@logto/node 1.0.0-beta.0 → 1.0.0-beta.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md ADDED
@@ -0,0 +1,46 @@
1
+ # Logto Node.js SDK
2
+
3
+ [![Version](https://img.shields.io/npm/v/@logto/node)](https://www.npmjs.com/package/@logto/node)
4
+ [![Build Status](https://github.com/logto-io/js/actions/workflows/main.yml/badge.svg)](https://github.com/logto-io/js/actions/workflows/main.yml)
5
+ [![Codecov](https://img.shields.io/codecov/c/github/logto-io/js)](https://app.codecov.io/gh/logto-io/js?branch=master)
6
+
7
+ The Logto Node.js SDK written in TypeScript. Check out our [docs](https://docs.logto.io/sdk/JavaScript/node/) for more information.
8
+
9
+ We also provide [文档](https://docs.logto.io/zh-cn/sdk/JavaScript/node/) in Simplified Chinese.
10
+
11
+ ## Installation
12
+
13
+ ### Using npm
14
+
15
+ ```bash
16
+ npm install @logto/node
17
+ ```
18
+
19
+ ### Using yarn
20
+
21
+ ```bash
22
+ yarn add @logto/node
23
+ ```
24
+
25
+ ### Using pnpm
26
+
27
+ ```bash
28
+ pnpm add @logto/node
29
+ ```
30
+
31
+ ## What is this and how does it work?
32
+
33
+ As the name suggests, Logto Node.js SDK is the foundation of all Logto SDKs that run in Node.js (Express, Next.js, etc.). `@logto/node` extends `@logto/client` and provides a Node.js specific implementation of the client adapters:
34
+
35
+ - Implements `requester` by using package `node-fetch`.
36
+ - Implements `generateCodeChallenge`, `generateCodeVerifier`, `generateState` methods by using `crypto`.
37
+
38
+ Usually you are not expected to use it directly in your application, but instead choosing a framework specific SDK that built on top of it. We have already released a set of official SDKs to accelerate your integration. [Check this out](https://docs.logto.io/docs/recipes/integrate-logto/) and get started!
39
+
40
+ If Logto does not support your traditional web framework and you want to create your own SDK from scratch, we recommend checking out the SDK specification first. You can also refer to our [Express SDK](https://github.com/logto-io/js/tree/master/packages/express) and [Next.js SDK](https://github.com/logto-io/js/tree/master/packages/next) to learn more about the implementation details.
41
+
42
+ ## Resources
43
+
44
+ [![Website](https://img.shields.io/badge/website-logto.io-8262F8.svg)](https://logto.io/)
45
+ [![Docs](https://img.shields.io/badge/docs-logto.io-green.svg)](https://docs.logto.io/sdk/JavaScript/node/)
46
+ [![Discord](https://img.shields.io/discord/965845662535147551?logo=discord&logoColor=ffffff&color=7389D8&cacheSeconds=600)](https://discord.gg/UEPaF3j5e6)
package/lib/index.d.ts CHANGED
@@ -1,8 +1,25 @@
1
- import BaseClient, { LogtoConfig, ClientAdapter } from "@logto/client";
1
+ import BaseClient, { IdTokenClaims, UserInfoResponse, LogtoConfig, ClientAdapter } from "@logto/client";
2
+ declare module 'http' {
3
+ interface IncomingMessage {
4
+ user: LogtoContext;
5
+ }
6
+ }
7
+ export type LogtoContext = {
8
+ isAuthenticated: boolean;
9
+ claims?: IdTokenClaims;
10
+ accessToken?: string;
11
+ userInfo?: UserInfoResponse;
12
+ };
13
+ export type GetContextParameters = {
14
+ fetchUserInfo?: boolean;
15
+ getAccessToken?: boolean;
16
+ resource?: string;
17
+ };
2
18
  export type { IdTokenClaims, LogtoErrorCode, LogtoConfig, LogtoClientErrorCode, Storage, StorageKey, } from '@logto/client';
3
- export { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError } from '@logto/client';
19
+ export { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError, ReservedScope, UserScope, } from '@logto/client';
4
20
  export default class LogtoClient extends BaseClient {
5
21
  constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>);
22
+ getContext: ({ getAccessToken, resource, fetchUserInfo, }?: GetContextParameters) => Promise<LogtoContext>;
6
23
  }
7
24
 
