@judo/auth 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +277 -0
- package/README.md +131 -0
- package/dist/components/actor-auth-boundary.d.ts +38 -0
- package/dist/components/actor-auth-boundary.d.ts.map +1 -0
- package/dist/components/actor-switch-dialog.d.ts +38 -0
- package/dist/components/actor-switch-dialog.d.ts.map +1 -0
- package/dist/components/index.d.ts +3 -0
- package/dist/components/index.d.ts.map +1 -0
- package/dist/config/auth-config.d.ts +34 -0
- package/dist/config/auth-config.d.ts.map +1 -0
- package/dist/config/index.d.ts +3 -0
- package/dist/config/index.d.ts.map +1 -0
- package/dist/config/oidc-config.d.ts +58 -0
- package/dist/config/oidc-config.d.ts.map +1 -0
- package/dist/hooks/index.d.ts +4 -0
- package/dist/hooks/index.d.ts.map +1 -0
- package/dist/hooks/use-actor-switch.d.ts +44 -0
- package/dist/hooks/use-actor-switch.d.ts.map +1 -0
- package/dist/hooks/use-auth.d.ts +54 -0
- package/dist/hooks/use-auth.d.ts.map +1 -0
- package/dist/hooks/use-require-auth.d.ts +14 -0
- package/dist/hooks/use-require-auth.d.ts.map +1 -0
- package/dist/index.d.ts +12 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +315 -0
- package/dist/index.js.map +1 -0
- package/dist/provider/auth-config-context.d.ts +36 -0
- package/dist/provider/auth-config-context.d.ts.map +1 -0
- package/dist/provider/index.d.ts +5 -0
- package/dist/provider/index.d.ts.map +1 -0
- package/dist/provider/judo-auth-provider.d.ts +19 -0
- package/dist/provider/judo-auth-provider.d.ts.map +1 -0
- package/dist/provider/principal-context.d.ts +54 -0
- package/dist/provider/principal-context.d.ts.map +1 -0
- package/dist/provider/realm-cache.d.ts +37 -0
- package/dist/provider/realm-cache.d.ts.map +1 -0
- package/dist/utils/claim-mapping.d.ts +18 -0
- package/dist/utils/claim-mapping.d.ts.map +1 -0
- package/dist/utils/index.d.ts +2 -0
- package/dist/utils/index.d.ts.map +1 -0
- package/package.json +62 -0
package/LICENSE
ADDED
|
@@ -0,0 +1,277 @@
|
|
|
1
|
+
Eclipse Public License - v 2.0
|
|
2
|
+
|
|
3
|
+
THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE
|
|
4
|
+
PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION
|
|
5
|
+
OF THE PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
|
|
6
|
+
|
|
7
|
+
1. DEFINITIONS
|
|
8
|
+
|
|
9
|
+
"Contribution" means:
|
|
10
|
+
|
|
11
|
+
a) in the case of the initial Contributor, the initial content
|
|
12
|
+
Distributed under this Agreement, and
|
|
13
|
+
|
|
14
|
+
b) in the case of each subsequent Contributor:
|
|
15
|
+
i) changes to the Program, and
|
|
16
|
+
ii) additions to the Program;
|
|
17
|
+
where such changes and/or additions to the Program originate from
|
|
18
|
+
and are Distributed by that particular Contributor. A Contribution
|
|
19
|
+
"originates" from a Contributor if it was added to the Program by
|
|
20
|
+
such Contributor itself or anyone acting on such Contributor's behalf.
|
|
21
|
+
Contributions do not include changes or additions to the Program that
|
|
22
|
+
are not Modified Works.
|
|
23
|
+
|
|
24
|
+
"Contributor" means any person or entity that Distributes the Program.
|
|
25
|
+
|
|
26
|
+
"Licensed Patents" mean patent claims licensable by a Contributor which
|
|
27
|
+
are necessarily infringed by the use or sale of its Contribution alone
|
|
28
|
+
or when combined with the Program.
|
|
29
|
+
|
|
30
|
+
"Program" means the Contributions Distributed in accordance with this
|
|
31
|
+
Agreement.
|
|
32
|
+
|
|
33
|
+
"Recipient" means anyone who receives the Program under this Agreement
|
|
34
|
+
or any Secondary License (as applicable), including Contributors.
|
|
35
|
+
|
|
36
|
+
"Derivative Works" shall mean any work, whether in Source Code or other
|
|
37
|
+
form, that is based on (or derived from) the Program and for which the
|
|
38
|
+
editorial revisions, annotations, elaborations, or other modifications
|
|
39
|
+
represent, as a whole, an original work of authorship.
|
|
40
|
+
|
|
41
|
+
"Modified Works" shall mean any work in Source Code or other form that
|
|
42
|
+
results from an addition to, deletion from, or modification of the
|
|
43
|
+
contents of the Program, including, for purposes of clarity any new file
|
|
44
|
+
in Source Code form that contains any contents of the Program. Modified
|
|
45
|
+
Works shall not include works that contain only declarations,
|
|
46
|
+
interfaces, types, classes, structures, or files of the Program solely
|
|
47
|
+
in each case in order to link to, bind by name, or subclass the Program
|
|
48
|
+
or Modified Works thereof.
|
|
49
|
+
|
|
50
|
+
"Distribute" means the acts of a) distributing or b) making available
|
|
51
|
+
in any manner that enables the transfer of a copy.
|
|
52
|
+
|
|
53
|
+
"Source Code" means the form of a Program preferred for making
|
|
54
|
+
modifications, including but not limited to software source code,
|
|
55
|
+
documentation source, and configuration files.
|
|
56
|
+
|
|
57
|
+
"Secondary License" means either the GNU General Public License,
|
|
58
|
+
Version 2.0, or any later versions of that license, including any
|
|
59
|
+
exceptions or additional permissions as identified by the initial
|
|
60
|
+
Contributor.
