@djangocfg/api 2.1.333 → 2.1.334

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/clients.cjs CHANGED
@@ -122,6 +122,7 @@ var _apiKeyOverride = null;
122
122
  var _baseUrlOverride = null;
123
123
  var _withCredentials = true;
124
124
  var _onUnauthorized = null;
125
+ var _refreshHandler = null;
125
126
  var _client = null;
126
127
  function pushClientConfig() {
127
128
  if (!_client) return;
@@ -200,8 +201,30 @@ var auth = {
200
201
  pushClientConfig();
201
202
  },
202
203
  // ── 401 handler ───────────────────────────────────────────────────
204
+ /**
205
+ * Fired when the server returns 401 AND no refresh path recovers it
206
+ * (no refresh token, no refresh handler, refresh failed, or retry
207
+ * still 401). The app should clear local state and redirect to login.
208
+ *
209
+ * NOT fired for 401 that gets transparently recovered by the refresh
210
+ * handler — those are invisible to callers.
211
+ */
203
212
  onUnauthorized(cb) {
204
213
  _onUnauthorized = cb;
214
+ },
215
+ /**
216
+ * Register the refresh strategy. The handler receives the current
217
+ * refresh token and must call your refresh endpoint, returning
218
+ * `{ access, refresh? }` on success or `null` on failure.
219
+ *
220
+ * @example
221
+ * auth.setRefreshHandler(async (refresh) => {
222
+ * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
223
+ * return data ? { access: data.access, refresh: data.refresh } : null;
224
+ * });
225
+ */
226
+ setRefreshHandler(fn) {
227
+ _refreshHandler = fn;
205
228
  }
206
229
  };
207
230
 
@@ -351,6 +374,15 @@ var API = class {
351
374
  setApiKey(key) {
352
375
  auth.setApiKey(key);
353
376
  }
377
+ // ── 401 handling ────────────────────────────────────────────────────────
378
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
379
+ onUnauthorized(cb) {
380
+ auth.onUnauthorized(cb);
381
+ }
382
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
383
+ setRefreshHandler(fn) {
384
+ auth.setRefreshHandler(fn);
385
+ }
354
386
  };
355
387
 
356
388
  // src/_api/generated/_cfg_centrifugo/api.ts
@@ -405,6 +437,15 @@ var API2 = class {
405
437
  setApiKey(key) {
406
438
  auth.setApiKey(key);
407
439
  }
440
+ // ── 401 handling ────────────────────────────────────────────────────────
441
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
442
+ onUnauthorized(cb) {
443
+ auth.onUnauthorized(cb);
444
+ }
445
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
446
+ setRefreshHandler(fn) {
447
+ auth.setRefreshHandler(fn);
448
+ }
408
449
  };
409
450
 
410
451
  // src/_api/generated/_cfg_totp/api.ts
@@ -459,6 +500,15 @@ var API3 = class {
459
500
  setApiKey(key) {
460
501
  auth.setApiKey(key);
461
502
  }
503
+ // ── 401 handling ────────────────────────────────────────────────────────
504
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
505
+ onUnauthorized(cb) {
506
+ auth.onUnauthorized(cb);
507
+ }
508
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
509
+ setRefreshHandler(fn) {
510
+ auth.setRefreshHandler(fn);
511
+ }
462
512
  };
463
513
 
464
514
  // src/_api/generated/index.ts
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/clients.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["/**\n * @djangocfg/api/clients — pre-configured per-group API singletons.\n *\n * Singletons (`cfgAccountsApi`, `cfgTotpApi`, `cfgCentrifugoApi`) live in the\n * generated barrel. This file just re-exports them with the legacy-friendly\n * `apiAccounts` / `apiTotp` / `apiCentrifugo` aliases.\n *\n * Usage:\n * import { apiAccounts } from '@djangocfg/api/clients';\n * await apiAccounts.accounts.cfgAccountsLogin({ body });\n */\n\nexport {\n CfgAccountsApi as apiAccounts,\n CfgTotpApi as apiTotp,\n CfgCentrifugoApi as apiCentrifugo,\n CfgAccountsAPI as AccountsAPI,\n CfgTotpAPI as TotpAPI,\n CfgCentrifugoAPI as CentrifugoAPI,\n} from './_api/generated';\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n};\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use((response) => {\n if (response.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA,uBAAAA;AAAA,EAAA,eAAAA;AAAA,EAAA;AAAA;AAAA;AAAA;AAAA;;;ACMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAgB7D,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AACF;;;AChMA,qBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,8BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9CO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API","API"]}
1
+ {"version":3,"sources":["../src/clients.ts","../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["/**\n * @djangocfg/api/clients — pre-configured per-group API singletons.\n *\n * Singletons (`cfgAccountsApi`, `cfgTotpApi`, `cfgCentrifugoApi`) live in the\n * generated barrel. This file just re-exports them with the legacy-friendly\n * `apiAccounts` / `apiTotp` / `apiCentrifugo` aliases.\n *\n * Usage:\n * import { apiAccounts } from '@djangocfg/api/clients';\n * await apiAccounts.accounts.cfgAccountsLogin({ body });\n */\n\nexport {\n CfgAccountsApi as apiAccounts,\n CfgTotpApi as apiTotp,\n CfgCentrifugoApi as apiCentrifugo,\n CfgAccountsAPI as AccountsAPI,\n CfgTotpAPI as TotpAPI,\n CfgCentrifugoAPI as CentrifugoAPI,\n} from './_api/generated';\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA,uBAAAA;AAAA,EAAA,eAAAA;AAAA,EAAA;AAAA;AAAA;AAAA;AAAA;;;ACMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAsB7C,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;;;ACtOA,qBAAoD;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,eAAW,8BAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1DO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API","API"]}
@@ -84,6 +84,13 @@ declare class API$2 {
84
84
  setLocale(locale: string | null): void;
85
85
  getApiKey(): string | null;
86
86
  setApiKey(key: string | null): void;
87
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
88
+ onUnauthorized(cb: ((response: Response) => void) | null): void;
89
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
90
+ setRefreshHandler(fn: ((refreshToken: string) => Promise<{
91
+ access: string;
92
+ refresh?: string;
93
+ } | null>) | null): void;
87
94
  }
88
95
 
