@dragonmastery/dragoncore-vue 0.0.31 → 0.0.32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{ChangePasswordPage-Dy8lFUcI.js → ChangePasswordPage-CR91NZP4.js} +2 -2
- package/dist/{ChangePasswordPage-Dy8lFUcI.js.map → ChangePasswordPage-CR91NZP4.js.map} +1 -1
- package/dist/ChangePasswordPage-qLd6YZVO.js +7 -0
- package/dist/{ConsentRequired-Bhkxu0rv.js → ConsentRequired-DtUwfpk0.js} +36 -27
- package/dist/ConsentRequired-DtUwfpk0.js.map +1 -0
- package/dist/CreateTeamForm-BK8PJeXz.js +12 -0
- package/dist/{CreateTeamForm-bpLbK18g.js → CreateTeamForm-BQewI0Gn.js} +3 -3
- package/dist/{CreateTeamForm-bpLbK18g.js.map → CreateTeamForm-BQewI0Gn.js.map} +1 -1
- package/dist/{CreateTeamMemberForm-DeUyXnVa.js → CreateTeamMemberForm-B3jxlAsC.js} +4 -4
- package/dist/{CreateTeamMemberForm-DeUyXnVa.js.map → CreateTeamMemberForm-B3jxlAsC.js.map} +1 -1
- package/dist/CreateTeamMemberForm-BYsZNxTq.js +12 -0
- package/dist/{CreateUserPage-CqKcY7_X.js → CreateUserPage-BcCIat_l.js} +2 -2
- package/dist/{CreateUserPage-CqKcY7_X.js.map → CreateUserPage-BcCIat_l.js.map} +1 -1
- package/dist/CreateUserPage-D0oMJnGd.js +7 -0
- package/dist/CreditBalanceDashboard-C2QnVfjU.js +13 -0
- package/dist/{CreditBalanceDashboard-BEsOr0Rw.js → CreditBalanceDashboard-CRHrhlSZ.js} +2 -2
- package/dist/{CreditBalanceDashboard-BEsOr0Rw.js.map → CreditBalanceDashboard-CRHrhlSZ.js.map} +1 -1
- package/dist/{CreditManagement-DiVSMbWZ.js → CreditManagement-7xiygPYj.js} +3 -3
- package/dist/{CreditManagement-DiVSMbWZ.js.map → CreditManagement-7xiygPYj.js.map} +1 -1
- package/dist/CreditManagement-CAaf_rVj.js +13 -0
- package/dist/{CreditTransactionHistory-mcacl2xG.js → CreditTransactionHistory-CP7ufh7Z.js} +5 -5
- package/dist/{CreditTransactionHistory-mcacl2xG.js.map → CreditTransactionHistory-CP7ufh7Z.js.map} +1 -1
- package/dist/CustomerCreateSupportTicketForm-C3DSzhJR.js +14 -0
- package/dist/{CustomerCreateSupportTicketForm-IefplMnK.js → CustomerCreateSupportTicketForm-Cd3ijzWy.js} +4 -4
- package/dist/{CustomerCreateSupportTicketForm-IefplMnK.js.map → CustomerCreateSupportTicketForm-Cd3ijzWy.js.map} +1 -1
- package/dist/{CustomerSupportTicketDetailPage-Dengb4Zx.js → CustomerSupportTicketDetailPage-DwpkxpYV.js} +8 -8
- package/dist/{CustomerSupportTicketDetailPage-Dengb4Zx.js.map → CustomerSupportTicketDetailPage-DwpkxpYV.js.map} +1 -1
- package/dist/CustomerSupportTicketList-BrTX8SUV.js +64 -0
- package/dist/CustomerSupportTicketParent-C0uMeN09.js +8 -0
- package/dist/{CustomerSupportTicketParent-rl4Ym8oa.js → CustomerSupportTicketParent-D9FuZjPz.js} +2 -2
- package/dist/{CustomerSupportTicketParent-rl4Ym8oa.js.map → CustomerSupportTicketParent-D9FuZjPz.js.map} +1 -1
- package/dist/CustomerSupportTicketSuccess-BLSMAjQN.js +12 -0
- package/dist/{CustomerSupportTicketSuccess-RQskseXP.js → CustomerSupportTicketSuccess-k3DX9NhV.js} +2 -2
- package/dist/{CustomerSupportTicketSuccess-RQskseXP.js.map → CustomerSupportTicketSuccess-k3DX9NhV.js.map} +1 -1
- package/dist/{DefaultReferralTeamPage-Be7-RI3s.js → DefaultReferralTeamPage-fS1SlVow.js} +6 -6
- package/dist/{DefaultReferralTeamPage-Be7-RI3s.js.map → DefaultReferralTeamPage-fS1SlVow.js.map} +1 -1
- package/dist/{EditTeamForm-RBO99ocN.js → EditTeamForm-CETmPEZ7.js} +3 -3
- package/dist/{EditTeamForm-RBO99ocN.js.map → EditTeamForm-CETmPEZ7.js.map} +1 -1
- package/dist/EditTeamForm-DiZXp6vh.js +12 -0
- package/dist/EditTeamMemberForm-BKbWq88S.js +9 -0
- package/dist/{EditTeamMemberForm-D9cofrUM.js → EditTeamMemberForm-D6vf9hp-.js} +2 -2
- package/dist/{EditTeamMemberForm-D9cofrUM.js.map → EditTeamMemberForm-D6vf9hp-.js.map} +1 -1
- package/dist/EditUserPage-DCdj6EYd.js +8 -0
- package/dist/{EditUserPage-DGuV8pzp.js → EditUserPage-Dy61CCle.js} +3 -3
- package/dist/{EditUserPage-DGuV8pzp.js.map → EditUserPage-Dy61CCle.js.map} +1 -1
- package/dist/{EnhancedRefreshTokenHandler-C6tZCcfX.js → EnhancedRefreshTokenHandler-s8wUXtB5.js} +2 -2
- package/dist/{EnhancedRefreshTokenHandler-C6tZCcfX.js.map → EnhancedRefreshTokenHandler-s8wUXtB5.js.map} +1 -1
- package/dist/{ForgotPassword-DZ-d8rWX.js → ForgotPassword-BykH9B9R.js} +2 -2
- package/dist/{ForgotPassword-DZ-d8rWX.js.map → ForgotPassword-BykH9B9R.js.map} +1 -1
- package/dist/ForgotPassword-Xb1yVZ6C.js +8 -0
- package/dist/{InlineAttachments-DAn_QknY.js → InlineAttachments-Ywf9r3jd.js} +4 -4
- package/dist/{InlineAttachments-DAn_QknY.js.map → InlineAttachments-Ywf9r3jd.js.map} +1 -1
- package/dist/LoginForm-B5wYdKhY.js +8 -0
- package/dist/{LoginForm-DEgTB9RF.js → LoginForm-CjF4NSgM.js} +3 -3
- package/dist/{LoginForm-DEgTB9RF.js.map → LoginForm-CjF4NSgM.js.map} +1 -1
- package/dist/{Logout-Bb2xe5BM.js → Logout-DmpC8Rwh.js} +3 -3
- package/dist/{Logout-Bb2xe5BM.js.map → Logout-DmpC8Rwh.js.map} +1 -1
- package/dist/Logout-qyH2t-1a.js +8 -0
- package/dist/{MfaSetup-m080C6iX.js → MfaSetup-DCLKIMaS.js} +2 -2
- package/dist/{MfaSetup-m080C6iX.js.map → MfaSetup-DCLKIMaS.js.map} +1 -1
- package/dist/MfaSetup-DMLXL9fk.js +9 -0
- package/dist/MfaVerify-C4xGQZlQ.js +9 -0
- package/dist/{MfaVerify-D8Ch-8hN.js → MfaVerify-Dm2Yc0Da.js} +3 -3
- package/dist/{MfaVerify-D8Ch-8hN.js.map → MfaVerify-Dm2Yc0Da.js.map} +1 -1
- package/dist/{ResetPassword-DflPd8Qg.js → ResetPassword-iVcY7eBY.js} +2 -2
- package/dist/{ResetPassword-DflPd8Qg.js.map → ResetPassword-iVcY7eBY.js.map} +1 -1
- package/dist/ResetPassword-ulR2HviU.js +8 -0
- package/dist/{SavedFiltersPage-ey8wOr0T.js → SavedFiltersPage-CTLpYU2c.js} +50 -50
- package/dist/{SavedFiltersPage-ey8wOr0T.js.map → SavedFiltersPage-CTLpYU2c.js.map} +1 -1
- package/dist/Signup-D4xILUym.js +10 -0
- package/dist/{Signup-KuiKHB4h.js → Signup-D6vnyS4w.js} +28 -28
- package/dist/Signup-D6vnyS4w.js.map +1 -0
- package/dist/{SignupRequirementsPage-CwnsnQKb.js → SignupRequirementsPage-BnOkXd7w.js} +6 -6
- package/dist/{SignupRequirementsPage-CwnsnQKb.js.map → SignupRequirementsPage-BnOkXd7w.js.map} +1 -1
- package/dist/StaffCreateSupportTicketForm-BnpxlQaG.js +14 -0
- package/dist/{StaffCreateSupportTicketForm-75Bo0jdz.js → StaffCreateSupportTicketForm-gPZizMKW.js} +6 -6
- package/dist/{StaffCreateSupportTicketForm-75Bo0jdz.js.map → StaffCreateSupportTicketForm-gPZizMKW.js.map} +1 -1
- package/dist/{StaffSupportTicketDetailPage-6VyPNdw7.js → StaffSupportTicketDetailPage-DUqLTHVT.js} +8 -8
- package/dist/{StaffSupportTicketDetailPage-6VyPNdw7.js.map → StaffSupportTicketDetailPage-DUqLTHVT.js.map} +1 -1
- package/dist/StaffSupportTicketList-Qp0vQw8X.js +64 -0
- package/dist/{StaffSupportTicketParent-DPvdLUii.js → StaffSupportTicketParent-CZllER18.js} +2 -2
- package/dist/{StaffSupportTicketParent-DPvdLUii.js.map → StaffSupportTicketParent-CZllER18.js.map} +1 -1
- package/dist/StaffSupportTicketParent-D4FKQAmp.js +8 -0
- package/dist/StaffSupportTicketSuccess-BvwrpoAb.js +12 -0
- package/dist/{StaffSupportTicketSuccess-BYoBXx1i.js → StaffSupportTicketSuccess-C9vqsC51.js} +2 -2
- package/dist/{StaffSupportTicketSuccess-BYoBXx1i.js.map → StaffSupportTicketSuccess-C9vqsC51.js.map} +1 -1
- package/dist/{SupportStaffPage-CLxWU628.js → SupportStaffPage--vinFIlV.js} +6 -6
