@nhost/nhost-js 3.2.8 → 5.0.0-beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (108) hide show
  1. package/LICENSE +1 -1
  2. package/README.md +67 -37
  3. package/dist/nhost-js/auth.cjs.js +2 -0
  4. package/dist/nhost-js/auth.cjs.js.map +1 -0
  5. package/dist/nhost-js/auth.es.js +261 -0
  6. package/dist/nhost-js/auth.es.js.map +1 -0
  7. package/dist/nhost-js/fetch.cjs.js +2 -0
  8. package/dist/nhost-js/fetch.cjs.js.map +1 -0
  9. package/dist/nhost-js/fetch.es.js +10 -0
  10. package/dist/nhost-js/fetch.es.js.map +1 -0
  11. package/dist/nhost-js/graphql.cjs.js +2 -0
  12. package/dist/nhost-js/graphql.cjs.js.map +1 -0
  13. package/dist/nhost-js/graphql.es.js +35 -0
  14. package/dist/nhost-js/graphql.es.js.map +1 -0
  15. package/dist/nhost-js/storage.cjs.js +2 -0
  16. package/dist/nhost-js/storage.cjs.js.map +1 -0
  17. package/dist/nhost-js/storage.es.js +205 -0
  18. package/dist/nhost-js/storage.es.js.map +1 -0
  19. package/dist/nhost-js.cjs.js +2 -0
  20. package/dist/nhost-js.cjs.js.map +1 -0
  21. package/dist/nhost-js.es.js +476 -0
  22. package/dist/nhost-js.es.js.map +1 -0
  23. package/dist/nhost-js.umd.js +2 -0
  24. package/dist/nhost-js.umd.js.map +1 -0
  25. package/dist/src/auth/client.d.ts +415 -0
  26. package/dist/src/auth/client.d.ts.map +1 -0
  27. package/dist/src/auth/client.js +330 -0
  28. package/dist/src/auth/client.js.map +1 -0
  29. package/dist/src/auth/index.d.ts +11 -0
  30. package/dist/src/auth/index.d.ts.map +1 -0
  31. package/dist/src/auth/index.js +11 -0
  32. package/dist/src/auth/index.js.map +1 -0
  33. package/dist/src/auth/interface.d.ts +72 -0
  34. package/dist/src/auth/interface.d.ts.map +1 -0
  35. package/dist/src/auth/interface.js +2 -0
  36. package/dist/src/auth/interface.js.map +1 -0
  37. package/dist/src/fetch/index.d.ts +53 -0
  38. package/dist/src/fetch/index.d.ts.map +1 -0
  39. package/dist/src/fetch/index.js +40 -0
  40. package/dist/src/fetch/index.js.map +1 -0
  41. package/dist/src/graphql/client.d.ts +89 -0
  42. package/dist/src/graphql/client.d.ts.map +1 -0
  43. package/dist/src/graphql/client.js +49 -0
  44. package/dist/src/graphql/client.js.map +1 -0
  45. package/dist/src/graphql/index.d.ts +10 -0
  46. package/dist/src/graphql/index.d.ts.map +1 -0
  47. package/dist/src/graphql/index.js +10 -0
  48. package/dist/src/graphql/index.js.map +1 -0
  49. package/dist/src/index.d.ts +169 -0
  50. package/dist/src/index.d.ts.map +1 -0
  51. package/dist/src/index.js +237 -0
  52. package/dist/src/index.js.map +1 -0
  53. package/dist/src/middlewareAttachToken.d.ts +24 -0
  54. package/dist/src/middlewareAttachToken.d.ts.map +1 -0
  55. package/dist/src/middlewareAttachToken.js +60 -0
  56. package/dist/src/middlewareAttachToken.js.map +1 -0
  57. package/dist/src/middlewareRefreshSession.d.ts +43 -0
  58. package/dist/src/middlewareRefreshSession.d.ts.map +1 -0
  59. package/dist/src/middlewareRefreshSession.js +190 -0
  60. package/dist/src/middlewareRefreshSession.js.map +1 -0
  61. package/dist/src/middlewareResponseSession.d.ts +26 -0
  62. package/dist/src/middlewareResponseSession.d.ts.map +1 -0
  63. package/dist/src/middlewareResponseSession.js +83 -0
  64. package/dist/src/middlewareResponseSession.js.map +1 -0
  65. package/dist/src/sessionStorage.d.ts +123 -0
  66. package/dist/src/sessionStorage.d.ts.map +1 -0
  67. package/dist/src/sessionStorage.js +165 -0
  68. package/dist/src/sessionStorage.js.map +1 -0
  69. package/dist/src/storage/client.d.ts +184 -0
  70. package/dist/src/storage/client.d.ts.map +1 -0
  71. package/dist/src/storage/client.js +249 -0
  72. package/dist/src/storage/client.js.map +1 -0
  73. package/dist/src/storage/index.d.ts +11 -0
  74. package/dist/src/storage/index.d.ts.map +1 -0
  75. package/dist/src/storage/index.js +11 -0
  76. package/dist/src/storage/index.js.map +1 -0
  77. package/dist/src/storage/interface.d.ts +52 -0
  78. package/dist/src/storage/interface.d.ts.map +1 -0
  79. package/dist/src/storage/interface.js +2 -0
  80. package/dist/src/storage/interface.js.map +1 -0
  81. package/dist/tsconfig.tsbuildinfo +1 -0
  82. package/package.json +94 -60
  83. package/dist/clients/auth.d.ts +0 -8
  84. package/dist/clients/auth.d.ts.map +0 -1
  85. package/dist/clients/functions/index.d.ts +0 -107
  86. package/dist/clients/functions/index.d.ts.map +0 -1
  87. package/dist/clients/functions/types.d.ts +0 -28
  88. package/dist/clients/functions/types.d.ts.map +0 -1
  89. package/dist/clients/graphql.d.ts +0 -8
  90. package/dist/clients/graphql.d.ts.map +0 -1
  91. package/dist/clients/index.d.ts +0 -6
  92. package/dist/clients/index.d.ts.map +0 -1
  93. package/dist/clients/nhost.d.ts +0 -83
  94. package/dist/clients/nhost.d.ts.map +0 -1
  95. package/dist/clients/storage.d.ts +0 -8
  96. package/dist/clients/storage.d.ts.map +0 -1
  97. package/dist/index.cjs.js +0 -2
  98. package/dist/index.cjs.js.map +0 -1
  99. package/dist/index.d.ts +0 -6
  100. package/dist/index.d.ts.map +0 -1
  101. package/dist/index.esm.js +0 -344
  102. package/dist/index.esm.js.map +0 -1
  103. package/dist/utils/helpers.d.ts +0 -20
  104. package/dist/utils/helpers.d.ts.map +0 -1
  105. package/dist/utils/types.d.ts +0 -57
  106. package/dist/utils/types.d.ts.map +0 -1
  107. package/umd/nhost-js.umd.js +0 -22
  108. package/umd/nhost-js.umd.js.map +0 -1
package/LICENSE CHANGED
@@ -1,6 +1,6 @@
1
1
  MIT License
2
2
 
3
- Copyright (c) 2021 Nhost
3
+ Copyright (c) 2025 Nhost
4
4
 
5
5
  Permission is hereby granted, free of charge, to any person obtaining a copy
6
6
  of this software and associated documentation files (the "Software"), to deal
package/README.md CHANGED
@@ -1,52 +1,82 @@
1
- <h1 align="center">@nhost/nhost-js</h1>
2
- <h2 align="center">Nhost JavaScript SDK</h2>
1
+ # Nhost JavaScript SDK
3
2
 
4
- <p align="center">
5
- <img alt="npm" src="https://img.shields.io/npm/v/@nhost/nhost-js">
6
- <img alt="npm" src="https://img.shields.io/npm/dm/@nhost/nhost-js">
7
- <a href="LICENSE">
8
- <img src="https://img.shields.io/badge/license-MIT-yellow.svg" alt="license: MIT" />
9
- </a>
10
- </p>
3
+ The Nhost JavaScript SDK provides a client-side interface to interact with Nhost services, including authentication, storage, and GraphQL operations.
11
4
 
12
- ## Documentation
13
-
14
- [Reference documentation](https://docs.nhost.io/reference/javascript)
5
+ ## Installation
15
6
 
16
- ## Install
7
+ ```bash
8
+ # npm
9
+ npm install nhost-js
17
10
 
18
- ```
19
- npm install @nhost/nhost-js
11
+ # yarn
12
+ yarn add nhost-js
20
13
 
21
- # or yarn
22
- yarn add @nhost/nhost-js
14
+ # pnpm
15
+ pnpm add nhost-js
23
16
  ```
24
17
 
25
- ### Initialise
26
-
27
- ```js
28
- import { NhostClient } from '@nhost/nhost-js'
29
-
30
- const nhost = new NhostClient({
31
- subdomain: '<Your Nhost project subdomain>',
32
- region: '<Your Nhost project region>'
33
- })
18
+ ## Quick Start
19
+
20
+ ```typescript
21
+ import { createClient } from "nhost-js";
22
+
23
+ // Initialize the Nhost client
24
+ const nhost = createClient({
25
+ subdomain: "your-project",
26
+ region: "eu-central-1",
27
+ });
28
+
29
+ // Use authentication features
30
+ async function signIn() {
31
+ const response = await nhost.auth.signInEmailPassword({
32
+ email: "user@example.com",
33
+ password: "password123",
34
+ });
35
+
36
+ if (response.body.session) {
37
+ console.log("Signed in successfully!");
38
+ }
39
+ }
40
+
41
+ // Use GraphQL features
42
+ async function fetchUsers() {
43
+ const response = await nhost.graphql.post({
44
+ query: `
45
+ query GetUsers {
46
+ users {
47
+ id
48
+ displayName
49
+ email
50
+ }
51
+ }
52
+ `,
53
+ });
54
+
55
+ return response.body.data.users;
56
+ }
57
+
58
+ // Use storage features
59
+ async function uploadFile(file) {
60
+ const response = await nhost.storage.uploadFiles({
61
+ "file[]": [file],
62
+ });
63
+
64
+ return response.body.processedFiles[0];
65
+ }
34
66
  ```
35
67
 
36
- ## Features
37
-
38
- ### GraphQL
68
+ ## Modules
39
69
 
40
- Access Nhost GraphQL methods using `nhost.graphql`.
