@nsshunt/stsoauth2plugin 1.0.64 → 1.0.66

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  (function(global2, factory) {
2
- typeof exports === "object" && typeof module !== "undefined" ? factory(exports, require("vue"), require("debug"), require("node:worker_threads"), require("@nsshunt/stsutils"), require("@nsshunt/stsvueutils"), require("pinia"), require("@nsshunt/stspublisherserver"), require("node:https"), require("colors"), require("axios"), require("@nsshunt/stsinstrumentation")) : typeof define === "function" && define.amd ? define(["exports", "vue", "debug", "node:worker_threads", "@nsshunt/stsutils", "@nsshunt/stsvueutils", "pinia", "@nsshunt/stspublisherserver", "node:https", "colors", "axios", "@nsshunt/stsinstrumentation"], factory) : (global2 = typeof globalThis !== "undefined" ? globalThis : global2 || self, factory(global2["@nsshunt/stsoauth2plugin"] = {}, global2.vue, global2.debug, global2.worker_threads, global2.stsutils, global2.stsvueutils, global2.pinia, global2.stspublisherserver, global2.https, null, global2.axios, global2.stsinstrumentation));
3
- })(this, function(exports2, vue, Debug, wt, stsutils, stsvueutils, pinia, stspublisherserver, https, colors, axios, stsinstrumentation) {
2
+ typeof exports === "object" && typeof module !== "undefined" ? factory(exports, require("vue"), require("node:worker_threads"), require("@nsshunt/stsutils"), require("@nsshunt/stsvueutils"), require("pinia"), require("@nsshunt/stspublisherserver"), require("node:https"), require("colors"), require("axios"), require("@nsshunt/stsinstrumentation")) : typeof define === "function" && define.amd ? define(["exports", "vue", "node:worker_threads", "@nsshunt/stsutils", "@nsshunt/stsvueutils", "pinia", "@nsshunt/stspublisherserver", "node:https", "colors", "axios", "@nsshunt/stsinstrumentation"], factory) : (global2 = typeof globalThis !== "undefined" ? globalThis : global2 || self, factory(global2["@nsshunt/stsoauth2plugin"] = {}, global2.vue, global2.worker_threads, global2.stsutils, global2.stsvueutils, global2.pinia, global2.stspublisherserver, global2.https, null, global2.axios, global2.stsinstrumentation));
3
+ })(this, function(exports2, vue, wt, stsutils, stsvueutils, pinia, stspublisherserver, https, colors, axios, stsinstrumentation) {
4
4
  "use strict";var __defProp = Object.defineProperty;
5
5
  var __defNormalProp = (obj, key, value) => key in obj ? __defProp(obj, key, { enumerable: true, configurable: true, writable: true, value }) : obj[key] = value;
6
6
  var __publicField = (obj, key, value) => {
@@ -38,7 +38,7 @@ var __privateMethod = (obj, member, method) => {
38
38
  return method;
39
39
  };
40
40
 
41
- var _crypto, _router, _cUtils, _qParams, _STORAGE_AUTHORIZE_OPTIONS_KEY, _STORAGE_SESSION_KEY, _aic, _options, _messages, _oauth2ManagerPort, _messageId, _messageHandlers, _messageTimeout, _worker, _transactionStore, _operationSemaphore, _maxSemaphoreRetries, _semaphoreRetrySleep, _ProcessMessageResponse, _PostMessage, _HandleLogEvent, _HandleUpdateInstrumentEvent, _GetStore, _HandleErrorEvent, _HandleAuthenticateEvent, _SetupRoute, _clientSessionStore, _cUtils2, _qParams2, _STORAGE_SESSION_KEY2, _oauthWorkerPort, _options2, _httpsAgent, _logger, _LogDebugMessage, LogDebugMessage_fn, _LogInfoMessage, LogInfoMessage_fn, _LogErrorMessage, LogErrorMessage_fn, _HandleAuthenticateEvent2, _HandleErrorEvent2, _LogMessage, _GetAccessToken, _GetCookies, _UpdateInstrument, _ProcessCommand, _RestoreSession, _Authorize, _HandleRedirect, _GetTokenFromBroker, _GetToken, _RefreshToken, _Logout;
41
+ var _crypto, _router, _cUtils, _qParams, _STORAGE_AUTHORIZE_OPTIONS_KEY, _STORAGE_SESSION_KEY, _aic, _options, _messages, _oauth2ManagerPort, _messageId, _messageHandlers, _messageTimeout, _worker, _transactionStore, _operationSemaphore, _maxSemaphoreRetries, _semaphoreRetrySleep, _LogDebugMessage, LogDebugMessage_fn, _LogInfoMessage, LogInfoMessage_fn, _LogErrorMessage, LogErrorMessage_fn, _ProcessMessageResponse, _PostMessage, _HandleLogEvent, _HandleUpdateInstrumentEvent, _GetStore, _HandleErrorEvent, _HandleAuthenticateEvent, _SetupRoute, _clientSessionStore, _cUtils2, _qParams2, _STORAGE_SESSION_KEY2, _oauthWorkerPort, _options2, _httpsAgent, _logger, _LogDebugMessage2, LogDebugMessage_fn2, _LogInfoMessage2, LogInfoMessage_fn2, _LogErrorMessage2, LogErrorMessage_fn2, _HandleAuthenticateEvent2, _HandleErrorEvent2, _LogMessage, _GetAccessToken, _GetCookies, _UpdateInstrument, _ProcessCommand, _RestoreSession, _Authorize, _HandleRedirect, _GetTokenFromBroker, _GetToken, _RefreshToken, _Logout;
42
42
  function _interopNamespaceDefault(e) {
43
43
  const n = Object.create(null, { [Symbol.toStringTag]: { value: "Module" } });
44
44
  if (e) {
@@ -2546,15 +2546,12 @@ var __privateMethod = (obj, member, method) => {
2546
2546
  }
2547
2547
  */
2548
2548
  });
2549
- let debug;
2550
- if (isNode) {
2551
- debug = Debug(`proc:${process.pid}:stsoauth2manager.ts`);
2552
- } else {
2553