- package/dist/{SupportStaffPage-CLxWU628.js.map → SupportStaffPage--vinFIlV.js.map} +1 -1
- package/dist/{SupportTicketMaintenancePage-B07avInx.js → SupportTicketMaintenancePage-C-BWD49g.js} +5 -5
- package/dist/{SupportTicketMaintenancePage-B07avInx.js.map → SupportTicketMaintenancePage-C-BWD49g.js.map} +1 -1
- package/dist/TeamAttachmentsTab-CnAvlIbn.js +64 -0
- package/dist/{TeamHistoryTab-CxzA4u_G.js → TeamHistoryTab-5kNQ_XAq.js} +3 -3
- package/dist/{TeamHistoryTab-CxzA4u_G.js.map → TeamHistoryTab-5kNQ_XAq.js.map} +1 -1
- package/dist/TeamHistoryTab-CBWeRKXM.js +6 -0
- package/dist/{TeamList-DXQj_Omo.js → TeamList-C0Mbkbja.js} +4 -4
- package/dist/{TeamList-DXQj_Omo.js.map → TeamList-C0Mbkbja.js.map} +1 -1
- package/dist/TeamList-Fb6EfybL.js +8 -0
- package/dist/{TeamMemberList-BYUANoBg.js → TeamMemberList-DyfXcR6F.js} +4 -4
- package/dist/{TeamMemberList-BYUANoBg.js.map → TeamMemberList-DyfXcR6F.js.map} +1 -1
- package/dist/TeamMemberList-X2hzYZFT.js +7 -0
- package/dist/{TeamMemberParent-DmYcHU3n.js → TeamMemberParent-2zISixbT.js} +3 -3
- package/dist/{TeamMemberParent-DmYcHU3n.js.map → TeamMemberParent-2zISixbT.js.map} +1 -1
- package/dist/TeamMemberParent-DKxE1ziP.js +10 -0
- package/dist/{TeamNotesTab-Cego-QT3.js → TeamNotesTab-BREl3Vr0.js} +5 -5
- package/dist/{TeamNotesTab-Cego-QT3.js.map → TeamNotesTab-BREl3Vr0.js.map} +1 -1
- package/dist/TeamNotesTab-DxMN3WZo.js +8 -0
- package/dist/{TeamParent-6JhqsYaO.js → TeamParent-COSOJ-ZZ.js} +3 -3
- package/dist/{TeamParent-6JhqsYaO.js.map → TeamParent-COSOJ-ZZ.js.map} +1 -1
- package/dist/TeamParent-XgBD3twV.js +11 -0
- package/dist/{TimelineNoteInput-P3ycD18j.js → TimelineNoteInput-CrivEMUP.js} +2 -2
- package/dist/{TimelineNoteInput-P3ycD18j.js.map → TimelineNoteInput-CrivEMUP.js.map} +1 -1
- package/dist/{UserListPage-DelzxCID.js → UserListPage-CCl0K7Gk.js} +3 -3
- package/dist/{UserListPage-DelzxCID.js.map → UserListPage-CCl0K7Gk.js.map} +1 -1
- package/dist/UserListPage-CYkvaHwL.js +5 -0
- package/dist/UserProfilePage-BMmz7SGl.js +8 -0
- package/dist/{UserProfilePage-BYitd7QV.js → UserProfilePage-D7FNmca1.js} +4 -4
- package/dist/{UserProfilePage-BYitd7QV.js.map → UserProfilePage-D7FNmca1.js.map} +1 -1
- package/dist/{VerifyEmail-Cy2s4yP0.js → VerifyEmail-KCti4rzf.js} +5 -5
- package/dist/{VerifyEmail-Cy2s4yP0.js.map → VerifyEmail-KCti4rzf.js.map} +1 -1
- package/dist/VerifyEmail-Xd31Com7.js +10 -0
- package/dist/ViewTeam-BXSq4M0V.js +8 -0
- package/dist/{ViewTeam-ByZdYEJG.js → ViewTeam-DGaNNd8N.js} +2 -2
- package/dist/{ViewTeam-ByZdYEJG.js.map → ViewTeam-DGaNNd8N.js.map} +1 -1
- package/dist/{ViewTeamMember-DqWZ3F_h.js → ViewTeamMember-Dsl2GKI1.js} +2 -2
- package/dist/{ViewTeamMember-DqWZ3F_h.js.map → ViewTeamMember-Dsl2GKI1.js.map} +1 -1
- package/dist/ViewTeamMember-bmry5QZ0.js +7 -0
- package/dist/{customerSupportTicketRoutes-DvfXGaSC.js → customerSupportTicketRoutes-BjqjQc9A.js} +8 -8
- package/dist/{customerSupportTicketRoutes-DvfXGaSC.js.map → customerSupportTicketRoutes-BjqjQc9A.js.map} +1 -1
- package/dist/index.d.ts +1015 -980
- package/dist/index.js +50 -50
- package/dist/{saved_filter-erjEgsdK.js → saved_filter-DXWnU4Zb.js} +5 -5
- package/dist/{saved_filter-erjEgsdK.js.map → saved_filter-DXWnU4Zb.js.map} +1 -1
- package/dist/{src-DSF_hIBe.js → src-B7oHTH_y.js} +215 -163
- package/dist/src-B7oHTH_y.js.map +1 -0
- package/dist/{staffSupportTicketRoutes-73ceKhL-.js → staffSupportTicketRoutes-CeuduGmG.js} +8 -8
- package/dist/{staffSupportTicketRoutes-73ceKhL-.js.map → staffSupportTicketRoutes-CeuduGmG.js.map} +1 -1
- package/dist/{teamRoutes-CSBq1DNq.js → teamRoutes-A7plQKi0.js} +11 -11
- package/dist/{teamRoutes-CSBq1DNq.js.map → teamRoutes-A7plQKi0.js.map} +1 -1
- package/dist/{team_memberRoutes-BgjY9Kwq.js → team_memberRoutes-mO1f-Y4o.js} +7 -7
- package/dist/{team_memberRoutes-BgjY9Kwq.js.map → team_memberRoutes-mO1f-Y4o.js.map} +1 -1
- package/dist/useAuthFlowNextStep-zlvxflBZ.js +64 -0
- package/dist/useAuthFlowNextStep-zlvxflBZ.js.map +1 -0
- package/dist/{useEmailVerificationChannel-C76Gnyi1.js → useEmailVerificationChannel-DYiMSAES.js} +2 -2
- package/dist/{useEmailVerificationChannel-C76Gnyi1.js.map → useEmailVerificationChannel-DYiMSAES.js.map} +1 -1
- package/dist/{useMutation-BLNuJoYl.js → useMutation-BXSu7_-s.js} +6 -4
- package/dist/useMutation-BXSu7_-s.js.map +1 -0
- package/dist/{useQuery-BzUGEOj0.js → useQuery-DownvLRA.js} +4 -4
- package/dist/{useQuery-BzUGEOj0.js.map → useQuery-DownvLRA.js.map} +1 -1
- package/dist/{useQueryCache-alzaRWEb.js → useQueryCache-CUTrwJWX.js} +2 -2
- package/dist/{useQueryCache-alzaRWEb.js.map → useQueryCache-CUTrwJWX.js.map} +1 -1
- package/dist/{useRpcAuth-CJtq1dqM.js → useRpcAuth-BFdprNWb.js} +5 -7
- package/dist/useRpcAuth-BFdprNWb.js.map +1 -0
- package/dist/{userAuthorized-3RiCDXxr.js → userAuthorized-qmzUYDa-.js} +2 -2
- package/dist/{userAuthorized-3RiCDXxr.js.map → userAuthorized-qmzUYDa-.js.map} +1 -1
- package/package.json +2 -2
- package/dist/ChangePasswordPage-D1LGJ02W.js +0 -7
- package/dist/ConsentRequired-Bhkxu0rv.js.map +0 -1
- package/dist/CreateTeamForm-BHgTTHAk.js +0 -12
- package/dist/CreateTeamMemberForm-CayF2tIJ.js +0 -12
- package/dist/CreateUserPage-C9uOeYDJ.js +0 -7
- package/dist/CreditBalanceDashboard-DZQqekKa.js +0 -13
- package/dist/CreditManagement-ByFH6IHV.js +0 -13
- package/dist/CustomerCreateSupportTicketForm-CroUyX15.js +0 -14
- package/dist/CustomerSupportTicketList-CpOaBgNr.js +0 -64
- package/dist/CustomerSupportTicketParent-D3Gj4Hel.js +0 -8
- package/dist/CustomerSupportTicketSuccess-BPUwEn4h.js +0 -12
- package/dist/EditTeamForm-KX2cNn24.js +0 -12
- package/dist/EditTeamMemberForm-Bh6zVNyJ.js +0 -9
- package/dist/EditUserPage-AcRFhChk.js +0 -8
- package/dist/ExternalLinkIcon-BKVV5Gjm.js +0 -34
- package/dist/ExternalLinkIcon-BKVV5Gjm.js.map +0 -1
- package/dist/ForgotPassword-LnjRUIY7.js +0 -8
- package/dist/LoginForm-D-gfB2hS.js +0 -8
- package/dist/Logout-Ctq-a1GS.js +0 -8
- package/dist/MfaSetup-6E6apXWC.js +0 -9
- package/dist/MfaVerify-C95WB9v2.js +0 -9
- package/dist/ResetPassword-9DFz-Qt3.js +0 -8
- package/dist/Signup-C052ykf5.js +0 -9
- package/dist/Signup-KuiKHB4h.js.map +0 -1
- package/dist/StaffCreateSupportTicketForm-DYEddYii.js +0 -14
- package/dist/StaffSupportTicketList-CxV6u2gF.js +0 -64
- package/dist/StaffSupportTicketParent-Dyybqx74.js +0 -8
- package/dist/StaffSupportTicketSuccess-FfnJXc_k.js +0 -12
- package/dist/TeamAttachmentsTab-D0DOmdnr.js +0 -64
- package/dist/TeamHistoryTab-wRpRizDE.js +0 -6
- package/dist/TeamList-hmP44hfw.js +0 -8
- package/dist/TeamMemberList-B16SuLwM.js +0 -7
- package/dist/TeamMemberParent-BJl8nBmP.js +0 -10
- package/dist/TeamNotesTab-BQN9niw-.js +0 -8
- package/dist/TeamParent-BI9ItLoY.js +0 -11
- package/dist/UserListPage-9jhUu3TH.js +0 -5
- package/dist/UserProfilePage-Dmxp7oqP.js +0 -8
- package/dist/VerifyEmail-DBKMZJMx.js +0 -10
- package/dist/ViewTeam-DEOe7wqT.js +0 -8
- package/dist/ViewTeamMember-B5U8kZBw.js +0 -7
- package/dist/src-DSF_hIBe.js.map +0 -1
- package/dist/useMutation-BLNuJoYl.js.map +0 -1
- package/dist/useRpcAuth-CJtq1dqM.js.map +0 -1