70
+ The Nhost SDK consists of several modules:
41
71
 
42
- ### Authentication
72
+ - **Auth**: User authentication and session management
73
+ - **Storage**: File upload, download, and management
74
+ - **GraphQL**: Executing queries and mutations against your Hasura GraphQL API
43
75
 
44
- Access Nhost Auth methods using `nhost.auth`.
45
-
46
- ### Storage
76
+ ## Documentation
47
77
 
48
- Access Nhost Storage methods using `nhost.storage`.
78
+ For detailed documentation and API reference, see the [Nhost Documentation](https://docs.nhost.io).
49
79
 
50
- ### Functions
80
+ ## License
51
81
 
52
- Access Nhost Functions methods via `nhost.functions`.
82
+ MIT
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("./fetch.cjs.js");exports.createAPIClient=(e,s=[])=>{let a=t.createEnhancedFetch(s);const r=()=>e+"/healthz",n=()=>e+"/healthz",o=()=>e+"/version",i=()=>e+"/token",d=()=>e+"/signout",h=()=>e+"/signin/email-password",u=()=>e+"/signin/mfa/totp",c=()=>e+"/signin/passwordless/email",y=()=>e+"/signup/email-password",l=()=>e+"/user/mfa",f=()=>e+"/mfa/totp/generate";return{healthCheckHead:async t=>{const e=await a(r(),{...t,method:"HEAD"}),s=[204,205,304,412].includes(e.status)?null:await e.text(),n={body:s?JSON.parse(s):{},status:e.status,headers:Object.fromEntries(Array.from(e.headers.entries()))};if(!e.ok)throw n;return n},healthCheckGet:async t=>{const e=await a(n(),{...t,method:"GET"}),s=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:s?JSON.parse(s):{},status:e.status,headers:Object.fromEntries(Array.from(e.headers.entries()))};if(!e.ok)throw r;return r},getVersion:async t=>{const e=await a(o(),{...t,method:"GET"}),s=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:s?JSON.parse(s):{},status:e.status,headers:Object.fromEntries(Array.from(e.headers.entries()))};if(!e.ok)throw r;return r},refreshToken:async(t,e)=>{const s=await a(i(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},signOut:async(t,e)=>{const s=await a(d(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},signInEmailPassword:async(t,e)=>{const s=await a(h(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},signInVerifyMfaTotp:async(t,e)=>{const s=await a(u(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},signInPasswordlessEmail:async(t,e)=>{const s=await a(c(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},signUpEmailPassword:async(t,e)=>{const s=await a(y(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},changeUserMfaVerify:async(t,e)=>{const s=await a(l(),{...e,method:"POST",headers:{"Content-Type":"application/json",...e?.headers},body:JSON.stringify(t)}),r=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:r?JSON.parse(r):{},status:s.status,headers:Object.fromEntries(Array.from(s.headers.entries()))};if(!s.ok)throw n;return n},changeUserMfa:async t=>{const e=await a(f(),{...t,method:"GET"}),s=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:s?JSON.parse(s):{},status:e.status,headers:Object.fromEntries(Array.from(e.headers.entries()))};if(!e.ok)throw r;return r},pushChainFunction:e=>{s.push(e),a=t.createEnhancedFetch(s)},baseURL:e}};
2
+ //# sourceMappingURL=auth.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth.cjs.js","sources":["../../src/auth/client.ts"],"sourcesContent":["/**\n * Generated by orval v7.9.0 🍺\n * Do not edit manually.\n * Nhost Authentication API\n * Comprehensive authentication service for managing user identities, sessions, and authentication methods\n * OpenAPI spec version: 1.0.0\n */\nimport { createEnhancedFetch } from \"../fetch\";\nimport type { ChainFunction } from \"../fetch\";\n\nimport type { Client } from \"./interface\";\n\n/**\n * JSON Web Key Set for verifying JWT signatures\n */\nexport interface JWKSet {\n /** Array of public keys */\n keys: Jwk[];\n}\n\n/**\n * JSON Web Key for JWT verification\n */\nexport interface Jwk {\n /** Algorithm used with this key */\n alg: string;\n /** RSA public exponent */\n e: string;\n /** Key ID */\n kid: string;\n /** Key type */\n kty: string;\n /** RSA modulus */\n n: string;\n /** Key usage */\n use: string;\n}\n\n/**\n * Request to refresh an access token\n */\nexport interface RefreshTokenRequest {\n /**\n * Refresh token used to generate a new access token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n}\n\nexport interface SignOutSchema {\n /** Refresh token for the current session */\n refreshToken: string;\n /** Sign out from all connected devices */\n all?: boolean;\n}\n\nexport type CreatePATRequestMetadata = { [key: string]: unknown };\n\nexport interface CreatePATRequest {\n /** Expiration date of the PAT */\n expiresAt: string;\n metadata?: CreatePATRequestMetadata;\n}\n\nexport interface CreatePATResponse {\n /**\n * ID of the PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /**\n * PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * Error code identifying the specific application error\n */\nexport type ErrorResponseError =\n | \"default-role-must-be-in-allowed-roles\"\n | \"disabled-endpoint\"\n | \"disabled-user\"\n | \"email-already-in-use\"\n | \"email-already-verified\"\n | \"forbidden-anonymous\"\n | \"internal-server-error\"\n | \"invalid-email-password\"\n | \"invalid-request\"\n | \"locale-not-allowed\"\n | \"password-too-short\"\n | \"password-in-hibp-database\"\n | \"redirectTo-not-allowed\"\n | \"role-not-allowed\"\n | \"signup-disabled\"\n | \"unverified-user\"\n | \"user-not-anonymous\"\n | \"invalid-pat\"\n | \"invalid-refresh-token\"\n | \"invalid-ticket\"\n | \"disabled-mfa-totp\"\n | \"no-totp-secret\"\n | \"invalid-totp\"\n | \"mfa-type-not-found\"\n | \"totp-already-active\";\n/**\n * Standardized error response\n */\nexport interface ErrorResponse {\n /** HTTP status error code */\n status: number;\n /** Human-friendly error message */\n message: string;\n /** Error code identifying the specific application error */\n error: ErrorResponseError;\n}\n\n/**\n * Response for email-password authentication that may include a session or MFA challenge\n */\nexport interface SignInEmailPasswordResponse {\n /** User session if authentication was successful. Null if MFA challenge is required. */\n session?: Session;\n /** MFA challenge if two-factor authentication is required */\n mfa?: MFAChallengePayload;\n}\n\n/**\n * Challenge payload for multi-factor authentication\n */\nexport interface MFAChallengePayload {\n /** Ticket to use when completing the MFA challenge */\n ticket: string;\n}\n\n/**\n * Container for session information\n */\nexport interface SessionPayload {\n /** User session data. Null if authentication requires additional steps. */\n session?: Session;\n}\n\n/**\n * User authentication session containing tokens and user information\n */\nexport interface Session {\n /** JWT token for authenticating API requests */\n accessToken: string;\n /** Expiration time of the access token in seconds */\n accessTokenExpiresIn: number;\n /**\n * Identifier for the refresh token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshTokenId: string;\n /**\n * Token used to refresh the access token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n /** Information about the authenticated user */\n user?: User;\n}\n\nexport interface SignInPATRequest {\n /**\n * PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * Custom metadata associated with the user\n */\nexport type UserMetadata = { [key: string]: unknown };\n\n/**\n * User profile and account information\n */\nexport interface User {\n /** URL to the user's profile picture */\n avatarUrl: string;\n /** Timestamp when the user account was created */\n createdAt: string;\n /** Default authorization role for the user */\n defaultRole: string;\n /** User's display name */\n displayName: string;\n /** User's email address */\n email?: string;\n /** Whether the user's email has been verified */\n emailVerified: boolean;\n /**\n * Unique identifier for the user\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /** Whether this is an anonymous user account */\n isAnonymous: boolean;\n /**\n * User's preferred locale (language code)\n * @minLength 2\n * @maxLength 2\n */\n locale: string;\n /** Custom metadata associated with the user */\n metadata: UserMetadata;\n /** User's phone number */\n phoneNumber?: string;\n /** Whether the user's phone number has been verified */\n phoneNumberVerified: boolean;\n /** List of roles assigned to the user */\n roles: string[];\n}\n\n/**\n * Which sign-in method to use\n */\nexport type UserDeanonymizeRequestSignInMethod =\n | \"email-password\"\n | \"passwordless\";\nexport interface UserDeanonymizeRequest {\n /** Which sign-in method to use */\n signInMethod: UserDeanonymizeRequestSignInMethod;\n /** A valid email */\n email: string;\n /**\n * A password of minimum 3 characters\n * @minLength 3\n * @maxLength 50\n */\n password?: string;\n /**\n * Deprecated, will be ignored\n * @deprecated\n */\n connection?: string;\n options?: SignUpOptions;\n}\n\nexport interface UserEmailChangeRequest {\n /** A valid email */\n newEmail: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserEmailSendVerificationEmailRequest {\n /** A valid email */\n email: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserPasswordResetRequest {\n /** A valid email */\n email: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserPasswordRequest {\n /**\n * A password of minimum 3 characters\n * @minLength 3\n * @maxLength 50\n */\n newPassword: string;\n /**\n * Ticket to reset the password, required if the user is not authenticated\n * @pattern ^passwordReset\\:.