- debug = Debug(`proc:0:stsoauth2manager.ts`);
2554
- }
2555
2549
  class STSOAuth2Manager {
2556
2550
  // ms
2557
2551
  constructor(app, options) {
2552
+ __privateAdd(this, _LogDebugMessage);
2553
+ __privateAdd(this, _LogInfoMessage);
2554
+ __privateAdd(this, _LogErrorMessage);
2558
2555
  // eslint-disable-next-line @typescript-eslint/no-explicit-any
2559
2556
  __privateAdd(this, _router, null);
2560
2557
  __privateAdd(this, _cUtils, new CryptoUtils());
@@ -2579,7 +2576,7 @@ var __privateMethod = (obj, member, method) => {
2579
2576
  __privateAdd(this, _semaphoreRetrySleep, 50);
2580
2577
  __privateAdd(this, _ProcessMessageResponse, (data) => {
2581
2578
  const messageResponse = data;
2582
- debug(chalk$1.yellow(`STSOAuth2Manager:#ProcessMessageResponse: message data = [${JSON.stringify(messageResponse)}]`));
2579
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.yellow(`STSOAuth2Manager:#ProcessMessageResponse: message data = [${JSON.stringify(messageResponse)}]`));
2583
2580
  if (messageResponse.messageId === -1) {
2584
2581
  switch (messageResponse.command) {
2585
2582
  case IOauth2ListenerCommand.AUTHENTICATE_EVENT:
@@ -2616,10 +2613,10 @@ var __privateMethod = (obj, member, method) => {
2616
2613
  __privateGet(this, _messageHandlers)[message.messageId] = (response) => {
2617
2614
  clearTimeout(timeout);
2618
2615
  delete __privateGet(this, _messageHandlers)[message.messageId];
2619
- debug(chalk$1.yellow(`STSOAuth2Manager:#PostMessage: resolve callback response= [${JSON.stringify(response)}]`));
2616
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.yellow(`STSOAuth2Manager:#PostMessage: resolve callback response= [${JSON.stringify(response)}]`));
2620
2617
  resolve(response);
2621
2618
  };
2622
- debug(chalk$1.yellow(`STSOAuth2Manager:#PostMessage: posting message = [${JSON.stringify(message)}]`));
2619
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.yellow(`STSOAuth2Manager:#PostMessage: posting message = [${JSON.stringify(message)}]`));
2623
2620
  __privateGet(this, _oauth2ManagerPort).postMessage(message);
2624
2621
  });
2625
2622
  });
@@ -2627,7 +2624,7 @@ var __privateMethod = (obj, member, method) => {
2627
2624
  if (__privateGet(this, _aic)) {
2628
2625
  __privateGet(this, _aic).LogEx(message);
2629
2626
  }
2630
- debug(message);
2627
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, message);
2631
2628
  });
2632
2629
  // UpdateInstrument = (instrumentName: Gauge, telemetry: InstrumentBaseTelemetry): void => {
2633
2630
  __privateAdd(this, _HandleUpdateInstrumentEvent, (instrumentName, telemetry) => {
@@ -2663,14 +2660,14 @@ var __privateMethod = (obj, member, method) => {
2663
2660
  }
2664
2661
  });
2665
2662
  __privateAdd(this, _SetupRoute, (app, router) => {
2666
- debug(chalk$1.gray(`STSOAuth2Manager:#SetupRoute`));
2663
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.gray(`STSOAuth2Manager:#SetupRoute`));
2667
2664
  router.beforeEach(async (to, from, next) => {
2668
2665
  const oAuth2Manager = app.config.globalProperties.$sts[STSOAuth2ManagerPluginKey];
2669
- debug(chalk$1.gray(`beforeEach: from: [${from.path}], to: [${to.path}]`));
2666
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.gray(`beforeEach: from: [${from.path}], to: [${to.path}]`));
2670
2667
  if (__privateGet(this, _GetStore).call(this).LoggedIn === false) {
2671
- console.log(`Not logged in`);
2668
+ __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, `Not logged in`);
2672
2669
  if (to.path.localeCompare(`${__privateGet(this, _options).uriBase}authorize`) === 0) {
2673
- console.log(`to = ${__privateGet(this, _options).uriBase}authorize`);
2670
+ __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, `to = ${__privateGet(this, _options).uriBase}authorize`);
2674
2671
  next();
2675
2672
  return;
2676
2673
  } else if (to.path.localeCompare(`${__privateGet(this, _options).uriBase}consent`) === 0) {
@@ -2697,9 +2694,9 @@ var __privateMethod = (obj, member, method) => {
2697
2694
  }
2698
2695
  const str = to.query;
2699
2696
  if (str[stsutils.OAuth2ParameterType.CODE] || str[stsutils.OAuth2ParameterType.ERROR]) {
2700
- debug(chalk$1.magenta(`STSOAuth2Manager:#SetupRoute:Processing redirect: [${JSON.stringify(str)}]`));
2697
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:#SetupRoute:Processing redirect: [${JSON.stringify(str)}]`));
2701
2698
  const retVal = await oAuth2Manager.HandleRedirect(str);
2702
- debug(chalk$1.magenta(`STSOAuth2Manager:#SetupRoute:Redirect result: [${retVal}]`));
2699
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:#SetupRoute:Redirect result: [${retVal}]`));
2703
2700
  if (retVal) {
2704
2701
  next({
2705
2702
  path: `${__privateGet(this, _options).uriBase}`,
@@ -2714,11 +2711,11 @@ var __privateMethod = (obj, member, method) => {
2714
2711
  return;
2715
2712
  }
2716
2713
  }
2717
- debug(`STSOAuth2Manager:#SetupRoute:Restoring session`);
2714
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:#SetupRoute:Restoring session`);