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"useMutation-BLNuJoYl.js","names":[],"sources":["../src/composables/useMutation.ts"],"sourcesContent":["import type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { shallowRef, type ShallowRef } from 'vue';\nimport { getRefreshTokenHandler } from '../utils/EnhancedRefreshTokenHandler';\nimport type { MutationFunction, UseMutationOptions } from './types';\nimport { queryCache } from './useQueryCache';\nimport { executeWithAuth } from './useRpcAuth';\n\nexport interface UseMutationReturn<TInput, TOutput> {\n data: ShallowRef<TOutput | null>;\n loading: ShallowRef<boolean>;\n error: ShallowRef<Error | null>;\n mutate: (input: TInput) => Promise<TOutput>;\n reset: () => void;\n}\n\nexport function useMutation<\n TApi extends Record<string, any> = DragoncoreApi,\n TInput = any,\n TOutput = any,\n>(\n mutationFn: MutationFunction<TApi, TInput, TOutput>,\n options?: UseMutationOptions<TInput, TOutput>,\n): UseMutationReturn<TInput, TOutput> {\n // Get the global refresh token handler - Dragoncore handles this automatically\n const refreshTokenHandler = getRefreshTokenHandler();\n const loading = shallowRef(false);\n const error = shallowRef<Error | null>(null);\n const data = shallowRef<TOutput | null>(null);\n\n const mutate = async (input: TInput): Promise<TOutput> => {\n loading.value = true;\n error.value = null;\n\n try {\n // Skip auth check for public endpoints (signup) or login/logout operations\n const skipAuthCheck = options?.skipAuthCheck || options?.credentials === 'include';\n const authTokenOverride = options?.customAuthToken?.(input);\n const result = await executeWithAuth<TApi, TOutput>(\n (batch) => mutationFn(batch, input),\n {\n credentials: options?.credentials,\n skipAuthCheck,\n authTokenOverride,\n refreshTokenHandler,\n },\n );\n data.value = result;\n\n // Invalidate related queries\n if (options?.invalidate) {\n if (Array.isArray(options.invalidate)) {\n options.invalidate.forEach((key) => queryCache.invalidate(key));\n } else {\n queryCache.invalidate(options.invalidate);\n }\n }\n\n // Call success callback\n if (options?.onSuccess) {\n options.onSuccess(result, input);\n }\n\n return result;\n } catch (e) {\n error.value = e instanceof Error ? e : new Error('Unknown error');\n\n // Call error callback\n if (options?.onError) {\n options.onError(error.value, input);\n }\n\n throw e;\n } finally {\n loading.value = false;\n }\n };\n\n const reset = () => {\n data.value = null;\n error.value = null;\n loading.value = false;\n };\n\n return { mutate, loading, error, data, reset };\n}\n"],"mappings":";;;;;;AAeA,SAAgB,YAKd,YACA,SACoC;CAEpC,MAAM,sBAAsB,wBAAwB;CACpD,MAAM,UAAU,WAAW,MAAM;CACjC,MAAM,QAAQ,WAAyB,KAAK;CAC5C,MAAM,OAAO,WAA2B,KAAK;CAE7C,MAAM,SAAS,OAAO,UAAoC;AACxD,UAAQ,QAAQ;AAChB,QAAM,QAAQ;AAEd,MAAI;GAEF,MAAM,gBAAgB,SAAS,iBAAiB,SAAS,gBAAgB;GACzE,MAAM,oBAAoB,SAAS,kBAAkB,MAAM;GAC3D,MAAM,SAAS,MAAM,iBAClB,UAAU,WAAW,OAAO,MAAM,EACnC;IACE,aAAa,SAAS;IACtB;IACA;IACA;IACD,CACF;AACD,QAAK,QAAQ;AAGb,OAAI,SAAS,WACX,KAAI,MAAM,QAAQ,QAAQ,WAAW,CACnC,SAAQ,WAAW,SAAS,QAAQ,WAAW,WAAW,IAAI,CAAC;OAE/D,YAAW,WAAW,QAAQ,WAAW;AAK7C,OAAI,SAAS,UACX,SAAQ,UAAU,QAAQ,MAAM;AAGlC,UAAO;WACA,GAAG;AACV,SAAM,QAAQ,aAAa,QAAQ,oBAAI,IAAI,MAAM,gBAAgB;AAGjE,OAAI,SAAS,QACX,SAAQ,QAAQ,MAAM,OAAO,MAAM;AAGrC,SAAM;YACE;AACR,WAAQ,QAAQ;;;CAIpB,MAAM,cAAc;AAClB,OAAK,QAAQ;AACb,QAAM,QAAQ;AACd,UAAQ,QAAQ;;AAGlB,QAAO;EAAE;EAAQ;EAAS;EAAO;EAAM;EAAO"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"useRpcAuth-CJtq1dqM.js","names":["createAppBatch","refreshError: any","createAppBatch","headers: HeadersInit","globalRouter: Router | null","error: any","headers: HeadersInit","method: any"],"sources":["../src/composables/useEnv.ts","../src/utils/logger.ts","../src/composables/useUserSessionStore.ts","../src/composables/useRpc.ts","../src/composables/useRpcAuth.ts"],"sourcesContent":["import { readonly } from 'vue';\n\nexport function useEnv() {\n const env = {\n restApiClient: {\n apiUrl: import.meta.env.VITE_API_CLIENT_URL as string,\n authOptions: {\n userDetails: import.meta.env.VITE_CF_APP_USER_DETAILS as string,\n accessToken: import.meta.env.VITE_CF_APP_ACCESS_TOKEN as string,\n decodedToken: import.meta.env.VITE_CF_APP_DECODED_TOKEN as string,\n },\n },\n allowUserSignup: import.meta.env.VITE_ALLOW_USER_SIGNUP === 'true',\n /** 'disabled' | 'soft' | 'strict' - undefined treated as 'disabled' */\n emailVerificationMode: (import.meta.env.VITE_EMAIL_VERIFICATION_MODE as\n | 'disabled'\n | 'soft'\n | 'strict'\n | undefined) ?? 'disabled',\n maxAttachmentFileSize: import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB\n ? parseInt(import.meta.env.VITE_MAX_ATTACHMENT_FILE_SIZE_MB, 10) * 1024 * 1024\n : 50 * 1024 * 1024, // Default: 50MB (convert MB to bytes)\n };\n\n return readonly(env);\n}\n","/**\n * Log levels as string literals\n */\nexport const LOG_LEVEL = {\n NONE: 'NONE',\n ERROR: 'ERROR',\n WARN: 'WARN',\n INFO: 'INFO',\n DEBUG: 'DEBUG',\n TRACE: 'TRACE',\n} as const;\n\nexport type LogLevel = (typeof LOG_LEVEL)[keyof typeof LOG_LEVEL];\n\n/**\n * Logger utility that conditionally logs based on configured log level\n */\nexport class Logger {\n private static instance: Logger;\n private logLevel: LogLevel = LOG_LEVEL.INFO; // Default log level\n\n private constructor() {\n this.setLogLevelFromEnv();\n }\n\n /**\n * Get the singleton logger instance\n */\n public static getInstance(): Logger {\n if (!Logger.instance) {\n Logger.instance = new Logger();\n }\n return Logger.instance;\n }\n\n /**\n * Set the log level from environment variables\n */\n private setLogLevelFromEnv(): void {\n // Check for explicit log level setting\n const logLevelStr = (import.meta.env.VITE_LOG_LEVEL as string) || '';\n\n if (logLevelStr) {\n switch (logLevelStr.toUpperCase()) {\n case 'NONE':\n this.logLevel = LOG_LEVEL.NONE;\n break;\n case 'ERROR':\n this.logLevel = LOG_LEVEL.ERROR;\n break;\n case 'WARN':\n this.logLevel = LOG_LEVEL.WARN;\n break;\n case 'INFO':\n this.logLevel = LOG_LEVEL.INFO;\n break;\n case 'DEBUG':\n this.logLevel = LOG_LEVEL.DEBUG;\n break;\n case 'TRACE':\n this.logLevel = LOG_LEVEL.TRACE;\n break;\n }\n } else {\n // If no explicit log level, set based on environment\n const isDev =\n import.meta.env.DEV === true ||\n import.meta.env.MODE === 'development' ||\n import.meta.env.VITE_APP_ENV === 'local' ||\n import.meta.env.VITE_APP_ENV === 'dev';\n\n this.logLevel = isDev ? LOG_LEVEL.DEBUG : LOG_LEVEL.INFO;\n }\n\n console.log(`[Logger] Log level set to: ${this.logLevel.toUpperCase()}`);\n }\n\n /**\n * Set the log level programmatically\n */\n public setLogLevel(level: LogLevel): void {\n this.logLevel = level;\n console.log(`[Logger] Log level changed to: ${this.logLevel.toUpperCase()}`);\n }\n\n /**\n * Get the current log level\n */\n public getLogLevel(): LogLevel {\n return this.logLevel;\n }\n\n /**\n * Determine if a message at the given level should be logged\n * based on the current log level setting\n */\n private shouldLog(level: LogLevel): boolean {\n // Define log level hierarchy (higher number = more verbose)\n const