@logto/node 1.0.0-beta.9 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/index.d.ts +6 -1
- package/lib/index.d.ts.map +1 -1
- package/lib/index.js +34 -34
- package/lib/index.js.map +1 -1
- package/lib/module.d.mts +25 -0
- package/lib/{module.js → module.mjs} +8 -8
- package/lib/module.mjs.map +1 -0
- package/package.json +14 -14
- package/lib/module.js.map +0 -1
package/lib/index.d.ts
CHANGED
|
@@ -10,11 +10,16 @@ export type LogtoContext = {
|
|
|
10
10
|
accessToken?: string;
|
|
11
11
|
userInfo?: UserInfoResponse;
|
|
12
12
|
};
|
|
13
|
+
export type GetContextParameters = {
|
|
14
|
+
fetchUserInfo?: boolean;
|
|
15
|
+
getAccessToken?: boolean;
|
|
16
|
+
resource?: string;
|
|
17
|
+
};
|
|
13
18
|
export type { IdTokenClaims, LogtoErrorCode, LogtoConfig, LogtoClientErrorCode, Storage, StorageKey, } from '@logto/client';
|
|
14
19
|
export { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError, ReservedScope, UserScope, } from '@logto/client';
|
|
15
20
|
export default class LogtoClient extends BaseClient {
|
|
16
21
|
constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>);
|
|
17
|
-
getContext: (getAccessToken
|
|
22
|
+
getContext: ({ getAccessToken, resource, fetchUserInfo, }?: GetContextParameters) => Promise<LogtoContext>;
|
|
18
23
|
}
|
|
19
24
|
|
|
20
25
|
//# sourceMappingURL=index.d.ts.map
|
package/lib/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"mappings":";AAEA,eAAe,MAAM,CAAC;IAGpB,UAAU,eAAe;QACvB,IAAI,EAAE,YAAY,CAAC;KACpB;CACF;AAED,2BAA2B;IACzB,eAAe,EAAE,OAAO,CAAC;IACzB,MAAM,CAAC,EAAE,aAAa,CAAC;IACvB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,EAAE,gBAAgB,CAAC;CAC7B,CAAC;
|
|
1
|
+
{"mappings":";AAEA,eAAe,MAAM,CAAC;IAGpB,UAAU,eAAe;QACvB,IAAI,EAAE,YAAY,CAAC;KACpB;CACF;AAED,2BAA2B;IACzB,eAAe,EAAE,OAAO,CAAC;IACzB,MAAM,CAAC,EAAE,aAAa,CAAC;IACvB,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,EAAE,gBAAgB,CAAC;CAC7B,CAAC;AAEF,mCAAmC;IACjC,aAAa,CAAC,EAAE,OAAO,CAAC;IACxB,cAAc,CAAC,EAAE,OAAO,CAAC;IACzB,QAAQ,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC;AEXF,YAAY,EACV,aAAa,EACb,cAAc,EACd,WAAW,EACX,oBAAoB,EACpB,OAAO,EACP,UAAU,GACX,MAAM,eAAe,CAAC;AAEvB,OAAO,EACL,UAAU,EACV,SAAS,EACT,MAAM,EACN,iBAAiB,EACjB,gBAAgB,EAChB,aAAa,EACb,SAAS,GACV,MAAM,eAAe,CAAC;AAEvB,gCAAiC,SAAQ,UAAU;gBACrC,MAAM,EAAE,WAAW,EAAE,OAAO,EAAE,IAAI,CAAC,aAAa,EAAE,UAAU,GAAG,SAAS,CAAC;IA4BrF,UAAU,kDAIP,oBAAoB,KAAQ,QAAQ,YAAY,CAAC,CAiClD;CACH","sources":["packages/node/src/src/types.ts","packages/node/src/src/utils/generators.ts","packages/node/src/src/index.ts","packages/node/src/index.ts"],"sourcesContent":[null,null,null,"import type { LogtoConfig, ClientAdapter } from '@logto/client';\nimport BaseClient, { createRequester } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport type { GetContextParameters, LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext, GetContextParameters } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n Authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n ...init?.headers,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n getContext = async ({\n getAccessToken,\n resource,\n fetchUserInfo,\n }: GetContextParameters = {}): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken(resource);\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n}\n"],"names":[],"version":3,"file":"index.d.ts.map"}
|
package/lib/index.js
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
var $
|
|
2
|
-
var $
|
|
3
|
-
var $
|
|
4
|