89
96
  interface APIOptions$1 {
@@ -121,6 +128,13 @@ declare class API$1 {
121
128
  setLocale(locale: string | null): void;
122
129
  getApiKey(): string | null;
123
130
  setApiKey(key: string | null): void;
131
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
132
+ onUnauthorized(cb: ((response: Response) => void) | null): void;
133
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
134
+ setRefreshHandler(fn: ((refreshToken: string) => Promise<{
135
+ access: string;
136
+ refresh?: string;
137
+ } | null>) | null): void;
124
138
  }
125
139
 
126
140
  interface APIOptions {
@@ -158,6 +172,13 @@ declare class API {
158
172
  setLocale(locale: string | null): void;
159
173
  getApiKey(): string | null;
160
174
  setApiKey(key: string | null): void;
175
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
176
+ onUnauthorized(cb: ((response: Response) => void) | null): void;
177
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
178
+ setRefreshHandler(fn: ((refreshToken: string) => Promise<{
179
+ access: string;
180
+ refresh?: string;
181
+ } | null>) | null): void;
161
182
  }
162
183
 
163
184
  declare const CfgAccountsApi: API$2;
package/dist/clients.d.ts CHANGED
@@ -84,6 +84,13 @@ declare class API$2 {
84
84
  setLocale(locale: string | null): void;
85
85
  getApiKey(): string | null;
86
86
  setApiKey(key: string | null): void;
87
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
88
+ onUnauthorized(cb: ((response: Response) => void) | null): void;
89
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
90
+ setRefreshHandler(fn: ((refreshToken: string) => Promise<{
91
+ access: string;
92
+ refresh?: string;
93
+ } | null>) | null): void;
87
94
  }
88
95
 
89
96
  interface APIOptions$1 {
@@ -121,6 +128,13 @@ declare class API$1 {
121
128
  setLocale(locale: string | null): void;
122
129
  getApiKey(): string | null;
123
130
  setApiKey(key: string | null): void;
131
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
132
+ onUnauthorized(cb: ((response: Response) => void) | null): void;
133
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
134
+ setRefreshHandler(fn: ((refreshToken: string) => Promise<{
135
+ access: string;
136
+ refresh?: string;
137
+ } | null>) | null): void;
124
138
  }
125
139
 
126
140
  interface APIOptions {
@@ -158,6 +172,13 @@ declare class API {
158
172
  setLocale(locale: string | null): void;
159
173
  getApiKey(): string | null;
160
174
  setApiKey(key: string | null): void;
175
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
176
+ onUnauthorized(cb: ((response: Response) => void) | null): void;
177
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
178
+ setRefreshHandler(fn: ((refreshToken: string) => Promise<{
179
+ access: string;
180
+ refresh?: string;
181
+ } | null>) | null): void;
161
182
  }
162
183
 
163
184
  declare const CfgAccountsApi: API$2;
package/dist/clients.mjs CHANGED
@@ -94,6 +94,7 @@ var _apiKeyOverride = null;
94
94
  var _baseUrlOverride = null;
95
95
  var _withCredentials = true;
96
96
  var _onUnauthorized = null;
97
+ var _refreshHandler = null;
97
98
  var _client = null;
98
99
  function pushClientConfig() {
99
100
  if (!_client) return;
@@ -172,8 +173,30 @@ var auth = {
172
173
  pushClientConfig();
173
174
  },
174
175
  // ── 401 handler ───────────────────────────────────────────────────
176
+ /**
177
+ * Fired when the server returns 401 AND no refresh path recovers it
178
+ * (no refresh token, no refresh handler, refresh failed, or retry
179
+ * still 401). The app should clear local state and redirect to login.
180
+ *
181
+ * NOT fired for 401 that gets transparently recovered by the refresh
182
+ * handler — those are invisible to callers.
183
+ */
175
184
  onUnauthorized(cb) {
176
185
  _onUnauthorized = cb;
186
+ },
187
+ /**
188
+ * Register the refresh strategy. The handler receives the current
189
+ * refresh token and must call your refresh endpoint, returning
190
+ * `{ access, refresh? }` on success or `null` on failure.
191
+ *
192
+ * @example
193
+ * auth.setRefreshHandler(async (refresh) => {
194
+ * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });
195
+ * return data ? { access: data.access, refresh: data.refresh } : null;
196
+ * });
197
+ */
198
+ setRefreshHandler(fn) {
199
+ _refreshHandler = fn;
177
200
  }
178
201
  };
179
202
 
@@ -323,6 +346,15 @@ var API = class {
323
346
  setApiKey(key) {
324
347
  auth.setApiKey(key);
325
348
  }
349
+ // ── 401 handling ────────────────────────────────────────────────────────
350
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
351
+ onUnauthorized(cb) {
352
+ auth.onUnauthorized(cb);
353
+ }
354
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
355
+ setRefreshHandler(fn) {
356
+ auth.setRefreshHandler(fn);
357
+ }
326
358
  };
327
359
 
328
360
  // src/_api/generated/_cfg_centrifugo/api.ts
@@ -377,6 +409,15 @@ var API2 = class {
377
409
  setApiKey(key) {
378
410
  auth.setApiKey(key);
379
411
  }
412
+ // ── 401 handling ────────────────────────────────────────────────────────
413
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
414
+ onUnauthorized(cb) {
415
+ auth.onUnauthorized(cb);
416
+ }
417
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
418
+ setRefreshHandler(fn) {
419
+ auth.setRefreshHandler(fn);
420
+ }
380
421
  };
381
422
 
