@passlock/client 2.0.1 → 2.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (99) hide show
  1. package/README.md +2 -2
  2. package/README.template.md +2 -2
  3. package/dist/errors.d.ts +4 -0
  4. package/dist/errors.d.ts.map +1 -0
  5. package/dist/errors.js +14 -0
  6. package/dist/errors.js.map +1 -0
  7. package/dist/index.d.ts +236 -31
  8. package/dist/index.d.ts.map +1 -1
  9. package/dist/index.js +236 -34
  10. package/dist/index.js.map +1 -1
  11. package/dist/internal/index.d.ts +4 -0
  12. package/dist/internal/index.d.ts.map +1 -0
  13. package/dist/internal/index.js +4 -0
  14. package/dist/internal/index.js.map +1 -0
  15. package/dist/{shared → internal}/network.d.ts +19 -16
  16. package/dist/internal/network.d.ts.map +1 -0
  17. package/dist/{shared → internal}/network.js +40 -25
  18. package/dist/internal/network.js.map +1 -0
  19. package/dist/{shared → internal}/promise.d.ts +2 -2
  20. package/dist/internal/promise.d.ts.map +1 -0
  21. package/dist/{shared → internal}/promise.js +2 -2
  22. package/dist/internal/promise.js.map +1 -0
  23. package/dist/internal/tenancy.d.ts.map +1 -0
  24. package/dist/internal/tenancy.js.map +1 -0
  25. package/dist/{logger/index.d.ts → logger.d.ts} +19 -4
  26. package/dist/logger.d.ts.map +1 -0
  27. package/dist/{logger/index.js → logger.js} +19 -4
  28. package/dist/logger.js.map +1 -0
  29. package/dist/{shared/options.d.ts → options.d.ts} +4 -0
  30. package/dist/options.d.ts.map +1 -0
  31. package/dist/{shared/options.js.map → options.js.map} +1 -1
  32. package/dist/passkey/authentication/authentication.d.ts +134 -0
  33. package/dist/passkey/authentication/authentication.d.ts.map +1 -0
  34. package/dist/passkey/{authentication.js → authentication/authentication.js} +68 -50
  35. package/dist/passkey/authentication/authentication.js.map +1 -0
  36. package/dist/passkey/errors.d.ts +158 -16
  37. package/dist/passkey/errors.d.ts.map +1 -1
  38. package/dist/passkey/errors.js +214 -6
  39. package/dist/passkey/errors.js.map +1 -1
  40. package/dist/passkey/registration/registration.d.ts +145 -0
  41. package/dist/passkey/registration/registration.d.ts.map +1 -0
  42. package/dist/passkey/{registration.js → registration/registration.js} +43 -36
  43. package/dist/passkey/registration/registration.js.map +1 -0
  44. package/dist/passkey/shared.d.ts +8 -2
  45. package/dist/passkey/shared.d.ts.map +1 -1
  46. package/dist/passkey/signals/signals.d.ts +103 -0
  47. package/dist/passkey/signals/signals.d.ts.map +1 -0
  48. package/dist/passkey/{signals.js → signals/signals.js} +69 -71
  49. package/dist/passkey/signals/signals.js.map +1 -0
  50. package/dist/passkey/support.d.ts +15 -0
  51. package/dist/passkey/support.d.ts.map +1 -1
  52. package/dist/passkey/support.js +16 -1
  53. package/dist/passkey/support.js.map +1 -1
  54. package/dist/principal.d.ts +16 -0
  55. package/dist/principal.d.ts.map +1 -0
  56. package/dist/principal.js +2 -0
  57. package/dist/principal.js.map +1 -0
  58. package/dist/safe.d.ts +247 -0
  59. package/dist/safe.d.ts.map +1 -0
  60. package/dist/safe.js +254 -0
  61. package/dist/safe.js.map +1 -0
