@nhost/nhost-js 4.2.1-rc2 → 4.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. package/dist/{fetch-2PHmQBIJ.mjs → fetch-2PHmQBIJ.js} +1 -1
  2. package/dist/{fetch-DWXwEnoe.js.map → fetch-2PHmQBIJ.js.map} +1 -1
  3. package/dist/{fetch-DWXwEnoe.js → fetch-DWXwEnoe.cjs} +1 -1
  4. package/dist/{fetch-2PHmQBIJ.mjs.map → fetch-DWXwEnoe.cjs.map} +1 -1
  5. package/dist/middlewareWithAdminSession-DDApoLkL.cjs +2 -0
  6. package/dist/{middlewareWithAdminSession-w7fkl0J9.mjs.map → middlewareWithAdminSession-DDApoLkL.cjs.map} +1 -1
  7. package/dist/{middlewareWithAdminSession-w7fkl0J9.mjs → middlewareWithAdminSession-DLqDQUbW.js} +2 -2
  8. package/dist/{middlewareWithAdminSession-BtFo6WUj.js.map → middlewareWithAdminSession-DLqDQUbW.js.map} +1 -1
  9. package/dist/nhost-js/auth.cjs +2 -0
  10. package/dist/nhost-js/auth.cjs.map +1 -0
  11. package/dist/nhost-js/{auth.es.js → auth.js} +2 -2
  12. package/dist/nhost-js/auth.js.map +1 -0
  13. package/dist/nhost-js/fetch.cjs +2 -0
  14. package/dist/nhost-js/fetch.cjs.map +1 -0
  15. package/dist/nhost-js/{fetch.es.js → fetch.js} +3 -3
  16. package/dist/nhost-js/fetch.js.map +1 -0
  17. package/dist/nhost-js/functions.cjs +2 -0
  18. package/dist/nhost-js/functions.cjs.map +1 -0
  19. package/dist/nhost-js/{functions.es.js → functions.js} +2 -2
  20. package/dist/nhost-js/functions.js.map +1 -0
  21. package/dist/nhost-js/graphql.cjs +2 -0
  22. package/dist/nhost-js/graphql.cjs.map +1 -0
  23. package/dist/nhost-js/{graphql.es.js → graphql.js} +2 -2
  24. package/dist/nhost-js/graphql.js.map +1 -0
  25. package/dist/nhost-js/session.cjs +2 -0
  26. package/dist/nhost-js/session.cjs.map +1 -0
  27. package/dist/nhost-js/{session.es.js → session.js} +2 -2
  28. package/dist/nhost-js/session.js.map +1 -0
  29. package/dist/nhost-js/storage.cjs +2 -0
  30. package/dist/nhost-js/storage.cjs.map +1 -0
  31. package/dist/nhost-js/{storage.es.js → storage.js} +2 -2
  32. package/dist/nhost-js/storage.js.map +1 -0
  33. package/dist/nhost-js.cjs +2 -0
  34. package/dist/nhost-js.cjs.map +1 -0
  35. package/dist/{nhost-js.es.js → nhost-js.js} +8 -8
  36. package/dist/nhost-js.js.map +1 -0
  37. package/dist/{refreshSession-Bw715ZmX.js → refreshSession-Bw715ZmX.cjs} +1 -1
  38. package/dist/{refreshSession-CG8GIEun.mjs.map → refreshSession-Bw715ZmX.cjs.map} +1 -1
  39. package/dist/{refreshSession-CG8GIEun.mjs → refreshSession-CG8GIEun.js} +1 -1
  40. package/dist/{refreshSession-Bw715ZmX.js.map → refreshSession-CG8GIEun.js.map} +1 -1
  41. package/package.json +18 -17
  42. package/dist/middlewareWithAdminSession-BtFo6WUj.js +0 -2
  43. package/dist/nhost-js/auth.cjs.js +0 -2
  44. package/dist/nhost-js/auth.cjs.js.map +0 -1
  45. package/dist/nhost-js/auth.es.js.map +0 -1
  46. package/dist/nhost-js/fetch.cjs.js +0 -2
  47. package/dist/nhost-js/fetch.cjs.js.map +0 -1
  48. package/dist/nhost-js/fetch.es.js.map +0 -1
  49. package/dist/nhost-js/functions.cjs.js +0 -2
  50. package/dist/nhost-js/functions.cjs.js.map +0 -1
  51. package/dist/nhost-js/functions.es.js.map +0 -1
  52. package/dist/nhost-js/graphql.cjs.js +0 -2
  53. package/dist/nhost-js/graphql.cjs.js.map +0 -1
  54. package/dist/nhost-js/graphql.es.js.map +0 -1
  55. package/dist/nhost-js/session.cjs.js +0 -2
  56. package/dist/nhost-js/session.cjs.js.map +0 -1
  57. package/dist/nhost-js/session.es.js.map +0 -1
  58. package/dist/nhost-js/storage.cjs.js +0 -2
  59. package/dist/nhost-js/storage.cjs.js.map +0 -1
  60. package/dist/nhost-js/storage.es.js.map +0 -1
  61. package/dist/nhost-js.cjs.js +0 -2
  62. package/dist/nhost-js.cjs.js.map +0 -1
  63. package/dist/nhost-js.es.js.map +0 -1
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth.cjs","sources":["../../src/auth/client.ts"],"sourcesContent":["/**\n * This file is auto-generated. Do not edit manually.\n */\n\nimport type { ChainFunction, FetchResponse } from \"../fetch\";\nimport { createEnhancedFetch, FetchError } from \"../fetch\";\n\n/**\n * The attestation statement format\n */\nexport type AttestationFormat =\n | \"packed\"\n | \"tpm\"\n | \"android-key\"\n | \"android-safetynet\"\n | \"fido-u2f\"\n | \"apple\"\n | \"none\";\n\n/**\n * Map of extension outputs from the client\n @property appid? (`boolean`) - Application identifier extension output\n @property credProps? (`CredentialPropertiesOutput`) - Credential properties extension output\n @property hmacCreateSecret? (`boolean`) - HMAC secret extension output*/\nexport interface AuthenticationExtensionsClientOutputs {\n /**\n * Application identifier extension output\n */\n appid?: boolean;\n /**\n * Credential properties extension output\n */\n credProps?: CredentialPropertiesOutput;\n /**\n * HMAC secret extension output\n */\n hmacCreateSecret?: boolean;\n}\n\n/**\n * \n @property clientDataJSON (`string`) - Base64url encoded client data JSON\n @property authenticatorData (`string`) - Base64url encoded authenticator data\n @property signature (`string`) - Base64url encoded assertion signature\n @property userHandle? (`string`) - Base64url encoded user handle*/\nexport interface AuthenticatorAssertionResponse {\n /**\n * Base64url encoded client data JSON\n */\n clientDataJSON: string;\n /**\n * Base64url encoded authenticator data\n */\n authenticatorData: string;\n /**\n * Base64url encoded assertion signature\n */\n signature: string;\n /**\n * Base64url encoded user handle\n */\n userHandle?: string;\n}\n\n/**\n * The authenticator attachment modality\n */\nexport type AuthenticatorAttachment = \"platform\" | \"cross-platform\";\n\n/**\n * \n @property clientDataJSON (`string`) - Base64url-encoded binary data\n * Format - byte\n @property transports? (`string[]`) - The authenticator transports\n @property authenticatorData? (`string`) - Base64url-encoded binary data\n * Format - byte\n @property publicKey? (`string`) - Base64url-encoded binary data\n * Format - byte\n @property publicKeyAlgorithm? (`number`) - The public key algorithm identifier\n * Format - int64\n @property attestationObject (`string`) - Base64url-encoded binary data\n * Format - byte*/\nexport interface AuthenticatorAttestationResponse {\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n clientDataJSON: string;\n /**\n * The authenticator transports\n */\n transports?: string[];\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n authenticatorData?: string;\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n publicKey?: string;\n /**\n * The public key algorithm identifier\n * Format - int64\n */\n publicKeyAlgorithm?: number;\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n attestationObject: string;\n}\n\n/**\n * \n @property authenticatorAttachment? (`AuthenticatorAttachment`) - The authenticator attachment modality\n @property requireResidentKey? (`boolean`) - Whether the authenticator must create a client-side-resident public key credential source\n @property residentKey? (`ResidentKeyRequirement`) - The resident key requirement\n @property userVerification? (`UserVerificationRequirement`) - A requirement for user verification for the operation*/\nexport interface AuthenticatorSelection {\n /**\n * The authenticator attachment modality\n */\n authenticatorAttachment?: AuthenticatorAttachment;\n /**\n * Whether the authenticator must create a client-side-resident public key credential source\n */\n requireResidentKey?: boolean;\n /**\n * The resident key requirement\n */\n residentKey?: ResidentKeyRequirement;\n /**\n * A requirement for user verification for the operation\n */\n userVerification?: UserVerificationRequirement;\n}\n\n/**\n * The authenticator transports that can be used\n */\nexport type AuthenticatorTransport =\n | \"usb\"\n | \"nfc\"\n | \"ble\"\n | \"smart-card\"\n | \"hybrid\"\n | \"internal\";\n\n/**\n * The attestation conveyance preference\n */\nexport type ConveyancePreference =\n | \"none\"\n | \"indirect\"\n | \"direct\"\n | \"enterprise\";\n\n/**\n * \n @property expiresAt (`string`) - Expiration date of the PAT\n * Format - date-time\n @property metadata? (`Record<string, unknown>`) - \n * Example - `{\"name\":\"my-pat\",\"used-by\":\"my-app-cli\"}`*/\nexport interface CreatePATRequest {\n /**\n * Expiration date of the PAT\n * Format - date-time\n */\n expiresAt: string;\n /**\n *\n * Example - `{\"name\":\"my-pat\",\"used-by\":\"my-app-cli\"}`\n */\n metadata?: Record<string, unknown>;\n}\n\n/**\n * \n @property id (`string`) - ID of the PAT\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n @property personalAccessToken (`string`) - PAT\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b*/\nexport interface CreatePATResponse {\n /**\n * ID of the PAT\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /**\n * PAT\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * \n @property id (`string`) - The credential's identifier\n @property type (`string`) - The credential type represented by this object\n @property rawId (`string`) - Base64url-encoded binary data\n * Format - byte\n @property clientExtensionResults? (`AuthenticationExtensionsClientOutputs`) - Map of extension outputs from the client\n @property authenticatorAttachment? (`string`) - The authenticator attachment\n @property response (`AuthenticatorAssertionResponse`) - */\nexport interface CredentialAssertionResponse {\n /**\n * The credential's identifier\n */\n id: string;\n /**\n * The credential type represented by this object\n */\n type: string;\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n rawId: string;\n /**\n * Map of extension outputs from the client\n */\n clientExtensionResults?: AuthenticationExtensionsClientOutputs;\n /**\n * The authenticator attachment\n */\n authenticatorAttachment?: string;\n /**\n *\n */\n response: AuthenticatorAssertionResponse;\n}\n\n/**\n * \n @property id (`string`) - The credential's identifier\n @property type (`string`) - The credential type represented by this object\n @property rawId (`string`) - Base64url-encoded binary data\n * Format - byte\n @property clientExtensionResults? (`AuthenticationExtensionsClientOutputs`) - Map of extension outputs from the client\n @property authenticatorAttachment? (`string`) - The authenticator attachment\n @property response (`AuthenticatorAttestationResponse`) - */\nexport interface CredentialCreationResponse {\n /**\n * The credential's identifier\n */\n id: string;\n /**\n * The credential type represented by this object\n */\n type: string;\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n rawId: string;\n /**\n * Map of extension outputs from the client\n */\n clientExtensionResults?: AuthenticationExtensionsClientOutputs;\n /**\n * The authenticator attachment\n */\n authenticatorAttachment?: string;\n /**\n *\n */\n response: AuthenticatorAttestationResponse;\n}\n\n/**\n * \n @property type (`CredentialType`) - The valid credential types\n @property alg (`number`) - The cryptographic algorithm identifier*/\nexport interface CredentialParameter {\n /**\n * The valid credential types\n */\n type: CredentialType;\n /**\n * The cryptographic algorithm identifier\n */\n alg: number;\n}\n\n/**\n * Credential properties extension output\n @property rk? (`boolean`) - Indicates if the credential is a resident key*/\nexport interface CredentialPropertiesOutput {\n /**\n * Indicates if the credential is a resident key\n */\n rk?: boolean;\n}\n\n/**\n * The valid credential types\n */\nexport type CredentialType = \"public-key\";\n\n/**\n * Error code identifying the specific application error\n */\nexport type ErrorResponseError =\n | \"default-role-must-be-in-allowed-roles\"\n | \"disabled-endpoint\"\n | \"disabled-user\"\n | \"email-already-in-use\"\n | \"email-already-verified\"\n | \"forbidden-anonymous\"\n | \"internal-server-error\"\n | \"invalid-email-password\"\n | \"invalid-request\"\n | \"locale-not-allowed\"\n | \"password-too-short\"\n | \"password-in-hibp-database\"\n | \"redirectTo-not-allowed\"\n | \"role-not-allowed\"\n | \"signup-disabled\"\n | \"unverified-user\"\n | \"user-not-anonymous\"\n | \"invalid-pat\"\n | \"invalid-refresh-token\"\n | \"invalid-ticket\"\n | \"disabled-mfa-totp\"\n | \"no-totp-secret\"\n | \"invalid-totp\"\n | \"mfa-type-not-found\"\n | \"totp-already-active\"\n | \"invalid-state\"\n | \"oauth-token-echange-failed\"\n | \"oauth-profile-fetch-failed\"\n | \"oauth-provider-error\"\n | \"invalid-otp\"\n | \"cannot-send-sms\"\n | \"provider-account-already-linked\";\n\n/**\n * Standardized error response\n @property status (`number`) - HTTP status error code\n * Example - `400`\n @property message (`string`) - Human-friendly error message\n * Example - `\"Invalid email format\"`\n @property error (`ErrorResponseError`) - Error code identifying the specific application error*/\nexport interface ErrorResponse {\n /**\n * HTTP status error code\n * Example - `400`\n */\n status: number;\n /**\n * Human-friendly error message\n * Example - `\"Invalid email format\"`\n */\n message: string;\n /**\n * Error code identifying the specific application error\n */\n error: ErrorResponseError;\n}\n\n/**\n *\n */\nexport type IdTokenProvider = \"apple\" | \"google\";\n\n/**\n * JSON Web Key for JWT verification\n @property alg (`string`) - Algorithm used with this key\n * Example - `\"RS256\"`\n @property e (`string`) - RSA public exponent\n * Example - `\"AQAB\"`\n @property kid (`string`) - Key ID\n * Example - `\"key-id-1\"`\n @property kty (`string`) - Key type\n * Example - `\"RSA\"`\n @property n (`string`) - RSA modulus\n * Example - `\"abcd1234...\"`\n @property use (`string`) - Key usage\n * Example - `\"sig\"`*/\nexport interface JWK {\n /**\n * Algorithm used with this key\n * Example - `\"RS256\"`\n */\n alg: string;\n /**\n * RSA public exponent\n * Example - `\"AQAB\"`\n */\n e: string;\n /**\n * Key ID\n * Example - `\"key-id-1\"`\n */\n kid: string;\n /**\n * Key type\n * Example - `\"RSA\"`\n */\n kty: string;\n /**\n * RSA modulus\n * Example - `\"abcd1234...\"`\n */\n n: string;\n /**\n * Key usage\n * Example - `\"sig\"`\n */\n use: string;\n}\n\n/**\n * JSON Web Key Set for verifying JWT signatures\n @property keys (`JWK[]`) - Array of public keys*/\nexport interface JWKSet {\n /**\n * Array of public keys\n */\n keys: JWK[];\n}\n\n/**\n * \n @property provider (`IdTokenProvider`) - \n @property idToken (`string`) - Apple ID token\n @property nonce? (`string`) - Nonce used during sign in process*/\nexport interface LinkIdTokenRequest {\n /**\n *\n */\n provider: IdTokenProvider;\n /**\n * Apple ID token\n */\n idToken: string;\n /**\n * Nonce used during sign in process\n */\n nonce?: string;\n}\n\n/**\n * Challenge payload for multi-factor authentication\n @property ticket (`string`) - Ticket to use when completing the MFA challenge\n * Example - `\"mfaTotp:abc123def456\"`*/\nexport interface MFAChallengePayload {\n /**\n * Ticket to use when completing the MFA challenge\n * Example - `\"mfaTotp:abc123def456\"`\n */\n ticket: string;\n}\n\n/**\n *\n */\nexport type OKResponse = \"OK\";\n\n/**\n * \n @property redirectTo? (`string`) - \n * Example - `\"https://my-app.com/catch-redirection\"`\n * Format - uri*/\nexport interface OptionsRedirectTo {\n /**\n *\n * Example - `\"https://my-app.com/catch-redirection\"`\n * Format - uri\n */\n redirectTo?: string;\n}\n\n/**\n * \n @property rp (`RelyingPartyEntity`) - \n @property user (`UserEntity`) - \n @property challenge (`string`) - Base64url-encoded binary data\n * Format - byte\n @property pubKeyCredParams (`CredentialParameter[]`) - The desired credential types and their respective cryptographic parameters\n @property timeout? (`number`) - A time, in milliseconds, that the caller is willing to wait for the call to complete\n @property excludeCredentials? (`PublicKeyCredentialDescriptor[]`) - A list of PublicKeyCredentialDescriptor objects representing public key credentials that are not acceptable to the caller\n @property authenticatorSelection? (`AuthenticatorSelection`) - \n @property hints? (`PublicKeyCredentialHints[]`) - Hints to help guide the user through the experience\n @property attestation? (`ConveyancePreference`) - The attestation conveyance preference\n @property attestationFormats? (`AttestationFormat[]`) - The preferred attestation statement formats\n @property extensions? (`Record<string, unknown>`) - Additional parameters requesting additional processing by the client and authenticator*/\nexport interface PublicKeyCredentialCreationOptions {\n /**\n *\n */\n rp: RelyingPartyEntity;\n /**\n *\n */\n user: UserEntity;\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n challenge: string;\n /**\n * The desired credential types and their respective cryptographic parameters\n */\n pubKeyCredParams: CredentialParameter[];\n /**\n * A time, in milliseconds, that the caller is willing to wait for the call to complete\n */\n timeout?: number;\n /**\n * A list of PublicKeyCredentialDescriptor objects representing public key credentials that are not acceptable to the caller\n */\n excludeCredentials?: PublicKeyCredentialDescriptor[];\n /**\n *\n */\n authenticatorSelection?: AuthenticatorSelection;\n /**\n * Hints to help guide the user through the experience\n */\n hints?: PublicKeyCredentialHints[];\n /**\n * The attestation conveyance preference\n */\n attestation?: ConveyancePreference;\n /**\n * The preferred attestation statement formats\n */\n attestationFormats?: AttestationFormat[];\n /**\n * Additional parameters requesting additional processing by the client and authenticator\n */\n extensions?: Record<string, unknown>;\n}\n\n/**\n * \n @property type (`CredentialType`) - The valid credential types\n @property id (`string`) - Base64url-encoded binary data\n * Format - byte\n @property transports? (`AuthenticatorTransport[]`) - The authenticator transports that can be used*/\nexport interface PublicKeyCredentialDescriptor {\n /**\n * The valid credential types\n */\n type: CredentialType;\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n id: string;\n /**\n * The authenticator transports that can be used\n */\n transports?: AuthenticatorTransport[];\n}\n\n/**\n * Hints to help guide the user through the experience\n */\nexport type PublicKeyCredentialHints =\n | \"security-key\"\n | \"client-device\"\n | \"hybrid\";\n\n/**\n * \n @property challenge (`string`) - Base64url-encoded binary data\n * Format - byte\n @property timeout? (`number`) - A time, in milliseconds, that the caller is willing to wait for the call to complete\n @property rpId? (`string`) - The RP ID the credential should be scoped to\n @property allowCredentials? (`PublicKeyCredentialDescriptor[]`) - A list of CredentialDescriptor objects representing public key credentials acceptable to the caller\n @property userVerification? (`UserVerificationRequirement`) - A requirement for user verification for the operation\n @property hints? (`PublicKeyCredentialHints[]`) - Hints to help guide the user through the experience\n @property extensions? (`Record<string, unknown>`) - Additional parameters requesting additional processing by the client and authenticator*/\nexport interface PublicKeyCredentialRequestOptions {\n /**\n * Base64url-encoded binary data\n * Format - byte\n */\n challenge: string;\n /**\n * A time, in milliseconds, that the caller is willing to wait for the call to complete\n */\n timeout?: number;\n /**\n * The RP ID the credential should be scoped to\n */\n rpId?: string;\n /**\n * A list of CredentialDescriptor objects representing public key credentials acceptable to the caller\n */\n allowCredentials?: PublicKeyCredentialDescriptor[];\n /**\n * A requirement for user verification for the operation\n */\n userVerification?: UserVerificationRequirement;\n /**\n * Hints to help guide the user through the experience\n */\n hints?: PublicKeyCredentialHints[];\n /**\n * Additional parameters requesting additional processing by the client and authenticator\n */\n extensions?: Record<string, unknown>;\n}\n\n/**\n * OAuth2 provider session containing access and refresh tokens\n @property accessToken (`string`) - OAuth2 provider access token for API calls\n * Example - `\"ya29.a0AfH6SMBx...\"`\n @property expiresIn (`number`) - Number of seconds until the access token expires\n * Example - `3599`\n @property expiresAt (`string`) - Timestamp when the access token expires\n * Example - `\"2024-12-31T23:59:59Z\"`\n * Format - date-time\n @property refreshToken? (`string`) - OAuth2 provider refresh token for obtaining new access tokens (if provided by the provider)\n * Example - `\"1//0gK8...\"`*/\nexport interface ProviderSession {\n /**\n * OAuth2 provider access token for API calls\n * Example - `\"ya29.a0AfH6SMBx...