382
423
  // src/_api/generated/_cfg_totp/api.ts
@@ -431,6 +472,15 @@ var API3 = class {
431
472
  setApiKey(key) {
432
473
  auth.setApiKey(key);
433
474
  }
475
+ // ── 401 handling ────────────────────────────────────────────────────────
476
+ /** Fired only on terminal 401 (after refresh+retry path is exhausted). */
477
+ onUnauthorized(cb) {
478
+ auth.onUnauthorized(cb);
479
+ }
480
+ /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */
481
+ setRefreshHandler(fn) {
482
+ auth.setRefreshHandler(fn);
483
+ }
434
484
  };
435
485
 
436
486
  // src/_api/generated/index.ts
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n};\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use((response) => {\n if (response.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;AAMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAgB7D,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AACF;;;AChMA,SAA+B,qBAAqB;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,WAAW,cAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMA,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9BO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAC7D;;;AC9CO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API"]}
1
+ {"version":3,"sources":["../src/_api/generated/helpers/auth.ts","../src/_api/generated/helpers/logger.ts","../src/_api/generated/_cfg_accounts/api.ts","../src/_api/generated/_cfg_centrifugo/api.ts","../src/_api/generated/_cfg_totp/api.ts","../src/_api/generated/index.ts"],"sourcesContent":["// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Global auth store. Wired into the shared `client` from `client.gen.ts`\n// via `installAuthOnClient(client)` — called synchronously by the\n// post-processed bottom of client.gen.ts. No circular import here.\n// DO NOT EDIT — re-run `make gen`.\n\nconst ACCESS_KEY = 'cfg.access_token';\nconst REFRESH_KEY = 'cfg.refresh_token';\nconst API_KEY_KEY = 'cfg.api_key';\n\nconst isBrowser = typeof window !== 'undefined';\n\nexport type StorageMode = 'localStorage' | 'cookie';\n\n// ── Storage backends (browser-only; server-side reads return null) ─────────\n\ninterface KVStore {\n get(key: string): string | null;\n set(key: string, value: string | null): void;\n}\n\nconst localStorageBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try { return window.localStorage.getItem(key); } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n if (value === null) window.localStorage.removeItem(key);\n else window.localStorage.setItem(key, value);\n } catch {}\n },\n};\n\n/** 30 days, matches typical refresh-token lifetime. */\nconst COOKIE_MAX_AGE = 60 * 60 * 24 * 30;\n\nconst cookieBackend: KVStore = {\n get(key) {\n if (!isBrowser) return null;\n try {\n const re = new RegExp(`(?:^|;\\\\s*)${encodeURIComponent(key)}=([^;]*)`);\n const m = document.cookie.match(re);\n return m ? decodeURIComponent(m[1]) : null;\n } catch { return null; }\n },\n set(key, value) {\n if (!isBrowser) return;\n try {\n const k = encodeURIComponent(key);\n const secure = window.location.protocol === 'https:' ? '; Secure' : '';\n if (value === null) {\n document.cookie = `${k}=; Path=/; Max-Age=0; SameSite=Lax${secure}`;\n } else {\n const v = encodeURIComponent(value);\n document.cookie = `${k}=${v}; Path=/; Max-Age=${COOKIE_MAX_AGE}; SameSite=Lax${secure}`;\n }\n } catch {}\n },\n};\n\nlet _storage: KVStore = localStorageBackend;\nlet _storageMode: StorageMode = 'localStorage';\n\n/** Detect locale from `NEXT_LOCALE` cookie or `navigator.language`. */\nfunction detectLocale(): string | null {\n try {\n if (typeof document !== 'undefined') {\n const m = document.cookie.match(/(?:^|;\\s*)NEXT_LOCALE=([^;]*)/);\n if (m) return decodeURIComponent(m[1]);\n }\n if (typeof navigator !== 'undefined' && navigator.language) {\n return navigator.language;\n }\n } catch {}\n return null;\n}\n\n/** Default baseUrl from `NEXT_PUBLIC_API_URL` (empty for static builds). */\nfunction defaultBaseUrl(): string {\n try {\n if (typeof process !== 'undefined' && process.env) {\n if (process.env.NEXT_PUBLIC_STATIC_BUILD === 'true') return '';\n return process.env.NEXT_PUBLIC_API_URL || '';\n }\n } catch {}\n return '';\n}\n\n/** Default API key fallback from `NEXT_PUBLIC_API_KEY`. */\nfunction defaultApiKey(): string | null {\n try {\n if (typeof process !== 'undefined' && process.env?.NEXT_PUBLIC_API_KEY) {\n return process.env.NEXT_PUBLIC_API_KEY;\n }\n } catch {}\n return null;\n}\n\n// ── In-memory overrides (win over storage / env) ───────────────────────────\nlet _localeOverride: string | null = null;\nlet _apiKeyOverride: string | null = null;\nlet _baseUrlOverride: string | null = null;\nlet _withCredentials = true;\nlet _onUnauthorized: ((response: Response) => void) | null = null;\n\n/**\n * User-supplied refresh handler. Receives the current refresh token,\n * must return a fresh access (and optional refresh) pair or null on failure.