|
|
61
|
+
|
|
62
|
+
2. GRANT OF RIGHTS
|
|
63
|
+
|
|
64
|
+
a) Subject to the terms of this Agreement, each Contributor hereby
|
|
65
|
+
grants Recipient a non-exclusive, worldwide, royalty-free copyright
|
|
66
|
+
license to reproduce, prepare Derivative Works of, publicly display,
|
|
67
|
+
publicly perform, Distribute and sublicense the Contribution of such
|
|
68
|
+
Contributor, if any, and such Derivative Works.
|
|
69
|
+
|
|
70
|
+
b) Subject to the terms of this Agreement, each Contributor hereby
|
|
71
|
+
grants Recipient a non-exclusive, worldwide, royalty-free patent
|
|
72
|
+
license under Licensed Patents to make, use, sell, offer to sell,
|
|
73
|
+
import and otherwise transfer the Contribution of such Contributor,
|
|
74
|
+
if any, in Source Code or other form. This patent license shall
|
|
75
|
+
apply to the combination of the Contribution and the Program if, at
|
|
76
|
+
the time the Contribution is added by the Contributor, such addition
|
|
77
|
+
of the Contribution causes such combination to be covered by the
|
|
78
|
+
Licensed Patents. The patent license shall not apply to any other
|
|
79
|
+
combinations which include the Contribution. No hardware per se is
|
|
80
|
+
licensed hereunder.
|
|
81
|
+
|
|
82
|
+
c) Recipient understands that although each Contributor grants the
|
|
83
|
+
licenses to its Contributions set forth herein, no assurances are
|
|
84
|
+
provided by any Contributor that the Program does not infringe the
|
|
85
|
+
patent or other intellectual property rights of any other entity.
|
|
86
|
+
Each Contributor disclaims any liability to Recipient for claims
|
|
87
|
+
brought by any other entity based on infringement of intellectual
|
|
88
|
+
property rights or otherwise. As a condition to exercising the
|
|
89
|
+
rights and licenses granted hereunder, each Recipient hereby
|
|
90
|
+
assumes sole responsibility to secure any other intellectual
|
|
91
|
+
property rights needed, if any. For example, if a third party
|
|
92
|
+
patent license is required to allow Recipient to Distribute the
|
|
93
|
+
Program, it is Recipient's responsibility to acquire that license
|
|
94
|
+
before distributing the Program.
|
|
95
|
+
|
|
96
|
+
d) Each Contributor represents that to its knowledge it has
|
|
97
|
+
sufficient copyright rights in its Contribution, if any, to grant
|
|
98
|
+
the copyright license set forth in this Agreement.
|
|
99
|
+
|
|
100
|
+
e) Notwithstanding the terms of any Secondary License, no
|
|
101
|
+
Contributor makes additional grants to any Recipient (other than
|
|
102
|
+
those set forth in this Agreement) as a result of such Recipient's
|
|
103
|
+
receipt of the Program under the terms of a Secondary License
|
|
104
|
+
(if permitted under the terms of Section 3).
|
|
105
|
+
|
|
106
|
+
3. REQUIREMENTS
|
|
107
|
+
|
|
108
|
+
3.1 If a Contributor Distributes the Program in any form, then:
|
|
109
|
+
|
|
110
|
+
a) the Program must also be made available as Source Code, in
|
|
111
|
+
accordance with section 3.2, and the Contributor must accompany
|
|
112
|
+
the Program with a statement that the Source Code for the Program
|
|
113
|
+
is available under this Agreement, and informs Recipients how to
|
|
114
|
+
obtain it in a reasonable manner on or through a medium customarily
|
|
115
|
+
used for software exchange; and
|
|
116
|
+
|
|
117
|
+
b) the Contributor may Distribute the Program under a license
|
|
118
|
+
different than this Agreement, provided that such license:
|
|
119
|
+
i) effectively disclaims on behalf of all other Contributors all
|
|
120
|
+
warranties and conditions, express and implied, including
|
|
121
|
+
warranties or conditions of title and non-infringement, and
|
|
122
|
+
implied warranties or conditions of merchantability and fitness
|
|
123
|
+
for a particular purpose;
|
|
124
|
+
|
|
125
|
+
ii) effectively excludes on behalf of all other Contributors all
|
|
126
|
+
liability for damages, including direct, indirect, special,
|
|
127
|
+
incidental and consequential damages, such as lost profits;
|
|
128
|
+
|
|
129
|
+
iii) does not attempt to limit or alter the recipients' rights
|
|
130
|
+
in the Source Code under section 3.2; and
|
|
131
|
+
|
|
132
|
+
iv) requires any subsequent distribution of the Program by any
|
|
133
|
+
party to be under a license that satisfies the requirements
|
|
134
|
+
of this section 3.
|
|
135
|
+
|
|
136
|
+
3.2 When the Program is Distributed as Source Code:
|
|
137
|
+
|
|
138
|
+
a) it must be made available under this Agreement, or if the
|
|
139
|
+
Program (i) is combined with other material in a separate file or
|
|
140
|
+
files made available under a Secondary License, and (ii) the initial
|
|
141
|
+
Contributor attached to the Source Code the notice described in
|
|
142
|
+
Exhibit A of this Agreement, then the Program may be made available
|
|
143
|
+
under the terms of such Secondary Licenses, and
|
|
144
|
+
|
|
145
|
+
b) a copy of this Agreement must be included with each copy of
|
|
146
|
+
the Program.
|
|
147
|
+
|
|
148
|
+
3.3 Contributors may not remove or alter any copyright, patent,
|
|
149
|
+
trademark, attribution notices, disclaimers of warranty, or limitations
|
|
150
|
+
of liability ("notices") contained within the Program from any copy of
|
|
151
|
+
the Program which they Distribute, provided that Contributors may add
|
|
152
|
+
their own appropriate notices.