\"`\n */\n accessToken: string;\n /**\n * Number of seconds until the access token expires\n * Example - `3599`\n */\n expiresIn: number;\n /**\n * Timestamp when the access token expires\n * Example - `\"2024-12-31T23:59:59Z\"`\n * Format - date-time\n */\n expiresAt: string;\n /**\n * OAuth2 provider refresh token for obtaining new access tokens (if provided by the provider)\n * Example - `\"1//0gK8...\"`\n */\n refreshToken?: string;\n}\n\n/**\n * \n @property connection? (`string`) - (workos) Specifies the connection to use for authentication\n @property organization? (`string`) - (workos) Specifies the organization to use for authentication*/\nexport interface ProviderSpecificParams {\n /**\n * (workos) Specifies the connection to use for authentication\n */\n connection?: string;\n /**\n * (workos) Specifies the organization to use for authentication\n */\n organization?: string;\n}\n\n/**\n * Request to refresh OAuth2 provider tokens\n @property refreshToken (`string`) - OAuth2 provider refresh token obtained from previous authentication\n * Example - `\"1//0gK8...\"`*/\nexport interface RefreshProviderTokenRequest {\n /**\n * OAuth2 provider refresh token obtained from previous authentication\n * Example - `\"1//0gK8...\"`\n */\n refreshToken: string;\n}\n\n/**\n * Request to refresh an access token\n @property refreshToken (`string`) - Refresh token used to generate a new access token\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b*/\nexport interface RefreshTokenRequest {\n /**\n * Refresh token used to generate a new access token\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n}\n\n/**\n * \n @property name (`string`) - A human-palatable name for the entity\n @property id (`string`) - A unique identifier for the Relying Party entity, which sets the RP ID*/\nexport interface RelyingPartyEntity {\n /**\n * A human-palatable name for the entity\n */\n name: string;\n /**\n * A unique identifier for the Relying Party entity, which sets the RP ID\n */\n id: string;\n}\n\n/**\n * The resident key requirement\n */\nexport type ResidentKeyRequirement = \"discouraged\" | \"preferred\" | \"required\";\n\n/**\n * User authentication session containing tokens and user information\n @property accessToken (`string`) - JWT token for authenticating API requests\n * Example - `\"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...\"`\n @property accessTokenExpiresIn (`number`) - Expiration time of the access token in seconds\n * Example - `900`\n * Format - int64\n @property refreshTokenId (`string`) - Identifier for the refresh token\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n @property refreshToken (`string`) - Token used to refresh the access token\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n @property user? (`User`) - User profile and account information*/\nexport interface Session {\n /**\n * JWT token for authenticating API requests\n * Example - `\"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...\"`\n */\n accessToken: string;\n /**\n * Expiration time of the access token in seconds\n * Example - `900`\n * Format - int64\n */\n accessTokenExpiresIn: number;\n /**\n * Identifier for the refresh token\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshTokenId: string;\n /**\n * Token used to refresh the access token\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n refreshToken: string;\n /**\n * User profile and account information\n */\n user?: User;\n}\n\n/**\n * Container for session information\n @property session? (`Session`) - User authentication session containing tokens and user information*/\nexport interface SessionPayload {\n /**\n * User authentication session containing tokens and user information\n */\n session?: Session;\n}\n\n/**\n * \n @property displayName? (`string`) - \n * Example - `\"John Smith\"`\n @property locale? (`string`) - A two-characters locale\n * Example - `\"en\"`\n * MinLength - 2\n * MaxLength - 2\n @property metadata? (`Record<string, unknown>`) - \n * Example - `{\"firstName\":\"John\",\"lastName\":\"Smith\"}`*/\nexport interface SignInAnonymousRequest {\n /**\n *\n * Example - `\"John Smith\"`\n */\n displayName?: string;\n /**\n * A two-characters locale\n * Example - `\"en\"`\n * MinLength - 2\n * MaxLength - 2\n */\n locale?: string;\n /**\n *\n * Example - `{\"firstName\":\"John\",\"lastName\":\"Smith\"}`\n */\n metadata?: Record<string, unknown>;\n}\n\n/**\n * Request to authenticate using email and password\n @property email (`string`) - User's email address\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property password (`string`) - User's password\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50*/\nexport interface SignInEmailPasswordRequest {\n /**\n * User's email address\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n * User's password\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n */\n password: string;\n}\n\n/**\n * Response for email-password authentication that may include a session or MFA challenge\n @property session? (`Session`) - User authentication session containing tokens and user information\n @property mfa? (`MFAChallengePayload`) - Challenge payload for multi-factor authentication*/\nexport interface SignInEmailPasswordResponse {\n /**\n * User authentication session containing tokens and user information\n */\n session?: Session;\n /**\n * Challenge payload for multi-factor authentication\n */\n mfa?: MFAChallengePayload;\n}\n\n/**\n * \n @property provider (`IdTokenProvider`) - \n @property idToken (`string`) - Apple ID token\n @property nonce? (`string`) - Nonce used during sign in process\n @property options? (`SignUpOptions`) - */\nexport interface SignInIdTokenRequest {\n /**\n *\n */\n provider: IdTokenProvider;\n /**\n * Apple ID token\n */\n idToken: string;\n /**\n * Nonce used during sign in process\n */\n nonce?: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property ticket (`string`) - Ticket\n * Pattern - ^mfaTotp:.*$\n @property otp (`string`) - One time password*/\nexport interface SignInMfaTotpRequest {\n /**\n * Ticket\n * Pattern - ^mfaTotp:.*$\n */\n ticket: string;\n /**\n * One time password\n */\n otp: string;\n}\n\n/**\n * \n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property options? (`SignUpOptions`) - */\nexport interface SignInOTPEmailRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property otp (`string`) - One time password\n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email*/\nexport interface SignInOTPEmailVerifyRequest {\n /**\n * One time password\n */\n otp: string;\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n}\n\n/**\n * \n @property session? (`Session`) - User authentication session containing tokens and user information*/\nexport interface SignInOTPEmailVerifyResponse {\n /**\n * User authentication session containing tokens and user information\n */\n session?: Session;\n}\n\n/**\n * \n @property personalAccessToken (`string`) - PAT\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b*/\nexport interface SignInPATRequest {\n /**\n * PAT\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n personalAccessToken: string;\n}\n\n/**\n * \n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property options? (`SignUpOptions`) - */\nexport interface SignInPasswordlessEmailRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property phoneNumber (`string`) - Phone number of the user\n * Example - `\"+123456789\"`\n @property otp (`string`) - One-time password received by SMS*/\nexport interface SignInPasswordlessSmsOtpRequest {\n /**\n * Phone number of the user\n * Example - `\"+123456789\"`\n */\n phoneNumber: string;\n /**\n * One-time password received by SMS\n */\n otp: string;\n}\n\n/**\n * \n @property session? (`Session`) - User authentication session containing tokens and user information\n @property mfa? (`MFAChallengePayload`) - Challenge payload for multi-factor authentication*/\nexport interface SignInPasswordlessSmsOtpResponse {\n /**\n * User authentication session containing tokens and user information\n */\n session?: Session;\n /**\n * Challenge payload for multi-factor authentication\n */\n mfa?: MFAChallengePayload;\n}\n\n/**\n * \n @property phoneNumber (`string`) - Phone number of the user\n * Example - `\"+123456789\"`\n @property options? (`SignUpOptions`) - */\nexport interface SignInPasswordlessSmsRequest {\n /**\n * Phone number of the user\n * Example - `\"+123456789\"`\n */\n phoneNumber: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property email? (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email*/\nexport interface SignInWebauthnRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email?: string;\n}\n\n/**\n * \n @property email? (`string`) - A valid email. Deprecated, no longer used\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property credential (`CredentialAssertionResponse`) - */\nexport interface SignInWebauthnVerifyRequest {\n /**\n * A valid email. Deprecated, no longer used\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email?: string;\n /**\n *\n */\n credential: CredentialAssertionResponse;\n}\n\n/**\n * \n @property refreshToken? (`string`) - Refresh token for the current session\n @property all? (`boolean`) - Sign out from all connected devices*/\nexport interface SignOutRequest {\n /**\n * Refresh token for the current session\n */\n refreshToken?: string;\n /**\n * Sign out from all connected devices\n */\n all?: boolean;\n}\n\n/**\n * Request to register a new user with email and password\n @property email (`string`) - Email address for the new user account\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property password (`string`) - Password for the new user account\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n @property options? (`SignUpOptions`) - */\nexport interface SignUpEmailPasswordRequest {\n /**\n * Email address for the new user account\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n * Password for the new user account\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n */\n password: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property allowedRoles? (`string[]`) - \n * Example - `[\"me\",\"user\"]`\n @property defaultRole? (`string`) - \n * Example - `\"user\"`\n @property displayName? (`string`) - \n * Example - `\"John Smith\"`\n * Pattern - ^[\\p{L}\\p{N}\\p{S} ,.'