@frontmcp/auth 0.9.0 → 0.11.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/__test-utils__/assertion.helpers.d.ts +2 -0
- package/__test-utils__/assertion.helpers.d.ts.map +1 -0
- package/authorization/authorization.class.d.ts +122 -0
- package/authorization/authorization.class.d.ts.map +1 -0
- package/authorization/authorization.types.d.ts +65 -1
- package/authorization/authorization.types.d.ts.map +1 -1
- package/authorization/index.d.ts +11 -2
- package/authorization/index.d.ts.map +1 -1
- package/authorization/orchestrated.accessor.d.ts +161 -0
- package/authorization/orchestrated.accessor.d.ts.map +1 -0
- package/authorization/orchestrated.authorization.d.ts +257 -0
- package/authorization/orchestrated.authorization.d.ts.map +1 -0
- package/authorization/public.authorization.d.ts +92 -0
- package/authorization/public.authorization.d.ts.map +1 -0
- package/authorization/transparent.authorization.d.ts +130 -0
- package/authorization/transparent.authorization.d.ts.map +1 -0
- package/common/auth-logger.interface.d.ts +15 -0
- package/common/auth-logger.interface.d.ts.map +1 -0
- package/common/index.d.ts +6 -0
- package/common/index.d.ts.map +1 -0
- package/common/jwt.types.d.ts +87 -0
- package/common/jwt.types.d.ts.map +1 -0
- package/common/session-user.types.d.ts +17 -0
- package/common/session-user.types.d.ts.map +1 -0
- package/common/session.types.d.ts +190 -0
- package/common/session.types.d.ts.map +1 -0
- package/common/zod-utils.d.ts +5 -0
- package/common/zod-utils.d.ts.map +1 -0
- package/consent/consent.types.d.ts +112 -0
- package/consent/consent.types.d.ts.map +1 -0
- package/consent/index.d.ts +2 -0
- package/consent/index.d.ts.map +1 -0
- package/detection/auth-provider-detection.d.ts +53 -0
- package/detection/auth-provider-detection.d.ts.map +1 -0
- package/detection/index.d.ts +3 -0
- package/detection/index.d.ts.map +1 -0
- package/errors/auth-internal.error.d.ts +33 -0
- package/errors/auth-internal.error.d.ts.map +1 -0
- package/errors/auth-internal.errors.d.ts +123 -0
- package/errors/auth-internal.errors.d.ts.map +1 -0
- package/errors/index.d.ts +3 -0
- package/errors/index.d.ts.map +1 -0
- package/esm/index.mjs +5473 -1204
- package/esm/package.json +18 -3
- package/index.d.ts +18 -5
- package/index.d.ts.map +1 -1
- package/index.js +5351 -961
- package/jwks/jwks.service.d.ts +1 -0
- package/jwks/jwks.service.d.ts.map +1 -1
- package/jwks/jwks.types.d.ts +3 -0
- package/jwks/jwks.types.d.ts.map +1 -1
- package/machine-id/index.d.ts +2 -0
- package/machine-id/index.d.ts.map +1 -0
- package/machine-id/machine-id.d.ts +28 -0
- package/machine-id/machine-id.d.ts.map +1 -0
- package/options/app-auth.schema.d.ts +272 -0
- package/options/app-auth.schema.d.ts.map +1 -0
- package/options/index.d.ts +15 -0
- package/options/index.d.ts.map +1 -0
- package/options/interfaces.d.ts +250 -0
- package/options/interfaces.d.ts.map +1 -0
- package/options/orchestrated.schema.d.ts +446 -0
- package/options/orchestrated.schema.d.ts.map +1 -0
- package/options/public.schema.d.ts +19 -0
- package/options/public.schema.d.ts.map +1 -0
- package/options/schema.d.ts +265 -0
- package/options/schema.d.ts.map +1 -0
- package/options/shared.schemas.d.ts +128 -0
- package/options/shared.schemas.d.ts.map +1 -0
- package/options/transparent.schema.d.ts +33 -0
- package/options/transparent.schema.d.ts.map +1 -0
- package/options/typecheck.d.ts +2 -0
- package/options/typecheck.d.ts.map +1 -0
- package/options/utils.d.ts +33 -0
- package/options/utils.d.ts.map +1 -0
- package/package.json +18 -3
- package/session/encrypted-authorization-vault.d.ts +182 -0
- package/session/encrypted-authorization-vault.d.ts.map +1 -0
- package/session/federated-auth.session.d.ts +252 -0
- package/session/federated-auth.session.d.ts.map +1 -0
- package/session/index.d.ts +21 -1
- package/session/index.d.ts.map +1 -1
- package/session/orchestrated-token.store.d.ts +155 -0
- package/session/orchestrated-token.store.d.ts.map +1 -0
- package/session/redis-session.store.d.ts +93 -0
- package/session/redis-session.store.d.ts.map +1 -0
- package/session/session-crypto.d.ts +84 -0
- package/session/session-crypto.d.ts.map +1 -0
- package/session/session-rate-limiter.d.ts +114 -0
- package/session/session-rate-limiter.d.ts.map +1 -0
- package/session/session.transport.d.ts +11 -0
- package/session/session.transport.d.ts.map +1 -0
- package/session/session.types.d.ts +66 -0
- package/session/session.types.d.ts.map +1 -0
- package/session/token.refresh.d.ts +61 -0
- package/session/token.refresh.d.ts.map +1 -0
- package/session/transport-session.types.d.ts +479 -0
- package/session/transport-session.types.d.ts.map +1 -0
- package/session/utils/auth-token.utils.d.ts +12 -0
- package/session/utils/auth-token.utils.d.ts.map +1 -0
- package/session/utils/index.d.ts +2 -0
- package/session/utils/index.d.ts.map +1 -1
- package/session/utils/session-crypto.utils.d.ts +30 -0
- package/session/utils/session-crypto.utils.d.ts.map +1 -0
- package/session/vercel-kv-session.store.d.ts +123 -0
- package/session/vercel-kv-session.store.d.ts.map +1 -0
- package/utils/authorization-id.utils.d.ts +12 -0
- package/utils/authorization-id.utils.d.ts.map +1 -0
- package/utils/index.d.ts +1 -0
- package/utils/index.d.ts.map +1 -1
- package/vault/auth-providers.accessor.d.ts +154 -0
- package/vault/auth-providers.accessor.d.ts.map +1 -0
- package/vault/auth-providers.accessor.impl.d.ts +54 -0
- package/vault/auth-providers.accessor.impl.d.ts.map +1 -0
- package/vault/auth-providers.registry.d.ts +111 -0
- package/vault/auth-providers.registry.d.ts.map +1 -0
- package/vault/auth-providers.types.d.ts +3 -3
- package/vault/auth-providers.vault.d.ts +94 -0
- package/vault/auth-providers.vault.d.ts.map +1 -0
- package/vault/credential-loaders/eager-loader.d.ts +47 -0
- package/vault/credential-loaders/eager-loader.d.ts.map +1 -0
- package/vault/credential-loaders/index.d.ts +7 -0
- package/vault/credential-loaders/index.d.ts.map +1 -0
- package/vault/credential-loaders/lazy-loader.d.ts +54 -0
- package/vault/credential-loaders/lazy-loader.d.ts.map +1 -0
- package/vault/index.d.ts +9 -0
- package/vault/index.d.ts.map +1 -1
|
@@ -0,0 +1,190 @@
|
|
|
1
|
+
import { z } from 'zod';
|
|
2
|
+
/**
|
|
3
|
+
* Transport protocol types (excludes non-transport intents like 'delete-session')
|
|
4
|
+
*/
|
|
5
|
+
export type TransportProtocolType = 'legacy-sse' | 'sse' | 'streamable-http' | 'stateful-http' | 'stateless-http';
|
|
6
|
+
/**
|
|
7
|
+
* Known AI platform types that can be detected from client info.