|
|
153
|
+
|
|
154
|
+
4. COMMERCIAL DISTRIBUTION
|
|
155
|
+
|
|
156
|
+
Commercial distributors of software may accept certain responsibilities
|
|
157
|
+
with respect to end users, business partners and the like. While this
|
|
158
|
+
license is intended to facilitate the commercial use of the Program,
|
|
159
|
+
the Contributor who includes the Program in a commercial product
|
|
160
|
+
offering should do so in a manner which does not create potential
|
|
161
|
+
liability for other Contributors. Therefore, if a Contributor includes
|
|
162
|
+
the Program in a commercial product offering, such Contributor
|
|
163
|
+
("Commercial Contributor") hereby agrees to defend and indemnify every
|
|
164
|
+
other Contributor ("Indemnified Contributor") against any losses,
|
|
165
|
+
damages and costs (collectively "Losses") arising from claims, lawsuits
|
|
166
|
+
and other legal actions brought by a third party against the Indemnified
|
|
167
|
+
Contributor to the extent caused by the acts or omissions of such
|
|
168
|
+
Commercial Contributor in connection with its distribution of the Program
|
|
169
|
+
in a commercial product offering. The obligations in this section do not
|
|
170
|
+
apply to any claims or Losses relating to any actual or alleged
|
|
171
|
+
intellectual property infringement. In order to qualify, an Indemnified
|
|
172
|
+
Contributor must: a) promptly notify the Commercial Contributor in
|
|
173
|
+
writing of such claim, and b) allow the Commercial Contributor to control,
|
|
174
|
+
and cooperate with the Commercial Contributor in, the defense and any
|
|
175
|
+
related settlement negotiations. The Indemnified Contributor may
|
|
176
|
+
participate in any such claim at its own expense.
|
|
177
|
+
|
|
178
|
+
For example, a Contributor might include the Program in a commercial
|
|
179
|
+
product offering, Product X. That Contributor is then a Commercial
|
|
180
|
+
Contributor. If that Commercial Contributor then makes performance
|
|
181
|
+
claims, or offers warranties related to Product X, those performance
|
|
182
|
+
claims and warranties are such Commercial Contributor's responsibility
|
|
183
|
+
alone. Under this section, the Commercial Contributor would have to
|
|
184
|
+
defend claims against the other Contributors related to those performance
|
|
185
|
+
claims and warranties, and if a court requires any other Contributor to
|
|
186
|
+
pay any damages as a result, the Commercial Contributor must pay
|
|
187
|
+
those damages.
|
|
188
|
+
|
|
189
|
+
5. NO WARRANTY
|
|
190
|
+
|
|
191
|
+
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND TO THE EXTENT
|
|
192
|
+
PERMITTED BY APPLICABLE LAW, THE PROGRAM IS PROVIDED ON AN "AS IS"
|
|
193
|
+
BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
|
|
194
|
+
IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF
|
|
195
|
+
TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR
|
|
196
|
+
PURPOSE. Each Recipient is solely responsible for determining the
|
|
197
|
+
appropriateness of using and distributing the Program and assumes all
|
|
198
|
+
risks associated with its exercise of rights under this Agreement,
|
|
199
|
+
including but not limited to the risks and costs of program errors,
|
|
200
|
+
compliance with applicable laws, damage to or loss of data, programs
|
|
201
|
+
or equipment, and unavailability or interruption of operations.
|
|
202
|
+
|
|
203
|
+
6. DISCLAIMER OF LIABILITY
|
|
204
|
+
|
|
205
|
+
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND TO THE EXTENT
|
|
206
|
+
PERMITTED BY APPLICABLE LAW, NEITHER RECIPIENT NOR ANY CONTRIBUTORS
|
|
207
|
+
SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
|
208
|
+
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST
|
|
209
|
+
PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
210
|
+
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
211
|
+
ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE
|
|
212
|
+
EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
|
|
213
|
+
POSSIBILITY OF SUCH DAMAGES.
|
|
214
|
+
|
|
215
|
+
7. GENERAL
|
|
216
|
+
|
|
217
|
+
If any provision of this Agreement is invalid or unenforceable under
|
|
218
|
+
applicable law, it shall not affect the validity or enforceability of
|
|
219
|
+
the remainder of the terms of this Agreement, and without further
|
|
220
|
+
action by the parties hereto, such provision shall be reformed to the
|
|
221
|
+
minimum extent necessary to make such provision valid and enforceable.
|
|
222
|
+
|
|
223
|
+
If Recipient institutes patent litigation against any entity
|
|
224
|
+
(including a cross-claim or counterclaim in a lawsuit) alleging that the
|
|
225
|
+
Program itself (excluding combinations of the Program with other software
|
|
226
|
+
or hardware) infringes such Recipient's patent(s), then such Recipient's
|
|
227
|
+
rights granted under Section 2(b) shall terminate as of the date such
|
|
228
|
+
litigation is filed.
|
|
229
|
+
|
|
230
|
+
All Recipient's rights under this Agreement shall terminate if it
|
|
231
|
+
fails to comply with any of the material terms or conditions of this
|
|
232
|
+
Agreement and does not cure such failure in a reasonable period of
|
|
233
|
+
time after becoming aware of such noncompliance. If all Recipient's
|
|
234
|
+
rights under this Agreement terminate, Recipient agrees to cease use
|
|
235
|
+
and distribution of the Program as soon as reasonably practicable.
|
|
236
|
+
However, Recipient's obligations under this Agreement and any licenses
|
|
237
|
+
granted by Recipient relating to the Program shall continue and survive.
