@nsshunt/stsoauth2plugin 1.0.64 → 1.0.66
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/stsoauth2plugin.mjs +107 -99
- package/dist/stsoauth2plugin.mjs.map +1 -1
- package/dist/stsoauth2plugin.umd.js +109 -100
- package/dist/stsoauth2plugin.umd.js.map +1 -1
- package/package.json +5 -5
- package/types/stsoauth2manager.d.ts +1 -0
- package/types/stsoauth2manager.d.ts.map +1 -1
- package/types/stsoauth2types.d.ts +2 -0
- package/types/stsoauth2types.d.ts.map +1 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
(function(global2, factory) {
|
|
2
|
-
typeof exports === "object" && typeof module !== "undefined" ? factory(exports, require("vue"), require("
|
|
3
|
-
})(this, function(exports2, vue,
|
|
2
|
+
typeof exports === "object" && typeof module !== "undefined" ? factory(exports, require("vue"), require("node:worker_threads"), require("@nsshunt/stsutils"), require("@nsshunt/stsvueutils"), require("pinia"), require("@nsshunt/stspublisherserver"), require("node:https"), require("colors"), require("axios"), require("@nsshunt/stsinstrumentation")) : typeof define === "function" && define.amd ? define(["exports", "vue", "node:worker_threads", "@nsshunt/stsutils", "@nsshunt/stsvueutils", "pinia", "@nsshunt/stspublisherserver", "node:https", "colors", "axios", "@nsshunt/stsinstrumentation"], factory) : (global2 = typeof globalThis !== "undefined" ? globalThis : global2 || self, factory(global2["@nsshunt/stsoauth2plugin"] = {}, global2.vue, global2.worker_threads, global2.stsutils, global2.stsvueutils, global2.pinia, global2.stspublisherserver, global2.https, null, global2.axios, global2.stsinstrumentation));
|
|
3
|
+
})(this, function(exports2, vue, wt, stsutils, stsvueutils, pinia, stspublisherserver, https, colors, axios, stsinstrumentation) {
|
|
4
4
|
"use strict";var __defProp = Object.defineProperty;
|
|
5
5
|
var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
|
|
6
6
|
var __publicField = (obj, key, value) => {
|
|
@@ -38,7 +38,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
38
38
|
return method;
|
|
39
39
|
};
|
|
40
40
|
|
|
41
|
-
var _crypto, _router, _cUtils, _qParams, _STORAGE_AUTHORIZE_OPTIONS_KEY, _STORAGE_SESSION_KEY, _aic, _options, _messages, _oauth2ManagerPort, _messageId, _messageHandlers, _messageTimeout, _worker, _transactionStore, _operationSemaphore, _maxSemaphoreRetries, _semaphoreRetrySleep, _ProcessMessageResponse, _PostMessage, _HandleLogEvent, _HandleUpdateInstrumentEvent, _GetStore, _HandleErrorEvent, _HandleAuthenticateEvent, _SetupRoute, _clientSessionStore, _cUtils2, _qParams2, _STORAGE_SESSION_KEY2, _oauthWorkerPort, _options2, _httpsAgent, _logger,
|
|
41
|
+
var _crypto, _router, _cUtils, _qParams, _STORAGE_AUTHORIZE_OPTIONS_KEY, _STORAGE_SESSION_KEY, _aic, _options, _messages, _oauth2ManagerPort, _messageId, _messageHandlers, _messageTimeout, _worker, _transactionStore, _operationSemaphore, _maxSemaphoreRetries, _semaphoreRetrySleep, _LogDebugMessage, LogDebugMessage_fn, _LogInfoMessage, LogInfoMessage_fn, _LogErrorMessage, LogErrorMessage_fn, _ProcessMessageResponse, _PostMessage, _HandleLogEvent, _HandleUpdateInstrumentEvent, _GetStore, _HandleErrorEvent, _HandleAuthenticateEvent, _SetupRoute, _clientSessionStore, _cUtils2, _qParams2, _STORAGE_SESSION_KEY2, _oauthWorkerPort, _options2, _httpsAgent, _logger, _LogDebugMessage2, LogDebugMessage_fn2, _LogInfoMessage2, LogInfoMessage_fn2, _LogErrorMessage2, LogErrorMessage_fn2, _HandleAuthenticateEvent2, _HandleErrorEvent2, _LogMessage, _GetAccessToken, _GetCookies, _UpdateInstrument, _ProcessCommand, _RestoreSession, _Authorize, _HandleRedirect, _GetTokenFromBroker, _GetToken, _RefreshToken, _Logout;
|
|
42
42
|
function _interopNamespaceDefault(e) {
|
|
43
43
|
const n = Object.create(null, { [Symbol.toStringTag]: { value: "Module" } });
|
|
44
44
|
if (e) {
|
|
@@ -2546,15 +2546,12 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2546
2546
|
}
|
|
2547
2547
|
*/
|
|
2548
2548
|
});
|
|
2549
|
-
let debug;
|
|
2550
|
-
if (isNode) {
|
|
2551
|
-
debug = Debug(`proc:${process.pid}:stsoauth2manager.ts`);
|
|
2552
|
-
} else {
|
|
2553
|
-
debug = Debug(`proc:0:stsoauth2manager.ts`);
|
|
2554
|
-
}
|
|
2555
2549
|
class STSOAuth2Manager {
|
|
2556
2550
|
// ms
|
|
2557
2551
|
constructor(app, options) {
|
|
2552
|
+
__privateAdd(this, _LogDebugMessage);
|