|
|
8
|
+
* Used for platform-specific rendering and behavior customization.
|
|
9
|
+
*/
|
|
10
|
+
export type AIPlatformType = 'openai' | 'claude' | 'gemini' | 'cursor' | 'continue' | 'cody' | 'generic-mcp' | 'ext-apps' | 'unknown';
|
|
11
|
+
/**
|
|
12
|
+
* Zod schema for AIPlatformType validation
|
|
13
|
+
*/
|
|
14
|
+
export declare const aiPlatformTypeSchema: z.ZodEnum<{
|
|
15
|
+
unknown: "unknown";
|
|
16
|
+
openai: "openai";
|
|
17
|
+
claude: "claude";
|
|
18
|
+
gemini: "gemini";
|
|
19
|
+
cursor: "cursor";
|
|
20
|
+
continue: "continue";
|
|
21
|
+
cody: "cody";
|
|
22
|
+
"generic-mcp": "generic-mcp";
|
|
23
|
+
"ext-apps": "ext-apps";
|
|
24
|
+
}>;
|
|
25
|
+
/**
|
|
26
|
+
* Decoded JWT payload (if any) or empty object
|
|
27
|
+
*/
|
|
28
|
+
export type UserClaim = {
|
|
29
|
+
iss: string;
|
|
30
|
+
sid?: string;
|
|
31
|
+
sub: string;
|
|
32
|
+
exp?: number;
|
|
33
|
+
iat?: number;
|
|
34
|
+
aud?: string | string[];
|
|
35
|
+
email?: string;
|
|
36
|
+
username?: string;
|
|
37
|
+
preferred_username?: string;
|
|
38
|
+
name?: string;
|
|
39
|
+
picture?: string;
|
|
40
|
+
};
|
|
41
|
+
export declare const userClaimSchema: z.ZodObject<{
|
|
42
|
+
iss: z.ZodString;
|
|
43
|
+
sid: z.ZodOptional<z.ZodString>;
|
|
44
|
+
sub: z.ZodString;
|
|
45
|
+
exp: z.ZodOptional<z.ZodNumber>;
|
|
46
|
+
iat: z.ZodOptional<z.ZodNumber>;
|
|
47
|
+
aud: z.ZodOptional<z.ZodUnion<readonly [z.ZodString, z.ZodArray<z.ZodString>]>>;
|
|
48
|
+
email: z.ZodOptional<z.ZodString>;
|
|
49
|
+
username: z.ZodOptional<z.ZodString>;
|
|
50
|
+
preferred_username: z.ZodOptional<z.ZodString>;
|
|
51
|
+
name: z.ZodOptional<z.ZodString>;
|
|
52
|
+
picture: z.ZodOptional<z.ZodString>;
|
|
53
|
+
}, z.core.$loose>;
|
|
54
|
+
export type SessionIdPayload = {
|
|
55
|
+
nodeId: string;
|
|
56
|
+
authSig: string;
|
|
57
|
+
uuid: string;
|
|
58
|
+
iat: number;
|
|
59
|
+
protocol?: TransportProtocolType;
|
|
60
|
+
isPublic?: boolean;
|
|
61
|
+
platformType?: AIPlatformType;
|
|
62
|
+
clientName?: string;
|
|
63
|
+
clientVersion?: string;
|
|
64
|
+
supportsElicitation?: boolean;
|
|
65
|
+
/**
|
|
66
|
+
* Whether this session is in skills-only mode.
|
|
67
|
+
* When true, tools/list returns empty array but skills/search and skills/load work normally.
|
|
68
|
+
* This is useful for planner agents that only need skill information.