  62. package/package.json +21 -19
  63. package/dist/logger/index.d.ts.map +0 -1
  64. package/dist/logger/index.js.map +0 -1
  65. package/dist/passkey/authentication.d.ts +0 -118
  66. package/dist/passkey/authentication.d.ts.map +0 -1
  67. package/dist/passkey/authentication.js.map +0 -1
  68. package/dist/passkey/authentication.test.d.ts +0 -2
  69. package/dist/passkey/authentication.test.d.ts.map +0 -1
  70. package/dist/passkey/authentication.test.js +0 -157
  71. package/dist/passkey/authentication.test.js.map +0 -1
  72. package/dist/passkey/registration.d.ts +0 -136
  73. package/dist/passkey/registration.d.ts.map +0 -1
  74. package/dist/passkey/registration.js.map +0 -1
  75. package/dist/passkey/registration.test.d.ts +0 -2
  76. package/dist/passkey/registration.test.d.ts.map +0 -1
  77. package/dist/passkey/registration.test.js +0 -161
  78. package/dist/passkey/registration.test.js.map +0 -1
  79. package/dist/passkey/signals.d.ts +0 -113
  80. package/dist/passkey/signals.d.ts.map +0 -1
  81. package/dist/passkey/signals.js.map +0 -1
  82. package/dist/shared/network.d.ts.map +0 -1
  83. package/dist/shared/network.js.map +0 -1
  84. package/dist/shared/options.d.ts.map +0 -1
  85. package/dist/shared/promise.d.ts.map +0 -1
  86. package/dist/shared/promise.js.map +0 -1
  87. package/dist/shared/tenancy.d.ts.map +0 -1
  88. package/dist/shared/tenancy.js.map +0 -1
  89. package/dist/surface.test.d.ts +0 -2
  90. package/dist/surface.test.d.ts.map +0 -1
  91. package/dist/surface.test.js +0 -38
  92. package/dist/surface.test.js.map +0 -1
  93. package/dist/unsafe.d.ts +0 -41
  94. package/dist/unsafe.d.ts.map +0 -1
  95. package/dist/unsafe.js +0 -52
  96. package/dist/unsafe.js.map +0 -1
  97. /package/dist/{shared → internal}/tenancy.d.ts +0 -0
  98. /package/dist/{shared → internal}/tenancy.js +0 -0
  99. /package/dist/{shared/options.js → options.js} +0 -0
package/README.md CHANGED
@@ -36,7 +36,7 @@ in README.template.md and outputs to README.md
36
36
 
37
37
  Powerful features including signals and related origin requests...
38
38
 
39
- 1. **🔓 No lock-in**
39
+ 1. **🔓 No lock-in**
40
40
  Framework agnostic. Standards compliant.
41
41
 
42
42
  2. **🔑 Related origins (domain migration)**
@@ -48,7 +48,7 @@ Works out of the box with sensible defaults.
48
48
  4. **📱 Credential management**
49
49
  Programmatically manage passkeys on end user devices
50
50
 
51
- 5. **💪 Powerful**
51
+ 5. **💪 Powerful**
52
52
  User verification, autofill, roaming authenticators and more.
53
53
 
54
54
  ## More information
@@ -36,7 +36,7 @@ in README.template.md and outputs to README.md
36
36
 
37
37
  Powerful features including signals and related origin requests...
38
38
 
39
- 1. **🔓 No lock-in**
39
+ 1. **🔓 No lock-in**
40
40
  Framework agnostic. Standards compliant.
41
41
 
42
42
  2. **🔑 Related origins (domain migration)**
@@ -48,7 +48,7 @@ Works out of the box with sensible defaults.
48
48
  4. **📱 Credential management**
49
49
  Programmatically manage passkeys on end user devices
50
50
 
51
- 5. **💪 Powerful**
51
+ 5. **💪 Powerful**
52
52
  User verification, autofill, roaming authenticators and more.