2718
2715
  const sessionRestored = await oAuth2Manager.RestoreSession();
2719
- debug(`STSOAuth2Manager:#SetupRoute:Session restored: [${sessionRestored}]`);
2716
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:#SetupRoute:Session restored: [${sessionRestored}]`);
2720
2717
  if (sessionRestored !== true) {
2721
- debug(`STSOAuth2Manager:#SetupRoute:Session not restored - need to authorize`);
2718
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:#SetupRoute:Session not restored - need to authorize`);
2722
2719
  oAuth2Manager.Authorize();
2723
2720
  next();
2724
2721
  return;
@@ -2755,7 +2752,7 @@ var __privateMethod = (obj, member, method) => {
2755
2752
  throw new Error(`STSOAuth2Manager:ExecuteRefreshToken:maxSemaphoreRetries: [${__privateGet(this, _maxSemaphoreRetries)}] exceeded.`);
2756
2753
  }
2757
2754
  await stsutils.Sleep(__privateGet(this, _semaphoreRetrySleep));
2758
- debug(chalk$1.cyan(`STSOAuth2Manager:ExecuteRefreshToken:locked by operationSemaphore, retry count: [${retryCount}]`));
2755
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.cyan(`STSOAuth2Manager:ExecuteRefreshToken:locked by operationSemaphore, retry count: [${retryCount}]`));
2759
2756
  return await this.ExecuteRefreshToken(retryCount + 1);
2760
2757
  } else {
2761
2758
  __privateSet(this, _operationSemaphore, true);
@@ -2771,12 +2768,12 @@ var __privateMethod = (obj, member, method) => {
2771
2768
  });
2772
2769
  __publicField(this, "RestoreSession", async () => {
2773
2770
  try {
2774
- debug(`STSOAuth2Manager:RestoreSession:postMessage: [${IOauth2ListenerCommand.RESTORE_SESSION}]`);
2771
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:RestoreSession:postMessage: [${IOauth2ListenerCommand.RESTORE_SESSION}]`);
2775
2772
  const response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.RESTORE_SESSION });
2776
- debug(`STSOAuth2Manager:RestoreSession:response: [${JSON.stringify(response.payload)}]`);
2773
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Manager:RestoreSession:response: [${JSON.stringify(response.payload)}]`);
2777
2774
  return response.payload;
2778
2775
  } catch (error) {
2779
- console.log(chalk$1.red(`RestoreSession Error: ${error}`));
2776
+ __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`RestoreSession Error: ${error}`));
2780
2777
  return false;
2781
2778
  }
2782
2779
  });
@@ -2791,18 +2788,18 @@ var __privateMethod = (obj, member, method) => {
2791
2788
  return response.payload.authorizeOptionsClientCopy;
2792
2789
  }
2793
2790
  } catch (error) {
2794
- console.log(chalk$1.red(`Authorize Error: ${error}`));
2791
+ __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`Authorize Error: ${error}`));
2795
2792
  }
2796
2793
  return {};
2797
2794
  });
2798
2795
  __publicField(this, "HandleRedirect", async (queryVars) => {
2799
2796
  try {
2800
- debug(chalk$1.magenta(`STSOAuth2Manager:HandleRedirect`));
2797
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:HandleRedirect`));
2801
2798
  let response = null;
2802
2799
  if (queryVars[stsutils.OAuth2ParameterType.CODE]) {
2803
2800
  const authorizeOptions = __privateGet(this, _transactionStore).get(__privateGet(this, _STORAGE_AUTHORIZE_OPTIONS_KEY));
2804
2801
  __privateGet(this, _transactionStore).remove(__privateGet(this, _STORAGE_AUTHORIZE_OPTIONS_KEY));
2805
- debug(chalk$1.magenta(`STSOAuth2Manager:HandleRedirect: sending HANDLE_REDIRECT command`));
2802
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:HandleRedirect: sending HANDLE_REDIRECT command`));
2806
2803
  response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.HANDLE_REDIRECT, payload: {
2807
2804
  queryVars,
2808
2805
  authorizeOptions
@@ -2810,10 +2807,10 @@ var __privateMethod = (obj, member, method) => {
2810
2807
  } else {
2811
2808
  response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.HANDLE_REDIRECT, payload: queryVars });
2812
2809
  }
2813
- debug(chalk$1.magenta(`STSOAuth2Manager:HandleRedirect: HANDLE_REDIRECT response: [${JSON.stringify(response)}]`));
2810
+ __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`STSOAuth2Manager:HandleRedirect: HANDLE_REDIRECT response: [${JSON.stringify(response)}]`));
2814
2811
  return response.payload;
2815
2812
  } catch (error) {
2816
- console.log(chalk$1.red(`HandleRedirect Error: ${error}`));
2813
+ __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`HandleRedirect Error: ${error}`));
2817
2814
  return false;
2818
2815
  }
2819
2816
  });
@@ -2822,7 +2819,7 @@ var __privateMethod = (obj, member, method) => {
2822
2819
  const response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.LOGOUT });
2823
2820
  return response.payload;
2824
2821
  } catch (error) {
2825
- console.log(chalk$1.red(`Logout Error: ${error}`));
2822
+ __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`Logout Error: ${error}`));
2826
2823
  return false;
2827
2824
  }
2828
2825
  });
@@ -2832,7 +2829,7 @@ var __privateMethod = (obj, member, method) => {
2832
