@nhost/nhost-js 3.2.8 → 5.0.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +73 -37
- package/dist/nhost-js/auth.cjs.js +2 -0
- package/dist/nhost-js/auth.cjs.js.map +1 -0
- package/dist/nhost-js/auth.es.js +589 -0
- package/dist/nhost-js/auth.es.js.map +1 -0
- package/dist/nhost-js/fetch.cjs.js +2 -0
- package/dist/nhost-js/fetch.cjs.js.map +1 -0
- package/dist/nhost-js/fetch.es.js +10 -0
- package/dist/nhost-js/fetch.es.js.map +1 -0
- package/dist/nhost-js/functions.cjs.js +2 -0
- package/dist/nhost-js/functions.cjs.js.map +1 -0
- package/dist/nhost-js/functions.es.js +31 -0
- package/dist/nhost-js/functions.es.js.map +1 -0
- package/dist/nhost-js/graphql.cjs.js +2 -0
- package/dist/nhost-js/graphql.cjs.js.map +1 -0
- package/dist/nhost-js/graphql.es.js +35 -0
- package/dist/nhost-js/graphql.es.js.map +1 -0
- package/dist/nhost-js/storage.cjs.js +2 -0
- package/dist/nhost-js/storage.cjs.js.map +1 -0
- package/dist/nhost-js/storage.es.js +205 -0
- package/dist/nhost-js/storage.es.js.map +1 -0
- package/dist/nhost-js.cjs.js +2 -0
- package/dist/nhost-js.cjs.js.map +1 -0
- package/dist/nhost-js.es.js +497 -0
- package/dist/nhost-js.es.js.map +1 -0
- package/dist/nhost-js.umd.js +2 -0
- package/dist/nhost-js.umd.js.map +1 -0
- package/dist/src/auth/client.d.ts +430 -0
- package/dist/src/auth/client.d.ts.map +1 -0
- package/dist/src/auth/client.js +727 -0
- package/dist/src/auth/client.js.map +1 -0
- package/dist/src/auth/index.d.ts +11 -0
- package/dist/src/auth/index.d.ts.map +1 -0
- package/dist/src/auth/index.js +11 -0
- package/dist/src/auth/index.js.map +1 -0
- package/dist/src/auth/interface.d.ts +142 -0
- package/dist/src/auth/interface.d.ts.map +1 -0
- package/dist/src/auth/interface.js +2 -0
- package/dist/src/auth/interface.js.map +1 -0
- package/dist/src/fetch/index.d.ts +53 -0
- package/dist/src/fetch/index.d.ts.map +1 -0
- package/dist/src/fetch/index.js +40 -0
- package/dist/src/fetch/index.js.map +1 -0
- package/dist/src/functions/client.d.ts +47 -0
- package/dist/src/functions/client.d.ts.map +1 -0
- package/dist/src/functions/client.js +62 -0
- package/dist/src/functions/client.js.map +1 -0
- package/dist/src/functions/index.d.ts +10 -0
- package/dist/src/functions/index.d.ts.map +1 -0
- package/dist/src/functions/index.js +10 -0
- package/dist/src/functions/index.js.map +1 -0
- package/dist/src/graphql/client.d.ts +89 -0
- package/dist/src/graphql/client.d.ts.map +1 -0
- package/dist/src/graphql/client.js +49 -0
- package/dist/src/graphql/client.js.map +1 -0
- package/dist/src/graphql/index.d.ts +10 -0
- package/dist/src/graphql/index.d.ts.map +1 -0
- package/dist/src/graphql/index.js +10 -0
- package/dist/src/graphql/index.js.map +1 -0
- package/dist/src/index.d.ts +184 -0
- package/dist/src/index.d.ts.map +1 -0
- package/dist/src/index.js +251 -0
- package/dist/src/index.js.map +1 -0
- package/dist/src/middlewareAttachToken.d.ts +24 -0
- package/dist/src/middlewareAttachToken.d.ts.map +1 -0
- package/dist/src/middlewareAttachToken.js +60 -0
- package/dist/src/middlewareAttachToken.js.map +1 -0
- package/dist/src/middlewareRefreshSession.d.ts +43 -0
- package/dist/src/middlewareRefreshSession.d.ts.map +1 -0
- package/dist/src/middlewareRefreshSession.js +190 -0
- package/dist/src/middlewareRefreshSession.js.map +1 -0
- package/dist/src/middlewareResponseSession.d.ts +26 -0
- package/dist/src/middlewareResponseSession.d.ts.map +1 -0
- package/dist/src/middlewareResponseSession.js +83 -0
- package/dist/src/middlewareResponseSession.js.map +1 -0
- package/dist/src/sessionStorage.d.ts +123 -0
- package/dist/src/sessionStorage.d.ts.map +1 -0
- package/dist/src/sessionStorage.js +165 -0
- package/dist/src/sessionStorage.js.map +1 -0
- package/dist/src/storage/client.d.ts +184 -0
- package/dist/src/storage/client.d.ts.map +1 -0
- package/dist/src/storage/client.js +249 -0
- package/dist/src/storage/client.js.map +1 -0
- package/dist/src/storage/index.d.ts +11 -0
- package/dist/src/storage/index.d.ts.map +1 -0
- package/dist/src/storage/index.js +11 -0
- package/dist/src/storage/index.js.map +1 -0
- package/dist/src/storage/interface.d.ts +52 -0
- package/dist/src/storage/interface.d.ts.map +1 -0
- package/dist/src/storage/interface.js +2 -0
- package/dist/src/storage/interface.js.map +1 -0
- package/dist/tsconfig.tsbuildinfo +1 -0
- package/package.json +109 -63
- package/LICENSE +0 -21
- package/dist/clients/auth.d.ts +0 -8
- package/dist/clients/auth.d.ts.map +0 -1
- package/dist/clients/functions/index.d.ts +0 -107
- package/dist/clients/functions/index.d.ts.map +0 -1
- package/dist/clients/functions/types.d.ts +0 -28
- package/dist/clients/functions/types.d.ts.map +0 -1
- package/dist/clients/graphql.d.ts +0 -8
- package/dist/clients/graphql.d.ts.map +0 -1
- package/dist/clients/index.d.ts +0 -6
- package/dist/clients/index.d.ts.map +0 -1
- package/dist/clients/nhost.d.ts +0 -83
- package/dist/clients/nhost.d.ts.map +0 -1
- package/dist/clients/storage.d.ts +0 -8
- package/dist/clients/storage.d.ts.map +0 -1
- package/dist/index.cjs.js +0 -2
- package/dist/index.cjs.js.map +0 -1
- package/dist/index.d.ts +0 -6
- package/dist/index.d.ts.map +0 -1
- package/dist/index.esm.js +0 -344
- package/dist/index.esm.js.map +0 -1
- package/dist/utils/helpers.d.ts +0 -20
- package/dist/utils/helpers.d.ts.map +0 -1
- package/dist/utils/types.d.ts +0 -57
- package/dist/utils/types.d.ts.map +0 -1
- package/umd/nhost-js.umd.js +0 -22
- package/umd/nhost-js.umd.js.map +0 -1
package/README.md
CHANGED
|
@@ -1,52 +1,88 @@
|
|
|
1
|
-
|
|
2
|
-
<h2 align="center">Nhost JavaScript SDK</h2>
|
|
1
|
+
# Nhost JavaScript SDK
|
|
3
2
|
|
|
4
|
-
|
|
5
|
-
<img alt="npm" src="https://img.shields.io/npm/v/@nhost/nhost-js">
|
|
6
|
-
<img alt="npm" src="https://img.shields.io/npm/dm/@nhost/nhost-js">
|
|
7
|
-
<a href="LICENSE">
|
|
8
|
-
<img src="https://img.shields.io/badge/license-MIT-yellow.svg" alt="license: MIT" />
|
|
9
|
-
</a>
|
|
10
|
-
</p>
|
|
3
|
+
The Nhost JavaScript SDK provides a client-side interface to interact with Nhost services, including authentication, storage, and GraphQL operations.
