// ── 401 handling ────────────────────────────────────────────────────────
|
|
441
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
442
|
+
onUnauthorized(cb) {
|
|
443
|
+
auth.onUnauthorized(cb);
|
|
444
|
+
}
|
|
445
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
446
|
+
setRefreshHandler(fn) {
|
|
447
|
+
auth.setRefreshHandler(fn);
|
|
448
|
+
}
|
|
408
449
|
};
|
|
409
450
|
|
|
410
451
|
// src/_api/generated/_cfg_totp/api.ts
|
|
@@ -459,6 +500,15 @@ var API3 = class {
|
|
|
459
500
|
setApiKey(key) {
|
|
460
501
|
auth.setApiKey(key);
|
|
461
502
|
}
|
|
503
|
+
// ── 401 handling ────────────────────────────────────────────────────────
|
|
504
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
505
|
+
onUnauthorized(cb) {
|
|
506
|
+
auth.onUnauthorized(cb);
|
|
507
|
+
}
|
|
508
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
509
|
+
setRefreshHandler(fn) {
|
|
510
|
+
auth.setRefreshHandler(fn);
|
|
511
|
+
}
|
|
462
512
|
};
|
|
463
513
|
|
|
464
514
|
// src/_api/generated/index.ts
|
package/dist/clients.cjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/clients.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["/**\n * @djangocfg/api/clients — pre-configured per-group API singletons.\n *\n * Singletons (`cfgAccountsApi`, `cfgTotpApi`, `cfgCentrifugoApi`) live in the\n * generated barrel. This file just re-exports them with the legacy-friendly\n * `apiAccounts` / `apiTotp` / `apiCentrifugo` aliases.\n *\n * Usage:\n * import { apiAccounts } from '@djangocfg/api/clients';\n * await apiAccounts.accounts.cfgAccountsLogin({ body });\n */\n\nexport {\n CfgAccountsApi as apiAccounts,\n CfgTotpApi as apiTotp,\n CfgCentrifugoApi as apiCentrifugo,\n CfgAccountsAPI as AccountsAPI,\n CfgTotpAPI as TotpAPI,\n CfgCentrifugoAPI as CentrifugoAPI,\n} from './_api/generated';\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n};\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use((response) => {\n if (response.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA,uBAAAA;AAAA,EAAA,eAAAA;AAAA,EAAA;AAAA;AAAA;AAAA;AAAA;;;ACMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAgB7D,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AACF;;;AChMA,qBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,8BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9CO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API","API"]}
|
|
1
|
+
{"version":3,"sources":["../src/clients.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["/**\n * @djangocfg/api/clients — pre-configured per-group API singletons.\n *\n * Singletons (`cfgAccountsApi`, `cfgTotpApi`, `cfgCentrifugoApi`) live in the\n * generated barrel. This file just re-exports them with the legacy-friendly\n * `apiAccounts` / `apiTotp` / `apiCentrifugo` aliases.\n *\n * Usage:\n * import { apiAccounts } from '@djangocfg/api/clients';\n * await apiAccounts.accounts.cfgAccountsLogin({ body });\n */\n\nexport {\n CfgAccountsApi as apiAccounts,\n CfgTotpApi as apiTotp,\n CfgCentrifugoApi as apiCentrifugo,\n CfgAccountsAPI as AccountsAPI,\n CfgTotpAPI as TotpAPI,\n CfgCentrifugoAPI as CentrifugoAPI,\n} from './_api/generated';\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA,uBAAAA;AAAA,EAAA,eAAAA;AAAA,EAAA;AAAA;AAAA;AAAA;AAAA;;;ACMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAsB7C,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;;;ACtOA,qBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,8BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1DO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API","API"]}
|
package/dist/clients.d.cts
CHANGED
|
@@ -84,6 +84,13 @@ declare class API$2 {
|
|
|
84
84
|
setLocale(locale: string | null): void;
|
|
85
85
|
getApiKey(): string | null;
|
|
86
86
|
setApiKey(key: string | null): void;
|
|
87
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
88
|
+
onUnauthorized(cb: ((response: Response) => void) | null): void;
|
|
89
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
90
|
+
setRefreshHandler(fn: ((refreshToken: string) => Promise<{
|
|
91
|
+
