@lokalise/harmony 1.32.4-exp-expertJWTSidebar.1 → 1.33.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (304) hide show
  1. package/dist/harmony.cjs +36 -32
  2. package/dist/harmony.cjs.map +1 -1
  3. package/dist/harmony.mjs +37 -33
  4. package/dist/harmony100.cjs +2 -2
  5. package/dist/harmony100.mjs +2 -2
  6. package/dist/harmony101.cjs +19 -22
  7. package/dist/harmony101.cjs.map +1 -1
  8. package/dist/harmony101.mjs +18 -21
  9. package/dist/harmony101.mjs.map +1 -1
  10. package/dist/harmony102.cjs +13 -5
  11. package/dist/harmony102.cjs.map +1 -1
  12. package/dist/harmony102.mjs +13 -5
  13. package/dist/harmony102.mjs.map +1 -1
  14. package/dist/harmony103.cjs +1 -1
  15. package/dist/harmony103.mjs +1 -1
  16. package/dist/harmony106.cjs +2 -2
  17. package/dist/harmony106.mjs +2 -2
  18. package/dist/harmony109.cjs +18 -3
  19. package/dist/harmony109.cjs.map +1 -1
  20. package/dist/harmony109.mjs +18 -3
  21. package/dist/harmony109.mjs.map +1 -1
  22. package/dist/harmony110.cjs +6 -18
  23. package/dist/harmony110.cjs.map +1 -1
  24. package/dist/harmony110.mjs +6 -18
  25. package/dist/harmony110.mjs.map +1 -1
  26. package/dist/harmony111.cjs +6 -5
  27. package/dist/harmony111.cjs.map +1 -1
  28. package/dist/harmony111.mjs +6 -5
  29. package/dist/harmony112.cjs +5 -5
  30. package/dist/harmony112.mjs +5 -5
  31. package/dist/harmony113.cjs +6 -63
  32. package/dist/harmony113.cjs.map +1 -1
  33. package/dist/harmony113.mjs +5 -62
  34. package/dist/harmony113.mjs.map +1 -1
  35. package/dist/harmony114.cjs +61 -87
  36. package/dist/harmony114.cjs.map +1 -1
  37. package/dist/harmony114.mjs +61 -87
  38. package/dist/harmony114.mjs.map +1 -1
  39. package/dist/harmony115.cjs +88 -18
  40. package/dist/harmony115.cjs.map +1 -1
  41. package/dist/harmony115.mjs +87 -17
  42. package/dist/harmony115.mjs.map +1 -1
  43. package/dist/harmony116.cjs +19 -97
  44. package/dist/harmony116.cjs.map +1 -1
  45. package/dist/harmony116.mjs +18 -96
  46. package/dist/harmony116.mjs.map +1 -1
  47. package/dist/harmony117.cjs +94 -11
  48. package/dist/harmony117.cjs.map +1 -1
  49. package/dist/harmony117.mjs +94 -11
  50. package/dist/harmony117.mjs.map +1 -1
  51. package/dist/harmony118.cjs +12 -13
  52. package/dist/harmony118.cjs.map +1 -1
  53. package/dist/harmony118.mjs +12 -13
  54. package/dist/harmony118.mjs.map +1 -1
  55. package/dist/harmony119.cjs +13 -35
  56. package/dist/harmony119.cjs.map +1 -1
  57. package/dist/harmony119.mjs +13 -35
  58. package/dist/harmony119.mjs.map +1 -1
  59. package/dist/harmony120.cjs +32 -24
  60. package/dist/harmony120.cjs.map +1 -1
  61. package/dist/harmony120.mjs +32 -24
  62. package/dist/harmony120.mjs.map +1 -1
  63. package/dist/harmony121.cjs +28 -7
  64. package/dist/harmony121.cjs.map +1 -1
  65. package/dist/harmony121.mjs +28 -7
  66. package/dist/harmony121.mjs.map +1 -1
  67. package/dist/harmony122.cjs +13 -57
  68. package/dist/harmony122.cjs.map +1 -1
  69. package/dist/harmony122.mjs +13 -57
  70. package/dist/harmony122.mjs.map +1 -1
  71. package/dist/harmony123.cjs +14 -59
  72. package/dist/harmony123.cjs.map +1 -1
  73. package/dist/harmony123.mjs +14 -59
  74. package/dist/harmony123.mjs.map +1 -1
  75. package/dist/harmony124.cjs +17 -19
  76. package/dist/harmony124.cjs.map +1 -1
  77. package/dist/harmony124.mjs +16 -18
  78. package/dist/harmony124.mjs.map +1 -1
  79. package/dist/harmony125.cjs +7 -13
  80. package/dist/harmony125.cjs.map +1 -1
  81. package/dist/harmony125.mjs +7 -13
  82. package/dist/harmony125.mjs.map +1 -1
  83. package/dist/harmony126.cjs +57 -15
  84. package/dist/harmony126.cjs.map +1 -1
  85. package/dist/harmony126.mjs +57 -15
  86. package/dist/harmony126.mjs.map +1 -1
  87. package/dist/harmony127.cjs +59 -15
  88. package/dist/harmony127.cjs.map +1 -1
  89. package/dist/harmony127.mjs +59 -15
  90. package/dist/harmony127.mjs.map +1 -1
  91. package/dist/harmony128.cjs +19 -12
  92. package/dist/harmony128.cjs.map +1 -1
  93. package/dist/harmony128.mjs +18 -11
  94. package/dist/harmony128.mjs.map +1 -1
  95. package/dist/harmony129.cjs +10 -15
  96. package/dist/harmony129.cjs.map +1 -1
  97. package/dist/harmony129.mjs +10 -15
  98. package/dist/harmony129.mjs.map +1 -1
  99. package/dist/harmony130.cjs +13 -18
  100. package/dist/harmony130.cjs.map +1 -1
  101. package/dist/harmony130.mjs +13 -18
  102. package/dist/harmony130.mjs.map +1 -1
  103. package/dist/harmony131.cjs +19 -10
  104. package/dist/harmony131.cjs.map +1 -1
  105. package/dist/harmony131.mjs +19 -10
  106. package/dist/harmony131.mjs.map +1 -1
  107. package/dist/harmony132.cjs +12 -46
  108. package/dist/harmony132.cjs.map +1 -1
  109. package/dist/harmony132.mjs +12 -46
  110. package/dist/harmony132.mjs.map +1 -1
  111. package/dist/harmony133.cjs +7 -13
  112. package/dist/harmony133.cjs.map +1 -1
  113. package/dist/harmony133.mjs +6 -12
  114. package/dist/harmony133.mjs.map +1 -1
  115. package/dist/harmony134.cjs +11 -5
  116. package/dist/harmony134.cjs.map +1 -1
  117. package/dist/harmony134.mjs +11 -5
  118. package/dist/harmony134.mjs.map +1 -1
  119. package/dist/harmony135.cjs +31 -11
  120. package/dist/harmony135.cjs.map +1 -1
  121. package/dist/harmony135.mjs +31 -11
  122. package/dist/harmony135.mjs.map +1 -1
  123. package/dist/harmony136.cjs +10 -28
  124. package/dist/harmony136.cjs.map +1 -1
  125. package/dist/harmony136.mjs +10 -28
  126. package/dist/harmony136.mjs.map +1 -1
  127. package/dist/harmony137.cjs +46 -14
  128. package/dist/harmony137.cjs.map +1 -1
  129. package/dist/harmony137.mjs +46 -14
  130. package/dist/harmony137.mjs.map +1 -1
  131. package/dist/harmony138.cjs +15 -0
  132. package/dist/harmony138.cjs.map +1 -0
  133. package/dist/harmony138.mjs +15 -0
  134. package/dist/harmony138.mjs.map +1 -0
  135. package/dist/harmony16.cjs +1 -1
  136. package/dist/harmony16.mjs +1 -1
  137. package/dist/harmony20.cjs +12 -12
  138. package/dist/harmony20.cjs.map +1 -1
  139. package/dist/harmony20.mjs +12 -12
  140. package/dist/harmony20.mjs.map +1 -1
  141. package/dist/harmony21.cjs +16 -13
  142. package/dist/harmony21.cjs.map +1 -1
  143. package/dist/harmony21.mjs +16 -13
  144. package/dist/harmony21.mjs.map +1 -1
  145. package/dist/harmony22.cjs +9 -8
  146. package/dist/harmony22.cjs.map +1 -1
  147. package/dist/harmony22.mjs +9 -8
  148. package/dist/harmony22.mjs.map +1 -1
  149. package/dist/harmony23.cjs +18 -16
  150. package/dist/harmony23.cjs.map +1 -1
  151. package/dist/harmony23.mjs +18 -16
  152. package/dist/harmony23.mjs.map +1 -1
  153. package/dist/harmony24.cjs +16 -16
  154. package/dist/harmony24.cjs.map +1 -1
  155. package/dist/harmony24.mjs +18 -18
  156. package/dist/harmony24.mjs.map +1 -1
  157. package/dist/harmony25.cjs +9 -19
  158. package/dist/harmony25.cjs.map +1 -1
  159. package/dist/harmony25.mjs +9 -19
  160. package/dist/harmony25.mjs.map +1 -1
  161. package/dist/harmony26.cjs +8 -7
  162. package/dist/harmony26.cjs.map +1 -1