2829
  const response = await __privateGet(this, _PostMessage).call(this, { command: IOauth2ListenerCommand.LOGOUT });
2833
2830
  return response.payload;
2834
2831
  } catch (error) {
2835
- console.log(chalk$1.red(`InvokeExternalAPI Error: ${error}`));
2832
+ __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`InvokeExternalAPI Error: ${error}`));
2836
2833
  return null;
2837
2834
  }
2838
2835
  });
@@ -2863,10 +2860,10 @@ var __privateMethod = (obj, member, method) => {
2863
2860
  }
2864
2861
  if (!isNode) {
2865
2862
  __privateGet(this, _worker).onmessage = (data) => {
2866
- console.log(chalk$1.green(`this.#worker.onmessage = [${data}]`));
2863
+ __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, chalk$1.green(`this.#worker.onmessage = [${data}]`));
2867
2864
  };
2868
- __privateGet(this, _worker).onerror = function(error) {
2869
- console.log(chalk$1.green(`this.#worker.onerror = [${JSON.stringify(error)}]`));
2865
+ __privateGet(this, _worker).onerror = (error) => {
2866
+ __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, chalk$1.green(`this.#worker.onerror = [${JSON.stringify(error)}]`));
2870
2867
  };
2871
2868
  }
2872
2869
  let workerMessage;
@@ -2923,6 +2920,18 @@ var __privateMethod = (obj, member, method) => {
2923
2920
  _operationSemaphore = new WeakMap();
2924
2921
  _maxSemaphoreRetries = new WeakMap();
2925
2922
  _semaphoreRetrySleep = new WeakMap();
2923
+ _LogDebugMessage = new WeakSet();
2924
+ LogDebugMessage_fn = function(message) {
2925
+ __privateGet(this, _options).logger.debug(message);
2926
+ };
2927
+ _LogInfoMessage = new WeakSet();
2928
+ LogInfoMessage_fn = function(message) {
2929
+ __privateGet(this, _options).logger.info(message);
2930
+ };
2931
+ _LogErrorMessage = new WeakSet();
2932
+ LogErrorMessage_fn = function(message) {
2933
+ __privateGet(this, _options).logger.error(message);
2934
+ };
2926
2935
  _ProcessMessageResponse = new WeakMap();
2927
2936
  _PostMessage = new WeakMap();
2928
2937
  _HandleLogEvent = new WeakMap();
@@ -2995,11 +3004,11 @@ var __privateMethod = (obj, member, method) => {
2995
3004
  class STSOAuth2Worker {
2996
3005
  constructor(workerPort, options, logger) {
2997
3006
  // eslint-disable-next-line @typescript-eslint/no-explicit-any
2998
- __privateAdd(this, _LogDebugMessage);
3007
+ __privateAdd(this, _LogDebugMessage2);
2999
3008
  // eslint-disable-next-line @typescript-eslint/no-explicit-any
3000
- __privateAdd(this, _LogInfoMessage);
3009
+ __privateAdd(this, _LogInfoMessage2);
3001
3010
  // eslint-disable-next-line @typescript-eslint/no-explicit-any
3002
- __privateAdd(this, _LogErrorMessage);
3011
+ __privateAdd(this, _LogErrorMessage2);
3003
3012
  //#storageManager = null;
3004
3013
  __privateAdd(this, _clientSessionStore, void 0);
3005
3014
  __privateAdd(this, _cUtils2, new CryptoUtils());
@@ -3099,7 +3108,7 @@ var __privateMethod = (obj, member, method) => {
3099
3108
  __publicField(this, "SetupListener", () => {
3100
3109
  __privateGet(this, _oauthWorkerPort).onmessage = async (data) => {
3101
3110
  const auth2ListenerMessage = data.data;
3102
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Worker:SetupListener:onmessage: [${auth2ListenerMessage.command}]`);
3111
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, `STSOAuth2Worker:SetupListener:onmessage: [${auth2ListenerMessage.command}]`);
3103
3112
  switch (auth2ListenerMessage.command) {
3104
3113
  case IOauth2ListenerCommand.RESTORE_SESSION:
3105
3114
  __privateGet(this, _ProcessCommand).call(this, auth2ListenerMessage, await __privateGet(this, _RestoreSession).call(this));
@@ -3141,12 +3150,12 @@ var __privateMethod = (obj, member, method) => {
3141
3150
  const sessionData = __privateGet(this, _clientSessionStore).get(__privateGet(this, _STORAGE_SESSION_KEY2));
3142
3151
  if (sessionData) {
3143
3152
  restoredSessionData = sessionData.tokenResponse;
3144
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "Session restored from client storage.");
3153
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Session restored from client storage.");
3145
3154
  __privateGet(this, _LogMessage).call(this, "Session restored from client storage.");
3146
3155
  } else {
3147
3156
  const url = `${__privateGet(this, _options2).brokerendpoint}:${__privateGet(this, _options2).brokerport}${__privateGet(this, _options2).brokerapiroot}/session`;
3148
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "RestoreSession");
3149
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, url);
3157
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "RestoreSession");
3158
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, url);
3150
3159
  __privateGet(this, _LogMessage).call(this, "RestoreSession.");
3151
3160
  __privateGet(this, _LogMessage).call(this, url);
3152
3161
  try {
@@ -3163,7 +3172,7 @@ var __privateMethod = (obj, member, method) => {
3163
3172
  // Ensure cookies are passed to the service
3164
3173
  timeout: __privateGet(this, _options2).timeout
