@lokalise/harmony 1.32.4-exp-expertJWTSidebar.1 → 1.32.4-exp-expertJWTSidebar.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (466) hide show
  1. package/dist/harmony.cjs +46 -48
  2. package/dist/harmony.cjs.map +1 -1
  3. package/dist/harmony.mjs +46 -48
  4. package/dist/harmony.mjs.map +1 -1
  5. package/dist/harmony100.cjs +5 -98
  6. package/dist/harmony100.cjs.map +1 -1
  7. package/dist/harmony100.mjs +5 -81
  8. package/dist/harmony100.mjs.map +1 -1
  9. package/dist/harmony101.cjs +132 -21
  10. package/dist/harmony101.cjs.map +1 -1
  11. package/dist/harmony101.mjs +131 -20
  12. package/dist/harmony101.mjs.map +1 -1
  13. package/dist/harmony102.cjs +12 -6
  14. package/dist/harmony102.cjs.map +1 -1
  15. package/dist/harmony102.mjs +11 -5
  16. package/dist/harmony102.mjs.map +1 -1
  17. package/dist/harmony103.cjs +5 -132
  18. package/dist/harmony103.cjs.map +1 -1
  19. package/dist/harmony103.mjs +5 -132
  20. package/dist/harmony103.mjs.map +1 -1
  21. package/dist/harmony104.cjs +40 -12
  22. package/dist/harmony104.cjs.map +1 -1
  23. package/dist/harmony104.mjs +39 -11
  24. package/dist/harmony104.mjs.map +1 -1
  25. package/dist/harmony105.cjs +59 -4
  26. package/dist/harmony105.cjs.map +1 -1
  27. package/dist/harmony105.mjs +60 -5
  28. package/dist/harmony105.mjs.map +1 -1
  29. package/dist/harmony106.cjs +6 -39
  30. package/dist/harmony106.cjs.map +1 -1
  31. package/dist/harmony106.mjs +6 -39
  32. package/dist/harmony106.mjs.map +1 -1
  33. package/dist/harmony107.cjs +13 -59
  34. package/dist/harmony107.cjs.map +1 -1
  35. package/dist/harmony107.mjs +13 -59
  36. package/dist/harmony107.mjs.map +1 -1
  37. package/dist/harmony108.cjs +18 -7
  38. package/dist/harmony108.cjs.map +1 -1
  39. package/dist/harmony108.mjs +18 -7
  40. package/dist/harmony108.mjs.map +1 -1
  41. package/dist/harmony110.cjs +99 -18
  42. package/dist/harmony110.cjs.map +1 -1
  43. package/dist/harmony110.mjs +82 -18
  44. package/dist/harmony110.mjs.map +1 -1
  45. package/dist/harmony111.cjs +63 -6
  46. package/dist/harmony111.cjs.map +1 -1
  47. package/dist/harmony111.mjs +62 -5
  48. package/dist/harmony111.mjs.map +1 -1
  49. package/dist/harmony112.cjs +89 -6
  50. package/dist/harmony112.cjs.map +1 -1
  51. package/dist/harmony112.mjs +88 -5
  52. package/dist/harmony112.mjs.map +1 -1
  53. package/dist/harmony113.cjs +19 -63
  54. package/dist/harmony113.cjs.map +1 -1
  55. package/dist/harmony113.mjs +18 -62
  56. package/dist/harmony113.mjs.map +1 -1
  57. package/dist/harmony114.cjs +6 -89
  58. package/dist/harmony114.cjs.map +1 -1
  59. package/dist/harmony114.mjs +5 -88
  60. package/dist/harmony114.mjs.map +1 -1
  61. package/dist/harmony115.cjs +5 -18
  62. package/dist/harmony115.cjs.map +1 -1
  63. package/dist/harmony115.mjs +5 -18
  64. package/dist/harmony115.mjs.map +1 -1
  65. package/dist/harmony116.cjs +7 -96
  66. package/dist/harmony116.cjs.map +1 -1
  67. package/dist/harmony116.mjs +7 -96
  68. package/dist/harmony116.mjs.map +1 -1
  69. package/dist/harmony117.cjs +57 -13
  70. package/dist/harmony117.cjs.map +1 -1
  71. package/dist/harmony117.mjs +57 -13
  72. package/dist/harmony117.mjs.map +1 -1
  73. package/dist/harmony118.cjs +60 -14
  74. package/dist/harmony118.cjs.map +1 -1
  75. package/dist/harmony118.mjs +60 -14
  76. package/dist/harmony118.mjs.map +1 -1
  77. package/dist/harmony119.cjs +19 -37
  78. package/dist/harmony119.cjs.map +1 -1
  79. package/dist/harmony119.mjs +18 -36
  80. package/dist/harmony119.mjs.map +1 -1
  81. package/dist/harmony120.cjs +87 -19
  82. package/dist/harmony120.cjs.map +1 -1
  83. package/dist/harmony120.mjs +87 -19
  84. package/dist/harmony120.mjs.map +1 -1
  85. package/dist/harmony121.cjs +13 -7
  86. package/dist/harmony121.cjs.map +1 -1
  87. package/dist/harmony121.mjs +13 -7
  88. package/dist/harmony121.mjs.map +1 -1
  89. package/dist/harmony122.cjs +14 -57
  90. package/dist/harmony122.cjs.map +1 -1
  91. package/dist/harmony122.mjs +14 -57
  92. package/dist/harmony122.mjs.map +1 -1
  93. package/dist/harmony123.cjs +33 -57
  94. package/dist/harmony123.cjs.map +1 -1
  95. package/dist/harmony123.mjs +33 -57
  96. package/dist/harmony123.mjs.map +1 -1
  97. package/dist/harmony124.cjs +29 -19
  98. package/dist/harmony124.cjs.map +1 -1
  99. package/dist/harmony124.mjs +28 -18
  100. package/dist/harmony124.mjs.map +1 -1
  101. package/dist/harmony125.cjs +1 -1
  102. package/dist/harmony125.mjs +1 -1
  103. package/dist/harmony126.cjs +1 -1
  104. package/dist/harmony126.mjs +1 -1
  105. package/dist/harmony127.cjs +2 -2
  106. package/dist/harmony127.mjs +2 -2
  107. package/dist/harmony128.cjs +46 -11
  108. package/dist/harmony128.cjs.map +1 -1
  109. package/dist/harmony128.mjs +46 -11
  110. package/dist/harmony128.mjs.map +1 -1
  111. package/dist/harmony129.cjs +13 -17
  112. package/dist/harmony129.cjs.map +1 -1
  113. package/dist/harmony129.mjs +12 -16
  114. package/dist/harmony129.mjs.map +1 -1
  115. package/dist/harmony13.cjs +8 -1
  116. package/dist/harmony13.cjs.map +1 -1
  117. package/dist/harmony13.mjs +8 -1
  118. package/dist/harmony13.mjs.map +1 -1
  119. package/dist/harmony130.cjs +10 -20
  120. package/dist/harmony130.cjs.map +1 -1
  121. package/dist/harmony130.mjs +10 -20
  122. package/dist/harmony130.mjs.map +1 -1
  123. package/dist/harmony131.cjs +14 -10
  124. package/dist/harmony131.cjs.map +1 -1
  125. package/dist/harmony131.mjs +14 -10
  126. package/dist/harmony131.mjs.map +1 -1
  127. package/dist/harmony132.cjs +21 -46
  128. package/dist/harmony132.cjs.map +1 -1
  129. package/dist/harmony132.mjs +21 -46
  130. package/dist/harmony132.mjs.map +1 -1
  131. package/dist/harmony133.cjs +13 -13
  132. package/dist/harmony133.cjs.map +1 -1
  133. package/dist/harmony133.mjs +12 -12
  134. package/dist/harmony133.mjs.map +1 -1
  135. package/dist/harmony16.cjs +1 -1
  136. package/dist/harmony16.mjs +1 -1
  137. package/dist/harmony20.cjs +12 -12
  138. package/dist/harmony20.cjs.map +1 -1
  139. package/dist/harmony20.mjs +12 -12
  140. package/dist/harmony20.mjs.map +1 -1
  141. package/dist/harmony21.cjs +16 -13
  142. package/dist/harmony21.cjs.map +1 -1
  143. package/dist/harmony21.mjs +16 -13
  144. package/dist/harmony21.mjs.map +1 -1
  145. package/dist/harmony22.cjs +9 -8
  146. package/dist/harmony22.cjs.map +1 -1
  147. package/dist/harmony22.mjs +9 -8
  148. package/dist/harmony22.mjs.map +1 -1