  163. package/dist/harmony26.mjs +8 -7
  164. package/dist/harmony26.mjs.map +1 -1
  165. package/dist/harmony27.cjs +27 -11
  166. package/dist/harmony27.cjs.map +1 -1
  167. package/dist/harmony27.mjs +27 -11
  168. package/dist/harmony27.mjs.map +1 -1
  169. package/dist/harmony28.cjs +25 -21
  170. package/dist/harmony28.cjs.map +1 -1
  171. package/dist/harmony28.mjs +26 -22
  172. package/dist/harmony28.mjs.map +1 -1
  173. package/dist/harmony29.cjs +7 -27
  174. package/dist/harmony29.cjs.map +1 -1
  175. package/dist/harmony29.mjs +8 -28
  176. package/dist/harmony29.mjs.map +1 -1
  177. package/dist/harmony30.cjs +54 -10
  178. package/dist/harmony30.cjs.map +1 -1
  179. package/dist/harmony30.mjs +54 -10
  180. package/dist/harmony30.mjs.map +1 -1
  181. package/dist/harmony31.cjs +25 -50
  182. package/dist/harmony31.cjs.map +1 -1
  183. package/dist/harmony31.mjs +26 -51
  184. package/dist/harmony31.mjs.map +1 -1
  185. package/dist/harmony32.cjs +15 -27
  186. package/dist/harmony32.cjs.map +1 -1
  187. package/dist/harmony32.mjs +16 -28
  188. package/dist/harmony32.mjs.map +1 -1
  189. package/dist/harmony33.cjs +15 -15
  190. package/dist/harmony33.cjs.map +1 -1
  191. package/dist/harmony33.mjs +15 -15
  192. package/dist/harmony33.mjs.map +1 -1
  193. package/dist/harmony34.cjs +12 -8
  194. package/dist/harmony34.cjs.map +1 -1
  195. package/dist/harmony34.mjs +13 -9
  196. package/dist/harmony34.mjs.map +1 -1
  197. package/dist/harmony35.cjs +14 -14
  198. package/dist/harmony35.cjs.map +1 -1
  199. package/dist/harmony35.mjs +14 -14
  200. package/dist/harmony35.mjs.map +1 -1
  201. package/dist/harmony36.cjs +4 -4
  202. package/dist/harmony36.cjs.map +1 -1
  203. package/dist/harmony36.mjs +4 -4
  204. package/dist/harmony36.mjs.map +1 -1
  205. package/dist/harmony37.cjs +6 -6
  206. package/dist/harmony37.cjs.map +1 -1
  207. package/dist/harmony37.mjs +6 -6
  208. package/dist/harmony37.mjs.map +1 -1
  209. package/dist/harmony38.cjs +5 -6
  210. package/dist/harmony38.cjs.map +1 -1
  211. package/dist/harmony38.mjs +5 -6
  212. package/dist/harmony38.mjs.map +1 -1
  213. package/dist/harmony39.cjs +14 -6
  214. package/dist/harmony39.cjs.map +1 -1
  215. package/dist/harmony39.mjs +15 -7
  216. package/dist/harmony39.mjs.map +1 -1
  217. package/dist/harmony40.cjs +7 -15
  218. package/dist/harmony40.cjs.map +1 -1
  219. package/dist/harmony40.mjs +7 -15
  220. package/dist/harmony40.mjs.map +1 -1
  221. package/dist/harmony41.cjs +11 -7
  222. package/dist/harmony41.cjs.map +1 -1
  223. package/dist/harmony41.mjs +13 -9
  224. package/dist/harmony41.mjs.map +1 -1
  225. package/dist/harmony42.cjs +8 -8
  226. package/dist/harmony42.cjs.map +1 -1
  227. package/dist/harmony42.mjs +8 -8
  228. package/dist/harmony42.mjs.map +1 -1
  229. package/dist/harmony43.cjs +12 -14
  230. package/dist/harmony43.cjs.map +1 -1
  231. package/dist/harmony43.mjs +12 -14
  232. package/dist/harmony43.mjs.map +1 -1
  233. package/dist/harmony44.cjs +8 -8
  234. package/dist/harmony44.cjs.map +1 -1
  235. package/dist/harmony44.mjs +9 -9
  236. package/dist/harmony44.mjs.map +1 -1
  237. package/dist/harmony45.cjs +9 -9
  238. package/dist/harmony45.cjs.map +1 -1
  239. package/dist/harmony45.mjs +10 -10
  240. package/dist/harmony45.mjs.map +1 -1
  241. package/dist/harmony46.cjs +14 -12
  242. package/dist/harmony46.cjs.map +1 -1
  243. package/dist/harmony46.mjs +14 -12
  244. package/dist/harmony46.mjs.map +1 -1
  245. package/dist/harmony47.cjs +10 -10
  246. package/dist/harmony47.cjs.map +1 -1
  247. package/dist/harmony47.mjs +10 -10
  248. package/dist/harmony47.mjs.map +1 -1
  249. package/dist/harmony48.cjs +8 -8
  250. package/dist/harmony48.cjs.map +1 -1
  251. package/dist/harmony48.mjs +8 -8
  252. package/dist/harmony48.mjs.map +1 -1
  253. package/dist/harmony49.cjs +7 -7
  254. package/dist/harmony49.cjs.map +1 -1
  255. package/dist/harmony49.mjs +7 -7
  256. package/dist/harmony49.mjs.map +1 -1
  257. package/dist/harmony50.cjs +8 -8
  258. package/dist/harmony50.cjs.map +1 -1
  259. package/dist/harmony50.mjs +8 -8
  260. package/dist/harmony50.mjs.map +1 -1
  261. package/dist/harmony51.cjs +1 -1
  262. package/dist/harmony51.mjs +1 -1
  263. package/dist/harmony52.cjs +1 -1
  264. package/dist/harmony52.mjs +1 -1
  265. package/dist/harmony53.cjs +1 -1
  266. package/dist/harmony53.mjs +1 -1
  267. package/dist/harmony54.cjs +1 -1
  268. package/dist/harmony54.mjs +1 -1
  269. package/dist/harmony65.cjs +9 -0
  270. package/dist/harmony65.cjs.map +1 -1
  271. package/dist/harmony65.mjs +9 -0
  272. package/dist/harmony65.mjs.map +1 -1
  273. package/dist/harmony82.cjs +2 -2
  274. package/dist/harmony82.mjs +2 -2
  275. package/dist/harmony84.cjs +2 -2
  276. package/dist/harmony84.mjs +2 -2
  277. package/dist/harmony88.cjs +1 -1
  278. package/dist/harmony88.mjs +1 -1
  279. package/dist/harmony89.cjs +1 -1
  280. package/dist/harmony89.mjs +1 -1
  281. package/dist/harmony94.cjs +1 -1
  282. package/dist/harmony94.mjs +1 -1
  283. package/dist/harmony96.cjs +10 -9
  284. package/dist/harmony96.cjs.map +1 -1
  285. package/dist/harmony96.mjs +12 -11
  286. package/dist/harmony96.mjs.map +1 -1
  287. package/dist/harmony97.cjs +11 -20
  288. package/dist/harmony97.cjs.map +1 -1
  289. package/dist/harmony97.mjs +11 -20
  290. package/dist/harmony97.mjs.map +1 -1
  291. package/dist/harmony98.cjs +9 -10
  292. package/dist/harmony98.cjs.map +1 -1
  293. package/dist/harmony98.mjs +11 -12
  294. package/dist/harmony98.mjs.map +1 -1
  295. package/dist/harmony99.cjs +20 -11
  296. package/dist/harmony99.cjs.map +1 -1
  297. package/dist/harmony99.mjs +20 -11
  298. package/dist/harmony99.mjs.map +1 -1
  299. package/dist/types/src/features/auth/node.d.ts +0 -1
  300. package/dist/types/src/features/publicApi/hooks/useListTeamUsersQuery.d.ts +32 -0
  301. package/dist/types/src/features/publicApi/node.d.ts +1 -0
  302. package/dist/types/src/features/publicApi/teamUsers.d.ts +110 -0
  303. package/dist/types/src/features/publicApi/types/teamUserTypes.d.ts +54 -0
  304. package/package.json +1 -1
@@ -1 +1 @@
1
- {"version":3,"file":"harmony21.mjs","sources":["../src/features/auth/backend/services/getAuthenticatedSessionDetailFromRequest.ts"],"sourcesContent":["import type { JwtTokenPayload } from '@features/auth/core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { getJwtTokenFromCookie } from '@features/auth/frontend/utils/cookieTokenUtils'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\n\ntype AuthenticatedSessionDetail = JwtToken & { payload: JwtTokenPayload }\n\n/**\n * Returns the JWT tokens and parses the attached payload.\n */\nexport function getAuthenticatedSessionDetailFromRequest(): AuthenticatedSessionDetail | undefined {\n\tconst cookie = getJwtTokenFromCookie()\n\tif (!cookie) {\n\t\treturn undefined\n\t}\n\n\tconst payload = parseJwtTokenPayload(cookie.accessToken)\n\tif (!payload) {\n\t\treturn undefined\n\t}\n\n\treturn { ...cookie, payload }\n}\n"],"names":[],"mappings":";;AAUO,SAAS,2CAAmF;AAClG,QAAM,SAAS,sBAAsB;AACrC,MAAI,CAAC,QAAQ;AACL,WAAA;AAAA,EAAA;AAGF,QAAA,UAAU,qBAAqB,OAAO,WAAW;AACvD,MAAI,CAAC,SAAS;AACN,WAAA;AAAA,EAAA;AAGD,SAAA,EAAE,GAAG,QAAQ,QAAQ;AAC7B;"}