-
var $
|
|
5
|
-
var $
|
|
1
|
+
var $C4LKF$logtoclient = require("@logto/client");
|
|
2
|
+
var $C4LKF$silverhandessentials = require("@silverhand/essentials");
|
|
3
|
+
var $C4LKF$nodefetch = require("node-fetch");
|
|
4
|
+
var $C4LKF$crypto = require("crypto");
|
|
5
|
+
var $C4LKF$jsbase64 = require("js-base64");
|
|
6
6
|
|
|
7
7
|
function $parcel$interopDefault(a) {
|
|
8
8
|
return a && a.__esModule ? a.default : a;
|
|
@@ -16,55 +16,55 @@ function $parcel$export(e, n, v, s) {
|
|
|
16
16
|
|
|
17
17
|
$parcel$defineInteropFlag(module.exports);
|
|
18
18
|
|
|
19
|
-
$parcel$export(module.exports, "default", () => $
|
|
20
|
-
$parcel$export(module.exports, "LogtoError", () => $
|
|
21
|
-
$parcel$export(module.exports, "OidcError", () => $
|
|
22
|
-
$parcel$export(module.exports, "Prompt", () => $
|
|
23
|
-
$parcel$export(module.exports, "LogtoRequestError", () => $
|
|
24
|
-
$parcel$export(module.exports, "LogtoClientError", () => $
|
|
25
|
-
$parcel$export(module.exports, "ReservedScope", () => $
|
|
26
|
-
$parcel$export(module.exports, "UserScope", () => $
|
|
27
|
-
|
|
19
|
+
$parcel$export(module.exports, "default", () => $8c9551714715c14b$export$2e2bcd8739ae039);
|
|
20
|
+
$parcel$export(module.exports, "LogtoError", () => $8c9551714715c14b$re_export$LogtoError);
|
|
21
|
+
$parcel$export(module.exports, "OidcError", () => $8c9551714715c14b$re_export$OidcError);
|
|
22
|
+
$parcel$export(module.exports, "Prompt", () => $8c9551714715c14b$re_export$Prompt);
|
|
23
|
+
$parcel$export(module.exports, "LogtoRequestError", () => $8c9551714715c14b$re_export$LogtoRequestError);
|
|
24
|
+
$parcel$export(module.exports, "LogtoClientError", () => $8c9551714715c14b$re_export$LogtoClientError);
|
|
25
|
+
$parcel$export(module.exports, "ReservedScope", () => $8c9551714715c14b$re_export$ReservedScope);
|
|
26
|
+
$parcel$export(module.exports, "UserScope", () => $8c9551714715c14b$re_export$UserScope);
|
|
28
27
|
|
|
29
28
|
|
|
30
29
|
|
|
30
|
+
/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */
|
|
31
31
|
|
|
32
32
|
/**
|
|
33
33
|
* @param length The length of the raw random data.
|
|
34
|
-
*/ const $
|
|
35
|
-
const $
|
|
36
|
-
const $
|
|
37
|
-
const $
|
|
34
|
+
*/ const $5ffebdf4968dbe4e$var$generateRandomString = (length = 64)=>(0, $C4LKF$jsbase64.fromUint8Array)((0, $C4LKF$crypto.randomFillSync)(new Uint8Array(length)), true);
|
|
35
|
+
const $5ffebdf4968dbe4e$export$9ccd2716e53a229b = ()=>$5ffebdf4968dbe4e$var$generateRandomString();
|
|
36
|
+
const $5ffebdf4968dbe4e$export$cf1891f923f5943a = ()=>$5ffebdf4968dbe4e$var$generateRandomString();
|
|
37
|
+
const $5ffebdf4968dbe4e$export$414b01b1f867308a = async (codeVerifier)=>{
|
|
38
38
|
const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);
|
|
39
|
-
const hash = (0, $
|
|
39
|
+
const hash = (0, $C4LKF$crypto.createHash)("sha256");
|
|
40
40
|
hash.update(encodedCodeVerifier);
|
|
41
41
|
const codeChallenge = hash.digest();
|
|
42
|
-
return (0, $
|
|
42
|
+
return (0, $C4LKF$jsbase64.fromUint8Array)(codeChallenge, true);
|
|
43
43
|
};
|
|
44
44
|
|
|
45
45
|
|
|
46
46
|
|
|
47
|
-
class $
|
|
47
|
+
class $8c9551714715c14b$export$2e2bcd8739ae039 extends (0, ($parcel$interopDefault($C4LKF$logtoclient))) {
|
|
48
48
|
constructor(config, adapter){
|
|
49
49
|
super(config, {
|
|
50
50
|
...adapter,
|
|
51
|
-
requester: (0, $
|
|
51
|
+
requester: (0, $C4LKF$logtoclient.createRequester)(config.appSecret ? async (...args)=>{