|
|
238
|
+
|
|
239
|
+
Everyone is permitted to copy and distribute copies of this Agreement,
|
|
240
|
+
but in order to avoid inconsistency the Agreement is copyrighted and
|
|
241
|
+
may only be modified in the following manner. The Agreement Steward
|
|
242
|
+
reserves the right to publish new versions (including revisions) of
|
|
243
|
+
this Agreement from time to time. No one other than the Agreement
|
|
244
|
+
Steward has the right to modify this Agreement. The Eclipse Foundation
|
|
245
|
+
is the initial Agreement Steward. The Eclipse Foundation may assign the
|
|
246
|
+
responsibility to serve as the Agreement Steward to a suitable separate
|
|
247
|
+
entity. Each new version of the Agreement will be given a distinguishing
|
|
248
|
+
version number. The Program (including Contributions) may always be
|
|
249
|
+
Distributed subject to the version of the Agreement under which it was
|
|
250
|
+
received. In addition, after a new version of the Agreement is published,
|
|
251
|
+
Contributor may elect to Distribute the Program (including its
|
|
252
|
+
Contributions) under the new version.
|
|
253
|
+
|
|
254
|
+
Except as expressly stated in Sections 2(a) and 2(b) above, Recipient
|
|
255
|
+
receives no rights or licenses to the intellectual property of any
|
|
256
|
+
Contributor under this Agreement, whether expressly, by implication,
|
|
257
|
+
estoppel or otherwise. All rights in the Program not expressly granted
|
|
258
|
+
under this Agreement are reserved. Nothing in this Agreement is intended
|
|
259
|
+
to be enforceable by any entity that is not a Contributor or Recipient.
|
|
260
|
+
No third-party beneficiary rights are created under this Agreement.
|
|
261
|
+
|
|
262
|
+
Exhibit A - Form of Secondary Licenses Notice
|
|
263
|
+
|
|
264
|
+
"This Source Code may also be made available under the following
|
|
265
|
+
Secondary Licenses when the conditions for such availability set forth
|
|
266
|
+
in the Eclipse Public License, v. 2.0 are satisfied: {name license(s),
|
|
267
|
+
version(s), and exceptions or additional permissions here}."
|
|
268
|
+
|
|
269
|
+
Simply including a copy of this Agreement, including this Exhibit A
|
|
270
|
+
is not sufficient to license the Source Code under Secondary Licenses.
|
|
271
|
+
|
|
272
|
+
If it is not possible or desirable to put the notice in a particular
|
|
273
|
+
file, then You may include the notice in a location (such as a LICENSE
|
|
274
|
+
file in a relevant directory) where a recipient would be likely to
|
|
275
|
+
look for such a notice.
|
|
276
|
+
|
|
277
|
+
You may add additional accurate notices of copyright ownership.
|
package/README.md
ADDED
|
@@ -0,0 +1,131 @@
|
|
|
1
|
+
# @judo/auth
|
|
2
|
+
|
|
3
|
+
> OIDC authentication layer for JUDO UI Runtime
|
|
4
|
+
|
|
5
|
+
## Purpose
|
|
6
|
+
|
|
7
|
+
A lightweight wrapper around `react-oidc-context` / `oidc-client-ts` that extracts auth configuration from ECore-based `Application` models, manages realm-based OIDC session caching, maps OIDC claims to principal data, and provides React components/hooks for gating and actor-switching.
|
|
8
|
+
|
|
9
|
+
## Architecture Layer
|
|
10
|
+
|
|
11
|
+
**Layer 3 (Infrastructure)** — consumed by `app-shell` and optionally by application-level code.
|
|
12
|
+
|
|
13
|
+
## Dependencies
|
|
14
|
+
|
|
15
|
+
- `@judo/model-api`, `@judo/model-loader` — model types and registry (dependency + peer)
|
|
16
|
+
- `@mui/material ^7` — UI components (peer)
|
|
17
|
+
- `oidc-client-ts ^3` — OIDC protocol client (peer)
|
|
18
|
+
- `react-oidc-context ^3` — React OIDC integration (peer)
|
|
19
|
+
- `react ^19` — React (peer)
|
|
20
|
+
|
|
21
|
+
## File Structure
|
|
22
|
+
|
|
23
|
+
```
|
|
24
|
+
src/
|
|
25
|
+
├── index.ts # Barrel re-export
|
|
26
|
+
├── config/
|
|
27
|
+
│ ├── auth-config.ts # Model → config extraction
|
|
28
|
+
│ └── oidc-config.ts # OIDC UserManagerSettings builder
|
|
29
|
+
├── provider/
|
|
30
|
+
│ ├── auth-config-context.tsx # React context for auth config
|
|
31
|
+
│ ├── judo-auth-provider.tsx # Top-level auth provider
|
|
32
|
+
│ ├── principal-context.tsx # Backend principal context + provider
|
|
33
|
+
│ └── realm-cache.ts # Realm → UserManager cache
|
|
34
|
+
├── hooks/
|
|
35
|
+
│ ├── use-auth.ts # Main auth hook
|
|
36
|
+
│ ├── use-require-auth.ts # Redirect-guard hook
|
|
37
|
+
│ └── use-actor-switch.ts # Actor-switching hook
|
|
38
|
+
├── components/
|
|
39
|
+
│ ├── actor-auth-boundary.tsx # Auth gate component
|
|
40
|
+
│ └── actor-switch-dialog.tsx # Confirmation dialog
|
|
41
|
+
└── utils/
|
|
42
|
+
└── claim-mapping.ts # OIDC claim → principal mapping
|
|
43
|
+
```
|
|
44
|
+
|
|
45
|
+
## Exports Summary
|
|
46
|
+
|
|
47
|
+
### Configuration
|
|
48
|
+
|
|
49
|
+
| Export | Kind | Description |
|
|
50
|
+
| ---------------------------------- | --------- | ------------------------------------------------------------------------------------------------------------------ |
|
|
51
|
+
| `ClaimMapping` | interface | Maps a `ClaimType` enum to a model attribute name (`claimType`, `attributeName`). |