1
+ {"version":3,"file":"harmony21.mjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAM,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;"}
@@ -1,20 +1,21 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
3
  const headerBuilder = require("./harmony19.cjs");
4
+ const jwtTokenPayload = require("./harmony16.cjs");
4
5
  const UnauthorizedError = require("./harmony15.cjs");
5
- const userToken = require("./harmony35.cjs");
6
+ const userToken = require("./harmony34.cjs");
6
7
  const frontendHttpClient = require("@lokalise/frontend-http-client");
7
- function generateTokenFromClassicSession(authenticationProvider, getCsrfToken, getTeamId) {
8
- return async () => {
9
- const csrfToken = getCsrfToken();
10
- if (!csrfToken) {
8
+ function refreshExpiredToken(authenticationProvider) {
9
+ return async ({ accessToken, refreshToken }) => {
10
+ const payload = jwtTokenPayload.parseJwtTokenPayload(accessToken);
11
+ if (!payload) {
11
12
  throw new UnauthorizedError.UnauthorizedError();
12
13
  }
13
14
  return frontendHttpClient.sendByPayloadRoute(authenticationProvider, userToken.getUserToken, {
14
- pathParams: { teamId: Number(await getTeamId()) },
15
- headers: await headerBuilder.HeaderBuilder.create().add("x-csrf-token", csrfToken).resolve()
15
+ pathParams: { teamId: payload.teamId },
16
+ headers: await headerBuilder.HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
16
17
  });
17
18
  };
18
19
  }
19
- exports.generateTokenFromClassicSession = generateTokenFromClassicSession;
20
+ exports.refreshExpiredToken = refreshExpiredToken;
20
21
  //# sourceMappingURL=harmony22.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony22.cjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":["UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAIA,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAMC,cAAAA,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;;"}
1
+ {"version":3,"file":"harmony22.cjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":["parseJwtTokenPayload","UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAUA,qCAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAIC,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAMC,cAAAA,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;;"}
@@ -1,20 +1,21 @@
1
1
  import { HeaderBuilder } from "./harmony19.mjs";
2
+ import { parseJwtTokenPayload } from "./harmony16.mjs";
2
3
  import { UnauthorizedError } from "./harmony15.mjs";
3
- import { getUserToken } from "./harmony35.mjs";
4
+ import { getUserToken } from "./harmony34.mjs";
4
5
  import { sendByPayloadRoute } from "@lokalise/frontend-http-client";
5
- function generateTokenFromClassicSession(authenticationProvider, getCsrfToken, getTeamId) {
6
- return async () => {
7
- const csrfToken = getCsrfToken();
8
- if (!csrfToken) {
6
+ function refreshExpiredToken(authenticationProvider) {
7
+ return async ({ accessToken, refreshToken }) => {
8
+ const payload = parseJwtTokenPayload(accessToken);
9
+ if (!payload) {
9
10
  throw new UnauthorizedError();
10
11
  }
11
12
  return sendByPayloadRoute(authenticationProvider, getUserToken, {
12
- pathParams: { teamId: Number(await getTeamId()) },
13
- headers: await HeaderBuilder.create().add("x-csrf-token", csrfToken).resolve()
13
+ pathParams: { teamId: payload.teamId },
14
+ headers: await HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
14
15
  });
15
16
  };
16
17
  }
17
18
  export {
18
- generateTokenFromClassicSession
19
+ refreshExpiredToken
19
20
  };
20
21
  //# sourceMappingURL=harmony22.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony22.mjs","sources":["../src/features/auth/frontend/services/generateTokenFromClassicSession.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function generateTokenFromClassicSession<T>(\n\tauthenticationProvider: Wretch<T>,\n\tgetCsrfToken: () => string | null,\n\tgetTeamId: () => Promise<string>,\n) {\n\treturn async () => {\n\t\tconst csrfToken = getCsrfToken()\n\n\t\tif (!csrfToken) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: Number(await getTeamId()) },\n\t\t\theaders: await HeaderBuilder.create().add('x-csrf-token', csrfToken).resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;AAMgB,SAAA,gCACf,wBACA,cACA,WACC;AACD,SAAO,YAAY;AAClB,UAAM,YAAY,aAAa;AAE/B,QAAI,CAAC,WAAW;AACf,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,OAAO,MAAM,UAAW,CAAA,EAAE;AAAA,MAChD,SAAS,MAAM,cAAc,OAAA,EAAS,IAAI,gBAAgB,SAAS,EAAE,QAAQ;AAAA,IAAA,CAC7E;AAAA,EACF;AACD;"}
1
+ {"version":3,"file":"harmony22.mjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAU,qBAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAM,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;"}
@@ -1,21 +1,23 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const headerBuilder = require("./harmony19.cjs");
4
- const jwtTokenPayload = require("./harmony16.cjs");
5
- const UnauthorizedError = require("./harmony15.cjs");
6
- const userToken = require("./harmony35.cjs");
7
- const frontendHttpClient = require("@lokalise/frontend-http-client");
8
- function refreshExpiredToken(authenticationProvider) {
9
- return async ({ accessToken, refreshToken }) => {
10
- const payload = jwtTokenPayload.parseJwtTokenPayload(accessToken);
11
- if (!payload) {
12
- throw new UnauthorizedError.UnauthorizedError();
3
+ const useGetUserTokenQuery = require("./harmony44.cjs");
4
+ const React = require("react");
5
+ const NewJwtIssuedEvent = require("./harmony102.cjs");
6
+ const cookieTokenUtils = require("./harmony17.cjs");
7
+ function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
8
+ const csrf = cookieTokenUtils.getCsrfTokenFromCookie();
9
+ const result = useGetUserTokenQuery.useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
10
+ queryKey: useGetUserTokenQuery.getUserTokenKey.teamKey(teamId),
11
+ enabled: csrf !== void 0
12
+ });
13
+ const activeAccessTokenRef = React.useRef();
14
+ React.useEffect(() => {
15
+ if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
16
+ window.dispatchEvent(new NewJwtIssuedEvent.NewJwtIssuedEvent(result.data));
17
+ activeAccessTokenRef.current = result.data.accessToken;
13
18
  }
14
- return frontendHttpClient.sendByPayloadRoute(authenticationProvider, userToken.getUserToken, {
15
- pathParams: { teamId: payload.teamId },
16
- headers: await headerBuilder.HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
17
- });
18
- };
19
+ }, [result.data]);
20
+ return result;
19
21
  }
20
- exports.refreshExpiredToken = refreshExpiredToken;
22
+ exports.useGetPromotedClassicSessionJwtQuery = useGetPromotedClassicSessionJwtQuery;
21
23
