@ichaingo/token 1.3.3 → 1.3.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +53 -47
- package/package.json +1 -1
package/dist/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAC3C,OAAO,EAAE,aAAa,EAAE,qBAAqB,EAAE,MAAM,QAAQ,CAAC;AAiC9D;;;;;GAKG;AACH,eAAO,MAAM,QAAQ,GAAI,KAAK,qBAAqB,EAAE,WAAW,YAAY,GAAG,IAAI,KAAG,YAAY,GAAG,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,aAAa,CAAC;AAC3C,OAAO,EAAE,aAAa,EAAE,qBAAqB,EAAE,MAAM,QAAQ,CAAC;AAiC9D;;;;;GAKG;AACH,eAAO,MAAM,QAAQ,GAAI,KAAK,qBAAqB,EAAE,WAAW,YAAY,GAAG,IAAI,KAAG,YAAY,GAAG,IAyCpG,CAAA;AAED,eAAO,MAAM,QAAQ,GAAI,MAAM,MAAM,WAEpC,CAAA;AAED,eAAO,MAAM,cAAc,YAK1B,CAAA;AAID,eAAO,MAAM,cAAc,eAQ1B,CAAA;AACD,QAAA,MAAM,YAAY,EAAE,aAMnB,CAAA;AACD,eAAe,YAAY,CAAA"}
|
package/dist/index.js
CHANGED
|
@@ -1,73 +1,79 @@
|
|
|
1
1
|
import n from "js-cookie";
|
|
2
|
-
const o = ".ichaingo.com", t = "/",
|
|
2
|
+
const o = ".ichaingo.com", t = "/", s = "lax", c = process.env.NODE_ENV === "production", k = (e) => {
|
|
3
3
|
n.set("access_token", e == null ? void 0 : e.access_token, {
|
|
4
4
|
httpOnly: !1,
|
|
5
|
-
|
|
5
|
+
expires: e == null ? void 0 : e.expires_in,
|
|
6
6
|
domain: o,
|
|
7
|
-
sameSite:
|
|
8
|
-
secure:
|
|
7
|
+
sameSite: s,
|
|
8
|
+
secure: c,
|
|
9
9
|
path: t
|
|
10
10
|
}), n.set("refresh_token", e == null ? void 0 : e.refresh_token, {
|
|
11
11
|
httpOnly: !1,
|
|
12
|
-
|
|
12
|
+
expires: 3600 * 24 * 7,
|
|
13
13
|
domain: o,
|
|
14
|
-
sameSite:
|
|
15
|
-
secure:
|
|
14
|
+
sameSite: s,
|
|
15
|
+
secure: c,
|
|
16
16
|
path: t
|
|
17
17
|
}), n.set("id_token", e == null ? void 0 : e.id_token, {
|
|
18
18
|
httpOnly: !1,
|
|
19
|
-
|
|
19
|
+
expires: e == null ? void 0 : e.expires_in,
|
|
20
20
|
domain: o,
|
|
21
|
-
sameSite:
|
|
22
|
-
secure:
|
|
21
|
+
sameSite: s,
|
|
22
|
+
secure: c,
|
|
23
23
|
path: t
|
|
24
24
|
});
|
|
25
|
-
},
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
25
|
+
}, p = (e, i) => {
|
|
26
|
+
if (i)
|
|
27
|
+
i.cookies.set("access_token", e == null ? void 0 : e.access_token, {
|
|
28
|
+
httpOnly: !1,
|
|
29
|
+
expires: e == null ? void 0 : e.expires_in,
|
|
30
|
+
domain: o,
|
|
31
|
+
sameSite: s,
|
|
32
|
+
secure: c,
|
|
33
|
+
path: t
|
|
34
|
+
}), i.cookies.set("refresh_token", e == null ? void 0 : e.refresh_token, {
|
|
35
|
+
httpOnly: !1,
|
|
36
|
+
expires: 3600 * 24 * 7,
|
|
37
|
+
domain: o,
|
|
38
|
+
sameSite: s,
|
|
39
|
+
secure: c,
|
|
40
|
+
path: t
|
|
41
|
+
}), i.cookies.set("id_token", e == null ? void 0 : e.id_token, {
|
|
42
|
+
httpOnly: !1,
|
|
43
|
+
expires: e == null ? void 0 : e.expires_in,
|
|
44
|
+
domain: o,
|
|
45
|
+
sameSite: s,
|
|
46
|
+
secure: c,
|
|
47
|
+
path: t
|
|
48
|
+
}), i.cookies.set("tokenExpire", (Date.now() + (e == null ? void 0 : e.expires_in) * 1e3).toString(), {
|
|
49
|
+
httpOnly: !1,
|
|
50
|
+
expires: e == null ? void 0 : e.expires_in,
|
|
51
|
+
domain: o,
|
|
52
|
+
sameSite: s,
|
|
53
|
+
secure: c,
|
|
54
|
+
path: t
|
|
55
|
+
});
|
|
56
|
+
else
|
|
57
|
+
return k(e), null;
|
|
58
|
+
return i;
|
|
59
|
+
}, _ = (e) => n.get(e || "id_token") || "", m = () => {
|
|
54
60
|
n.remove("id_token", { path: t, domain: o }), n.remove("access_token", { path: t, domain: o }), n.remove("refresh_token", { path: t, domain: o }), n.remove("sign_session", { domain: o });
|
|
55
|
-
},
|
|
61
|
+
}, h = (e) => {
|
|
56
62
|
n.remove(e || "id_token", { path: t, domain: o });
|
|
57
63
|
}, l = () => {
|
|
58
64
|
const e = Number(n.get("tokenExpire")), i = n.get("refresh_token");
|
|
59
65
|
return isNaN(e) ? !!i : e - Date.now() < 300 * 1e3;
|
|
60
|
-
},
|
|
61
|
-
setToken:
|
|
66
|
+
}, f = {
|
|
67
|
+
setToken: p,
|
|
62
68
|
getToken: _,
|
|
63
|
-
removeAllToken:
|
|
64
|
-
removeTokenByKey:
|
|
69
|
+
removeAllToken: m,
|
|
70
|
+
removeTokenByKey: h,
|
|
65
71
|
isTokenExpired: l
|
|
66
72
|
};
|
|
67
73
|
export {
|
|
68
|
-
|
|
74
|
+
f as default,
|
|
69
75
|
_ as getToken,
|
|
70
76
|
l as isTokenExpired,
|
|
71
|
-
|
|
72
|
-
|
|
77
|
+
m as removeAllToken,
|
|
78
|
+
p as setToken
|
|
73
79
|
};
|