53
53
 
54
54
  ## More information
@@ -0,0 +1,4 @@
1
+ export declare const isTagged: <A extends {
2
+ _tag: string;
3
+ }>(tag: A["_tag"]) => (payload: unknown) => payload is A;
4
+ //# sourceMappingURL=errors.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"errors.d.ts","sourceRoot":"","sources":["../src/errors.ts"],"names":[],"mappings":"AAAA,eAAO,MAAM,QAAQ,GAClB,CAAC,SAAS;IAAE,IAAI,EAAE,MAAM,CAAA;CAAE,EAAE,KAAK,CAAC,CAAC,MAAM,CAAC,MAC1C,SAAS,OAAO,KAAG,OAAO,IAAI,CAS9B,CAAA"}
package/dist/errors.js ADDED
@@ -0,0 +1,14 @@
1
+ export const isTagged = (tag) => (payload) => {
2
+ if (typeof payload !== "object")
3
+ return false;
4
+ if (payload === null)
5
+ return false;
6
+ if (!("_tag" in payload))
7
+ return false;
8
+ if (typeof payload._tag !== "string")
9
+ return false;
10
+ if (payload._tag !== tag)
11
+ return false;
12
+ return true;
13
+ };
14
+ //# sourceMappingURL=errors.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"errors.js","sourceRoot":"","sources":["../src/errors.ts"],"names":[],"mappings":"AAAA,MAAM,CAAC,MAAM,QAAQ,GACnB,CAA6B,GAAc,EAAE,EAAE,CAC/C,CAAC,OAAgB,EAAgB,EAAE;IACjC,IAAI,OAAO,OAAO,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAC7C,IAAI,OAAO,KAAK,IAAI;QAAE,OAAO,KAAK,CAAA;IAElC,IAAI,CAAC,CAAC,MAAM,IAAI,OAAO,CAAC;QAAE,OAAO,KAAK,CAAA;IACtC,IAAI,OAAO,OAAO,CAAC,IAAI,KAAK,QAAQ;QAAE,OAAO,KAAK,CAAA;IAClD,IAAI,OAAO,CAAC,IAAI,KAAK,GAAG;QAAE,OAAO,KAAK,CAAA;IAEtC,OAAO,IAAI,CAAA;AACb,CAAC,CAAA"}
package/dist/index.d.ts CHANGED
@@ -1,41 +1,246 @@
1
- import type { AuthenticationError, AuthenticationOptions, AuthenticationSuccess, PasskeyNotFound } from "./passkey/authentication";
2
- import type { CredentialMapping, DeletionError, SyncError, UpdateError, UpdateUserDetails } from "./passkey/signals";
3
- import type { PasslockOptions } from "./shared/options";
1
+ /**
2
+ * _unsafe_ functions that could throw an error. Be sure to catch errors and use one of the
3
+ * type guards to narrow the thrown error down to a specific type.
4
+ *
5
+ * @categoryDescription Passkeys (core)
6
+ * Creating, updating, authenticating and deleting passkeys.
7
+ *
8
+ * @categoryDescription Passkeys (other)
9
+ * Testing for browser capabilities related to passkeys, type guards and other utilities.
10
+ *
11
+ * @showCategories
12
+ * @module unsafe
13
+ */
4
14
  import { Logger } from "./logger";
5
- import { type RegistrationError, type RegistrationOptions, type RegistrationSuccess } from "./passkey/registration";
6
- export type { PasslockOptions } from "./shared/options";
7
- export { ConsoleLogger, EventLogger, LogEvent, Logger, LogLevel } from "./logger";
15
+ import type { PasslockOptions } from "./options";
16
+ import type { AuthenticationOptions, AuthenticationSuccess } from "./passkey/authentication/authentication";
17
+ import type { RegistrationOptions, RegistrationSuccess } from "./passkey/registration/registration";
18
+ import type { CredentialMapping, UpdatePasskeyOptions } from "./passkey/signals/signals";
19
+ /**
20
+ * Registers a passkey on the user's device, then saves the server-side component in your vault.
21
+ * If successful, this function returns a `code` or `id_token` (JWT). The code and/or jwt should
22
+ * be sent to your backend for verification. See
23
+ * [register a passkey](https://passlock.dev/passkeys/registration/) in the documentation.
24
+ *
25
+ * @param options
26
+ *
27
+ * @returns A successful registration payload.