3165
3174
  };
3166
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#RestoreSession:session request detail: [${JSON.stringify(rConfig)}]`));
3175
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#RestoreSession:session request detail: [${JSON.stringify(rConfig)}]`));
3167
3176
  if (isNode) {
3168
3177
  rConfig.httpsAgent = __privateGet(this, _httpsAgent);
3169
3178
  }
@@ -3178,24 +3187,24 @@ var __privateMethod = (obj, member, method) => {
3178
3187
  newSessionData.brokerCookie = retVal.headers["set-cookie"];
3179
3188
  }
3180
3189
  __privateGet(this, _clientSessionStore).set(__privateGet(this, _STORAGE_SESSION_KEY2), newSessionData);
3181
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "Session restored from server side cookie.");
3190
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Session restored from server side cookie.");
3182
3191
  } else {
3183
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, `Could not restore previous session. No restoredSessionData available.`);
3184
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, JSON.stringify(retVal.data));
3192
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, `Could not restore previous session. No restoredSessionData available.`);
3193
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, JSON.stringify(retVal.data));
3185
3194
  }
3186
3195
  } else {
3187
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, "Could not restore previous session:-");
3188
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, JSON.stringify(retVal.data));
3196
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, "Could not restore previous session:-");
3197
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, JSON.stringify(retVal.data));
3189
3198
  }
3190
3199
  } catch (error) {
3191
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, "Could not restore previous session (error state):-");
3192
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, error);
3193
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, JSON.stringify(error));
3200
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, "Could not restore previous session (error state):-");
3201
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, error);
3202
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, JSON.stringify(error));
3194
3203
  }
3195
3204
  }
3196
3205
  if (restoredSessionData !== null) {
3197
3206
  __privateGet(this, _HandleAuthenticateEvent2).call(this, restoredSessionData.id_token);
3198
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "Refreshing tokens ...");
3207
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Refreshing tokens ...");
3199
3208
  return await __privateGet(this, _RefreshToken).call(this);
3200
3209
  } else {
3201
3210
  __privateGet(this, _HandleAuthenticateEvent2).call(this, null);
@@ -3203,7 +3212,7 @@ var __privateMethod = (obj, member, method) => {
3203
3212
  }
3204
3213
  });
3205
3214
  __privateAdd(this, _Authorize, async () => {
3206
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "Authorize ...");
3215
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Authorize ...");
3207
3216
  const client_id = __privateGet(this, _options2).client_id;
3208
3217
  const nonce = __privateGet(this, _cUtils2).CreateRandomString();
3209
3218
  const response_type = [AuthorizeOptionsResponseType.CODE];
@@ -3227,9 +3236,9 @@ var __privateMethod = (obj, member, method) => {
3227
3236
  };
3228
3237
  const authorizeOptionsClientCopy = { ...authorizeOptions };
3229
3238
  const url = `${__privateGet(this, _options2).authorizeendpoint}:${__privateGet(this, _options2).authorizeport}${__privateGet(this, _options2).authorizeapiroot}${__privateGet(this, _options2).authorizeapi}?${__privateGet(this, _qParams2).CreateQueryParams(authorizeOptions)}`;
3230
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, url);
3239
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, url);
3231
3240
  authorizeOptions.code_verifier = code_verifier;
3232
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, `Authorize:authorizeOptions: [${JSON.stringify(authorizeOptions)}]`);
3241
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, `Authorize:authorizeOptions: [${JSON.stringify(authorizeOptions)}]`);
3233
3242
  return {
3234
3243
  url,
3235
3244
  authorizeOptions,
@@ -3240,29 +3249,29 @@ var __privateMethod = (obj, member, method) => {
3240
3249
  __privateAdd(this, _HandleRedirect, async (payload) => {
3241
3250
  const queryVars = payload.queryVars;
3242
3251
  const authorizeOptions = payload.authorizeOptions;
3243
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#HandleRedirect: HandleRedirect`));
3244
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#HandleRedirect: HandleRedirect:Query Vars: [${JSON.stringify(queryVars)}]`));
3252
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#HandleRedirect: HandleRedirect`));
3253