access: string;
|
|
92
|
+
refresh?: string;
|
|
93
|
+
} | null>) | null): void;
|
|
87
94
|
}
|
|
88
95
|
|
|
89
96
|
interface APIOptions$1 {
|
|
@@ -121,6 +128,13 @@ declare class API$1 {
|
|
|
121
128
|
setLocale(locale: string | null): void;
|
|
122
129
|
getApiKey(): string | null;
|
|
123
130
|
setApiKey(key: string | null): void;
|
|
131
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
132
|
+
onUnauthorized(cb: ((response: Response) => void) | null): void;
|
|
133
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
134
|
+
setRefreshHandler(fn: ((refreshToken: string) => Promise<{
|
|
135
|
+
access: string;
|
|
136
|
+
refresh?: string;
|
|
137
|
+
} | null>) | null): void;
|
|
124
138
|
}
|
|
125
139
|
|
|
126
140
|
interface APIOptions {
|
|
@@ -158,6 +172,13 @@ declare class API {
|
|
|
158
172
|
setLocale(locale: string | null): void;
|
|
159
173
|
getApiKey(): string | null;
|
|
160
174
|
setApiKey(key: string | null): void;
|
|
175
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
176
|
+
onUnauthorized(cb: ((response: Response) => void) | null): void;
|
|
177
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
178
|
+
setRefreshHandler(fn: ((refreshToken: string) => Promise<{
|
|
179
|
+
access: string;
|
|
180
|
+
refresh?: string;
|
|
181
|
+
} | null>) | null): void;
|
|
161
182
|
}
|
|
162
183
|
|
|
163
184
|
declare const CfgAccountsApi: API$2;
|
package/dist/clients.d.ts
CHANGED
|
@@ -84,6 +84,13 @@ declare class API$2 {
|
|
|
84
84
|
setLocale(locale: string | null): void;
|
|
85
85
|
getApiKey(): string | null;
|
|
86
86
|
setApiKey(key: string | null): void;
|
|
87
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
88
|
+
onUnauthorized(cb: ((response: Response) => void) | null): void;
|
|
89
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
90
|
+
setRefreshHandler(fn: ((refreshToken: string) => Promise<{
|
|
91
|
+
access: string;
|
|
92
|
+
refresh?: string;
|
|
93
|
+
} | null>) | null): void;
|
|
87
94
|
}
|
|
88
95
|
|
|
89
96
|
interface APIOptions$1 {
|
|
@@ -121,6 +128,13 @@ declare class API$1 {
|
|
|
121
128
|
setLocale(locale: string | null): void;
|
|
122
129
|
getApiKey(): string | null;
|
|
123
130
|
setApiKey(key: string | null): void;
|
|
131
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
132
|
+
onUnauthorized(cb: ((response: Response) => void) | null): void;
|
|
133
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
134
|
+
setRefreshHandler(fn: ((refreshToken: string) => Promise<{
|
|
135
|
+
access: string;
|
|
136
|
+
refresh?: string;
|
|
137
|
+
} | null>) | null): void;
|
|
124
138
|
}
|
|
125
139
|
|
|
126
140
|
interface APIOptions {
|
|
@@ -158,6 +172,13 @@ declare class API {
|
|
|
158
172
|
setLocale(locale: string | null): void;
|
|
159
173
|
getApiKey(): string | null;
|
|
160
174
|
setApiKey(key: string | null): void;
|
|
175
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
176
|
+
onUnauthorized(cb: ((response: Response) => void) | null): void;
|
|
177
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
178
|
+
setRefreshHandler(fn: ((refreshToken: string) => Promise<{
|
|
179
|
+
access: string;
|
|
180
|
+
refresh?: string;
|
|
181
|
+
} | null>) | null): void;
|
|
161
182
|
}
|
|
162
183
|
|
|
163
184
|
declare const CfgAccountsApi: API$2;
|
package/dist/clients.mjs
CHANGED
|
@@ -94,6 +94,7 @@ var _apiKeyOverride = null;
|
|
|
94
94
|
var _baseUrlOverride = null;
|
|
95
95
|
var _withCredentials = true;
|
|
96
96
|
var _onUnauthorized = null;
|
|
97
|
+
var _refreshHandler = null;
|
|
97
98
|
var _client = null;
|
|
98
99
|
function pushClientConfig() {
|
|
99
100
|
if (!_client) return;
|
|
@@ -172,8 +173,30 @@ var auth = {
|
|
|
172
173
|
pushClientConfig();
|
|
173
174
|
},
|
|
174
175
|
// ── 401 handler ───────────────────────────────────────────────────
|
|
176
|
+
/**
|
|
177
|
+
* Fired when the server returns 401 AND no refresh path recovers it
|
|
178
|
+
* (no refresh token, no refresh handler, refresh failed, or retry
|
|
179
|
+
* still 401). The app should clear local state and redirect to login.