*$\n */\n ticket?: string;\n}\n\nexport type OKResponse = \"OK\";\nexport interface OptionsRedirectTo {\n redirectTo?: string;\n}\n\nexport type SigninAnonymousRequestMetadata = { [key: string]: unknown };\n\nexport interface SigninAnonymousRequest {\n displayName?: string;\n /**\n * A two-characters locale\n * @minLength 2\n * @maxLength 2\n */\n locale?: string;\n metadata?: SigninAnonymousRequestMetadata;\n}\n\n/**\n * Request to authenticate using email and password\n */\nexport interface SignInEmailPasswordRequest {\n /** User's email address */\n email: string;\n /**\n * User's password\n * @minLength 3\n * @maxLength 50\n */\n password: string;\n}\n\nexport interface SignInPasswordlessEmailRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInOTPEmailRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInOTPEmailVerifyRequest {\n /** One time password */\n otp: string;\n /** A valid email */\n email: string;\n}\n\nexport interface SignInOTPEmailVerifyResponse {\n session?: Session;\n}\n\n/**\n * Request to register a new user with email and password\n */\nexport interface SignUpEmailPasswordRequest {\n /** Email address for the new user account */\n email: string;\n /**\n * Password for the new user account\n * @minLength 3\n * @maxLength 50\n */\n password: string;\n /** Optional configuration for the new user account */\n options?: SignUpOptions;\n}\n\nexport type SignUpOptionsMetadata = { [key: string]: unknown };\n\nexport interface SignUpOptions {\n allowedRoles?: string[];\n defaultRole?: string;\n /**\n * @maxLength 32\n * @pattern ^[\\p{L}\\p{N}\\p{S} ,.'-]+$\n */\n displayName?: string;\n /**\n * A two-characters locale\n * @minLength 2\n * @maxLength 2\n */\n locale?: string;\n metadata?: SignUpOptionsMetadata;\n redirectTo?: string;\n}\n\nexport interface SignInWebauthnRequest {\n /** A valid email */\n email?: string;\n}\n\nexport interface SignUpWebauthnRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInWebauthnResponse {\n [key: string]: unknown;\n}\n\nexport interface SignUpWebauthnResponse {\n [key: string]: unknown;\n}\n\nexport type SignInWebauthnVerifyRequestCredential = { [key: string]: unknown };\n\nexport interface SignInWebauthnVerifyRequest {\n /**\n * A valid email. Deprecated, no longer used\n * @deprecated\n */\n email?: string;\n credential: SignInWebauthnVerifyRequestCredential;\n [key: string]: unknown;\n}\n\nexport type SignUpWebauthnVerifyRequestCredential = { [key: string]: unknown };\n\nexport type SignUpWebauthnVerifyRequestOptionsAllOf = {\n nickname?: string;\n};\n\nexport type SignUpWebauthnVerifyRequestOptions = SignUpOptions &\n SignUpWebauthnVerifyRequestOptionsAllOf;\n\nexport interface SignUpWebauthnVerifyRequest {\n credential?: SignUpWebauthnVerifyRequestCredential;\n options?: SignUpWebauthnVerifyRequestOptions;\n [key: string]: unknown;\n}\n\nexport interface SignInIdTokenRequest {\n provider: Provider;\n /** Apple ID token */\n idToken: string;\n /** Nonce used during sign in process */\n nonce?: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInMfaTotpRequest {\n /**\n * Ticket\n * @pattern ^mfaTotp:.*$\n */\n ticket: string;\n /** One time password */\n otp: string;\n}\n\nexport type Provider = \"apple\" | \"google\";\nexport interface LinkIdTokenRequest {\n provider: Provider;\n /** Apple ID token */\n idToken: string;\n /** Nonce used during sign in process */\n nonce?: string;\n}\n\n/**\n * Type of MFA to activate. Use empty string to disable MFA.\n */\nexport type UserMfaRequestActiveMfaType = \"totp\" | \"\";\n/**\n * Request to activate or deactivate multi-factor authentication\n */\nexport interface UserMfaRequest {\n /** Verification code from the authenticator app when activating MFA */\n code: string;\n /** Type of MFA to activate. Use empty string to disable MFA. */\n activeMfaType?: UserMfaRequestActiveMfaType;\n}\n\n/**\n * Response containing TOTP setup information for MFA\n */\nexport interface TotpGenerateResponse {\n /** URL to QR code image for scanning with an authenticator app */\n imageUrl: string;\n /** TOTP secret key for manual setup with an authenticator app */\n totpSecret: string;\n}\n\n/**\n * Ticket\n */\nexport type TicketQueryParameter = string;\n\n/**\n * Type of the ticket\n */\nexport type TicketTypeQueryParameter =\n | \"emailVerify\"\n | \"emailConfirmChange\"\n | \"signinPasswordless\"\n | \"passwordReset\";\n/**\n * Target URL for the redirect\n */\nexport type RedirectToQueryParameter = string;\n\nexport type GetVersion200 = {\n /** The version of the authentication service */\n version: string;\n};\n\nexport type FetchResponse<T> = {\n body: T;\n status: number;\n headers: Record<string, string>;\n};\n\nexport const createAPIClient = (\n baseURL: string,\n chainFunctions: ChainFunction[] = [],\n): Client => {\n let fetch = createEnhancedFetch(chainFunctions);\n\n const pushChainFunction = (chainFunction: ChainFunction) => {\n chainFunctions.push(chainFunction);\n fetch = createEnhancedFetch(chainFunctions);\n };\n\n /**\n * Verify if the authentication service is operational using HEAD method\n * @summary Health check (HEAD)\n */\n const healthCheckHead = async (\n options?: RequestInit,\n ): Promise<FetchResponse<void>> => {\n const res = await fetch(getHealthCheckHeadUrl(), {\n ...options,\n method: \"HEAD\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: void = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<void>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getHealthCheckHeadUrl = () => {\n return baseURL + `/healthz`;\n };\n\n /**\n * Verify if the authentication service is operational using GET method\n * @summary Health check (GET)\n */\n const healthCheckGet = async (\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getHealthCheckGetUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getHealthCheckGetUrl = () => {\n return baseURL + `/healthz`;\n };\n\n /**\n * Retrieve version information about the authentication service\n * @summary Get service version\n */\n const getVersion = async (\n options?: RequestInit,\n ): Promise<FetchResponse<GetVersion200>> => {\n const res = await fetch(getGetVersionUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: GetVersion200 = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<GetVersion200>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getGetVersionUrl = () => {\n return baseURL + `/version`;\n };\n\n /**\n * Generate a new JWT access token using a valid refresh token. The refresh token used will be revoked and a new one will be issued.\n * @summary Refresh access token\n */\n const refreshToken = async (\n refreshTokenRequest: RefreshTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<Session>> => {\n const res = await fetch(getRefreshTokenUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(refreshTokenRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: Session = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<Session>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getRefreshTokenUrl = () => {\n return baseURL + `/token`;\n };\n\n /**\n * @summary Sign out\n */\n const signOut = async (\n signOutSchema: SignOutSchema,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignOutUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signOutSchema),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignOutUrl = () => {\n return baseURL + `/signout`;\n };\n\n /**\n * Authenticate a user with their email and password. Returns a session object or MFA challenge if two-factor authentication is enabled.\n * @summary Sign in with email and password\n */\n const signInEmailPassword = async (\n signInEmailPasswordRequest: SignInEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInEmailPasswordResponse>> => {\n const res = await fetch(getSignInEmailPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInEmailPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInEmailPasswordResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<SignInEmailPasswordResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInEmailPasswordUrl = () => {\n return baseURL + `/signin/email-password`;\n };\n\n /**\n * Complete the multi-factor authentication by verifying a Time-based One-Time Password (TOTP). Returns a session if validation is successful.\n * @summary Verify TOTP for MFA\n */\n const signInVerifyMfaTotp = async (\n signInMfaTotpRequest: SignInMfaTotpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignInVerifyMfaTotpUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInMfaTotpRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInVerifyMfaTotpUrl = () => {\n return baseURL + `/signin/mfa/totp`;\n };\n\n /**\n * Initiate passwordless authentication by sending a magic link to the user's email. If the user doesn't exist, a new account will be created with the provided options.\n * @summary Sign in with magic link email\n */\n const signInPasswordlessEmail = async (\n signInPasswordlessEmailRequest: SignInPasswordlessEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignInPasswordlessEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInPasswordlessEmailRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInPasswordlessEmailUrl = () => {\n return baseURL + `/signin/passwordless/email`;\n };\n\n /**\n * Register a new user account with email and password. Returns a session if email verification is not required, otherwise returns null session.