  //# sourceMappingURL=harmony23.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony23.cjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":["parseJwtTokenPayload","UnauthorizedError","sendByPayloadRoute","getUserToken","HeaderBuilder"],"mappings":";;;;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAUA,qCAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAIC,kBAAAA,kBAAkB;AAAA,IAAA;AAGtB,WAAAC,mBAAA,mBAAmB,wBAAwBC,wBAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAMC,cAAAA,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;;"}
1
+ {"version":3,"file":"harmony23.cjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":["getCsrfTokenFromCookie","useGetUserTokenQuery","getUserTokenKey","useRef","useEffect","NewJwtIssuedEvent"],"mappings":";;;;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAOA,iBAAAA,uBAAuB;AAE9B,QAAA,SAASC,0CAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAUC,qBAAAA,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuBC,MAAAA,OAAe;AAE5CC,QAAAA,UAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAIC,kBAAkB,kBAAA,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;;"}
@@ -1,21 +1,23 @@
1
- import { HeaderBuilder } from "./harmony19.mjs";
2
- import { parseJwtTokenPayload } from "./harmony16.mjs";
3
- import { UnauthorizedError } from "./harmony15.mjs";
4
- import { getUserToken } from "./harmony35.mjs";
5
- import { sendByPayloadRoute } from "@lokalise/frontend-http-client";
6
- function refreshExpiredToken(authenticationProvider) {
7
- return async ({ accessToken, refreshToken }) => {
8
- const payload = parseJwtTokenPayload(accessToken);
9
- if (!payload) {
10
- throw new UnauthorizedError();
1
+ import { useGetUserTokenQuery, getUserTokenKey } from "./harmony44.mjs";
2
+ import { useRef, useEffect } from "react";
3
+ import { NewJwtIssuedEvent } from "./harmony102.mjs";
4
+ import { getCsrfTokenFromCookie } from "./harmony17.mjs";
5
+ function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
6
+ const csrf = getCsrfTokenFromCookie();
7
+ const result = useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
8
+ queryKey: getUserTokenKey.teamKey(teamId),
9
+ enabled: csrf !== void 0
10
+ });
11
+ const activeAccessTokenRef = useRef();
12
+ useEffect(() => {
13
+ if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
14
+ window.dispatchEvent(new NewJwtIssuedEvent(result.data));
15
+ activeAccessTokenRef.current = result.data.accessToken;
11
16
  }
12
- return sendByPayloadRoute(authenticationProvider, getUserToken, {
13
- pathParams: { teamId: payload.teamId },
14
- headers: await HeaderBuilder.create().add("authorization", `Bearer ${refreshToken}`).resolve()
15
- });
16
- };
17
+ }, [result.data]);
18
+ return result;
17
19
  }
18
20
  export {
19
- refreshExpiredToken
21
+ useGetPromotedClassicSessionJwtQuery
20
22
  };
21
23
  //# sourceMappingURL=harmony23.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony23.mjs","sources":["../src/features/auth/frontend/services/refreshExpiredToken.ts"],"sourcesContent":["import { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport { parseJwtTokenPayload } from '@features/auth/core/utils/jwtTokenPayload'\nimport { UnauthorizedError } from '@features/auth/errors/UnauthorizedError'\nimport type { JwtToken } from '@features/publicApi/types/userTokenTypes'\nimport { getUserToken } from '@features/publicApi/userToken'\nimport { sendByPayloadRoute } from '@lokalise/frontend-http-client'\nimport type { Wretch } from 'wretch'\n\nexport function refreshExpiredToken<T>(authenticationProvider: Wretch<T>) {\n\treturn async ({ accessToken, refreshToken }: JwtToken) => {\n\t\tconst payload = parseJwtTokenPayload(accessToken)\n\n\t\tif (!payload) {\n\t\t\tthrow new UnauthorizedError()\n\t\t}\n\n\t\treturn sendByPayloadRoute(authenticationProvider, getUserToken, {\n\t\t\tpathParams: { teamId: payload.teamId },\n\t\t\theaders: await HeaderBuilder.create()\n\t\t\t\t.add('authorization', `Bearer ${refreshToken}`)\n\t\t\t\t.resolve(),\n\t\t})\n\t}\n}\n"],"names":[],"mappings":";;;;;AAQO,SAAS,oBAAuB,wBAAmC;AACzE,SAAO,OAAO,EAAE,aAAa,mBAA6B;AACnD,UAAA,UAAU,qBAAqB,WAAW;AAEhD,QAAI,CAAC,SAAS;AACb,YAAM,IAAI,kBAAkB;AAAA,IAAA;AAGtB,WAAA,mBAAmB,wBAAwB,cAAc;AAAA,MAC/D,YAAY,EAAE,QAAQ,QAAQ,OAAO;AAAA,MACrC,SAAS,MAAM,cAAc,OAAO,EAClC,IAAI,iBAAiB,UAAU,YAAY,EAAE,EAC7C,QAAQ;AAAA,IAAA,CACV;AAAA,EACF;AACD;"}
1
+ {"version":3,"file":"harmony23.mjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":[],"mappings":";;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAO,uBAAuB;AAE9B,QAAA,SAAS,qBAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAU,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuB,OAAe;AAE5C,YAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAI,kBAAkB,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;"}
@@ -1,23 +1,23 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const useGetUserTokenQuery = require("./harmony45.cjs");
4
3
  const React = require("react");
5
- const NewJwtIssuedEvent = require("./harmony20.cjs");
4
+ const jwtTokenPayload = require("./harmony16.cjs");
5
+ const NewJwtIssuedEvent = require("./harmony102.cjs");
6
6
  const cookieTokenUtils = require("./harmony17.cjs");
7
- function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
8
- const csrf = cookieTokenUtils.getCsrfTokenFromCookie();
9
- const result = useGetUserTokenQuery.useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
10
- queryKey: useGetUserTokenQuery.getUserTokenKey.teamKey(teamId),
11
- enabled: csrf !== void 0
12
- });
13
- const activeAccessTokenRef = React.useRef();
7
+ function useAuthenticatedSessionPayload() {
8
+ const [payload, setPayload] = React.useState();
14
9
  React.useEffect(() => {
15
- if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
16
- window.dispatchEvent(new NewJwtIssuedEvent.NewJwtIssuedEvent(result.data));
17
- activeAccessTokenRef.current = result.data.accessToken;
18
- }
19
- }, [result.data]);
20
- return result;
10
+ const listener = (event) => {
11
+ setPayload(event.detail.payload);
12
+ };
13
+ const token = cookieTokenUtils.getJwtTokenFromCookie();
14
+ setPayload(token ? jwtTokenPayload.parseJwtTokenPayload(token.accessToken) : void 0);
15
+ window.addEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
16
+ return () => {
17
+ window.removeEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
18
+ };
19
+ }, []);
20
+ return payload;
21
21
  }
22
- exports.useGetPromotedClassicSessionJwtQuery = useGetPromotedClassicSessionJwtQuery;
22
+ exports.useAuthenticatedSessionPayload = useAuthenticatedSessionPayload;
23
23
  //# sourceMappingURL=harmony24.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony24.cjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":["getCsrfTokenFromCookie","useGetUserTokenQuery","getUserTokenKey","useRef","useEffect","NewJwtIssuedEvent"],"mappings":";;;;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAOA,iBAAAA,uBAAuB;AAE9B,QAAA,SAASC,0CAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAUC,qBAAAA,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuBC,MAAAA,OAAe;AAE5CC,QAAAA,UAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAIC,kBAAkB,kBAAA,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;;"}
1