-]+$\n * MaxLength - 32\n @property locale? (`string`) - A two-characters locale\n * Example - `\"en\"`\n * MinLength - 2\n * MaxLength - 2\n @property metadata? (`Record<string, unknown>`) - \n * Example - `{\"firstName\":\"John\",\"lastName\":\"Smith\"}`\n @property redirectTo? (`string`) - \n * Example - `\"https://my-app.com/catch-redirection\"`\n * Format - uri*/\nexport interface SignUpOptions {\n /**\n *\n * Example - `[\"me\",\"user\"]`\n */\n allowedRoles?: string[];\n /**\n *\n * Example - `\"user\"`\n */\n defaultRole?: string;\n /**\n *\n * Example - `\"John Smith\"`\n * Pattern - ^[\\p{L}\\p{N}\\p{S} ,.'-]+$\n * MaxLength - 32\n */\n displayName?: string;\n /**\n * A two-characters locale\n * Example - `\"en\"`\n * MinLength - 2\n * MaxLength - 2\n */\n locale?: string;\n /**\n *\n * Example - `{\"firstName\":\"John\",\"lastName\":\"Smith\"}`\n */\n metadata?: Record<string, unknown>;\n /**\n *\n * Example - `\"https://my-app.com/catch-redirection\"`\n * Format - uri\n */\n redirectTo?: string;\n}\n\n/**\n * \n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property options? (`SignUpOptions`) - */\nexport interface SignUpWebauthnRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property credential (`CredentialCreationResponse`) - \n @property options? (`SignUpOptions`) - \n @property nickname? (`string`) - Nickname for the security key*/\nexport interface SignUpWebauthnVerifyRequest {\n /**\n *\n */\n credential: CredentialCreationResponse;\n /**\n *\n */\n options?: SignUpOptions;\n /**\n * Nickname for the security key\n */\n nickname?: string;\n}\n\n/**\n * Response containing TOTP setup information for MFA\n @property imageUrl (`string`) - URL to QR code image for scanning with an authenticator app\n * Example - `\"data:image/png;base64,iVBORw0KGg...\"`\n @property totpSecret (`string`) - TOTP secret key for manual setup with an authenticator app\n * Example - `\"ABCDEFGHIJK23456\"`*/\nexport interface TotpGenerateResponse {\n /**\n * URL to QR code image for scanning with an authenticator app\n * Example - `\"data:image/png;base64,iVBORw0KGg...\"`\n */\n imageUrl: string;\n /**\n * TOTP secret key for manual setup with an authenticator app\n * Example - `\"ABCDEFGHIJK23456\"`\n */\n totpSecret: string;\n}\n\n/**\n * Base64url-encoded binary data\n */\nexport type URLEncodedBase64 = string;\n\n/**\n * User profile and account information\n @property avatarUrl (`string`) - URL to the user's profile picture\n * Example - `\"https://myapp.com/avatars/user123.jpg\"`\n @property createdAt (`string`) - Timestamp when the user account was created\n * Example - `\"2023-01-15T12:34:56Z\"`\n * Format - date-time\n @property defaultRole (`string`) - Default authorization role for the user\n * Example - `\"user\"`\n @property displayName (`string`) - User's display name\n * Example - `\"John Smith\"`\n @property email? (`string`) - User's email address\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property emailVerified (`boolean`) - Whether the user's email has been verified\n * Example - `true`\n @property id (`string`) - Unique identifier for the user\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n @property isAnonymous (`boolean`) - Whether this is an anonymous user account\n * Example - `false`\n @property locale (`string`) - User's preferred locale (language code)\n * Example - `\"en\"`\n * MinLength - 2\n * MaxLength - 2\n @property metadata (`Record<string, unknown>`) - Custom metadata associated with the user\n * Example - `{\"firstName\":\"John\",\"lastName\":\"Smith\"}`\n @property phoneNumber? (`string`) - User's phone number\n * Example - `\"+12025550123\"`\n @property phoneNumberVerified (`boolean`) - Whether the user's phone number has been verified\n * Example - `false`\n @property roles (`string[]`) - List of roles assigned to the user\n * Example - `[\"user\",\"customer\"]`\n @property activeMfaType? (`string`) - Active MFA type for the user*/\nexport interface User {\n /**\n * URL to the user's profile picture\n * Example - `\"https://myapp.com/avatars/user123.jpg\"`\n */\n avatarUrl: string;\n /**\n * Timestamp when the user account was created\n * Example - `\"2023-01-15T12:34:56Z\"`\n * Format - date-time\n */\n createdAt: string;\n /**\n * Default authorization role for the user\n * Example - `\"user\"`\n */\n defaultRole: string;\n /**\n * User's display name\n * Example - `\"John Smith\"`\n */\n displayName: string;\n /**\n * User's email address\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email?: string;\n /**\n * Whether the user's email has been verified\n * Example - `true`\n */\n emailVerified: boolean;\n /**\n * Unique identifier for the user\n * Example - `\"2c35b6f3-c4b9-48e3-978a-d4d0f1d42e24\"`\n * Pattern - \\b[0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b\n */\n id: string;\n /**\n * Whether this is an anonymous user account\n * Example - `false`\n */\n isAnonymous: boolean;\n /**\n * User's preferred locale (language code)\n * Example - `\"en\"`\n * MinLength - 2\n * MaxLength - 2\n */\n locale: string;\n /**\n * Custom metadata associated with the user\n * Example - `{\"firstName\":\"John\",\"lastName\":\"Smith\"}`\n */\n metadata: Record<string, unknown>;\n /**\n * User's phone number\n * Example - `\"+12025550123\"`\n */\n phoneNumber?: string;\n /**\n * Whether the user's phone number has been verified\n * Example - `false`\n */\n phoneNumberVerified: boolean;\n /**\n * List of roles assigned to the user\n * Example - `[\"user\",\"customer\"]`\n */\n roles: string[];\n /**\n * Active MFA type for the user\n */\n activeMfaType?: string;\n}\n\n/**\n * Which sign-in method to use\n */\nexport type UserDeanonymizeRequestSignInMethod =\n | \"email-password\"\n | \"passwordless\";\n\n/**\n * \n @property signInMethod (`UserDeanonymizeRequestSignInMethod`) - Which sign-in method to use\n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property password? (`string`) - A password of minimum 3 characters\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n @property connection? (`string`) - Deprecated, will be ignored\n @property options? (`SignUpOptions`) - */\nexport interface UserDeanonymizeRequest {\n /**\n * Which sign-in method to use\n */\n signInMethod: UserDeanonymizeRequestSignInMethod;\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n * A password of minimum 3 characters\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n */\n password?: string;\n /**\n * Deprecated, will be ignored\n */\n connection?: string;\n /**\n *\n */\n options?: SignUpOptions;\n}\n\n/**\n * \n @property newEmail (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property options? (`OptionsRedirectTo`) - */\nexport interface UserEmailChangeRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n newEmail: string;\n /**\n *\n */\n options?: OptionsRedirectTo;\n}\n\n/**\n * \n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property options? (`OptionsRedirectTo`) - */\nexport interface UserEmailSendVerificationEmailRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n *\n */\n options?: OptionsRedirectTo;\n}\n\n/**\n * \n @property name (`string`) - A human-palatable name for the entity\n @property displayName (`string`) - A human-palatable name for the user account, intended only for display\n @property id (`string`) - The user handle of the user account entity*/\nexport interface UserEntity {\n /**\n * A human-palatable name for the entity\n */\n name: string;\n /**\n * A human-palatable name for the user account, intended only for display\n */\n displayName: string;\n /**\n * The user handle of the user account entity\n */\n id: string;\n}\n\n/**\n * Type of MFA to activate. Use empty string to disable MFA.\n */\nexport type UserMfaRequestActiveMfaType = \"totp\" | \"\";\n\n/**\n * Request to activate or deactivate multi-factor authentication\n @property code (`string`) - Verification code from the authenticator app when activating MFA\n * Example - `\"123456\"`\n @property activeMfaType? (`UserMfaRequestActiveMfaType`) - Type of MFA to activate. Use empty string to disable MFA.\n * Example - `\"totp\"`*/\nexport interface UserMfaRequest {\n /**\n * Verification code from the authenticator app when activating MFA\n * Example - `\"123456\"`\n */\n code: string;\n /**\n * Type of MFA to activate. Use empty string to disable MFA.\n * Example - `\"totp\"`\n */\n activeMfaType?: UserMfaRequestActiveMfaType;\n}\n\n/**\n * \n @property newPassword (`string`) - A password of minimum 3 characters\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n @property ticket? (`string`) - Ticket to reset the password, required if the user is not authenticated\n * Pattern - ^passwordReset\\:.*$*/\nexport interface UserPasswordRequest {\n /**\n * A password of minimum 3 characters\n * Example - `\"Str0ngPassw#ord-94|%\"`\n * MinLength - 3\n * MaxLength - 50\n */\n newPassword: string;\n /**\n * Ticket to reset the password, required if the user is not authenticated\n * Pattern - ^passwordReset\\:.*$\n */\n ticket?: string;\n}\n\n/**\n * \n @property email (`string`) - A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n @property options? (`OptionsRedirectTo`) - */\nexport interface UserPasswordResetRequest {\n /**\n * A valid email\n * Example - `\"john.smith@nhost.io\"`\n * Format - email\n */\n email: string;\n /**\n *\n */\n options?: OptionsRedirectTo;\n}\n\n/**\n * A requirement for user verification for the operation\n */\nexport type UserVerificationRequirement =\n | \"required\"\n | \"preferred\"\n | \"discouraged\";\n\n/**\n * \n @property credential (`CredentialCreationResponse`) - \n @property nickname? (`string`) - Optional nickname for the security key*/\nexport interface VerifyAddSecurityKeyRequest {\n /**\n *\n */\n credential: CredentialCreationResponse;\n /**\n * Optional nickname for the security key\n */\n nickname?: string;\n}\n\n/**\n * \n @property id (`string`) - The ID of the newly added security key\n * Example - `\"123e4567-e89b-12d3-a456-426614174000\"`\n @property nickname? (`string`) - The nickname of the security key if provided*/\nexport interface VerifyAddSecurityKeyResponse {\n /**\n * The ID of the newly added security key\n * Example - `\"123e4567-e89b-12d3-a456-426614174000\"`\n */\n id: string;\n /**\n * The nickname of the security key if provided\n */\n nickname?: string;\n}\n\n/**\n * \n @property token? (`string`) - JWT token to verify*/\nexport interface VerifyTokenRequest {\n /**\n * JWT token to verify\n */\n token?: string;\n}\n\n/**\n * Target URL for the redirect\n */\nexport type RedirectToQuery = string;\n\n/**\n *\n */\nexport type SignInProvider =\n | \"apple\"\n | \"github\"\n | \"google\"\n | \"linkedin\"\n | \"discord\"\n | \"spotify\"\n | \"twitch\"\n | \"gitlab\"\n | \"bitbucket\"\n | \"workos\"\n | \"azuread\"\n | \"entraid\"\n | \"strava\"\n | \"facebook\"\n | \"windowslive\"\n | \"twitter\";\n\n/**\n * Ticket\n */\nexport type TicketQuery = string;\n\n/**\n * Type of the ticket\n */\nexport type TicketTypeQuery =\n | \"emailVerify\"\n | \"emailConfirmChange\"\n | \"signinPasswordless\"\n | \"passwordReset\";\n\n/**\n * \n @property version (`string`) - The version of the authentication service\n * Example - `\"1.2.3\"`*/\nexport interface GetVersionResponse200 {\n /**\n * The version of the authentication service\n * Example - `\"1.2.3\"`\n */\n version: string;\n}\n\n/**\n * Parameters for the signInProvider method.