|
|
69
|
+
*/
|
|
70
|
+
skillsOnlyMode?: boolean;
|
|
71
|
+
};
|
|
72
|
+
export declare const sessionIdPayloadSchema: z.ZodObject<{
|
|
73
|
+
nodeId: z.ZodString;
|
|
74
|
+
authSig: z.ZodString;
|
|
75
|
+
uuid: z.ZodString;
|
|
76
|
+
iat: z.ZodNumber;
|
|
77
|
+
protocol: z.ZodOptional<z.ZodEnum<{
|
|
78
|
+
"legacy-sse": "legacy-sse";
|
|
79
|
+
sse: "sse";
|
|
80
|
+
"streamable-http": "streamable-http";
|
|
81
|
+
"stateful-http": "stateful-http";
|
|
82
|
+
"stateless-http": "stateless-http";
|
|
83
|
+
}>>;
|
|
84
|
+
isPublic: z.ZodOptional<z.ZodBoolean>;
|
|
85
|
+
platformType: z.ZodOptional<z.ZodEnum<{
|
|
86
|
+
unknown: "unknown";
|
|
87
|
+
openai: "openai";
|
|
88
|
+
claude: "claude";
|
|
89
|
+
gemini: "gemini";
|
|
90
|
+
cursor: "cursor";
|
|
91
|
+
continue: "continue";
|
|
92
|
+
cody: "cody";
|
|
93
|
+
"generic-mcp": "generic-mcp";
|
|
94
|
+
"ext-apps": "ext-apps";
|
|
95
|
+
}>>;
|
|
96
|
+
clientName: z.ZodOptional<z.ZodString>;
|
|
97
|
+
clientVersion: z.ZodOptional<z.ZodString>;
|
|
98
|
+
supportsElicitation: z.ZodOptional<z.ZodBoolean>;
|
|
99
|
+
skillsOnlyMode: z.ZodOptional<z.ZodBoolean>;
|
|
100
|
+
}, z.core.$strip>;
|
|
101
|
+
export interface Authorization {
|
|
102
|
+
token: string;
|
|
103
|
+
user: UserClaim;
|
|
104
|
+
session?: {
|
|
105
|
+
id: string;
|
|
106
|
+
/** Payload may be undefined when session validation failed but ID is passed for transport lookup */
|
|
107
|
+
payload?: SessionIdPayload;
|
|
108
|
+
};
|
|
109
|
+
}
|
|
110
|
+
export declare const sessionIdSchema: z.ZodObject<{
|
|
111
|
+
id: z.ZodString;
|
|
112
|
+
payload: z.ZodOptional<z.ZodObject<{
|
|
113
|
+
nodeId: z.ZodString;
|
|
114
|
+
authSig: z.ZodString;
|
|
115
|
+
uuid: z.ZodString;
|
|
116
|
+
iat: z.ZodNumber;
|
|
117
|
+
protocol: z.ZodOptional<z.ZodEnum<{
|
|
118
|
+
"legacy-sse": "legacy-sse";
|
|
119
|
+
sse: "sse";
|
|
120
|
+
"streamable-http": "streamable-http";
|
|
121
|
+
"stateful-http": "stateful-http";
|
|
122
|
+
"stateless-http": "stateless-http";
|
|
123
|
+
}>>;
|
|
124
|
+
isPublic: z.ZodOptional<z.ZodBoolean>;
|
|
125
|
+
platformType: z.ZodOptional<z.ZodEnum<{
|
|
126
|
+
unknown: "unknown";
|
|
127
|
+
openai: "openai";
|
|
128
|
+
claude: "claude";
|
|
129
|
+
gemini: "gemini";
|
|
130
|
+
cursor: "cursor";
|
|
131
|
+
continue: "continue";
|
|
132
|
+
cody: "cody";
|
|
133
|
+
"generic-mcp": "generic-mcp";
|
|
134
|
+
"ext-apps": "ext-apps";
|
|
135
|
+
}>>;
|
|
136
|
+
clientName: z.ZodOptional<z.ZodString>;
|
|
137
|
+
clientVersion: z.ZodOptional<z.ZodString>;
|
|
138
|
+
supportsElicitation: z.ZodOptional<z.ZodBoolean>;
|
|
139
|
+
skillsOnlyMode: z.ZodOptional<z.ZodBoolean>;
|
|
140
|
+
}, z.core.$strip>>;
|
|
141
|
+
}, z.core.$strip>;
|
|
142
|
+
export declare const authorizationSchema: z.ZodObject<{
|
|
143
|
+
token: z.ZodString;
|
|
144
|
+
session: z.ZodOptional<z.ZodObject<{
|
|
145
|
+
id: z.ZodString;
|
|
146
|
+
payload: z.ZodOptional<z.ZodObject<{
|
|
147
|
+
nodeId: z.ZodString;
|
|
148
|
+
authSig: z.ZodString;
|
|
149
|
+
uuid: z.ZodString;
|
|
150
|
+
iat: z.ZodNumber;
|
|
151
|
+
protocol: z.ZodOptional<z.ZodEnum<{
|
|
152
|
+
"legacy-sse": "legacy-sse";
|
|
153
|
+
sse: "sse";
|
|
154
|
+
"streamable-http": "streamable-http";
|
|
155
|
+
"stateful-http": "stateful-http";
|
|
156
|
+
"stateless-http": "stateless-http";
|
|
157
|
+
}>>;
|
|
158
|
+
isPublic: z.ZodOptional<z.ZodBoolean>;
|
|
159
|
+
platformType: z.ZodOptional<z.ZodEnum<{
|
|
160
|
+
unknown: "unknown";
|
|
161
|
+
openai: "openai";
|
|
162
|
+
claude: "claude";
|
|
163
|
+
gemini: "gemini";
|
|
164
|
+
cursor: "cursor";
|
|
165
|
+
continue: "continue";
|
|
166
|
+
cody: "cody";
|
|
167
|
+
"generic-mcp": "generic-mcp";
|
|
168
|
+
"ext-apps": "ext-apps";
|
|
169
|
+
}>>;
|
|
170
|
+
clientName: z.ZodOptional<z.ZodString>;
|
|
171
|
+
clientVersion: z.ZodOptional<z.ZodString>;
|
|
172
|
+
supportsElicitation: z.ZodOptional<z.ZodBoolean>;
|
|
173
|
+
skillsOnlyMode: z.ZodOptional<z.ZodBoolean>;
|
|
174
|
+
}, z.core.$strip>>;
|
|
175
|
+
}, z.core.$strip>>;
|
|
176
|
+
user: z.ZodObject<{
|
|
177
|
+
iss: z.ZodString;
|
|
178
|
+
sid: z.ZodOptional<z.ZodString>;
|
|
179
|
+
sub: z.ZodString;
|
|
180
|
+
exp: z.ZodOptional<z.ZodNumber>;
|
|
181
|
+
iat: z.ZodOptional<z.ZodNumber>;
|
|
182
|
+
aud: z.ZodOptional<z.ZodUnion<readonly [z.ZodString, z.ZodArray<z.ZodString>]>>;
|
|
183
|
+
email: z.ZodOptional<z.ZodString>;
|
|
184
|
+
username: z.ZodOptional<z.ZodString>;
|
|
185
|
+
preferred_username: z.ZodOptional<z.ZodString>;
|
|
186
|
+
name: z.ZodOptional<z.ZodString>;
|
|
187
|
+
picture: z.ZodOptional<z.ZodString>;
|
|
188
|
+
}, z.core.$loose>;
|
|
189
|
+
}, z.core.$strip>;
|
|
190
|
+