  149. package/dist/harmony23.cjs +18 -16
  150. package/dist/harmony23.cjs.map +1 -1
  151. package/dist/harmony23.mjs +18 -16
  152. package/dist/harmony23.mjs.map +1 -1
  153. package/dist/harmony24.cjs +16 -16
  154. package/dist/harmony24.cjs.map +1 -1
  155. package/dist/harmony24.mjs +18 -18
  156. package/dist/harmony24.mjs.map +1 -1
  157. package/dist/harmony25.cjs +9 -19
  158. package/dist/harmony25.cjs.map +1 -1
  159. package/dist/harmony25.mjs +9 -19
  160. package/dist/harmony25.mjs.map +1 -1
  161. package/dist/harmony26.cjs +8 -7
  162. package/dist/harmony26.cjs.map +1 -1
  163. package/dist/harmony26.mjs +8 -7
  164. package/dist/harmony26.mjs.map +1 -1
  165. package/dist/harmony27.cjs +27 -11
  166. package/dist/harmony27.cjs.map +1 -1
  167. package/dist/harmony27.mjs +27 -11
  168. package/dist/harmony27.mjs.map +1 -1
  169. package/dist/harmony28.cjs +26 -22
  170. package/dist/harmony28.cjs.map +1 -1
  171. package/dist/harmony28.mjs +27 -23
  172. package/dist/harmony28.mjs.map +1 -1
  173. package/dist/harmony29.cjs +8 -28
  174. package/dist/harmony29.cjs.map +1 -1
  175. package/dist/harmony29.mjs +9 -29
  176. package/dist/harmony29.mjs.map +1 -1
  177. package/dist/harmony3.cjs +3 -3
  178. package/dist/harmony3.mjs +3 -3
  179. package/dist/harmony30.cjs +54 -10
  180. package/dist/harmony30.cjs.map +1 -1
  181. package/dist/harmony30.mjs +54 -10
  182. package/dist/harmony30.mjs.map +1 -1
  183. package/dist/harmony31.cjs +25 -50
  184. package/dist/harmony31.cjs.map +1 -1
  185. package/dist/harmony31.mjs +26 -51
  186. package/dist/harmony31.mjs.map +1 -1
  187. package/dist/harmony32.cjs +15 -27
  188. package/dist/harmony32.cjs.map +1 -1
  189. package/dist/harmony32.mjs +16 -28
  190. package/dist/harmony32.mjs.map +1 -1
  191. package/dist/harmony33.cjs +8 -16
  192. package/dist/harmony33.cjs.map +1 -1
  193. package/dist/harmony33.mjs +8 -16
  194. package/dist/harmony33.mjs.map +1 -1
  195. package/dist/harmony34.cjs +12 -8
  196. package/dist/harmony34.cjs.map +1 -1
  197. package/dist/harmony34.mjs +13 -9
  198. package/dist/harmony34.mjs.map +1 -1
  199. package/dist/harmony35.cjs +14 -14
  200. package/dist/harmony35.cjs.map +1 -1
  201. package/dist/harmony35.mjs +14 -14
  202. package/dist/harmony35.mjs.map +1 -1
  203. package/dist/harmony36.cjs +4 -4
  204. package/dist/harmony36.cjs.map +1 -1
  205. package/dist/harmony36.mjs +4 -4
  206. package/dist/harmony36.mjs.map +1 -1
  207. package/dist/harmony37.cjs +6 -6
  208. package/dist/harmony37.cjs.map +1 -1
  209. package/dist/harmony37.mjs +6 -6
  210. package/dist/harmony37.mjs.map +1 -1
  211. package/dist/harmony38.cjs +5 -6
  212. package/dist/harmony38.cjs.map +1 -1
  213. package/dist/harmony38.mjs +5 -6
  214. package/dist/harmony38.mjs.map +1 -1
  215. package/dist/harmony39.cjs +14 -6
  216. package/dist/harmony39.cjs.map +1 -1
  217. package/dist/harmony39.mjs +15 -7
  218. package/dist/harmony39.mjs.map +1 -1
  219. package/dist/harmony4.cjs +10 -10
  220. package/dist/harmony4.mjs +10 -10
  221. package/dist/harmony40.cjs +7 -15
  222. package/dist/harmony40.cjs.map +1 -1
  223. package/dist/harmony40.mjs +7 -15
  224. package/dist/harmony40.mjs.map +1 -1
  225. package/dist/harmony41.cjs +11 -7
  226. package/dist/harmony41.cjs.map +1 -1
  227. package/dist/harmony41.mjs +13 -9
  228. package/dist/harmony41.mjs.map +1 -1
  229. package/dist/harmony42.cjs +8 -8
  230. package/dist/harmony42.cjs.map +1 -1
  231. package/dist/harmony42.mjs +8 -8
  232. package/dist/harmony42.mjs.map +1 -1
  233. package/dist/harmony43.cjs +12 -14
  234. package/dist/harmony43.cjs.map +1 -1
  235. package/dist/harmony43.mjs +12 -14
  236. package/dist/harmony43.mjs.map +1 -1
  237. package/dist/harmony44.cjs +8 -8
  238. package/dist/harmony44.cjs.map +1 -1
  239. package/dist/harmony44.mjs +9 -9
  240. package/dist/harmony44.mjs.map +1 -1
  241. package/dist/harmony45.cjs +9 -9
  242. package/dist/harmony45.cjs.map +1 -1
  243. package/dist/harmony45.mjs +10 -10
  244. package/dist/harmony45.mjs.map +1 -1
  245. package/dist/harmony46.cjs +14 -12
  246. package/dist/harmony46.cjs.map +1 -1
  247. package/dist/harmony46.mjs +14 -12
  248. package/dist/harmony46.mjs.map +1 -1
  249. package/dist/harmony47.cjs +10 -10
  250. package/dist/harmony47.cjs.map +1 -1
  251. package/dist/harmony47.mjs +10 -10
  252. package/dist/harmony47.mjs.map +1 -1
  253. package/dist/harmony48.cjs +8 -8
  254. package/dist/harmony48.cjs.map +1 -1
  255. package/dist/harmony48.mjs +8 -8
  256. package/dist/harmony48.mjs.map +1 -1
  257. package/dist/harmony49.cjs +7 -7
  258. package/dist/harmony49.cjs.map +1 -1
  259. package/dist/harmony49.mjs +7 -7
  260. package/dist/harmony49.mjs.map +1 -1
  261. package/dist/harmony5.cjs +1 -1
  262. package/dist/harmony5.mjs +1 -1
  263. package/dist/harmony50.cjs +12 -14
  264. package/dist/harmony50.cjs.map +1 -1
  265. package/dist/harmony50.mjs +12 -14
  266. package/dist/harmony50.mjs.map +1 -1
  267. package/dist/harmony51.cjs +14 -12
  268. package/dist/harmony51.cjs.map +1 -1
  269. package/dist/harmony51.mjs +14 -12
  270. package/dist/harmony51.mjs.map +1 -1
  271. package/dist/harmony52.cjs +8 -8
  272. package/dist/harmony52.cjs.map +1 -1
  273. package/dist/harmony52.mjs +8 -8
  274. package/dist/harmony52.mjs.map +1 -1
  275. package/dist/harmony53.cjs +7 -10
  276. package/dist/harmony53.cjs.map +1 -1
  277. package/dist/harmony53.mjs +9 -12
  278. package/dist/harmony53.mjs.map +1 -1
  279. package/dist/harmony54.cjs +56 -14
  280. package/dist/harmony54.cjs.map +1 -1
  281. package/dist/harmony54.mjs +56 -14
  282. package/dist/harmony54.mjs.map +1 -1
  283. package/dist/harmony55.cjs +74 -48
  284. package/dist/harmony55.cjs.map +1 -1
  285. package/dist/harmony55.mjs +73 -47
  286. package/dist/harmony55.mjs.map +1 -1
  287. package/dist/harmony56.cjs +4 -80
  288. package/dist/harmony56.cjs.map +1 -1
  289. package/dist/harmony56.mjs +4 -80
  290. package/dist/harmony56.mjs.map +1 -1
  291. package/dist/harmony57.cjs +21 -4
  292. package/dist/harmony57.cjs.map +1 -1
  293. package/dist/harmony57.mjs +21 -4
  294. package/dist/harmony57.mjs.map +1 -1
  295. package/dist/harmony58.cjs +17 -20
  296. package/dist/harmony58.cjs.map +1 -1
  297. package/dist/harmony58.mjs +17 -20
  298. package/dist/harmony58.mjs.map +1 -1
  299. package/dist/harmony59.cjs +137 -14
  300. package/dist/harmony59.cjs.map +1 -1
  301. package/dist/harmony59.mjs +135 -12