28
+ *
29
+ * @see {@link isRegistrationSuccess}
30
+ * @see {@link isPasskeyUnsupportedError}
31
+ * @see {@link isDuplicatePasskeyError}
32
+ * @see {@link isOtherPasskeyError}
33
+ *
34
+ * @throws {@link RegistrationError} (alias to a union of potential errors)
35
+ * @throws {@link PasskeyUnsupportedError} if the device does not support passkeys
36
+ * @throws {@link DuplicatePasskeyError} if `allowCredentials` includes a passkey that already exists on the device
37
+ * @throws {@link OtherPasskeyError} typically a low level failure
38
+ * @throws {@link NetworkError}
39
+ *
40
+ * @example
41
+ * // from your Passlock console settings
42
+ * const tenancyId = "myTenancyId";
43
+ * const username = "jdoe@gmail.com";
44
+ *
45
+ * try {
46
+ * const result = await registerPasskey({ tenancyId, username });
47
+ * // send this to your backend for verification
48
+ * console.log(result.code);
49
+ * } catch (error) {
50
+ * if (isPasskeyUnsupportedError(error)) {
51
+ * alert("passkeys not supported on this device");
52
+ * } else {
53
+ * console.error(error);
54
+ * }
55
+ * }
56
+ *
57
+ * @category Passkeys (core)
58
+ */
59
+ export declare const registerPasskey: (options: RegistrationOptions,
60
+ /** @hidden */
61
+ logger?: typeof Logger.Service) => Promise<RegistrationSuccess>;
8
62
  /**
9
- * Register a passkey on the local device and store the
10
- * associated public key in your Passlock vault.
63
+ * Asks the client to present a passkey, which is then verified against the server-side component in your vault.
64
+ * If successful, this function returns a `code` or `id_token` (JWT). The code and/or jwt should
65
+ * be sent to your backend for verification. See
66
+ * [authenticate a passkey](https://passlock.dev/passkeys/authentication/) in the documentation.
67
+ *
11
68
  * @param options
12
- * @returns
69
+ *
70
+ * @returns A successful authentication payload.
71
+ *
72
+ * @see {@link isAuthenticationSuccess}
73
+ * @see {@link isPasskeyUnsupportedError}
74
+ * @see {@link isPasskeyNotFoundError}
75
+ * @see {@link isOtherPasskeyError}
76
+ *
77
+ * @throws {@link AuthenticationError} (alias to a union of potential errors)
78
+ * @throws {@link PasskeyUnsupportedError} if the device does not support passkeys
79
+ * @throws {@link PasskeyNotFoundError} if the passkey is orhpaned i.e. deleted from the vault but still present on the local device
80
+ * @throws {@link OtherPasskeyError} typically a low level failure
81
+ * @throws {@link NetworkError}
82
+ *
83
+ * @example
84
+ * // from your Passlock console settings
85
+ * const tenancyId = "myTenancyId";
86
+ *
87
+ * try {
88
+ * const result = await authenticatePasskey({ tenancyId });
89
+ * // send this to your backend for verification
90
+ * console.log(result.code);
91
+ * } catch (error) {
92
+ * if (isPasskeyUnsupportedError(error)) {
93
+ * alert("passkeys not supported on this device");
94
+ * } else {
95
+ * console.error(error);
96
+ * }
97
+ * }
98
+ *
99
+ * @category Passkeys (core)
13
100
  */
14
- export declare const registerPasskey: (options: RegistrationOptions, logger?: typeof Logger.Service) => Promise<RegistrationSuccess | RegistrationError>;
15
- export type { RegistrationError, RegistrationOptions, RegistrationSuccess, } from "./passkey/registration";
16
- export { isOtherPasskeyError, isPasskeyUnsupported, OtherPasskeyError, PasskeyUnsupportedError, } from "./passkey/errors";
17
- export { DuplicatePasskeyError, isDuplicatePasskey, isRegistrationSuccess, } from "./passkey/registration";
18
- export { isUnexpectedError, UnexpectedError } from "./shared/network";
101
+ export declare const authenticatePasskey: (options: AuthenticationOptions,
102
+ /** @hidden */
103
+ logger?: typeof Logger.Service) => Promise<AuthenticationSuccess>;
19
104
  /**
20
- * Trigger local passkey authentication then verify the passkey in the Passlock vault.