//# sourceMappingURL=session.types.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"session.types.d.ts","sourceRoot":"","sources":["../../src/common/session.types.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAGxB;;GAEG;AACH,MAAM,MAAM,qBAAqB,GAAG,YAAY,GAAG,KAAK,GAAG,iBAAiB,GAAG,eAAe,GAAG,gBAAgB,CAAC;AAElH;;;GAGG;AACH,MAAM,MAAM,cAAc,GACtB,QAAQ,GACR,QAAQ,GACR,QAAQ,GACR,QAAQ,GACR,UAAU,GACV,MAAM,GACN,aAAa,GACb,UAAU,GACV,SAAS,CAAC;AAEd;;GAEG;AACH,eAAO,MAAM,oBAAoB;;;;;;;;;;EAU/B,CAAC;AAEH;;GAEG;AACH,MAAM,MAAM,SAAS,GAAG;IACtB,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,GAAG,EAAE,MAAM,CAAC;IACZ,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,GAAG,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IACxB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAC5B,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,OAAO,CAAC,EAAE,MAAM,CAAC;CAClB,CAAC;AACF,eAAO,MAAM,eAAe;;;;;;;;;;;;iBAcZ,CAAC;AAEjB,MAAM,MAAM,gBAAgB,GAAG;IAE7B,MAAM,EAAE,MAAM,CAAC;IAEf,OAAO,EAAE,MAAM,CAAC;IAEhB,IAAI,EAAE,MAAM,CAAC;IAEb,GAAG,EAAE,MAAM,CAAC;IAEZ,QAAQ,CAAC,EAAE,qBAAqB,CAAC;IAEjC,QAAQ,CAAC,EAAE,OAAO,CAAC;IAEnB,YAAY,CAAC,EAAE,cAAc,CAAC;IAE9B,UAAU,CAAC,EAAE,MAAM,CAAC;IAEpB,aAAa,CAAC,EAAE,MAAM,CAAC;IAEvB,mBAAmB,CAAC,EAAE,OAAO,CAAC;IAC9B;;;;OAIG;IACH,cAAc,CAAC,EAAE,OAAO,CAAC;CAC1B,CAAC;AACF,eAAO,MAAM,sBAAsB;;;;;;;;;;;;;;;;;;;;;;;;;;;;iBAYO,CAAC;AAE3C,MAAM,WAAW,aAAa;IAC5B,KAAK,EAAE,MAAM,CAAC;IACd,IAAI,EAAE,SAAS,CAAC;IAChB,OAAO,CAAC,EAAE;QACR,EAAE,EAAE,MAAM,CAAC;QACX,oGAAoG;QACpG,OAAO,CAAC,EAAE,gBAAgB,CAAC;KAC5B,CAAC;CACH;AAED,eAAO,MAAM,eAAe;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;iBAIwC,CAAC;AAErE,eAAO,MAAM,mBAAmB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;iBAIO,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"zod-utils.d.ts","sourceRoot":"","sources":["../../src/common/zod-utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAExB,MAAM,MAAM,WAAW,CAAC,IAAI,EAAE,IAAI,GAAG,OAAO,IAAI;KAC7C,CAAC,IAAI,MAAM,IAAI,CAAC,IAAI,EAAE,MAAM,IAAI,CAAC,CAAC,CAAC,GAAG,CAAC,CAAC,UAAU;CACpD,CAAC"}
|
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Consent Flow Types and Schemas
|
|
3
|
+
*
|
|
4
|
+
* Defines types for the tool consent flow that allows users to select
|
|
5
|
+
* which MCP tools they want to expose to the LLM.
|
|
6
|
+
*/
|
|
7
|
+
import { z } from 'zod';
|
|
8
|
+
import { consentConfigSchema } from '../options/shared.schemas';
|
|
9
|
+
export { consentConfigSchema };
|
|
10
|
+
/**
|
|
11
|
+
* Tool consent item schema - represents a tool available for consent
|
|
12
|
+
*/
|
|
13
|
+
export declare const consentToolItemSchema: z.ZodObject<{
|
|
14
|
+
id: z.ZodString;
|
|
15
|
+
name: z.ZodString;
|
|
16
|
+
description: z.ZodOptional<z.ZodString>;
|
|
17
|
+
appId: z.ZodString;
|
|
18
|
+
appName: z.ZodString;
|
|
19
|
+
defaultSelected: z.ZodDefault<z.ZodBoolean>;
|
|
20
|
+
requiredScopes: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
21
|
+
category: z.ZodOptional<z.ZodString>;
|
|
22
|
+
}, z.core.$strip>;
|
|
23
|
+
/**
|
|
24
|
+
* Consent selection schema - user's tool selection
|
|
25
|
+
*/
|
|
26
|
+
export declare const consentSelectionSchema: z.ZodObject<{
|
|
27
|
+
selectedTools: z.ZodArray<z.ZodString>;
|
|
28
|
+
allSelected: z.ZodBoolean;
|
|
29
|
+
consentedAt: z.ZodString;
|
|
30
|
+
consentVersion: z.ZodDefault<z.ZodString>;
|
|
31
|
+
}, z.core.$strip>;
|
|
32
|
+
/**
|
|
33
|
+
* Consent page state schema - stored in pending authorization
|
|
34
|
+
*/
|
|
35
|
+
export declare const consentStateSchema: z.ZodObject<{
|
|
36
|
+
enabled: z.ZodBoolean;
|
|
37
|
+
availableTools: z.ZodArray<z.ZodObject<{
|
|
38
|
+
id: z.ZodString;
|
|
39
|
+
name: z.ZodString;
|
|
40
|
+
description: z.ZodOptional<z.ZodString>;
|
|
41
|
+
appId: z.ZodString;
|
|
42
|
+
appName: z.ZodString;
|
|
43
|
+
defaultSelected: z.ZodDefault<z.ZodBoolean>;
|
|
44
|
+
requiredScopes: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
45
|
+
category: z.ZodOptional<z.ZodString>;
|
|
46
|
+
}, z.core.$strip>>;
|
|
47
|
+
preselectedTools: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
48
|
+
groupByApp: z.ZodDefault<z.ZodBoolean>;
|
|
49
|
+
customMessage: z.ZodOptional<z.ZodString>;
|
|
50
|
+
}, z.core.$strip>;
|
|
51
|
+
/**
|
|
52
|
+
* Auth provider item for federated login UI
|
|
53
|
+
*/
|
|
54
|
+
export declare const federatedProviderItemSchema: z.ZodObject<{
|
|
55
|
+
id: z.ZodString;
|
|
56
|
+
name: z.ZodString;
|
|
57
|
+
description: z.ZodOptional<z.ZodString>;
|
|
58
|
+
icon: z.ZodOptional<z.ZodString>;
|
|
59
|
+
type: z.ZodEnum<{
|
|
60
|
+
transparent: "transparent";
|
|
61
|
+
local: "local";
|
|
62
|
+
remote: "remote";
|
|
63
|
+
}>;
|
|
64
|
+
providerUrl: z.ZodOptional<z.ZodString>;
|
|
65
|
+