levelPriority = {\n [LOG_LEVEL.NONE]: 0,\n [LOG_LEVEL.ERROR]: 1,\n [LOG_LEVEL.WARN]: 2,\n [LOG_LEVEL.INFO]: 3,\n [LOG_LEVEL.DEBUG]: 4,\n [LOG_LEVEL.TRACE]: 5,\n };\n\n // Compare current log level with requested level\n // Only log if the current level is equal to or higher than the requested level\n return levelPriority[this.logLevel] >= levelPriority[level];\n }\n\n /**\n * Log a trace message (most verbose)\n */\n public trace(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.TRACE)) {\n console.log(`[TRACE] ${message}`, ...args);\n }\n }\n\n /**\n * Log a debug message\n */\n public debug(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.DEBUG)) {\n console.debug(`[DEBUG] ${message}`, ...args);\n }\n }\n\n /**\n * Log an info message\n */\n public info(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.INFO)) {\n console.log(`[INFO] ${message}`, ...args);\n }\n }\n\n /**\n * Log a warning message\n */\n public warn(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.WARN)) {\n console.warn(`[WARN] ${message}`, ...args);\n }\n }\n\n /**\n * Log an error message\n */\n public error(message: string, ...args: any[]): void {\n if (this.shouldLog(LOG_LEVEL.ERROR)) {\n console.error(`[ERROR] ${message}`, ...args);\n }\n }\n}\n\n// Export a singleton instance for easy use throughout the app\nexport const logger = Logger.getInstance();\n\n/**\n * Conditionally log based on per-instance debug flag and global log level\n * - If debug === false: never log (explicitly disabled)\n * - If debug === true: always log (bypasses global log level)\n * - If debug === undefined: use global log level (default behavior)\n */\nexport function logIfEnabled(\n level: 'debug' | 'error' | 'warn' | 'info',\n message: string,\n debug: boolean | undefined,\n ...args: any[]\n): void {\n if (debug === false) return; // Explicitly disabled\n if (debug === true) {\n // Explicitly enabled - log directly bypassing global log level\n const prefix = `[${level.toUpperCase()}]`;\n if (level === 'error') console.error(prefix, message, ...args);\n else if (level === 'warn') console.warn(prefix, message, ...args);\n else console.log(prefix, message, ...args);\n return;\n }\n // Otherwise use logger which respects global log level\n if (level === 'debug') logger.debug(message, ...args);\n else if (level === 'error') logger.error(message, ...args);\n else if (level === 'warn') logger.warn(message, ...args);\n else logger.info(message, ...args);\n}\n","import { jwtDecode } from 'jwt-decode';\nimport { defineStore } from 'pinia';\nimport { computed, ref, watchEffect } from 'vue';\nimport type { UserAppSession, UserDetailsTokenPayload } from '../lib/models/userSession';\nimport { logIfEnabled, logger } from '../utils/logger';\nimport { useEnv } from './useEnv';\nimport { createAppBatch } from './useRpc';\n\n/**\n * Generic user session store for Dragoncore applications.\n *\n * Responsibilities:\n * - Store and manage user session state (accessToken, userSession)\n * - Sync with localStorage\n * - Provide token refresh capability\n * - Provide token expiration checking\n *\n * Note: This store is intentionally NOT generic on TApi.\n * The refresh method uses createAppBatch which can be typed on a per-call basis.\n */\nexport const useUserSessionStore = defineStore('userSession', () => {\n const env = useEnv().restApiClient;\n const userSession = ref<UserAppSession | null>(null);\n const accessToken = ref<string | null>(null);\n const decodedToken = ref<any | null>(null);\n const isRefreshing = ref(false);\n const debug = ref<boolean>(false);\n\n // Watch localStorage for external changes and update our reactive refs\n watchEffect(() => {\n // Check if localStorage keys are properly defined\n if (!env.authOptions.accessToken || !env.authOptions.userDetails) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] localStorage keys are undefined - check environment variables',\n debug.value,\n );\n return;\n }\n\n const storedAccessToken = localStorage.getItem(env.authOptions.accessToken);\n if (storedAccessToken !== accessToken.value) {\n accessToken.value = storedAccessToken;\n try {\n decodedToken.value = storedAccessToken ? jwtDecode(storedAccessToken) : null;\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode access token:',\n debug.value,\n error,\n );\n decodedToken.value = null;\n }\n }\n\n const storedUserSession = localStorage.getItem(env.authOptions.userDetails);\n if (storedUserSession) {\n try {\n const decoded = jwtDecode<UserDetailsTokenPayload>(storedUserSession);\n // Extract the actual session data from the nested 'details' field\n const sessionData = decoded.details;\n if (JSON.stringify(sessionData) !== JSON.stringify(userSession.value)) {\n userSession.value = sessionData;\n }\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode user session:',\n debug.value,\n error,\n );\n if (userSession.value !== null) {\n userSession.value = null;\n }\n }\n } else if (userSession.value !== null) {\n userSession.value = null;\n }\n });\n\n const currentSession = computed(() => {\n if (!userSession.value) {\n return null;\n }\n return userSession.value;\n });\n\n const clientHeaders = computed(() => ({\n 'Content-Type': 'application/json',\n ...(accessToken.value ? { Authorization: `Bearer ${accessToken.value}` } : {}),\n }));\n\n /**\n * Refresh the access token using the refresh token (from HTTP-only cookie).\n * This method uses createAppBatch directly to avoid circular dependencies.\n *\n * @returns true if refresh was successful, false otherwise\n */\n async function refreshToken<\n TApi extends {\n userSessions: {\n refreshToken(): Promise<{ access_token: string; user_details_token: string }>;\n };\n },\n >(): Promise<boolean> {\n try {\n if (isRefreshing.value) {\n logIfEnabled('debug', '[RefreshToken] Token refresh already in progress', debug.value);\n return false;\n }\n\n isRefreshing.value = true;\n logIfEnabled('debug', '[RefreshToken] Starting token refresh', debug.value);\n\n // Check if refresh token is expired (if we have session data)\n if (userSession.value) {\n const tokenStatus = isTokenExpired();\n if (tokenStatus.refreshTokenExpired) {\n logIfEnabled(\n 'warn',\n '[RefreshToken] Refresh token is already expired, cannot refresh',\n debug.value,\n );\n return false;\n }\n }\n\n // Use createAppBatch directly - refresh endpoint is public and doesn't need auth wrapper\n // credentials: 'include' allows the HTTP-only refresh token cookie to be sent\n const batch = createAppBatch<TApi>({\n credentials: 'include',\n trackedSegment: 'userSessions.refreshToken',\n });\n const tokens = await batch.userSessions.refreshToken();\n\n if (!tokens || !tokens.access_token || !tokens.user_details_token) {\n logIfEnabled(\n 'error',\n '[RefreshToken] Invalid response from refresh endpoint',\n debug.value,\n );\n return false;\n }\n\n // Set both tokens using existing validation logic\n setSession(tokens.user_details_token);\n setAccessToken(tokens.access_token);\n\n // Verify that both components of the session were properly updated\n const sessionUpdated = !!userSession.value && !!accessToken.value;\n if (!sessionUpdated) {\n logIfEnabled(\n 'error',\n '[RefreshToken] Failed to update all session components',\n debug.value,\n );\n return false;\n }\n\n // Verify the new tokens are not expired\n const newTokenStatus = isTokenExpired();\n if (newTokenStatus.accessTokenExpired) {\n logIfEnabled(\n 'error',\n '[RefreshToken] New access token is already expired!',\n debug.value,\n );\n return false;\n }\n\n logIfEnabled('debug', '[RefreshToken] Token refresh successful', debug.value);\n return true;\n } catch (refreshError: any) {\n logIfEnabled('error', '[RefreshToken] Token refresh failed:', debug.value, refreshError);\n return false;\n } finally {\n isRefreshing.value = false;\n }\n }\n\n /**\n * Check if tokens are expired\n */\n function isTokenExpired(): { accessTokenExpired: boolean; refreshTokenExpired: boolean } {\n const now = Date.now() / 1000;\n\n // Access token expiration check\n const accessTokenExpired = decodedToken.value?.exp ? decodedToken.value.exp < now : true;\n\n // Refresh token expiration check\n const refreshTokenExpired = userSession.value?.expires_at\n ? new Date(userSession.value.expires_at).getTime() / 1000 < now\n : true;\n\n return { accessTokenExpired, refreshTokenExpired };\n }\n\n /**\n * Set the user session (stored in localStorage as JWT)\n */\n function setSession(token: string | null) {\n if (token) {\n try {\n const decoded = jwtDecode<UserDetailsTokenPayload>(token);\n // Extract the actual session data from the nested 'details' field\n userSession.value = decoded.details;\n localStorage.setItem(env.authOptions.userDetails, token);\n logIfEnabled('debug', '[SetSession] User session set successfully', debug.value);\n } catch (error) {\n logger.error('[SetSession] Failed to decode user session token:', error);\n userSession.value = null;\n localStorage.removeItem(env.authOptions.userDetails);\n }\n } else {\n userSession.value = null;\n localStorage.removeItem(env.authOptions.userDetails);\n logIfEnabled('debug', '[SetSession] User session cleared', debug.value);\n }\n }\n\n /**\n * Set the access token (stored in localStorage as JWT string)\n */\n function setAccessToken(token: string | null) {\n if (token) {\n try {\n const decoded = jwtDecode(token);\n accessToken.value = token;\n decodedToken.value = decoded;\n localStorage.setItem(env.authOptions.accessToken, token);\n logIfEnabled('debug', '[SetAccessToken] Access token set successfully', debug.value);\n } catch (error) {\n logger.error('[SetAccessToken] Failed to decode access token:', error);\n accessToken.value = null;\n decodedToken.value = null;\n localStorage.removeItem(env.authOptions.accessToken);\n // Also clear user session if we're clearing the access token\n if (userSession.value) {\n userSession.value = null;\n localStorage.removeItem(env.authOptions.userDetails);\n }\n }\n } else {\n accessToken.value = null;\n decodedToken.value = null;\n localStorage.removeItem(env.authOptions.accessToken);\n logIfEnabled('debug', '[SetAccessToken] Access token cleared', debug.value);\n }\n }\n\n /**\n * Clear all session data\n */\n function clearSession() {\n setSession(null);\n setAccessToken(null);\n }\n\n /**\n * Re-read session from localStorage and update in-memory state.\n * Use when another tab may have updated localStorage (e.g. after email verification).\n */\n function syncFromStorage() {\n if (!env.authOptions.accessToken || !env.authOptions.userDetails) return;\n\n const storedAccessToken = localStorage.getItem(env.authOptions.accessToken);\n if (storedAccessToken !== accessToken.value) {\n accessToken.value = storedAccessToken;\n try {\n decodedToken.value = storedAccessToken ? jwtDecode(storedAccessToken) : null;\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode access token:',\n debug.value,\n error,\n );\n decodedToken.value = null;\n }\n }\n\n const storedUserSession = localStorage.getItem(env.authOptions.userDetails);\n if (storedUserSession) {\n try {\n const decoded = jwtDecode<UserDetailsTokenPayload>(storedUserSession);\n const sessionData = decoded.details;\n if (JSON.stringify(sessionData) !== JSON.stringify(userSession.value)) {\n userSession.value = sessionData;\n }\n } catch (error) {\n logIfEnabled(\n 'error',\n '[UserSessionStore] Failed to decode user session:',\n debug.value,\n error,\n );\n if (userSession.value !== null) {\n userSession.value = null;\n }\n }\n } else if (userSession.value !== null) {\n userSession.value = null;\n }\n }\n\n return {\n // State\n userSession,\n currentSession,\n accessToken,\n clientHeaders,\n debug,\n // Methods\n setSession,\n setAccessToken,\n clearSession,\n refreshToken,\n syncFromStorage,\n isTokenExpired,\n };\n});\n","import { newHttpBatchRpcSession, type RpcStub } from 'capnweb';\nimport type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { useEnv } from './useEnv';\nimport { useUserSessionStore } from './useUserSessionStore';\n\n/**\n * Creates a fresh RPC batch session with authentication headers.\n * Each call creates a new session, which is the correct pattern for Cap'n Web RPC.\n *\n * This is the simple version - just creates a batch with auth headers.\n * For advanced features (token refresh, retry, tracked sessions), use executeWithAuth from useRpcAuth.\n *\n * @param options - Optional configuration for the RPC batch\n * @param options.credentials - Credentials mode for the request. Use 'include' for login/logout/refreshToken to allow cookies.\n * @param options.trackedSegment - Path segment to append to /rpc for metrics/tracking (e.g. 'userSessions.refreshToken').\n */\nexport function createAppBatch<TApi extends Record<string, any> = DragoncoreApi>(options?: {\n credentials?: RequestCredentials;\n trackedSegment?: string;\n}): RpcStub<TApi> {\n const userStore = useUserSessionStore();\n const env = useEnv();\n\n const headers: HeadersInit = {};\n // Pinia stores auto-unwrap refs, so accessToken is already string | null\n const accessToken = userStore.accessToken;\n if (accessToken) {\n headers['Authorization'] = `Bearer ${accessToken}`;\n }\n\n const baseUrl = env.restApiClient.apiUrl + '/rpc';\n const url = options?.trackedSegment ? `${baseUrl}/${options.trackedSegment}` : baseUrl;\n\n // Create a Request object with headers (capnweb accepts Request objects)\n const request = new Request(url, {\n method: 'POST', // Will be overridden by capnweb, but required for Request constructor\n headers,\n credentials: options?.credentials ?? 