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#HandleRedirect: HandleRedirect:Query Vars: [${JSON.stringify(queryVars)}]`));
3245
3254
  if (queryVars[stsutils.OAuth2ParameterType.CODE]) {
3246
3255
  const response = queryVars;
3247
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, `authorizeOptions from transaction state: [${JSON.stringify(authorizeOptions)}]`);
3256
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, `authorizeOptions from transaction state: [${JSON.stringify(authorizeOptions)}]`);
3248
3257
  const redirectState = response.state;
3249
3258
  const authorizeOptionsState = authorizeOptions.state;
3250
3259
  if (authorizeOptionsState.localeCompare(redirectState) === 0) {
3251
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, chalk$1.green("redirected state (from queryVars) matched previously saved transaction authorizeOptions state"));
3260
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, chalk$1.green("redirected state (from queryVars) matched previously saved transaction authorizeOptions state"));
3252
3261
  return await __privateGet(this, _GetToken).call(this, authorizeOptions, response);
3253
3262
  } else {
3254
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red("redirected state (from queryVars) did NOT match previously saved transaction authorizeOptions state"));
3255
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`authorizeOptionsState: [${authorizeOptionsState}]`));
3256
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`redirectState: [${redirectState}]`));
3263
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("redirected state (from queryVars) did NOT match previously saved transaction authorizeOptions state"));
3264
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`authorizeOptionsState: [${authorizeOptionsState}]`));
3265
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`redirectState: [${redirectState}]`));
3257
3266
  __privateGet(this, _HandleErrorEvent2).call(this, { message: "State un-matched" });
3258
3267
  return false;
3259
3268
  }
3260
3269
  } else if (queryVars[stsutils.OAuth2ParameterType.ERROR]) {
3261
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`State un-matched (1)`));
3270
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`State un-matched (1)`));
3262
3271
  __privateGet(this, _HandleErrorEvent2).call(this, { message: "State un-matched" });
3263
3272
  return false;
3264
3273
  } else {
3265
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`State un-matched (2)`));
3274
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`State un-matched (2)`));
3266
3275
  __privateGet(this, _HandleErrorEvent2).call(this, { message: "State un-matched" });
3267
3276
  return false;
3268
3277
  }
@@ -3288,7 +3297,7 @@ var __privateMethod = (obj, member, method) => {
3288
3297
  */
3289
3298
  // Get access_token, refresh_token and id_token using OAuth2 Authorization Code Flow
3290
3299
  __privateAdd(this, _GetTokenFromBroker, async (authorizationCodeFlowParameters) => {
3291
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker`));
3300
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker`));
3292
3301
  __privateGet(this, _clientSessionStore).remove(__privateGet(this, _STORAGE_SESSION_KEY2));
3293
3302
  const url = `${__privateGet(this, _options2).brokerendpoint}:${__privateGet(this, _options2).brokerport}${__privateGet(this, _options2).brokerapiroot}/token`;
3294
3303
  try {
@@ -3300,15 +3309,15 @@ var __privateMethod = (obj, member, method) => {
3300
3309
  // Ensure cookies are passed to the service
3301
3310
  timeout: __privateGet(this, _options2).timeout
3302
3311
  };
3303
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker: request config: [${JSON.stringify(rConfig)}]`));
3312
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: request config: [${JSON.stringify(rConfig)}]`));
3304
3313
  if (isNode) {
3305
3314
  rConfig.httpsAgent = __privateGet(this, _httpsAgent);
3306
3315
  }
3307
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker: axios API call`));
3316
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: axios API call`));
3308
3317
  const retVal = await axios(rConfig);
3309
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker: axios API call result: [${retVal.status}]`));
3318
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: axios API call result: [${retVal.status}]`));
3310
3319
  if (retVal.status === StatusCodes.OK) {
3311
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker: storing tokens`));
3320
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: storing tokens`));
3312
3321
  const tokenResponse = retVal.data;
3313
3322
  __privateGet(this, _HandleAuthenticateEvent2).call(this, tokenResponse.id_token);
3314
3323
  const newSessionData = {
@@ -3320,26 +3329,26 @@ var __privateMethod = (obj, member, method) => {
3320
3329
  __privateGet(this, _clientSessionStore).set(__privateGet(this, _STORAGE_SESSION_KEY2), newSessionData);
3321
3330
  return true;
3322
3331
  } else if (retVal.status === StatusCodes.UNAUTHORIZED) {