21
- * Returns a code and id_token that can be exchanged/decoded in your backend.
105
+ * Attempt to update the username or display name for a passkey (client-side only).
106
+ *
107
+ * Useful if the user has changed their account identifier. For example, they register
108
+ * using jdoe@gmail.com but later change their account username to jdoe@yahoo.com.
109
+ * Even after you update their account details in your backend, their local password
110
+ * manager will continue to display jdoe@gmail.com.
111
+ *
112
+ * By calling this function and supplying a new username/display name, their local
113
+ * password manager will align with their updated account identifier.
22
114
  *
23
115
  * @param options
24
- * @returns
116
+ * @returns Update status
117
+ * @see {@link isUpdateError}
118
+ * @throws {@link UpdateError} if the passkey cannot be updated
119
+ *
120
+ * @example
121
+ * // from your Passlock console settings
122
+ * const tenancyId = "myTenancyId";
123
+ * const passkeyId = "myPasskeyId";
124
+ * const username = "newUsername@gmail.com";
125
+ * const displayName = "New Account Name";
126
+ *
127
+ * try {
128
+ * const result = await updatePasskey({ tenancyId, passkeyId, username, displayName });
129
+ * console.log("passkey updated");
130
+ * } catch (error) {
131
+ * console.error(error);
132
+ * }
133
+ *
134
+ * @category Passkeys (core)
135
+ */
136
+ export declare const updatePasskey: (options: UpdatePasskeyOptions,
137
+ /** @hidden */
138
+ logger?: typeof Logger.Service) => Promise<boolean>;
139
+ /**
140
+ * Attempts to delete a passkey from a local device. There are two scenarios in which this function proves useful:
141
+ *
142
+ * 1. **Deleting a passkey**. Use the `@passlock/node` package or make vanilla REST calls from your
143
+ * backend to delete the server-side component, then use this function to delete the client-side component.
144
+ *
145
+ * 2. **Missing passkey**. The user tried to present a passkey, but the server-side component could not be found.
146
+ * Remove the passkey from the local device to prevent it happening again.
147
+ *
148
+ * See [deleting passkeys](https://passlock.dev/passkeys/passkey-removal/) and
149
+ * [handling missing passkeys](https://passlock.dev/handling-missing-passkeys/) in the documentation.
150
+ *
151
+ * @param identifiers Passkey identifier or credential mapping.
152
+ * @param options Passlock tenancy and endpoint options.
153
+ * @returns Delete status
154
+ * @see {@link isDeleteError}
155
+ * @throws {@link DeleteError} if the passkey cannot be deleted
156
+ *
157
+ * @example
158
+ * // from your Passlock console settings
159
+ * const tenancyId = "myTenancyId";
160
+ * const passkeyId = "myPasskeyId";
161
+ *
162
+ * try {
163
+ * const result = await deletePasskey(passkeyId, { tenancyId });
164
+ * console.log("passkey deleted");
165
+ * } catch (error) {
166
+ * console.error(error);
167
+ * }
168
+ *
169
+ * @category Passkeys (core)
170
+ */
171
+ export declare const deletePasskey: (identifiers: string | CredentialMapping, options: PasslockOptions,
172
+ /** @hidden */
173
+ logger?: typeof Logger.Service) => Promise<boolean>;
174
+ /**
175
+ * Attempt to prune local passkeys by keeping only the passkey IDs you trust.
176
+ *
177
+ * This is useful when your backend is the source of truth for which passkeys
178
+ * should still exist for a given account on this device.
179
+ *
180
+ * @param passkeyIds IDs to keep on-device.
181
+ * @param options Passlock tenancy and endpoint options.
182
+ * @returns `true` if local passkeys were pruned.