|
2553
|
+
__privateAdd(this, _LogInfoMessage);
|
|
2554
|
+
__privateAdd(this, _LogErrorMessage);
|
|
2558
2555
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
2559
2556
|
__privateAdd(this, _router, null);
|
|
2560
2557
|
__privateAdd(this, _cUtils, new CryptoUtils());
|
|
@@ -2579,7 +2576,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2579
2576
|
__privateAdd(this, _semaphoreRetrySleep, 50);
|
|
2580
2577
|
__privateAdd(this, _ProcessMessageResponse, (data) => {
|
|
2581
2578
|
const messageResponse = data;
|
|
2582
|
-
|
|
2579
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.yellow(`STSOAuth2Manager:#ProcessMessageResponse: message data = [${JSON.stringify(messageResponse)}]`));
|
|
2583
2580
|
if (messageResponse.messageId === -1) {
|
|
2584
2581
|
switch (messageResponse.command) {
|
|
2585
2582
|
case IOauth2ListenerCommand.AUTHENTICATE_EVENT:
|
|
@@ -2616,10 +2613,10 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2616
2613
|
__privateGet(this, _messageHandlers)[message.messageId] = (response) => {
|
|
2617
2614
|
clearTimeout(timeout);
|
|
2618
2615
|
delete __privateGet(this, _messageHandlers)[message.messageId];
|
|
2619
|
-
|
|
2616
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.yellow(`STSOAuth2Manager:#PostMessage: resolve callback response= [${JSON.stringify(response)}]`));
|
|
2620
2617
|
resolve(response);
|
|
2621
2618
|
};
|
|
2622
|
-
|
|
2619
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.yellow(`STSOAuth2Manager:#PostMessage: posting message = [${JSON.stringify(message)}]`));
|
|
2623
2620
|
__privateGet(this, _oauth2ManagerPort).postMessage(message);
|
|
2624
2621
|
});
|
|
2625
2622
|
});
|
|
@@ -2627,7 +2624,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2627
2624
|
if (__privateGet(this, _aic)) {
|
|
2628
2625
|
__privateGet(this, _aic).LogEx(message);
|
|
2629
2626
|
}
|
|
2630
|
-
|
|
2627
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, message);
|
|
2631
2628
|
});
|
|
2632
2629
|
// UpdateInstrument = (instrumentName: Gauge, telemetry: InstrumentBaseTelemetry): void => {
|
|
2633
2630
|
__privateAdd(this, _HandleUpdateInstrumentEvent, (instrumentName, telemetry) => {
|
|
@@ -2663,14 +2660,14 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2663
2660
|
}
|
|
2664
2661
|
});
|
|
2665
2662
|
__privateAdd(this, _SetupRoute, (app, router) => {
|
|
2666
|
-
|
|
2663
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.gray(`STSOAuth2Manager:#SetupRoute`));
|
|
2667
2664
|
router.beforeEach(async (to, from, next) => {
|
|
2668
2665
|
const oAuth2Manager = app.config.globalProperties.$sts[STSOAuth2ManagerPluginKey];
|
|
2669
|
-
|
|
2666
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.gray(`beforeEach: from: [${from.path}], to: [${to.path}]`));
|
|
2670
2667
|
if (__privateGet(this, _GetStore).call(this).LoggedIn === false) {
|
|
2671
|
-
|
|
2668
|
+
__privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, `Not logged in`);
|
|
2672
2669
|
if (to.path.localeCompare(`${__privateGet(this, _options).uriBase}authorize`) === 0) {
|
|
2673
|
-
|
|
2670
|
+
__privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, `to = ${__privateGet(this, _options).uriBase}authorize`);
|
|
2674
2671
|
next();
|
|
2675
2672
|
return;
|
|
2676
2673
|
} else if (to.path.localeCompare(`${__privateGet(this, _options).uriBase}consent`) === 0) {
|
|
@@ -2697,9 +2694,9 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2697
2694
|
}
|
|
2698
2695
|
const str = to.query;
|
|
2699
2696
|
if (str[stsutils.OAuth2ParameterType.CODE] || str[stsutils.OAuth2ParameterType.ERROR]) {
|
|
2700
|
-
|
|
2697
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:#SetupRoute:Processing redirect: [${JSON.stringify(str)}]`));
|
|
2701
2698
|
const retVal = await oAuth2Manager.HandleRedirect(str);
|
|
2702
|
-
|
|
2699
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:#SetupRoute:Redirect result: [${retVal}]`));
|
|
2703
2700
|
if (retVal) {
|
|
2704
2701
|
next({
|
|
2705
2702
|
path: `${__privateGet(this, _options).uriBase}`,
|
|
@@ -2714,11 +2711,11 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2714
2711
|
return;
|
|
2715
2712
|
}
|
|
2716
2713
|
}
|
|
2717
|
-
|
|
2714
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:#SetupRoute:Restoring session`);
|
|
2718
2715
|