|
|
52
|
+
| `ActorAuthConfig` | interface | Actor-level auth config: `actorName`, `requiresAuth`, `realm?`, `clientId?`, `claims`. |
|
|
53
|
+
| `getAuthConfig(app)` | function | Extracts an `ActorAuthConfig` from an `Application` model. Returns a no-auth stub when `authentication` is absent. |
|
|
54
|
+
| `isSameRealm(a, b)` | function | Checks whether two `ActorAuthConfig`s share the same OIDC realm. |
|
|
55
|
+
| `OidcConfig` | interface | Simplified config requiring only `issuerUrl`; other fields have defaults. |
|
|
56
|
+
| `OidcOptions` | interface | Full OIDC options: `issuerUrl`, `redirectUri`, `postLogoutRedirectUri`, `scope?`, `responseType?`. |
|
|
57
|
+
| `createOidcOptions(config)` | function | Expands an `OidcConfig` into full `OidcOptions` by applying defaults (`window.location.origin`). |
|
|
58
|
+
| `buildOidcConfig(config, options)` | function | Constructs `UserManagerSettings`. Computes `authority` as `${issuerUrl}/auth/realms/${realm}`. |
|
|
59
|
+
| `validateOidcOptions(options)` | function | Validates all required fields and URL parseability. Throws on failure. |
|
|
60
|
+
|
|
61
|
+
### React Providers
|
|
62
|
+
|
|
63
|
+
| Export | Kind | Description |
|
|
64
|
+
| ------------------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
65
|
+
| `AuthConfigProvider` | component | Provides `ActorAuthConfig` + `OidcOptions` via React context. |
|
|
66
|
+
| `useAuthConfig()` | hook | Reads auth config context; **throws** if outside provider. |
|
|
67
|
+
| `useAuthConfigOptional()` | hook | Reads auth config context; returns `null` if outside provider. |
|
|
68
|
+
| `JudoAuthProvider` | component | Top-level auth provider. If `requiresAuth` is false, renders children directly. If true, wraps in OIDC `AuthProvider` using a **cached** `UserManager` per realm. Strips `?code=&state=` on OIDC callback. |
|
|
69
|
+
| `PrincipalProvider` | component | Provides backend principal state with auto-fetch, refresh (`refreshPrincipal`), and local override (`setPrincipal`). Place inside auth boundary + API provider. |
|
|
70
|
+
| `usePrincipal()` | hook | Reads backend principal context; **throws** if outside `PrincipalProvider`. |
|
|
71
|
+
| `usePrincipalOptional()` | hook | Reads backend principal context; returns `null` if outside provider. |
|
|
72
|
+
|
|
73
|
+
### Realm Cache
|
|
74
|
+
|
|
75
|
+
| Export | Kind | Description |
|
|
76
|
+
| ----------------------------------------- | -------- | ----------------------------------------------------------------------------- |
|
|
77
|
+
| `getOrCreateUserManager(realm, settings)` | function | Returns (or creates & caches) a `UserManager` instance keyed by realm string. |
|
|
78
|
+
| `clearRealmCache(realm)` | function | Removes a specific realm from the cache. |
|
|
79
|
+
| `clearAllRealmCache()` | function | Clears the entire realm cache (test utility). |
|
|
80
|
+
| `hasRealmInCache(realm)` | function | Checks if a realm has a cached `UserManager`. |
|
|
81
|
+
| `getCachedRealmCount()` | function | Returns number of cached realms. |
|
|
82
|
+
|
|
83
|
+
### React Hooks
|
|
84
|
+
|
|
85
|
+
| Export | Kind | Description |
|
|
86
|
+
| ------------------------------------------------------------------ | -------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
87
|
+
| `useAuth()` | hook | Main auth hook. Returns unified `JudoAuthContext` for both authenticated and unauthenticated actors. If no auth required, returns a no-op stub. Otherwise delegates to `react-oidc-context` and maps claims to principal. |
|
|
88
|
+
| `useOidcAuthRequired()` | hook | Direct access to `react-oidc-context`'s `useAuth`. For internal use within OIDC provider. |
|
|
89
|
+
| `useRequireAuth()` | hook | Guard hook — triggers `signinRedirect` via `useEffect` if auth required but user not authenticated. |
|
|
90
|
+
| `useActorSwitch(currentApp, getApplication, setActiveApplication)` | hook | Manages actor switching. Same-realm → direct switch. Different realms → populates `pendingSwitch` for confirmation. |
|
|
91
|
+
| `getSwitchConfigs(currentApp, targetApp)` | function | Returns `{ currentConfig, targetConfig }` — both `ActorAuthConfig`s for a switch dialog. |
|
|
92
|
+
|
|
93
|
+
### React Components
|
|
94
|
+
|
|
95
|
+
| Export | Kind | Description |
|
|
96
|
+
| ------------------- | --------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
97
|
+
| `ActorAuthBoundary` | component | Auth gate — renders children immediately for unauthenticated actors, shows loading spinner while OIDC loads, renders children once authenticated. Supports guest access mode (`supportGuestAccess` + `guestComponent` props) to show a guest page instead of OIDC redirect. |
|
|
98
|
+
| `ActorSwitchDialog` | component | MUI Dialog confirmation for cross-realm actor switches. Displays current/target actor names and warns when realms differ. |
|
|
99
|
+
|
|
100
|
+
### Utilities
|
|
101
|
+
|
|
102
|
+
| Export | Kind | Description |
|
|
103
|
+
| ----------------------------------------- | -------- | ------------------------------------------------------------------------------------------------------------------- |