183
+ * @see {@link isPruningError}
184
+ *
185
+ * @throws {@link PruningError}
186
+ *
187
+ * @example
188
+ * // from your Passlock console settings
189
+ * const tenancyId = "myTenancyId";
190
+ * const activePasskeyIds = ["passkey-1", "passkey-2"];
191
+ *
192
+ * try {
193
+ * const result = await prunePasskeys(activePasskeyIds, { tenancyId });
194
+ * console.log("local passkeys pruned", result);
195
+ * } catch (error) {
196
+ * if (isPruningError(error)) {
197
+ * console.error(error.code);
198
+ * } else {
199
+ * console.error(error);
200
+ * }
201
+ * }
202
+ *
203
+ * @category Passkeys (core)
204
+ */
205
+ export declare const prunePasskeys: (passkeyIds: Array<string>, options: PasslockOptions,
206
+ /** @hidden */
207
+ logger?: typeof Logger.Service) => Promise<boolean>;
208
+ /**
209
+ * Does the local device support programmatic passkey deletion
210
+ *
211
+ * @returns `true` if local passkey deletion is supported.
212
+ *
213
+ * @category Passkeys (other)
214
+ */
215
+ export declare const isPasskeyDeleteSupport: () => boolean;
216
+ /**
217
+ * Does the local device support programmatic passkey pruning
218
+ *
219
+ * @returns `true` if local passkey pruning is supported.
220
+ *
221
+ * @category Passkeys (other)
222
+ */
223
+ export declare const isPasskeyPruningSupport: () => boolean;
224
+ /**
225
+ * Does the local device support programmatic passkey updates
226
+ *
227
+ * @returns `true` if local passkey updates are supported.
228
+ *
229
+ * @category Passkeys (other)
25
230
  */
26
- export declare const authenticatePasskey: (options: AuthenticationOptions, logger?: typeof Logger.Service) => Promise<AuthenticationSuccess | AuthenticationError>;
27
- export type { AuthenticationError, AuthenticationOptions, AuthenticationSuccess, PasskeyNotFound, } from "./passkey/authentication";
28
- export { isAuthenticationSuccess, isPasskeyNotFound, } from "./passkey/authentication";
29
- export declare const isPasskeyDeletionSupport: () => boolean;
30
- export declare const isPasskeySyncSupport: () => boolean;
31
231
  export declare const isPasskeyUpdateSupport: () => boolean;
32
- export declare const deletePasskey: (identifiers: string | CredentialMapping | PasskeyNotFound, options: PasslockOptions, logger?: typeof Logger.Service) => Promise<boolean | DeletionError>;
33
- export type { CredentialMapping } from "./passkey/signals";
34
- export { DeletionError, isDeletionError } from "./passkey/signals";
35
- export declare const syncPasskeys: (passkeyIds: Array<string>, options: PasslockOptions, logger?: typeof Logger.Service) => Promise<boolean | SyncError>;
36
- export { isSyncError, SyncError } from "./passkey/signals";
37
- export declare const updateUserDetails: (options: UpdateUserDetails, logger?: typeof Logger.Service) => Promise<boolean | UpdateError>;
38
- export type { UpdateUserDetails } from "./passkey/signals";
39
- export { isUpdateError, UpdateError } from "./passkey/signals";
40
- export { isAutofillSupport, isPasskeySupport } from "./passkey/support";