\n * Set once at app bootstrap via `auth.setRefreshHandler(...)`.\n */\ntype RefreshResult = { access: string; refresh?: string } | null;\ntype RefreshHandler = (refreshToken: string) => Promise<RefreshResult>;\nlet _refreshHandler: RefreshHandler | null = null;\n\n/** Single-flight: every concurrent 401 awaits the same refresh. */\nlet _refreshInflight: Promise<string | null> | null = null;\n\n/** Marker header — set on retried requests so we never loop on 401. */\nconst RETRY_MARKER = 'X-Auth-Retry';\n\n/**\n * Captured reference to the shared Hey API client. Set exactly once by\n * `installAuthOnClient(client)` (called from client.gen.ts). All `auth.set*`\n * methods that mutate transport config (baseUrl / credentials) push through\n * this reference. Until installed, those mutations are silently buffered as\n * in-memory state — the next request after install will pick them up.\n */\ntype HeyClient = {\n setConfig(opts: Record<string, unknown>): void;\n interceptors: {\n request: { use(fn: (req: Request) => Request | Promise<Request>): void };\n response: { use(fn: (res: Response, req: Request) => Response | Promise<Response>): void };\n };\n};\nlet _client: HeyClient | null = null;\n\nfunction pushClientConfig(): void {\n if (!_client) return;\n _client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n}\n\n/**\n * Global auth/config store. All getters read live state every call —\n * the interceptor below uses these to attach headers per-request.\n *\n * Default storage backend is `localStorage`. Switch to cookies (e.g.\n * for Next.js SSR cookie access) via `auth.setStorageMode('cookie')`\n * early in the app bootstrap.\n *\n * @example\n * import { auth } from '@your/api';\n * auth.setToken(jwt);\n * auth.clearTokens();\n * auth.setStorageMode('cookie');\n */\nexport const auth = {\n // ── Storage mode ──────────────────────────────────────────────────\n getStorageMode(): StorageMode { return _storageMode; },\n setStorageMode(mode: StorageMode): void {\n _storageMode = mode;\n _storage = mode === 'cookie' ? cookieBackend : localStorageBackend;\n },\n\n // ── Bearer token ──────────────────────────────────────────────────\n getToken(): string | null { return _storage.get(ACCESS_KEY); },\n setToken(token: string | null): void { _storage.set(ACCESS_KEY, token); },\n getRefreshToken(): string | null { return _storage.get(REFRESH_KEY); },\n setRefreshToken(token: string | null): void { _storage.set(REFRESH_KEY, token); },\n clearTokens(): void { _storage.set(ACCESS_KEY, null); _storage.set(REFRESH_KEY, null); },\n isAuthenticated(): boolean { return _storage.get(ACCESS_KEY) !== null; },\n\n // ── API key ───────────────────────────────────────────────────────\n getApiKey(): string | null {\n return _apiKeyOverride ?? _storage.get(API_KEY_KEY) ?? defaultApiKey();\n },\n setApiKey(key: string | null): void { _apiKeyOverride = key; },\n setApiKeyPersist(key: string | null): void {\n _apiKeyOverride = key;\n _storage.set(API_KEY_KEY, key);\n },\n clearApiKey(): void { _apiKeyOverride = null; _storage.set(API_KEY_KEY, null); },\n\n // ── Locale ────────────────────────────────────────────────────────\n getLocale(): string | null { return _localeOverride ?? detectLocale(); },\n setLocale(locale: string | null): void { _localeOverride = locale; },\n\n // ── Base URL ──────────────────────────────────────────────────────\n getBaseUrl(): string {\n const url = (_baseUrlOverride ?? defaultBaseUrl());\n return url.replace(/\\/$/, '');\n },\n setBaseUrl(url: string | null): void {\n _baseUrlOverride = url ? url.replace(/\\/$/, '') : null;\n pushClientConfig();\n },\n\n // ── Credentials toggle ────────────────────────────────────────────\n getWithCredentials(): boolean { return _withCredentials; },\n setWithCredentials(value: boolean): void {\n _withCredentials = value;\n pushClientConfig();\n },\n\n // ── 401 handler ───────────────────────────────────────────────────\n /**\n * Fired when the server returns 401 AND no refresh path recovers it\n * (no refresh token, no refresh handler, refresh failed, or retry\n * still 401). The app should clear local state and redirect to login.\n *\n * NOT fired for 401 that gets transparently recovered by the refresh\n * handler — those are invisible to callers.\n */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n _onUnauthorized = cb;\n },\n\n /**\n * Register the refresh strategy. The handler receives the current\n * refresh token and must call your refresh endpoint, returning\n * `{ access, refresh? }` on success or `null` on failure.