|
|
11
4
|
|
|
12
|
-
##
|
|
13
|
-
|
|
14
|
-
[Reference documentation](https://docs.nhost.io/reference/javascript)
|
|
5
|
+
## Installation
|
|
15
6
|
|
|
16
|
-
|
|
7
|
+
```bash
|
|
8
|
+
# npm
|
|
9
|
+
npm install @nhost/nhost-js@beta
|
|
17
10
|
|
|
18
|
-
|
|
19
|
-
|
|
11
|
+
# yarn
|
|
12
|
+
yarn add @nhost/nhost-js@beta
|
|
20
13
|
|
|
21
|
-
#
|
|
22
|
-
|
|
14
|
+
# pnpm
|
|
15
|
+
pnpm add @nhost/nhost-js@beta
|
|
23
16
|
```
|
|
24
17
|
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
```
|
|
28
|
-
import {
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
18
|
+
## Quick Start
|
|
19
|
+
|
|
20
|
+
```typescript
|
|
21
|
+
import { createClient } from "@nhost/nhost-js";
|
|
22
|
+
|
|
23
|
+
// Initialize the Nhost client
|
|
24
|
+
const nhost = createClient({
|
|
25
|
+
subdomain: "your-project",
|
|
26
|
+
region: "eu-central-1",
|
|
27
|
+
});
|
|
28
|
+
|
|
29
|
+
// Use authentication features
|
|
30
|
+
const response = await nhost.auth.signInEmailPassword({
|
|
31
|
+
email: "user@example.com",
|
|
32
|
+
password: "password123",
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
if (response.body.session) {
|
|
36
|
+
console.log("Signed in successfully!");
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
// Use GraphQL features
|
|
40
|
+
const response = await nhost.graphql.post({
|
|
41
|
+
query: `
|
|
42
|
+
query GetUsers {
|
|
43
|
+
users {
|
|
44
|
+
id
|
|
45
|
+
displayName
|
|
46
|
+
email
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
`,
|
|
50
|
+
});
|
|
51
|
+
|
|
52
|
+
return response.body.data.users;
|
|
53
|
+
|
|
54
|
+
// Use storage features
|
|
55
|
+
const response = await nhost.storage.uploadFiles({
|
|
56
|
+
"file[]": [file],
|
|
57
|
+
});
|
|
58
|
+
|
|
59
|
+
return response.body.processedFiles[0];
|
|
60
|
+
|
|
61
|
+
// call a serverless function
|
|
62
|
+
const response = await nhost.functions.fetch("/echo", {
|
|
63
|
+
method: "POST",
|
|
64
|
+
body: JSON.stringify({
|
|
65
|
+
message: "Hello, world!",
|
|
66
|
+
}),
|
|
67
|
+
headers: {
|
|
68
|
+
"Content-Type": "application/json",
|
|
69
|
+
},
|
|
70
|
+
});
|
|
34
71
|
```
|
|
35
72
|
|
|
36
|
-
##
|
|
37
|
-
|
|
38
|
-
### GraphQL
|
|
73
|
+
## Modules
|
|
39
74
|
|
|
40
|
-
|
|
75
|
+
The Nhost SDK consists of several modules:
|
|
41
76
|
|
|
42
|
-
|
|
77
|
+
- **Auth**: User authentication and session management
|
|
78
|
+
- **Storage**: File upload, download, and management
|
|
79
|
+
- **GraphQL**: Executing queries and mutations against your Hasura GraphQL API
|
|
80
|
+
- **Functions**: Invoking serverless functions
|
|
43
81
|
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
### Storage
|
|
82
|
+
## Documentation
|
|
47
83
|
|
|
48
|
-
|
|
84
|
+
For detailed documentation and API reference, see the [Nhost Documentation](https://docs.nhost.io).