appIds: z.ZodArray<z.ZodString>;
|
|
66
|
+
appNames: z.ZodArray<z.ZodString>;
|
|
67
|
+
scopes: z.ZodArray<z.ZodString>;
|
|
68
|
+
isPrimary: z.ZodBoolean;
|
|
69
|
+
isOptional: z.ZodDefault<z.ZodBoolean>;
|
|
70
|
+
}, z.core.$strip>;
|
|
71
|
+
/**
|
|
72
|
+
* Federated login state schema
|
|
73
|
+
*/
|
|
74
|
+
export declare const federatedLoginStateSchema: z.ZodObject<{
|
|
75
|
+
providers: z.ZodArray<z.ZodObject<{
|
|
76
|
+
id: z.ZodString;
|
|
77
|
+
name: z.ZodString;
|
|
78
|
+
description: z.ZodOptional<z.ZodString>;
|
|
79
|
+
icon: z.ZodOptional<z.ZodString>;
|
|
80
|
+
type: z.ZodEnum<{
|
|
81
|
+
transparent: "transparent";
|
|
82
|
+
local: "local";
|
|
83
|
+
remote: "remote";
|
|
84
|
+
}>;
|
|
85
|
+
providerUrl: z.ZodOptional<z.ZodString>;
|
|
86
|
+
appIds: z.ZodArray<z.ZodString>;
|
|
87
|
+
appNames: z.ZodArray<z.ZodString>;
|
|
88
|
+
scopes: z.ZodArray<z.ZodString>;
|
|
89
|
+
isPrimary: z.ZodBoolean;
|
|
90
|
+
isOptional: z.ZodDefault<z.ZodBoolean>;
|
|
91
|
+
}, z.core.$strip>>;
|
|
92
|
+
primaryProviderId: z.ZodOptional<z.ZodString>;
|
|
93
|
+
allowSkip: z.ZodDefault<z.ZodBoolean>;
|
|
94
|
+
preselectedProviders: z.ZodOptional<z.ZodArray<z.ZodString>>;
|
|
95
|
+
}, z.core.$strip>;
|
|
96
|
+
/**
|
|
97
|
+
* Federated login selection schema
|
|
98
|
+
*/
|
|
99
|
+
export declare const federatedSelectionSchema: z.ZodObject<{
|
|
100
|
+
selectedProviders: z.ZodArray<z.ZodString>;
|
|
101
|
+
skippedProviders: z.ZodArray<z.ZodString>;
|
|
102
|
+
providerMetadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodUnknown>>;
|
|
103
|
+
}, z.core.$strip>;
|
|
104
|
+
export type ConsentToolItem = z.infer<typeof consentToolItemSchema>;
|
|
105
|
+
export type ConsentSelection = z.infer<typeof consentSelectionSchema>;
|
|
106
|
+
export type ConsentState = z.infer<typeof consentStateSchema>;
|
|
107
|
+
export type ConsentConfig = z.infer<typeof consentConfigSchema>;
|
|
108
|
+
export type ConsentConfigInput = z.input<typeof consentConfigSchema>;
|
|
109
|
+
export type FederatedProviderItem = z.infer<typeof federatedProviderItemSchema>;
|
|
110
|
+
export type FederatedLoginState = z.infer<typeof federatedLoginStateSchema>;
|
|
111
|
+
export type FederatedSelection = z.infer<typeof federatedSelectionSchema>;
|
|
112
|
+
//# sourceMappingURL=consent.types.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"consent.types.d.ts","sourceRoot":"","sources":["../../src/consent/consent.types.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AACH,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AACxB,OAAO,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AAGhE,OAAO,EAAE,mBAAmB,EAAE,CAAC;AAM/B;;GAEG;AACH,eAAO,MAAM,qBAAqB;;;;;;;;;iBAiBhC,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,sBAAsB;;;;;iBASjC,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,kBAAkB;;;;;;;;;;;;;;;iBAW7B,CAAC;AAKH;;GAEG;AACH,eAAO,MAAM,2BAA2B;;;;;;;;;;;;;;;;iBAuBtC,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,yBAAyB;;;;;;;;;;;;;;;;;;;;;iBASpC,CAAC;AAEH;;GAEG;AACH,eAAO,MAAM,wBAAwB;;;;iBAOnC,CAAC;AAMH,MAAM,MAAM,eAAe,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,qBAAqB,CAAC,CAAC;AACpE,MAAM,MAAM,gBAAgB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,sBAAsB,CAAC,CAAC;AACtE,MAAM,MAAM,YAAY,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,kBAAkB,CAAC,CAAC;AAC9D,MAAM,MAAM,aAAa,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,mBAAmB,CAAC,CAAC;AAChE,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,mBAAmB,CAAC,CAAC;AAErE,MAAM,MAAM,qBAAqB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,2BAA2B,CAAC,CAAC;AAChF,MAAM,MAAM,mBAAmB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,yBAAyB,CAAC,CAAC;AAC5E,MAAM,MAAM,kBAAkB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,wBAAwB,CAAC,CAAC"}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
export { consentToolItemSchema, consentSelectionSchema, consentStateSchema, federatedProviderItemSchema, federatedLoginStateSchema, federatedSelectionSchema, ConsentToolItem, ConsentSelection, ConsentState, ConsentConfig, ConsentConfigInput, FederatedProviderItem, FederatedLoginState, FederatedSelection, } from './consent.types';
|
|
2
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/consent/index.ts"],"names":[],"mappings":"AACA,OAAO,EAEL,qBAAqB,EACrB,sBAAsB,EACtB,kBAAkB,EAClB,2BAA2B,EAC3B,yBAAyB,EACzB,wBAAwB,EAExB,eAAe,EACf,gBAAgB,EAChB,YAAY,EACZ,aAAa,EACb,kBAAkB,EAClB,qBAAqB,EACrB,mBAAmB,EACnB,kBAAkB,GACnB,MAAM,iBAAiB,CAAC"}
|
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Auth Provider Detection
|
|
3
|
+
*
|
|
4
|
+
* Detects unique auth providers across nested apps and determines
|
|
5
|
+
* if orchestrated mode is required at the parent scope level.