8
25
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"mappings":";ACKA,YAAY,EACV,aAAa,EACb,cAAc,EACd,WAAW,EACX,oBAAoB,EACpB,OAAO,EACP,UAAU,GACX,MAAM,eAAe,CAAC;AACvB,OAAO,EAAE,UAAU,EAAE,SAAS,EAAE,MAAM,EAAE,iBAAiB,EAAE,gBAAgB,EAAE,MAAM,eAAe,CAAC;AAEnG,gCAAiC,SAAQ,UAAU;gBACrC,MAAM,EAAE,WAAW,EAAE,OAAO,EAAE,IAAI,CAAC,aAAa,EAAE,UAAU,GAAG,SAAS,CAAC;CAStF","sources":["packages/node/src/src/utils/generators.ts","packages/node/src/src/index.ts","packages/node/src/index.ts"],"sourcesContent":[null,null,"import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport fetch from 'node-fetch';\n\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\nexport { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError } from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(fetch),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n}\n"],"names":[],"version":3,"file":"index.d.ts.map"}
1
+ {"mappings":";AAEA,eAAe,MAAM,CAAC;IAGpB,UAAU,eAAe;QACvB,IAAI,EAAE,YAAY,CAAC;KACpB;CACF;AAED,2BAA2B;IACzB,eAAe,EAAE,OAAO,CAAC;IACzB,MAAM,CAAC,EAAE,aAAa,CAAC;IACvB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,EAAE,gBAAgB,CAAC;CAC7B,CAAC;AAEF,mCAAmC;IACjC,aAAa,CAAC,EAAE,OAAO,CAAC;IACxB,cAAc,CAAC,EAAE,OAAO,CAAC;IACzB,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AEZF,YAAY,EACV,aAAa,EACb,cAAc,EACd,WAAW,EACX,oBAAoB,EACpB,OAAO,EACP,UAAU,GACX,MAAM,eAAe,CAAC;AAEvB,OAAO,EACL,UAAU,EACV,SAAS,EACT,MAAM,EACN,iBAAiB,EACjB,gBAAgB,EAChB,aAAa,EACb,SAAS,GACV,MAAM,eAAe,CAAC;AAEvB,gCAAiC,SAAQ,UAAU;gBACrC,MAAM,EAAE,WAAW,EAAE,OAAO,EAAE,IAAI,CAAC,aAAa,EAAE,UAAU,GAAG,SAAS,CAAC;IA6BrF,UAAU,kDAIP,oBAAoB,KAAQ,QAAQ,YAAY,CAAC,CAiClD;CAEH","sources":["packages/node/src/src/types.ts","packages/node/src/src/utils/generators.ts","packages/node/src/src/index.ts","packages/node/src/index.ts"],"sourcesContent":[null,null,null,"import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport { GetContextParameters, LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext, GetContextParameters } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n Authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n ...init?.headers,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n /* eslint-disable complexity */\n getContext = async ({\n getAccessToken,\n resource,\n fetchUserInfo,\n }: GetContextParameters = {}): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken(resource);\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n /* eslint-enable complexity */\n}\n"],"names":[],"version":3,"file":"index.d.ts.map"}
package/lib/index.js CHANGED
@@ -1,4 +1,5 @@
1
1
  var $gSEHM$logtoclient = require("@logto/client");
2
+ var $gSEHM$silverhandessentials = require("@silverhand/essentials");
2
3
  var $gSEHM$nodefetch = require("node-fetch");
3
4
  var $gSEHM$crypto = require("crypto");
4
5
  var $gSEHM$jsbase64 = require("js-base64");
@@ -21,6 +22,9 @@ $parcel$export(module.exports, "OidcError", () => $cc9b2db9d73faa66$re_export$Oi
21
22
  $parcel$export(module.exports, "Prompt", () => $cc9b2db9d73faa66$re_export$Prompt);
22
23
  $parcel$export(module.exports, "LogtoRequestError", () => $cc9b2db9d73faa66$re_export$LogtoRequestError);
23
24
  $parcel$export(module.exports, "LogtoClientError", () => $cc9b2db9d73faa66$re_export$LogtoClientError);
25
+ $parcel$export(module.exports, "ReservedScope", () => $cc9b2db9d73faa66$re_export$ReservedScope);
26
+ $parcel$export(module.exports, "UserScope", () => $cc9b2db9d73faa66$re_export$UserScope);
27
+
24
28
 