232
+ export type { NetworkError } from "./internal/network";
233
+ export { isNetworkError } from "./internal/network";
234
+ export { LogEvent, Logger, LogLevel, } from "./logger";
235
+ export type { PasslockOptions } from "./options";
236
+ export type { AuthenticationError, AuthenticationEvent, AuthenticationOptions, AuthenticationSuccess, OnAuthenticationEvent, } from "./passkey/authentication/authentication";
237
+ export { AuthenticationHelper, isAuthenticationSuccess, } from "./passkey/authentication/authentication";
238
+ export type { ErrorCode } from "./passkey/errors";
239
+ export { DeleteError, DuplicatePasskeyError, isDeleteError, isDuplicatePasskeyError, isOtherPasskeyError, isPasskeyNotFoundError, isPasskeyUnsupportedError, isPruningError, isUpdateError, OtherPasskeyError, PasskeyNotFoundError, PasskeyUnsupportedError, PruningError, UpdateError, } from "./passkey/errors";
240
+ export type { OnRegistrationEvent, RegistrationError, RegistrationEvent, RegistrationOptions, RegistrationSuccess, } from "./passkey/registration/registration";
241
+ export { isRegistrationSuccess, RegistrationHelper, } from "./passkey/registration/registration";
242
+ export type { UserVerification } from "./passkey/shared";
243
+ export type { CredentialMapping, UpdatePasskeyOptions, } from "./passkey/signals/signals";
244
+ export { isAutofillSupport, isPasskeySupport, } from "./passkey/support";
245
+ export type { Principal } from "./principal";
41
246
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,mBAAmB,EACnB,qBAAqB,EACrB,qBAAqB,EACrB,eAAe,EAChB,MAAM,0BAA0B,CAAA;AACjC,OAAO,KAAK,EACV,iBAAiB,EACjB,aAAa,EACb,SAAS,EACT,WAAW,EACX,iBAAiB,EAClB,MAAM,mBAAmB,CAAA;AAC1B,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAA;AAEvD,OAAO,EAAe,MAAM,EAAE,MAAM,UAAU,CAAA;AAK9C,OAAO,EACL,KAAK,iBAAiB,EAEtB,KAAK,mBAAmB,EACxB,KAAK,mBAAmB,EAEzB,MAAM,wBAAwB,CAAA;AAY/B,YAAY,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAA;AACvD,OAAO,EAAE,aAAa,EAAE,WAAW,EAAE,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,UAAU,CAAA;AAIjF;;;;;GAKG;AACH,eAAO,MAAM,eAAe,GAC1B,SAAS,mBAAmB,EAC5B,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,mBAAmB,GAAG,iBAAiB,CAM/C,CAAA;AAEH,YAAY,EACV,iBAAiB,EACjB,mBAAmB,EACnB,mBAAmB,GACpB,MAAM,wBAAwB,CAAA;AAC/B,OAAO,EACL,mBAAmB,EACnB,oBAAoB,EACpB,iBAAiB,EACjB,uBAAuB,GACxB,MAAM,kBAAkB,CAAA;AACzB,OAAO,EACL,qBAAqB,EACrB,kBAAkB,EAClB,qBAAqB,GACtB,MAAM,wBAAwB,CAAA;AAC/B,OAAO,EAAE,iBAAiB,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAA;AAIrE;;;;;;GAMG;AACH,eAAO,MAAM,mBAAmB,GAC9B,SAAS,qBAAqB,EAC9B,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,qBAAqB,GAAG,mBAAmB,CAMnD,CAAA;AAEH,YAAY,EACV,mBAAmB,EACnB,qBAAqB,EACrB,qBAAqB,EACrB,eAAe,GAChB,MAAM,0BAA0B,CAAA;AACjC,OAAO,EACL,uBAAuB,EACvB,iBAAiB,GAClB,MAAM,0BAA0B,CAAA;AAIjC,eAAO,MAAM,wBAAwB,eAAuD,CAAA;AAC5F,eAAO,MAAM,oBAAoB,eAAmD,CAAA;AACpF,eAAO,MAAM,sBAAsB,eAAqD,CAAA;AAExF,eAAO,MAAM,aAAa,GACxB,aAAa,MAAM,GAAG,iBAAiB,GAAG,eAAe,EACzD,SAAS,eAAe,EACxB,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