  302. package/dist/harmony59.mjs.map +1 -1
  303. package/dist/harmony6.cjs +4 -4
  304. package/dist/harmony6.mjs +4 -4
  305. package/dist/harmony60.cjs +46 -142
  306. package/dist/harmony60.cjs.map +1 -1
  307. package/dist/harmony60.mjs +45 -141
  308. package/dist/harmony60.mjs.map +1 -1
  309. package/dist/harmony61.cjs +25 -46
  310. package/dist/harmony61.cjs.map +1 -1
  311. package/dist/harmony61.mjs +25 -46
  312. package/dist/harmony61.mjs.map +1 -1
  313. package/dist/harmony62.cjs +6 -24
  314. package/dist/harmony62.cjs.map +1 -1
  315. package/dist/harmony62.mjs +6 -24
  316. package/dist/harmony62.mjs.map +1 -1
  317. package/dist/harmony63.cjs +82 -6
  318. package/dist/harmony63.cjs.map +1 -1
  319. package/dist/harmony63.mjs +82 -6
  320. package/dist/harmony63.mjs.map +1 -1
  321. package/dist/harmony64.cjs +20 -80
  322. package/dist/harmony64.cjs.map +1 -1
  323. package/dist/harmony64.mjs +20 -80
  324. package/dist/harmony64.mjs.map +1 -1
  325. package/dist/harmony65.cjs +16 -22
  326. package/dist/harmony65.cjs.map +1 -1
  327. package/dist/harmony65.mjs +16 -22
  328. package/dist/harmony65.mjs.map +1 -1
  329. package/dist/harmony66.cjs +16 -19
  330. package/dist/harmony66.cjs.map +1 -1
  331. package/dist/harmony66.mjs +15 -18
  332. package/dist/harmony66.mjs.map +1 -1
  333. package/dist/harmony67.cjs +18 -15
  334. package/dist/harmony67.cjs.map +1 -1
  335. package/dist/harmony67.mjs +18 -15
  336. package/dist/harmony67.mjs.map +1 -1
  337. package/dist/harmony68.cjs +61 -18
  338. package/dist/harmony68.cjs.map +1 -1
  339. package/dist/harmony68.mjs +61 -18
  340. package/dist/harmony68.mjs.map +1 -1
  341. package/dist/harmony69.cjs +6 -61
  342. package/dist/harmony69.cjs.map +1 -1
  343. package/dist/harmony69.mjs +6 -61
  344. package/dist/harmony69.mjs.map +1 -1
  345. package/dist/harmony7.cjs +1 -1
  346. package/dist/harmony7.mjs +1 -1
  347. package/dist/harmony70.cjs +10 -7
  348. package/dist/harmony70.cjs.map +1 -1
  349. package/dist/harmony70.mjs +9 -6
  350. package/dist/harmony70.mjs.map +1 -1
  351. package/dist/harmony71.cjs +17 -8
  352. package/dist/harmony71.cjs.map +1 -1
  353. package/dist/harmony71.mjs +17 -8
  354. package/dist/harmony71.mjs.map +1 -1
  355. package/dist/harmony72.cjs +18 -13
  356. package/dist/harmony72.cjs.map +1 -1
  357. package/dist/harmony72.mjs +19 -14
  358. package/dist/harmony72.mjs.map +1 -1
  359. package/dist/harmony73.cjs +4 -22
  360. package/dist/harmony73.cjs.map +1 -1
  361. package/dist/harmony73.mjs +4 -22
  362. package/dist/harmony73.mjs.map +1 -1
  363. package/dist/harmony74.cjs +31 -4
  364. package/dist/harmony74.cjs.map +1 -1
  365. package/dist/harmony74.mjs +32 -5
  366. package/dist/harmony74.mjs.map +1 -1
  367. package/dist/harmony75.cjs +26 -26
  368. package/dist/harmony75.cjs.map +1 -1
  369. package/dist/harmony75.mjs +28 -28
  370. package/dist/harmony75.mjs.map +1 -1
  371. package/dist/harmony76.cjs +12 -25
  372. package/dist/harmony76.cjs.map +1 -1
  373. package/dist/harmony76.mjs +13 -26
  374. package/dist/harmony76.mjs.map +1 -1
  375. package/dist/harmony77.cjs +24 -12
  376. package/dist/harmony77.cjs.map +1 -1
  377. package/dist/harmony77.mjs +25 -13
  378. package/dist/harmony77.mjs.map +1 -1
  379. package/dist/harmony78.cjs +55 -27
  380. package/dist/harmony78.cjs.map +1 -1
  381. package/dist/harmony78.mjs +57 -29
  382. package/dist/harmony78.mjs.map +1 -1
  383. package/dist/harmony79.cjs +10 -60
  384. package/dist/harmony79.cjs.map +1 -1
  385. package/dist/harmony79.mjs +9 -59
  386. package/dist/harmony79.mjs.map +1 -1
  387. package/dist/harmony80.cjs +9 -10
  388. package/dist/harmony80.cjs.map +1 -1
  389. package/dist/harmony80.mjs +8 -9
  390. package/dist/harmony80.mjs.map +1 -1
  391. package/dist/harmony81.cjs +26 -5
  392. package/dist/harmony81.cjs.map +1 -1
  393. package/dist/harmony81.mjs +29 -8
  394. package/dist/harmony81.mjs.map +1 -1
  395. package/dist/harmony82.cjs +3 -29
  396. package/dist/harmony82.cjs.map +1 -1
  397. package/dist/harmony82.mjs +3 -29
  398. package/dist/harmony82.mjs.map +1 -1
  399. package/dist/harmony83.cjs +40 -3
  400. package/dist/harmony83.cjs.map +1 -1
  401. package/dist/harmony83.mjs +40 -3
  402. package/dist/harmony83.mjs.map +1 -1
  403. package/dist/harmony84.cjs +8 -36
  404. package/dist/harmony84.cjs.map +1 -1
  405. package/dist/harmony84.mjs +10 -38
  406. package/dist/harmony84.mjs.map +1 -1
  407. package/dist/harmony85.cjs +9 -3
  408. package/dist/harmony85.cjs.map +1 -1
  409. package/dist/harmony85.mjs +9 -3
  410. package/dist/harmony85.mjs.map +1 -1
  411. package/dist/harmony86.cjs +3 -6
  412. package/dist/harmony86.cjs.map +1 -1
  413. package/dist/harmony86.mjs +3 -6
  414. package/dist/harmony86.mjs.map +1 -1
  415. package/dist/harmony87.cjs +6 -6
  416. package/dist/harmony87.mjs +6 -6
  417. package/dist/harmony88.cjs +9 -57
  418. package/dist/harmony88.cjs.map +1 -1
  419. package/dist/harmony88.mjs +8 -56
  420. package/dist/harmony88.mjs.map +1 -1
  421. package/dist/harmony89.cjs +51 -36
  422. package/dist/harmony89.cjs.map +1 -1
  423. package/dist/harmony89.mjs +52 -37
  424. package/dist/harmony89.mjs.map +1 -1
  425. package/dist/harmony90.cjs +42 -5
  426. package/dist/harmony90.cjs.map +1 -1
  427. package/dist/harmony90.mjs +42 -5
  428. package/dist/harmony90.mjs.map +1 -1
  429. package/dist/harmony91.cjs +6 -10
  430. package/dist/harmony91.cjs.map +1 -1
  431. package/dist/harmony91.mjs +5 -9
  432. package/dist/harmony91.mjs.map +1 -1
  433. package/dist/harmony92.cjs +6 -21
  434. package/dist/harmony92.cjs.map +1 -1
  435. package/dist/harmony92.mjs +6 -21
  436. package/dist/harmony92.mjs.map +1 -1
  437. package/dist/harmony93.cjs +21 -3
  438. package/dist/harmony93.cjs.map +1 -1
  439. package/dist/harmony93.mjs +21 -3
  440. package/dist/harmony93.mjs.map +1 -1
  441. package/dist/harmony94.cjs +6 -21
  442. package/dist/harmony94.cjs.map +1 -1
  443. package/dist/harmony94.mjs +5 -20
  444. package/dist/harmony94.mjs.map +1 -1
  445. package/dist/harmony95.cjs +21 -12
  446. package/dist/harmony95.cjs.map +1 -1
  447. package/dist/harmony95.mjs +20 -11
  448. package/dist/harmony95.mjs.map +1 -1
  449. package/dist/harmony96.cjs +13 -12
  450. package/dist/harmony96.cjs.map +1 -1
  451. package/dist/harmony96.mjs +12 -11
  452. package/dist/harmony96.mjs.map +1 -1
  453. package/dist/harmony97.cjs +12 -22