\n * @summary Sign up with email and password\n */\n const signUpEmailPassword = async (\n signUpEmailPasswordRequest: SignUpEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignUpEmailPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signUpEmailPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignUpEmailPasswordUrl = () => {\n return baseURL + `/signup/email-password`;\n };\n\n /**\n * Activate or deactivate multi-factor authentication for the authenticated user\n * @summary Manage multi-factor authentication\n */\n const changeUserMfaVerify = async (\n userMfaRequest: UserMfaRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getChangeUserMfaVerifyUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userMfaRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserMfaVerifyUrl = () => {\n return baseURL + `/user/mfa`;\n };\n\n /**\n * Generate a Time-based One-Time Password (TOTP) secret for setting up multi-factor authentication\n * @summary Generate TOTP secret\n */\n const changeUserMfa = async (\n options?: RequestInit,\n ): Promise<FetchResponse<TotpGenerateResponse>> => {\n const res = await fetch(getChangeUserMfaUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: TotpGenerateResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<TotpGenerateResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserMfaUrl = () => {\n return baseURL + `/mfa/totp/generate`;\n };\n\n return {\n healthCheckHead,\n healthCheckGet,\n getVersion,\n refreshToken,\n signOut,\n signInEmailPassword,\n signInVerifyMfaTotp,\n signInPasswordlessEmail,\n signUpEmailPassword,\n changeUserMfaVerify,\n changeUserMfa,\n pushChainFunction,\n baseURL,\n };\n};\n"],"names":["baseURL","chainFunctions","fetch","createEnhancedFetch","getHealthCheckHeadUrl","getHealthCheckGetUrl","getGetVersionUrl","getRefreshTokenUrl","getSignOutUrl","getSignInEmailPasswordUrl","getSignInVerifyMfaTotpUrl","getSignInPasswordlessEmailUrl","getSignUpEmailPasswordUrl","getChangeUserMfaVerifyUrl","getChangeUserMfaUrl","healthCheckHead","async","options","res","method","body","includes","status","text","response","JSON","parse","headers","Object","fromEntries","Array","from","entries","ok","healthCheckGet","getVersion","refreshToken","refreshTokenRequest","stringify","signOut","signOutSchema","signInEmailPassword","signInEmailPasswordRequest","signInVerifyMfaTotp","signInMfaTotpRequest","signInPasswordlessEmail","signInPasswordlessEmailRequest","signUpEmailPassword","signUpEmailPasswordRequest","changeUserMfaVerify","userMfaRequest","changeUserMfa","pushChainFunction","chainFunction","push"],"mappings":"0IA6e+B,CAC7BA,EACAC,EAAkC,MAE9B,IAAAC,EAAQC,sBAAoBF,GAE1B,MAmCAG,EAAwB,IACrBJ,EAAU,WAiCbK,EAAuB,IACpBL,EAAU,WAiCbM,EAAmB,IAChBN,EAAU,WAoCbO,EAAqB,IAClBP,EAAU,SAmCbQ,EAAgB,IACbR,EAAU,WAoCbS,EAA4B,IACzBT,EAAU,yBAoCbU,EAA4B,IACzBV,EAAU,mBAoCbW,EAAgC,IAC7BX,EAAU,6BAoCbY,EAA4B,IACzBZ,EAAU,yBAoCba,EAA4B,IACzBb,EAAU,YAiCbc,EAAsB,IACnBd,EAAU,qBAGZ,MAAA,CACLe,gBAvYsBC,MACtBC,IAEA,MAAMC,QAAYhB,EAAME,IAAyB,IAC5Ca,EACHE,OAAQ,SAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHoBA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAI/CE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAiXPU,eAtWqBlB,MACrBC,IAEA,MAAMC,QAAYhB,EAAMG,IAAwB,IAC3CY,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAgVPW,WArUiBnB,MACjBC,IAEA,MAAMC,QAAYhB,EAAMI,IAAoB,IACvCW,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH6BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIxDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EA+SPY,aApSmBpB,MACnBqB,EACApB,KAEA,MAAMC,QAAYhB,EAAMK,IAAsB,IACzCU,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUD,KAGjBjB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHuBA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIlDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EA2QPe,QAjQcvB,MACdwB,EACAvB,KAEA,MAAMC,QAAYhB,EAAMM,IAAiB,IACpCS,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUE,KAGjBpB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAwOPiB,oBA7N0BzB,MAC1B0B,EACAzB,KAEA,MAAMC,QAAYhB,EAAMO,IAA6B,IAChDQ,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUI,KAGjBtB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH2CA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAItEE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAoMPmB,oBAzL0B3B,MAC1B4B,EACA3B,KAEA,MAAMC,QAAYhB,EAAMQ,IAA6B,IAChDO,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUM,KAGjBxB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAgKPqB,wBArJ8B7B,MAC9B8B,EACA7B,KAEA,MAAMC,QAAYhB,EAAMS,IAAiC,IACpDM,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUQ,KAGjB1B,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EA4HPuB,oBAjH0B/B,MAC1BgC,EACA/B,KAEA,MAAMC,QAAYhB,EAAMU,IAA6B,IAChDK,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUU,KAGjB5B,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAwFPyB,oBA7E0BjC,MAC1BkC,EACAjC,KAEA,MAAMC,QAAYhB,EAAMW,IAA6B,IAChDI,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKa,UAAUY,KAGjB9B,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAoDP2B,cAzCoBnC,MACpBC,IAEA,MAAMC,QAAYhB,EAAMY,IAAuB,IAC1CG,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHoCA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAI/DE,OAAQJ,EAAII,OACZK,QAASC,OAAOC,YAAYC,MAAMC,KAAMb,EAAIS,QAAgBK,aAG1D,IAACd,EAAIe,GACD,MAAAT,EAGD,OAAAA,CAAA,EAmBP4B,kBA3ZyBC,IACzBpD,EAAeqD,KAAKD,GACZlD,EAAAA,sBAAoBF,EAAc,EA0Z1CD,UACF"}
@@ -0,0 +1,261 @@
1
+ import { createEnhancedFetch } from "./fetch.es.js";
2
+ const createAPIClient = (baseURL, chainFunctions = []) => {
3
+ let fetch = createEnhancedFetch(chainFunctions);
4
+ const pushChainFunction = (chainFunction) => {
5
+ chainFunctions.push(chainFunction);
6
+ fetch = createEnhancedFetch(chainFunctions);
7
+ };
8
+ const healthCheckHead = async (options) => {
9
+ const res = await fetch(getHealthCheckHeadUrl(), {
10
+ ...options,
11
+ method: "HEAD"
12
+ });
13
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
14
+ const payload = body ? JSON.parse(body) : {};
15
+ const response = {
16
+ body: payload,
17
+ status: res.status,
18
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
19
+ };
20
+ if (!res.ok) {
21
+ throw response;
22
+ }
23
+ return response;
24
+ };
25
+ const getHealthCheckHeadUrl = () => {
26
+ return baseURL + `/healthz`;
27
+ };
28
+ const healthCheckGet = async (options) => {
29
+ const res = await fetch(getHealthCheckGetUrl(), {
30
+ ...options,
31
+ method: "GET"
32
+ });
33
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
34
+ const payload = body ? JSON.parse(body) : {};
35
+ const response = {
36
+ body: payload,
37
+ status: res.status,
38
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
39
+ };
40
+ if (!res.ok) {
41
+ throw response;
42
+ }
43
+ return response;
44
+ };
45
+ const getHealthCheckGetUrl = () => {
46
+ return baseURL + `/healthz`;
47
+ };
48
+ const getVersion = async (options) => {
49
+ const res = await fetch(getGetVersionUrl(), {
50
+ ...options,
51
+ method: "GET"
52
+ });
53
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
54
+ const payload = body ? JSON.parse(body) : {};
55
+ const response = {
56
+ body: payload,
57
+ status: res.status,
58
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
59
+ };
60
+ if (!res.ok) {
61
+ throw response;
62
+ }
63
+ return response;
64
+ };
65
+ const getGetVersionUrl = () => {
66
+ return baseURL + `/version`;
67
+ };
68
+ const refreshToken = async (refreshTokenRequest, options) => {
69
+ const res = await fetch(getRefreshTokenUrl(), {
70
+ ...options,
71
+ method: "POST",
72
+ headers: { "Content-Type": "application/json", ...options?.headers },
73
+ body: JSON.stringify(refreshTokenRequest)
74
+ });
75
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
76
+ const payload = body ? JSON.parse(body) : {};
77
+ const response = {
78
+ body: payload,
79
+ status: res.status,
80
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
81
+ };
82
+ if (!res.ok) {
83
+ throw response;
84
+ }
85
+ return response;
86
+ };
87
+ const getRefreshTokenUrl = () => {
88
+ return baseURL + `/token`;
89
+ };
90
+ const signOut = async (signOutSchema, options) => {
91
+ const res = await fetch(getSignOutUrl(), {
92
+ ...options,
93
+ method: "POST",
94
+ headers: { "Content-Type": "application/json", ...options?.headers },
95
+ body: JSON.stringify(signOutSchema)
96
+ });
97
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
98
+ const payload = body ? JSON.parse(body) : {};
99
+ const response = {
100
+ body: payload,
101
+ status: res.status,
102
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
103
+ };
104
+ if (!res.ok) {
105
+ throw response;
106
+ }
107
+ return response;
108
+ };
109
+ const getSignOutUrl = () => {
110
+ return baseURL + `/signout`;
111
+ };
112
+ const signInEmailPassword = async (signInEmailPasswordRequest, options) => {
113
+ const res = await fetch(getSignInEmailPasswordUrl(), {
114
+ ...options,
115
+ method: "POST",
116
+ headers: { "Content-Type": "application/json", ...options?.headers },
117
+ body: JSON.stringify(signInEmailPasswordRequest)
118
+ });
119
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
120
+ const payload = body ? JSON.parse(body) : {};
121
+ const response = {
122
+ body: payload,
123
+ status: res.status,
124
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
125
+ };
126
+ if (!res.ok) {
127
+ throw response;
128
+ }
129
+ return response;
130
+ };
131
+ const getSignInEmailPasswordUrl = () => {
132
+ return baseURL + `/signin/email-password`;
133
+ };
134