25
29
 
26
30
 
@@ -44,12 +48,47 @@ class $cc9b2db9d73faa66$export$2e2bcd8739ae039 extends (0, ($parcel$interopDefau
44
48
  constructor(config, adapter){
45
49
  super(config, {
46
50
  ...adapter,
47
- requester: (0, $gSEHM$logtoclient.createRequester)((0, ($parcel$interopDefault($gSEHM$nodefetch)))),
51
+ requester: (0, $gSEHM$logtoclient.createRequester)(config.appSecret ? async (...args)=>{
52
+ const [input, init] = args;
53
+ return (0, ($parcel$interopDefault($gSEHM$nodefetch)))(input, {
54
+ ...init,
55
+ headers: {
56
+ Authorization: `basic ${Buffer.from(// eslint-disable-next-line @typescript-eslint/restrict-template-expressions
57
+ `${config.appId}:${config.appSecret}`, "utf8").toString("base64")}`,
58
+ ...init?.headers
59
+ }
60
+ });
61
+ } : (0, ($parcel$interopDefault($gSEHM$nodefetch)))),
48
62
  generateCodeChallenge: $062ada5067f1da29$export$414b01b1f867308a,
49
63
  generateCodeVerifier: $062ada5067f1da29$export$cf1891f923f5943a,
50
64
  generateState: $062ada5067f1da29$export$9ccd2716e53a229b
51
65
  });
52
66
  }
67
+ /* eslint-disable complexity */ getContext = async ({ getAccessToken: getAccessToken , resource: resource , fetchUserInfo: fetchUserInfo } = {})=>{
68
+ const isAuthenticated = await this.isAuthenticated();
69
+ if (!isAuthenticated) return {
70
+ isAuthenticated: isAuthenticated
71
+ };
72
+ const claims = await this.getIdTokenClaims();
73
+ if (!getAccessToken) return {
74
+ isAuthenticated: isAuthenticated,
75
+ claims: claims,
76
+ userInfo: (0, $gSEHM$silverhandessentials.conditional)(fetchUserInfo && await this.fetchUserInfo())
77
+ };
78
+ try {
79
+ const accessToken = await this.getAccessToken(resource);
80
+ return {
81
+ isAuthenticated: isAuthenticated,
82
+ claims: await this.getIdTokenClaims(),
83
+ userInfo: (0, $gSEHM$silverhandessentials.conditional)(fetchUserInfo && await this.fetchUserInfo()),
84
+ accessToken: accessToken
85
+ };
86
+ } catch {
87
+ return {
88
+ isAuthenticated: false
89
+ };
90
+ }
91
+ };
53
92
  }
54
93
 