|
|
6
|
+
*/
|
|
7
|
+
import { z } from 'zod';
|
|
8
|
+
import type { AuthOptions } from '../options/schema';
|
|
9
|
+
export declare const detectedAuthProviderSchema: z.ZodObject<{
|
|
10
|
+
id: z.ZodString;
|
|
11
|
+
providerUrl: z.ZodOptional<z.ZodString>;
|
|
12
|
+
mode: z.ZodEnum<{
|
|
13
|
+
public: "public";
|
|
14
|
+
transparent: "transparent";
|
|
15
|
+
orchestrated: "orchestrated";
|
|
16
|
+
}>;
|
|
17
|
+
appIds: z.ZodArray<z.ZodString>;
|
|
18
|
+
scopes: z.ZodArray<z.ZodString>;
|
|
19
|
+
isParentProvider: z.ZodBoolean;
|
|
20
|
+
}, z.core.$strip>;
|
|
21
|
+
export declare const authProviderDetectionResultSchema: z.ZodObject<{
|
|
22
|
+
providers: z.ZodMap<z.ZodString, z.ZodObject<{
|
|
23
|
+
id: z.ZodString;
|
|
24
|
+
providerUrl: z.ZodOptional<z.ZodString>;
|
|
25
|
+
mode: z.ZodEnum<{
|
|
26
|
+
public: "public";
|
|
27
|
+
transparent: "transparent";
|
|
28
|
+
orchestrated: "orchestrated";
|
|
29
|
+
}>;
|
|
30
|
+
appIds: z.ZodArray<z.ZodString>;
|
|
31
|
+
scopes: z.ZodArray<z.ZodString>;
|
|
32
|
+
isParentProvider: z.ZodBoolean;
|
|
33
|
+
}, z.core.$strip>>;
|
|
34
|
+
requiresOrchestration: z.ZodBoolean;
|
|
35
|
+
parentProviderId: z.ZodOptional<z.ZodString>;
|
|
36
|
+
childProviderIds: z.ZodArray<z.ZodString>;
|
|
37
|
+
uniqueProviderCount: z.ZodNumber;
|
|
38
|
+
validationErrors: z.ZodArray<z.ZodString>;
|
|
39
|
+
warnings: z.ZodArray<z.ZodString>;
|
|
40
|
+
}, z.core.$strip>;
|
|
41
|
+
export type DetectedAuthProvider = z.infer<typeof detectedAuthProviderSchema>;
|
|
42
|
+
export type AuthProviderDetectionResult = z.infer<typeof authProviderDetectionResultSchema>;
|
|
43
|
+
export interface AppAuthInfo {
|
|
44
|
+
id: string;
|
|
45
|
+
name: string;
|
|
46
|
+
auth?: AuthOptions;
|
|
47
|
+
}
|
|
48
|
+
export declare function deriveProviderId(options: AuthOptions): string;
|
|
49
|
+
export declare function detectAuthProviders(parentAuth: AuthOptions | undefined, apps: AppAuthInfo[]): AuthProviderDetectionResult;
|
|
50
|
+
export declare function appRequiresOrchestration(appAuth: AuthOptions | undefined, parentAuth: AuthOptions | undefined): boolean;
|
|
51
|
+
export declare function getProviderScopes(detection: AuthProviderDetectionResult, providerId: string): string[];
|
|
52
|
+
export declare function getProviderApps(detection: AuthProviderDetectionResult, providerId: string): string[];
|
|
53
|
+
//# sourceMappingURL=auth-provider-detection.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth-provider-detection.d.ts","sourceRoot":"","sources":["../../src/detection/auth-provider-detection.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AACH,OAAO,EAAE,CAAC,EAAE,MAAM,KAAK,CAAC;AAExB,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,mBAAmB,CAAC;AAMrD,eAAO,MAAM,0BAA0B;;;;;;;;;;;iBAOrC,CAAC;AAEH,eAAO,MAAM,iCAAiC;;;;;;;;;;;;;;;;;;;iBAQ5C,CAAC;AAMH,MAAM,MAAM,oBAAoB,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,0BAA0B,CAAC,CAAC;AAC9E,MAAM,MAAM,2BAA2B,GAAG,CAAC,CAAC,KAAK,CAAC,OAAO,iCAAiC,CAAC,CAAC;AAE5F,MAAM,WAAW,WAAW;IAC1B,EAAE,EAAE,MAAM,CAAC;IACX,IAAI,EAAE,MAAM,CAAC;IACb,IAAI,CAAC,EAAE,WAAW,CAAC;CACpB;AAMD,wBAAgB,gBAAgB,CAAC,OAAO,EAAE,WAAW,GAAG,MAAM,CAiB7D;AAyBD,wBAAgB,mBAAmB,CACjC,UAAU,EAAE,WAAW,GAAG,SAAS,EACnC,IAAI,EAAE,WAAW,EAAE,GAClB,2BAA2B,CA4E7B;AAcD,wBAAgB,wBAAwB,CACtC,OAAO,EAAE,WAAW,GAAG,SAAS,EAChC,UAAU,EAAE,WAAW,GAAG,SAAS,GAClC,OAAO,CAaT;AAED,wBAAgB,iBAAiB,CAAC,SAAS,EAAE,2BAA2B,EAAE,UAAU,EAAE,MAAM,GAAG,MAAM,EAAE,CAGtG;AAED,wBAAgB,eAAe,CAAC,SAAS,EAAE,2BAA2B,EAAE,UAAU,EAAE,MAAM,GAAG,MAAM,EAAE,CAGpG"}
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
export { detectedAuthProviderSchema, authProviderDetectionResultSchema, detectAuthProviders, deriveProviderId, appRequiresOrchestration, getProviderScopes, getProviderApps, } from './auth-provider-detection';
|
|
2
|
+
export type { DetectedAuthProvider, AuthProviderDetectionResult, AppAuthInfo } from './auth-provider-detection';
|
|
3
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/detection/index.ts"],"names":[],"mappings":"AACA,OAAO,EACL,0BAA0B,EAC1B,iCAAiC,EACjC,mBAAmB,EACnB,gBAAgB,EAChB,wBAAwB,EACxB,iBAAiB,EACjB,eAAe,GAChB,MAAM,2BAA2B,CAAC;AACnC,YAAY,EAAE,oBAAoB,EAAE,2BAA2B,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC"}
|
|
@@ -0,0 +1,33 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Base class for internal auth errors.
|
|
3
|
+
* Mirrors SDK's InternalMcpError structure but lives in @frontmcp/auth
|
|
4
|
+
* to avoid circular dependencies.