+ const signInVerifyMfaTotp = async (signInMfaTotpRequest, options) => {
135
+ const res = await fetch(getSignInVerifyMfaTotpUrl(), {
136
+ ...options,
137
+ method: "POST",
138
+ headers: { "Content-Type": "application/json", ...options?.headers },
139
+ body: JSON.stringify(signInMfaTotpRequest)
140
+ });
141
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
142
+ const payload = body ? JSON.parse(body) : {};
143
+ const response = {
144
+ body: payload,
145
+ status: res.status,
146
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
147
+ };
148
+ if (!res.ok) {
149
+ throw response;
150
+ }
151
+ return response;
152
+ };
153
+ const getSignInVerifyMfaTotpUrl = () => {
154
+ return baseURL + `/signin/mfa/totp`;
155
+ };
156
+ const signInPasswordlessEmail = async (signInPasswordlessEmailRequest, options) => {
157
+ const res = await fetch(getSignInPasswordlessEmailUrl(), {
158
+ ...options,
159
+ method: "POST",
160
+ headers: { "Content-Type": "application/json", ...options?.headers },
161
+ body: JSON.stringify(signInPasswordlessEmailRequest)
162
+ });
163
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
164
+ const payload = body ? JSON.parse(body) : {};
165
+ const response = {
166
+ body: payload,
167
+ status: res.status,
168
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
169
+ };
170
+ if (!res.ok) {
171
+ throw response;
172
+ }
173
+ return response;
174
+ };
175
+ const getSignInPasswordlessEmailUrl = () => {
176
+ return baseURL + `/signin/passwordless/email`;
177
+ };
178
+ const signUpEmailPassword = async (signUpEmailPasswordRequest, options) => {
179
+ const res = await fetch(getSignUpEmailPasswordUrl(), {
180
+ ...options,
181
+ method: "POST",
182
+ headers: { "Content-Type": "application/json", ...options?.headers },
183
+ body: JSON.stringify(signUpEmailPasswordRequest)
184
+ });
185
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
186
+ const payload = body ? JSON.parse(body) : {};
187
+ const response = {
188
+ body: payload,
189
+ status: res.status,
190
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
191
+ };
192
+ if (!res.ok) {
193
+ throw response;
194
+ }
195
+ return response;
196
+ };
197
+ const getSignUpEmailPasswordUrl = () => {
198
+ return baseURL + `/signup/email-password`;
199
+ };
200
+ const changeUserMfaVerify = async (userMfaRequest, options) => {
201
+ const res = await fetch(getChangeUserMfaVerifyUrl(), {
202
+ ...options,
203
+ method: "POST",
204
+ headers: { "Content-Type": "application/json", ...options?.headers },
205
+ body: JSON.stringify(userMfaRequest)
206
+ });
207
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
208
+ const payload = body ? JSON.parse(body) : {};
209
+ const response = {
210
+ body: payload,
211
+ status: res.status,
212
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
213
+ };
214
+ if (!res.ok) {
215
+ throw response;
216
+ }
217
+ return response;
218
+ };
219
+ const getChangeUserMfaVerifyUrl = () => {
220
+ return baseURL + `/user/mfa`;
221
+ };
222
+ const changeUserMfa = async (options) => {
223
+ const res = await fetch(getChangeUserMfaUrl(), {
224
+ ...options,
225
+ method: "GET"
226
+ });
227
+ const body = [204, 205, 304, 412].includes(res.status) ? null : await res.text();
228
+ const payload = body ? JSON.parse(body) : {};
229
+ const response = {
230
+ body: payload,
231
+ status: res.status,
232
+ headers: Object.fromEntries(Array.from(res.headers.entries()))
233
+ };
234
+ if (!res.ok) {
235
+ throw response;
236
+ }
237
+ return response;
238
+ };
239
+ const getChangeUserMfaUrl = () => {
240
+ return baseURL + `/mfa/totp/generate`;
241
+ };
242
+ return {
243
+ healthCheckHead,
244
+ healthCheckGet,
245
+ getVersion,
246
+ refreshToken,
247
+ signOut,
248
+ signInEmailPassword,
249
+ signInVerifyMfaTotp,
250
+ signInPasswordlessEmail,
251
+ signUpEmailPassword,
252
+ changeUserMfaVerify,
253
+ changeUserMfa,
254
+ pushChainFunction,
255
+ baseURL
256
+ };
257
+ };
258
+ export {
259
+ createAPIClient
260
+ };
261
+ //# sourceMappingURL=auth.es.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth.es.js","sources":["../../src/auth/client.ts"],"sourcesContent":["/**\n * Generated by orval v7.9.0 🍺\n * Do not edit manually.\n * Nhost Authentication API\n * Comprehensive authentication service for managing user identities, sessions, and authentication methods\n * OpenAPI spec version: 1.0.0\n */\nimport { createEnhancedFetch } from \"../fetch\";\nimport type { ChainFunction } from \"../fetch\";\n\nimport type { Client } from \"./interface\";\n\n/**\n * JSON Web Key Set for verifying JWT signatures\n */\nexport interface JWKSet {\n /** Array of public keys */\n keys: Jwk[];\n}\n\n/**\n * JSON Web Key for JWT verification\n */\nexport interface Jwk {\n /** Algorithm used with this key */\n alg: string;\n /** RSA public exponent */\n e: string;\n /** Key ID */\n kid: string;\n /** Key type */\n kty: string;\n /** RSA modulus */\n n: string;\n /** Key usage */\n use: string;\n}\n\n/**\n * Request to refresh an access token\n */\nexport interface RefreshTokenRequest {\n /**\n * Refresh token used to generate a new access token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n}\n\nexport interface SignOutSchema {\n /** Refresh token for the current session */\n refreshToken: string;\n /** Sign out from all connected devices */\n all?: boolean;\n}\n\nexport type CreatePATRequestMetadata = { [key: string]: unknown };\n\nexport interface CreatePATRequest {\n /** Expiration date of the PAT */\n expiresAt: string;\n metadata?: CreatePATRequestMetadata;\n}\n\nexport interface CreatePATResponse {\n /**\n * ID of the PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /**\n * PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * Error code identifying the specific application error\n */\nexport type ErrorResponseError =\n | \"default-role-must-be-in-allowed-roles\"\n | \"disabled-endpoint\"\n | \"disabled-user\"\n | \"email-already-in-use\"\n | \"email-already-verified\"\n | \"forbidden-anonymous\"\n | \"internal-server-error\"\n | \"invalid-email-password\"\n | \"invalid-request\"\n | \"locale-not-allowed\"\n | \"password-too-short\"\n | \"password-in-hibp-database\"\n | \"redirectTo-not-allowed\"\n | \"role-not-allowed\"\n | \"signup-disabled\"\n | \"unverified-user\"\n | \"user-not-anonymous\"\n | \"invalid-pat\"\n | \"invalid-refresh-token\"\n | \"invalid-ticket\"\n | \"disabled-mfa-totp\"\n | \"no-totp-secret\"\n | \"invalid-totp\"\n | \"mfa-type-not-found\"\n | \"totp-already-active\";\n/**\n * Standardized error response\n */\nexport interface ErrorResponse {\n /** HTTP status error code */\n status: number;\n /** Human-friendly error message */\n message: string;\n /** Error code identifying the specific application error */\n error: ErrorResponseError;\n}\n\n/**\n * Response for email-password authentication that may include a session or MFA challenge\n */\nexport interface SignInEmailPasswordResponse {\n /** User session if authentication was successful. Null if MFA challenge is required. */\n session?: Session;\n /** MFA challenge if two-factor authentication is required */\n mfa?: MFAChallengePayload;\n}\n\n/**\n * Challenge payload for multi-factor authentication\n */\nexport interface MFAChallengePayload {\n /** Ticket to use when completing the MFA challenge */\n ticket: string;\n}\n\n/**\n * Container for session information\n */\nexport interface SessionPayload {\n /** User session data. Null if authentication requires additional steps. */\n session?: Session;\n}\n\n/**\n * User authentication session containing tokens and user information\n */\nexport interface Session {\n /** JWT token for authenticating API requests */\n accessToken: string;\n /** Expiration time of the access token in seconds */\n accessTokenExpiresIn: number;\n /**\n * Identifier for the refresh token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshTokenId: string;\n /**\n * Token used to refresh the access token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n /** Information about the authenticated user */\n user?: User;\n}\n\nexport interface SignInPATRequest {\n /**\n * PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * Custom metadata associated with the user\n */\nexport type UserMetadata = { [key: string]: unknown };\n\n/**\n * User profile and account information\n */\nexport interface User {\n /** URL to the user's profile picture */\n avatarUrl: string;\n /** Timestamp when the user account was created */\n createdAt: string;\n /** Default authorization role for the user */\n defaultRole: string;\n /** User's display name */\n displayName: string;\n /** User's email address */\n email?: string;\n /** Whether the user's email has been verified */\n emailVerified: boolean;\n /**\n * Unique identifier for the user\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /** Whether this is an anonymous user account */\n isAnonymous: boolean;\n /**\n * User's preferred locale (language code)\n * @minLength 2\n * @maxLength 2\n */\n locale: string;\n /** Custom metadata associated with the user */\n metadata: UserMetadata;\n /** User's phone number */\n phoneNumber?: string;\n /** Whether the user's phone number has been verified */\n phoneNumberVerified: boolean;\n /** List of roles assigned to the user */\n roles: string[];\n}\n\n/**\n * Which sign-in method to use\n */\nexport type UserDeanonymizeRequestSignInMethod =\n | \"email-password\"\n | \"passwordless\";\nexport interface UserDeanonymizeRequest {\n /** Which sign-in method to use */\n signInMethod: UserDeanonymizeRequestSignInMethod;\n /** A valid email */\n email: string;\n /**\n * A password of minimum 3 characters\n * @minLength 3\n * @maxLength 50\n */\n password?: string;\n /**\n * Deprecated, will be ignored\n * @deprecated\n */\n connection?: string;\n options?: SignUpOptions;\n}\n\nexport interface UserEmailChangeRequest {\n /** A valid email */\n newEmail: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserEmailSendVerificationEmailRequest {\n /** A valid email */\n email: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserPasswordResetRequest {\n /** A valid email */\n email: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserPasswordRequest {\n /**\n * A password of minimum 3 characters\n * @minLength 3\n * @maxLength 50\n */\n newPassword: string;\n /**\n * Ticket to reset the password, required if the user is not authenticated\n * @pattern ^passwordReset\\:.