55
94
 
package/lib/index.js.map CHANGED
@@ -1 +1 @@
1
- {"mappings":";;;;;;;;;;;;;;;;;;;;;;;AAAA;;ACCA;;AAIA;;GAEG,CACH,MAAM,0CAAoB,GAAG,CAAC,MAAM,GAAG,EAAE,GACvC,CAAA,GAAA,8BAAc,CAAA,CAAC,CAAA,GAAA,4BAAc,CAAA,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,AAAC;AAKxD,MAAM,yCAAa,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAOnD,MAAM,yCAAoB,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAQ1D,MAAM,yCAAqB,GAAG,OAAO,YAAoB,GAAsB;IACpF,MAAM,mBAAmB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,AAAC;IACnE,MAAM,IAAI,GAAG,CAAA,GAAA,wBAAU,CAAA,CAAC,QAAQ,CAAC,AAAC;IAClC,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,CAAC;IACjC,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,EAAE,AAAC;IAEpC,OAAO,CAAA,GAAA,8BAAc,CAAA,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;CAC5C,AAAC;;;;ADrBa,uDAA0B,CAAA,GAAA,4CAAU,CAAA;IACjD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,MAAM,EAAE;YACZ,GAAG,OAAO;YACV,SAAS,EAAE,CAAA,GAAA,kCAAe,CAAA,CAAC,CAAA,GAAA,0CAAK,CAAA,CAAC;mCACjC,yCAAqB;kCACrB,yCAAoB;2BACpB,yCAAa;SACd,CAAC,CAAC;KACJ;CACF","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport fetch from 'node-fetch';\n\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\nexport { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError } from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(fetch),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"index.js.map","sourceRoot":"../../../"}
1
+ {"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;;ACCA;;AAIA;;GAEG,CACH,MAAM,0CAAoB,GAAG,CAAC,MAAM,GAAG,EAAE,GACvC,CAAA,GAAA,8BAAc,CAAA,CAAC,CAAA,GAAA,4BAAc,CAAA,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,AAAC;AAKxD,MAAM,yCAAa,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAOnD,MAAM,yCAAoB,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAQ1D,MAAM,yCAAqB,GAAG,OAAO,YAAoB,GAAsB;IACpF,MAAM,mBAAmB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,AAAC;IACnE,MAAM,IAAI,GAAG,CAAA,GAAA,wBAAU,CAAA,CAAC,QAAQ,CAAC,AAAC;IAClC,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,CAAC;IACjC,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,EAAE,AAAC;IAEpC,OAAO,CAAA,GAAA,8BAAc,CAAA,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;CAC5C,AAAC;;;;ADRa,uDAA0B,CAAA,GAAA,4CAAU,CAAA;IACjD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,MAAM,EAAE;YACZ,GAAG,OAAO;YACV,SAAS,EAAE,CAAA,GAAA,kCAAe,CAAA,CACxB,MAAM,CAAC,SAAS,GACZ,OAAO,GAAG,IAAI,AAA0B,GAAK;gBAC3C,MAAM,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,IAAI,AAAC;gBAE3B,OAAO,CAAA,GAAA,0CAAK,CAAA,CAAC,KAAK,EAAE;oBAClB,GAAG,IAAI;oBACP,OAAO,EAAE;wBACP,aAAa,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC,IAAI,CACjC,4EAA4E;wBAC5E,CAAC,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,SAAS,CAAC,CAAC,EACrC,MAAM,CACP,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC;wBACtB,GAAG,IAAI,EAAE,OAAO;qBACjB;iBACF,CAAC,CAAC;aACJ,GACD,CAAA,GAAA,0CAAK,CAAA,CACV;mCACD,yCAAqB;kCACrB,yCAAoB;2BACpB,yCAAa;SACd,CAAC,CAAC;KACJ;IAED,+BAA+B,CAC/B,UAAU,GAAG,OAAO,kBAClB,cAAc,CAAA,YACd,QAAQ,CAAA,iBACR,aAAa,CAAA,EACQ,GAAG,EAAE,GAA4B;QACtD,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,AAAC;QAErD,IAAI,CAAC,eAAe,EAClB,OAAO;6BACL,eAAe;SAChB,CAAC;QAGJ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,AAAC;QAE7C,IAAI,CAAC,cAAc,EACjB,OAAO;6BACL,eAAe;oBACf,MAAM;YACN,QAAQ,EAAE,CAAA,GAAA,uCAAW,CAAA,CAAC,aAAa,IAAK,MAAM,IAAI,CAAC,aAAa,EAAE,AAAC,CAAC;SACrE,CAAC;QAGJ,IAAI;YACF,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,AAAC;YAExD,OAAO;iCACL,eAAe;gBACf,MAAM,EAAE,MAAM,IAAI,CAAC,gBAAgB,EAAE;gBACrC,QAAQ,EAAE,CAAA,GAAA,uCAAW,CAAA,CAAC,aAAa,IAAK,MAAM,IAAI,CAAC,aAAa,EAAE,AAAC,CAAC;6BACpE,WAAW;aACZ,CAAC;SACH,CAAC,OAAM;YACN,OAAO;gBACL,eAAe,EAAE,KAAK;aACvB,CAAC;SACH;KACF,CAAC;CAEH","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport { GetContextParameters, LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext, GetContextParameters } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n Authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n ...init?.headers,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n /* eslint-disable complexity */\n getContext = async ({\n getAccessToken,\n resource,\n fetchUserInfo,\n }: GetContextParameters = {}): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken(resource);\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n /* eslint-enable complexity */\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"index.js.map","sourceRoot":"../../../"}
package/lib/module.js CHANGED
@@ -1,5 +1,7 @@
1
- import $jetHk$logtoclient, {createRequester as $jetHk$createRequester, LogtoError as $0aca7ca5e7992ee0$re_export$LogtoError, OidcError as $0aca7ca5e7992ee0$re_export$OidcError, Prompt as $0aca7ca5e7992ee0$re_export$Prompt, LogtoRequestError as $0aca7ca5e7992ee0$re_export$LogtoRequestError, LogtoClientError as $0aca7ca5e7992ee0$re_export$LogtoClientError} from "@logto/client";
1
+ import $jetHk$logtoclient, {createRequester as $jetHk$createRequester, LogtoError as $0aca7ca5e7992ee0$re_export$LogtoError, OidcError as $0aca7ca5e7992ee0$re_export$OidcError, Prompt as $0aca7ca5e7992ee0$re_export$Prompt, LogtoRequestError as $0aca7ca5e7992ee0$re_export$LogtoRequestError, LogtoClientError as $0aca7ca5e7992ee0$re_export$LogtoClientError, ReservedScope as $0aca7ca5e7992ee0$re_export$ReservedScope, UserScope as $0aca7ca5e7992ee0$re_export$UserScope} from "@logto/client";
2
+ import {conditional as $jetHk$conditional} from "@silverhand/essentials";
2
3
  import $jetHk$nodefetch from "node-fetch";
4
+ import {Buffer as $jetHk$Buffer} from "buffer";
3
5
  import {randomFillSync as $jetHk$randomFillSync, createHash as $jetHk$createHash} from "crypto";
4
6
  import {fromUint8Array as $jetHk$fromUint8Array} from "js-base64";
5
7
 