const sessionRestored = await oAuth2Manager.RestoreSession();
|
|
2719
|
-
|
|
2716
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:#SetupRoute:Session restored: [${sessionRestored}]`);
|
|
2720
2717
|
if (sessionRestored !== true) {
|
|
2721
|
-
|
|
2718
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:#SetupRoute:Session not restored - need to authorize`);
|
|
2722
2719
|
oAuth2Manager.Authorize();
|
|
2723
2720
|
next();
|
|
2724
2721
|
return;
|
|
@@ -2755,7 +2752,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2755
2752
|
throw new Error(`STSOAuth2Manager:ExecuteRefreshToken:maxSemaphoreRetries: [${__privateGet(this, _maxSemaphoreRetries)}] exceeded.`);
|
|
2756
2753
|
}
|
|
2757
2754
|
await stsutils.Sleep(__privateGet(this, _semaphoreRetrySleep));
|
|
2758
|
-
|
|
2755
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.cyan(`STSOAuth2Manager:ExecuteRefreshToken:locked by operationSemaphore, retry count: [${retryCount}]`));
|
|
2759
2756
|
return await this.ExecuteRefreshToken(retryCount + 1);
|
|
2760
2757
|
} else {
|
|
2761
2758
|
__privateSet(this, _operationSemaphore, true);
|
|
@@ -2771,12 +2768,12 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2771
2768
|
});
|
|
2772
2769
|
__publicField(this, "RestoreSession", async () => {
|
|
2773
2770
|
try {
|
|
2774
|
-
|
|
2771
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:RestoreSession:postMessage: [${IOauth2ListenerCommand.RESTORE_SESSION}]`);
|
|
2775
2772
|
const response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.RESTORE_SESSION });
|
|
2776
|
-
|
|
2773
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:RestoreSession:response: [${JSON.stringify(response.payload)}]`);
|
|
2777
2774
|
return response.payload;
|
|
2778
2775
|
} catch (error) {
|
|
2779
|
-
|
|
2776
|
+
__privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`RestoreSession Error: ${error}`));
|
|
2780
2777
|
return false;
|
|
2781
2778
|
}
|
|
2782
2779
|
});
|
|
@@ -2791,18 +2788,18 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2791
2788
|
return response.payload.authorizeOptionsClientCopy;
|
|
2792
2789
|
}
|
|
2793
2790
|
} catch (error) {
|
|
2794
|
-
|
|
2791
|
+
__privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`Authorize Error: ${error}`));
|
|
2795
2792
|
}
|
|
2796
2793
|
return {};
|
|
2797
2794
|
});
|
|
2798
2795
|
__publicField(this, "HandleRedirect", async (queryVars) => {
|
|
2799
2796
|
try {
|
|
2800
|
-
|
|
2797
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:HandleRedirect`));
|
|
2801
2798
|
let response = null;
|
|
2802
2799
|
if (queryVars[stsutils.OAuth2ParameterType.CODE]) {
|
|
2803
2800
|
const authorizeOptions = __privateGet(this, _transactionStore).get(__privateGet(this, _STORAGE_AUTHORIZE_OPTIONS_KEY));
|
|
2804
2801
|
__privateGet(this, _transactionStore).remove(__privateGet(this, _STORAGE_AUTHORIZE_OPTIONS_KEY));
|
|
2805
|
-
|
|
2802
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:HandleRedirect: sending HANDLE_REDIRECT command`));
|
|
2806
2803
|
response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.HANDLE_REDIRECT, payload: {
|
|
2807
2804
|
queryVars,
|
|
2808
2805
|
authorizeOptions
|
|
@@ -2810,10 +2807,10 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2810
2807
|
} else {
|
|
2811
2808
|
response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.HANDLE_REDIRECT, payload: queryVars });
|
|
2812
2809
|
}
|
|
2813
|
-
|
|
2810
|
+
__privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:HandleRedirect: HANDLE_REDIRECT response: [${JSON.stringify(response)}]`));
|
|
2814
2811
|
return response.payload;
|
|
2815
2812
|
} catch (error) {
|
|
2816
|
-
|
|
2813
|
+
__privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`HandleRedirect Error: ${error}`));
|
|
2817
2814
|
return false;
|
|
2818
2815
|
}
|
|
2819
2816
|
});
|
|
@@ -2822,7 +2819,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2822
2819
|
const response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.LOGOUT });
|
|
2823
2820
|
return response.payload;
|
|
2824
2821
|
} catch (error) {
|
|
2825
|
-
|
|
2822
|
+
__privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`Logout Error: ${error}`));
|
|
2826
2823
|
return false;
|
|
2827
2824
|
}
|
|
2828
2825
|
});
|
|
@@ -2832,7 +2829,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2832
2829
|