+ {"version":3,"file":"harmony24.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":["useState","useEffect","getJwtTokenFromCookie","parseJwtTokenPayload","NewJwtIssuedEvent"],"mappings":";;;;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAIA,eAA0B;AAExDC,QAAAA,UAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQC,iBAAAA,sBAAsB;AACpC,eAAW,QAAQC,gBAAA,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiBC,oCAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoBA,oCAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;;"}
@@ -1,23 +1,23 @@
1
- import { useGetUserTokenQuery, getUserTokenKey } from "./harmony45.mjs";
2
- import { useRef, useEffect } from "react";
3
- import { NewJwtIssuedEvent } from "./harmony20.mjs";
4
- import { getCsrfTokenFromCookie } from "./harmony17.mjs";
5
- function useGetPromotedClassicSessionJwtQuery(wretchClient, headers, teamId) {
6
- const csrf = getCsrfTokenFromCookie();
7
- const result = useGetUserTokenQuery(wretchClient, headers.add("x-csrf-token", csrf ?? ""), {
8
- queryKey: getUserTokenKey.teamKey(teamId),
9
- enabled: csrf !== void 0
10
- });
11
- const activeAccessTokenRef = useRef();
1
+ import { useState, useEffect } from "react";
2
+ import { parseJwtTokenPayload } from "./harmony16.mjs";
3
+ import { NewJwtIssuedEvent } from "./harmony102.mjs";
4
+ import { getJwtTokenFromCookie } from "./harmony17.mjs";
5
+ function useAuthenticatedSessionPayload() {
6
+ const [payload, setPayload] = useState();
12
7
  useEffect(() => {
13
- if (result.data && result.data.accessToken !== activeAccessTokenRef.current) {
14
- window.dispatchEvent(new NewJwtIssuedEvent(result.data));
15
- activeAccessTokenRef.current = result.data.accessToken;
16
- }
17
- }, [result.data]);
18
- return result;
8
+ const listener = (event) => {
9
+ setPayload(event.detail.payload);
10
+ };
11
+ const token = getJwtTokenFromCookie();
12
+ setPayload(token ? parseJwtTokenPayload(token.accessToken) : void 0);
13
+ window.addEventListener(NewJwtIssuedEvent.eventName, listener);
14
+ return () => {
15
+ window.removeEventListener(NewJwtIssuedEvent.eventName, listener);
16
+ };
17
+ }, []);
18
+ return payload;
19
19
  }
20
20
  export {
21
- useGetPromotedClassicSessionJwtQuery
21
+ useAuthenticatedSessionPayload
22
22
  };
23
23
  //# sourceMappingURL=harmony24.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony24.mjs","sources":["../src/features/auth/frontend/hooks/useGetPromotedClassicSessionJwtQuery.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetUserTokenKey,\n\tuseGetUserTokenQuery,\n} from '@features/publicApi/hooks/useGetUserTokenQuery'\nimport { useEffect, useRef } from 'react'\nimport type { Wretch } from 'wretch'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getCsrfTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * For use in environments that are authenticated with a classic CSRF PHP session (e.g. Expert).\n * This hook will send that token to the public API, upgrade to a JWT session.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to send with the request.\n * @param teamId - The team ID to get the JWT for.\n */\nexport function useGetPromotedClassicSessionJwtQuery<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder,\n\tteamId: number,\n) {\n\tconst csrf = getCsrfTokenFromCookie()\n\n\tconst result = useGetUserTokenQuery(wretchClient, headers.add('x-csrf-token', csrf ?? ''), {\n\t\tqueryKey: getUserTokenKey.teamKey(teamId),\n\t\tenabled: csrf !== undefined,\n\t})\n\n\tconst activeAccessTokenRef = useRef<string>()\n\n\tuseEffect(() => {\n\t\tif (result.data && result.data.accessToken !== activeAccessTokenRef.current) {\n\t\t\twindow.dispatchEvent(new NewJwtIssuedEvent(result.data))\n\t\t\tactiveAccessTokenRef.current = result.data.accessToken\n\t\t}\n\t}, [result.data])\n\n\treturn result\n}\n"],"names":[],"mappings":";;;;AAkBgB,SAAA,qCACf,cACA,SACA,QACC;AACD,QAAM,OAAO,uBAAuB;AAE9B,QAAA,SAAS,qBAAqB,cAAc,QAAQ,IAAI,gBAAgB,QAAQ,EAAE,GAAG;AAAA,IAC1F,UAAU,gBAAgB,QAAQ,MAAM;AAAA,IACxC,SAAS,SAAS;AAAA,EAAA,CAClB;AAED,QAAM,uBAAuB,OAAe;AAE5C,YAAU,MAAM;AACf,QAAI,OAAO,QAAQ,OAAO,KAAK,gBAAgB,qBAAqB,SAAS;AAC5E,aAAO,cAAc,IAAI,kBAAkB,OAAO,IAAI,CAAC;AAClC,2BAAA,UAAU,OAAO,KAAK;AAAA,IAAA;AAAA,EAC5C,GACE,CAAC,OAAO,IAAI,CAAC;AAET,SAAA;AACR;"}
1
+ {"version":3,"file":"harmony24.mjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":[],"mappings":";;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAI,SAA0B;AAExD,YAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQ,sBAAsB;AACpC,eAAW,QAAQ,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiB,kBAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoB,kBAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;"}
@@ -1,23 +1,13 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const React = require("react");
4
- const jwtTokenPayload = require("./harmony16.cjs");
5
- const NewJwtIssuedEvent = require("./harmony20.cjs");
6
- const cookieTokenUtils = require("./harmony17.cjs");
7
- function useAuthenticatedSessionPayload() {
8
- const [payload, setPayload] = React.useState();
9
- React.useEffect(() => {
10
- const listener = (event) => {
11
- setPayload(event.detail.payload);
12
- };
13
- const token = cookieTokenUtils.getJwtTokenFromCookie();
14
- setPayload(token ? jwtTokenPayload.parseJwtTokenPayload(token.accessToken) : void 0);
15
- window.addEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
16
- return () => {
17
- window.removeEventListener(NewJwtIssuedEvent.NewJwtIssuedEvent.eventName, listener);
18
- };
19
- }, []);
20
- return payload;
3
+ const useGetTeamUsersQuery = require("./harmony43.cjs");
4
+ const useAuthenticatedSessionPayload = require("./harmony24.cjs");
5
+ function useAuthenticatedUser(wretchClient, headers) {
6
+ const payload = useAuthenticatedSessionPayload.useAuthenticatedSessionPayload();
7
+ return useGetTeamUsersQuery.useGetTeamUsersQuery(wretchClient, headers, {
8
+ queryKey: useGetTeamUsersQuery.getTeamUsersQueryKey.teamUserKey((payload == null ? void 0 : payload.teamId) ?? 0, (payload == null ? void 0 : payload.userId) ?? 0),
9
+ enabled: (payload == null ? void 0 : payload.userId) !== void 0 && payload.teamId !== void 0
10
+ });
21
11
  }
22
- exports.useAuthenticatedSessionPayload = useAuthenticatedSessionPayload;
12
+ exports.useAuthenticatedUser = useAuthenticatedUser;
23
13
  //# sourceMappingURL=harmony25.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony25.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":["useState","useEffect","getJwtTokenFromCookie","parseJwtTokenPayload","NewJwtIssuedEvent"],"mappings":";;;;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAIA,eAA0B;AAExDC,QAAAA,UAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQC,iBAAAA,sBAAsB;AACpC,eAAW,QAAQC,gBAAA,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiBC,oCAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoBA,oCAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;;"}
1