  454. package/dist/harmony97.cjs.map +1 -1
  455. package/dist/harmony97.mjs +11 -21
  456. package/dist/harmony97.mjs.map +1 -1
  457. package/dist/harmony98.cjs +21 -12
  458. package/dist/harmony98.cjs.map +1 -1
  459. package/dist/harmony98.mjs +20 -11
  460. package/dist/harmony98.mjs.map +1 -1
  461. package/dist/harmony99.cjs +18 -9
  462. package/dist/harmony99.cjs.map +1 -1
  463. package/dist/harmony99.mjs +18 -9
  464. package/dist/harmony99.mjs.map +1 -1
  465. package/dist/types/src/features/auth/node.d.ts +0 -1
  466. package/package.json +1 -1
@@ -1,17 +1,17 @@
1
1
  "use strict";
2
- var __defProp = Object.defineProperty;
3
- var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
4
- var __publicField = (obj, key, value) => __defNormalProp(obj, typeof key !== "symbol" ? key + "" : key, value);
5
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
6
3
  const jwtTokenPayload = require("./harmony16.cjs");
7
- const _NewJwtIssuedEvent = class _NewJwtIssuedEvent extends CustomEvent {
8
- constructor(token) {
9
- super(_NewJwtIssuedEvent.eventName, {
10
- detail: { token, payload: jwtTokenPayload.parseJwtTokenPayload(token.accessToken) }
11
- });
4
+ const cookieTokenUtils = require("./harmony17.cjs");
5
+ function getAuthenticatedSessionDetailFromRequest() {
6
+ const cookie = cookieTokenUtils.getJwtTokenFromCookie();
7
+ if (!cookie) {
8
+ return void 0;
12
9
  }
13
- };
14
- __publicField(_NewJwtIssuedEvent, "eventName", "new-jwt-issued");
15
- let NewJwtIssuedEvent = _NewJwtIssuedEvent;
16
- exports.NewJwtIssuedEvent = NewJwtIssuedEvent;
10
+ const payload = jwtTokenPayload.parseJwtTokenPayload(cookie.accessToken);
11
+ if (!payload) {
12
+ return void 0;
13
+ }
14
+ return { ...cookie, payload };
15
+ }
16
+ exports.getAuthenticatedSessionDetailFromRequest = getAuthenticatedSessionDetailFromRequest;
17
17
  //# sourceMappingURL=harmony20.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony20.cjs","sources":["../src/features/auth/frontend/events/NewJwtIssuedEvent.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype NewJwtIssuedEventDetail = {\n\ttoken: JwtToken\n\tpayload: JwtTokenPayload | undefined\n}\n\n/**\n * This event is emitted when a new JWT token is issued or refreshed.\n */\nexport class NewJwtIssuedEvent extends CustomEvent<NewJwtIssuedEventDetail> {\n\tstatic readonly eventName = 'new-jwt-issued' as const\n\n\tconstructor(token: JwtToken) {\n\t\tsuper(NewJwtIssuedEvent.eventName, {\n\t\t\tdetail: { token, payload: parseJwtTokenPayload(token.accessToken) },\n\t\t})\n\t}\n}\n\nexport const isNewJwtIssuedEvent = (event: Event): event is NewJwtIssuedEvent =>\n\tevent.type === NewJwtIssuedEvent.eventName\n\ndeclare global {\n\tinterface WindowEventMap {\n\t\t[NewJwtIssuedEvent.eventName]: NewJwtIssuedEvent\n\t}\n}\n"],"names":["parseJwtTokenPayload"],"mappings":";;;;;;AAYO,MAAM,qBAAN,MAAM,2BAA0B,YAAqC;AAAA,EAG3E,YAAY,OAAiB;AAC5B,UAAM,mBAAkB,WAAW;AAAA,MAClC,QAAQ,EAAE,OAAO,SAASA,gBAAAA,qBAAqB,MAAM,WAAW,EAAE;AAAA,IAAA,CAClE;AAAA,EAAA;AAEH;AAPC,cADY,oBACI,aAAY;AADtB,IAAM,oBAAN;;"}
1
+ {"version":3,"file":"harmony20.cjs","sources":["../src/features/auth/backend/services/getAuthenticatedSessionDetailFromRequest.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { getJwtTokenFromCookie } from '@features/auth/frontend/utils/cookieTokenUtils'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype AuthenticatedSessionDetail = JwtToken & { payload: JwtTokenPayload }\n\n/**\n * Returns the JWT tokens and parses the attached payload.\n */\nexport function getAuthenticatedSessionDetailFromRequest(): AuthenticatedSessionDetail | undefined {\n\tconst cookie = getJwtTokenFromCookie()\n\tif (!cookie) {\n\t\treturn undefined\n\t}\n\n\tconst payload = parseJwtTokenPayload(cookie.accessToken)\n\tif (!payload) {\n\t\treturn undefined\n\t}\n\n\treturn { ...cookie, payload }\n}\n"],"names":["getJwtTokenFromCookie","parseJwtTokenPayload"],"mappings":";;;;AAUO,SAAS,2CAAmF;AAClG,QAAM,SAASA,iBAAAA,sBAAsB;AACrC,MAAI,CAAC,QAAQ;AACL,WAAA;AAAA,EAAA;AAGF,QAAA,UAAUC,gBAAAA,qBAAqB,OAAO,WAAW;AACvD,MAAI,CAAC,SAAS;AACN,WAAA;AAAA,EAAA;AAGD,SAAA,EAAE,GAAG,QAAQ,QAAQ;AAC7B;;"}
@@ -1,17 +1,17 @@
1
- var __defProp = Object.defineProperty;
2
- var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
3
- var __publicField = (obj, key, value) => __defNormalProp(obj, typeof key !== "symbol" ? key + "" : key, value);
4
1
  import { parseJwtTokenPayload } from "./harmony16.mjs";
5
- const _NewJwtIssuedEvent = class _NewJwtIssuedEvent extends CustomEvent {
6
- constructor(token) {
7
- super(_NewJwtIssuedEvent.eventName, {
8
- detail: { token, payload: parseJwtTokenPayload(token.accessToken) }
9
- });
2
+ import { getJwtTokenFromCookie } from "./harmony17.mjs";
3
+ function getAuthenticatedSessionDetailFromRequest() {
4
+ const cookie = getJwtTokenFromCookie();
5
+ if (!cookie) {
6
+ return void 0;
10
7
  }
11
- };
12
- __publicField(_NewJwtIssuedEvent, "eventName", "new-jwt-issued");
13
- let NewJwtIssuedEvent = _NewJwtIssuedEvent;
8
+ const payload = parseJwtTokenPayload(cookie.accessToken);
9
+ if (!payload) {
10
+ return void 0;
11
+ }
12
+ return { ...cookie, payload };
13
+ }
14
14
  export {
15
- NewJwtIssuedEvent
15
+ getAuthenticatedSessionDetailFromRequest
16
16
  };
17
17
  //# sourceMappingURL=harmony20.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony20.mjs","sources":["../src/features/auth/frontend/events/NewJwtIssuedEvent.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype NewJwtIssuedEventDetail = {\n\ttoken: JwtToken\n\tpayload: JwtTokenPayload | undefined\n}\n\n/**\n * This event is emitted when a new JWT token is issued or refreshed.\n */\nexport class NewJwtIssuedEvent extends CustomEvent<NewJwtIssuedEventDetail> {\n\tstatic readonly eventName = 'new-jwt-issued' as const\n\n\tconstructor(token: JwtToken) {\n\t\tsuper(NewJwtIssuedEvent.eventName, {\n\t\t\tdetail: { token, payload: parseJwtTokenPayload(token.accessToken) },\n\t\t})\n\t}\n}\n\nexport const isNewJwtIssuedEvent = (event: Event): event is NewJwtIssuedEvent =>\n\tevent.type === NewJwtIssuedEvent.eventName\n\ndeclare global {\n\tinterface WindowEventMap {\n\t\t[NewJwtIssuedEvent.eventName]: NewJwtIssuedEvent\n\t}\n}\n"],"names":[],"mappings":";;;;AAYO,MAAM,qBAAN,MAAM,2BAA0B,YAAqC;AAAA,EAG3E,YAAY,OAAiB;AAC5B,UAAM,mBAAkB,WAAW;AAAA,MAClC,QAAQ,EAAE,OAAO,SAAS,qBAAqB,MAAM,WAAW,EAAE;AAAA,IAAA,CAClE;AAAA,EAAA;AAEH;AAPC,cADY,oBACI,aAAY;AADtB,IAAM,oBAAN;"}
1