|
|
180
|
+
*
|
|
181
|
+
* NOT fired for 401 that gets transparently recovered by the refresh
|
|
182
|
+
* handler — those are invisible to callers.
|
|
183
|
+
*/
|
|
175
184
|
onUnauthorized(cb) {
|
|
176
185
|
_onUnauthorized = cb;
|
|
186
|
+
},
|
|
187
|
+
/**
|
|
188
|
+
* Register the refresh strategy. The handler receives the current
|
|
189
|
+
* refresh token and must call your refresh endpoint, returning
|
|
190
|
+
* `{ access, refresh? }` on success or `null` on failure.
|
|
191
|
+
*
|
|
192
|
+
* @example
|
|
193
|
+
* auth.setRefreshHandler(async (refresh) => {
|
|
194
|
+
* const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
|
|
195
|
+
* return data ? { access: data.access, refresh: data.refresh } : null;
|
|
196
|
+
* });
|
|
197
|
+
*/
|
|
198
|
+
setRefreshHandler(fn) {
|
|
199
|
+
_refreshHandler = fn;
|
|
177
200
|
}
|
|
178
201
|
};
|
|
179
202
|
|
|
@@ -323,6 +346,15 @@ var API = class {
|
|
|
323
346
|
setApiKey(key) {
|
|
324
347
|
auth.setApiKey(key);
|
|
325
348
|
}
|
|
349
|
+
// ── 401 handling ────────────────────────────────────────────────────────
|
|
350
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
351
|
+
onUnauthorized(cb) {
|
|
352
|
+
auth.onUnauthorized(cb);
|
|
353
|
+
}
|
|
354
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
355
|
+
setRefreshHandler(fn) {
|
|
356
|
+
auth.setRefreshHandler(fn);
|
|
357
|
+
}
|
|
326
358
|
};
|
|
327
359
|
|
|
328
360
|
// src/_api/generated/_cfg_centrifugo/api.ts
|
|
@@ -377,6 +409,15 @@ var API2 = class {
|
|
|
377
409
|
setApiKey(key) {
|
|
378
410
|
auth.setApiKey(key);
|
|
379
411
|
}
|
|
412
|
+
// ── 401 handling ────────────────────────────────────────────────────────
|
|
413
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
414
|
+
onUnauthorized(cb) {
|
|
415
|
+
auth.onUnauthorized(cb);
|
|
416
|
+
}
|
|
417
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
418
|
+
setRefreshHandler(fn) {
|
|
419
|
+
auth.setRefreshHandler(fn);
|
|
420
|
+
}
|
|
380
421
|
};
|
|
381
422
|
|
|
382
423
|
// src/_api/generated/_cfg_totp/api.ts
|
|
@@ -431,6 +472,15 @@ var API3 = class {
|
|
|
431
472
|
setApiKey(key) {
|
|
432
473
|
auth.setApiKey(key);
|
|
433
474
|
}
|
|
475
|
+
// ── 401 handling ────────────────────────────────────────────────────────
|
|
476
|
+
/** Fired only on terminal 401 (after refresh+retry path is exhausted). */
|
|
477
|
+
onUnauthorized(cb) {
|
|
478
|
+
auth.onUnauthorized(cb);
|
|
479
|
+
}
|
|
480
|
+
/** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
|
|
481
|
+
setRefreshHandler(fn) {
|
|
482
|
+
auth.setRefreshHandler(fn);
|
|
483
|
+
}
|
|
434
484
|
};
|
|
435
485
|
|
|
436
486
|
// src/_api/generated/index.ts
|
package/dist/clients.mjs.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n};\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use((response) => {\n if (response.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;AAMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAgB7D,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AACF;;;AChMA,SAA+B,qBAAqB;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,WAAW,cAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMA,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9CO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API"]}
|
|
1
|
+
{"version":3,"sources":["../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;AAMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAsB7C,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;;;ACtOA,SAA+B,qBAAqB;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,WAAW,cAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMA,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1DO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API"]}
|