*$\n */\n ticket?: string;\n}\n\nexport type OKResponse = \"OK\";\nexport interface OptionsRedirectTo {\n redirectTo?: string;\n}\n\nexport type SigninAnonymousRequestMetadata = { [key: string]: unknown };\n\nexport interface SigninAnonymousRequest {\n displayName?: string;\n /**\n * A two-characters locale\n * @minLength 2\n * @maxLength 2\n */\n locale?: string;\n metadata?: SigninAnonymousRequestMetadata;\n}\n\n/**\n * Request to authenticate using email and password\n */\nexport interface SignInEmailPasswordRequest {\n /** User's email address */\n email: string;\n /**\n * User's password\n * @minLength 3\n * @maxLength 50\n */\n password: string;\n}\n\nexport interface SignInPasswordlessEmailRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInOTPEmailRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInOTPEmailVerifyRequest {\n /** One time password */\n otp: string;\n /** A valid email */\n email: string;\n}\n\nexport interface SignInOTPEmailVerifyResponse {\n session?: Session;\n}\n\n/**\n * Request to register a new user with email and password\n */\nexport interface SignUpEmailPasswordRequest {\n /** Email address for the new user account */\n email: string;\n /**\n * Password for the new user account\n * @minLength 3\n * @maxLength 50\n */\n password: string;\n /** Optional configuration for the new user account */\n options?: SignUpOptions;\n}\n\nexport type SignUpOptionsMetadata = { [key: string]: unknown };\n\nexport interface SignUpOptions {\n allowedRoles?: string[];\n defaultRole?: string;\n /**\n * @maxLength 32\n * @pattern ^[\\p{L}\\p{N}\\p{S} ,.'-]+$\n */\n displayName?: string;\n /**\n * A two-characters locale\n * @minLength 2\n * @maxLength 2\n */\n locale?: string;\n metadata?: SignUpOptionsMetadata;\n redirectTo?: string;\n}\n\nexport interface SignInWebauthnRequest {\n /** A valid email */\n email?: string;\n}\n\nexport interface SignUpWebauthnRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInWebauthnResponse {\n [key: string]: unknown;\n}\n\nexport interface SignUpWebauthnResponse {\n [key: string]: unknown;\n}\n\nexport type SignInWebauthnVerifyRequestCredential = { [key: string]: unknown };\n\nexport interface SignInWebauthnVerifyRequest {\n /**\n * A valid email. Deprecated, no longer used\n * @deprecated\n */\n email?: string;\n credential: SignInWebauthnVerifyRequestCredential;\n [key: string]: unknown;\n}\n\nexport type SignUpWebauthnVerifyRequestCredential = { [key: string]: unknown };\n\nexport type SignUpWebauthnVerifyRequestOptionsAllOf = {\n nickname?: string;\n};\n\nexport type SignUpWebauthnVerifyRequestOptions = SignUpOptions &\n SignUpWebauthnVerifyRequestOptionsAllOf;\n\nexport interface SignUpWebauthnVerifyRequest {\n credential?: SignUpWebauthnVerifyRequestCredential;\n options?: SignUpWebauthnVerifyRequestOptions;\n [key: string]: unknown;\n}\n\nexport interface SignInIdTokenRequest {\n provider: Provider;\n /** Apple ID token */\n idToken: string;\n /** Nonce used during sign in process */\n nonce?: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInMfaTotpRequest {\n /**\n * Ticket\n * @pattern ^mfaTotp:.*$\n */\n ticket: string;\n /** One time password */\n otp: string;\n}\n\nexport type Provider = \"apple\" | \"google\";\nexport interface LinkIdTokenRequest {\n provider: Provider;\n /** Apple ID token */\n idToken: string;\n /** Nonce used during sign in process */\n nonce?: string;\n}\n\n/**\n * Type of MFA to activate. Use empty string to disable MFA.\n */\nexport type UserMfaRequestActiveMfaType = \"totp\" | \"\";\n/**\n * Request to activate or deactivate multi-factor authentication\n */\nexport interface UserMfaRequest {\n /** Verification code from the authenticator app when activating MFA */\n code: string;\n /** Type of MFA to activate. Use empty string to disable MFA. */\n activeMfaType?: UserMfaRequestActiveMfaType;\n}\n\n/**\n * Response containing TOTP setup information for MFA\n */\nexport interface TotpGenerateResponse {\n /** URL to QR code image for scanning with an authenticator app */\n imageUrl: string;\n /** TOTP secret key for manual setup with an authenticator app */\n totpSecret: string;\n}\n\n/**\n * Ticket\n */\nexport type TicketQueryParameter = string;\n\n/**\n * Type of the ticket\n */\nexport type TicketTypeQueryParameter =\n | \"emailVerify\"\n | \"emailConfirmChange\"\n | \"signinPasswordless\"\n | \"passwordReset\";\n/**\n * Target URL for the redirect\n */\nexport type RedirectToQueryParameter = string;\n\nexport type GetVersion200 = {\n /** The version of the authentication service */\n version: string;\n};\n\nexport type FetchResponse<T> = {\n body: T;\n status: number;\n headers: Record<string, string>;\n};\n\nexport const createAPIClient = (\n baseURL: string,\n chainFunctions: ChainFunction[] = [],\n): Client => {\n let fetch = createEnhancedFetch(chainFunctions);\n\n const pushChainFunction = (chainFunction: ChainFunction) => {\n chainFunctions.push(chainFunction);\n fetch = createEnhancedFetch(chainFunctions);\n };\n\n /**\n * Verify if the authentication service is operational using HEAD method\n * @summary Health check (HEAD)\n */\n const healthCheckHead = async (\n options?: RequestInit,\n ): Promise<FetchResponse<void>> => {\n const res = await fetch(getHealthCheckHeadUrl(), {\n ...options,\n method: \"HEAD\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: void = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<void>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getHealthCheckHeadUrl = () => {\n return baseURL + `/healthz`;\n };\n\n /**\n * Verify if the authentication service is operational using GET method\n * @summary Health check (GET)\n */\n const healthCheckGet = async (\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getHealthCheckGetUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getHealthCheckGetUrl = () => {\n return baseURL + `/healthz`;\n };\n\n /**\n * Retrieve version information about the authentication service\n * @summary Get service version\n */\n const getVersion = async (\n options?: RequestInit,\n ): Promise<FetchResponse<GetVersion200>> => {\n const res = await fetch(getGetVersionUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: GetVersion200 = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<GetVersion200>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getGetVersionUrl = () => {\n return baseURL + `/version`;\n };\n\n /**\n * Generate a new JWT access token using a valid refresh token. The refresh token used will be revoked and a new one will be issued.\n * @summary Refresh access token\n */\n const refreshToken = async (\n refreshTokenRequest: RefreshTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<Session>> => {\n const res = await fetch(getRefreshTokenUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(refreshTokenRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: Session = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<Session>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getRefreshTokenUrl = () => {\n return baseURL + `/token`;\n };\n\n /**\n * @summary Sign out\n */\n const signOut = async (\n signOutSchema: SignOutSchema,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignOutUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signOutSchema),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignOutUrl = () => {\n return baseURL + `/signout`;\n };\n\n /**\n * Authenticate a user with their email and password. Returns a session object or MFA challenge if two-factor authentication is enabled.\n * @summary Sign in with email and password\n */\n const signInEmailPassword = async (\n signInEmailPasswordRequest: SignInEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInEmailPasswordResponse>> => {\n const res = await fetch(getSignInEmailPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInEmailPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInEmailPasswordResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<SignInEmailPasswordResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInEmailPasswordUrl = () => {\n return baseURL + `/signin/email-password`;\n };\n\n /**\n * Complete the multi-factor authentication by verifying a Time-based One-Time Password (TOTP). Returns a session if validation is successful.\n * @summary Verify TOTP for MFA\n */\n const signInVerifyMfaTotp = async (\n signInMfaTotpRequest: SignInMfaTotpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignInVerifyMfaTotpUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInMfaTotpRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInVerifyMfaTotpUrl = () => {\n return baseURL + `/signin/mfa/totp`;\n };\n\n /**\n * Initiate passwordless authentication by sending a magic link to the user's email. If the user doesn't exist, a new account will be created with the provided options.