|
|
49
85
|
|
|
50
|
-
|
|
86
|
+
## License
|
|
51
87
|
|
|
52
|
-
|
|
88
|
+
MIT
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("./fetch.cjs.js");exports.createAPIClient=(s,e=[])=>{let a=t.createEnhancedFetch(e);const n=()=>s+"/healthz",r=()=>s+"/healthz",i=()=>s+"/version",o=()=>s+"/token",d=()=>s+"/signout",u=()=>s+"/signin/email-password",h=()=>s+"/signin/mfa/totp",l=()=>s+"/signin/passwordless/email",c=()=>s+"/signup/email-password",y=()=>s+"/user/mfa",p=()=>s+"/mfa/totp/generate",w=()=>s+"/.well-known/jwks.json",S=()=>s+"/pat",O=()=>s+"/signin/anonymous",f=()=>s+"/signin/otp/email",T=()=>s+"/signin/otp/email/verify",g=()=>s+"/signin/pat",m=()=>s+"/signin/idtoken",b=()=>s+"/link/idtoken",J=()=>s+"/user/deanonymize",N=()=>s+"/user/email/change",k=()=>s+"/user/email/send-verification-email",P=()=>s+"/user/password",x=()=>s+"/user/password/reset",j=t=>{const e=new URLSearchParams;Object.entries(t||{}).forEach((([t,s])=>{void 0!==s&&e.append(t,null===s?"null":s.toString())}));const a=e.toString();return a.length>0?s+`/verify?${a}`:s+"/verify"};return{healthCheckHead:async t=>{const s=await a(n(),{...t,method:"HEAD"}),e=[204,205,304,412].includes(s.status)?null:await s.text(),r={body:e?JSON.parse(e):{},status:s.status,headers:s.headers};if(!s.ok)throw r;return r},healthCheckGet:async t=>{const s=await a(r(),{...t,method:"GET"}),e=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:e?JSON.parse(e):{},status:s.status,headers:s.headers};if(!s.ok)throw n;return n},getVersion:async t=>{const s=await a(i(),{...t,method:"GET"}),e=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:e?JSON.parse(e):{},status:s.status,headers:s.headers};if(!s.ok)throw n;return n},refreshToken:async(t,s)=>{const e=await a(o(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signOut:async(t,s)=>{const e=await a(d(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInEmailPassword:async(t,s)=>{const e=await a(u(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInVerifyMfaTotp:async(t,s)=>{const e=await a(h(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInPasswordlessEmail:async(t,s)=>{const e=await a(l(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signUpEmailPassword:async(t,s)=>{const e=await a(c(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},changeUserMfaVerify:async(t,s)=>{const e=await a(y(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},changeUserMfa:async t=>{const s=await a(p(),{...t,method:"GET"}),e=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:e?JSON.parse(e):{},status:s.status,headers:s.headers};if(!s.ok)throw n;return n},getJWKs:async t=>{const s=await a(w(),{...t,method:"GET"}),e=[204,205,304,412].includes(s.status)?null:await s.text(),n={body:e?JSON.parse(e):{},status:s.status,headers:s.headers};if(!s.ok)throw n;return n},createPAT:async(t,s)=>{const e=await a(S(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInAnonymous:async(t,s)=>{const e=await a(O(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInOTPEmail:async(t,s)=>{const e=await a(f(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},verifySignInOTPEmail:async(t,s)=>{const e=await a(T(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInPAT:async(t,s)=>{const e=await a(g(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},signInIdToken:async(t,s)=>{const e=await a(m(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},linkIdToken:async(t,s)=>{const e=await a(b(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},deanonymizeUser:async(t,s)=>{const e=await a(J(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},changeUserEmail:async(t,s)=>{const e=await a(N(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},sendVerificationEmail:async(t,s)=>{const e=await a(k(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},changeUserPassword:async(t,s)=>{const e=await a(P(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},sendPasswordResetEmail:async(t,s)=>{const e=await a(x(),{...s,method:"POST",headers:{"Content-Type":"application/json",...s?.headers},body:JSON.stringify(t)}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},verifyTicket:async(t,s)=>{const e=await a(j(t),{...s,method:"GET"}),n=[204,205,304,412].includes(e.status)?null:await e.text(),r={body:n?JSON.parse(n):{},status:e.status,headers:e.headers};if(!e.ok)throw r;return r},pushChainFunction:s=>{e.push(s),a=t.createEnhancedFetch(e)},baseURL:s}};
|
|
2
|
+
//# sourceMappingURL=auth.cjs.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.cjs.js","sources":["../../src/auth/client.ts"],"sourcesContent":["/**\n * Generated by orval v7.9.0 🍺\n * Do not edit manually.\n * Nhost Authentication API\n * Comprehensive authentication service for managing user identities, sessions, and authentication methods\n * OpenAPI spec version: 1.0.0\n */\nimport { createEnhancedFetch } from \"../fetch\";\nimport type { ChainFunction } from \"../fetch\";\n\nimport type { Client } from \"./interface\";\n\n/**\n * JSON Web Key Set for verifying JWT signatures\n */\nexport interface JWKSet {\n /** Array of public keys */\n keys: Jwk[];\n}\n\n/**\n * JSON Web Key for JWT verification\n */\nexport interface Jwk {\n /** Algorithm used with this key */\n alg: string;\n /** RSA public exponent */\n e: string;\n /** Key ID */\n kid: string;\n /** Key type */\n kty: string;\n /** RSA modulus */\n n: string;\n /** Key usage */\n use: string;\n}\n\n/**\n * Request to refresh an access token\n */\nexport interface RefreshTokenRequest {\n /**\n * Refresh token used to generate a new access token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n}\n\nexport interface SignOutSchema {\n /** Refresh token for the current session */\n refreshToken: string;\n /** Sign out from all connected devices */\n all?: boolean;\n}\n\nexport type CreatePATRequestMetadata = { [key: string]: unknown };\n\nexport interface CreatePATRequest {\n /** Expiration date of the PAT */\n expiresAt: string;\n metadata?: CreatePATRequestMetadata;\n}\n\nexport interface CreatePATResponse {\n /**\n * ID of the PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /**\n * PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * Error code identifying the specific application error\n */\nexport type ErrorResponseError =\n | \"default-role-must-be-in-allowed-roles\"\n | \"disabled-endpoint\"\n | \"disabled-user\"\n | \"email-already-in-use\"\n | \"email-already-verified\"\n | \"forbidden-anonymous\"\n | \"internal-server-error\"\n | \"invalid-email-password\"\n | \"invalid-request\"\n | \"locale-not-allowed\"\n | \"password-too-short\"\n | \"password-in-hibp-database\"\n | \"redirectTo-not-allowed\"\n | \"role-not-allowed\"\n | \"signup-disabled\"\n | \"unverified-user\"\n | \"user-not-anonymous\"\n | \"invalid-pat\"\n | \"invalid-refresh-token\"\n | \"invalid-ticket\"\n | \"disabled-mfa-totp\"\n | \"no-totp-secret\"\n | \"invalid-totp\"\n | \"mfa-type-not-found\"\n | \"totp-already-active\";\n/**\n * Standardized error response\n */\nexport interface ErrorResponse {\n /** HTTP status error code */\n status: number;\n /** Human-friendly error message */\n message: string;\n /** Error code identifying the specific application error */\n error: ErrorResponseError;\n}\n\n/**\n * Response for email-password authentication that may include a session or MFA challenge\n */\nexport interface SignInEmailPasswordResponse {\n /** User session if authentication was successful. Null if MFA challenge is required. */\n session?: Session;\n /** MFA challenge if two-factor authentication is required */\n mfa?: MFAChallengePayload;\n}\n\n/**\n * Challenge payload for multi-factor authentication\n */\nexport interface MFAChallengePayload {\n /** Ticket to use when completing the MFA challenge */\n ticket: string;\n}\n\n/**\n * Container for session information\n */\nexport interface SessionPayload {\n /** User session data. Null if authentication requires additional steps. */\n session?: Session;\n}\n\n/**\n * User authentication session containing tokens and user information\n */\nexport interface Session {\n /** JWT token for authenticating API requests */\n accessToken: string;\n /** Expiration time of the access token in seconds */\n accessTokenExpiresIn: number;\n /**\n * Identifier for the refresh token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshTokenId: string;\n /**\n * Token used to refresh the access token\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n /** Information about the authenticated user */\n user?: User;\n}\n\nexport interface SignInPATRequest {\n /**\n * PAT\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * Custom metadata associated with the user\n */\nexport type UserMetadata = { [key: string]: unknown };\n\n/**\n * User profile and account information\n */\nexport interface User {\n /** URL to the user's profile picture */\n avatarUrl: string;\n /** Timestamp when the user account was created */\n createdAt: string;\n /** Default authorization role for the user */\n defaultRole: string;\n /** User's display name */\n displayName: string;\n /** User's email address */\n email?: string;\n /** Whether the user's email has been verified */\n emailVerified: boolean;\n /**\n * Unique identifier for the user\n * @pattern \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /** Whether this is an anonymous user account */\n isAnonymous: boolean;\n /**\n * User's preferred locale (language code)\n * @minLength 2\n * @maxLength 2\n */\n locale: string;\n /** Custom metadata associated with the user */\n metadata: UserMetadata;\n /** User's phone number */\n phoneNumber?: string;\n /** Whether the user's phone number has been verified */\n phoneNumberVerified: boolean;\n /** List of roles assigned to the user */\n roles: string[];\n}\n\n/**\n * Which sign-in method to use\n */\nexport type UserDeanonymizeRequestSignInMethod =\n | \"email-password\"\n | \"passwordless\";\nexport interface UserDeanonymizeRequest {\n /** Which sign-in method to use */\n signInMethod: UserDeanonymizeRequestSignInMethod;\n /** A valid email */\n email: string;\n /**\n * A password of minimum 3 characters\n * @minLength 3\n * @maxLength 50\n */\n password?: string;\n /**\n * Deprecated, will be ignored\n * @deprecated\n */\n connection?: string;\n options?: SignUpOptions;\n}\n\nexport interface UserEmailChangeRequest {\n /** A valid email */\n newEmail: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserEmailSendVerificationEmailRequest {\n /** A valid email */\n email: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserPasswordResetRequest {\n /** A valid email */\n email: string;\n options?: OptionsRedirectTo;\n}\n\nexport interface UserPasswordRequest {\n /**\n * A password of minimum 3 characters\n * @minLength 3\n * @maxLength 50\n */\n newPassword: string;\n /**\n * Ticket to reset the password, required if the user is not authenticated\n * @pattern ^passwordReset\\:.*$\n */\n ticket?: string;\n}\n\nexport type OKResponse = \"OK\";\nexport interface OptionsRedirectTo {\n redirectTo?: string;\n}\n\nexport type SigninAnonymousRequestMetadata = { [key: string]: unknown };\n\nexport interface SigninAnonymousRequest {\n displayName?: string;\n /**\n * A two-characters locale\n * @minLength 2\n * @maxLength 2\n */\n locale?: string;\n metadata?: SigninAnonymousRequestMetadata;\n}\n\n/**\n * Request to authenticate using email and password\n */\nexport interface SignInEmailPasswordRequest {\n /** User's email address */\n email: string;\n /**\n * User's password\n * @minLength 3\n * @maxLength 50\n */\n password: string;\n}\n\nexport interface SignInPasswordlessEmailRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInOTPEmailRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInOTPEmailVerifyRequest {\n /** One time password */\n otp: string;\n /** A valid email */\n email: string;\n}\n\nexport interface SignInOTPEmailVerifyResponse {\n session?: Session;\n}\n\n/**\n * Request to register a new user with email and password\n */\nexport interface SignUpEmailPasswordRequest {\n /** Email address for the new user account */\n email: string;\n /**\n * Password for the new user account\n * @minLength 3\n * @maxLength 50\n */\n password: string;\n /** Optional configuration for the new user account */\n options?: SignUpOptions;\n}\n\nexport type SignUpOptionsMetadata = { [key: string]: unknown };\n\nexport interface SignUpOptions {\n allowedRoles?: string[];\n defaultRole?: string;\n /**\n * @maxLength 32\n * @pattern ^[\\p{L}\\p{N}\\p{S} ,.'