\n @property allowedRoles? (string[]) - Array of allowed roles for the user\n \n @property defaultRole? (string) - Default role for the user\n \n @property displayName? (string) - Display name for the user\n \n @property locale? (string) - A two-characters locale\n \n @property metadata? (Record<string, unknown>) - Additional metadata for the user (JSON encoded string)\n \n @property redirectTo? (string) - URI to redirect to\n \n @property connect? (string) - If set, this means that the user is already authenticated and wants to link their account. This needs to be a valid JWT access token.\n \n @property state? (string) - Opaque state value to be returned by the provider\n \n @property providerSpecificParams? (ProviderSpecificParams) - Additional provider-specific parameters\n */\nexport interface SignInProviderParams {\n /**\n * Array of allowed roles for the user\n \n */\n allowedRoles?: string[];\n /**\n * Default role for the user\n \n */\n defaultRole?: string;\n /**\n * Display name for the user\n \n */\n displayName?: string;\n /**\n * A two-characters locale\n \n */\n locale?: string;\n /**\n * Additional metadata for the user (JSON encoded string)\n \n */\n metadata?: Record<string, unknown>;\n /**\n * URI to redirect to\n \n */\n redirectTo?: string;\n /**\n * If set, this means that the user is already authenticated and wants to link their account. This needs to be a valid JWT access token.\n \n */\n connect?: string;\n /**\n * Opaque state value to be returned by the provider\n \n */\n state?: string;\n /**\n * Additional provider-specific parameters\n \n */\n providerSpecificParams?: ProviderSpecificParams;\n}\n/**\n * Parameters for the verifyTicket method.\n @property ticket (TicketQuery) - Ticket\n \n * Ticket\n @property type? (TicketTypeQuery) - Type of the ticket. Deprecated, no longer used\n \n * Type of the ticket\n @property redirectTo (RedirectToQuery) - Target URL for the redirect\n \n * Target URL for the redirect*/\nexport interface VerifyTicketParams {\n /**\n * Ticket\n \n * Ticket\n */\n ticket: TicketQuery;\n /**\n * Type of the ticket. Deprecated, no longer used\n \n * Type of the ticket\n */\n type?: TicketTypeQuery;\n /**\n * Target URL for the redirect\n \n * Target URL for the redirect\n */\n redirectTo: RedirectToQuery;\n}\n\nexport interface Client {\n baseURL: string;\n\n /** Add a middleware function to the fetch chain\n * @param chainFunction - The middleware function to add\n */\n pushChainFunction(chainFunction: ChainFunction): void;\n /**\n Summary: Get public keys for JWT verification in JWK Set format\n Retrieve the JSON Web Key Set (JWKS) containing public keys used to verify JWT signatures. This endpoint is used by clients to validate access tokens.\n\n This method may return different T based on the response code:\n - 200: JWKSet\n */\n getJWKs(options?: RequestInit): Promise<FetchResponse<JWKSet>>;\n\n /**\n Summary: Elevate access for an already signed in user using FIDO2 Webauthn\n Generate a Webauthn challenge for elevating user permissions\n\n This method may return different T based on the response code:\n - 200: PublicKeyCredentialRequestOptions\n */\n elevateWebauthn(\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialRequestOptions>>;\n\n /**\n Summary: Verify FIDO2 Webauthn authentication using public-key cryptography for elevation\n Complete Webauthn elevation by verifying the authentication response\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n verifyElevateWebauthn(\n body: SignInWebauthnVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Health check (GET)\n Verify if the authentication service is operational using GET method\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n healthCheckGet(options?: RequestInit): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Health check (HEAD)\n Verify if the authentication service is operational using HEAD method\n\n This method may return different T based on the response code:\n - 200: void\n */\n healthCheckHead(options?: RequestInit): Promise<FetchResponse<void>>;\n\n /**\n Summary: Link a user account with the provider's account using an id token\n Link the authenticated user's account with an external OAuth provider account using an ID token. Requires elevated permissions.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n linkIdToken(\n body: LinkIdTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Generate TOTP secret\n Generate a Time-based One-Time Password (TOTP) secret for setting up multi-factor authentication\n\n This method may return different T based on the response code:\n - 200: TotpGenerateResponse\n */\n changeUserMfa(\n options?: RequestInit,\n ): Promise<FetchResponse<TotpGenerateResponse>>;\n\n /**\n Summary: Create a Personal Access Token (PAT)\n Generate a new Personal Access Token for programmatic API access. PATs are long-lived tokens that can be used instead of regular authentication for automated systems. Requires elevated permissions.\n\n This method may return different T based on the response code:\n - 200: CreatePATResponse\n */\n createPAT(\n body: CreatePATRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<CreatePATResponse>>;\n\n /**\n Summary: Sign in anonymously\n Create an anonymous user session without providing credentials. Anonymous users can be converted to regular users later via the deanonymize endpoint.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n signInAnonymous(\n body?: SignInAnonymousRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Sign in with email and password\n Authenticate a user with their email and password. Returns a session object or MFA challenge if two-factor authentication is enabled.\n\n This method may return different T based on the response code:\n - 200: SignInEmailPasswordResponse\n */\n signInEmailPassword(\n body: SignInEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInEmailPasswordResponse>>;\n\n /**\n Summary: Sign in with an ID token\n Authenticate using an ID token from a supported OAuth provider (Apple or Google). Creates a new user account if one doesn't exist.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n signInIdToken(\n body: SignInIdTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Verify TOTP for MFA\n Complete the multi-factor authentication by verifying a Time-based One-Time Password (TOTP). Returns a session if validation is successful.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n verifySignInMfaTotp(\n body: SignInMfaTotpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Sign in with email OTP\n Initiate email-based one-time password authentication. Sends an OTP to the specified email address. If the user doesn't exist, a new account will be created with the provided options.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n signInOTPEmail(\n body: SignInOTPEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Verify email OTP\n Complete email OTP authentication by verifying the one-time password. Returns a session if validation is successful.\n\n This method may return different T based on the response code:\n - 200: SignInOTPEmailVerifyResponse\n */\n verifySignInOTPEmail(\n body: SignInOTPEmailVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInOTPEmailVerifyResponse>>;\n\n /**\n Summary: Sign in with magic link email\n Initiate passwordless authentication by sending a magic link to the user's email. If the user doesn't exist, a new account will be created with the provided options.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n signInPasswordlessEmail(\n body: SignInPasswordlessEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Sign in with SMS OTP\n Initiate passwordless authentication by sending a one-time password to the user's phone number. If the user doesn't exist, a new account will be created with the provided options.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n signInPasswordlessSms(\n body: SignInPasswordlessSmsRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Verify SMS OTP\n Complete passwordless SMS authentication by verifying the one-time password. Returns a session if validation is successful.\n\n This method may return different T based on the response code:\n - 200: SignInPasswordlessSmsOtpResponse\n */\n verifySignInPasswordlessSms(\n body: SignInPasswordlessSmsOtpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInPasswordlessSmsOtpResponse>>;\n\n /**\n Summary: Sign in with Personal Access Token (PAT)\n Authenticate using a Personal Access Token. PATs are long-lived tokens that can be used for programmatic access to the API.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n signInPAT(\n body: SignInPATRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Sign in with an OAuth2 provider\n Initiate OAuth2 authentication flow with a social provider. Redirects the user to the provider's authorization page.\n\n As this method is a redirect, it returns a URL string instead of a Promise\n */\n signInProviderURL(\n provider: SignInProvider,\n params?: SignInProviderParams,\n options?: RequestInit,\n ): string;\n\n /**\n Summary: Retrieve OAuth2 provider tokens from callback\n After successful OAuth2 authentication, retrieve the provider session containing access token, refresh token, and expiration information for the specified provider. To ensure the data isn't stale this endpoint must be called immediately after the OAuth callback to obtain the tokens. The session is cleared from the database during this call, so subsequent calls will fail without going through the sign-in flow again. It is the user's responsibility to store the session safely (e.g., in browser local storage).