+ {"version":3,"file":"harmony20.mjs","sources":["../src/features/auth/backend/services/getAuthenticatedSessionDetailFromRequest.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { getJwtTokenFromCookie } from '@features/auth/frontend/utils/cookieTokenUtils'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype AuthenticatedSessionDetail = JwtToken & { payload: JwtTokenPayload }\n\n/**\n * Returns the JWT tokens and parses the attached payload.\n */\nexport function getAuthenticatedSessionDetailFromRequest(): AuthenticatedSessionDetail | undefined {\n\tconst cookie = getJwtTokenFromCookie()\n\tif (!cookie) {\n\t\treturn undefined\n\t}\n\n\tconst payload = parseJwtTokenPayload(cookie.accessToken)\n\tif (!payload) {\n\t\treturn undefined\n\t}\n\n\treturn { ...cookie, payload }\n}\n"],"names":[],"mappings":";;AAUO,SAAS,2CAAmF;AAClG,QAAM,SAAS,sBAAsB;AACrC,MAAI,CAAC,QAAQ;AACL,WAAA;AAAA,EAAA;AAGF,QAAA,UAAU,qBAAqB,OAAO,WAAW;AACvD,MAAI,CAAC,SAAS;AACN,WAAA;AAAA,EAAA;AAGD,SAAA,EAAE,GAAG,QAAQ,QAAQ;AAC7B;"}
@@ -1,17 +1,20 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const jwtTokenPayload = require("./harmony16.cjs");
4
- const cookieTokenUtils = require("./harmony17.cjs");
5
- function getAuthenticatedSessionDetailFromRequest() {
6
- const cookie = cookieTokenUtils.getJwtTokenFromCookie();
7
- if (!cookie) {
8
- return void 0;
9
- }
10
- const payload = jwtTokenPayload.parseJwtTokenPayload(cookie.accessToken);
11
- if (!payload) {
12
- return void 0;
13
- }
14
- return { ...cookie, payload };
3
+ const headerBuilder = require("./harmony19.cjs");
4
+ const UnauthorizedError = require("./harmony15.cjs");
5
+ const userToken = require("./harmony34.cjs");
6
+ const frontendHttpClient = require("@lokalise/frontend-http-client");
7
+ function generateTokenFromClassicSession(authenticationProvider, getCsrfToken, getTeamId) {
8
+ return async () => {
9
+ const csrfToken = getCsrfToken();
10
+ if (!csrfToken) {
11
+ throw new UnauthorizedError.UnauthorizedError();
12
+ }
13
+ return frontendHttpClient.sendByPayloadRoute(authenticationProvider, userToken.getUserToken, {
14
+ pathParams: { teamId: Number(await getTeamId()) },
15
+ headers: await headerBuilder.HeaderBuilder.create().add("x-csrf-token", csrfToken).resolve()
16
+ });
17
+ };
15
18
  }
16
- exports.getAuthenticatedSessionDetailFromRequest = getAuthenticatedSessionDetailFromRequest;
19
+ exports.generateTokenFromClassicSession = generateTokenFromClassicSession;
17
20
  //# sourceMappingURL=harmony21.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony21.cjs","sources":["../src/features/auth/backend/services/getAuthenticatedSessionDetailFromRequest.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { getJwtTokenFromCookie } from '@features/auth/frontend/utils/cookieTokenUtils'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype AuthenticatedSessionDetail = JwtToken & { payload: JwtTokenPayload }\n\n/**\n * Returns the JWT tokens and parses the attached payload.\n */\nexport function getAuthenticatedSessionDetailFromRequest(): AuthenticatedSessionDetail | undefined {\n\tconst cookie = getJwtTokenFromCookie()\n\tif (!cookie) {\n\t\treturn undefined\n\t}\n\n\tconst payload = parseJwtTokenPayload(cookie.accessToken)\n\tif (!payload) {\n\t\treturn undefined\n\t}\n\n\treturn { ...cookie, payload }\n}\n"],"names":["getJwtTokenFromCookie","parseJwtTokenPayload"],"mappings":";;;;AAUO,SAAS,2CAAmF;AAClG,QAAM,SAASA,iBAAAA,sBAAsB;AACrC,MAAI,CAAC,QAAQ;AACL,WAAA;AAAA,EAAA;AAGF,QAAA,UAAUC,gBAAAA,qBAAqB,OAAO,WAAW;AACvD,MAAI,CAAC,SAAS;AACN,WAAA;AAAA,EAAA;AAGD,SAAA,EAAE,GAAG,QAAQ,QAAQ;AAC7B;;"}
1
+ {"version":3,"file":"harmony21.cjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":["UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAIA,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAMC,cAAAA,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;;"}
@@ -1,17 +1,20 @@
1
- import { parseJwtTokenPayload } from "./harmony16.mjs";
2
- import { getJwtTokenFromCookie } from "./harmony17.mjs";
3
- function getAuthenticatedSessionDetailFromRequest() {
4
- const cookie = getJwtTokenFromCookie();
5
- if (!cookie) {
6
- return void 0;
7
- }
8
- const payload = parseJwtTokenPayload(cookie.accessToken);
9
- if (!payload) {
10
- return void 0;
11
- }
12
- return { ...cookie, payload };
1
+ import { HeaderBuilder } from "./harmony19.mjs";
2
+ import { UnauthorizedError } from "./harmony15.mjs";
3
+ import { getUserToken } from "./harmony34.mjs";
4
+ import { sendByPayloadRoute } from "@lokalise/frontend-http-client";
5
+ function generateTokenFromClassicSession(authenticationProvider, getCsrfToken, getTeamId) {
6
+ return async () => {
7
+ const csrfToken = getCsrfToken();
8
+ if (!csrfToken) {
9
+ throw new UnauthorizedError();
10
+ }
11
+ return sendByPayloadRoute(authenticationProvider, getUserToken, {
12
+ pathParams: { teamId: Number(await getTeamId()) },
13
+ headers: await HeaderBuilder.create().add("x-csrf-token", csrfToken).resolve()
14
+ });
15
+ };
13
16
  }
14
17
  export {
15
- getAuthenticatedSessionDetailFromRequest
18
+ generateTokenFromClassicSession
16
19
  };
17
20
  //# sourceMappingURL=harmony21.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony21.mjs","sources":["../src/features/auth/backend/services/getAuthenticatedSessionDetailFromRequest.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { getJwtTokenFromCookie } from '@features/auth/frontend/utils/cookieTokenUtils'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype AuthenticatedSessionDetail = JwtToken & { payload: JwtTokenPayload }\n\n/**\n * Returns the JWT tokens and parses the attached payload.\n */\nexport function getAuthenticatedSessionDetailFromRequest(): AuthenticatedSessionDetail | undefined {\n\tconst cookie = getJwtTokenFromCookie()\n\tif (!cookie) {\n\t\treturn undefined\n\t}\n\n\tconst payload = parseJwtTokenPayload(cookie.accessToken)\n\tif (!payload) {\n\t\treturn undefined\n\t}\n\n\treturn { ...cookie, payload }\n}\n"],"names":[],"mappings":";;AAUO,SAAS,2CAAmF;AAClG,QAAM,SAAS,sBAAsB;AACrC,MAAI,CAAC,QAAQ;AACL,WAAA;AAAA,EAAA;AAGF,QAAA,UAAU,qBAAqB,OAAO,WAAW;AACvD,MAAI,CAAC,SAAS;AACN,WAAA;AAAA,EAAA;AAGD,SAAA,EAAE,GAAG,QAAQ,QAAQ;AAC7B;"}
1
+ {"version":3,"file":"harmony21.mjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAM,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;"}
@@ -1,20 +1,21 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
3
  const headerBuilder = require("./harmony19.cjs");
4
+ const jwtTokenPayload = require("./harmony16.cjs");