'omit', // Use 'include' for login/logout/refreshToken\n });\n\n return newHttpBatchRpcSession<TApi>(request);\n}\n","import type { DragoncoreApi } from '@dragonmastery/dragoncore-shared';\nimport { newHttpBatchRpcSession, type RpcStub } from 'capnweb';\nimport type { Router } from 'vue-router';\nimport { useEnv } from './useEnv';\nimport { useUserSessionStore } from './useUserSessionStore';\n\n/**\n * Auth error codes that should trigger token refresh\n */\nconst AUTH_ERROR_CODES = [\n 'ACCESS_TOKEN_EXPIRED',\n 'ACCESS_TOKEN_REVOKED',\n 'NO_ACCESS_TOKEN',\n 'NO_REFRESH_TOKEN',\n];\n\n/** Business error codes for frontend handling (e.g. redirects) */\nconst BusinessErrorCode = {\n EMAIL_VERIFICATION_REQUIRED: 'EMAIL_VERIFICATION_REQUIRED',\n CONSENT_REQUIRED: 'CONSENT_REQUIRED',\n} as const;\n\nexport const BATCH_MODE = {\n batch: 'batch',\n tracked: 'tracked',\n} as const;\n\nexport type BatchMode = (typeof BATCH_MODE)[keyof typeof BATCH_MODE];\n\n/**\n * Check if an error is an auth error that should trigger refresh\n */\nfunction isAuthError(error: any): boolean {\n if (!error) return false;\n\n // Unwrap InternalServerError to get original error\n let actualError = error;\n if (error.name === 'InternalServerError' && error.originalError) {\n actualError = error.originalError;\n }\n\n // Check for AuthenticationError class name\n if (actualError.name === 'AuthenticationError' || error.name === 'AuthenticationError') {\n return true;\n }\n\n // Check for error code property\n if (actualError.code && AUTH_ERROR_CODES.includes(actualError.code)) return true;\n if (error.code && AUTH_ERROR_CODES.includes(error.code)) return true;\n\n // Check error message for auth error patterns\n const errorMessage = actualError.message || error.message || String(error);\n if (AUTH_ERROR_CODES.some((code) => errorMessage.includes(code))) return true;\n\n // Check for common auth error strings\n if (\n errorMessage.includes('Unauthorized') ||\n errorMessage.includes('authentication') ||\n errorMessage.includes('token')\n ) {\n // Only treat as auth error if it's clearly an auth issue\n return (\n errorMessage.toLowerCase().includes('expired') ||\n errorMessage.toLowerCase().includes('revoked') ||\n errorMessage.toLowerCase().includes('invalid token') ||\n errorMessage.toLowerCase().includes('no refresh token')\n );\n }\n\n return false;\n}\n\n/**\n * Global router instance.\n * Set this once in your app's initialization.\n */\nlet globalRouter: Router | null = null;\n\n/**\n * Set the global router instance for your application.\n * Call this once during app initialization.\n */\nexport function setRouter(router: Router): void {\n globalRouter = router;\n}\n\n/**\n * Get the global router instance.\n * This is used internally by executeWithAuth for navigation.\n *\n * @throws Error if router is not set\n */\nfunction getRouter(): Router {\n if (!globalRouter) {\n throw new Error('Router not initialized. Call setRouter() in your app initialization.');\n }\n return globalRouter;\n}\n\n/**\n * Push to logout with returnUrl so user can return to their intended destination after re-login.\n * Validates path: must start with / and not /auth/ to avoid loops.\n */\nfunction pushToLogout() {\n const router = getRouter();\n const currentPath = router.currentRoute.value.fullPath;\n const returnUrl =\n currentPath.startsWith('/') && !currentPath.startsWith('/auth/') ? currentPath : undefined;\n const query = returnUrl ? { returnUrl } : {};\n return router.push({ path: '/auth/logout', query });\n}\n\n/**\n * Check if token needs refresh before making a request\n */\nfunction needsRefresh(userStore: ReturnType<typeof useUserSessionStore>): boolean {\n if (!userStore.accessToken) {\n return true;\n }\n const { accessTokenExpired, refreshTokenExpired } = userStore.isTokenExpired();\n return accessTokenExpired || refreshTokenExpired;\n}\n\n/**\n * Attempt to refresh the token using the provided handler\n */\nasync function attemptRefresh(\n userStore: ReturnType<typeof useUserSessionStore>,\n refreshTokenHandler: {\n shouldAttemptRefresh(): boolean;\n performRefreshWithStrategies(): Promise<{\n access_token: string;\n user_details_token: string;\n }>;\n },\n): Promise<boolean> {\n try {\n if (!userStore.currentSession && !userStore.accessToken) {\n return false;\n }\n\n if (userStore.currentSession) {\n const { refreshTokenExpired } = userStore.isTokenExpired();\n if (refreshTokenExpired) {\n await pushToLogout();\n return false;\n }\n }\n\n if (!refreshTokenHandler.shouldAttemptRefresh()) {\n return false;\n }\n\n const tokens = await refreshTokenHandler.performRefreshWithStrategies();\n userStore.setSession(tokens.user_details_token);\n userStore.setAccessToken(tokens.access_token);\n return true;\n } catch (error: any) {\n console.error('[RPC Auth] Refresh attempt failed:', {\n error,\n name: error?.name,\n message: error?.message,\n code: error?.code,\n originalError: error?.originalError,\n });\n\n // Unwrap InternalServerError to check original error\n const actualError = error?.originalError || error;\n const errorMessage = (actualError?.message || error?.message || '').toUpperCase();\n const originalErrorMessage = (error?.originalError?.message || '').toUpperCase();\n const combinedMessage = `${errorMessage} ${originalErrorMessage}`;\n\n const criticalError =\n combinedMessage.includes('NO_REFRESH_TOKEN') ||\n combinedMessage.includes('REFRESH_TOKEN_EXPIRED') ||\n combinedMessage.includes('REFRESH_TOKEN_REVOKED') ||\n combinedMessage.includes('INVALID REFRESH TOKEN') ||\n combinedMessage.includes('NO REFRESH TOKEN FOUND');\n\n if (criticalError) {\n await pushToLogout();\n }\n return false;\n }\n}\n\n/**\n * Create a base RPC batch with current auth token\n */\nexport function createAppBatch<TApi extends Record<string, any> = DragoncoreApi>(options?: {\n credentials?: RequestCredentials;\n mode?: BatchMode;\n trackedSegment?: string;\n /** Override auth token (e.g. signup_consent token). When set, used instead of access token. */\n authTokenOverride?: string;\n}): RpcStub<TApi> {\n const userStore = useUserSessionStore();\n const env = useEnv();\n\n const headers: HeadersInit = {};\n const token = options?.authTokenOverride ?? userStore.accessToken;\n if (token) {\n headers['Authorization'] = `Bearer ${token}`;\n }\n\n const request = new Request(env.restApiClient.apiUrl + '/rpc', {\n method: 'POST',\n headers,\n credentials: options?.credentials ?? 'omit',\n });\n\n // If mode is batch and no tracked segment is provided then we can just return the batch\n if (options?.mode === BATCH_MODE.batch && !options?.trackedSegment) {\n return newHttpBatchRpcSession<TApi>(request);\n }\n\n // Use tracked session for metrics (creates separate HTTP request per method)\n return createTrackedSession<TApi>(request, options?.trackedSegment);\n}\n\n/**\n * Execute an RPC call with automatic auth handling\n * - Checks token expiration before call\n * - Handles auth errors and retries after refresh\n *\n * @param fn - Function that receives an RPC batch and returns a promise\n * @param options - Configuration options\n * @param options.refreshTokenHandler - Instance of refresh token handler for your API type\n */\nexport async function executeWithAuth<\n TApi extends Record<string, any> = DragoncoreApi,\n T = any,\n>(\n fn: (batch: RpcStub<TApi>) => Promise<T>,\n options: {\n credentials?: RequestCredentials;\n skipAuthCheck?: boolean;\n mode?: BatchMode;\n trackedSegment?: string;\n /** Override auth token for this request (e.g. signup_consent token) */\n authTokenOverride?: string;\n refreshTokenHandler: {\n shouldAttemptRefresh(): boolean;\n performRefreshWithStrategies(): Promise<{\n access_token: string;\n