|
|
52
52
|
const [input, init] = args;
|
|
53
|
-
return (0, ($parcel$interopDefault($
|
|
53
|
+
return (0, ($parcel$interopDefault($C4LKF$nodefetch)))(input, {
|
|
54
54
|
...init,
|
|
55
55
|
headers: {
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
56
|
+
Authorization: `basic ${Buffer.from(// eslint-disable-next-line @typescript-eslint/restrict-template-expressions
|
|
57
|
+
`${config.appId}:${config.appSecret}`, "utf8").toString("base64")}`,
|
|
58
|
+
...init?.headers
|
|
59
59
|
}
|
|
60
60
|
});
|
|
61
|
-
} : (0, ($parcel$interopDefault($
|
|
62
|
-
generateCodeChallenge: $
|
|
63
|
-
generateCodeVerifier: $
|
|
64
|
-
generateState: $
|
|
61
|
+
} : (0, ($parcel$interopDefault($C4LKF$nodefetch)))),
|
|
62
|
+
generateCodeChallenge: $5ffebdf4968dbe4e$export$414b01b1f867308a,
|
|
63
|
+
generateCodeVerifier: $5ffebdf4968dbe4e$export$cf1891f923f5943a,
|
|
64
|
+
generateState: $5ffebdf4968dbe4e$export$9ccd2716e53a229b
|
|
65
65
|
});
|
|
66
66
|
}
|
|
67
|
-
|
|
67
|
+
getContext = async ({ getAccessToken: getAccessToken , resource: resource , fetchUserInfo: fetchUserInfo } = {})=>{
|
|
68
68
|
const isAuthenticated = await this.isAuthenticated();
|
|
69
69
|
if (!isAuthenticated) return {
|
|
70
70
|
isAuthenticated: isAuthenticated
|
|
@@ -73,14 +73,14 @@ class $cc9b2db9d73faa66$export$2e2bcd8739ae039 extends (0, ($parcel$interopDefau
|
|
|
73
73
|
if (!getAccessToken) return {
|
|
74
74
|
isAuthenticated: isAuthenticated,
|
|
75
75
|
claims: claims,
|
|
76
|
-
userInfo: (0, $
|
|
76
|
+
userInfo: (0, $C4LKF$silverhandessentials.conditional)(fetchUserInfo && await this.fetchUserInfo())
|
|
77
77
|
};
|
|
78
78
|
try {
|
|
79
|
-
const accessToken = await this.getAccessToken();
|
|
79
|
+
const accessToken = await this.getAccessToken(resource);
|
|
80
80
|
return {
|
|
81
81
|
isAuthenticated: isAuthenticated,
|
|
82
82
|
claims: await this.getIdTokenClaims(),
|
|
83
|
-
userInfo: (0, $
|
|
83
|
+
userInfo: (0, $C4LKF$silverhandessentials.conditional)(fetchUserInfo && await this.fetchUserInfo()),
|
|
84
84
|
accessToken: accessToken
|
|
85
85
|
};
|
|
86
86
|
} catch {
|
package/lib/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;;
|
|
1
|
+
{"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;;;ACAA,+GAA+G,GAC/G;;AAIA;;CAEC,GACD,MAAM,6CAAuB,CAAC,SAAS,EAAE,GACvC,CAAA,GAAA,8BAAa,EAAE,CAAA,GAAA,4BAAa,EAAE,IAAI,WAAW,UAAU,IAAI;AAKtD,MAAM,4CAAgB,IAAM;AAO5B,MAAM,4CAAuB,IAAM;AAQnC,MAAM,4CAAwB,OAAO,eAA0C;IACpF,MAAM,sBAAsB,IAAI,cAAc,MAAM,CAAC;IACrD,MAAM,OAAO,CAAA,GAAA,wBAAS,EAAE;IACxB,KAAK,MAAM,CAAC;IACZ,MAAM,gBAAgB,KAAK,MAAM;IAEjC,OAAO,CAAA,GAAA,8BAAc,AAAD,EAAE,eAAe,IAAI;AAC3C;;;;ADPe,uDAA0B,CAAA,GAAA,4CAAS;IAChD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,QAAQ;YACZ,GAAG,OAAO;YACV,WAAW,CAAA,GAAA,kCAAc,EACvB,OAAO,SAAS,GACZ,OAAO,GAAG,OAAmC;gBAC3C,MAAM,CAAC,OAAO,KAAK,GAAG;gBAEtB,OAAO,CAAA,GAAA,0CAAK,AAAD,EAAE,OAAO;oBAClB,GAAG,IAAI;oBACP,SAAS;wBACP,eAAe,CAAC,MAAM,EAAE,OAAO,IAAI,CACjC,4EAA4E;wBAC5E,CAAC,EAAE,OAAO,KAAK,CAAC,CAAC,EAAE,OAAO,SAAS,CAAC,CAAC,EACrC,QACA,QAAQ,CAAC,UAAU,CAAC;wBACtB,GAAG,MAAM,OAAO;oBAClB;gBACF;YACF,IACA,CAAA,GAAA,0CAAI,CAAC;mCAEX;kCACA;2BACA;QACF;IACF;IAEA,aAAa,OAAO,kBAClB,eAAc,YACd,SAAQ,iBACR,cAAa,EACQ,GAAG,CAAC,CAAC,GAA4B;QACtD,MAAM,kBAAkB,MAAM,IAAI,CAAC,eAAe;QAElD,IAAI,CAAC,iBACH,OAAO;6BACL;QACF;QAGF,MAAM,SAAS,MAAM,IAAI,CAAC,gBAAgB;QAE1C,IAAI,CAAC,gBACH,OAAO;6BACL;oBACA;YACA,UAAU,CAAA,GAAA,uCAAU,EAAE,iBAAkB,MAAM,IAAI,CAAC,aAAa;QAClE;QAGF,IAAI;YACF,MAAM,cAAc,MAAM,IAAI,CAAC,cAAc,CAAC;YAE9C,OAAO;iCACL;gBACA,QAAQ,MAAM,IAAI,CAAC,gBAAgB;gBACnC,UAAU,CAAA,GAAA,uCAAU,EAAE,iBAAkB,MAAM,IAAI,CAAC,aAAa;6BAChE;YACF;QACF,EAAE,OAAM;YACN,OAAO;gBACL,iBAAiB,KAAK;YACxB;QACF;IACF,EAAE;AACJ","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import