4
5
  const UnauthorizedError = require("./harmony15.cjs");
5
- const userToken = require("./harmony35.cjs");
6
+ const userToken = require("./harmony34.cjs");
6
7
  const frontendHttpClient = require("@lokalise/frontend-http-client");
7
- function generateTokenFromClassicSession(authenticationProvider, getCsrfToken, getTeamId) {
8
- return async () => {
9
- const csrfToken = getCsrfToken();
10
- if (!csrfToken) {
8
+ function refreshExpiredToken(authenticationProvider) {
9
+ return async ({ accessToken, refreshToken }) => {
10
+ const payload = jwtTokenPayload.parseJwtTokenPayload(accessToken);
11
+ if (!payload) {
11
12
  throw new UnauthorizedError.UnauthorizedError();
12
13
  }
13
14
  return frontendHttpClient.sendByPayloadRoute(authenticationProvider, userToken.getUserToken, {
14
- pathParams: { teamId: Number(await getTeamId()) },
15
- headers: await headerBuilder.HeaderBuilder.create().add("x-csrf-token", csrfToken).resolve()
15
+ pathParams: { teamId: payload.teamId },
16
+ headers: await headerBuilder.HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
16
17
  });
17
18
  };
18
19
  }
19
- exports.generateTokenFromClassicSession = generateTokenFromClassicSession;
20
+ exports.refreshExpiredToken = refreshExpiredToken;
20
21
  //# sourceMappingURL=harmony22.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony22.cjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":["UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAIA,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAMC,cAAAA,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;;"}
1
+ {"version":3,"file":"harmony22.cjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":["parseJwtTokenPayload","UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAUA,qCAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAIC,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAMC,cAAAA,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;;"}
@@ -1,20 +1,21 @@
1
1
  import { HeaderBuilder } from "./harmony19.mjs";
2
+ import { parseJwtTokenPayload } from "./harmony16.mjs";
2
3
  import { UnauthorizedError } from "./harmony15.mjs";
3
- import { getUserToken } from "./harmony35.mjs";
4
+ import { getUserToken } from "./harmony34.mjs";
4
5
  import { sendByPayloadRoute } from "@lokalise/frontend-http-client";
5
- function generateTokenFromClassicSession(authenticationProvider, getCsrfToken, getTeamId) {
6
- return async () => {
7
- const csrfToken = getCsrfToken();
8
- if (!csrfToken) {
6
+ function refreshExpiredToken(authenticationProvider) {
7
+ return async ({ accessToken, refreshToken }) => {
8
+ const payload = parseJwtTokenPayload(accessToken);
9
+ if (!payload) {
9
10
  throw new UnauthorizedError();
10
11
  }
11
12
  return sendByPayloadRoute(authenticationProvider, getUserToken, {
12
- pathParams: { teamId: Number(await getTeamId()) },
13
- headers: await HeaderBuilder.create().add("x-csrf-token", csrfToken).resolve()
13
+ pathParams: { teamId: payload.teamId },
14
+ headers: await HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
14
15
  });
15
16
  };
16
17
  }
17
18
  export {
18
- generateTokenFromClassicSession
19
+ refreshExpiredToken
19
20
  };
20
21
  //# sourceMappingURL=harmony22.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony22.mjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAM,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;"}
1
+ {"version":3,"file":"harmony22.mjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAU,qBAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAM,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;"}
@@ -1,21 +1,23 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const headerBuilder = require("./harmony19.cjs");
4
- const jwtTokenPayload = require("./harmony16.cjs");
5
- const UnauthorizedError = require("./harmony15.cjs");
6
- const userToken = require("./harmony35.cjs");
7
- const frontendHttpClient = require("@lokalise/frontend-http-client");
8
- function refreshExpiredToken(authenticationProvider) {
9
- return async ({ accessToken, refreshToken }) => {
10
- const payload = jwtTokenPayload.parseJwtTokenPayload(accessToken);
11
- if (!payload) {
12
- throw new UnauthorizedError.UnauthorizedError();
3
+ const useGetUserTokenQuery = require("./harmony44.cjs");
4
+ const React = require("react");
5
+ const NewJwtIssuedEvent = require("./harmony107.cjs");
6
+ const cookieTokenUtils = require("./harmony17.cjs");
7
+ function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
8
+ const csrf = cookieTokenUtils.getCsrfTokenFromCookie();
9
+ const result = useGetUserTokenQuery.useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
10
+ queryKey: useGetUserTokenQuery.getUserTokenKey.teamKey(teamId),
11
+ enabled: csrf !== void 0
12
+ });
13
+ const activeAccessTokenRef = React.useRef();
14
+ React.useEffect(() => {
15
+ if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
16
+ window.dispatchEvent(new NewJwtIssuedEvent.NewJwtIssuedEvent(result.data));
17
+ activeAccessTokenRef.current = result.data.accessToken;
13
18
  }
14
- return frontendHttpClient.sendByPayloadRoute(authenticationProvider, userToken.getUserToken, {
15
- pathParams: { teamId: payload.teamId },
16
- headers: await headerBuilder.HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
17
- });
18
- };
19
+ }, [result.data]);
20
+ return result;
19
21
  }
20
- exports.refreshExpiredToken = refreshExpiredToken;
22
+ exports.useGetPromotedClassicSessionJwtQuery = useGetPromotedClassicSessionJwtQuery;
21
23
  //# sourceMappingURL=harmony23.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony23.cjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":["parseJwtTokenPayload","UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAUA,qCAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAIC,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAMC,cAAAA,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;;"}
1
+ {"version":3,"file":"harmony23.cjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":["getCsrfTokenFromCookie","useGetUserTokenQuery","getUserTokenKey","useRef","useEffect","NewJwtIssuedEvent"],"mappings":";;;;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAOA,iBAAAA,uBAAuB;AAE9B,QAAA,SAASC,0CAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAUC,qBAAAA,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuBC,MAAAA,OAAe;AAE5CC,QAAAA,UAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAIC,kBAAkB,kBAAA,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;;"}