|
|
5
|
+
*/
|
|
6
|
+
export declare abstract class AuthInternalError extends Error {
|
|
7
|
+
/**
|
|
8
|
+
* Unique error ID for tracking in logs.
|
|
9
|
+
*/
|
|
10
|
+
readonly errorId: string;
|
|
11
|
+
/**
|
|
12
|
+
* Whether this error should expose details to the client.
|
|
13
|
+
*/
|
|
14
|
+
readonly isPublic = false;
|
|
15
|
+
/**
|
|
16
|
+
* HTTP status code equivalent.
|
|
17
|
+
*/
|
|
18
|
+
readonly statusCode = 500;
|
|
19
|
+
/**
|
|
20
|
+
* Error code for categorization.
|
|
21
|
+
*/
|
|
22
|
+
readonly code: string;
|
|
23
|
+
protected constructor(message: string, code?: string);
|
|
24
|
+
/**
|
|
25
|
+
* Get the public-facing error message.
|
|
26
|
+
*/
|
|
27
|
+
getPublicMessage(): string;
|
|
28
|
+
/**
|
|
29
|
+
* Get the internal error message (for logging).
|
|
30
|
+
*/
|
|
31
|
+
getInternalMessage(): string;
|
|
32
|
+
}
|
|
33
|
+
//# sourceMappingURL=auth-internal.error.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth-internal.error.d.ts","sourceRoot":"","sources":["../../src/errors/auth-internal.error.ts"],"names":[],"mappings":"AAEA;;;;GAIG;AACH,8BAAsB,iBAAkB,SAAQ,KAAK;IACnD;;OAEG;IACH,QAAQ,CAAC,OAAO,EAAE,MAAM,CAAC;IAEzB;;OAEG;IACH,QAAQ,CAAC,QAAQ,SAAS;IAE1B;;OAEG;IACH,QAAQ,CAAC,UAAU,OAAO;IAE1B;;OAEG;IACH,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAC;IAEtB,SAAS,aAAa,OAAO,EAAE,MAAM,EAAE,IAAI,SAAwB;IAQnE;;OAEG;IACH,gBAAgB,IAAI,MAAM;IAI1B;;OAEG;IACH,kBAAkB,IAAI,MAAM;CAG7B"}
|
|
@@ -0,0 +1,123 @@
|
|
|
1
|
+
import { AuthInternalError } from './auth-internal.error';
|
|
2
|
+
/**
|
|
3
|
+
* Thrown when encryption context is not set.
|
|
4
|
+
*/
|
|
5
|
+
export declare class EncryptionContextNotSetError extends AuthInternalError {
|
|
6
|
+
constructor();
|
|
7
|
+
}
|
|
8
|
+
/**
|
|
9
|
+
* Thrown when loading a vault fails.
|
|
10
|
+
*/
|
|
11
|
+
export declare class VaultLoadError extends AuthInternalError {
|
|
12
|
+
readonly originalError?: Error;
|
|
13
|
+
constructor(vaultId: string, originalError?: Error);
|
|
14
|
+
}
|
|
15
|
+
/**
|
|
16
|
+
* Thrown when a vault entity is not found.
|
|
17
|
+
*/
|
|
18
|
+
export declare class VaultNotFoundError extends AuthInternalError {
|
|
19
|
+
constructor(entityType: string, id: string);
|
|
20
|
+
}
|
|
21
|
+
/**
|
|
22
|
+
* Thrown when a token is not available (e.g., expired, not yet obtained).
|
|
23
|
+
*/
|
|
24
|
+
export declare class TokenNotAvailableError extends AuthInternalError {
|
|
25
|
+
constructor(message: string);
|
|
26
|
+
}
|
|
27
|
+
/**
|
|
28
|
+
* Thrown when a token store is required but not configured.
|
|
29
|
+
*/
|
|
30
|
+
export declare class TokenStoreRequiredError extends AuthInternalError {
|
|
31
|
+
constructor(context: string);
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
* Thrown when no provider ID is available.
|
|
35
|
+
*/
|
|
36
|
+
export declare class NoProviderIdError extends AuthInternalError {
|
|
37
|
+
constructor(message: string);
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* Thrown when a potential token leak is detected.
|
|
41
|
+
*/
|
|
42
|
+
export declare class TokenLeakDetectedError extends AuthInternalError {
|
|
43
|
+
constructor(detail: string);
|
|
44
|
+
}
|
|
45
|
+
/**
|
|
46
|
+
* Thrown when a session secret is required but not configured.
|
|
47
|
+
*/
|
|
48
|
+
export declare class SessionSecretRequiredError extends AuthInternalError {
|
|
49
|
+
constructor(component: string);
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Thrown when a credential provider is already registered.
|
|
53
|
+
*/
|
|
54
|
+
export declare class CredentialProviderAlreadyRegisteredError extends AuthInternalError {
|
|
55
|
+
constructor(name: string);
|
|
56
|
+
}
|
|
57
|
+
/**
|
|
58
|
+
* Thrown when auth providers are not configured.
|
|
59
|
+
*/
|
|
60
|
+
export declare class AuthProvidersNotConfiguredError extends AuthInternalError {
|
|
61
|
+
constructor();
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* Thrown when orchestrated auth is not available.
|
|
65
|
+
*/
|
|
66
|
+
export declare class OrchestratedAuthNotAvailableError extends AuthInternalError {
|
|
67
|
+
constructor();
|
|
68
|
+
}
|
|
69
|
+
/**
|
|
70
|
+
* Thrown when encryption key is not configured.
|
|
71
|
+
*/
|
|
72
|
+
export declare class EncryptionKeyNotConfiguredError extends AuthInternalError {
|
|
73
|
+
constructor();
|
|
74
|
+
}
|
|
75
|
+
/**
|
|
76
|
+
* Thrown when session ID is empty.
|
|
77
|
+
*/
|
|
78
|
+
export declare class SessionIdEmptyError extends AuthInternalError {
|
|
79
|
+
constructor(storeName: string);
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* Thrown when elicitation secret is required but not configured.
|
|
83
|
+
*/
|
|
84
|
+
export declare class ElicitationSecretRequiredError extends AuthInternalError {
|
|
85
|
+
constructor();
|
|
86
|
+
}
|
|
87
|
+
/**
|
|
88
|
+
* Thrown when scope access is denied for a provider.
|
|
89
|
+
*/
|
|
90
|
+
export declare class ScopeDeniedError extends AuthInternalError {
|
|
91
|
+
constructor(providerId: string);
|
|
92
|
+
}
|
|
93
|
+
/**
|
|
94
|
+
* Thrown when an in-memory store is required but not available.