\n * @summary Sign in with magic link email\n */\n const signInPasswordlessEmail = async (\n signInPasswordlessEmailRequest: SignInPasswordlessEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignInPasswordlessEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInPasswordlessEmailRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInPasswordlessEmailUrl = () => {\n return baseURL + `/signin/passwordless/email`;\n };\n\n /**\n * Register a new user account with email and password. Returns a session if email verification is not required, otherwise returns null session.\n * @summary Sign up with email and password\n */\n const signUpEmailPassword = async (\n signUpEmailPasswordRequest: SignUpEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignUpEmailPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signUpEmailPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignUpEmailPasswordUrl = () => {\n return baseURL + `/signup/email-password`;\n };\n\n /**\n * Activate or deactivate multi-factor authentication for the authenticated user\n * @summary Manage multi-factor authentication\n */\n const changeUserMfaVerify = async (\n userMfaRequest: UserMfaRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getChangeUserMfaVerifyUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userMfaRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserMfaVerifyUrl = () => {\n return baseURL + `/user/mfa`;\n };\n\n /**\n * Generate a Time-based One-Time Password (TOTP) secret for setting up multi-factor authentication\n * @summary Generate TOTP secret\n */\n const changeUserMfa = async (\n options?: RequestInit,\n ): Promise<FetchResponse<TotpGenerateResponse>> => {\n const res = await fetch(getChangeUserMfaUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: TotpGenerateResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: Object.fromEntries(Array.from((res.headers as any).entries())),\n } as FetchResponse<TotpGenerateResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserMfaUrl = () => {\n return baseURL + `/mfa/totp/generate`;\n };\n\n return {\n healthCheckHead,\n healthCheckGet,\n getVersion,\n refreshToken,\n signOut,\n signInEmailPassword,\n signInVerifyMfaTotp,\n signInPasswordlessEmail,\n signUpEmailPassword,\n changeUserMfaVerify,\n changeUserMfa,\n pushChainFunction,\n baseURL,\n };\n};\n"],"names":[],"mappings":";AA6eO,MAAM,kBAAkB,CAC7B,SACA,iBAAkC,OACvB;AACP,MAAA,QAAQ,oBAAoB,cAAc;AAExC,QAAA,oBAAoB,CAAC,kBAAiC;AAC1D,mBAAe,KAAK,aAAa;AACjC,YAAQ,oBAAoB,cAAc;AAAA,EAC5C;AAMM,QAAA,kBAAkB,OACtB,YACiC;AACjC,UAAM,MAAM,MAAM,MAAM,yBAAyB;AAAA,MAC/C,GAAG;AAAA,MACH,QAAQ;AAAA,IAAA,CACT;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAgB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEjD,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,wBAAwB,MAAM;AAClC,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,iBAAiB,OACrB,YACuC;AACvC,UAAM,MAAM,MAAM,MAAM,wBAAwB;AAAA,MAC9C,GAAG;AAAA,MACH,QAAQ;AAAA,IAAA,CACT;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAsB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEvD,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,uBAAuB,MAAM;AACjC,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,aAAa,OACjB,YAC0C;AAC1C,UAAM,MAAM,MAAM,MAAM,oBAAoB;AAAA,MAC1C,GAAG;AAAA,MACH,QAAQ;AAAA,IAAA,CACT;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAyB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAE1D,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,mBAAmB,MAAM;AAC7B,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,eAAe,OACnB,qBACA,YACoC;AACpC,UAAM,MAAM,MAAM,MAAM,sBAAsB;AAAA,MAC5C,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,mBAAmB;AAAA,IAAA,CACzC;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAmB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEpD,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,qBAAqB,MAAM;AAC/B,WAAO,UAAU;AAAA,EACnB;AAKM,QAAA,UAAU,OACd,eACA,YACuC;AACvC,UAAM,MAAM,MAAM,MAAM,iBAAiB;AAAA,MACvC,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,aAAa;AAAA,IAAA,CACnC;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAsB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEvD,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,gBAAgB,MAAM;AAC1B,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,sBAAsB,OAC1B,4BACA,YACwD;AACxD,UAAM,MAAM,MAAM,MAAM,6BAA6B;AAAA,MACnD,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,0BAA0B;AAAA,IAAA,CAChD;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAuC,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAExE,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,4BAA4B,MAAM;AACtC,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,sBAAsB,OAC1B,sBACA,YAC2C;AAC3C,UAAM,MAAM,MAAM,MAAM,6BAA6B;AAAA,MACnD,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,oBAAoB;AAAA,IAAA,CAC1C;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAA0B,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAE3D,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,4BAA4B,MAAM;AACtC,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,0BAA0B,OAC9B,gCACA,YACuC;AACvC,UAAM,MAAM,MAAM,MAAM,iCAAiC;AAAA,MACvD,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,8BAA8B;AAAA,IAAA,CACpD;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAsB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEvD,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,gCAAgC,MAAM;AAC1C,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,sBAAsB,OAC1B,4BACA,YAC2C;AAC3C,UAAM,MAAM,MAAM,MAAM,6BAA6B;AAAA,MACnD,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,0BAA0B;AAAA,IAAA,CAChD;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAA0B,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAE3D,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,4BAA4B,MAAM;AACtC,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,sBAAsB,OAC1B,gBACA,YACuC;AACvC,UAAM,MAAM,MAAM,MAAM,6BAA6B;AAAA,MACnD,GAAG;AAAA,MACH,QAAQ;AAAA,MACR,SAAS,EAAE,gBAAgB,oBAAoB,GAAG,SAAS,QAAQ;AAAA,MACnE,MAAM,KAAK,UAAU,cAAc;AAAA,IAAA,CACpC;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAsB,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEvD,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,4BAA4B,MAAM;AACtC,WAAO,UAAU;AAAA,EACnB;AAMM,QAAA,gBAAgB,OACpB,YACiD;AACjD,UAAM,MAAM,MAAM,MAAM,uBAAuB;AAAA,MAC7C,GAAG;AAAA,MACH,QAAQ;AAAA,IAAA,CACT;AAED,UAAM,OAAO,CAAC,KAAK,KAAK,KAAK,GAAG,EAAE,SAAS,IAAI,MAAM,IACjD,OACA,MAAM,IAAI,KAAK;AACnB,UAAM,UAAgC,OAAO,KAAK,MAAM,IAAI,IAAI,CAAC;AAEjE,UAAM,WAAW;AAAA,MACf,MAAM;AAAA,MACN,QAAQ,IAAI;AAAA,MACZ,SAAS,OAAO,YAAY,MAAM,KAAM,IAAI,QAAgB,SAAS,CAAC;AAAA,IACxE;AAEI,QAAA,CAAC,IAAI,IAAI;AACL,YAAA;AAAA,IAAA;AAGD,WAAA;AAAA,EACT;AAEA,QAAM,sBAAsB,MAAM;AAChC,WAAO,UAAU;AAAA,EACnB;AAEO,SAAA;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;"}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"}),exports.createEnhancedFetch=function(e=[]){return e.reduceRight(((e,t)=>t(e)),fetch)};
2
+ //# sourceMappingURL=fetch.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"fetch.cjs.js","sources":["../../src/fetch/index.ts"],"sourcesContent":["/**\n * @fileoverview Enhanced fetch implementation with middleware support.\n *\n * This module provides a middleware pattern for the Fetch API, allowing\n * chain functions to be applied to requests and responses, such as\n * authentication token refreshing, error handling, and request/response transformation.\n */\n\n/**\n * Type definition for a fetch-like function.\n * Takes the same parameters as fetch and returns the same type.\n * This allows middleware to intercept and modify requests and responses.\n */\nexport type FetchFunction = (\n url: string,\n options?: RequestInit,\n) => Promise<Response>;\n\n/**\n * Type definition for a chain function (middleware).\n * Takes a fetch-like function and returns another fetch-like function.\n *\n * Chain functions can be used to implement:\n * - Authentication token handling\n * - Error handling and retry logic\n * - Request and response transformations\n * - Logging and metrics\n */\nexport type ChainFunction = (next: FetchFunction) => FetchFunction;\n\n/**\n * Creates an enhanced fetch function using a chain of middleware functions.\n *\n * The fetch chain executes in the order of the array, with each middleware\n * wrapping the next one in the chain. This allows each middleware to\n * intercept both the request (before calling next) and the response\n * (after calling next).\n *\n * @example\n * ```typescript\n * // Simple logging middleware\n * const loggingMiddleware: ChainFunction = (next) => {\n * return async (url, options) => {\n * console.log(`Request to ${url}`);\n * const response = await next(url, options);\n * console.log(`Response from ${url}: ${response.status}`);\n * return response;\n * };\n * };\n *\n * const enhancedFetch = createEnhancedFetch([loggingMiddleware]);\n * const response = await enhancedFetch('https://api.example.com/data');\n * ```\n *\n * @param chainFunctions - Array of chain functions to apply in order\n * @returns Enhanced fetch function with all middleware applied\n */\nexport function createEnhancedFetch(\n chainFunctions: ChainFunction[] = [],\n): FetchFunction {\n // Build the chain starting with vanilla fetch, but apply functions in reverse\n // to achieve the desired execution order\n return chainFunctions.reduceRight(\n (nextInChain, chainFunction) => chainFunction(nextInChain),\n fetch as FetchFunction,\n );\n}\n"],"names":["chainFunctions","reduceRight","nextInChain","chainFunction","fetch"],"mappings":"4GAyDgB,SACdA,EAAkC,IAIlC,OAAOA,EAAeC,aACpB,CAACC,EAAaC,IAAkBA,EAAcD,IAC9CE,MAEJ"}
