@openid4vc/oauth2 0.3.0-alpha-20251029093110 → 0.3.0-alpha-20251029103950
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.mts +4 -0
- package/dist/index.d.ts +4 -0
- package/dist/index.js +7 -3
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +7 -3
- package/dist/index.mjs.map +1 -1
- package/package.json +2 -2
package/dist/index.d.mts
CHANGED
|
@@ -2608,6 +2608,10 @@ interface SendAuthorizationChallengeRequestOptions {
|
|
|
2608
2608
|
* Scope to request for the authorization challenge request
|
|
2609
2609
|
*/
|
|
2610
2610
|
scope?: string;
|
|
2611
|
+
/**
|
|
2612
|
+
* State for the authorization challenge request
|
|
2613
|
+
*/
|
|
2614
|
+
state?: string;
|
|
2611
2615
|
/**
|
|
2612
2616
|
* The resource to which access is being requested. This can help the authorization
|
|
2613
2617
|
* server in determining the resource server to handle the authorization request for
|
package/dist/index.d.ts
CHANGED
|
@@ -2608,6 +2608,10 @@ interface SendAuthorizationChallengeRequestOptions {
|
|
|
2608
2608
|
* Scope to request for the authorization challenge request
|
|
2609
2609
|
*/
|
|
2610
2610
|
scope?: string;
|
|
2611
|
+
/**
|
|
2612
|
+
* State for the authorization challenge request
|
|
2613
|
+
*/
|
|
2614
|
+
state?: string;
|
|
2611
2615
|
/**
|
|
2612
2616
|
* The resource to which access is being requested. This can help the authorization
|
|
2613
2617
|
* server in determining the resource server to handle the authorization request for
|
package/dist/index.js
CHANGED
|
@@ -1979,6 +1979,7 @@ async function sendAuthorizationChallengeRequest(options) {
|
|
|
1979
1979
|
scope: options.scope,
|
|
1980
1980
|
redirect_uri: options.redirectUri,
|
|
1981
1981
|
resource: options.resource,
|
|
1982
|
+
state: options.state,
|
|
1982
1983
|
code_challenge: pkce?.codeChallenge,
|
|
1983
1984
|
code_challenge_method: pkce?.codeChallengeMethod,
|
|
1984
1985
|
presentation_during_issuance_session: options.presentationDuringIssuanceSession
|
|
@@ -2232,7 +2233,8 @@ var Oauth2Client = class {
|
|
|
2232
2233
|
redirectUri: options.redirectUri,
|
|
2233
2234
|
scope: options.scope,
|
|
2234
2235
|
resource: options.resource,
|
|
2235
|
-
dpop: options.dpop
|
|
2236
|
+
dpop: options.dpop,
|
|
2237
|
+
state: options.state
|
|
2236
2238
|
});
|
|
2237
2239
|
} catch (error) {
|
|
2238
2240
|
if (!(error instanceof Oauth2ClientAuthorizationChallengeError && error.errorResponse.error === Oauth2ErrorCodes.RedirectToWeb)) throw error;
|
|
@@ -2260,7 +2262,8 @@ var Oauth2Client = class {
|
|
|
2260
2262
|
scope: options.scope,
|
|
2261
2263
|
pkceCodeVerifier: pkce?.codeVerifier,
|
|
2262
2264
|
resource: options.resource,
|
|
2263
|
-
dpop: options.dpop
|
|
2265
|
+
dpop: options.dpop,
|
|
2266
|
+
state: options.state
|
|
2264
2267
|
});
|
|
2265
2268
|
}
|
|
2266
2269
|
sendAuthorizationChallengeRequest(options) {
|
|
@@ -2279,7 +2282,8 @@ var Oauth2Client = class {
|
|
|
2279
2282
|
scope: options.scope,
|
|
2280
2283
|
callbacks: this.options.callbacks,
|
|
2281
2284
|
pkceCodeVerifier: options.pkceCodeVerifier,
|
|
2282
|
-
dpop: options.dpop
|
|
2285
|
+
dpop: options.dpop,
|
|
2286
|
+
state: options.state
|
|
2283
2287
|
});
|
|
2284
2288
|
}
|
|
2285
2289
|
async retrievePreAuthorizedCodeAccessToken({ authorizationServerMetadata, preAuthorizedCode, additionalRequestPayload, txCode, dpop, resource }) {
|