@@ -7,6 +9,7 @@ import {fromUint8Array as $jetHk$fromUint8Array} from "js-base64";
7
9
 
8
10
 
9
11
 
12
+
10
13
  /**
11
14
  * @param length The length of the raw random data.
12
15
  */ const $91cf1946314e24ae$var$generateRandomString = (length = 64)=>(0, $jetHk$fromUint8Array)((0, $jetHk$randomFillSync)(new Uint8Array(length)), true);
@@ -22,18 +25,55 @@ const $91cf1946314e24ae$export$414b01b1f867308a = async (codeVerifier)=>{
22
25
 
23
26
 
24
27
 
28
+
29
+ var $0aca7ca5e7992ee0$require$Buffer = $jetHk$Buffer;
25
30
  class $0aca7ca5e7992ee0$export$2e2bcd8739ae039 extends (0, $jetHk$logtoclient) {
26
31
  constructor(config, adapter){
27
32
  super(config, {
28
33
  ...adapter,
29
- requester: (0, $jetHk$createRequester)((0, $jetHk$nodefetch)),
34
+ requester: (0, $jetHk$createRequester)(config.appSecret ? async (...args)=>{
35
+ const [input, init] = args;
36
+ return (0, $jetHk$nodefetch)(input, {
37
+ ...init,
38
+ headers: {
39
+ Authorization: `basic ${$0aca7ca5e7992ee0$require$Buffer.from(// eslint-disable-next-line @typescript-eslint/restrict-template-expressions
40
+ `${config.appId}:${config.appSecret}`, "utf8").toString("base64")}`,
41
+ ...init?.headers
42
+ }
43
+ });
44
+ } : (0, $jetHk$nodefetch)),
30
45
  generateCodeChallenge: $91cf1946314e24ae$export$414b01b1f867308a,
31
46
  generateCodeVerifier: $91cf1946314e24ae$export$cf1891f923f5943a,
32
47
  generateState: $91cf1946314e24ae$export$9ccd2716e53a229b
33
48
  });
34
49
  }
50
+ /* eslint-disable complexity */ getContext = async ({ getAccessToken: getAccessToken , resource: resource , fetchUserInfo: fetchUserInfo } = {})=>{
51
+ const isAuthenticated = await this.isAuthenticated();
52
+ if (!isAuthenticated) return {
53
+ isAuthenticated: isAuthenticated
54
+ };
55
+ const claims = await this.getIdTokenClaims();
56
+ if (!getAccessToken) return {
57
+ isAuthenticated: isAuthenticated,
58
+ claims: claims,
59
+ userInfo: (0, $jetHk$conditional)(fetchUserInfo && await this.fetchUserInfo())
60
+ };
61
+ try {
62
+ const accessToken = await this.getAccessToken(resource);
63
+ return {
64
+ isAuthenticated: isAuthenticated,
65
+ claims: await this.getIdTokenClaims(),
66
+ userInfo: (0, $jetHk$conditional)(fetchUserInfo && await this.fetchUserInfo()),
67
+ accessToken: accessToken
68
+ };
69
+ } catch {
70
+ return {
71
+ isAuthenticated: false
72
+ };
73
+ }
74
+ };
35
75
  }
36
76
 