@@ -0,0 +1,10 @@
1
+ function createEnhancedFetch(chainFunctions = []) {
2
+ return chainFunctions.reduceRight(
3
+ (nextInChain, chainFunction) => chainFunction(nextInChain),
4
+ fetch
5
+ );
6
+ }
7
+ export {
8
+ createEnhancedFetch
9
+ };
10
+ //# sourceMappingURL=fetch.es.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"fetch.es.js","sources":["../../src/fetch/index.ts"],"sourcesContent":["/**\n * @fileoverview Enhanced fetch implementation with middleware support.\n *\n * This module provides a middleware pattern for the Fetch API, allowing\n * chain functions to be applied to requests and responses, such as\n * authentication token refreshing, error handling, and request/response transformation.\n */\n\n/**\n * Type definition for a fetch-like function.\n * Takes the same parameters as fetch and returns the same type.\n * This allows middleware to intercept and modify requests and responses.\n */\nexport type FetchFunction = (\n url: string,\n options?: RequestInit,\n) => Promise<Response>;\n\n/**\n * Type definition for a chain function (middleware).\n * Takes a fetch-like function and returns another fetch-like function.\n *\n * Chain functions can be used to implement:\n * - Authentication token handling\n * - Error handling and retry logic\n * - Request and response transformations\n * - Logging and metrics\n */\nexport type ChainFunction = (next: FetchFunction) => FetchFunction;\n\n/**\n * Creates an enhanced fetch function using a chain of middleware functions.\n *\n * The fetch chain executes in the order of the array, with each middleware\n * wrapping the next one in the chain. This allows each middleware to\n * intercept both the request (before calling next) and the response\n * (after calling next).\n *\n * @example\n * ```typescript\n * // Simple logging middleware\n * const loggingMiddleware: ChainFunction = (next) => {\n * return async (url, options) => {\n * console.log(`Request to ${url}`);\n * const response = await next(url, options);\n * console.log(`Response from ${url}: ${response.status}`);\n * return response;\n * };\n * };\n *\n * const enhancedFetch = createEnhancedFetch([loggingMiddleware]);\n * const response = await enhancedFetch('https://api.example.com/data');\n * ```\n *\n * @param chainFunctions - Array of chain functions to apply in order\n * @returns Enhanced fetch function with all middleware applied\n */\nexport function createEnhancedFetch(\n chainFunctions: ChainFunction[] = [],\n): FetchFunction {\n // Build the chain starting with vanilla fetch, but apply functions in reverse\n // to achieve the desired execution order\n return chainFunctions.reduceRight(\n (nextInChain, chainFunction) => chainFunction(nextInChain),\n fetch as FetchFunction,\n );\n}\n"],"names":[],"mappings":"AAyDgB,SAAA,oBACd,iBAAkC,IACnB;AAGf,SAAO,eAAe;AAAA,IACpB,CAAC,aAAa,kBAAkB,cAAc,WAAW;AAAA,IACzD;AAAA,EACF;AACF;"}
@@ -0,0 +1,2 @@
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("./fetch.cjs.js");exports.createAPIClient=(t,r=[])=>{const s=e.createEnhancedFetch(r);return{post:(e,r)=>(async(e,r)=>{const a=await s(`${t}`,{method:"POST",headers:{"Content-Type":"application/json"},body:JSON.stringify(e),...r}),o=await a.text(),n=o?JSON.parse(o):{},c={body:n,status:a.status,headers:a.headers};if(n.errors)throw c;return c})(e,r)}};
2
+ //# sourceMappingURL=graphql.cjs.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"graphql.cjs.js","sources":["../../src/graphql/client.ts"],"sourcesContent":["/**\n * @fileoverview GraphQL client for the Nhost JavaScript SDK.\n *\n * This module provides functionality for executing GraphQL operations against\n * a Hasura GraphQL API, with automatic authentication token handling.\n */\n\nimport { createEnhancedFetch } from \"../fetch\";\nimport type { ChainFunction } from \"../fetch\";\n\n/**\n * Variables object for GraphQL operations.\n * Key-value pairs of variable names and their values.\n */\nexport interface GraphQLVariables {\n [key: string]: any; // eslint-disable-line @typescript-eslint/no-explicit-any\n}\n\n/**\n * GraphQL request object used for queries and mutations.\n */\nexport interface GraphQLRequest {\n /** The GraphQL query or mutation string */\n query: string;\n /** Optional variables for parameterized queries */\n variables?: GraphQLVariables;\n /** Optional name of the operation to execute */\n operationName?: string;\n}\n\n/**\n * Represents a GraphQL error returned from the server.\n */\nexport interface GraphQLError {\n /** Error message */\n message: string;\n /** Source locations in the GraphQL document where the error occurred */\n locations?: { line: number; column: number }[];\n /** Path in the query where the error occurred */\n path?: string[];\n /** Additional error information specific to the GraphQL implementation */\n extensions?: any; // eslint-disable-line @typescript-eslint/no-explicit-any\n}\n\n/**\n * Standard GraphQL response format as defined by the GraphQL specification.\n */\n// eslint-disable-next-line @typescript-eslint/no-explicit-any\nexport interface GraphQLResponse<T = any> {\n /** The data returned from successful execution */\n data?: T;\n /** Array of errors if execution was unsuccessful or partially successful */\n errors?: GraphQLError[];\n}\n\n/**\n * Response wrapper for GraphQL operations with additional metadata.\n */\n// eslint-disable-next-line @typescript-eslint/no-explicit-any\nexport interface FetchResponse<T = any> {\n /** The parsed response body */\n body: T;\n /** HTTP status code of the response */\n status: number;\n /** HTTP headers from the response */\n headers: Headers;\n}\n\n/**\n * GraphQL client interface providing methods for executing queries and mutations\n */\nexport interface Client {\n /**\n * Execute a GraphQL query operation\n *\n * Queries are used to fetch data and should not modify any data on the server.\n *\n * @param request - GraphQL request object containing query and optional variables\n * @param options - Additional fetch options to apply to the request\n * @returns Promise with the GraphQL response and metadata\n */\n post: (\n request: GraphQLRequest,\n options?: RequestInit,\n ) => Promise<FetchResponse<GraphQLResponse>>;\n}\n\n/**\n * Creates a GraphQL API client for interacting with a GraphQL endpoint.\n *\n * This client provides methods for executing queries and mutations against\n * a GraphQL API, with support for middleware functions to handle authentication,\n * error handling, and other cross-cutting concerns.\n *\n * @param baseURL - Base URL for the GraphQL endpoint\n * @param chainFunctions - Array of middleware functions for the fetch chain\n * @returns GraphQL client with query and mutation methods\n */\nexport const createAPIClient = (\n baseURL: string,\n chainFunctions: ChainFunction[] = [],\n) => {\n const enhancedFetch = createEnhancedFetch(chainFunctions);\n\n const executeOperation = async (\n request: GraphQLRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<GraphQLResponse>> => {\n const response = await enhancedFetch(`${baseURL}`, {\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n },\n body: JSON.stringify(request),\n ...options,\n });\n\n const body = await response.text();\n const data: GraphQLResponse = body ? JSON.parse(body) : {};\n\n const resp = {\n body: data,\n status: response.status,\n headers: response.headers,\n };\n\n if (data.errors) {\n throw resp;\n }\n\n return resp;\n };\n\n const post = (\n request: GraphQLRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<GraphQLResponse>> => {\n return executeOperation(request, options);\n };\n\n return {\n post,\n } as Client;\n};\n"],"names":["baseURL","chainFunctions","enhancedFetch","createEnhancedFetch","post","request","options","async","response","method","headers","body","JSON","stringify","text","data","parse","resp","status","errors","executeOperation"],"mappings":"0IAkG+B,CAC7BA,EACAC,EAAkC,MAE5B,MAAAC,EAAgBC,sBAAoBF,GAsCnC,MAAA,CACLG,KARW,CACXC,EACAC,IA/BuBC,OACvBF,EACAC,KAEA,MAAME,QAAiBN,EAAc,GAAGF,IAAW,CACjDS,OAAQ,OACRC,QAAS,CACP,eAAgB,oBAElBC,KAAMC,KAAKC,UAAUR,MAClBC,IAGCK,QAAaH,EAASM,OACtBC,EAAwBJ,EAAOC,KAAKI,MAAML,GAAQ,CAAC,EAEnDM,EAAO,CACXN,KAAMI,EACNG,OAAQV,EAASU,OACjBR,QAASF,EAASE,SAGpB,GAAIK,EAAKI,OACD,MAAAF,EAGD,OAAAA,CAAA,EAOAG,CAAiBf,EAASC,GAKnC"}
@@ -0,0 +1,35 @@
1
+ import { createEnhancedFetch } from "./fetch.es.js";
2
+ const createAPIClient = (baseURL, chainFunctions = []) => {
3
+ const enhancedFetch = createEnhancedFetch(chainFunctions);
4
+ const executeOperation = async (request, options) => {
5
+ const response = await enhancedFetch(`${baseURL}`, {
6
+ method: "POST",
7
+ headers: {
8
+ "Content-Type": "application/json"
9
+ },
10
+ body: JSON.stringify(request),
11
+ ...options
12
+ });
13
+ const body = await response.text();
14
+ const data = body ? JSON.parse(body) : {};
15
+ const resp = {
16
+ body: data,
17
+ status: response.status,
18
+ headers: response.headers
19
+ };
20
+ if (data.errors) {
21
+ throw resp;
22
+ }
23
+ return resp;
24
+ };
25
+ const post = (request, options) => {
26
+ return executeOperation(request, options);
27
+ };
28
+ return {
29
+ post
30
+ };
31
+ };
32
+ export {
33
+ createAPIClient
34
+ };
35
+ //# sourceMappingURL=graphql.es.js.map