const response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.LOGOUT });
|
|
2833
2830
|
return response.payload;
|
|
2834
2831
|
} catch (error) {
|
|
2835
|
-
|
|
2832
|
+
__privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`InvokeExternalAPI Error: ${error}`));
|
|
2836
2833
|
return null;
|
|
2837
2834
|
}
|
|
2838
2835
|
});
|
|
@@ -2863,10 +2860,10 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2863
2860
|
}
|
|
2864
2861
|
if (!isNode) {
|
|
2865
2862
|
__privateGet(this, _worker).onmessage = (data) => {
|
|
2866
|
-
|
|
2863
|
+
__privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, chalk$1.green(`this.#worker.onmessage = [${data}]`));
|
|
2867
2864
|
};
|
|
2868
|
-
__privateGet(this, _worker).onerror =
|
|
2869
|
-
|
|
2865
|
+
__privateGet(this, _worker).onerror = (error) => {
|
|
2866
|
+
__privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, chalk$1.green(`this.#worker.onerror = [${JSON.stringify(error)}]`));
|
|
2870
2867
|
};
|
|
2871
2868
|
}
|
|
2872
2869
|
let workerMessage;
|
|
@@ -2923,6 +2920,18 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2923
2920
|
_operationSemaphore = new WeakMap();
|
|
2924
2921
|
_maxSemaphoreRetries = new WeakMap();
|
|
2925
2922
|
_semaphoreRetrySleep = new WeakMap();
|
|
2923
|
+
_LogDebugMessage = new WeakSet();
|
|
2924
|
+
LogDebugMessage_fn = function(message) {
|
|
2925
|
+
__privateGet(this, _options).logger.debug(message);
|
|
2926
|
+
};
|
|
2927
|
+
_LogInfoMessage = new WeakSet();
|
|
2928
|
+
LogInfoMessage_fn = function(message) {
|
|
2929
|
+
__privateGet(this, _options).logger.info(message);
|
|
2930
|
+
};
|
|
2931
|
+
_LogErrorMessage = new WeakSet();
|
|
2932
|
+
LogErrorMessage_fn = function(message) {
|
|
2933
|
+
__privateGet(this, _options).logger.error(message);
|
|
2934
|
+
};
|
|
2926
2935
|
_ProcessMessageResponse = new WeakMap();
|
|
2927
2936
|
_PostMessage = new WeakMap();
|
|
2928
2937
|
_HandleLogEvent = new WeakMap();
|
|
@@ -2995,11 +3004,11 @@ var __privateMethod = (obj, member, method) => {
|
|
|
2995
3004
|
class STSOAuth2Worker {
|
|
2996
3005
|
constructor(workerPort, options, logger) {
|
|
2997
3006
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
2998
|
-
__privateAdd(this,
|
|
3007
|
+
__privateAdd(this, _LogDebugMessage2);
|
|
2999
3008
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
3000
|
-
__privateAdd(this,
|
|
3009
|
+
__privateAdd(this, _LogInfoMessage2);
|
|
3001
3010
|
// eslint-disable-next-line @typescript-eslint/no-explicit-any
|
|
3002
|
-
__privateAdd(this,
|
|
3011
|
+
__privateAdd(this, _LogErrorMessage2);
|
|
3003
3012
|
//#storageManager = null;
|
|
3004
3013
|
__privateAdd(this, _clientSessionStore, void 0);
|
|
3005
3014
|
__privateAdd(this, _cUtils2, new CryptoUtils());
|
|
@@ -3099,7 +3108,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3099
3108
|
__publicField(this, "SetupListener", () => {
|
|
3100
3109
|
__privateGet(this, _oauthWorkerPort).onmessage = async (data) => {
|
|
3101
3110
|
const auth2ListenerMessage = data.data;
|
|
3102
|
-
__privateMethod(this,
|
|
3111
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, `STSOAuth2Worker:SetupListener:onmessage: [${auth2ListenerMessage.command}]`);
|
|
3103
3112
|
switch (auth2ListenerMessage.command) {
|
|
3104
3113
|
case IOauth2ListenerCommand.RESTORE_SESSION:
|
|
3105
3114
|
__privateGet(this, _ProcessCommand).call(this, auth2ListenerMessage, await __privateGet(this, _RestoreSession).call(this));
|
|
@@ -3141,12 +3150,12 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3141
3150
|
const sessionData = __privateGet(this, _clientSessionStore).get(__privateGet(this, _STORAGE_SESSION_KEY2));
|
|
3142
3151
|
if (sessionData) {
|
|
3143
3152
|
restoredSessionData = sessionData.tokenResponse;
|
|
3144
|
-
__privateMethod(this,
|
|
3153
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Session restored from client storage.");
|
|
3145
3154
|
__privateGet(this, _LogMessage).call(this, "Session restored from client storage.");
|
|
3146
3155
|
} else {
|
|
3147
3156
|
const url = `${__privateGet(this, _options2).brokerendpoint}:${__privateGet(this, _options2).brokerport}${__privateGet(this, _options2).brokerapiroot}/session`;
|
|
3148
|
-
__privateMethod(this,
|
|
3149
|
-
__privateMethod(this,
|
|
3157
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "RestoreSession");