@@ -1,21 +1,23 @@
1
- import { HeaderBuilder } from "./harmony19.mjs";
2
- import { parseJwtTokenPayload } from "./harmony16.mjs";
3
- import { UnauthorizedError } from "./harmony15.mjs";
4
- import { getUserToken } from "./harmony35.mjs";
5
- import { sendByPayloadRoute } from "@lokalise/frontend-http-client";
6
- function refreshExpiredToken(authenticationProvider) {
7
- return async ({ accessToken, refreshToken }) => {
8
- const payload = parseJwtTokenPayload(accessToken);
9
- if (!payload) {
10
- throw new UnauthorizedError();
1
+ import { useGetUserTokenQuery, getUserTokenKey } from "./harmony44.mjs";
2
+ import { useRef, useEffect } from "react";
3
+ import { NewJwtIssuedEvent } from "./harmony107.mjs";
4
+ import { getCsrfTokenFromCookie } from "./harmony17.mjs";
5
+ function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
6
+ const csrf = getCsrfTokenFromCookie();
7
+ const result = useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
8
+ queryKey: getUserTokenKey.teamKey(teamId),
9
+ enabled: csrf !== void 0
10
+ });
11
+ const activeAccessTokenRef = useRef();
12
+ useEffect(() => {
13
+ if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
14
+ window.dispatchEvent(new NewJwtIssuedEvent(result.data));
15
+ activeAccessTokenRef.current = result.data.accessToken;
11
16
  }
12
- return sendByPayloadRoute(authenticationProvider, getUserToken, {
13
- pathParams: { teamId: payload.teamId },
14
- headers: await HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
15
- });
16
- };
17
+ }, [result.data]);
18
+ return result;
17
19
  }
18
20
  export {
19
- refreshExpiredToken
21
+ useGetPromotedClassicSessionJwtQuery
20
22
  };
21
23
  //# sourceMappingURL=harmony23.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony23.mjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAU,qBAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAM,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;"}
1
+ {"version":3,"file":"harmony23.mjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":[],"mappings":";;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAO,uBAAuB;AAE9B,QAAA,SAAS,qBAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAU,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuB,OAAe;AAE5C,YAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAI,kBAAkB,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;"}
@@ -1,23 +1,23 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const useGetUserTokenQuery = require("./harmony45.cjs");
4
3
  const React = require("react");
5
- const NewJwtIssuedEvent = require("./harmony20.cjs");
4
+ const jwtTokenPayload = require("./harmony16.cjs");
5
+ const NewJwtIssuedEvent = require("./harmony107.cjs");
6
6
  const cookieTokenUtils = require("./harmony17.cjs");
7
- function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
8
- const csrf = cookieTokenUtils.getCsrfTokenFromCookie();
9
- const result = useGetUserTokenQuery.useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
10
- queryKey: useGetUserTokenQuery.getUserTokenKey.teamKey(teamId),
11
- enabled: csrf !== void 0
12
- });
13
- const activeAccessTokenRef = React.useRef();
7
+ function useAuthenticatedSessionPayload() {
8
+ const [payload, setPayload] = React.useState();
14
9
  React.useEffect(() => {
15
- if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
16
- window.dispatchEvent(new NewJwtIssuedEvent.NewJwtIssuedEvent(result.data));
17
- activeAccessTokenRef.current = result.data.accessToken;
18
- }
19
- }, [result.data]);
20
- return result;
10
+ const listener = (event) => {
11
+ setPayload(event.detail.payload);
12
+ };
13
+ const token = cookieTokenUtils.getJwtTokenFromCookie();
14
+ setPayload(token ? jwtTokenPayload.parseJwtTokenPayload(token.accessToken) : void 0);
15
+ window.addEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
16
+ return () => {
17
+ window.removeEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
18
+ };
19
+ }, []);
20
+ return payload;
21
21
  }
22
- exports.useGetPromotedClassicSessionJwtQuery = useGetPromotedClassicSessionJwtQuery;
22
+ exports.useAuthenticatedSessionPayload = useAuthenticatedSessionPayload;
23
23
  //# sourceMappingURL=harmony24.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony24.cjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":["getCsrfTokenFromCookie","useGetUserTokenQuery","getUserTokenKey","useRef","useEffect","NewJwtIssuedEvent"],"mappings":";;;;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAOA,iBAAAA,uBAAuB;AAE9B,QAAA,SAASC,0CAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAUC,qBAAAA,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuBC,MAAAA,OAAe;AAE5CC,QAAAA,UAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAIC,kBAAkB,kBAAA,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;;"}
1
+ {"version":3,"file":"harmony24.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":["useState","useEffect","getJwtTokenFromCookie","parseJwtTokenPayload","NewJwtIssuedEvent"],"mappings":";;;;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAIA,eAA0B;AAExDC,QAAAA,UAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQC,iBAAAA,sBAAsB;AACpC,eAAW,QAAQC,gBAAA,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiBC,oCAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoBA,oCAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;;"}
@@ -1,23 +1,23 @@
1
- import { useGetUserTokenQuery, getUserTokenKey } from "./harmony45.mjs";
2
- import { useRef, useEffect } from "react";
3
- import { NewJwtIssuedEvent } from "./harmony20.mjs";
4
- import { getCsrfTokenFromCookie } from "./harmony17.mjs";
5
- function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
6
- const csrf = getCsrfTokenFromCookie();
7
- const result = useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
8
- queryKey: getUserTokenKey.teamKey(teamId),
9
- enabled: csrf !== void 0
10
- });
11
- const activeAccessTokenRef = useRef();
1
+ import { useState, useEffect } from "react";
2
+ import { parseJwtTokenPayload } from "./harmony16.mjs";
3
+ import { NewJwtIssuedEvent } from "./harmony107.mjs";
4
+ import { getJwtTokenFromCookie } from "./harmony17.mjs";
5
+ function useAuthenticatedSessionPayload() {
6
+ const [payload, setPayload] = useState();
12
7
  useEffect(() => {
13
- if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
14
- window.dispatchEvent(new NewJwtIssuedEvent(result.data));
15
- activeAccessTokenRef.current = result.data.accessToken;