-]+$\n */\n displayName?: string;\n /**\n * A two-characters locale\n * @minLength 2\n * @maxLength 2\n */\n locale?: string;\n metadata?: SignUpOptionsMetadata;\n redirectTo?: string;\n}\n\nexport interface SignInWebauthnRequest {\n /** A valid email */\n email?: string;\n}\n\nexport interface SignUpWebauthnRequest {\n /** A valid email */\n email: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInWebauthnResponse {\n [key: string]: unknown;\n}\n\nexport interface SignUpWebauthnResponse {\n [key: string]: unknown;\n}\n\nexport type SignInWebauthnVerifyRequestCredential = { [key: string]: unknown };\n\nexport interface SignInWebauthnVerifyRequest {\n /**\n * A valid email. Deprecated, no longer used\n * @deprecated\n */\n email?: string;\n credential: SignInWebauthnVerifyRequestCredential;\n [key: string]: unknown;\n}\n\nexport type SignUpWebauthnVerifyRequestCredential = { [key: string]: unknown };\n\nexport type SignUpWebauthnVerifyRequestOptionsAllOf = {\n nickname?: string;\n};\n\nexport type SignUpWebauthnVerifyRequestOptions = SignUpOptions &\n SignUpWebauthnVerifyRequestOptionsAllOf;\n\nexport interface SignUpWebauthnVerifyRequest {\n credential?: SignUpWebauthnVerifyRequestCredential;\n options?: SignUpWebauthnVerifyRequestOptions;\n [key: string]: unknown;\n}\n\nexport interface SignInIdTokenRequest {\n provider: Provider;\n /** Apple ID token */\n idToken: string;\n /** Nonce used during sign in process */\n nonce?: string;\n options?: SignUpOptions;\n}\n\nexport interface SignInMfaTotpRequest {\n /**\n * Ticket\n * @pattern ^mfaTotp:.*$\n */\n ticket: string;\n /** One time password */\n otp: string;\n}\n\nexport type Provider = \"apple\" | \"google\";\nexport interface LinkIdTokenRequest {\n provider: Provider;\n /** Apple ID token */\n idToken: string;\n /** Nonce used during sign in process */\n nonce?: string;\n}\n\n/**\n * Type of MFA to activate. Use empty string to disable MFA.\n */\nexport type UserMfaRequestActiveMfaType = \"totp\" | \"\";\n/**\n * Request to activate or deactivate multi-factor authentication\n */\nexport interface UserMfaRequest {\n /** Verification code from the authenticator app when activating MFA */\n code: string;\n /** Type of MFA to activate. Use empty string to disable MFA. */\n activeMfaType?: UserMfaRequestActiveMfaType;\n}\n\n/**\n * Response containing TOTP setup information for MFA\n */\nexport interface TotpGenerateResponse {\n /** URL to QR code image for scanning with an authenticator app */\n imageUrl: string;\n /** TOTP secret key for manual setup with an authenticator app */\n totpSecret: string;\n}\n\n/**\n * Ticket\n */\nexport type TicketQueryParameter = string;\n\n/**\n * Type of the ticket\n */\nexport type TicketTypeQueryParameter =\n | \"emailVerify\"\n | \"emailConfirmChange\"\n | \"signinPasswordless\"\n | \"passwordReset\";\n/**\n * Target URL for the redirect\n */\nexport type RedirectToQueryParameter = string;\n\nexport type GetVersion200 = {\n /** The version of the authentication service */\n version: string;\n};\n\nexport type VerifyTicketParams = {\n /**\n * Ticket\n */\n ticket: TicketQueryParameter;\n /**\n * Type of the ticket. Deprecated, no longer used\n * @deprecated\n */\n type?: TicketTypeQueryParameter;\n /**\n * Target URL for the redirect\n */\n redirectTo: RedirectToQueryParameter;\n};\n\nexport type FetchResponse<T> = {\n body: T;\n status: number;\n headers: Headers;\n};\n\nexport const createAPIClient = (\n baseURL: string,\n chainFunctions: ChainFunction[] = [],\n): Client => {\n let fetch = createEnhancedFetch(chainFunctions);\n\n const pushChainFunction = (chainFunction: ChainFunction) => {\n chainFunctions.push(chainFunction);\n fetch = createEnhancedFetch(chainFunctions);\n };\n\n /**\n * Verify if the authentication service is operational using HEAD method\n * @summary Health check (HEAD)\n */\n const healthCheckHead = async (\n options?: RequestInit,\n ): Promise<FetchResponse<void>> => {\n const res = await fetch(getHealthCheckHeadUrl(), {\n ...options,\n method: \"HEAD\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: void = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<void>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getHealthCheckHeadUrl = () => {\n return baseURL + `/healthz`;\n };\n\n /**\n * Verify if the authentication service is operational using GET method\n * @summary Health check (GET)\n */\n const healthCheckGet = async (\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getHealthCheckGetUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getHealthCheckGetUrl = () => {\n return baseURL + `/healthz`;\n };\n\n /**\n * Retrieve version information about the authentication service\n * @summary Get service version\n */\n const getVersion = async (\n options?: RequestInit,\n ): Promise<FetchResponse<GetVersion200>> => {\n const res = await fetch(getGetVersionUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: GetVersion200 = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<GetVersion200>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getGetVersionUrl = () => {\n return baseURL + `/version`;\n };\n\n /**\n * Generate a new JWT access token using a valid refresh token. The refresh token used will be revoked and a new one will be issued.\n * @summary Refresh access token\n */\n const refreshToken = async (\n refreshTokenRequest: RefreshTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<Session>> => {\n const res = await fetch(getRefreshTokenUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(refreshTokenRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: Session = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<Session>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getRefreshTokenUrl = () => {\n return baseURL + `/token`;\n };\n\n /**\n * @summary Sign out\n */\n const signOut = async (\n signOutSchema: SignOutSchema,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignOutUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signOutSchema),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignOutUrl = () => {\n return baseURL + `/signout`;\n };\n\n /**\n * Authenticate a user with their email and password. Returns a session object or MFA challenge if two-factor authentication is enabled.\n * @summary Sign in with email and password\n */\n const signInEmailPassword = async (\n signInEmailPasswordRequest: SignInEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInEmailPasswordResponse>> => {\n const res = await fetch(getSignInEmailPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInEmailPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInEmailPasswordResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SignInEmailPasswordResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInEmailPasswordUrl = () => {\n return baseURL + `/signin/email-password`;\n };\n\n /**\n * Complete the multi-factor authentication by verifying a Time-based One-Time Password (TOTP). Returns a session if validation is successful.