|
|
104
|
+
| `claimTypeToKey(claimType)` | function | Maps `ClaimType` enum value to its OIDC profile claim key string (e.g., `EMAIL` → `'email'`). |
|
|
105
|
+
| `mapClaimsToPrincipal(profile, mappings)` | function | Builds a principal data record from an OIDC profile. Maps 5 standard claims plus custom claim mappings from config. |
|
|
106
|
+
|
|
107
|
+
### Type Exports
|
|
108
|
+
|
|
109
|
+
| Type | Description |
|
|
110
|
+
| ------------------------- | ---------------------------------------------------------------------------------- |
|
|
111
|
+
| `JudoAuthProviderProps` | Props for `JudoAuthProvider`. |
|
|
112
|
+
| `AuthConfigContextType` | Shape of the auth config context value. |
|
|
113
|
+
| `AuthConfigProviderProps` | Props for `AuthConfigProvider`. |
|
|
114
|
+
| `PrincipalContextType` | Shape of the principal context value. |
|
|
115
|
+
| `PrincipalProviderProps` | Props for `PrincipalProvider`. |
|
|
116
|
+
| `JudoAuthContext` | Return type of `useAuth()`. |
|
|
117
|
+
| `PrincipalData` | OIDC-claim-mapped principal shape (`email?`, `name?`, `preferredUsername?`, etc.). |
|
|
118
|
+
| `PendingSwitch` | Pending actor switch info (`targetActor`, `targetRealm?`, `requiresConfirmation`). |
|
|
119
|
+
| `UseActorSwitchResult` | Return type of `useActorSwitch()`. |
|
|
120
|
+
| `ActorAuthBoundaryProps` | Props for `ActorAuthBoundary`. |
|
|
121
|
+
| `ActorSwitchDialogProps` | Props for `ActorSwitchDialog`. |
|
|
122
|
+
|
|
123
|
+
## Key Patterns
|
|
124
|
+
|
|
125
|
+
- **Conditional OIDC wrapping**: `JudoAuthProvider` only mounts the OIDC provider when `requiresAuth` is true
|
|
126
|
+
- **Realm-based session sharing**: A module-level `Map` ensures actors with the same realm share one `UserManager` (and thus one OIDC session)
|
|
127
|
+
- **Model-driven configuration**: `getAuthConfig` derives everything from the `Application` model, keeping auth in sync with the ECore meta-model
|
|
128
|
+
- **Graceful degradation**: Every hook handles the "no auth required" case cleanly, returning no-op stubs
|
|
129
|
+
- **Two-phase actor switching**: Same-realm switches happen instantly; cross-realm switches require user confirmation
|
|
130
|
+
- **Claim mapping pipeline**: Standard OIDC claims are always mapped, with model-defined custom claim entries on top
|
|
131
|
+
- **Optional context access**: Dual hooks (`useAuthConfig` / `useAuthConfigOptional`, `usePrincipal` / `usePrincipalOptional`) follow the throw-vs-null pattern
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
import { ReactNode } from 'react';
|
|
2
|
+
/**
|
|
3
|
+
* Props for ActorAuthBoundary.
|
|
4
|
+
*/
|
|
5
|
+
export interface ActorAuthBoundaryProps {
|
|
6
|
+
children: ReactNode;
|
|
7
|
+
/** Custom loading component */
|
|
8
|
+
loadingComponent?: ReactNode;
|
|
9
|
+
/**
|
|
10
|
+
* When true, unauthenticated users see a guest page instead of being
|
|
11
|
+
* redirected to the OIDC provider. Typically derived from
|
|
12
|
+
* `Application.supportGuestAccess`.
|
|
13
|
+
*/
|
|
14
|
+
supportGuestAccess?: boolean;
|
|
15
|
+
/**
|
|
16
|
+
* Component rendered when guest access is enabled and the user is
|
|
17
|
+
* not authenticated. When omitted, the default loading/redirect
|
|
18
|
+
* behavior applies even if `supportGuestAccess` is true (the
|
|
19
|
+
* calling layer should always provide a fallback).
|
|
20
|
+
*/
|
|
21
|
+
guestComponent?: ReactNode;
|
|
22
|
+
}
|
|
23
|
+
/**
|
|
24
|
+
* Boundary component that gates children behind authentication.
|
|
25
|
+
*
|
|
26
|
+
* Mirrors react-oidc-context's `withAuthenticationRequired` HOC exactly:
|
|
27
|
+
* skip redirect when callback params are present, auth is loading,
|
|
28
|
+
* a navigator is active, or user is already authenticated.
|
|
29
|
+
* Otherwise trigger `signinRedirect()` — the browser navigates away.
|
|
30
|
+
*
|
|
31
|
+
* When `supportGuestAccess` is true and `guestComponent` is provided,
|
|
32
|
+
* unauthenticated users see the guest page instead of being redirected.
|
|
33
|
+
*
|
|
34
|
+
* The `JudoAuthProvider` handles callback processing and URL cleanup
|
|
35
|
+
* via its `onSigninCallback` prop.
|
|
36
|
+
*/
|
|
37
|
+
export declare function ActorAuthBoundary({ children, loadingComponent, supportGuestAccess, guestComponent, }: ActorAuthBoundaryProps): import("react/jsx-runtime").JSX.Element;
|
|
38
|
+
//# sourceMappingURL=actor-auth-boundary.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"actor-auth-boundary.d.ts","sourceRoot":"","sources":["../../src/components/actor-auth-boundary.tsx"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,SAAS,EAAa,MAAM,OAAO,CAAC;AAIlD;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACtC,QAAQ,EAAE,SAAS,CAAC;IACpB,+BAA+B;IAC/B,gBAAgB,CAAC,EAAE,SAAS,CAAC;IAC7B;;;;OAIG;IACH,kBAAkB,CAAC,EAAE,OAAO,CAAC;IAC7B;;;;;OAKG;IACH,cAAc,CAAC,EAAE,SAAS,CAAC;CAC3B;AAaD;;;;;;;;;;;;;GAaG;AACH,wBAAgB,iBAAiB,CAAC,EACjC,QAAQ,EACR,gBAAgB,EAChB,kBAAkB,EAClB,cAAc,GACd,EAAE,sBAAsB,2CA0BxB"}
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Props for ActorSwitchDialog.