\n *\n * @example\n * auth.setRefreshHandler(async (refresh) => {\n * const { data } = await Auth.tokenRefreshCreate({ body: { refresh } });\n * return data ? { access: data.access, refresh: data.refresh } : null;\n * });\n */\n setRefreshHandler(fn: RefreshHandler | null): void {\n _refreshHandler = fn;\n },\n};\n\n/**\n * Run the user-supplied refresh handler under single-flight, persist\n * the new tokens, and return the fresh access token (or null on any\n * failure path). All concurrent 401s share the same in-flight promise.\n */\nasync function tryRefresh(): Promise<string | null> {\n if (_refreshInflight) return _refreshInflight;\n if (!_refreshHandler) return null;\n const refresh = auth.getRefreshToken();\n if (!refresh) return null;\n\n _refreshInflight = (async () => {\n try {\n const result = await _refreshHandler!(refresh);\n if (!result?.access) return null;\n auth.setToken(result.access);\n if (result.refresh) auth.setRefreshToken(result.refresh);\n return result.access;\n } catch {\n return null;\n } finally {\n _refreshInflight = null;\n }\n })();\n\n return _refreshInflight;\n}\n\n/**\n * Wire the shared client to the global auth store. Called exactly\n * once from `client.gen.ts` (post-processed) right after\n * `createClient()`. Synchronous — no microtask, no TDZ races.\n *\n * Safe to call from server / SSR: storage backends short-circuit on\n * non-browser environments, so headers populated by the interceptor\n * are simply absent server-side (which is the correct behaviour\n * unless the caller explicitly sets a server-side token).\n */\nexport function installAuthOnClient(client: HeyClient): void {\n if (_client) return; // idempotent\n _client = client;\n\n client.setConfig({\n baseUrl: auth.getBaseUrl(),\n credentials: _withCredentials ? 'include' : 'same-origin',\n });\n\n client.interceptors.request.use((request) => {\n const token = auth.getToken();\n if (token) request.headers.set('Authorization', `Bearer ${token}`);\n\n const locale = auth.getLocale();\n if (locale) request.headers.set('Accept-Language', locale);\n\n const apiKey = auth.getApiKey();\n if (apiKey) request.headers.set('X-API-Key', apiKey);\n\n return request;\n });\n\n client.interceptors.response.use(async (response, request) => {\n if (response.status !== 401) return response;\n\n // Already retried once — give up to avoid loops.\n if (request.headers.get(RETRY_MARKER)) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n const newToken = await tryRefresh();\n if (!newToken) {\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n\n // Retry the original request once with the new token. We mutate a\n // clone so the original Request body (already consumed by the\n // failed call) doesn't trip \"body already used\".\n const retry = request.clone();\n retry.headers.set('Authorization', `Bearer ${newToken}`);\n retry.headers.set(RETRY_MARKER, '1');\n try {\n const retried = await fetch(retry);\n if (retried.status === 401 && _onUnauthorized) {\n try { _onUnauthorized(retried); } catch {}\n }\n return retried;\n } catch {\n // Network error on retry — surface the original 401.\n if (_onUnauthorized) {\n try { _onUnauthorized(response); } catch {}\n }\n return response;\n }\n });\n}\n\nexport type Auth = typeof auth;\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// API logger built on consola. Optional dependency — install if you enable logging:\n// npm install consola\n// DO NOT EDIT — re-run `make gen`.\n\nimport { type ConsolaInstance, createConsola } from \"consola\";\n\nexport interface RequestLog {\n method: string;\n url: string;\n headers?: Record<string, string>;\n body?: any;\n timestamp: number;\n}\n\nexport interface ResponseLog {\n status: number;\n statusText: string;\n data?: any;\n duration: number;\n timestamp: number;\n}\n\nexport interface ErrorLog {\n message: string;\n statusCode?: number;\n fieldErrors?: Record<string, string[]>;\n duration: number;\n timestamp: number;\n}\n\nexport interface LoggerConfig {\n enabled: boolean;\n logRequests: boolean;\n logResponses: boolean;\n logErrors: boolean;\n logBodies: boolean;\n logHeaders: boolean;\n consola?: ConsolaInstance;\n}\n\nconst DEFAULT_CONFIG: LoggerConfig = {\n enabled: typeof process !== \"undefined\" && process.env?.NODE_ENV !== \"production\",\n logRequests: true,\n logResponses: true,\n logErrors: true,\n logBodies: true,\n logHeaders: false,\n};\n\nconst SENSITIVE_HEADERS = [\n \"authorization\",\n \"cookie\",\n \"set-cookie\",\n \"x-api-key\",\n \"x-csrf-token\",\n];\n\nexport class APILogger {\n private config: LoggerConfig;\n private consola: ConsolaInstance;\n\n constructor(config: Partial<LoggerConfig> = {}) {\n this.config = { ...DEFAULT_CONFIG, ...config };\n this.consola = config.consola || createConsola({\n level: this.config.enabled ? 