type { LogtoConfig, ClientAdapter } from '@logto/client';\nimport BaseClient, { createRequester } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport type { GetContextParameters, LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext, GetContextParameters } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n Authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n ...init?.headers,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n getContext = async ({\n getAccessToken,\n resource,\n fetchUserInfo,\n }: GetContextParameters = {}): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken(resource);\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"index.js.map","sourceRoot":"../../../"}
|
package/lib/module.d.mts
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
import BaseClient, { IdTokenClaims, UserInfoResponse, LogtoConfig, ClientAdapter } from "@logto/client";
|
|
2
|
+
declare module 'http' {
|
|
3
|
+
interface IncomingMessage {
|
|
4
|
+
user: LogtoContext;
|
|
5
|
+
}
|
|
6
|
+
}
|
|
7
|
+
export type LogtoContext = {
|
|
8
|
+
isAuthenticated: boolean;
|
|
9
|
+
claims?: IdTokenClaims;
|
|
10
|
+
accessToken?: string;
|
|
11
|
+
userInfo?: UserInfoResponse;
|
|
12
|
+
};
|
|
13
|
+
export type GetContextParameters = {
|
|
14
|
+
fetchUserInfo?: boolean;
|
|
15
|
+
getAccessToken?: boolean;
|
|
16
|
+
resource?: string;
|
|
17
|
+
};
|
|
18
|
+
export type { IdTokenClaims, LogtoErrorCode, LogtoConfig, LogtoClientErrorCode, Storage, StorageKey, } from '@logto/client';
|
|
19
|
+
export { LogtoError, OidcError, Prompt, LogtoRequestError, LogtoClientError, ReservedScope, UserScope, } from '@logto/client';
|
|
20
|
+
export default class LogtoClient extends BaseClient {
|
|
21
|
+
constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>);
|
|
22
|
+
getContext: ({ getAccessToken, resource, fetchUserInfo, }?: GetContextParameters) => Promise<LogtoContext>;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -1,14 +1,14 @@
|
|
|
1
|
+
import {Buffer as $jetHk$Buffer} from "buffer";
|
|
1
2
|
import $jetHk$logtoclient, {createRequester as $jetHk$createRequester, LogtoError as $0aca7ca5e7992ee0$re_export$LogtoError, OidcError as $0aca7ca5e7992ee0$re_export$OidcError, Prompt as $0aca7ca5e7992ee0$re_export$Prompt, LogtoRequestError as $0aca7ca5e7992ee0$re_export$LogtoRequestError, LogtoClientError as $0aca7ca5e7992ee0$re_export$LogtoClientError, ReservedScope as $0aca7ca5e7992ee0$re_export$ReservedScope, UserScope as $0aca7ca5e7992ee0$re_export$UserScope} from "@logto/client";
|
|
2
3
|
import {conditional as $jetHk$conditional} from "@silverhand/essentials";
|
|
3
4
|
import $jetHk$nodefetch from "node-fetch";
|
|
4
|
-
import {Buffer as $jetHk$Buffer} from "buffer";
|
|
5
5
|
import {randomFillSync as $jetHk$randomFillSync, createHash as $jetHk$createHash} from "crypto";
|
|
6
6
|
import {fromUint8Array as $jetHk$fromUint8Array} from "js-base64";
|
|
7
7
|
|
|
8
8
|
|
|
9
9
|
|
|
10
10
|
|
|
11
|
-
|
|
11
|
+
/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */
|
|
12
12
|
|
|
13
13
|
/**
|
|
14
14
|
* @param length The length of the raw random data.