+ {"version":3,"file":"harmony25.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedUser.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetTeamUsersQueryKey,\n\tuseGetTeamUsersQuery,\n} from '@features/publicApi/hooks/useGetTeamUsersQuery'\nimport type { TeamUserApiBaseHeaders } from '@features/publicApi/types/teamUserTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the team-user information for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - Headers to be attached to the request.\n */\nexport function useAuthenticatedUser<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<TeamUserApiBaseHeaders>,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\treturn useGetTeamUsersQuery(wretchClient, headers, {\n\t\tqueryKey: getTeamUsersQueryKey.teamUserKey(payload?.teamId ?? 0, payload?.userId ?? 0),\n\t\tenabled: payload?.userId !== undefined && payload.teamId !== undefined,\n\t})\n}\n"],"names":["useAuthenticatedSessionPayload","useGetTeamUsersQuery","getTeamUsersQueryKey"],"mappings":";;;;AAgBgB,SAAA,qBACf,cACA,SACC;AACD,QAAM,UAAUA,+BAAAA,+BAA+B;AAExC,SAAAC,qBAAA,qBAAqB,cAAc,SAAS;AAAA,IAClD,UAAUC,qBAAAA,qBAAqB,aAAY,mCAAS,WAAU,IAAG,mCAAS,WAAU,CAAC;AAAA,IACrF,UAAS,mCAAS,YAAW,UAAa,QAAQ,WAAW;AAAA,EAAA,CAC7D;AACF;;"}
@@ -1,23 +1,13 @@
1
- import { useState, useEffect } from "react";
2
- import { parseJwtTokenPayload } from "./harmony16.mjs";
3
- import { NewJwtIssuedEvent } from "./harmony20.mjs";
4
- import { getJwtTokenFromCookie } from "./harmony17.mjs";
5
- function useAuthenticatedSessionPayload() {
6
- const [payload, setPayload] = useState();
7
- useEffect(() => {
8
- const listener = (event) => {
9
- setPayload(event.detail.payload);
10
- };
11
- const token = getJwtTokenFromCookie();
12
- setPayload(token ? parseJwtTokenPayload(token.accessToken) : void 0);
13
- window.addEventListener(NewJwtIssuedEvent.eventName, listener);
14
- return () => {
15
- window.removeEventListener(NewJwtIssuedEvent.eventName, listener);
16
- };
17
- }, []);
18
- return payload;
1
+ import { useGetTeamUsersQuery, getTeamUsersQueryKey } from "./harmony43.mjs";
2
+ import { useAuthenticatedSessionPayload } from "./harmony24.mjs";
3
+ function useAuthenticatedUser(wretchClient, headers) {
4
+ const payload = useAuthenticatedSessionPayload();
5
+ return useGetTeamUsersQuery(wretchClient, headers, {
6
+ queryKey: getTeamUsersQueryKey.teamUserKey((payload == null ? void 0 : payload.teamId) ?? 0, (payload == null ? void 0 : payload.userId) ?? 0),
7
+ enabled: (payload == null ? void 0 : payload.userId) !== void 0 && payload.teamId !== void 0
8
+ });
19
9
  }
20
10
  export {
21
- useAuthenticatedSessionPayload
11
+ useAuthenticatedUser
22
12
  };
23
13
  //# sourceMappingURL=harmony25.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony25.mjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedSessionPayload.ts"],"sourcesContent":["import { useEffect, useState } from 'react'\nimport type { JwtTokenPayload } from '../../core/types/jwtTokenPayload'\nimport { parseJwtTokenPayload } from '../../core/utils/jwtTokenPayload'\nimport { NewJwtIssuedEvent } from '../events/NewJwtIssuedEvent'\nimport { getJwtTokenFromCookie } from '../utils/cookieTokenUtils'\n\n/**\n * A hook that will bring the cached JWT token into the React lifecycle.\n * If the token is updated or removed, the hook will update the state.\n */\nexport function useAuthenticatedSessionPayload() {\n\tconst [payload, setPayload] = useState<JwtTokenPayload>()\n\n\tuseEffect(() => {\n\t\tconst listener = (event: NewJwtIssuedEvent) => {\n\t\t\tsetPayload(event.detail.payload)\n\t\t}\n\n\t\tconst token = getJwtTokenFromCookie()\n\t\tsetPayload(token ? parseJwtTokenPayload(token.accessToken) : undefined)\n\n\t\twindow.addEventListener(NewJwtIssuedEvent.eventName, listener)\n\n\t\treturn () => {\n\t\t\twindow.removeEventListener(NewJwtIssuedEvent.eventName, listener)\n\t\t}\n\t}, [])\n\n\treturn payload\n}\n"],"names":[],"mappings":";;;;AAUO,SAAS,iCAAiC;AAChD,QAAM,CAAC,SAAS,UAAU,IAAI,SAA0B;AAExD,YAAU,MAAM;AACT,UAAA,WAAW,CAAC,UAA6B;AACnC,iBAAA,MAAM,OAAO,OAAO;AAAA,IAChC;AAEA,UAAM,QAAQ,sBAAsB;AACpC,eAAW,QAAQ,qBAAqB,MAAM,WAAW,IAAI,MAAS;AAE/D,WAAA,iBAAiB,kBAAkB,WAAW,QAAQ;AAE7D,WAAO,MAAM;AACL,aAAA,oBAAoB,kBAAkB,WAAW,QAAQ;AAAA,IACjE;AAAA,EACD,GAAG,EAAE;AAEE,SAAA;AACR;"}
1
+ {"version":3,"file":"harmony25.mjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedUser.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetTeamUsersQueryKey,\n\tuseGetTeamUsersQuery,\n} from '@features/publicApi/hooks/useGetTeamUsersQuery'\nimport type { TeamUserApiBaseHeaders } from '@features/publicApi/types/teamUserTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the team-user information for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - Headers to be attached to the request.\n */\nexport function useAuthenticatedUser<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<TeamUserApiBaseHeaders>,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\treturn useGetTeamUsersQuery(wretchClient, headers, {\n\t\tqueryKey: getTeamUsersQueryKey.teamUserKey(payload?.teamId ?? 0, payload?.userId ?? 0),\n\t\tenabled: payload?.userId !== undefined && payload.teamId !== undefined,\n\t})\n}\n"],"names":[],"mappings":";;AAgBgB,SAAA,qBACf,cACA,SACC;AACD,QAAM,UAAU,+BAA+B;AAExC,SAAA,qBAAqB,cAAc,SAAS;AAAA,IAClD,UAAU,qBAAqB,aAAY,mCAAS,WAAU,IAAG,mCAAS,WAAU,CAAC;AAAA,IACrF,UAAS,mCAAS,YAAW,UAAa,QAAQ,WAAW;AAAA,EAAA,CAC7D;AACF;"}
@@ -1,13 +1,14 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const useGetTeamUsersQuery = require("./harmony44.cjs");
4
- const useAuthenticatedSessionPayload = require("./harmony25.cjs");
5
- function useAuthenticatedUser(wretchClient, headers) {
3
+ const useRetrieveContributorQuery = require("./harmony51.cjs");
4
+ const useAuthenticatedSessionPayload = require("./harmony24.cjs");
5
+ function useAuthenticatedProjectContributor(wretchClient, headers, projectId) {
6
6
  const payload = useAuthenticatedSessionPayload.useAuthenticatedSessionPayload();
7
- return useGetTeamUsersQuery.useGetTeamUsersQuery(wretchClient, headers, {
8
- queryKey: useGetTeamUsersQuery.getTeamUsersQueryKey.teamUserKey((payload == null ? void 0 : payload.teamId) ?? 0, (payload == null ? void 0 : payload.userId) ?? 0),
9
- enabled: (payload == null ? void 0 : payload.userId) !== void 0 && payload.teamId !== void 0
7
+ const contributor = (payload == null ? void 0 : payload.userId) ? { id: payload.userId } : { authenticatedUser: true };
8
+ return useRetrieveContributorQuery.useRetrieveContributorQuery(wretchClient, headers, {
9
+ queryKey: useRetrieveContributorQuery.retrieveContributorKeys.projectUserKey({ project: { id: projectId }, contributor }),
10
+ enabled: payload !== void 0
10
11
  });
11
12
  }
12
- exports.useAuthenticatedUser = useAuthenticatedUser;
13
+ exports.useAuthenticatedProjectContributor = useAuthenticatedProjectContributor;
13
14