4 : 0,\n });\n }\n\n enable(): void { this.config.enabled = true; }\n disable(): void { this.config.enabled = false; }\n setConfig(config: Partial<LoggerConfig>): void {\n this.config = { ...this.config, ...config };\n }\n\n private filterHeaders(headers?: Record<string, string>): Record<string, string> {\n if (!headers) return {};\n const filtered: Record<string, string> = {};\n Object.keys(headers).forEach((key) => {\n filtered[key] = SENSITIVE_HEADERS.includes(key.toLowerCase()) ? \"***\" : (headers[key] || \"\");\n });\n return filtered;\n }\n\n logRequest(request: RequestLog): void {\n if (!this.config.enabled || !this.config.logRequests) return;\n const { method, url, headers, body } = request;\n this.consola.start(`${method} ${url}`);\n if (this.config.logHeaders && headers) this.consola.debug(\"Headers:\", this.filterHeaders(headers));\n if (this.config.logBodies && body) this.consola.debug(\"Body:\", body);\n }\n\n logResponse(request: RequestLog, response: ResponseLog): void {\n if (!this.config.enabled || !this.config.logResponses) return;\n const { method, url } = request;\n const { status, statusText, data, duration } = response;\n this.consola.success(`${method} ${url} ${status} ${statusText} (${duration}ms)`);\n if (this.config.logBodies && data) this.consola.debug(\"Response:\", data);\n }\n\n logError(request: RequestLog, error: ErrorLog): void {\n if (!this.config.enabled || !this.config.logErrors) return;\n const { method, url } = request;\n const { message, statusCode, fieldErrors, duration } = error;\n this.consola.error(`${method} ${url} ${statusCode || \"Network\"} Error (${duration}ms)`);\n this.consola.error(\"Message:\", message);\n if (fieldErrors && Object.keys(fieldErrors).length > 0) {\n this.consola.error(\"Field Errors:\");\n Object.entries(fieldErrors).forEach(([field, errors]) => {\n errors.forEach((err) => this.consola.error(` • ${field}: ${err}`));\n });\n }\n }\n\n info(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.info(message, ...args); }\n warn(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.warn(message, ...args); }\n error(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.error(message, ...args); }\n debug(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.debug(message, ...args); }\n success(message: string, ...args: any[]): void { if (this.config.enabled) this.consola.success(message, ...args); }\n withTag(tag: string): ConsolaInstance { return this.consola.withTag(tag); }\n}\n\nexport const defaultLogger = new APILogger();\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Thin per-group proxy over the global `auth` store. All actual auth\n// wiring lives in `helpers/auth.ts` (one interceptor, one source of\n// truth). DO NOT EDIT — re-run `make gen`.\n\nimport { auth } from '../helpers/auth';\nimport { APILogger, type LoggerConfig } from '../helpers/logger';\n\n\n\n\n\nexport interface APIOptions {\n /** Logger config (defaults to dev-only). */\n logger?: Partial<LoggerConfig>;\n /** Locale for `Accept-Language`. If omitted, auto-detected from cookie/navigator. */\n locale?: string;\n /** API key sent as `X-API-Key`. Falls back to NEXT_PUBLIC_API_KEY. */\n apiKey?: string;\n /** Send Django session/CSRF cookies cross-origin. Defaults to true. */\n withCredentials?: boolean;\n}\n\n/**\n * Per-group ergonomic facade.\n *\n * Calling `setToken/setApiKey/setLocale/setBaseUrl` proxies to the\n * global `auth` store — the change applies to **every** group's API\n * instance because they share the same HTTP client and interceptor.\n *\n * Use the global `auth` object directly when you don't need a group\n * facade: `import { auth } from '@your/api'; auth.setToken(jwt);`\n */\nexport class API {\n readonly logger: APILogger;\n\n\n\n constructor(_baseUrl?: string, opts: APIOptions = {}) {\n this.logger = new APILogger(opts.logger);\n if (_baseUrl) auth.setBaseUrl(_baseUrl);\n if (opts.locale !== undefined) auth.setLocale(opts.locale);\n if (opts.apiKey !== undefined) auth.setApiKey(opts.apiKey);\n if (opts.withCredentials !