|
|
@@ -36,9 +36,9 @@ class $0aca7ca5e7992ee0$export$2e2bcd8739ae039 extends (0, $jetHk$logtoclient) {
|
|
|
36
36
|
return (0, $jetHk$nodefetch)(input, {
|
|
37
37
|
...init,
|
|
38
38
|
headers: {
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
39
|
+
Authorization: `basic ${$0aca7ca5e7992ee0$require$Buffer.from(// eslint-disable-next-line @typescript-eslint/restrict-template-expressions
|
|
40
|
+
`${config.appId}:${config.appSecret}`, "utf8").toString("base64")}`,
|
|
41
|
+
...init?.headers
|
|
42
42
|
}
|
|
43
43
|
});
|
|
44
44
|
} : (0, $jetHk$nodefetch)),
|
|
@@ -47,7 +47,7 @@ class $0aca7ca5e7992ee0$export$2e2bcd8739ae039 extends (0, $jetHk$logtoclient) {
|
|
|
47
47
|
generateState: $91cf1946314e24ae$export$9ccd2716e53a229b
|
|
48
48
|
});
|
|
49
49
|
}
|
|
50
|
-
|
|
50
|
+
getContext = async ({ getAccessToken: getAccessToken , resource: resource , fetchUserInfo: fetchUserInfo } = {})=>{
|
|
51
51
|
const isAuthenticated = await this.isAuthenticated();
|
|
52
52
|
if (!isAuthenticated) return {
|
|
53
53
|
isAuthenticated: isAuthenticated
|
|
@@ -59,7 +59,7 @@ class $0aca7ca5e7992ee0$export$2e2bcd8739ae039 extends (0, $jetHk$logtoclient) {
|
|
|
59
59
|
userInfo: (0, $jetHk$conditional)(fetchUserInfo && await this.fetchUserInfo())
|
|
60
60
|
};
|
|
61
61
|
try {
|
|
62
|
-
const accessToken = await this.getAccessToken();
|
|
62
|
+
const accessToken = await this.getAccessToken(resource);
|
|
63
63
|
return {
|
|
64
64
|
isAuthenticated: isAuthenticated,
|
|
65
65
|
claims: await this.getIdTokenClaims(),
|
|
@@ -76,4 +76,4 @@ class $0aca7ca5e7992ee0$export$2e2bcd8739ae039 extends (0, $jetHk$logtoclient) {
|
|
|
76
76
|
|
|
77
77
|
|
|
78
78
|
export {$0aca7ca5e7992ee0$export$2e2bcd8739ae039 as default, $0aca7ca5e7992ee0$re_export$LogtoError as LogtoError, $0aca7ca5e7992ee0$re_export$OidcError as OidcError, $0aca7ca5e7992ee0$re_export$Prompt as Prompt, $0aca7ca5e7992ee0$re_export$LogtoRequestError as LogtoRequestError, $0aca7ca5e7992ee0$re_export$LogtoClientError as LogtoClientError, $0aca7ca5e7992ee0$re_export$ReservedScope as ReservedScope, $0aca7ca5e7992ee0$re_export$UserScope as UserScope};
|
|
79
|
-
//# sourceMappingURL=module.
|
|
79
|
+
//# sourceMappingURL=module.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"mappings":";;;;;;;AAAA;;;ACAA,+GAA+G,GAC/G;;AAIA;;CAEC,GACD,MAAM,6CAAuB,CAAC,SAAS,EAAE,GACvC,CAAA,GAAA,qBAAa,EAAE,CAAA,GAAA,qBAAa,EAAE,IAAI,WAAW,UAAU,IAAI;AAKtD,MAAM,4CAAgB,IAAM;AAO5B,MAAM,4CAAuB,IAAM;AAQnC,MAAM,4CAAwB,OAAO,eAA0C;IACpF,MAAM,sBAAsB,IAAI,cAAc,MAAM,CAAC;IACrD,MAAM,OAAO,CAAA,GAAA,iBAAS,EAAE;IACxB,KAAK,MAAM,CAAC;IACZ,MAAM,gBAAgB,KAAK,MAAM;IAEjC,OAAO,CAAA,GAAA,qBAAc,AAAD,EAAE,eAAe,IAAI;AAC3C;;;;;;ADPe,uDAA0B,CAAA,GAAA,kBAAS;IAChD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,QAAQ;YACZ,GAAG,OAAO;YACV,WAAW,CAAA,GAAA,sBAAc,EACvB,OAAO,SAAS,GACZ,OAAO,GAAG,OAAmC;gBAC3C,MAAM,CAAC,OAAO,KAAK,GAAG;gBAEtB,OAAO,CAAA,GAAA,gBAAK,AAAD,EAAE,OAAO;oBAClB,GAAG,IAAI;oBACP,SAAS;wBACP,eAAe,CAAC,MAAM,EAAE,iCAAO,IAAI,CACjC,4EAA4E;wBAC5E,CAAC,EAAE,OAAO,KAAK,CAAC,CAAC,EAAE,OAAO,SAAS,CAAC,CAAC,EACrC,QACA,QAAQ,CAAC,UAAU,CAAC;wBACtB,GAAG,MAAM,OAAO;oBAClB;gBACF;YACF,IACA,CAAA,GAAA,gBAAI,CAAC;mCAEX;kCACA;2BACA;QACF;IACF;IAEA,aAAa,OAAO,kBAClB,eAAc,YACd,SAAQ,iBACR,cAAa,EACQ,GAAG,CAAC,CAAC,GAA4B;QACtD,MAAM,kBAAkB,MAAM,IAAI,CAAC,eAAe;QAElD,IAAI,CAAC,iBACH,OAAO;6BACL;QACF;QAGF,MAAM,SAAS,MAAM,IAAI,CAAC,gBAAgB;QAE1C,IAAI,CAAC,gBACH,OAAO;6BACL;oBACA;YACA,UAAU,CAAA,GAAA,kBAAU,EAAE,iBAAkB,MAAM,IAAI,CAAC,aAAa;QAClE;QAGF,IAAI;YACF,MAAM,cAAc,MAAM,IAAI,CAAC,cAAc,CAAC;YAE9C,OAAO;iCACL;gBACA,QAAQ,MAAM,IAAI,CAAC,gBAAgB;gBACnC,UAAU,CAAA,GAAA,kBAAU,EAAE,iBAAkB,MAAM,IAAI,CAAC,aAAa;6BAChE;YACF;QACF,EAAE,OAAM;YACN,OAAO;gBACL,iBAAiB,KAAK;YACxB;QACF;IACF,EAAE;AACJ","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import type { LogtoConfig, ClientAdapter } from '@logto/client';\nimport BaseClient, { createRequester } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport type { GetContextParameters, LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext, GetContextParameters } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n Authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n ...init?.headers,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n getContext = async ({\n getAccessToken,\n resource,\n fetchUserInfo,\n }: GetContextParameters = {}): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken(resource);\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"module.mjs.map"}
|
package/package.json
CHANGED
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@logto/node",
|
|
3
|
-
"version": "1.0.0
|
|
3
|
+
"version": "1.0.0",
|
|
4
4
|
"source": "./src/index.ts",
|
|
5
5
|
"main": "./lib/index.js",
|
|
6
6
|
"exports": {
|
|
7
7
|
"require": "./lib/index.js",
|
|
8
|
-
"import": "./lib/module.
|
|
8
|
+
"import": "./lib/module.mjs"
|
|
9
9
|
},
|
|
10
|
-
"module": "./lib/module.
|
|
10
|
+
"module": "./lib/module.mjs",
|
|
11
11
|
"types": "./lib/index.d.ts",
|
|
12
12
|
"files": [
|
|
13
13
|
"lib"
|
|
@@ -22,24 +22,24 @@
|
|
|
22
22
|
"dev:tsc": "tsc -p tsconfig.build.json -w --preserveWatchOutput",
|
|
23
23
|
"precommit": "lint-staged",
|
|
24
24
|
"check": "tsc --noEmit",
|
|
25
|
-
"build": "rm -rf lib/ && pnpm check && parcel build",
|
|
25
|
+
"build": "rm -rf lib/ && pnpm check && parcel build && cp lib/index.d.ts lib/module.d.mts",
|
|
26
26
|
"lint": "eslint --ext .ts src",
|
|
27
27
|
"test": "jest",
|
|
28
28
|
"test:coverage": "jest --silent --coverage",
|
|
29
29
|
"prepack": "pnpm test"
|
|
30
30
|
},
|
|
31
31
|
"dependencies": {
|
|
32
|
-
"@logto/client": "^1.0.0
|
|
32
|
+
"@logto/client": "^1.0.0",
|
|
33
33
|
"@silverhand/essentials": "^1.2.1",
|
|
34
|
-
"js-base64": "^3.7.
|
|
34
|
+
"js-base64": "^3.7.4",
|
|
35
35
|
"node-fetch": "^2.6.7"
|
|
36
36
|
},
|
|
37
37
|
"devDependencies": {
|
|
38
38
|
"@jest/types": "^27.5.1",
|
|
39
|
-
"@parcel/core": "^2.
|
|
40
|
-
"@parcel/packager-ts": "^2.
|
|
41
|
-
"@parcel/transformer-typescript-types": "^2.
|
|
42
|
-
"@silverhand/eslint-config": "^
|
|
39
|
+
"@parcel/core": "^2.8.3",
|
|
40
|
+
"@parcel/packager-ts": "^2.8.3",
|
|
41
|
+
"@parcel/transformer-typescript-types": "^2.8.3",
|
|
42
|
+
"@silverhand/eslint-config": "^2.0.0",
|
|
43
43
|
"@silverhand/ts-config": "^1.0.0",
|
|
44
44
|
"@types/jest": "^27.4.0",
|
|
45
45
|
"eslint": "^8.23.0",
|
|
@@ -47,10 +47,10 @@
|
|
|
47
47
|
"jest-location-mock": "^1.0.9",
|
|
48
48
|
"jest-matcher-specific-error": "^1.0.0",
|
|
49
49
|
"lint-staged": "^13.0.0",
|
|
50
|
-
"parcel": "^2.