\n * @summary Verify TOTP for MFA\n */\n const signInVerifyMfaTotp = async (\n signInMfaTotpRequest: SignInMfaTotpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignInVerifyMfaTotpUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInMfaTotpRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInVerifyMfaTotpUrl = () => {\n return baseURL + `/signin/mfa/totp`;\n };\n\n /**\n * Initiate passwordless authentication by sending a magic link to the user's email. If the user doesn't exist, a new account will be created with the provided options.\n * @summary Sign in with magic link email\n */\n const signInPasswordlessEmail = async (\n signInPasswordlessEmailRequest: SignInPasswordlessEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignInPasswordlessEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInPasswordlessEmailRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInPasswordlessEmailUrl = () => {\n return baseURL + `/signin/passwordless/email`;\n };\n\n /**\n * Register a new user account with email and password. Returns a session if email verification is not required, otherwise returns null session.\n * @summary Sign up with email and password\n */\n const signUpEmailPassword = async (\n signUpEmailPasswordRequest: SignUpEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignUpEmailPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signUpEmailPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignUpEmailPasswordUrl = () => {\n return baseURL + `/signup/email-password`;\n };\n\n /**\n * Activate or deactivate multi-factor authentication for the authenticated user\n * @summary Manage multi-factor authentication\n */\n const changeUserMfaVerify = async (\n userMfaRequest: UserMfaRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getChangeUserMfaVerifyUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userMfaRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserMfaVerifyUrl = () => {\n return baseURL + `/user/mfa`;\n };\n\n /**\n * Generate a Time-based One-Time Password (TOTP) secret for setting up multi-factor authentication\n * @summary Generate TOTP secret\n */\n const changeUserMfa = async (\n options?: RequestInit,\n ): Promise<FetchResponse<TotpGenerateResponse>> => {\n const res = await fetch(getChangeUserMfaUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: TotpGenerateResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<TotpGenerateResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserMfaUrl = () => {\n return baseURL + `/mfa/totp/generate`;\n };\n\n /**\n * @summary Get public keys for JWT verification in JWK Set format\n */\n const getJWKs = async (\n options?: RequestInit,\n ): Promise<FetchResponse<JWKSet>> => {\n const res = await fetch(getGetJWKsUrl(), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: JWKSet = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<JWKSet>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getGetJWKsUrl = () => {\n return baseURL + `/.well-known/jwks.json`;\n };\n\n /**\n * @summary Create a Personal Access Token (PAT)\n */\n const createPAT = async (\n createPATRequest: CreatePATRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<CreatePATResponse>> => {\n const res = await fetch(getCreatePATUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(createPATRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: CreatePATResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<CreatePATResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getCreatePATUrl = () => {\n return baseURL + `/pat`;\n };\n\n /**\n * @summary Sign in anonymously\n */\n const signInAnonymous = async (\n signinAnonymousRequest?: SigninAnonymousRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignInAnonymousUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signinAnonymousRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInAnonymousUrl = () => {\n return baseURL + `/signin/anonymous`;\n };\n\n /**\n * @summary Sign in with a one time password sent to user's email. If the user doesn't exist, it will be created. The options object is optional and can be used to configure the user's when signing up a new user. It is ignored if the user already exists.\n */\n const signInOTPEmail = async (\n signInOTPEmailRequest: SignInOTPEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSignInOTPEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInOTPEmailRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInOTPEmailUrl = () => {\n return baseURL + `/signin/otp/email`;\n };\n\n /**\n * @summary Verify OTP and return a session if validation is successful\n */\n const verifySignInOTPEmail = async (\n signInOTPEmailVerifyRequest: SignInOTPEmailVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInOTPEmailVerifyResponse>> => {\n const res = await fetch(getVerifySignInOTPEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInOTPEmailVerifyRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInOTPEmailVerifyResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SignInOTPEmailVerifyResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getVerifySignInOTPEmailUrl = () => {\n return baseURL + `/signin/otp/email/verify`;\n };\n\n /**\n * @summary Sign in with Personal Access Token (PAT)\n */\n const signInPAT = async (\n signInPATRequest: SignInPATRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignInPATUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInPATRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInPATUrl = () => {\n return baseURL + `/signin/pat`;\n };\n\n /**\n * @summary Sign in with in an id token\n */\n const signInIdToken = async (\n signInIdTokenRequest: SignInIdTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const res = await fetch(getSignInIdTokenUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(signInIdTokenRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSignInIdTokenUrl = () => {\n return baseURL + `/signin/idtoken`;\n };\n\n /**\n * @summary Link a user account with the provider's account using an id token\n */\n const linkIdToken = async (\n linkIdTokenRequest: LinkIdTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getLinkIdTokenUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(linkIdTokenRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getLinkIdTokenUrl = () => {\n return baseURL + `/link/idtoken`;\n };\n\n /**\n * @summary Deanonymize an anonymous user in adding missing email or email+password, depending on the chosen authentication method. Will send a confirmation email if the server is configured to do so\n */\n const deanonymizeUser = async (\n userDeanonymizeRequest: UserDeanonymizeRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getDeanonymizeUserUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userDeanonymizeRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getDeanonymizeUserUrl = () => {\n return baseURL + `/user/deanonymize`;\n };\n\n /**\n * @summary Change user email\n */\n const changeUserEmail = async (\n userEmailChangeRequest: UserEmailChangeRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getChangeUserEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userEmailChangeRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserEmailUrl = () => {\n return baseURL + `/user/email/change`;\n };\n\n /**\n * @summary Send verification email\n */\n const sendVerificationEmail = async (\n userEmailSendVerificationEmailRequest: UserEmailSendVerificationEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSendVerificationEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userEmailSendVerificationEmailRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSendVerificationEmailUrl = () => {\n return baseURL + `/user/email/send-verification-email`;\n };\n\n /**\n * @summary Change user password. The user must be authenticated or provide a ticket\n */\n const changeUserPassword = async (\n userPasswordRequest: UserPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getChangeUserPasswordUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userPasswordRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getChangeUserPasswordUrl = () => {\n return baseURL + `/user/password`;\n };\n\n /**\n * @summary Request a password reset. An email with a verification link will be sent to the user's address\n */\n const sendPasswordResetEmail = async (\n userPasswordResetRequest: UserPasswordResetRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const res = await fetch(getSendPasswordResetEmailUrl(), {\n ...options,\n method: \"POST\",\n headers: { \"Content-Type\": \"application/json\", ...options?.headers },\n body: JSON.stringify(userPasswordResetRequest),\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getSendPasswordResetEmailUrl = () => {\n return baseURL + `/user/password/reset`;\n };\n\n /**\n * @summary Verify tickets created by email verification, email passwordless authentication (magic link), or password reset\n */\n const verifyTicket = async (\n params: VerifyTicketParams,\n options?: RequestInit,\n ): Promise<FetchResponse<void>> => {\n const res = await fetch(getVerifyTicketUrl(params), {\n ...options,\n method: \"GET\",\n });\n\n const body = [204, 205, 304, 412].includes(res.status)\n ? null\n : await res.text();\n const payload: void = body ? JSON.parse(body) : {};\n\n const response = {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<void>;\n\n if (!res.ok) {\n throw response;\n }\n\n return response;\n };\n\n const getVerifyTicketUrl = (params: VerifyTicketParams) => {\n const normalizedParams = new URLSearchParams();\n\n Object.entries(params || {}).forEach(([key, value]) => {\n if (value !== undefined) {\n normalizedParams.append(\n key,\n value === null ? \"null\" : value.toString(),\n );\n }\n });\n\n const stringifiedParams = normalizedParams.toString();\n\n return stringifiedParams.length > 0\n ? baseURL + `/verify?${stringifiedParams}`\n : baseURL + `/verify`;\n };\n\n return {\n healthCheckHead,\n healthCheckGet,\n getVersion,\n refreshToken,\n signOut,\n signInEmailPassword,\n signInVerifyMfaTotp,\n signInPasswordlessEmail,\n signUpEmailPassword,\n changeUserMfaVerify,\n changeUserMfa,\n getJWKs,\n createPAT,\n signInAnonymous,\n signInOTPEmail,\n verifySignInOTPEmail,\n signInPAT,\n signInIdToken,\n linkIdToken,\n deanonymizeUser,\n changeUserEmail,\n sendVerificationEmail,\n changeUserPassword,\n sendPasswordResetEmail,\n verifyTicket,\n pushChainFunction,\n baseURL,\n };\n};\n"],"names":["baseURL","chainFunctions","fetch","createEnhancedFetch","getHealthCheckHeadUrl","getHealthCheckGetUrl","getGetVersionUrl","getRefreshTokenUrl","getSignOutUrl","getSignInEmailPasswordUrl","getSignInVerifyMfaTotpUrl","getSignInPasswordlessEmailUrl","getSignUpEmailPasswordUrl","getChangeUserMfaVerifyUrl","getChangeUserMfaUrl","getGetJWKsUrl","getCreatePATUrl","getSignInAnonymousUrl","getSignInOTPEmailUrl","getVerifySignInOTPEmailUrl","getSignInPATUrl","getSignInIdTokenUrl","getLinkIdTokenUrl","getDeanonymizeUserUrl","getChangeUserEmailUrl","getSendVerificationEmailUrl","getChangeUserPasswordUrl","getSendPasswordResetEmailUrl","getVerifyTicketUrl","params","normalizedParams","URLSearchParams","Object","entries","forEach","key","value","append","toString","stringifiedParams","length","healthCheckHead","async","options","res","method","body","includes","status","text","response","JSON","parse","headers","ok","healthCheckGet","getVersion","refreshToken","refreshTokenRequest","stringify","signOut","signOutSchema","signInEmailPassword","signInEmailPasswordRequest","signInVerifyMfaTotp","signInMfaTotpRequest","signInPasswordlessEmail","signInPasswordlessEmailRequest","signUpEmailPassword","signUpEmailPasswordRequest","changeUserMfaVerify","userMfaRequest","changeUserMfa","getJWKs","createPAT","createPATRequest","signInAnonymous","signinAnonymousRequest","signInOTPEmail","signInOTPEmailRequest","verifySignInOTPEmail","signInOTPEmailVerifyRequest","signInPAT","signInPATRequest","signInIdToken","signInIdTokenRequest","linkIdToken","linkIdTokenRequest","deanonymizeUser","userDeanonymizeRequest","changeUserEmail","userEmailChangeRequest","sendVerificationEmail","userEmailSendVerificationEmailRequest","changeUserPassword","userPasswordRequest","sendPasswordResetEmail","userPasswordResetRequest","verifyTicket","pushChainFunction","chainFunction","push"],"mappings":"0IA6f+B,CAC7BA,EACAC,EAAkC,MAE9B,IAAAC,EAAQC,sBAAoBF,GAE1B,MAmCAG,EAAwB,IACrBJ,EAAU,WAiCbK,EAAuB,IACpBL,EAAU,WAiCbM,EAAmB,IAChBN,EAAU,WAoCbO,EAAqB,IAClBP,EAAU,SAmCbQ,EAAgB,IACbR,EAAU,WAoCbS,EAA4B,IACzBT