16
- }
17
- }, [result.data]);
18
- return result;
8
+ const listener = (event) => {
9
+ setPayload(event.detail.payload);
10
+ };
11
+ const token = getJwtTokenFromCookie();
12
+ setPayload(token ? parseJwtTokenPayload(token.accessToken) : void 0);
13
+ window.addEventListener(NewJwtIssuedEvent.eventName, listener);
14
+ return () => {
15
+ window.removeEventListener(NewJwtIssuedEvent.eventName, listener);
16
+ };
17
+ }, []);
18
+ return payload;
19
19
  }
20
20
  export {
21
- useGetPromotedClassicSessionJwtQuery
21
+ useAuthenticatedSessionPayload
22
22
  };
23
23
  //# sourceMappingURL=harmony24.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony24.mjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":[],"mappings":";;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAO,uBAAuB;AAE9B,QAAA,SAAS,qBAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAU,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuB,OAAe;AAE5C,YAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAI,kBAAkB,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;"}
1
+ {"version":3,"file":"harmony24.mjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":[],"mappings":";;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAI,SAA0B;AAExD,YAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQ,sBAAsB;AACpC,eAAW,QAAQ,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiB,kBAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoB,kBAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;"}
@@ -1,23 +1,13 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const React = require("react");
4
- const jwtTokenPayload = require("./harmony16.cjs");
5
- const NewJwtIssuedEvent = require("./harmony20.cjs");
6
- const cookieTokenUtils = require("./harmony17.cjs");
7
- function useAuthenticatedSessionPayload() {
8
- const [payload, setPayload] = React.useState();
9
- React.useEffect(() => {
10
- const listener = (event) => {
11
- setPayload(event.detail.payload);
12
- };
13
- const token = cookieTokenUtils.getJwtTokenFromCookie();
14
- setPayload(token ? jwtTokenPayload.parseJwtTokenPayload(token.accessToken) : void 0);
15
- window.addEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
16
- return () => {
17
- window.removeEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
18
- };
19
- }, []);
20
- return payload;
3
+ const useGetTeamUsersQuery = require("./harmony43.cjs");
4
+ const useAuthenticatedSessionPayload = require("./harmony24.cjs");
5
+ function useAuthenticatedUser(wretchClient, headers) {
6
+ const payload = useAuthenticatedSessionPayload.useAuthenticatedSessionPayload();
7
+ return useGetTeamUsersQuery.useGetTeamUsersQuery(wretchClient, headers, {
8
+ queryKey: useGetTeamUsersQuery.getTeamUsersQueryKey.teamUserKey((payload == null ? void 0 : payload.teamId) ?? 0, (payload == null ? void 0 : payload.userId) ?? 0),
9
+ enabled: (payload == null ? void 0 : payload.userId) !== void 0 && payload.teamId !== void 0
10
+ });
21
11
  }
22
- exports.useAuthenticatedSessionPayload = useAuthenticatedSessionPayload;
12
+ exports.useAuthenticatedUser = useAuthenticatedUser;
23
13
  //# sourceMappingURL=harmony25.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony25.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":["useState","useEffect","getJwtTokenFromCookie","parseJwtTokenPayload","NewJwtIssuedEvent"],"mappings":";;;;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAIA,eAA0B;AAExDC,QAAAA,UAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQC,iBAAAA,sBAAsB;AACpC,eAAW,QAAQC,gBAAA,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiBC,oCAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoBA,oCAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;;"}
1
+ {"version":3,"file":"harmony25.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedUser.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetTeamUsersQueryKey,\n\tuseGetTeamUsersQuery,\n} from '@features/publicApi/hooks/useGetTeamUsersQuery'\nimport type { TeamUserApiBaseHeaders } from '@features/publicApi/types/teamUserTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the team-user information for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - Headers to be attached to the request.\n */\nexport function useAuthenticatedUser<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<TeamUserApiBaseHeaders>,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\treturn useGetTeamUsersQuery(wretchClient, headers, {\n\t\tqueryKey: getTeamUsersQueryKey.teamUserKey(payload?.teamId ?? 0, payload?.userId ?? 0),\n\t\tenabled: payload?.userId !== undefined && payload.teamId !== undefined,\n\t})\n}\n"],"names":["useAuthenticatedSessionPayload","useGetTeamUsersQuery","getTeamUsersQueryKey"],"mappings":";;;;AAgBgB,SAAA,qBACf,cACA,SACC;AACD,QAAM,UAAUA,+BAAAA,+BAA+B;AAExC,SAAAC,qBAAA,qBAAqB,cAAc,SAAS;AAAA,IAClD,UAAUC,qBAAAA,qBAAqB,aAAY,mCAAS,WAAU,IAAG,mCAAS,WAAU,CAAC;AAAA,IACrF,UAAS,mCAAS,YAAW,UAAa,QAAQ,WAAW;AAAA,EAAA,CAC7D;AACF;;"}
@@ -1,23 +1,13 @@
1
- import { useState, useEffect } from "react";
2
- import { parseJwtTokenPayload } from "./harmony16.mjs";
3
- import { NewJwtIssuedEvent } from "./harmony20.mjs";
4
- import { getJwtTokenFromCookie } from "./harmony17.mjs";
5
- function useAuthenticatedSessionPayload() {
6
- const [payload, setPayload] = useState();
7
- useEffect(() => {
8
- const listener = (event) => {
9
- setPayload(event.detail.payload);
10
- };
11
- const token = getJwtTokenFromCookie();
12
- setPayload(token ? parseJwtTokenPayload(token.accessToken) : void 0);
13
- window.addEventListener(NewJwtIssuedEvent.eventName, listener);
14
- return () => {
15
- window.removeEventListener(NewJwtIssuedEvent.eventName, listener);
16
- };
17
- }, []);
18
- return payload;
1
+ import { useGetTeamUsersQuery, getTeamUsersQueryKey } from "./harmony43.mjs";
2
+ import { useAuthenticatedSessionPayload } from "./harmony24.mjs";
3
+ function useAuthenticatedUser(wretchClient, headers) {
4
+ const payload = useAuthenticatedSessionPayload();
5
+ return useGetTeamUsersQuery(wretchClient, headers, {
6
+ queryKey: getTeamUsersQueryKey.teamUserKey((payload == null ? void 0 : payload.teamId) ?? 0, (payload == null ? void 0 : payload.userId) ?? 0),
7
+ enabled: (payload == null ? void 0 : payload.userId) !== void 0 && payload.teamId !== void 0
8
+ });
19
9
  }
20
10
  export {
21
- useAuthenticatedSessionPayload
11
+ useAuthenticatedUser
22
12
  };
23
13
  //# sourceMappingURL=harmony25.mjs.map