|
|
50
|
+
"parcel": "^2.8.3",
|
|
51
51
|
"prettier": "^2.7.1",
|
|
52
52
|
"ts-jest": "^27.0.4",
|
|
53
|
-
"typescript": "4.
|
|
53
|
+
"typescript": "4.9.5"
|
|
54
54
|
},
|
|
55
55
|
"eslintConfig": {
|
|
56
56
|
"extends": "@silverhand"
|
|
@@ -64,9 +64,9 @@
|
|
|
64
64
|
"context": "node",
|
|
65
65
|
"includeNodeModules": false,
|
|
66
66
|
"engines": {
|
|
67
|
-
"node": "
|
|
67
|
+
"node": ">=18.12.0"
|
|
68
68
|
}
|
|
69
69
|
}
|
|
70
70
|
},
|
|
71
|
-
"gitHead": "
|
|
71
|
+
"gitHead": "fff27b23a74d5bd3a46fc83fbbc2901b6e054c72"
|
|
72
72
|
}
|
package/lib/module.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"mappings":";;;;;;;AAAA;;;ACCA;;AAIA;;GAEG,CACH,MAAM,0CAAoB,GAAG,CAAC,MAAM,GAAG,EAAE,GACvC,CAAA,GAAA,qBAAc,CAAA,CAAC,CAAA,GAAA,qBAAc,CAAA,CAAC,IAAI,UAAU,CAAC,MAAM,CAAC,CAAC,EAAE,IAAI,CAAC,AAAC;AAKxD,MAAM,yCAAa,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAOnD,MAAM,yCAAoB,GAAG,IAAM,0CAAoB,EAAE,AAAC;AAQ1D,MAAM,yCAAqB,GAAG,OAAO,YAAoB,GAAsB;IACpF,MAAM,mBAAmB,GAAG,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,YAAY,CAAC,AAAC;IACnE,MAAM,IAAI,GAAG,CAAA,GAAA,iBAAU,CAAA,CAAC,QAAQ,CAAC,AAAC;IAClC,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAAC,CAAC;IACjC,MAAM,aAAa,GAAG,IAAI,CAAC,MAAM,EAAE,AAAC;IAEpC,OAAO,CAAA,GAAA,qBAAc,CAAA,CAAC,aAAa,EAAE,IAAI,CAAC,CAAC;CAC5C,AAAC;;;;;;ADRa,uDAA0B,CAAA,GAAA,kBAAU,CAAA;IACjD,YAAY,MAAmB,EAAE,OAAoD,CAAE;QACrF,KAAK,CAAC,MAAM,EAAE;YACZ,GAAG,OAAO;YACV,SAAS,EAAE,CAAA,GAAA,sBAAe,CAAA,CACxB,MAAM,CAAC,SAAS,GACZ,OAAO,GAAG,IAAI,AAA0B,GAAK;gBAC3C,MAAM,CAAC,KAAK,EAAE,IAAI,CAAC,GAAG,IAAI,AAAC;gBAE3B,OAAO,CAAA,GAAA,gBAAK,CAAA,CAAC,KAAK,EAAE;oBAClB,GAAG,IAAI;oBACP,OAAO,EAAE;wBACP,GAAG,IAAI,EAAE,OAAO;wBAEhB,aAAa,EAAE,CAAC,MAAM,EAAE,iCAAO,IAAI,CACjC,4EAA4E;wBAC5E,CAAC,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,MAAM,CAAC,SAAS,CAAC,CAAC,EACrC,MAAM,CACP,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC;qBACvB;iBACF,CAAC,CAAC;aACJ,GACD,CAAA,GAAA,gBAAK,CAAA,CACV;mCACD,yCAAqB;kCACrB,yCAAoB;2BACpB,yCAAa;SACd,CAAC,CAAC;KACJ;IAED,+BAA+B,CAC/B,UAAU,GAAG,OAAO,cAAc,GAAG,KAAK,EAAE,aAAa,GAAG,KAAK,GAA4B;QAC3F,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,eAAe,EAAE,AAAC;QAErD,IAAI,CAAC,eAAe,EAClB,OAAO;6BACL,eAAe;SAChB,CAAC;QAGJ,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,EAAE,AAAC;QAE7C,IAAI,CAAC,cAAc,EACjB,OAAO;6BACL,eAAe;oBACf,MAAM;YACN,QAAQ,EAAE,CAAA,GAAA,kBAAW,CAAA,CAAC,aAAa,IAAK,MAAM,IAAI,CAAC,aAAa,EAAE,AAAC,CAAC;SACrE,CAAC;QAGJ,IAAI;YACF,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,cAAc,EAAE,AAAC;YAEhD,OAAO;iCACL,eAAe;gBACf,MAAM,EAAE,MAAM,IAAI,CAAC,gBAAgB,EAAE;gBACrC,QAAQ,EAAE,CAAA,GAAA,kBAAW,CAAA,CAAC,aAAa,IAAK,MAAM,IAAI,CAAC,aAAa,EAAE,AAAC,CAAC;6BACpE,WAAW;aACZ,CAAC;SACH,CAAC,OAAM;YACN,OAAO;gBACL,eAAe,EAAE,KAAK;aACvB,CAAC;SACH;KACF,CAAC;CAEH","sources":["packages/node/src/index.ts","packages/node/src/utils/generators.ts"],"sourcesContent":["import BaseClient, { LogtoConfig, createRequester, ClientAdapter } from '@logto/client';\nimport { conditional } from '@silverhand/essentials';\nimport fetch from 'node-fetch';\n\nimport { LogtoContext } from './types';\nimport { generateCodeChallenge, generateCodeVerifier, generateState } from './utils/generators';\n\nexport