,GAAG,aAAa,CAOjC,CAAA;AAED,YAAY,EAAE,iBAAiB,EAAE,MAAM,mBAAmB,CAAA;AAC1D,OAAO,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,mBAAmB,CAAA;AAElE,eAAO,MAAM,YAAY,GACvB,YAAY,KAAK,CAAC,MAAM,CAAC,EACzB,SAAS,eAAe,EACxB,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,GAAG,SAAS,CAG7B,CAAA;AAED,OAAO,EAAE,WAAW,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAA;AAE1D,eAAO,MAAM,iBAAiB,GAC5B,SAAS,iBAAiB,EAC1B,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,GAAG,WAAW,CAG/B,CAAA;AAED,YAAY,EAAE,iBAAiB,EAAE,MAAM,mBAAmB,CAAA;AAC1D,OAAO,EAAE,aAAa,EAAE,WAAW,EAAE,MAAM,mBAAmB,CAAA;AAI9D,OAAO,EAAE,iBAAiB,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAA"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAIH,OAAO,EAAe,MAAM,EAAE,MAAM,UAAU,CAAA;AAC9C,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,WAAW,CAAA;AAChD,OAAO,KAAK,EACV,qBAAqB,EACrB,qBAAqB,EACtB,MAAM,yCAAyC,CAAA;AAKhD,OAAO,KAAK,EACV,mBAAmB,EACnB,mBAAmB,EACpB,MAAM,qCAAqC,CAAA;AAK5C,OAAO,KAAK,EACV,iBAAiB,EACjB,oBAAoB,EACrB,MAAM,2BAA2B,CAAA;AAalC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,eAAO,MAAM,eAAe,GAC1B,SAAS,mBAAmB;AAC5B,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,mBAAmB,CAM3B,CAAA;AAIH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,eAAO,MAAM,mBAAmB,GAC9B,SAAS,qBAAqB;AAC9B,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,qBAAqB,CAM7B,CAAA;AAIH;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,eAAO,MAAM,aAAa,GACxB,SAAS,oBAAoB;AAC7B,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,CAGjB,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,eAAO,MAAM,aAAa,GACxB,aAAa,MAAM,GAAG,iBAAiB,EACvC,SAAS,eAAe;AACxB,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,CAOjB,CAAA;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,eAAO,MAAM,aAAa,GACxB,YAAY,KAAK,CAAC,MAAM,CAAC,EACzB,SAAS,eAAe;AACxB,cAAc;AACd,SAAQ,OAAO,MAAM,CAAC,OAAqB,KAC1C,OAAO,CAAC,OAAO,CAGjB,CAAA;AAID;;;;;;GAMG;AACH,eAAO,MAAM,sBAAsB,eACW,CAAA;AAE9C;;;;;;GAMG;AACH,eAAO,MAAM,uBAAuB,eACW,CAAA;AAE/C;;;;;;GAMG;AACH,eAAO,MAAM,sBAAsB,eACW,CAAA;AAI9C,YAAY,EAAE,YAAY,EAAE,MAAM,oBAAoB,CAAA;AACtD,OAAO,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAA;AACnD,OAAO,EACL,QAAQ,EACR,MAAM,EACN,QAAQ,GACT,MAAM,UAAU,CAAA;AACjB,YAAY,EAAE,eAAe,EAAE,MAAM,WAAW,CAAA;AAChD,YAAY,EACV,mBAAmB,EACnB,mBAAmB,EACnB,qBAAqB,EACrB,qBAAqB,EACrB,qBAAqB,GACtB,MAAM,yCAAyC,CAAA;AAChD,OAAO,EACL,oBAAoB,EACpB,uBAAuB,GACxB,MAAM,yCAAyC,CAAA;AAChD,YAAY,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAA;AACjD,OAAO,EACL,WAAW,EACX,qBAAqB,EACrB,aAAa,EACb,uBAAuB,EACvB,mBAAmB,EACnB,sBAAsB,EACtB,yBAAyB,EACzB,cAAc,EACd,aAAa,EACb,iBAAiB,EACjB,oBAAoB,EACpB,uBAAuB,EACvB,YAAY,EACZ,WAAW,GACZ,MAAM,kBAAkB,CAAA;AACzB,YAAY,EACV,mBAAmB,EACnB,iBAAiB,EACjB,iBAAiB,EACjB,mBAAmB,EACnB,mBAAmB,GACpB,MAAM,qCAAqC,CAAA;AAC5C,OAAO,EACL,qBAAqB,EACrB,kBAAkB,GACnB,MAAM,qCAAqC,CAAA;AAC5C,YAAY,EAAE,gBAAgB,EAAE,MAAM,kBAAkB,CAAA;AACxD,YAAY,EACV,iBAAiB,EACjB,oBAAoB,GACrB,MAAM,2BAA2B,CAAA;AAClC,OAAO,EACL,iBAAiB,EACjB,gBAAgB,GACjB,MAAM,mBAAmB,CAAA;AAC1B,YAAY,EAAE,SAAS,EAAE,MAAM,aAAa,CAAA"}