|
|
3
|
+
*/
|
|
4
|
+
export interface ActorSwitchDialogProps {
|
|
5
|
+
/** Whether dialog is open */
|
|
6
|
+
open: boolean;
|
|
7
|
+
/** Current actor name */
|
|
8
|
+
currentActor: string;
|
|
9
|
+
/** Target actor name to switch to */
|
|
10
|
+
targetActor: string;
|
|
11
|
+
/** Current realm (if authenticated) */
|
|
12
|
+
currentRealm?: string;
|
|
13
|
+
/** Target realm (if requires auth) */
|
|
14
|
+
targetRealm?: string;
|
|
15
|
+
/** Callback when user confirms switch */
|
|
16
|
+
onConfirm: () => void;
|
|
17
|
+
/** Callback when user cancels switch */
|
|
18
|
+
onCancel: () => void;
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Confirmation dialog shown when switching actors between different realms.
|
|
22
|
+
* Warns user about potential logout.
|
|
23
|
+
*
|
|
24
|
+
* @example
|
|
25
|
+
* ```tsx
|
|
26
|
+
* <ActorSwitchDialog
|
|
27
|
+
* open={pendingSwitch !== null}
|
|
28
|
+
* currentActor="Admin"
|
|
29
|
+
* targetActor="User"
|
|
30
|
+
* currentRealm="admin-realm"
|
|
31
|
+
* targetRealm="user-realm"
|
|
32
|
+
* onConfirm={confirmSwitch}
|
|
33
|
+
* onCancel={cancelSwitch}
|
|
34
|
+
* />
|
|
35
|
+
* ```
|
|
36
|
+
*/
|
|
37
|
+
export declare function ActorSwitchDialog({ open, currentActor, targetActor, currentRealm, targetRealm, onConfirm, onCancel, }: ActorSwitchDialogProps): import("react/jsx-runtime").JSX.Element;
|
|
38
|
+
//# sourceMappingURL=actor-switch-dialog.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"actor-switch-dialog.d.ts","sourceRoot":"","sources":["../../src/components/actor-switch-dialog.tsx"],"names":[],"mappings":"AAEA;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACtC,6BAA6B;IAC7B,IAAI,EAAE,OAAO,CAAC;IACd,yBAAyB;IACzB,YAAY,EAAE,MAAM,CAAC;IACrB,qCAAqC;IACrC,WAAW,EAAE,MAAM,CAAC;IACpB,uCAAuC;IACvC,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,sCAAsC;IACtC,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,yCAAyC;IACzC,SAAS,EAAE,MAAM,IAAI,CAAC;IACtB,wCAAwC;IACxC,QAAQ,EAAE,MAAM,IAAI,CAAC;CACrB;AAED;;;;;;;;;;;;;;;;GAgBG;AACH,wBAAgB,iBAAiB,CAAC,EACjC,IAAI,EACJ,YAAY,EACZ,WAAW,EACX,YAAY,EACZ,WAAW,EACX,SAAS,EACT,QAAQ,GACR,EAAE,sBAAsB,2CA2BxB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/components/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,KAAK,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AACvF,OAAO,EAAE,iBAAiB,EAAE,KAAK,sBAAsB,EAAE,MAAM,uBAAuB,CAAC"}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
import { Application, ClaimType } from '@judo/model-api';
|
|
2
|
+
/**
|
|
3
|
+
* Mapping of a claim to an attribute.
|
|
4
|
+
*/
|
|
5
|
+
export interface ClaimMapping {
|
|
6
|
+
claimType: ClaimType;
|
|
7
|
+
attributeName: string;
|
|
8
|
+
}
|
|
9
|
+
/**
|
|
10
|
+
* Actor authentication configuration extracted from Application model.
|
|
11
|
+
*/
|
|
12
|
+
export interface ActorAuthConfig {
|
|
13
|
+
actorName: string;
|
|
14
|
+
requiresAuth: boolean;
|
|
15
|
+
realm?: string;
|
|
16
|
+
clientId?: string;
|
|
17
|
+
claims: ClaimMapping[];
|
|
18
|
+
}
|
|
19
|
+
/**
|
|
20
|
+
* Extract authentication configuration from Application model.
|
|
21
|
+
*
|
|
22
|
+
* @param app - The Application model
|
|
23
|
+
* @returns ActorAuthConfig with authentication requirements
|
|
24
|
+
*/
|
|
25
|
+
export declare function getAuthConfig(app: Application): ActorAuthConfig;
|
|
26
|
+
/**
|
|
27
|
+
* Check if two actors share the same authentication realm.
|
|
28
|
+
*
|
|
29
|
+
* @param config1 - First actor's auth config
|
|
30
|
+
* @param config2 - Second actor's auth config
|
|
31
|
+
* @returns true if both share same realm or neither requires auth
|
|
32
|
+
*/
|
|
33
|
+
export declare function isSameRealm(config1: ActorAuthConfig, config2: ActorAuthConfig): boolean;
|
|
34
|
+
//# sourceMappingURL=auth-config.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth-config.d.ts","sourceRoot":"","sources":["../../src/config/auth-config.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE9D;;GAEG;AACH,MAAM,WAAW,YAAY;IAC5B,SAAS,EAAE,SAAS,CAAC;IACrB,aAAa,EAAE,MAAM,CAAC;CACtB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC/B,SAAS,EAAE,MAAM,CAAC;IAClB,YAAY,EAAE,OAAO,CAAC;IACtB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,EAAE,YAAY,EAAE,CAAC;CACvB;AAED;;;;;GAKG;AACH,wBAAgB,aAAa,CAAC,GAAG,EAAE,WAAW,GAAG,eAAe,CAqB/D;AAED;;;;;;GAMG;AACH,wBAAgB,WAAW,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,EAAE,eAAe,GAAG,OAAO,CAavF"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/config/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,WAAW,EAAE,KAAK,eAAe,EAAE,KAAK,YAAY,EAAE,MAAM,eAAe,CAAC;AACpG,OAAO,EACN,eAAe,EACf,iBAAiB,EACjB,mBAAmB,EACnB,KAAK,UAAU,EACf,KAAK,WAAW,GAChB,MAAM,eAAe,CAAC"}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
import { UserManagerSettings } from 'oidc-client-ts';
|
|
2
|
+
import { ActorAuthConfig } from './auth-config';
|
|
3
|
+
/**
|
|
4
|
+
* Simplified OIDC configuration requiring only the provider URL.