|
|
3158
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, url);
|
|
3150
3159
|
__privateGet(this, _LogMessage).call(this, "RestoreSession.");
|
|
3151
3160
|
__privateGet(this, _LogMessage).call(this, url);
|
|
3152
3161
|
try {
|
|
@@ -3163,7 +3172,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3163
3172
|
// Ensure cookies are passed to the service
|
|
3164
3173
|
timeout: __privateGet(this, _options2).timeout
|
|
3165
3174
|
};
|
|
3166
|
-
__privateMethod(this,
|
|
3175
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#RestoreSession:session request detail: [${JSON.stringify(rConfig)}]`));
|
|
3167
3176
|
if (isNode) {
|
|
3168
3177
|
rConfig.httpsAgent = __privateGet(this, _httpsAgent);
|
|
3169
3178
|
}
|
|
@@ -3178,24 +3187,24 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3178
3187
|
newSessionData.brokerCookie = retVal.headers["set-cookie"];
|
|
3179
3188
|
}
|
|
3180
3189
|
__privateGet(this, _clientSessionStore).set(__privateGet(this, _STORAGE_SESSION_KEY2), newSessionData);
|
|
3181
|
-
__privateMethod(this,
|
|
3190
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Session restored from server side cookie.");
|
|
3182
3191
|
} else {
|
|
3183
|
-
__privateMethod(this,
|
|
3184
|
-
__privateMethod(this,
|
|
3192
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, `Could not restore previous session. No restoredSessionData available.`);
|
|
3193
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, JSON.stringify(retVal.data));
|
|
3185
3194
|
}
|
|
3186
3195
|
} else {
|
|
3187
|
-
__privateMethod(this,
|
|
3188
|
-
__privateMethod(this,
|
|
3196
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, "Could not restore previous session:-");
|
|
3197
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, JSON.stringify(retVal.data));
|
|
3189
3198
|
}
|
|
3190
3199
|
} catch (error) {
|
|
3191
|
-
__privateMethod(this,
|
|
3192
|
-
__privateMethod(this,
|
|
3193
|
-
__privateMethod(this,
|
|
3200
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, "Could not restore previous session (error state):-");
|
|
3201
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, error);
|
|
3202
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, JSON.stringify(error));
|
|
3194
3203
|
}
|
|
3195
3204
|
}
|
|
3196
3205
|
if (restoredSessionData !== null) {
|
|
3197
3206
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, restoredSessionData.id_token);
|
|
3198
|
-
__privateMethod(this,
|
|
3207
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Refreshing tokens ...");
|
|
3199
3208
|
return await __privateGet(this, _RefreshToken).call(this);
|
|
3200
3209
|
} else {
|
|
3201
3210
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, null);
|
|
@@ -3203,7 +3212,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3203
3212
|
}
|
|
3204
3213
|
});
|
|
3205
3214
|
__privateAdd(this, _Authorize, async () => {
|
|
3206
|
-
__privateMethod(this,
|
|
3215
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Authorize ...");
|
|
3207
3216
|
const client_id = __privateGet(this, _options2).client_id;
|
|
3208
3217
|
const nonce = __privateGet(this, _cUtils2).CreateRandomString();
|
|
3209
3218
|
const response_type = [AuthorizeOptionsResponseType.CODE];
|
|
@@ -3227,9 +3236,9 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3227
3236
|
};
|
|
3228
3237
|
const authorizeOptionsClientCopy = { ...authorizeOptions };
|
|
3229
3238
|
const url = `${__privateGet(this, _options2).authorizeendpoint}:${__privateGet(this, _options2).authorizeport}${__privateGet(this, _options2).authorizeapiroot}${__privateGet(this, _options2).authorizeapi}?${__privateGet(this, _qParams2).CreateQueryParams(authorizeOptions)}`;
|
|
3230
|
-
__privateMethod(this,
|
|
3239
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, url);
|
|
3231
3240
|
authorizeOptions.code_verifier = code_verifier;
|
|
3232
|
-
__privateMethod(this,
|
|
3241
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, `Authorize:authorizeOptions: [${JSON.stringify(authorizeOptions)}]`);
|
|
3233
3242
|
return {
|
|
3234
3243
|
url,
|
|
3235
3244
|
authorizeOptions,
|
|
@@ -3240,29 +3249,29 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3240
3249
|
__privateAdd(this, _HandleRedirect, async (payload) => {
|
|
3241
3250
|
const queryVars = payload.queryVars;
|
|