|
|
95
|
+
*/
|
|
96
|
+
export declare class InMemoryStoreRequiredError extends AuthInternalError {
|
|
97
|
+
constructor(component: string);
|
|
98
|
+
}
|
|
99
|
+
/**
|
|
100
|
+
* Thrown when orchestrator JWKS is not available.
|
|
101
|
+
*/
|
|
102
|
+
export declare class OrchestratorJwksNotAvailableError extends AuthInternalError {
|
|
103
|
+
constructor();
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Thrown when invalid input is provided to an auth operation.
|
|
107
|
+
*/
|
|
108
|
+
export declare class AuthInvalidInputError extends AuthInternalError {
|
|
109
|
+
constructor(message: string);
|
|
110
|
+
}
|
|
111
|
+
/**
|
|
112
|
+
* Thrown when a credential storage operation fails.
|
|
113
|
+
*/
|
|
114
|
+
export declare class CredentialStorageError extends AuthInternalError {
|
|
115
|
+
constructor(message: string);
|
|
116
|
+
}
|
|
117
|
+
/**
|
|
118
|
+
* Thrown when a federated auth flow encounters an error.
|
|
119
|
+
*/
|
|
120
|
+
export declare class AuthFlowError extends AuthInternalError {
|
|
121
|
+
constructor(message: string, code?: string);
|
|
122
|
+
}
|
|
123
|
+
//# sourceMappingURL=auth-internal.errors.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth-internal.errors.d.ts","sourceRoot":"","sources":["../../src/errors/auth-internal.errors.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAE1D;;GAEG;AACH,qBAAa,4BAA6B,SAAQ,iBAAiB;;CAIlE;AAED;;GAEG;AACH,qBAAa,cAAe,SAAQ,iBAAiB;IACnD,QAAQ,CAAC,aAAa,CAAC,EAAE,KAAK,CAAC;gBAEnB,OAAO,EAAE,MAAM,EAAE,aAAa,CAAC,EAAE,KAAK;CAInD;AAED;;GAEG;AACH,qBAAa,kBAAmB,SAAQ,iBAAiB;gBAC3C,UAAU,EAAE,MAAM,EAAE,EAAE,EAAE,MAAM;CAG3C;AAED;;GAEG;AACH,qBAAa,sBAAuB,SAAQ,iBAAiB;gBAC/C,OAAO,EAAE,MAAM;CAG5B;AAED;;GAEG;AACH,qBAAa,uBAAwB,SAAQ,iBAAiB;gBAChD,OAAO,EAAE,MAAM;CAG5B;AAED;;GAEG;AACH,qBAAa,iBAAkB,SAAQ,iBAAiB;gBAC1C,OAAO,EAAE,MAAM;CAG5B;AAED;;GAEG;AACH,qBAAa,sBAAuB,SAAQ,iBAAiB;gBAC/C,MAAM,EAAE,MAAM;CAG3B;AAED;;GAEG;AACH,qBAAa,0BAA2B,SAAQ,iBAAiB;gBACnD,SAAS,EAAE,MAAM;CAG9B;AAED;;GAEG;AACH,qBAAa,wCAAyC,SAAQ,iBAAiB;gBACjE,IAAI,EAAE,MAAM;CAGzB;AAED;;GAEG;AACH,qBAAa,+BAAgC,SAAQ,iBAAiB;;CAIrE;AAED;;GAEG;AACH,qBAAa,iCAAkC,SAAQ,iBAAiB;;CAIvE;AAED;;GAEG;AACH,qBAAa,+BAAgC,SAAQ,iBAAiB;;CAIrE;AAED;;GAEG;AACH,qBAAa,mBAAoB,SAAQ,iBAAiB;gBAC5C,SAAS,EAAE,MAAM;CAG9B;AAED;;GAEG;AACH,qBAAa,8BAA+B,SAAQ,iBAAiB;;CAIpE;AAED;;GAEG;AACH,qBAAa,gBAAiB,SAAQ,iBAAiB;gBACzC,UAAU,EAAE,MAAM;CAG/B;AAED;;GAEG;AACH,qBAAa,0BAA2B,SAAQ,iBAAiB;gBACnD,SAAS,EAAE,MAAM;CAG9B;AAED;;GAEG;AACH,qBAAa,iCAAkC,SAAQ,iBAAiB;;CAIvE;AAED;;GAEG;AACH,qBAAa,qBAAsB,SAAQ,iBAAiB;gBAC9C,OAAO,EAAE,MAAM;CAG5B;AAED;;GAEG;AACH,qBAAa,sBAAuB,SAAQ,iBAAiB;gBAC/C,OAAO,EAAE,MAAM;CAG5B;AAED;;GAEG;AACH,qBAAa,aAAc,SAAQ,iBAAiB;gBACtC,OAAO,EAAE,MAAM,EAAE,IAAI,SAAoB;CAGtD"}
|
|
@@ -0,0 +1,3 @@
|
|
|
1
|
+
export { AuthInternalError } from './auth-internal.error';
|
|
2
|
+
export { EncryptionContextNotSetError, VaultLoadError, VaultNotFoundError, TokenNotAvailableError, TokenStoreRequiredError, NoProviderIdError, TokenLeakDetectedError, SessionSecretRequiredError, CredentialProviderAlreadyRegisteredError, AuthProvidersNotConfiguredError, OrchestratedAuthNotAvailableError, EncryptionKeyNotConfiguredError, SessionIdEmptyError, ElicitationSecretRequiredError, ScopeDeniedError, InMemoryStoreRequiredError, OrchestratorJwksNotAvailableError, AuthInvalidInputError, CredentialStorageError, AuthFlowError, } from './auth-internal.errors';
|
|
3
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/errors/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,EACL,4BAA4B,EAC5B,cAAc,EACd,kBAAkB,EAClB,sBAAsB,EACtB,uBAAuB,EACvB,iBAAiB,EACjB,sBAAsB,EACtB,0BAA0B,EAC1B,wCAAwC,EACxC,+BAA+B,EAC/B,iCAAiC,EACjC,+BAA+B,EAC/B,mBAAmB,EACnB,8BAA8B,EAC9B,gBAAgB,EAChB,0BAA0B,EAC1B,iCAAiC,EACjC,qBAAqB,EACrB,sBAAsB,EACtB,aAAa,GACd,MAAM,wBAAwB,CAAC"}
|