3323
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker: NOT storing tokens, status: [${retVal.status}]`));
3332
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: NOT storing tokens, status: [${retVal.status}]`));
3324
3333
  __privateGet(this, _HandleAuthenticateEvent2).call(this, null);
3325
3334
  return false;
3326
3335
  } else {
3327
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#GetTokenFromBroker: NOT storing tokens (general error 1), status: [${retVal.status}]`));
3336
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#GetTokenFromBroker: NOT storing tokens (general error 1), status: [${retVal.status}]`));
3328
3337
  __privateGet(this, _HandleAuthenticateEvent2).call(this, null);
3329
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red("Could not obtain access_token from token end-point:-"));
3330
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(JSON.stringify(retVal.data)));
3338
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("Could not obtain access_token from token end-point:-"));
3339
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(JSON.stringify(retVal.data)));
3331
3340
  return false;
3332
3341
  }
3333
3342
  } catch (error) {
3334
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`#GetTokenFromBroker: NOT storing tokens (general error 2), status: [${error}]`));
3343
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`#GetTokenFromBroker: NOT storing tokens (general error 2), status: [${error}]`));
3335
3344
  __privateGet(this, _HandleAuthenticateEvent2).call(this, null);
3336
3345
  return false;
3337
3346
  }
3338
3347
  });
3339
3348
  // Get access_token, refresh_token and id_token using OAuth2 Authorization Code Flow
3340
3349
  __privateAdd(this, _GetToken, async (authorizeOptions, authorizeResponse) => {
3341
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "#GetToken");
3342
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, authorizeResponse);
3350
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "#GetToken");
3351
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, authorizeResponse);
3343
3352
  __privateGet(this, _clientSessionStore).remove(__privateGet(this, _STORAGE_SESSION_KEY2));
3344
3353
  const authorizationCodeFlowParameters = {
3345
3354
  client_id: __privateGet(this, _options2).client_id,
@@ -3377,10 +3386,10 @@ var __privateMethod = (obj, member, method) => {
3377
3386
  }
3378
3387
  */
3379
3388
  __privateAdd(this, _RefreshToken, async () => {
3380
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.cyan(`STSOAuth2Worker:#RefreshToken:start`));
3389
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.cyan(`STSOAuth2Worker:#RefreshToken:start`));
3381
3390
  const sessionData = __privateGet(this, _clientSessionStore).get(__privateGet(this, _STORAGE_SESSION_KEY2));
3382
3391
  if (sessionData) {
3383
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.cyan(`STSOAuth2Worker:#RefreshToken:sessionData: [${JSON.stringify(sessionData)}]`));
3392
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.cyan(`STSOAuth2Worker:#RefreshToken:sessionData: [${JSON.stringify(sessionData)}]`));
3384
3393
  const currentSessionData = sessionData.tokenResponse;
3385
3394
  const refreshFlowParameters = {
3386
3395
  client_id: __privateGet(this, _options2).client_id,
@@ -3390,7 +3399,7 @@ var __privateMethod = (obj, member, method) => {
3390
3399
  };
3391
3400
  return await __privateGet(this, _GetTokenFromBroker).call(this, refreshFlowParameters);
3392
3401
  } else {
3393
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(`STSOAuth2Worker:#RefreshToken:sessionData not found within clientSessionStore`));
3402
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(`STSOAuth2Worker:#RefreshToken:sessionData not found within clientSessionStore`));
3394
3403
  return false;
3395
3404
  }
3396
3405
  });
@@ -3400,18 +3409,18 @@ var __privateMethod = (obj, member, method) => {
3400
3409
  // clear session storage
3401
3410
  // clear all state from $store
3402
3411
  __privateAdd(this, _Logout, async () => {
3403
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "Logout");
3412
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Logout");
3404
3413
  const url = `${__privateGet(this, _options2).brokerendpoint}:${__privateGet(this, _options2).brokerport}${__privateGet(this, _options2).brokerapiroot}/logout`;
3405
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, url);
3414
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, url);
3406
3415
  const sessionData = __privateGet(this, _clientSessionStore).get(__privateGet(this, _STORAGE_SESSION_KEY2));
3407
3416
  if (sessionData) {
3408
3417
  const currentSessionData = sessionData.tokenResponse;
3409
3418
  const refresh_token = currentSessionData.refresh_token;
3410
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, refresh_token);
3419
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, refresh_token);
3411
3420