3242
3251
|
const authorizeOptions = payload.authorizeOptions;
|
|
3243
|
-
__privateMethod(this,
|
|
3244
|
-
__privateMethod(this,
|
|
3252
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#HandleRedirect: HandleRedirect`));
|
|
3253
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#HandleRedirect: HandleRedirect:Query Vars: [${JSON.stringify(queryVars)}]`));
|
|
3245
3254
|
if (queryVars[stsutils.OAuth2ParameterType.CODE]) {
|
|
3246
3255
|
const response = queryVars;
|
|
3247
|
-
__privateMethod(this,
|
|
3256
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, `authorizeOptions from transaction state: [${JSON.stringify(authorizeOptions)}]`);
|
|
3248
3257
|
const redirectState = response.state;
|
|
3249
3258
|
const authorizeOptionsState = authorizeOptions.state;
|
|
3250
3259
|
if (authorizeOptionsState.localeCompare(redirectState) === 0) {
|
|
3251
|
-
__privateMethod(this,
|
|
3260
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, chalk$1.green("redirected state (from queryVars) matched previously saved transaction authorizeOptions state"));
|
|
3252
3261
|
return await __privateGet(this, _GetToken).call(this, authorizeOptions, response);
|
|
3253
3262
|
} else {
|
|
3254
|
-
__privateMethod(this,
|
|
3255
|
-
__privateMethod(this,
|
|
3256
|
-
__privateMethod(this,
|
|
3263
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("redirected state (from queryVars) did NOT match previously saved transaction authorizeOptions state"));
|
|
3264
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`authorizeOptionsState: [${authorizeOptionsState}]`));
|
|
3265
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`redirectState: [${redirectState}]`));
|
|
3257
3266
|
__privateGet(this, _HandleErrorEvent2).call(this, { message: "State un-matched" });
|
|
3258
3267
|
return false;
|
|
3259
3268
|
}
|
|
3260
3269
|
} else if (queryVars[stsutils.OAuth2ParameterType.ERROR]) {
|
|
3261
|
-
__privateMethod(this,
|
|
3270
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`State un-matched (1)`));
|
|
3262
3271
|
__privateGet(this, _HandleErrorEvent2).call(this, { message: "State un-matched" });
|
|
3263
3272
|
return false;
|
|
3264
3273
|
} else {
|
|
3265
|
-
__privateMethod(this,
|
|
3274
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`State un-matched (2)`));
|
|
3266
3275
|
__privateGet(this, _HandleErrorEvent2).call(this, { message: "State un-matched" });
|
|
3267
3276
|
return false;
|
|
3268
3277
|
}
|
|
@@ -3288,7 +3297,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3288
3297
|
*/
|
|
3289
3298
|
// Get access_token, refresh_token and id_token using OAuth2 Authorization Code Flow
|
|
3290
3299
|
__privateAdd(this, _GetTokenFromBroker, async (authorizationCodeFlowParameters) => {
|
|
3291
|
-
__privateMethod(this,
|
|
3300
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker`));
|
|
3292
3301
|
__privateGet(this, _clientSessionStore).remove(__privateGet(this, _STORAGE_SESSION_KEY2));
|
|
3293
3302
|
const url = `${__privateGet(this, _options2).brokerendpoint}:${__privateGet(this, _options2).brokerport}${__privateGet(this, _options2).brokerapiroot}/token`;
|
|
3294
3303
|
try {
|
|
@@ -3300,15 +3309,15 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3300
3309
|
// Ensure cookies are passed to the service
|
|
3301
3310
|
timeout: __privateGet(this, _options2).timeout
|
|
3302
3311
|
};
|
|
3303
|
-
__privateMethod(this,
|
|
3312
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: request config: [${JSON.stringify(rConfig)}]`));
|
|
3304
3313
|
if (isNode) {
|
|
3305
3314
|
rConfig.httpsAgent = __privateGet(this, _httpsAgent);
|
|
3306
3315
|
}
|
|
3307
|
-
__privateMethod(this,
|
|
3316
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: axios API call`));
|
|
3308
3317
|
const retVal = await axios(rConfig);
|
|
3309
|
-
__privateMethod(this,
|
|
3318
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: axios API call result: [${retVal.status}]`));
|
|
3310
3319
|
if (retVal.status === StatusCodes.OK) {
|
|
3311
|
-
__privateMethod(this,
|
|
3320
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: storing tokens`));
|
|
3312
3321
|
const tokenResponse = retVal.data;
|
|
3313
3322
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, tokenResponse.id_token);
|
|
3314
3323
|
const newSessionData = {
|
|