type { LogtoContext } from './types';\n\nexport type {\n IdTokenClaims,\n LogtoErrorCode,\n LogtoConfig,\n LogtoClientErrorCode,\n Storage,\n StorageKey,\n} from '@logto/client';\n\nexport {\n LogtoError,\n OidcError,\n Prompt,\n LogtoRequestError,\n LogtoClientError,\n ReservedScope,\n UserScope,\n} from '@logto/client';\n\nexport default class LogtoClient extends BaseClient {\n constructor(config: LogtoConfig, adapter: Pick<ClientAdapter, 'navigate' | 'storage'>) {\n super(config, {\n ...adapter,\n requester: createRequester(\n config.appSecret\n ? async (...args: Parameters<typeof fetch>) => {\n const [input, init] = args;\n\n return fetch(input, {\n ...init,\n headers: {\n ...init?.headers,\n\n authorization: `basic ${Buffer.from(\n // eslint-disable-next-line @typescript-eslint/restrict-template-expressions\n `${config.appId}:${config.appSecret}`,\n 'utf8'\n ).toString('base64')}`,\n },\n });\n }\n : fetch\n ),\n generateCodeChallenge,\n generateCodeVerifier,\n generateState,\n });\n }\n\n /* eslint-disable complexity */\n getContext = async (getAccessToken = false, fetchUserInfo = false): Promise<LogtoContext> => {\n const isAuthenticated = await this.isAuthenticated();\n\n if (!isAuthenticated) {\n return {\n isAuthenticated,\n };\n }\n\n const claims = await this.getIdTokenClaims();\n\n if (!getAccessToken) {\n return {\n isAuthenticated,\n claims,\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n };\n }\n\n try {\n const accessToken = await this.getAccessToken();\n\n return {\n isAuthenticated,\n claims: await this.getIdTokenClaims(),\n userInfo: conditional(fetchUserInfo && (await this.fetchUserInfo())),\n accessToken,\n };\n } catch {\n return {\n isAuthenticated: false,\n };\n }\n };\n /* eslint-enable complexity */\n}\n","/** @link [Proof Key for Code Exchange by OAuth Public Clients](https://datatracker.ietf.org/doc/html/rfc7636) */\nimport { randomFillSync, createHash } from 'crypto';\n\nimport { fromUint8Array } from 'js-base64';\n\n/**\n * @param length The length of the raw random data.\n */\nconst generateRandomString = (length = 64) =>\n fromUint8Array(randomFillSync(new Uint8Array(length)), true);\n\n/**\n * Generates random string for state and encodes them in url safe base64\n */\nexport const generateState = () => generateRandomString();\n\n/**\n * Generates code verifier\n *\n * @link [Client Creates a Code Verifier](https://datatracker.ietf.org/doc/html/rfc7636#section-4.1)\n */\nexport const generateCodeVerifier = () => generateRandomString();\n\n/**\n * Calculates the S256 PKCE code challenge for an arbitrary code verifier and encodes it in url safe base64\n *\n * @param {String} codeVerifier Code verifier to calculate the S256 code challenge for\n * @link [Client Creates the Code Challenge](https://datatracker.ietf.org/doc/html/rfc7636#section-4.2)\n */\nexport const generateCodeChallenge = async (codeVerifier: string): Promise<string> => {\n const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);\n const hash = createHash('sha256');\n hash.update(encodedCodeVerifier);\n const codeChallenge = hash.digest();\n\n return fromUint8Array(codeChallenge, true);\n};\n"],"names":[],"version":3,"file":"module.js.map"}
|