\n\n This method may return different T based on the response code:\n - 200: ProviderSession\n */\n getProviderTokens(\n provider: SignInProvider,\n options?: RequestInit,\n ): Promise<FetchResponse<ProviderSession>>;\n\n /**\n Summary: Sign in with Webauthn\n Initiate a Webauthn sign-in process by sending a challenge to the user's device. The user must have previously registered a Webauthn credential.\n\n This method may return different T based on the response code:\n - 200: PublicKeyCredentialRequestOptions\n */\n signInWebauthn(\n body?: SignInWebauthnRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialRequestOptions>>;\n\n /**\n Summary: Verify Webauthn sign-in\n Complete the Webauthn sign-in process by verifying the response from the user's device. Returns a session if validation is successful.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n verifySignInWebauthn(\n body: SignInWebauthnVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Sign out\n End the current user session by invalidating refresh tokens. Optionally sign out from all devices.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n signOut(\n body: SignOutRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Sign up with email and password\n Register a new user account with email and password. Returns a session if email verification is not required, otherwise returns null session.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n signUpEmailPassword(\n body: SignUpEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Sign up with Webauthn\n Initiate a Webauthn sign-up process by sending a challenge to the user's device. The user must not have an existing account.\n\n This method may return different T based on the response code:\n - 200: PublicKeyCredentialCreationOptions\n */\n signUpWebauthn(\n body: SignUpWebauthnRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialCreationOptions>>;\n\n /**\n Summary: Verify Webauthn sign-up\n Complete the Webauthn sign-up process by verifying the response from the user's device. Returns a session if validation is successful.\n\n This method may return different T based on the response code:\n - 200: SessionPayload\n */\n verifySignUpWebauthn(\n body: SignUpWebauthnVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>>;\n\n /**\n Summary: Refresh access token\n Generate a new JWT access token using a valid refresh token. The refresh token used will be revoked and a new one will be issued.\n\n This method may return different T based on the response code:\n - 200: Session\n */\n refreshToken(\n body: RefreshTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<Session>>;\n\n /**\n Summary: Refresh OAuth2 provider tokens\n Refresh the OAuth2 provider access token using a valid refresh token. Returns a new provider session with updated access token, refresh token (if rotated by provider), and expiration information. This endpoint allows maintaining long-lived access to provider APIs without requiring the user to re-authenticate.\n\n This method may return different T based on the response code:\n - 200: ProviderSession\n */\n refreshProviderToken(\n provider: SignInProvider,\n body: RefreshProviderTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<ProviderSession>>;\n\n /**\n Summary: Verify JWT token\n Verify the validity of a JWT access token. If no request body is provided, the Authorization header will be used for verification.\n\n This method may return different T based on the response code:\n - 200: string\n */\n verifyToken(\n body?: VerifyTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<string>>;\n\n /**\n Summary: Get user information\n Retrieve the authenticated user's profile information including roles, metadata, and account status.\n\n This method may return different T based on the response code:\n - 200: User\n */\n getUser(options?: RequestInit): Promise<FetchResponse<User>>;\n\n /**\n Summary: Deanonymize an anonymous user\n Convert an anonymous user to a regular user by adding email and optionally password credentials. A confirmation email will be sent if the server is configured to do so.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n deanonymizeUser(\n body: UserDeanonymizeRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Change user email\n Request to change the authenticated user's email address. A verification email will be sent to the new address to confirm the change. Requires elevated permissions.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n changeUserEmail(\n body: UserEmailChangeRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Send verification email\n Send an email verification link to the specified email address. Used to verify email addresses for new accounts or email changes.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n sendVerificationEmail(\n body: UserEmailSendVerificationEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Manage multi-factor authentication\n Activate or deactivate multi-factor authentication for the authenticated user\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n verifyChangeUserMfa(\n body: UserMfaRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Change user password\n Change the user's password. The user must be authenticated with elevated permissions or provide a valid password reset ticket.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n changeUserPassword(\n body: UserPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Request password reset\n Request a password reset for a user account. An email with a verification link will be sent to the user's email address to complete the password reset process.\n\n This method may return different T based on the response code:\n - 200: OKResponse\n */\n sendPasswordResetEmail(\n body: UserPasswordResetRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>>;\n\n /**\n Summary: Initialize adding of a new webauthn security key\n Start the process of adding a new WebAuthn security key to the user's account. Returns a challenge that must be completed by the user's authenticator device. Requires elevated permissions.\n\n This method may return different T based on the response code:\n - 200: PublicKeyCredentialCreationOptions\n */\n addSecurityKey(\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialCreationOptions>>;\n\n /**\n Summary: Verify adding of a new webauthn security key\n Complete the process of adding a new WebAuthn security key by verifying the authenticator response. Requires elevated permissions.\n\n This method may return different T based on the response code:\n - 200: VerifyAddSecurityKeyResponse\n */\n verifyAddSecurityKey(\n body: VerifyAddSecurityKeyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<VerifyAddSecurityKeyResponse>>;\n\n /**\n Summary: Verify email and authentication tickets\n Verify tickets created by email verification, magic link authentication, or password reset processes. Redirects the user to the appropriate destination upon successful verification.\n\n As this method is a redirect, it returns a URL string instead of a Promise\n */\n verifyTicketURL(params?: VerifyTicketParams, options?: RequestInit): string;\n\n /**\n Summary: Get service version\n Retrieve version information about the authentication service\n\n This method may return different T based on the response code:\n - 200: GetVersionResponse200\n */\n getVersion(\n options?: RequestInit,\n ): Promise<FetchResponse<GetVersionResponse200>>;\n}\n\nexport const createAPIClient = (\n baseURL: string,\n chainFunctions: ChainFunction[] = [],\n): Client => {\n let fetch = createEnhancedFetch(chainFunctions);\n\n const pushChainFunction = (chainFunction: ChainFunction) => {\n chainFunctions.push(chainFunction);\n fetch = createEnhancedFetch(chainFunctions);\n };\n const getJWKs = async (\n options?: RequestInit,\n ): Promise<FetchResponse<JWKSet>> => {\n const url = `${baseURL}/.well-known/jwks.json`;\n const res = await fetch(url, {\n ...options,\n method: \"GET\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: JWKSet = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<JWKSet>;\n };\n\n const elevateWebauthn = async (\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialRequestOptions>> => {\n const url = `${baseURL}/elevate/webauthn`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: PublicKeyCredentialRequestOptions = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<PublicKeyCredentialRequestOptions>;\n };\n\n const verifyElevateWebauthn = async (\n body: SignInWebauthnVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/elevate/webauthn/verify`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const healthCheckGet = async (\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/healthz`;\n const res = await fetch(url, {\n ...options,\n method: \"GET\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const healthCheckHead = async (\n options?: RequestInit,\n ): Promise<FetchResponse<void>> => {\n const url = `${baseURL}/healthz`;\n const res = await fetch(url, {\n ...options,\n method: \"HEAD\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const payload: undefined = undefined;\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<void>;\n };\n\n const linkIdToken = async (\n body: LinkIdTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/link/idtoken`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const changeUserMfa = async (\n options?: RequestInit,\n ): Promise<FetchResponse<TotpGenerateResponse>> => {\n const url = `${baseURL}/mfa/totp/generate`;\n const res = await fetch(url, {\n ...options,\n method: \"GET\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: TotpGenerateResponse = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<TotpGenerateResponse>;\n };\n\n const createPAT = async (\n body: CreatePATRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<CreatePATResponse>> => {\n const url = `${baseURL}/pat`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: CreatePATResponse = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<CreatePATResponse>;\n };\n\n const signInAnonymous = async (\n body?: SignInAnonymousRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signin/anonymous`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const signInEmailPassword = async (\n body: SignInEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInEmailPasswordResponse>> => {\n const url = `${baseURL}/signin/email-password`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInEmailPasswordResponse = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SignInEmailPasswordResponse>;\n };\n\n const signInIdToken = async (\n body: SignInIdTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signin/idtoken`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const verifySignInMfaTotp = async (\n body: SignInMfaTotpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signin/mfa/totp`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const signInOTPEmail = async (\n body: SignInOTPEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/signin/otp/email`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const verifySignInOTPEmail = async (\n body: SignInOTPEmailVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInOTPEmailVerifyResponse>> => {\n const url = `${baseURL}/signin/otp/email/verify`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInOTPEmailVerifyResponse = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SignInOTPEmailVerifyResponse>;\n };\n\n const signInPasswordlessEmail = async (\n body: SignInPasswordlessEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/signin/passwordless/email`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const signInPasswordlessSms = async (\n body: SignInPasswordlessSmsRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/signin/passwordless/sms`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const verifySignInPasswordlessSms = async (\n body: SignInPasswordlessSmsOtpRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SignInPasswordlessSmsOtpResponse>> => {\n const url = `${baseURL}/signin/passwordless/sms/otp`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SignInPasswordlessSmsOtpResponse = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SignInPasswordlessSmsOtpResponse>;\n };\n\n const signInPAT = async (\n body: SignInPATRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signin/pat`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const signInProviderURL = (\n provider: SignInProvider,\n params?: SignInProviderParams,\n ): string => {\n const encodedParameters =\n params &&\n Object.entries(params)\n .flatMap(([key, value]) => {\n if (key === \"providerSpecificParams\") {\n // Object with explode: true - each property as separate parameter\n if (\n typeof value === \"object\" &&\n value !== null &&\n !Array.isArray(value)\n ) {\n return Object.entries(value).map(\n ([k, v]) => `${k}=${encodeURIComponent(String(v))}`,\n );\n }\n return [`${key}=${encodeURIComponent(String(value))}`];\n }\n // Default handling (scalars or explode: false)\n const stringValue = Array.isArray(value)\n ? value.join(\",\")\n : typeof value === \"object\" && value !== null\n ? JSON.stringify(value)\n : String(value);\n return [`${key}=${encodeURIComponent(stringValue)}`];\n })\n .join(\"&\");\n\n const url = encodedParameters\n ? `${baseURL}/signin/provider/${provider}?${encodedParameters}`\n : `${baseURL}/signin/provider/${provider}`;\n return url;\n };\n\n const getProviderTokens = async (\n provider: SignInProvider,\n options?: RequestInit,\n ): Promise<FetchResponse<ProviderSession>> => {\n const url = `${baseURL}/signin/provider/${provider}/callback/tokens`;\n const res = await fetch(url, {\n ...options,\n method: \"GET\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: ProviderSession = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<ProviderSession>;\n };\n\n const signInWebauthn = async (\n body?: SignInWebauthnRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialRequestOptions>> => {\n const url = `${baseURL}/signin/webauthn`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: PublicKeyCredentialRequestOptions = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<PublicKeyCredentialRequestOptions>;\n };\n\n const verifySignInWebauthn = async (\n body: SignInWebauthnVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signin/webauthn/verify`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const signOut = async (\n body: SignOutRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/signout`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const signUpEmailPassword = async (\n body: SignUpEmailPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signup/email-password`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const signUpWebauthn = async (\n body: SignUpWebauthnRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialCreationOptions>> => {\n const url = `${baseURL}/signup/webauthn`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: PublicKeyCredentialCreationOptions = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<PublicKeyCredentialCreationOptions>;\n };\n\n const verifySignUpWebauthn = async (\n body: SignUpWebauthnVerifyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<SessionPayload>> => {\n const url = `${baseURL}/signup/webauthn/verify`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: SessionPayload = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<SessionPayload>;\n };\n\n const refreshToken = async (\n body: RefreshTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<Session>> => {\n const url = `${baseURL}/token`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: Session = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<Session>;\n };\n\n const refreshProviderToken = async (\n provider: SignInProvider,\n body: RefreshProviderTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<ProviderSession>> => {\n const url = `${baseURL}/token/provider/${provider}`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: ProviderSession = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<ProviderSession>;\n };\n\n const verifyToken = async (\n body?: VerifyTokenRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<string>> => {\n const url = `${baseURL}/token/verify`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: string = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<string>;\n };\n\n const getUser = async (\n options?: RequestInit,\n ): Promise<FetchResponse<User>> => {\n const url = `${baseURL}/user`;\n const res = await fetch(url, {\n ...options,\n method: \"GET\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: User = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<User>;\n };\n\n const deanonymizeUser = async (\n body: UserDeanonymizeRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/user/deanonymize`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const changeUserEmail = async (\n body: UserEmailChangeRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/user/email/change`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const sendVerificationEmail = async (\n body: UserEmailSendVerificationEmailRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/user/email/send-verification-email`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const verifyChangeUserMfa = async (\n body: UserMfaRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/user/mfa`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const changeUserPassword = async (\n body: UserPasswordRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/user/password`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const sendPasswordResetEmail = async (\n body: UserPasswordResetRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<OKResponse>> => {\n const url = `${baseURL}/user/password/reset`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: OKResponse = responseBody ? JSON.parse(responseBody) : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<OKResponse>;\n };\n\n const addSecurityKey = async (\n options?: RequestInit,\n ): Promise<FetchResponse<PublicKeyCredentialCreationOptions>> => {\n const url = `${baseURL}/user/webauthn/add`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: PublicKeyCredentialCreationOptions = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<PublicKeyCredentialCreationOptions>;\n };\n\n const verifyAddSecurityKey = async (\n body: VerifyAddSecurityKeyRequest,\n options?: RequestInit,\n ): Promise<FetchResponse<VerifyAddSecurityKeyResponse>> => {\n const url = `${baseURL}/user/webauthn/verify`;\n const res = await fetch(url, {\n ...options,\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n ...options?.headers,\n },\n body: JSON.stringify(body),\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: VerifyAddSecurityKeyResponse = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<VerifyAddSecurityKeyResponse>;\n };\n\n const verifyTicketURL = (params?: VerifyTicketParams): string => {\n const encodedParameters =\n params &&\n Object.entries(params)\n .flatMap(([key, value]) => {\n // Default handling (scalars or explode: false)\n const stringValue = Array.isArray(value)\n ? value.join(\",\")\n : typeof value === \"object\" && value !== null\n ? JSON.stringify(value)\n : String(value);\n return [`${key}=${encodeURIComponent(stringValue)}`];\n })\n .join(\"&\");\n\n const url = encodedParameters\n ? `${baseURL}/verify?