@@ -3320,26 +3329,26 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3320
3329
|
__privateGet(this, _clientSessionStore).set(__privateGet(this, _STORAGE_SESSION_KEY2), newSessionData);
|
|
3321
3330
|
return true;
|
|
3322
3331
|
} else if (retVal.status === StatusCodes.UNAUTHORIZED) {
|
|
3323
|
-
__privateMethod(this,
|
|
3332
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: NOT storing tokens, status: [${retVal.status}]`));
|
|
3324
3333
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, null);
|
|
3325
3334
|
return false;
|
|
3326
3335
|
} else {
|
|
3327
|
-
__privateMethod(this,
|
|
3336
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: NOT storing tokens (general error 1), status: [${retVal.status}]`));
|
|
3328
3337
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, null);
|
|
3329
|
-
__privateMethod(this,
|
|
3330
|
-
__privateMethod(this,
|
|
3338
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("Could not obtain access_token from token end-point:-"));
|
|
3339
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(JSON.stringify(retVal.data)));
|
|
3331
3340
|
return false;
|
|
3332
3341
|
}
|
|
3333
3342
|
} catch (error) {
|
|
3334
|
-
__privateMethod(this,
|
|
3343
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`#GetTokenFromBroker: NOT storing tokens (general error 2), status: [${error}]`));
|
|
3335
3344
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, null);
|
|
3336
3345
|
return false;
|
|
3337
3346
|
}
|
|
3338
3347
|
});
|
|
3339
3348
|
// Get access_token, refresh_token and id_token using OAuth2 Authorization Code Flow
|
|
3340
3349
|
__privateAdd(this, _GetToken, async (authorizeOptions, authorizeResponse) => {
|
|
3341
|
-
__privateMethod(this,
|
|
3342
|
-
__privateMethod(this,
|
|
3350
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "#GetToken");
|
|
3351
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, authorizeResponse);
|
|
3343
3352
|
__privateGet(this, _clientSessionStore).remove(__privateGet(this, _STORAGE_SESSION_KEY2));
|
|
3344
3353
|
const authorizationCodeFlowParameters = {
|
|
3345
3354
|
client_id: __privateGet(this, _options2).client_id,
|
|
@@ -3377,10 +3386,10 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3377
3386
|
}
|
|
3378
3387
|
*/
|
|
3379
3388
|
__privateAdd(this, _RefreshToken, async () => {
|
|
3380
|
-
__privateMethod(this,
|
|
3389
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.cyan(`STSOAuth2Worker:#RefreshToken:start`));
|
|
3381
3390
|
const sessionData = __privateGet(this, _clientSessionStore).get(__privateGet(this, _STORAGE_SESSION_KEY2));
|
|
3382
3391
|
if (sessionData) {
|
|
3383
|
-
__privateMethod(this,
|
|
3392
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.cyan(`STSOAuth2Worker:#RefreshToken:sessionData: [${JSON.stringify(sessionData)}]`));
|
|
3384
3393
|
const currentSessionData = sessionData.tokenResponse;
|
|
3385
3394
|
const refreshFlowParameters = {
|
|
3386
3395
|
client_id: __privateGet(this, _options2).client_id,
|
|
@@ -3390,7 +3399,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3390
3399
|
};
|
|
3391
3400
|
return await __privateGet(this, _GetTokenFromBroker).call(this, refreshFlowParameters);
|
|
3392
3401
|
} else {
|
|
3393
|
-
__privateMethod(this,
|
|
3402
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`STSOAuth2Worker:#RefreshToken:sessionData not found within clientSessionStore`));
|
|
3394
3403
|
return false;
|
|
3395
3404
|
}
|
|
3396
3405
|
});
|
|
@@ -3400,18 +3409,18 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3400
3409
|
// clear session storage
|
|
3401
3410
|
// clear all state from $store
|
|
3402
3411
|
__privateAdd(this, _Logout, async () => {
|
|
3403
|
-
__privateMethod(this,
|
|
3412
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Logout");
|
|
3404
3413
|
const url = `${__privateGet(this, _options2).brokerendpoint}:${__privateGet(this, _options2).brokerport}${__privateGet(this, _options2).brokerapiroot}/logout`;
|
|
3405
|
-
__privateMethod(this,
|
|
3414
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, url);
|
|
3406
3415
|
const sessionData = __privateGet(this, _clientSessionStore).get(__privateGet(this, _STORAGE_SESSION_KEY2));
|
|
3407
3416
|
if (sessionData) {
|
|
3408
3417
|
const currentSessionData = sessionData.tokenResponse;
|
|
3409
3418
|
