@openid4vc/oauth2 0.3.0-alpha-20251029093110 → 0.3.0-alpha-20251029103950

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.mts CHANGED
@@ -2608,6 +2608,10 @@ interface SendAuthorizationChallengeRequestOptions {
2608
2608
  * Scope to request for the authorization challenge request
2609
2609
  */
2610
2610
  scope?: string;
2611
+ /**
2612
+ * State for the authorization challenge request
2613
+ */
2614
+ state?: string;
2611
2615
  /**
2612
2616
  * The resource to which access is being requested. This can help the authorization
2613
2617
  * server in determining the resource server to handle the authorization request for
package/dist/index.d.ts CHANGED
@@ -2608,6 +2608,10 @@ interface SendAuthorizationChallengeRequestOptions {
2608
2608
  * Scope to request for the authorization challenge request
2609
2609
  */
2610
2610
  scope?: string;
2611
+ /**
2612
+ * State for the authorization challenge request
2613
+ */
2614
+ state?: string;
2611
2615
  /**
2612
2616
  * The resource to which access is being requested. This can help the authorization
2613
2617
  * server in determining the resource server to handle the authorization request for
package/dist/index.js CHANGED
@@ -1979,6 +1979,7 @@ async function sendAuthorizationChallengeRequest(options) {
1979
1979
  scope: options.scope,
1980
1980
  redirect_uri: options.redirectUri,
1981
1981
  resource: options.resource,
1982
+ state: options.state,
1982
1983
  code_challenge: pkce?.codeChallenge,
1983
1984
  code_challenge_method: pkce?.codeChallengeMethod,
1984
1985
  presentation_during_issuance_session: options.presentationDuringIssuanceSession
@@ -2232,7 +2233,8 @@ var Oauth2Client = class {
2232
2233
  redirectUri: options.redirectUri,
2233
2234
  scope: options.scope,
2234
2235
  resource: options.resource,
2235
- dpop: options.dpop
2236
+ dpop: options.dpop,
2237
+ state: options.state
2236
2238
  });
2237
2239
  } catch (error) {
2238
2240
  if (!(error instanceof Oauth2ClientAuthorizationChallengeError && error.errorResponse.error === Oauth2ErrorCodes.RedirectToWeb)) throw error;
@@ -2260,7 +2262,8 @@ var Oauth2Client = class {
2260
2262
  scope: options.scope,
2261
2263
  pkceCodeVerifier: pkce?.codeVerifier,
2262
2264
  resource: options.resource,
2263
- dpop: options.dpop
2265
+ dpop: options.dpop,
2266
+ state: options.state
2264
2267
  });
2265
2268
  }
2266
2269
  sendAuthorizationChallengeRequest(options) {
@@ -2279,7 +2282,8 @@ var Oauth2Client = class {
2279
2282
  scope: options.scope,
2280
2283
  callbacks: this.options.callbacks,
2281
2284
  pkceCodeVerifier: options.pkceCodeVerifier,
2282
- dpop: options.dpop
2285
+ dpop: options.dpop,
2286
+ state: options.state
2283
2287
  });
2284
2288
  }
2285
2289
  async retrievePreAuthorizedCodeAccessToken({ authorizationServerMetadata, preAuthorizedCode, additionalRequestPayload, txCode, dpop, resource }) {