${encodedParameters}`\n : `${baseURL}/verify`;\n return url;\n };\n\n const getVersion = async (\n options?: RequestInit,\n ): Promise<FetchResponse<GetVersionResponse200>> => {\n const url = `${baseURL}/version`;\n const res = await fetch(url, {\n ...options,\n method: \"GET\",\n headers: {\n ...options?.headers,\n },\n });\n\n if (res.status >= 300) {\n const responseBody = [412].includes(res.status) ? null : await res.text();\n const payload: unknown = responseBody ? JSON.parse(responseBody) : {};\n throw new FetchError(payload, res.status, res.headers);\n }\n\n const responseBody = [204, 205, 304].includes(res.status)\n ? null\n : await res.text();\n const payload: GetVersionResponse200 = responseBody\n ? JSON.parse(responseBody)\n : {};\n\n return {\n body: payload,\n status: res.status,\n headers: res.headers,\n } as FetchResponse<GetVersionResponse200>;\n };\n\n return {\n baseURL,\n pushChainFunction,\n getJWKs,\n elevateWebauthn,\n verifyElevateWebauthn,\n healthCheckGet,\n healthCheckHead,\n linkIdToken,\n changeUserMfa,\n createPAT,\n signInAnonymous,\n signInEmailPassword,\n signInIdToken,\n verifySignInMfaTotp,\n signInOTPEmail,\n verifySignInOTPEmail,\n signInPasswordlessEmail,\n signInPasswordlessSms,\n verifySignInPasswordlessSms,\n signInPAT,\n signInProviderURL,\n getProviderTokens,\n signInWebauthn,\n verifySignInWebauthn,\n signOut,\n signUpEmailPassword,\n signUpWebauthn,\n verifySignUpWebauthn,\n refreshToken,\n refreshProviderToken,\n verifyToken,\n getUser,\n deanonymizeUser,\n changeUserEmail,\n sendVerificationEmail,\n verifyChangeUserMfa,\n changeUserPassword,\n sendPasswordResetEmail,\n addSecurityKey,\n verifyAddSecurityKey,\n verifyTicketURL,\n getVersion,\n };\n};\n"],"names":["baseURL","chainFunctions","fetch","createEnhancedFetch","pushChainFunction","chainFunction","push","getJWKs","async","options","url","res","method","headers","status","responseBody","includes","text","payload","JSON","parse","FetchError","body","elevateWebauthn","verifyElevateWebauthn","stringify","healthCheckGet","healthCheckHead","linkIdToken","changeUserMfa","createPAT","signInAnonymous","signInEmailPassword","signInIdToken","verifySignInMfaTotp","signInOTPEmail","verifySignInOTPEmail","signInPasswordlessEmail","signInPasswordlessSms","verifySignInPasswordlessSms","signInPAT","signInProviderURL","provider","params","encodedParameters","Object","entries","flatMap","key","value","Array","isArray","encodeURIComponent","String","map","k","v","stringValue","join","getProviderTokens","signInWebauthn","verifySignInWebauthn","signOut","signUpEmailPassword","signUpWebauthn","verifySignUpWebauthn","refreshToken","refreshProviderToken","verifyToken","getUser","deanonymizeUser","changeUserEmail","sendVerificationEmail","verifyChangeUserMfa","changeUserPassword","sendPasswordResetEmail","addSecurityKey","verifyAddSecurityKey","verifyTicketURL","getVersion"],"mappings":"iJA2mE+B,CAC7BA,EACAC,EAAkC,MAElC,IAAIC,EAAQC,EAAAA,oBAAoBF,GAozChC,MAAO,CACLD,UACAI,kBApzCyBC,IACzBJ,EAAeK,KAAKD,GACpBH,EAAQC,EAAAA,oBAAoBF,EAAc,EAmzC1CM,QAjzCcC,MACdC,IAEA,MAAMC,EAAM,GAAGV,0BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,MACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAHsBP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIhED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAwxCfU,gBApxCsBf,MACtBC,IAEA,MAAMC,EAAM,GAAGV,qBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALiDP,EAC/CI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAyvCfW,sBArvC4BhB,MAC5Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,4BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAutCfa,eAntCqBlB,MACrBC,IAEA,MAAMC,EAAM,GAAGV,YACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,MACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA0rCfc,gBAtrCsBnB,MACtBC,IAEA,MAAMC,EAAM,GAAGV,YACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAIA,MAAO,CACLS,UAHyB,EAIzBR,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAgqCfe,YA5pCkBpB,MAClBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,iBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAgoCfgB,cA5nCoBrB,MACpBC,IAEA,MAAMC,EAAM,GAAGV,sBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,MACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALoCP,EAClCI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAimCfiB,UA7lCgBtB,MAChBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,QACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALiCP,EAC/BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA+jCfkB,gBA3jCsBvB,MACtBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,qBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA6hCfmB,oBAzhC0BxB,MAC1Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,0BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL2CP,EACzCI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA2/BfoB,cAv/BoBzB,MACpBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,mBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAy9BfqB,oBAr9B0B1B,MAC1Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,oBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAu7BfsB,eAn7BqB3B,MACrBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,qBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAu5BfuB,qBAn5B2B5B,MAC3Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,4BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL4CP,EAC1CI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAq3BfwB,wBAj3B8B7B,MAC9Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,8BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAq1BfyB,sBAj1B4B9B,MAC5Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,4BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAqzBf0B,4BAjzBkC/B,MAClCc,EACAb,KAEA,MAAMC,EAAM,GAAGV,gCACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALgDP,EAC9CI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmxBf2B,UA/wBgBhC,MAChBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,eACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAivBf4B,kBA7uBwB,CACxBC,EACAC,KAEA,MAAMC,EACJD,GACAE,OAAOC,QAAQH,GACZI,SAAQ,EAAEC,EAAKC,MACd,GAAY,2BAARD,EAEF,MACmB,iBAAVC,GACG,OAAVA,GACCC,MAAMC,QAAQF,GAMV,CAAC,GAAGD,KAAOI,mBAAmBC,OAAOJ,OAJnCJ,OAAOC,QAAQG,GAAOK,KAC3B,EAAEC,EAAGC,KAAO,GAAGD,KAAKH,mBAAmBC,OAAOG,QAMpD,MAAMC,EAAcP,MAAMC,QAAQF,GAC9BA,EAAMS,KAAK,KACM,iBAAVT,GAAgC,OAAVA,EAC3B9B,KAAKM,UAAUwB,GACfI,OAAOJ,GACb,MAAO,CAAC,GAAGD,KAAOI,mBAAmBK,KAAc,IAEpDC,KAAK,KAKV,OAHYd,EACR,GAAG5C,qBAA2B0C,KAAYE,IAC1C,GAAG5C,qBAA2B0C,GAC3B,EA4sBPiB,kBAzsBwBnD,MACxBkC,EACAjC,KAEA,MAAMC,EAAM,GAAGV,qBAA2B0C,oBACpC/B,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,MACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL+BP,EAC7BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA6qBf+C,eAzqBqBpD,MACrBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,oBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALiDP,EAC/CI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA2oBfgD,qBAvoB2BrD,MAC3Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,2BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAymBfiD,QArmBctD,MACdc,EACAb,KAEA,MAAMC,EAAM,GAAGV,YACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAykBfkD,oBArkB0BvD,MAC1Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,0BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAuiBfmD,eAniBqBxD,MACrBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,oBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALkDP,EAChDI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAqgBfoD,qBAjgB2BzD,MAC3Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,2BACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL8BP,EAC5BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmefqD,aA/dmB1D,MACnBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,UACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAHuBP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIjED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmcfsD,qBA/b2B3D,MAC3BkC,EACApB,EACAb,KAEA,MAAMC,EAAM,GAAGV,oBAA0B0C,IACnC/B,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL+BP,EAC7BI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAgafuD,YA5ZkB5D,MAClBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,iBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAHsBP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIhED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAgYfwD,QA5Xc7D,MACdC,IAEA,MAAMC,EAAM,GAAGV,SACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,MACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAHoBP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAI9DD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmWfyD,gBA/VsB9D,MACtBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,qBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmUf0D,gBA/TsB/D,MACtBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,sBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmSf2D,sBA/R4BhE,MAC5Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,uCACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmQf4D,oBA/P0BjE,MAC1Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,aACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmOf6D,mBA/NyBlE,MACzBc,EACAb,KAEA,MAAMC,EAAM,GAAGV,kBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmMf8D,uBA/L6BnE,MAC7Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,wBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAGd,MAAO,CACLK,KAH0BP,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EAIpED,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAmKf+D,eA/JqBpE,MACrBC,IAEA,MAAMC,EAAM,GAAGV,sBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALkDP,EAChDI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAoIfgE,qBAhI2BrE,MAC3Bc,EACAb,KAEA,MAAMC,EAAM,GAAGV,yBACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbJ,GAASI,SAEdS,KAAMH,KAAKM,UAAUH,KAGvB,GAAIX,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KAL4CP,EAC1CI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EAkGfiE,gBA9FuBnC,IACvB,MAAMC,EACJD,GACAE,OAAOC,QAAQH,GACZI,SAAQ,EAAEC,EAAKC,MAEd,MAAMQ,EAAcP,MAAMC,QAAQF,GAC9BA,EAAMS,KAAK,KACM,iBAAVT,GAAgC,OAAVA,EAC3B9B,KAAKM,UAAUwB,GACfI,OAAOJ,GACb,MAAO,CAAC,GAAGD,KAAOI,mBAAmBK,KAAc,IAEpDC,KAAK,KAKV,OAHYd,EACR,GAAG5C,YAAkB4C,IACrB,GAAG5C,UACA,EA6EP+E,WA1EiBvE,MACjBC,IAEA,MAAMC,EAAM,GAAGV,YACTW,QAAYT,EAAMQ,EAAK,IACxBD,EACHG,OAAQ,MACRC,QAAS,IACJJ,GAASI,WAIhB,GAAIF,EAAIG,QAAU,IAAK,CACrB,MAAMC,EAAe,CAAC,KAAKC,SAASL,EAAIG,QAAU,WAAaH,EAAIM,OAC7DC,EAAmBH,EAAeI,KAAKC,MAAML,GAAgB,CAAA,EACnE,MAAM,IAAIM,EAAAA,WAAWH,EAASP,EAAIG,OAAQH,EAAIE,QAChD,CAEA,MAAME,EAAe,CAAC,IAAK,IAAK,KAAKC,SAASL,EAAIG,QAC9C,WACMH,EAAIM,OAKd,MAAO,CACLK,KALqCP,EACnCI,KAAKC,MAAML,GACX,CAAA,EAIFD,OAAQH,EAAIG,OACZD,QAASF,EAAIE,QAAA,EA8Cf"}
@@ -1,4 +1,4 @@
1
- import { c as createEnhancedFetch, F as FetchError } from "../fetch-2PHmQBIJ.mjs";
1
+ import { c as createEnhancedFetch, F as FetchError } from "../fetch-2PHmQBIJ.js";
2
2
  const createAPIClient = (baseURL, chainFunctions = []) => {
3
3
  let fetch = createEnhancedFetch(chainFunctions);
4
4
  const pushChainFunction = (chainFunction) => {
@@ -970,4 +970,4 @@ const createAPIClient = (baseURL, chainFunctions = []) => {
970
970
  export {
971
971
  createAPIClient
972
972
  };
973
- //# sourceMappingURL=auth.es.js.map
973
+ //# sourceMappingURL=auth.js.map