  //# sourceMappingURL=harmony26.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony26.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedUser.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetTeamUsersQueryKey,\n\tuseGetTeamUsersQuery,\n} from '@features/publicApi/hooks/useGetTeamUsersQuery'\nimport type { TeamUserApiBaseHeaders } from '@features/publicApi/types/teamUserTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the team-user information for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - Headers to be attached to the request.\n */\nexport function useAuthenticatedUser<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<TeamUserApiBaseHeaders>,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\treturn useGetTeamUsersQuery(wretchClient, headers, {\n\t\tqueryKey: getTeamUsersQueryKey.teamUserKey(payload?.teamId ?? 0, payload?.userId ?? 0),\n\t\tenabled: payload?.userId !== undefined && payload.teamId !== undefined,\n\t})\n}\n"],"names":["useAuthenticatedSessionPayload","useGetTeamUsersQuery","getTeamUsersQueryKey"],"mappings":";;;;AAgBgB,SAAA,qBACf,cACA,SACC;AACD,QAAM,UAAUA,+BAAAA,+BAA+B;AAExC,SAAAC,qBAAA,qBAAqB,cAAc,SAAS;AAAA,IAClD,UAAUC,qBAAAA,qBAAqB,aAAY,mCAAS,WAAU,IAAG,mCAAS,WAAU,CAAC;AAAA,IACrF,UAAS,mCAAS,YAAW,UAAa,QAAQ,WAAW;AAAA,EAAA,CAC7D;AACF;;"}
1
+ {"version":3,"file":"harmony26.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedProjectContributor.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tretrieveContributorKeys,\n\tuseRetrieveContributorQuery,\n} from '@features/publicApi/hooks/useRetrieveContributorQuery'\nimport type {\n\tContributorApiBaseHeader,\n\tRetrieveContributorPathParams,\n} from '@features/publicApi/types/contributorTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the contributor information\n * of the provided project for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to attach to the request.\n * @param projectId - The ID of the project to retrieve the contributor information.\n */\nexport function useAuthenticatedProjectContributor<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<ContributorApiBaseHeader>,\n\tprojectId: string,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\tconst contributor: RetrieveContributorPathParams['contributor'] = payload?.userId\n\t\t? { id: payload.userId }\n\t\t: { authenticatedUser: true }\n\n\treturn useRetrieveContributorQuery(wretchClient, headers, {\n\t\tqueryKey: retrieveContributorKeys.projectUserKey({ project: { id: projectId }, contributor }),\n\t\tenabled: payload !== undefined,\n\t})\n}\n"],"names":["useAuthenticatedSessionPayload","useRetrieveContributorQuery","retrieveContributorKeys"],"mappings":";;;;AAqBgB,SAAA,mCACf,cACA,SACA,WACC;AACD,QAAM,UAAUA,+BAAAA,+BAA+B;AAEzC,QAAA,eAA4D,mCAAS,UACxE,EAAE,IAAI,QAAQ,OAAO,IACrB,EAAE,mBAAmB,KAAK;AAEtB,SAAAC,4BAAA,4BAA4B,cAAc,SAAS;AAAA,IACzD,UAAUC,4BAAAA,wBAAwB,eAAe,EAAE,SAAS,EAAE,IAAI,aAAa,aAAa;AAAA,IAC5F,SAAS,YAAY;AAAA,EAAA,CACrB;AACF;;"}
@@ -1,13 +1,14 @@
1
- import { useGetTeamUsersQuery, getTeamUsersQueryKey } from "./harmony44.mjs";
2
- import { useAuthenticatedSessionPayload } from "./harmony25.mjs";
3
- function useAuthenticatedUser(wretchClient, headers) {
1
+ import { useRetrieveContributorQuery, retrieveContributorKeys } from "./harmony51.mjs";
2
+ import { useAuthenticatedSessionPayload } from "./harmony24.mjs";
3
+ function useAuthenticatedProjectContributor(wretchClient, headers, projectId) {
4
4
  const payload = useAuthenticatedSessionPayload();
5
- return useGetTeamUsersQuery(wretchClient, headers, {
6
- queryKey: getTeamUsersQueryKey.teamUserKey((payload == null ? void 0 : payload.teamId) ?? 0, (payload == null ? void 0 : payload.userId) ?? 0),
7
- enabled: (payload == null ? void 0 : payload.userId) !== void 0 && payload.teamId !== void 0
5
+ const contributor = (payload == null ? void 0 : payload.userId) ? { id: payload.userId } : { authenticatedUser: true };
6
+ return useRetrieveContributorQuery(wretchClient, headers, {
7
+ queryKey: retrieveContributorKeys.projectUserKey({ project: { id: projectId }, contributor }),
8
+ enabled: payload !== void 0
8
9
  });
9
10
  }
10
11
  export {
11
- useAuthenticatedUser
12
+ useAuthenticatedProjectContributor
12
13
  };
13
14
  //# sourceMappingURL=harmony26.mjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony26.mjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedUser.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tgetTeamUsersQueryKey,\n\tuseGetTeamUsersQuery,\n} from '@features/publicApi/hooks/useGetTeamUsersQuery'\nimport type { TeamUserApiBaseHeaders } from '@features/publicApi/types/teamUserTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the team-user information for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - Headers to be attached to the request.\n */\nexport function useAuthenticatedUser<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<TeamUserApiBaseHeaders>,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\treturn useGetTeamUsersQuery(wretchClient, headers, {\n\t\tqueryKey: getTeamUsersQueryKey.teamUserKey(payload?.teamId ?? 0, payload?.userId ?? 0),\n\t\tenabled: payload?.userId !== undefined && payload.teamId !== undefined,\n\t})\n}\n"],"names":[],"mappings":";;AAgBgB,SAAA,qBACf,cACA,SACC;AACD,QAAM,UAAU,+BAA+B;AAExC,SAAA,qBAAqB,cAAc,SAAS;AAAA,IAClD,UAAU,qBAAqB,aAAY,mCAAS,WAAU,IAAG,mCAAS,WAAU,CAAC;AAAA,IACrF,UAAS,mCAAS,YAAW,UAAa,QAAQ,WAAW;AAAA,EAAA,CAC7D;AACF;"}
1
+ {"version":3,"file":"harmony26.mjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedProjectContributor.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tretrieveContributorKeys,\n\tuseRetrieveContributorQuery,\n} from '@features/publicApi/hooks/useRetrieveContributorQuery'\nimport type {\n\tContributorApiBaseHeader,\n\tRetrieveContributorPathParams,\n} from '@features/publicApi/types/contributorTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the contributor information\n * of the provided project for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to attach to the request.\n * @param projectId - The ID of the project to retrieve the contributor information.\n */\nexport function useAuthenticatedProjectContributor<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<ContributorApiBaseHeader>,\n\tprojectId: string,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\tconst contributor: RetrieveContributorPathParams['contributor'] = payload?.userId\n\t\t? { id: payload.userId }\n\t\t: { authenticatedUser: true }\n\n\treturn useRetrieveContributorQuery(wretchClient, headers, {\n\t\tqueryKey: retrieveContributorKeys.projectUserKey({ project: { id: projectId }, contributor }),\n\t\tenabled: payload !== undefined,\n\t})\n}\n"],"names":[],"mappings":";;AAqBgB,SAAA,mCACf,cACA,SACA,WACC;AACD,QAAM,UAAU,+BAA+B;AAEzC,QAAA,eAA4D,mCAAS,UACxE,EAAE,IAAI,QAAQ,OAAO,IACrB,EAAE,mBAAmB,KAAK;AAEtB,SAAA,4BAA4B,cAAc,SAAS;AAAA,IACzD,UAAU,wBAAwB,eAAe,EAAE,SAAS,EAAE,IAAI,aAAa,aAAa;AAAA,IAC5F,SAAS,YAAY;AAAA,EAAA,CACrB;AACF;"}
@@ -1,14 +1,30 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, Symbol.toStringTag, { value: "Module" });
3
- const useRetrieveContributorQuery = require("./harmony51.cjs");
4
- const useAuthenticatedSessionPayload = require("./harmony25.cjs");
5
- function useAuthenticatedProjectContributor(wretchClient, headers, projectId) {
6