37
77
 
38
- export {$0aca7ca5e7992ee0$export$2e2bcd8739ae039 as default, $0aca7ca5e7992ee0$re_export$LogtoError as LogtoError, $0aca7ca5e7992ee0$re_export$OidcError as OidcError, $0aca7ca5e7992ee0$re_export$Prompt as Prompt, $0aca7ca5e7992ee0$re_export$LogtoRequestError as LogtoRequestError, $0aca7ca5e7992ee0$re_export$LogtoClientError as LogtoClientError};
78
+ export {$0aca7ca5e7992ee0$export$2e2bcd8739ae039 as default, $0aca7ca5e7992ee0$re_export$LogtoError as LogtoError, $0aca7ca5e7992ee0$re_export$OidcError as OidcError, $0aca7ca5e7992ee0$re_export$Prompt as Prompt, $0aca7ca5e7992ee0$re_export$LogtoRequestError as LogtoRequestError, $0aca7ca5e7992ee0$re_export$LogtoClientError as LogtoClientError, $0aca7ca5e7992ee0$re_export$ReservedScope as ReservedScope, $0aca7ca5e7992ee0$re_export$UserScope as UserScope};
39
79
  //# sourceMappingURL=module.js.map
package/lib/module.js.map CHANGED
@@ -1 +1 @@
1
- {"mappings":";;;;;AAAA;;ACCA;;AAIA;;GAEG,CACH,MAAM,0CAAoB,GAAG,CAAC,MAAM,GAAG,EAAE,GACvC,CAAA,GAAA,qBAAc,CAAA,CAAC,CAAA,GAAA,qBAAc,CAAA,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,AAAC;AAKxD,MAAM,yCAAa,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAOnD,MAAM,yCAAoB,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAQ1D,MAAM,yCAAqB,GAAG,OAAO,YAAoB,GAAsB;IACpF,MAAM,mBAAmB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,AAAC;IACnE,MAAM,IAAI,GAAG,CAAA,GAAA,iBAAU,CAAA,CAAC,QAAQ,CAAC,AAAC;IAClC,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,CAAC;IACjC,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,EAAE,AAAC;IAEpC,OAAO,CAAA,GAAA,qBAAc,CAAA,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;CAC5C,AAAC;;;;ADrBa,uDAA0B,CAAA,GAAA,kBAAU,CAAA;IACjD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,MAAM,EAAE;YACZ,GAAG,OAAO;YACV,SAAS,EAAE,CAAA,GAAA,sBAAe,CAAA,CAAC,CAAA,GAAA,gBAAK,CAAA,CAAC;mCACjC,yCAAqB;kCACrB,yCAAoB;2BACpB,yCAAa;SACd,CAAC,CAAC;KACJ;CACF","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport fetch from 'node-fetch';\n\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\nexport { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError } from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(fetch),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"module.js.map"}
1
+ {"mappings":";;;;;;;AAAA;;;ACCA;;AAIA;;GAEG,CACH,MAAM,0CAAoB,GAAG,CAAC,MAAM,GAAG,EAAE,GACvC,CAAA,GAAA,qBAAc,CAAA,CAAC,CAAA,GAAA,qBAAc,CAAA,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,AAAC;AAKxD,MAAM,yCAAa,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAOnD,MAAM,yCAAoB,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAQ1D,MAAM,yCAAqB,GAAG,OAAO,YAAoB,GAAsB;IACpF,MAAM,mBAAmB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,AAAC;IACnE,MAAM,IAAI,GAAG,CAAA,GAAA,iBAAU,CAAA,CAAC,QAAQ,CAAC,AAAC;IAClC,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,CAAC;IACjC,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,EAAE,AAAC;IAEpC,OAAO,CAAA,GAAA,qBAAc,CAAA,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;CAC5C,AAAC;;;;;;ADRa,uDAA0B,CAAA,GAAA,kBAAU,CAAA;IACjD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,MAAM,EAAE;YACZ,GAAG,OAAO;YACV,SAAS,EAAE,CAAA,GAAA,sBAAe,CAAA,CACxB,MAAM,CAAC,SAAS,GACZ,OAAO,GAAG,IAAI,AAA0B,GAAK;gBAC3C,MAAM,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,IAAI,AAAC;gBAE3B,OAAO,CAAA,GAAA,gBAAK,CAAA,CAAC,KAAK,EAAE;oBAClB,GAAG,IAAI;oBACP,OAAO,EAAE;wBACP,aAAa,EAAE,CAAC,MAAM,EAAE,iCAAO,IAAI,CACjC,4EAA4E;wBAC5E,CAAC,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,SAAS,CAAC,CAAC,EACrC,MAAM,CACP,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC;wBACtB,GAAG,IAAI,EAAE,OAAO;qBACjB;iBACF,CAAC,CAAC;aACJ,GACD,CAAA,GAAA,gBAAK,CAAA,CACV;mCACD,yCAAqB;kCACrB,yCAAoB;2BACpB,yCAAa;SACd,CAAC,CAAC;KACJ;IAED,+BAA+B,CAC/B,UAAU,GAAG,OAAO,kBAClB,cAAc,CAAA,YACd,QAAQ,CAAA,iBACR,aAAa,CAAA,EACQ,GAAG,EAAE,GAA4B;QACtD,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,AAAC;QAErD,IAAI,CAAC,eAAe,EAClB,OAAO;6BACL,eAAe;SAChB,CAAC;QAGJ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,AAAC;QAE7C,IAAI,CAAC,cAAc,EACjB,OAAO;6BACL,eAAe;oBACf,MAAM;YACN,QAAQ,EAAE,CAAA,GAAA,kBAAW,CAAA,CAAC,aAAa,IAAK,MAAM,IAAI,CAAC,aAAa,EAAE,AAAC,CAAC;SACrE,CAAC;QAGJ,IAAI;YACF,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,AAAC;YAExD,OAAO;iCACL,eAAe;gBACf,MAAM,EAAE,MAAM,IAAI,CAAC,gBAAgB,EAAE;gBACrC,QAAQ,EAAE,CAAA,GAAA,kBAAW,CAAA,CAAC,aAAa,IAAK,MAAM,IAAI,CAAC,aAAa,EAAE,AAAC,CAAC;6BACpE,WAAW;aACZ,CAAC;SACH,CAAC,OAAM;YACN,OAAO;gBACL,eAAe,EAAE,KAAK;aACvB,CAAC;SACH;KACF,CAAC;CAEH","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport { GetContextParameters, LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext, GetContextParameters } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n Authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n ...init?.headers,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n /* eslint-disable complexity */\n getContext = async ({\n getAccessToken,\n resource,\n fetchUserInfo,\n }: GetContextParameters = {}): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken(resource);\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n /* eslint-enable complexity */\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"module.js.map"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@logto/node",
3
- "version": "1.0.0-beta.0",
3
+ "version": "1.0.0-beta.11",
4
4
  "source": "./src/index.ts",
5
5
  "main": "./lib/index.js",
6
6
  "exports": {
@@ -29,28 +29,28 @@
29
29
  "prepack": "pnpm test"
30
30
  },
31
31
  "dependencies": {
32
- "@logto/client": "^1.0.0-beta.0",
33
- "@silverhand/essentials": "^1.1.6",
32
+ "@logto/client": "^1.0.0-beta.11",
33
+ "@silverhand/essentials": "^1.2.1",
34
34
  "js-base64": "^3.7.2",
35
35
  "node-fetch": "^2.6.7"
36
36
  },
37
37
  "devDependencies": {
38
38
  "@jest/types": "^27.5.1",
39
- "@parcel/core": "^2.6.2",
40
- "@parcel/packager-ts": "^2.6.2",
41
- "@parcel/transformer-typescript-types": "^2.6.2",
42
- "@silverhand/eslint-config": "^0.17.0",
43
- "@silverhand/ts-config": "^0.17.0",
39
+ "@parcel/core": "^2.7.0",
40
+ "@parcel/packager-ts": "^2.7.0",
41
+ "@parcel/transformer-typescript-types": "^2.7.0",
42
+ "@silverhand/eslint-config": "^1.0.0",
43
+ "@silverhand/ts-config": "^1.0.0",
44
44
  "@types/jest": "^27.4.0",
45
- "eslint": "^8.9.0",
45
+ "eslint": "^8.23.0",
46
46
  "jest": "^27.5.1",
47
47
  "jest-location-mock": "^1.0.9",
48
48
  "jest-matcher-specific-error": "^1.0.0",
49
49
  "lint-staged": "^13.0.0",
50
- "parcel": "^2.6.2",
51
- "prettier": "^2.3.2",
50
+ "parcel": "^2.7.0",
51
+ "prettier": "^2.7.1",
52
52
  "ts-jest": "^27.0.4",
53
- "typescript": "^4.5.5"
53
+ "typescript": "4.7.4"
54
54
  },
55
55
  "eslintConfig": {
56
56
  "extends": "@silverhand"
@@ -68,5 +68,5 @@
68
68
  }
69
69
  }
70
70
  },
71
- "gitHead": "f0f78e6f0b97174de98588b35d1d12c8396206ba"
71
+ "gitHead": "2854b6057d269a7dc24ed53f65aba897dde9b2e8"
72
72
  }