== undefined) auth.setWithCredentials(opts.withCredentials);\n }\n\n // ── Base URL ────────────────────────────────────────────────────────────\n getBaseUrl(): string { return auth.getBaseUrl(); }\n setBaseUrl(url: string): void { auth.setBaseUrl(url); }\n\n // ── Tokens ──────────────────────────────────────────────────────────────\n getToken(): string | null { return auth.getToken(); }\n setToken(token: string | null): void { auth.setToken(token); }\n getRefreshToken(): string | null { return auth.getRefreshToken(); }\n setRefreshToken(token: string | null): void { auth.setRefreshToken(token); }\n clearToken(): void { auth.clearTokens(); }\n isAuthenticated(): boolean { return auth.isAuthenticated(); }\n\n // ── Locale / API key ────────────────────────────────────────────────────\n getLocale(): string | null { return auth.getLocale(); }\n setLocale(locale: string | null): void { auth.setLocale(locale); }\n getApiKey(): string | null { return auth.getApiKey(); }\n setApiKey(key: string | null): void { auth.setApiKey(key); }\n\n // ── 401 handling ────────────────────────────────────────────────────────\n /** Fired only on terminal 401 (after refresh+retry path is exhausted). */\n onUnauthorized(cb: ((response: Response) => void) | null): void {\n auth.onUnauthorized(cb);\n }\n /** Provide a refresh strategy. See `auth.setRefreshHandler` for the contract. */\n setRefreshHandler(\n fn: ((refreshToken: string) => Promise<{ access: string; refresh?: string } | null>) | null,\n ): void {\n auth.setRefreshHandler(fn);\n }\n}\n\nexport { };\nexport { auth };\n","// AUTO-GENERATED by django_generator / ts_extras.wrapper\n// Top-level barrel — global `auth` + per-group facades.\n// DO NOT EDIT — re-run `make gen`.\n\n// Side-effect: ensure auth interceptor is installed even if consumers\n// only ever import this barrel (it'll also load via client.gen.ts).\nimport './helpers/auth';\n\n// Global auth/config store — single source of truth.\nexport { auth, type Auth } from './helpers/auth';\n\nimport { API as CfgAccountsAPI } from './_cfg_accounts';\nimport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nimport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Singletons for ergonomic access (`import { apiAccounts } from '@your/api'`).\n// All instances share the same global `auth` store.\nexport const CfgAccountsApi = new CfgAccountsAPI();\nexport const CfgCentrifugoApi = new CfgCentrifugoAPI();\nexport const CfgTotpApi = new CfgTotpAPI();\n\n// Per-group wrapper classes (e.g. for tests / SSR isolation of options).\nexport { API as CfgAccountsAPI } from './_cfg_accounts';\nexport { API as CfgCentrifugoAPI } from './_cfg_centrifugo';\nexport { API as CfgTotpAPI } from './_cfg_totp';\n\n// Hey API SDK classes — one per OpenAPI tag. Lets consumers call\n// `Centrifugo.cfgCentrifugoAuthTokenRetrieve({...})` directly.\n\n\n// Shared utilities (errors, storage adapters, logger).\nexport * from './helpers';\n"],"mappings":";;;;;AAMA,IAAM,aAAa;AACnB,IAAM,cAAc;AACpB,IAAM,cAAc;AAEpB,IAAM,YAAY,OAAO,WAAW;AAWpC,IAAM,sBAA+B;AAAA,EACnC,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AAAE,aAAO,OAAO,aAAa,QAAQ,GAAG;AAAA,IAAG,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACxE;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,UAAI,UAAU,KAAM,QAAO,aAAa,WAAW,GAAG;AAAA,UACjD,QAAO,aAAa,QAAQ,KAAK,KAAK;AAAA,IAC7C,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAGA,IAAM,iBAAiB,KAAK,KAAK,KAAK;AAEtC,IAAM,gBAAyB;AAAA,EAC7B,IAAI,KAAK;AACP,QAAI,CAAC,UAAW,QAAO;AACvB,QAAI;AACF,YAAM,KAAK,IAAI,OAAO,cAAc,mBAAmB,GAAG,CAAC,UAAU;AACrE,YAAM,IAAI,SAAS,OAAO,MAAM,EAAE;AAClC,aAAO,IAAI,mBAAmB,EAAE,CAAC,CAAC,IAAI;AAAA,IACxC,QAAQ;AAAE,aAAO;AAAA,IAAM;AAAA,EACzB;AAAA,EACA,IAAI,KAAK,OAAO;AACd,QAAI,CAAC,UAAW;AAChB,QAAI;AACF,YAAM,IAAI,mBAAmB,GAAG;AAChC,YAAM,SAAS,OAAO,SAAS,aAAa,WAAW,aAAa;AACpE,UAAI,UAAU,MAAM;AAClB,iBAAS,SAAS,GAAG,CAAC,qCAAqC,MAAM;AAAA,MACnE,OAAO;AACL,cAAM,IAAI,mBAAmB,KAAK;AAClC,iBAAS,SAAS,GAAG,CAAC,IAAI,CAAC,qBAAqB,cAAc,iBAAiB,MAAM;AAAA,MACvF;AAAA,IACF,QAAQ;AAAA,IAAC;AAAA,EACX;AACF;AAEA,IAAI,WAAoB;AACxB,IAAI,eAA4B;AAGhC,SAAS,eAA8B;AACrC,MAAI;AACF,QAAI,OAAO,aAAa,aAAa;AACnC,YAAM,IAAI,SAAS,OAAO,MAAM,+BAA+B;AAC/D,UAAI,EAAG,QAAO,mBAAmB,EAAE,CAAC,CAAC;AAAA,IACvC;AACA,QAAI,OAAO,cAAc,eAAe,UAAU,UAAU;AAC1D,aAAO,UAAU;AAAA,IACnB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAXS;AAcT,SAAS,iBAAyB;AAChC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK;AACjD,UAAI,QAAQ,IAAI,6BAA6B,OAAQ,QAAO;AAC5D,aAAO,QAAQ,IAAI,uBAAuB;AAAA,IAC5C;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AARS;AAWT,SAAS,gBAA+B;AACtC,MAAI;AACF,QAAI,OAAO,YAAY,eAAe,QAAQ,KAAK,qBAAqB;AACtE,aAAO,QAAQ,IAAI;AAAA,IACrB;AAAA,EACF,QAAQ;AAAA,EAAC;AACT,SAAO;AACT;AAPS;AAUT,IAAI,kBAAiC;AACrC,IAAI,kBAAiC;AACrC,IAAI,mBAAkC;AACtC,IAAI,mBAAmB;AACvB,IAAI,kBAAyD;AAS7D,IAAI,kBAAyC;AAsB7C,IAAI,UAA4B;AAEhC,SAAS,mBAAyB;AAChC,MAAI,CAAC,QAAS;AACd,UAAQ,UAAU;AAAA,IAChB,SAAS,KAAK,WAAW;AAAA,IACzB,aAAa,mBAAmB,YAAY;AAAA,EAC9C,CAAC;AACH;AANS;AAsBF,IAAM,OAAO;AAAA;AAAA,EAElB,iBAA8B;AAAE,WAAO;AAAA,EAAc;AAAA,EACrD,eAAe,MAAyB;AACtC,mBAAe;AACf,eAAW,SAAS,WAAW,gBAAgB;AAAA,EACjD;AAAA;AAAA,EAGA,WAA0B;AAAE,WAAO,SAAS,IAAI,UAAU;AAAA,EAAG;AAAA,EAC7D,SAAS,OAA4B;AAAE,aAAS,IAAI,YAAY,KAAK;AAAA,EAAG;AAAA,EACxE,kBAAiC;AAAE,WAAO,SAAS,IAAI,WAAW;AAAA,EAAG;AAAA,EACrE,gBAAgB,OAA4B;AAAE,aAAS,IAAI,aAAa,KAAK;AAAA,EAAG;AAAA,EAChF,cAAoB;AAAE,aAAS,IAAI,YAAY,IAAI;AAAG,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA,EACvF,kBAA2B;AAAE,WAAO,SAAS,IAAI,UAAU,MAAM;AAAA,EAAM;AAAA;AAAA,EAGvE,YAA2B;AACzB,WAAO,mBAAmB,SAAS,IAAI,WAAW,KAAK,cAAc;AAAA,EACvE;AAAA,EACA,UAAU,KAA0B;AAAE,sBAAkB;AAAA,EAAK;AAAA,EAC7D,iBAAiB,KAA0B;AACzC,sBAAkB;AAClB,aAAS,IAAI,aAAa,GAAG;AAAA,EAC/B;AAAA,EACA,cAAoB;AAAE,sBAAkB;AAAM,aAAS,IAAI,aAAa,IAAI;AAAA,EAAG;AAAA;AAAA,EAG/E,YAA2B;AAAE,WAAO,mBAAmB,aAAa;AAAA,EAAG;AAAA,EACvE,UAAU,QAA6B;AAAE,sBAAkB;AAAA,EAAQ;AAAA;AAAA,EAGnE,aAAqB;AACnB,UAAM,MAAO,oBAAoB,eAAe;AAChD,WAAO,IAAI,QAAQ,OAAO,EAAE;AAAA,EAC9B;AAAA,EACA,WAAW,KAA0B;AACnC,uBAAmB,MAAM,IAAI,QAAQ,OAAO,EAAE,IAAI;AAClD,qBAAiB;AAAA,EACnB;AAAA;AAAA,EAGA,qBAA8B;AAAE,WAAO;AAAA,EAAkB;AAAA,EACzD,mBAAmB,OAAsB;AACvC,uBAAmB;AACnB,qBAAiB;AAAA,EACnB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAWA,eAAe,IAAiD;AAC9D,sBAAkB;AAAA,EACpB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAaA,kBAAkB,IAAiC;AACjD,sBAAkB;AAAA,EACpB;AACF;;;ACtOA,SAA+B,qBAAqB;AAoCpD,IAAM,iBAA+B;AAAA,EACnC,SAAS,OAAO,YAAY,eAAe,yBAA0B;AAAA,EACrE,aAAa;AAAA,EACb,cAAc;AAAA,EACd,WAAW;AAAA,EACX,WAAW;AAAA,EACX,YAAY;AACd;AAEA,IAAM,oBAAoB;AAAA,EACxB;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AACF;AAEO,IAAM,YAAN,MAAgB;AAAA,EA1DvB,OA0DuB;AAAA;AAAA;AAAA,EACb;AAAA,EACA;AAAA,EAER,YAAY,SAAgC,CAAC,GAAG;AAC9C,SAAK,SAAS,EAAE,GAAG,gBAAgB,GAAG,OAAO;AAC7C,SAAK,UAAU,OAAO,WAAW,cAAc;AAAA,MAC7C,OAAO,KAAK,OAAO,UAAU,IAAI;AAAA,IACnC,CAAC;AAAA,EACH;AAAA,EAEA,SAAe;AAAE,SAAK,OAAO,UAAU;AAAA,EAAM;AAAA,EAC7C,UAAgB;AAAE,SAAK,OAAO,UAAU;AAAA,EAAO;AAAA,EAC/C,UAAU,QAAqC;AAC7C,SAAK,SAAS,EAAE,GAAG,KAAK,QAAQ,GAAG,OAAO;AAAA,EAC5C;AAAA,EAEQ,cAAc,SAA0D;AAC9E,QAAI,CAAC,QAAS,QAAO,CAAC;AACtB,UAAM,WAAmC,CAAC;AAC1C,WAAO,KAAK,OAAO,EAAE,QAAQ,CAAC,QAAQ;AACpC,eAAS,GAAG,IAAI,kBAAkB,SAAS,IAAI,YAAY,CAAC,IAAI,QAAS,QAAQ,GAAG,KAAK;AAAA,IAC3F,CAAC;AACD,WAAO;AAAA,EACT;AAAA,EAEA,WAAW,SAA2B;AACpC,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,YAAa;AACtD,UAAM,EAAE,QAAQ,KAAK,SAAS,KAAK,IAAI;AACvC,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,EAAE;AACrC,QAAI,KAAK,OAAO,cAAc,QAAS,MAAK,QAAQ,MAAM,YAAY,KAAK,cAAc,OAAO,CAAC;AACjG,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,SAAS,IAAI;AAAA,EACrE;AAAA,EAEA,YAAY,SAAqB,UAA6B;AAC5D,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,aAAc;AACvD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,QAAQ,YAAY,MAAM,SAAS,IAAI;AAC/C,SAAK,QAAQ,QAAQ,GAAG,MAAM,IAAI,GAAG,IAAI,MAAM,IAAI,UAAU,KAAK,QAAQ,KAAK;AAC/E,QAAI,KAAK,OAAO,aAAa,KAAM,MAAK,QAAQ,MAAM,aAAa,IAAI;AAAA,EACzE;AAAA,EAEA,SAAS,SAAqB,OAAuB;AACnD,QAAI,CAAC,KAAK,OAAO,WAAW,CAAC,KAAK,OAAO,UAAW;AACpD,UAAM,EAAE,QAAQ,IAAI,IAAI;AACxB,UAAM,EAAE,SAAS,YAAY,aAAa,SAAS,IAAI;AACvD,SAAK,QAAQ,MAAM,GAAG,MAAM,IAAI,GAAG,IAAI,cAAc,SAAS,WAAW,QAAQ,KAAK;AACtF,SAAK,QAAQ,MAAM,YAAY,OAAO;AACtC,QAAI,eAAe,OAAO,KAAK,WAAW,EAAE,SAAS,GAAG;AACtD,WAAK,QAAQ,MAAM,eAAe;AAClC,aAAO,QAAQ,WAAW,EAAE,QAAQ,CAAC,CAAC,OAAO,MAAM,MAAM;AACvD,eAAO,QAAQ,CAAC,QAAQ,KAAK,QAAQ,MAAM,YAAO,KAAK,KAAK,GAAG,EAAE,CAAC;AAAA,MACpE,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,KAAK,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,KAAK,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC5G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,MAAM,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,MAAM,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAC9G,QAAQ,YAAoB,MAAmB;AAAE,QAAI,KAAK,OAAO,QAAS,MAAK,QAAQ,QAAQ,SAAS,GAAG,IAAI;AAAA,EAAG;AAAA,EAClH,QAAQ,KAA8B;AAAE,WAAO,KAAK,QAAQ,QAAQ,GAAG;AAAA,EAAG;AAC5E;AAEO,IAAM,gBAAgB,IAAI,UAAU;;;ACzFpC,IAAM,MAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMA,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1CO,IAAMC,OAAN,MAAU;AAAA,EAjCjB,OAiCiB;AAAA;AAAA;AAAA,EACN;AAAA,EAIT,YAAY,UAAmB,OAAmB,CAAC,GAAG;AACpD,SAAK,SAAS,IAAI,UAAU,KAAK,MAAM;AACvC,QAAI,SAAU,MAAK,WAAW,QAAQ;AACtC,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,WAAW,OAAW,MAAK,UAAU,KAAK,MAAM;AACzD,QAAI,KAAK,oBAAoB,OAAW,MAAK,mBAAmB,KAAK,eAAe;AAAA,EACtF;AAAA;AAAA,EAGA,aAAqB;AAAE,WAAO,KAAK,WAAW;AAAA,EAAG;AAAA,EACjD,WAAW,KAAmB;AAAE,SAAK,WAAW,GAAG;AAAA,EAAG;AAAA;AAAA,EAGtD,WAA0B;AAAE,WAAO,KAAK,SAAS;AAAA,EAAG;AAAA,EACpD,SAAS,OAA4B;AAAE,SAAK,SAAS,KAAK;AAAA,EAAG;AAAA,EAC7D,kBAAiC;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA,EAClE,gBAAgB,OAA4B;AAAE,SAAK,gBAAgB,KAAK;AAAA,EAAG;AAAA,EAC3E,aAAmB;AAAE,SAAK,YAAY;AAAA,EAAG;AAAA,EACzC,kBAA2B;AAAE,WAAO,KAAK,gBAAgB;AAAA,EAAG;AAAA;AAAA,EAG5D,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,QAA6B;AAAE,SAAK,UAAU,MAAM;AAAA,EAAG;AAAA,EACjE,YAA2B;AAAE,WAAO,KAAK,UAAU;AAAA,EAAG;AAAA,EACtD,UAAU,KAA0B;AAAE,SAAK,UAAU,GAAG;AAAA,EAAG;AAAA;AAAA;AAAA,EAI3D,eAAe,IAAiD;AAC9D,SAAK,eAAe,EAAE;AAAA,EACxB;AAAA;AAAA,EAEA,kBACE,IACM;AACN,SAAK,kBAAkB,EAAE;AAAA,EAC3B;AACF;;;AC1DO,IAAM,iBAAiB,IAAI,IAAe;AAC1C,IAAM,mBAAmB,IAAIC,KAAiB;AAC9C,IAAM,aAAa,IAAIA,KAAW;","names":["API","API","API"]}