  const decodedRefreshToken = jwtDecode(refresh_token);
3412
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, decodedRefreshToken);
3421
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, decodedRefreshToken);
3413
3422
  const sessionId = decodedRefreshToken.sts_session;
3414
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, sessionId);
3423
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, sessionId);
3415
3424
  __privateGet(this, _clientSessionStore).remove(__privateGet(this, _STORAGE_SESSION_KEY2));
3416
3425
  __privateGet(this, _HandleAuthenticateEvent2).call(this, null);
3417
3426
  try {
@@ -3425,7 +3434,7 @@ var __privateMethod = (obj, member, method) => {
3425
3434
  // Ensure cookies are passed to the service
3426
3435
  timeout: __privateGet(this, _options2).timeout
3427
3436
  };
3428
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, chalk$1.magenta(`#Logout: request config: [${rConfig}]`));
3437
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, chalk$1.magenta(`#Logout: request config: [${rConfig}]`));
3429
3438
  if (isNode) {
3430
3439
  rConfig.httpsAgent = __privateGet(this, _httpsAgent);
3431
3440
  }
@@ -3433,27 +3442,27 @@ var __privateMethod = (obj, member, method) => {
3433
3442
  if (retVal.data.status === StatusCodes.OK) {
3434
3443
  return true;
3435
3444
  } else {
3436
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red("Error during logout (1: server side)"));
3437
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(JSON.stringify(retVal.data)));
3445
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("Error during logout (1: server side)"));
3446
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(JSON.stringify(retVal.data)));
3438
3447
  return false;
3439
3448
  }
3440
3449
  } catch (error) {
3441
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red("Error during logout (2: server side)"));
3442
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(error));
3443
- __privateMethod(this, _LogErrorMessage, LogErrorMessage_fn).call(this, chalk$1.red(JSON.stringify(error)));
3450
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red("Error during logout (2: server side)"));
3451
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(error));
3452
+ __privateMethod(this, _LogErrorMessage2, LogErrorMessage_fn2).call(this, chalk$1.red(JSON.stringify(error)));
3444
3453
  return false;
3445
3454
  }
3446
3455
  } else {
3447
- __privateMethod(this, _LogInfoMessage, LogInfoMessage_fn).call(this, "Error during logout. Could not restore session from session storage.");
3456
+ __privateMethod(this, _LogInfoMessage2, LogInfoMessage_fn2).call(this, "Error during logout. Could not restore session from session storage.");
3448
3457
  return false;
3449
3458
  }
3450
3459
  });
3451
3460
  __privateSet(this, _options2, options);
3452
3461
  __privateSet(this, _logger, logger);
3453
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Worker:constructor:#options: [${JSON.stringify(__privateGet(this, _options2))}]`);
3462
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, `STSOAuth2Worker:constructor:#options: [${JSON.stringify(__privateGet(this, _options2))}]`);
3454
3463
  __privateSet(this, _clientSessionStore, new stsvueutils.ClientStorageFactory({ clientStorageType: stsvueutils.ClientStorageType.MEMORY_STORAGE, usePrefix: false }).GetStorage());
3455
3464
  __privateSet(this, _oauthWorkerPort, workerPort);
3456
- __privateMethod(this, _LogDebugMessage, LogDebugMessage_fn).call(this, `STSOAuth2Worker:constructor:#oauthWorkerPort: [${JSON.stringify(__privateGet(this, _oauthWorkerPort))}]`);
3465
+ __privateMethod(this, _LogDebugMessage2, LogDebugMessage_fn2).call(this, `STSOAuth2Worker:constructor:#oauthWorkerPort: [${JSON.stringify(__privateGet(this, _oauthWorkerPort))}]`);
3457
3466
  if (isNode && __privateGet(this, _options2).agentOptions) {
3458
3467
  __privateSet(this, _httpsAgent, new https.Agent({
3459
3468
  keepAlive: __privateGet(this, _options2).agentOptions.keepAlive,
@@ -3479,16 +3488,16 @@ var __privateMethod = (obj, member, method) => {
3479
3488
  _options2 = new WeakMap();
3480
3489
  _httpsAgent = new WeakMap();
3481
3490
  _logger = new WeakMap();
3482
- _LogDebugMessage = new WeakSet();
3483
- LogDebugMessage_fn = function(message) {
3491
+ _LogDebugMessage2 = new WeakSet();
3492
+ LogDebugMessage_fn2 = function(message) {
3484
3493
  __privateGet(this, _logger).debug(message);
3485
3494
  };
3486
- _LogInfoMessage = new WeakSet();
3487
- LogInfoMessage_fn = function(message) {
3495
+ _LogInfoMessage2 = new WeakSet();
3496
+ LogInfoMessage_fn2 = function(message) {
3488
3497
  __privateGet(this, _logger).info(message);
3489
3498
  };
3490
- _LogErrorMessage = new WeakSet();
3491
- LogErrorMessage_fn = function(message) {
3499
+ _LogErrorMessage2 = new WeakSet();
3500
+ LogErrorMessage_fn2 = function(message) {
3492
3501
  __privateGet(this, _logger).error(message);
3493
3502
  };
3494
3503
  _HandleAuthenticateEvent2 = new WeakMap();