const refresh_token = currentSessionData.refresh_token;
|
|
3410
|
-
__privateMethod(this,
|
|
3419
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, refresh_token);
|
|
3411
3420
|
const decodedRefreshToken = jwtDecode(refresh_token);
|
|
3412
|
-
__privateMethod(this,
|
|
3421
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, decodedRefreshToken);
|
|
3413
3422
|
const sessionId = decodedRefreshToken.sts_session;
|
|
3414
|
-
__privateMethod(this,
|
|
3423
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, sessionId);
|
|
3415
3424
|
__privateGet(this, _clientSessionStore).remove(__privateGet(this, _STORAGE_SESSION_KEY2));
|
|
3416
3425
|
__privateGet(this, _HandleAuthenticateEvent2).call(this, null);
|
|
3417
3426
|
try {
|
|
@@ -3425,7 +3434,7 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3425
3434
|
// Ensure cookies are passed to the service
|
|
3426
3435
|
timeout: __privateGet(this, _options2).timeout
|
|
3427
3436
|
};
|
|
3428
|
-
__privateMethod(this,
|
|
3437
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#Logout: request config: [${rConfig}]`));
|
|
3429
3438
|
if (isNode) {
|
|
3430
3439
|
rConfig.httpsAgent = __privateGet(this, _httpsAgent);
|
|
3431
3440
|
}
|
|
@@ -3433,27 +3442,27 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3433
3442
|
if (retVal.data.status === StatusCodes.OK) {
|
|
3434
3443
|
return true;
|
|
3435
3444
|
} else {
|
|
3436
|
-
__privateMethod(this,
|
|
3437
|
-
__privateMethod(this,
|
|
3445
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("Error during logout (1: server side)"));
|
|
3446
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(JSON.stringify(retVal.data)));
|
|
3438
3447
|
return false;
|
|
3439
3448
|
}
|
|
3440
3449
|
} catch (error) {
|
|
3441
|
-
__privateMethod(this,
|
|
3442
|
-
__privateMethod(this,
|
|
3443
|
-
__privateMethod(this,
|
|
3450
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("Error during logout (2: server side)"));
|
|
3451
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(error));
|
|
3452
|
+
__privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(JSON.stringify(error)));
|
|
3444
3453
|
return false;
|
|
3445
3454
|
}
|
|
3446
3455
|
} else {
|
|
3447
|
-
__privateMethod(this,
|
|
3456
|
+
__privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Error during logout. Could not restore session from session storage.");
|
|
3448
3457
|
return false;
|
|
3449
3458
|
}
|
|
3450
3459
|
});
|
|
3451
3460
|
__privateSet(this, _options2, options);
|
|
3452
3461
|
__privateSet(this, _logger, logger);
|
|
3453
|
-
__privateMethod(this,
|
|
3462
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, `STSOAuth2Worker:constructor:#options: [${JSON.stringify(__privateGet(this, _options2))}]`);
|
|
3454
3463
|
__privateSet(this, _clientSessionStore, new stsvueutils.ClientStorageFactory({ clientStorageType: stsvueutils.ClientStorageType.MEMORY_STORAGE, usePrefix: false }).GetStorage());
|
|
3455
3464
|
__privateSet(this, _oauthWorkerPort, workerPort);
|
|
3456
|
-
__privateMethod(this,
|
|
3465
|
+
__privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, `STSOAuth2Worker:constructor:#oauthWorkerPort: [${JSON.stringify(__privateGet(this, _oauthWorkerPort))}]`);
|
|
3457
3466
|
if (isNode && __privateGet(this, _options2).agentOptions) {
|
|
3458
3467
|
__privateSet(this, _httpsAgent, new https.Agent({
|
|
3459
3468
|
keepAlive: __privateGet(this, _options2).agentOptions.keepAlive,
|
|
@@ -3479,16 +3488,16 @@ var __privateMethod = (obj, member, method) => {
|
|
|
3479
3488
|
_options2 = new WeakMap();
|
|
3480
3489
|
_httpsAgent = new WeakMap();
|
|
3481
3490
|
_logger = new WeakMap();
|
|
3482
|
-
|
|
3483
|
-
|
|
3491
|
+
_LogDebugMessage2 = new WeakSet();
|
|
3492
|
+
LogDebugMessage_fn2 = function(message) {
|
|
3484
3493
|
__privateGet(this, _logger).debug(message);
|
|
3485
3494
|
};
|
|
3486
|
-
|
|
3487
|
-
|
|
3495
|
+
_LogInfoMessage2 = new WeakSet();
|
|
3496
|
+
LogInfoMessage_fn2 = function(message) {
|
|
3488
3497
|
__privateGet(this, _logger).info(message);
|
|
3489
3498
|
};
|
|
3490
|
-
|
|
3491
|
-
|
|
3499
|
+
_LogErrorMessage2 = new WeakSet();
|
|
3500
|
+
LogErrorMessage_fn2 = function(message) {
|
|
3492
3501
|
__privateGet(this, _logger).error(message);
|
|
3493
3502
|
};
|
|
3494
3503
|
_HandleAuthenticateEvent2 = new WeakMap();
|