,EAAU,yBAoCbU,EAA4B,IACzBV,EAAU,mBAoCbW,EAAgC,IAC7BX,EAAU,6BAoCbY,EAA4B,IACzBZ,EAAU,yBAoCba,EAA4B,IACzBb,EAAU,YAiCbc,EAAsB,IACnBd,EAAU,qBAgCbe,EAAgB,IACbf,EAAU,yBAmCbgB,EAAkB,IACfhB,EAAU,OAmCbiB,EAAwB,IACrBjB,EAAU,oBAmCbkB,EAAuB,IACpBlB,EAAU,oBAmCbmB,EAA6B,IAC1BnB,EAAU,2BAmCboB,EAAkB,IACfpB,EAAU,cAmCbqB,EAAsB,IACnBrB,EAAU,kBAmCbsB,EAAoB,IACjBtB,EAAU,gBAmCbuB,EAAwB,IACrBvB,EAAU,oBAmCbwB,EAAwB,IACrBxB,EAAU,qBAmCbyB,EAA8B,IAC3BzB,EAAU,sCAmCb0B,EAA2B,IACxB1B,EAAU,iBAmCb2B,EAA+B,IAC5B3B,EAAU,uBAiCb4B,EAAsBC,IACpB,MAAAC,EAAmB,IAAIC,gBAEtBC,OAAAC,QAAQJ,GAAU,CAAE,GAAEK,SAAQ,EAAEC,EAAKC,WAC5B,IAAVA,GACeN,EAAAO,OACfF,EACU,OAAVC,EAAiB,OAASA,EAAME,WAClC,IAIE,MAAAC,EAAoBT,EAAiBQ,WAE3C,OAAOC,EAAkBC,OAAS,EAC9BxC,EAAU,WAAWuC,IACrBvC,EAAU,SAAA,EAGT,MAAA,CACLyC,gBAz4BsBC,MACtBC,IAEA,MAAMC,QAAY1C,EAAME,IAAyB,IAC5CuC,EACHE,OAAQ,SAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHoBA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAI/CE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAm3BPK,eAx2BqBb,MACrBC,IAEA,MAAMC,QAAY1C,EAAMG,IAAwB,IAC3CsC,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAk1BPM,WAv0BiBd,MACjBC,IAEA,MAAMC,QAAY1C,EAAMI,IAAoB,IACvCqC,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH6BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIxDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAizBPO,aAtyBmBf,MACnBgB,EACAf,KAEA,MAAMC,QAAY1C,EAAMK,IAAsB,IACzCoC,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUD,KAGjBZ,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHuBA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIlDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA6wBPU,QAnwBclB,MACdmB,EACAlB,KAEA,MAAMC,QAAY1C,EAAMM,IAAiB,IACpCmC,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUE,KAGjBf,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA0uBPY,oBA/tB0BpB,MAC1BqB,EACApB,KAEA,MAAMC,QAAY1C,EAAMO,IAA6B,IAChDkC,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUI,KAGjBjB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH2CA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAItEE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAssBPc,oBA3rB0BtB,MAC1BuB,EACAtB,KAEA,MAAMC,QAAY1C,EAAMQ,IAA6B,IAChDiC,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUM,KAGjBnB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAkqBPgB,wBAvpB8BxB,MAC9ByB,EACAxB,KAEA,MAAMC,QAAY1C,EAAMS,IAAiC,IACpDgC,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUQ,KAGjBrB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA8nBPkB,oBAnnB0B1B,MAC1B2B,EACA1B,KAEA,MAAMC,QAAY1C,EAAMU,IAA6B,IAChD+B,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUU,KAGjBvB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA0lBPoB,oBA/kB0B5B,MAC1B6B,EACA5B,KAEA,MAAMC,QAAY1C,EAAMW,IAA6B,IAChD8B,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUY,KAGjBzB,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAsjBPsB,cA3iBoB9B,MACpBC,IAEA,MAAMC,QAAY1C,EAAMY,IAAuB,IAC1C6B,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHoCA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAI/DE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAqhBPuB,QA3gBc/B,MACdC,IAEA,MAAMC,QAAY1C,EAAMa,IAAiB,IACpC4B,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHsBA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIjDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAqfPwB,UA3egBhC,MAChBiC,EACAhC,KAEA,MAAMC,QAAY1C,EAAMc,IAAmB,IACtC2B,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUgB,KAGjB7B,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHiCA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAI5DE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAkdP0B,gBAxcsBlC,MACtBmC,EACAlC,KAEA,MAAMC,QAAY1C,EAAMe,IAAyB,IAC5C0B,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUkB,KAGjB/B,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA+aP4B,eAraqBpC,MACrBqC,EACApC,KAEA,MAAMC,QAAY1C,EAAMgB,IAAwB,IAC3CyB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUoB,KAGjBjC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA4YP8B,qBAlY2BtC,MAC3BuC,EACAtC,KAEA,MAAMC,QAAY1C,EAAMiB,IAA8B,IACjDwB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUsB,KAGjBnC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH4CA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIvEE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAyWPgC,UA/VgBxC,MAChByC,EACAxC,KAEA,MAAMC,QAAY1C,EAAMkB,IAAmB,IACtCuB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUwB,KAGjBrC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAsUPkC,cA5ToB1C,MACpB2C,EACA1C,KAEA,MAAMC,QAAY1C,EAAMmB,IAAuB,IAC1CsB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAU0B,KAGjBvC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH8BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIzDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAmSPoC,YAzRkB5C,MAClB6C,EACA5C,KAEA,MAAMC,QAAY1C,EAAMoB,IAAqB,IACxCqB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAU4B,KAGjBzC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAgQPsC,gBAtPsB9C,MACtB+C,EACA9C,KAEA,MAAMC,QAAY1C,EAAMqB,IAAyB,IAC5CoB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAU8B,KAGjB3C,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA6NPwC,gBAnNsBhD,MACtBiD,EACAhD,KAEA,MAAMC,QAAY1C,EAAMsB,IAAyB,IAC5CmB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUgC,KAGjB7C,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EA0LP0C,sBAhL4BlD,MAC5BmD,EACAlD,KAEA,MAAMC,QAAY1C,EAAMuB,IAA+B,IAClDkB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUkC,KAGjB/C,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAuJP4C,mBA7IyBpD,MACzBqD,EACApD,KAEA,MAAMC,QAAY1C,EAAMwB,IAA4B,IAC/CiB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUoC,KAGjBjD,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAoHP8C,uBA1G6BtD,MAC7BuD,EACAtD,KAEA,MAAMC,QAAY1C,EAAMyB,IAAgC,IACnDgB,EACHE,OAAQ,OACRQ,QAAS,CAAE,eAAgB,sBAAuBV,GAASU,SAC3DP,KAAMK,KAAKQ,UAAUsC,KAGjBnD,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAH0BA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAIrDE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAiFPgD,aAvEmBxD,MACnBb,EACAc,KAEA,MAAMC,QAAY1C,EAAM0B,EAAmBC,GAAS,IAC/Cc,EACHE,OAAQ,QAGJC,EAAO,CAAC,IAAK,IAAK,IAAK,KAAKC,SAASH,EAAII,QAC3C,WACMJ,EAAIK,OAGRC,EAAW,CACfJ,KAHoBA,EAAOK,KAAKC,MAAMN,GAAQ,CAAC,EAI/CE,OAAQJ,EAAII,OACZK,QAAST,EAAIS,SAGX,IAACT,EAAIU,GACD,MAAAJ,EAGD,OAAAA,CAAA,EAgDPiD,kBA36ByBC,IACzBnG,EAAeoG,KAAKD,GACZjG,EAAAA,sBAAoBF,EAAc,EA06B1CD,UACF"}
|