user_details_token: string;\n }>;\n };\n },\n): Promise<T> {\n const userStore = useUserSessionStore();\n\n // Skip auth for login/logout/refreshToken/signupComplete (with custom token) operations\n if (options?.skipAuthCheck) {\n const batch = createAppBatch<TApi>({\n ...options,\n authTokenOverride: options.authTokenOverride,\n });\n return await fn(batch);\n }\n\n // Check if token needs refresh before making the request\n if (needsRefresh(userStore)) {\n const refreshed = await attemptRefresh(userStore, options.refreshTokenHandler);\n if (!refreshed) {\n // If refresh failed and we have no token, don't proceed\n if (!userStore.accessToken) {\n await pushToLogout();\n throw new Error('Authentication required');\n }\n // If we have a token but refresh failed, continue anyway (might be temporary)\n } else {\n // Verify the token is actually set\n if (!userStore.accessToken) {\n await pushToLogout();\n throw new Error('Token refresh failed to set access token');\n }\n }\n }\n\n // Execute the operation\n try {\n // Double-check we have a token before creating the batch\n if (!userStore.accessToken) {\n await pushToLogout();\n throw new Error('Authentication required');\n }\n const batch = createAppBatch<TApi>(options);\n return await fn(batch);\n } catch (error: any) {\n // If BusinessError with EMAIL_VERIFICATION_REQUIRED, redirect to verify-email\n const errorCode = error?.code ?? error?.originalError?.code;\n if (errorCode === BusinessErrorCode.EMAIL_VERIFICATION_REQUIRED) {\n const router = getRouter();\n const currentPath = router.currentRoute.value.fullPath;\n const returnUrl =\n currentPath.startsWith('/') && !currentPath.startsWith('/auth/') ? currentPath : undefined;\n await router.push({\n path: '/auth/verify-email',\n query: returnUrl ? { returnUrl } : {},\n });\n throw error;\n }\n\n // If BusinessError with CONSENT_REQUIRED, redirect to consent-required\n if (errorCode === BusinessErrorCode.CONSENT_REQUIRED) {\n const router = getRouter();\n const currentPath = router.currentRoute.value.fullPath;\n const returnUrl =\n currentPath.startsWith('/') && !currentPath.startsWith('/auth/') ? currentPath : undefined;\n await router.push({\n path: '/auth/consent-required',\n query: returnUrl ? { returnUrl } : {},\n });\n throw error;\n }\n\n // If auth error, refresh and retry once\n if (isAuthError(error)) {\n const refreshed = await attemptRefresh(userStore, options.refreshTokenHandler);\n if (refreshed) {\n const retryBatch = createAppBatch<TApi>(options);\n return await fn(retryBatch);\n }\n await pushToLogout();\n throw error;\n }\n throw error;\n }\n}\n\n/**\n * Create a tracked RPC session that appends method names to URL\n */\nfunction createTrackedSession<T extends Record<string, any> = DragoncoreApi>(\n request: Request,\n trackedSegment?: string,\n): RpcStub<T> {\n const baseUrl = request.url;\n // If trackedSegment is provided then we dont need to do any ofteh complex proxy stuff, append the segment to the url and return the batch\n if (trackedSegment) {\n return newHttpBatchRpcSession<T>(\n new Request(`${baseUrl}/${trackedSegment}`, {\n method: request.method,\n headers: request.headers,\n credentials: request.credentials,\n }),\n );\n }\n\n function createProxy(path: string[] = []): any {\n return new Proxy(() => {}, {\n get(_target, prop) {\n if (typeof prop === 'string') {\n return createProxy([...path, prop]);\n }\n return undefined;\n },\n\n apply(_target, _thisArg, args) {\n // Build the full method path (e.g., \"teams.getUserTeams\")\n const fullPath = path.join('.');\n\n // Clone the request with updated URL\n const trackedRequest = new Request(`${baseUrl}/${fullPath}`, {\n method: request.method,\n headers: request.headers,\n credentials: request.credentials,\n });\n\n // Create batch with the tracked URL\n const batch = newHttpBatchRpcSession<T>(trackedRequest);\n\n // Navigate to the right method on the batch\n let method: any = batch;\n for (const segment of path) {\n method = method[segment];\n }\n\n // Call with original arguments\n return method(...args);\n },\n });\n }\n\n return createProxy() as RpcStub<T>;\n}\n"],"mappings":";;;;;;AAEA,SAAgB,SAAS;AAsBvB,QAAO,SArBK;EACV,eAAe;GACb,QAAQ,OAAO,KAAK,IAAI;GACxB,aAAa;IACX,aAAa,OAAO,KAAK,IAAI;IAC7B,aAAa,OAAO,KAAK,IAAI;IAC7B,cAAc,OAAO,KAAK,IAAI;IAC/B;GACF;EACD,iBAAiB,OAAO,KAAK,IAAI,2BAA2B;EAE5D,uBAAwB,OAAO,KAAK,IAAI,gCAItB;EAClB,uBAAuB,OAAO,KAAK,IAAI,mCACnC,SAAS,OAAO,KAAK,IAAI,kCAAkC,GAAG,GAAG,OAAO,OACxE,KAAK,OAAO;EACjB,CAEmB;;;;;;;;ACrBtB,MAAa,YAAY;CACvB,MAAM;CACN,OAAO;CACP,MAAM;CACN,MAAM;CACN,OAAO;CACP,OAAO;CACR;;;;AAOD,IAAa,SAAb,MAAa,OAAO;CAClB,OAAe;CACf,AAAQ,WAAqB,UAAU;CAEvC,AAAQ,cAAc;AACpB,OAAK,oBAAoB;;;;;CAM3B,OAAc,cAAsB;AAClC,MAAI,CAAC,OAAO,SACV,QAAO,WAAW,IAAI,QAAQ;AAEhC,SAAO,OAAO;;;;;CAMhB,AAAQ,qBAA2B;EAEjC,MAAM,cAAe,OAAO,KAAK,IAAI,kBAA6B;AAElE,MAAI,YACF,SAAQ,YAAY,aAAa,EAAjC;GACE,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;GACF,KAAK;AACH,SAAK,WAAW,UAAU;AAC1B;;MAUJ,MAAK,WALH,OAAO,KAAK,IAAI,QAAQ,QACxB,OAAO,KAAK,IAAI,SAAS,iBACzB,OAAO,KAAK,IAAI,iBAAiB,WACjC,OAAO,KAAK,IAAI,iBAAiB,QAEX,UAAU,QAAQ,UAAU;AAGtD,UAAQ,IAAI,8BAA8B,KAAK,SAAS,aAAa,GAAG;;;;;CAM1E,AAAO,YAAY,OAAuB;AACxC,OAAK,WAAW;AAChB,UAAQ,IAAI,kCAAkC,KAAK,SAAS,aAAa,GAAG;;;;;CAM9E,AAAO,cAAwB;AAC7B,SAAO,KAAK;;;;;;CAOd,AAAQ,UAAU,OAA0B;EAE1C,MAAM,gBAAgB;IACnB,UAAU,OAAO;IACjB,UAAU,QAAQ;IAClB,UAAU,OAAO;IACjB,UAAU,OAAO;IACjB,UAAU,QAAQ;IAClB,UAAU,QAAQ;GACpB;AAID,SAAO,cAAc,KAAK,aAAa,cAAc;;;;;CAMvD,AAAO,MAAM,SAAiB,GAAG,MAAmB;AAClD,MAAI,KAAK,UAAU,UAAU,MAAM,CACjC,SAAQ,IAAI,WAAW,WAAW,GAAG,KAAK;;;;;CAO9C,AAAO,MAAM,SAAiB,GAAG,MAAmB;AAClD,MAAI,KAAK,UAAU,UAAU,MAAM,CACjC,SAAQ,MAAM,WAAW,WAAW,GAAG,KAAK;;;;;CAOhD,AAAO,KAAK,SAAiB,GAAG,MAAmB;AACjD,MAAI,KAAK,UAAU,UAAU,KAAK,CAChC,SAAQ,IAAI,UAAU,WAAW,GAAG,KAAK;;;;;CAO7C,AAAO,KAAK,SAAiB,GAAG,MAAmB;AACjD,MAAI,KAAK,UAAU,UAAU,KAAK,CAChC,SAAQ,KAAK,UAAU,WAAW,GAAG,KAAK;;;;;CAO9C,AAAO,MAAM,SAAiB,GAAG,MAAmB;AAClD,MAAI,KAAK,UAAU,UAAU,MAAM,CACjC,SAAQ,MAAM,WAAW,WAAW,GAAG,KAAK;;;AAMlD,MAAa,SAAS,OAAO,aAAa;;;;;;;AAQ1C,SAAgB,aACd,OACA,SACA,OACA,GAAG,MACG;AACN,KAAI,UAAU,MAAO;AACrB,KAAI,UAAU,MAAM;EAElB,MAAM,SAAS,IAAI,MAAM,aAAa,CAAC;AACvC,MAAI,UAAU,QAAS,SAAQ,MAAM,QAAQ,SAAS,GAAG,KAAK;WACrD,UAAU,OAAQ,SAAQ,KAAK,QAAQ,SAAS,GAAG,KAAK;MAC5D,SAAQ,IAAI,QAAQ,SAAS,GAAG,KAAK;AAC1C;;AAGF,KAAI,UAAU,QAAS,QAAO,MAAM,SAAS,GAAG,KAAK;UAC5C,UAAU,QAAS,QAAO,MAAM,SAAS,GAAG,KAAK;UACjD,UAAU,OAAQ,QAAO,KAAK,SAAS,GAAG,KAAK;KACnD,QAAO,KAAK,SAAS,GAAG,KAAK;;;;;;;;;;;;;;;;;ACtKpC,MAAa,sBAAsB,YAAY,qBAAqB;CAClE,MAAM,MAAM,QAAQ,CAAC;CACrB,MAAM,cAAc,IAA2B,KAAK;CACpD,MAAM,cAAc,IAAmB,KAAK;CAC5C,MAAM,eAAe,IAAgB,KAAK;CAC1C,MAAM,eAAe,IAAI,MAAM;CAC/B,MAAM,QAAQ,IAAa,MAAM;AAGjC,mBAAkB;AAEhB,MAAI,CAAC,IAAI,YAAY,eAAe,CAAC,IAAI,YAAY,aAAa;AAChE,gBACE,SACA,oFACA,MAAM,MACP;AACD;;EAGF,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,sBAAsB,YAAY,OAAO;AAC3C,eAAY,QAAQ;AACpB,OAAI;AACF,iBAAa,QAAQ,oBAAoB,UAAU,kBAAkB,GAAG;YACjE,OAAO;AACd,iBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,iBAAa,QAAQ;;;EAIzB,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,kBACF,KAAI;GAGF,MAAM,cAFU,UAAmC,kBAAkB,CAEzC;AAC5B,OAAI,KAAK,UAAU,YAAY,KAAK,KAAK,UAAU,YAAY,MAAM,CACnE,aAAY,QAAQ;WAEf,OAAO;AACd,gBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,OAAI,YAAY,UAAU,KACxB,aAAY,QAAQ;;WAGf,YAAY,UAAU,KAC/B,aAAY,QAAQ;GAEtB;CAEF,MAAM,iBAAiB,eAAe;AACpC,MAAI,CAAC,YAAY,MACf,QAAO;AAET,SAAO,YAAY;GACnB;CAEF,MAAM,gBAAgB,gBAAgB;EACpC,gBAAgB;EAChB,GAAI,YAAY,QAAQ,EAAE,eAAe,UAAU,YAAY,SAAS,GAAG,EAAE;EAC9E,EAAE;;;;;;;CAQH,eAAe,eAMO;AACpB,MAAI;AACF,OAAI,aAAa,OAAO;AACtB,iBAAa,SAAS,oDAAoD,MAAM,MAAM;AACtF,WAAO;;AAGT,gBAAa,QAAQ;AACrB,gBAAa,SAAS,yCAAyC,MAAM,MAAM;AAG3E,OAAI,YAAY,OAEd;QADoB,gBAAgB,CACpB,qBAAqB;AACnC,kBACE,QACA,mEACA,MAAM,MACP;AACD,YAAO;;;GAUX,MAAM,SAAS,MAJDA,iBAAqB;IACjC,aAAa;IACb,gBAAgB;IACjB,CAAC,CACyB,aAAa,cAAc;AAEtD,OAAI,CAAC,UAAU,CAAC,OAAO,gBAAgB,CAAC,OAAO,oBAAoB;AACjE,iBACE,SACA,yDACA,MAAM,MACP;AACD,WAAO;;AAIT,cAAW,OAAO,mBAAmB;AACrC,kBAAe,OAAO,aAAa;AAInC,OAAI,EADmB,CAAC,CAAC,YAAY,SAAS,CAAC,CAAC,YAAY,QACvC;AACnB,iBACE,SACA,0DACA,MAAM,MACP;AACD,WAAO;;AAKT,OADuB,gBAAgB,CACpB,oBAAoB;AACrC,iBACE,SACA,uDACA,MAAM,MACP;AACD,WAAO;;AAGT,gBAAa,SAAS,2CAA2C,MAAM,MAAM;AAC7E,UAAO;WACAC,cAAmB;AAC1B,gBAAa,SAAS,wCAAwC,MAAM,OAAO,aAAa;AACxF,UAAO;YACC;AACR,gBAAa,QAAQ;;;;;;CAOzB,SAAS,iBAAgF;EACvF,MAAM,MAAM,KAAK,KAAK,GAAG;AAUzB,SAAO;GAAE,oBAPkB,aAAa,OAAO,MAAM,aAAa,MAAM,MAAM,MAAM;GAOvD,qBAJD,YAAY,OAAO,aAC3C,IAAI,KAAK,YAAY,MAAM,WAAW,CAAC,SAAS,GAAG,MAAO,MAC1D;GAE8C;;;;;CAMpD,SAAS,WAAW,OAAsB;AACxC,MAAI,MACF,KAAI;AAGF,eAAY,QAFI,UAAmC,MAAM,CAE7B;AAC5B,gBAAa,QAAQ,IAAI,YAAY,aAAa,MAAM;AACxD,gBAAa,SAAS,8CAA8C,MAAM,MAAM;WACzE,OAAO;AACd,UAAO,MAAM,qDAAqD,MAAM;AACxE,eAAY,QAAQ;AACpB,gBAAa,WAAW,IAAI,YAAY,YAAY;;OAEjD;AACL,eAAY,QAAQ;AACpB,gBAAa,WAAW,IAAI,YAAY,YAAY;AACpD,gBAAa,SAAS,qCAAqC,MAAM,MAAM;;;;;;CAO3E,SAAS,eAAe,OAAsB;AAC5C,MAAI,MACF,KAAI;GACF,MAAM,UAAU,UAAU,MAAM;AAChC,eAAY,QAAQ;AACpB,gBAAa,QAAQ;AACrB,gBAAa,QAAQ,IAAI,YAAY,aAAa,MAAM;AACxD,gBAAa,SAAS,kDAAkD,MAAM,MAAM;WAC7E,OAAO;AACd,UAAO,MAAM,mDAAmD,MAAM;AACtE,eAAY,QAAQ;AACpB,gBAAa,QAAQ;AACrB,gBAAa,WAAW,IAAI,YAAY,YAAY;AAEpD,OAAI,YAAY,OAAO;AACrB,gBAAY,QAAQ;AACpB,iBAAa,WAAW,IAAI,YAAY,YAAY;;;OAGnD;AACL,eAAY,QAAQ;AACpB,gBAAa,QAAQ;AACrB,gBAAa,WAAW,IAAI,YAAY,YAAY;AACpD,gBAAa,SAAS,yCAAyC,MAAM,MAAM;;;;;;CAO/E,SAAS,eAAe;AACtB,aAAW,KAAK;AAChB,iBAAe,KAAK;;;;;;CAOtB,SAAS,kBAAkB;AACzB,MAAI,CAAC,IAAI,YAAY,eAAe,CAAC,IAAI,YAAY,YAAa;EAElE,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,sBAAsB,YAAY,OAAO;AAC3C,eAAY,QAAQ;AACpB,OAAI;AACF,iBAAa,QAAQ,oBAAoB,UAAU,kBAAkB,GAAG;YACjE,OAAO;AACd,iBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,iBAAa,QAAQ;;;EAIzB,MAAM,oBAAoB,aAAa,QAAQ,IAAI,YAAY,YAAY;AAC3E,MAAI,kBACF,KAAI;GAEF,MAAM,cADU,UAAmC,kBAAkB,CACzC;AAC5B,OAAI,KAAK,UAAU,YAAY,KAAK,KAAK,UAAU,YAAY,MAAM,CACnE,aAAY,QAAQ;WAEf,OAAO;AACd,gBACE,SACA,qDACA,MAAM,OACN,MACD;AACD,OAAI,YAAY,UAAU,KACxB,aAAY,QAAQ;;WAGf,YAAY,UAAU,KAC/B,aAAY,QAAQ;;AAIxB,QAAO;EAEL;EACA;EACA;EACA;EACA;EAEA;EACA;EACA;EACA;EACA;EACA;EACD;EACD;;;;;;;;;;;;;;;ACjTF,SAAgBC,iBAAiE,SAG/D;CAChB,MAAM,YAAY,qBAAqB;CACvC,MAAM,MAAM,QAAQ;CAEpB,MAAMC,UAAuB,EAAE;CAE/B,MAAM,cAAc,UAAU;AAC9B,KAAI,YACF,SAAQ,mBAAmB,UAAU;CAGvC,MAAM,UAAU,IAAI,cAAc,SAAS;CAC3C,MAAM,MAAM,SAAS,iBAAiB,GAAG,QAAQ,GAAG,QAAQ,mBAAmB;AAS/E,QAAO,uBANS,IAAI,QAAQ,KAAK;EAC/B,QAAQ;EACR;EACA,aAAa,SAAS,eAAe;EACtC,CAAC,CAE0C;;;;;;;;AC/B9C,MAAM,mBAAmB;CACvB;CACA;CACA;CACA;CACD;;AAGD,MAAM,oBAAoB;CACxB,6BAA6B;CAC7B,kBAAkB;CACnB;AAED,MAAa,aAAa;CACxB,OAAO;CACP,SAAS;CACV;;;;AAOD,SAAS,YAAY,OAAqB;AACxC,KAAI,CAAC,MAAO,QAAO;CAGnB,IAAI,cAAc;AAClB,KAAI,MAAM,SAAS,yBAAyB,MAAM,cAChD,eAAc,MAAM;AAItB,KAAI,YAAY,SAAS,yBAAyB,MAAM,SAAS,sBAC/D,QAAO;AAIT,KAAI,YAAY,QAAQ,iBAAiB,SAAS,YAAY,KAAK,CAAE,QAAO;AAC5E,KAAI,MAAM,QAAQ,iBAAiB,SAAS,MAAM,KAAK,CAAE,QAAO;CAGhE,MAAM,eAAe,YAAY,WAAW,MAAM,WAAW,OAAO,MAAM;AAC1E,KAAI,iBAAiB,MAAM,SAAS,aAAa,SAAS,KAAK,CAAC,CAAE,QAAO;AAGzE,KACE,aAAa,SAAS,eAAe,IACrC,aAAa,SAAS,iBAAiB,IACvC,aAAa,SAAS,QAAQ,CAG9B,QACE,aAAa,aAAa,CAAC,SAAS,UAAU,IAC9C,aAAa,aAAa,CAAC,SAAS,UAAU,IAC9C,aAAa,aAAa,CAAC,SAAS,gBAAgB,IACpD,aAAa,aAAa,CAAC,SAAS,mBAAmB;AAI3D,QAAO;;;;;;AAOT,IAAIC,eAA8B;;;;;AAMlC,SAAgB,UAAU,QAAsB;AAC9C,gBAAe;;;;;;;;AASjB,SAAS,YAAoB;AAC3B,KAAI,CAAC,aACH,OAAM,IAAI,MAAM,uEAAuE;AAEzF,QAAO;;;;;;AAOT,SAAS,eAAe;CACtB,MAAM,SAAS,WAAW;CAC1B,MAAM,cAAc,OAAO,aAAa,MAAM;CAC9C,MAAM,YACJ,YAAY,WAAW,IAAI,IAAI,CAAC,YAAY,WAAW,SAAS,GAAG,cAAc;CACnF,MAAM,QAAQ,YAAY,EAAE,WAAW,GAAG,EAAE;AAC5C,QAAO,OAAO,KAAK;EAAE,MAAM;EAAgB;EAAO,CAAC;;;;;AAMrD,SAAS,aAAa,WAA4D;AAChF,KAAI,CAAC,UAAU,YACb,QAAO;CAET,MAAM,EAAE,oBAAoB,wBAAwB,UAAU,gBAAgB;AAC9E,QAAO,sBAAsB;;;;;AAM/B,eAAe,eACb,WACA,qBAOkB;AAClB,KAAI;AACF,MAAI,CAAC,UAAU,kBAAkB,CAAC,UAAU,YAC1C,QAAO;AAGT,MAAI,UAAU,gBAAgB;GAC5B,MAAM,EAAE,wBAAwB,UAAU,gBAAgB;AAC1D,OAAI,qBAAqB;AACvB,UAAM,cAAc;AACpB,WAAO;;;AAIX,MAAI,CAAC,oBAAoB,sBAAsB,CAC7C,QAAO;EAGT,MAAM,SAAS,MAAM,oBAAoB,8BAA8B;AACvE,YAAU,WAAW,OAAO,mBAAmB;AAC/C,YAAU,eAAe,OAAO,aAAa;AAC7C,SAAO;UACAC,OAAY;AACnB,UAAQ,MAAM,sCAAsC;GAClD;GACA,MAAM,OAAO;GACb,SAAS,OAAO;GAChB,MAAM,OAAO;GACb,eAAe,OAAO;GACvB,CAAC;EAMF,MAAM,kBAAkB,KAHJ,OAAO,iBAAiB,QACT,WAAW,OAAO,WAAW,IAAI,aAAa,CAEzC,IADV,OAAO,eAAe,WAAW,IAAI,aAAa;AAUhF,MANE,gBAAgB,SAAS,mBAAmB,IAC5C,gBAAgB,SAAS,wBAAwB,IACjD,gBAAgB,SAAS,wBAAwB,IACjD,gBAAgB,SAAS,wBAAwB,IACjD,gBAAgB,SAAS,yBAAyB,CAGlD,OAAM,cAAc;AAEtB,SAAO;;;;;;AAOX,SAAgB,eAAiE,SAM/D;CAChB,MAAM,YAAY,qBAAqB;CACvC,MAAM,MAAM,QAAQ;CAEpB,MAAMC,UAAuB,EAAE;CAC/B,MAAM,QAAQ,SAAS,qBAAqB,UAAU;AACtD,KAAI,MACF,SAAQ,mBAAmB,UAAU;CAGvC,MAAM,UAAU,IAAI,QAAQ,IAAI,cAAc,SAAS,QAAQ;EAC7D,QAAQ;EACR;EACA,aAAa,SAAS,eAAe;EACtC,CAAC;AAGF,KAAI,SAAS,SAAS,WAAW,SAAS,CAAC,SAAS,eAClD,QAAO,uBAA6B,QAAQ;AAI9C,QAAO,qBAA2B,SAAS,SAAS,eAAe;;;;;;;;;;;AAYrE,eAAsB,gBAIpB,IACA,SAeY;CACZ,MAAM,YAAY,qBAAqB;AAGvC,KAAI,SAAS,cAKX,QAAO,MAAM,GAJC,eAAqB;EACjC,GAAG;EACH,mBAAmB,QAAQ;EAC5B,CAAC,CACoB;AAIxB,KAAI,aAAa,UAAU,EAEzB;MAAI,CADc,MAAM,eAAe,WAAW,QAAQ,oBAAoB,EAG5E;OAAI,CAAC,UAAU,aAAa;AAC1B,UAAM,cAAc;AACpB,UAAM,IAAI,MAAM,0BAA0B;;aAKxC,CAAC,UAAU,aAAa;AAC1B,SAAM,cAAc;AACpB,SAAM,IAAI,MAAM,2CAA2C;;;AAMjE,KAAI;AAEF,MAAI,CAAC,UAAU,aAAa;AAC1B,SAAM,cAAc;AACpB,SAAM,IAAI,MAAM,0BAA0B;;AAG5C,SAAO,MAAM,GADC,eAAqB,QAAQ,CACrB;UACfD,OAAY;EAEnB,MAAM,YAAY,OAAO,QAAQ,OAAO,eAAe;AACvD,MAAI,cAAc,kBAAkB,6BAA6B;GAC/D,MAAM,SAAS,WAAW;GAC1B,MAAM,cAAc,OAAO,aAAa,MAAM;GAC9C,MAAM,YACJ,YAAY,WAAW,IAAI,IAAI,CAAC,YAAY,WAAW,SAAS,GAAG,cAAc;AACnF,SAAM,OAAO,KAAK;IAChB,MAAM;IACN,OAAO,YAAY,EAAE,WAAW,GAAG,EAAE;IACtC,CAAC;AACF,SAAM;;AAIR,MAAI,cAAc,kBAAkB,kBAAkB;GACpD,MAAM,SAAS,WAAW;GAC1B,MAAM,cAAc,OAAO,aAAa,MAAM;GAC9C,MAAM,YACJ,YAAY,WAAW,IAAI,IAAI,CAAC,YAAY,WAAW,SAAS,GAAG,cAAc;AACnF,SAAM,OAAO,KAAK;IAChB,MAAM;IACN,OAAO,YAAY,EAAE,WAAW,GAAG,EAAE;IACtC,CAAC;AACF,SAAM;;AAIR,MAAI,YAAY,MAAM,EAAE;AAEtB,OADkB,MAAM,eAAe,WAAW,QAAQ,oBAAoB,CAG5E,QAAO,MAAM,GADM,eAAqB,QAAQ,CACrB;AAE7B,SAAM,cAAc;AACpB,SAAM;;AAER,QAAM;;;;;;AAOV,SAAS,qBACP,SACA,gBACY;CACZ,MAAM,UAAU,QAAQ;AAExB,KAAI,eACF,QAAO,uBACL,IAAI,QAAQ,GAAG,QAAQ,GAAG,kBAAkB;EAC1C,QAAQ,QAAQ;EAChB,SAAS,QAAQ;EACjB,aAAa,QAAQ;EACtB,CAAC,CACH;CAGH,SAAS,YAAY,OAAiB,EAAE,EAAO;AAC7C,SAAO,IAAI,YAAY,IAAI;GACzB,IAAI,SAAS,MAAM;AACjB,QAAI,OAAO,SAAS,SAClB,QAAO,YAAY,CAAC,GAAG,MAAM,KAAK,CAAC;;GAKvC,MAAM,SAAS,UAAU,MAAM;IAE7B,MAAM,WAAW,KAAK,KAAK,IAAI;IAa/B,IAAIE,SAHU,uBAPS,IAAI,QAAQ,GAAG,QAAQ,GAAG,YAAY;KAC3D,QAAQ,QAAQ;KAChB,SAAS,QAAQ;KACjB,aAAa,QAAQ;KACtB,CAAC,CAGqD;AAIvD,SAAK,MAAM,WAAW,KACpB,UAAS,OAAO;AAIlB,WAAO,OAAO,GAAG,KAAK;;GAEzB,CAAC;;AAGJ,QAAO,aAAa"}
|