|
|
5
|
+
* All other fields have sensible defaults.
|
|
6
|
+
*
|
|
7
|
+
* The client ID is derived automatically from the active actor's Application.name
|
|
8
|
+
* in the model — it is not configurable here.
|
|
9
|
+
*/
|
|
10
|
+
export interface OidcConfig {
|
|
11
|
+
/** OIDC issuer base URL (e.g., 'https://auth.example.com'). The '/auth/realms/{realm}' path is appended from model. */
|
|
12
|
+
issuerUrl: string;
|
|
13
|
+
/** OAuth scopes. @default 'openid profile email' */
|
|
14
|
+
scope?: string;
|
|
15
|
+
/** Redirect URI after login. @default window.location.origin */
|
|
16
|
+
redirectUri?: string;
|
|
17
|
+
/** Redirect URI after logout. @default window.location.origin */
|
|
18
|
+
postLogoutRedirectUri?: string;
|
|
19
|
+
}
|
|
20
|
+
/**
|
|
21
|
+
* Create full OidcOptions from simplified OidcConfig with sensible defaults.
|
|
22
|
+
*
|
|
23
|
+
* @param config - Simplified OIDC config (only issuerUrl required)
|
|
24
|
+
* @returns Full OidcOptions with all fields populated
|
|
25
|
+
*/
|
|
26
|
+
export declare function createOidcOptions(config: OidcConfig): OidcOptions;
|
|
27
|
+
/**
|
|
28
|
+
* Options for building OIDC configuration.
|
|
29
|
+
*/
|
|
30
|
+
export interface OidcOptions {
|
|
31
|
+
/** Base URL for the OIDC issuer */
|
|
32
|
+
issuerUrl: string;
|
|
33
|
+
/** URI to redirect after login */
|
|
34
|
+
redirectUri: string;
|
|
35
|
+
/** URI to redirect after logout */
|
|
36
|
+
postLogoutRedirectUri: string;
|
|
37
|
+
/** OAuth scopes (defaults to 'openid profile email') */
|
|
38
|
+
scope?: string;
|
|
39
|
+
/** Response type (defaults to 'code') */
|
|
40
|
+
responseType?: string;
|
|
41
|
+
}
|
|
42
|
+
/**
|
|
43
|
+
* Build OIDC client configuration from ActorAuthConfig.
|
|
44
|
+
*
|
|
45
|
+
* @param config - Actor authentication configuration
|
|
46
|
+
* @param options - OIDC options
|
|
47
|
+
* @returns UserManagerSettings for oidc-client-ts
|
|
48
|
+
* @throws Error if config doesn't require authentication
|
|
49
|
+
*/
|
|
50
|
+
export declare function buildOidcConfig(config: ActorAuthConfig, options: OidcOptions): UserManagerSettings;
|
|
51
|
+
/**
|
|
52
|
+
* Validate OIDC options.
|
|
53
|
+
*
|
|
54
|
+
* @param options - OIDC options to validate
|
|
55
|
+
* @throws Error if options are invalid
|
|
56
|
+
*/
|
|
57
|
+
export declare function validateOidcOptions(options: OidcOptions): void;
|
|
58
|
+
//# sourceMappingURL=oidc-config.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"oidc-config.d.ts","sourceRoot":"","sources":["../../src/config/oidc-config.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AAC1D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,eAAe,CAAC;AAErD;;;;;;GAMG;AACH,MAAM,WAAW,UAAU;IAC1B,uHAAuH;IACvH,SAAS,EAAE,MAAM,CAAC;IAClB,oDAAoD;IACpD,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,gEAAgE;IAChE,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,iEAAiE;IACjE,qBAAqB,CAAC,EAAE,MAAM,CAAC;CAC/B;AAED;;;;;GAKG;AACH,wBAAgB,iBAAiB,CAAC,MAAM,EAAE,UAAU,GAAG,WAAW,CAQjE;AAED;;GAEG;AACH,MAAM,WAAW,WAAW;IAC3B,mCAAmC;IACnC,SAAS,EAAE,MAAM,CAAC;IAClB,kCAAkC;IAClC,WAAW,EAAE,MAAM,CAAC;IACpB,mCAAmC;IACnC,qBAAqB,EAAE,MAAM,CAAC;IAC9B,wDAAwD;IACxD,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,yCAAyC;IACzC,YAAY,CAAC,EAAE,MAAM,CAAC;CACtB;AAED;;;;;;;GAOG;AACH,wBAAgB,eAAe,CAAC,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,WAAW,GAAG,mBAAmB,CAuBlG;AAED;;;;;GAKG;AACH,wBAAgB,mBAAmB,CAAC,OAAO,EAAE,WAAW,GAAG,IAAI,CAuB9D"}
|
|
@@ -0,0 +1,4 @@
|
|
|
1
|
+
export { useAuth, useOidcAuthRequired, type JudoAuthContext, type PrincipalData } from './use-auth';
|
|
2
|
+
export { useRequireAuth } from './use-require-auth';
|
|
3
|
+
export { useActorSwitch, getSwitchConfigs, type PendingSwitch, type UseActorSwitchResult } from './use-actor-switch';
|
|
4
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/hooks/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,mBAAmB,EAAE,KAAK,eAAe,EAAE,KAAK,aAAa,EAAE,MAAM,YAAY,CAAC;AACpG,OAAO,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,KAAK,aAAa,EAAE,KAAK,oBAAoB,EAAE,MAAM,oBAAoB,CAAC"}
|