- const payload = useAuthenticatedSessionPayload.useAuthenticatedSessionPayload();
7
- const contributor = (payload == null ? void 0 : payload.userId) ? { id: payload.userId } : { authenticatedUser: true };
8
- return useRetrieveContributorQuery.useRetrieveContributorQuery(wretchClient, headers, {
9
- queryKey: useRetrieveContributorQuery.retrieveContributorKeys.projectUserKey({ project: { id: projectId }, contributor }),
10
- enabled: payload !== void 0
11
- });
12
- }
13
- exports.useAuthenticatedProjectContributor = useAuthenticatedProjectContributor;
3
+ const contributorTypes = require("./harmony55.cjs");
4
+ const sharedTypes = require("./harmony62.cjs");
5
+ const apiContracts = require("@lokalise/api-contracts");
6
+ const resolveContributorTargetPath = (contributor) => {
7
+ if ("authenticatedUser" in contributor) return "me";
8
+ if ("uuid" in contributor) return contributor.uuid;
9
+ return `${contributor.id}`;
10
+ };
11
+ const resolveProjectTargetPath = (project) => {
12
+ return "uuid" in project ? project.uuid : project.id;
13
+ };
14
+ const listContributors = apiContracts.buildGetRoute({
15
+ description: "List all contributors for a project",
16
+ requestHeaderSchema: sharedTypes.BASE_API_ENDPOINT_HEADER_SCHEMA,
17
+ requestPathParamsSchema: contributorTypes.LIST_CONTRIBUTORS_PATH_PARAMS_SCHEMA,
18
+ pathResolver: ({ project }) => `/projects/${resolveProjectTargetPath(project)}/contributors`,
19
+ successResponseBodySchema: contributorTypes.LIST_CONTRIBUTORS_RESPONSE_SCHEMA
20
+ });
21
+ const retrieveContributor = apiContracts.buildGetRoute({
22
+ description: "Get the details of a project contributor",
23
+ requestHeaderSchema: sharedTypes.BASE_API_ENDPOINT_HEADER_SCHEMA,
24
+ requestPathParamsSchema: contributorTypes.RETRIEVE_CONTRIBUTOR_PATH_PARAMS_SCHEMA,
25
+ pathResolver: ({ project, contributor }) => `/projects/${resolveProjectTargetPath(project)}/contributors/${resolveContributorTargetPath(contributor)}`,
26
+ successResponseBodySchema: contributorTypes.RETRIEVE_CONTRIBUTOR_RESPONSE_SCHEMA
27
+ });
28
+ exports.listContributors = listContributors;
29
+ exports.retrieveContributor = retrieveContributor;
14
30
  //# sourceMappingURL=harmony27.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"harmony27.cjs","sources":["../src/features/auth/frontend/hooks/useAuthenticatedProjectContributor.ts"],"sourcesContent":["import type { HeaderBuilder } from '@features/auth/core/headers/headerBuilder'\nimport {\n\tretrieveContributorKeys,\n\tuseRetrieveContributorQuery,\n} from '@features/publicApi/hooks/useRetrieveContributorQuery'\nimport type {\n\tContributorApiBaseHeader,\n\tRetrieveContributorPathParams,\n} from '@features/publicApi/types/contributorTypes'\nimport type { Wretch } from 'wretch'\nimport { useAuthenticatedSessionPayload } from './useAuthenticatedSessionPayload'\n\n/**\n * Uses the payload attached to the JWT to request the contributor information\n * of the provided project for the authenticated user.\n * This required an active JWT token to be present in the cookie.\n *\n * @param wretchClient - Wretch instance configured to a public API instance.\n * @param headers - The headers to attach to the request.\n * @param projectId - The ID of the project to retrieve the contributor information.\n */\nexport function useAuthenticatedProjectContributor<T>(\n\twretchClient: Wretch<T>,\n\theaders: HeaderBuilder<ContributorApiBaseHeader>,\n\tprojectId: string,\n) {\n\tconst payload = useAuthenticatedSessionPayload()\n\n\tconst contributor: RetrieveContributorPathParams['contributor'] = payload?.userId\n\t\t? { id: payload.userId }\n\t\t: { authenticatedUser: true }\n\n\treturn useRetrieveContributorQuery(wretchClient, headers, {\n\t\tqueryKey: retrieveContributorKeys.projectUserKey({ project: { id: projectId }, contributor }),\n\t\tenabled: payload !== undefined,\n\t})\n}\n"],"names":["useAuthenticatedSessionPayload","useRetrieveContributorQuery","retrieveContributorKeys"],"mappings":";;;;AAqBgB,SAAA,mCACf,cACA,SACA,WACC;AACD,QAAM,UAAUA,+BAAAA,+BAA+B;AAEzC,QAAA,eAA4D,mCAAS,UACxE,EAAE,IAAI,QAAQ,OAAO,IACrB,EAAE,mBAAmB,KAAK;AAEtB,SAAAC,4BAAA,4BAA4B,cAAc,SAAS;AAAA,IACzD,UAAUC,4BAAAA,wBAAwB,eAAe,EAAE,SAAS,EAAE,IAAI,aAAa,aAAa;AAAA,IAC5F,SAAS,YAAY;AAAA,EAAA,CACrB;AACF;;"}
1
+ {"version":3,"file":"harmony27.cjs","sources":["../src/features/publicApi/contributors.ts"],"sourcesContent":["import {\n\ttype ContributorTargetPathParams,\n\tLIST_CONTRIBUTORS_PATH_PARAMS_SCHEMA,\n\tLIST_CONTRIBUTORS_RESPONSE_SCHEMA,\n\ttype ProjectTarget,\n\tRETRIEVE_CONTRIBUTOR_PATH_PARAMS_SCHEMA,\n\tRETRIEVE_CONTRIBUTOR_RESPONSE_SCHEMA,\n} from '@features/publicApi/types/contributorTypes'\nimport { BASE_API_ENDPOINT_HEADER_SCHEMA } from '@features/publicApi/types/sharedTypes'\nimport { buildGetRoute } from '@lokalise/api-contracts'\n\nconst resolveContributorTargetPath = (contributor: ContributorTargetPathParams) => {\n\tif ('authenticatedUser' in contributor) return 'me'\n\tif ('uuid' in contributor) return contributor.uuid\n\treturn `${contributor.id}`\n}\n\nconst resolveProjectTargetPath = (project: ProjectTarget) => {\n\treturn 'uuid' in project ? project.uuid : project.id\n}\n\n/**\n * Public API router definition for retrieving a list of contributors\n */\nexport const listContributors = buildGetRoute({\n\tdescription: 'List all contributors for a project',\n\n\trequestHeaderSchema: BASE_API_ENDPOINT_HEADER_SCHEMA,\n\n\trequestPathParamsSchema: LIST_CONTRIBUTORS_PATH_PARAMS_SCHEMA,\n\tpathResolver: ({ project }) => `/projects/${resolveProjectTargetPath(project)}/contributors`,\n\n\tsuccessResponseBodySchema: LIST_CONTRIBUTORS_RESPONSE_SCHEMA,\n})\n\n/**\n * Public API router definition for retrieving a project contributor\n */\nexport const retrieveContributor = buildGetRoute({\n\tdescription: 'Get the details of a project contributor',\n\n\trequestHeaderSchema: BASE_API_ENDPOINT_HEADER_SCHEMA,\n\n\trequestPathParamsSchema: RETRIEVE_CONTRIBUTOR_PATH_PARAMS_SCHEMA,\n\tpathResolver: ({ project, contributor }) =>\n\t\t`/projects/${resolveProjectTargetPath(project)}/contributors/${resolveContributorTargetPath(contributor)}`,\n\n\tsuccessResponseBodySchema: RETRIEVE_CONTRIBUTOR_RESPONSE_SCHEMA,\n})\n"],"names":["buildGetRoute","BASE_API_ENDPOINT_HEADER_SCHEMA","LIST_CONTRIBUTORS_PATH_PARAMS_SCHEMA","LIST_CONTRIBUTORS_RESPONSE_SCHEMA","RETRIEVE_CONTRIBUTOR_PATH_PARAMS_SCHEMA","RETRIEVE_CONTRIBUTOR_RESPONSE_SCHEMA"],"mappings":";;;;;AAWA,MAAM,+BAA+B,CAAC,gBAA6C;AAC9E,MAAA,uBAAuB,YAAoB,QAAA;AAC3C,MAAA,UAAU,YAAa,QAAO,YAAY;AACvC,SAAA,GAAG,YAAY,EAAE;AACzB;AAEA,MAAM,2BAA2B,CAAC,YAA2B;AAC5D,SAAO,UAAU,UAAU,QAAQ,OAAO,QAAQ;AACnD;AAKO,MAAM,mBAAmBA,aAAAA,cAAc;AAAA,EAC7C,aAAa;AAAA,EAEb,qBAAqBC,YAAA;AAAA,EAErB,yBAAyBC,iBAAA;AAAA,EACzB,cAAc,CAAC,EAAE,cAAc,aAAa,yBAAyB,OAAO,CAAC;AAAA,EAE7E,2BAA2BC,iBAAAA;AAC5B,CAAC;AAKM,MAAM,sBAAsBH,aAAAA,cAAc;AAAA,EAChD,aAAa;AAAA,EAEb,qBAAqBC,YAAA;AAAA,EAErB,yBAAyBG,iBAAA;AAAA,EACzB,cAAc,CAAC,EAAE,SAAS,YAAY,MACrC,aAAa,yBAAyB,OAAO,CAAC,iBAAiB,6BAA6B,WAAW,CAAC;AAAA,EAEzG,2BAA2BC,iBAAAA;AAC5B,CAAC;;;"}