@putkoff/abstract-utilities 1.0.129 → 1.0.131

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"client.js","sources":["../../src/client/auth/src/token_client.ts"],"sourcesContent":["'use client';\nimport {\n isTokenExpired,\n decodeJwt,\n callStorage,\n} from '../../../functions';\n\n\n/** Read raw JWT from LocalStorage (or null if absent) */\nexport function getToken(): string | null | any {\n return callStorage('getItem', 'token');\n}\n\n\nexport function isLoggedIn() {\n const tok = getToken();\n return !!tok && !isTokenExpired(tok ?? \"\");\n}\n\n\n/**\n * Add a Bearer Authorization header.\n * A shallow copy of headers is returned so callers can keep chaining.\n */\nexport function getAuthorizationHeader(\n headers: Record<string, string> | null = {},\n token: string | null = null\n): Record<string, string> {\n token = token ?? getToken();\n headers = headers || {}\n if (token) headers[\"Authorization\"] = `Bearer ${token}`;\n return { ...headers };\n}\n\n\n/** Throw + redirect if there’s no valid token; otherwise return it. */\nexport function requireToken(): string {\n const tok = getToken();\n if (!tok || isTokenExpired(tok)) {\n console.warn(\"→ No token or expired token, redirecting to login…\");\n localStorage.removeItem(\"token\");\n window.location.href = '/';\n throw new Error(\"Redirecting to login…\");\n }\n return tok;\n}\n\n\n\n\n/** Convenience wrapper: return username from the JWT (or null). */\nexport function currentUsername() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const { username } = decodeJwt(tok);\n return username ?? null;\n } catch {\n return null;\n }\n}\nexport function currentUsernames() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const parts = tok.split(\".\");\n if (parts.length !== 3) return null;\n let b64 = parts[1].replace(/-/g, \"+\").replace(/_/g, \"/\");\n b64 = b64.padEnd(Math.ceil(b64.length / 4) * 4, \"=\");\n const jsonText = atob(b64);\n const payload = JSON.parse(jsonText);\n return payload.username ?? null;\n } catch {\n return null;\n }\n}\n\n/** Remove the JWT from LocalStorage */\nexport function removeToken(): void {\n try {\n callStorage('removeItem', 'token');\n } catch (err) {\n console.warn(\"Failed to remove token:\", err);\n }\n}"],"names":["callStorage","isTokenExpired","decodeJwt"],"mappings":";;;;;;;;;AAQA;SACgB,QAAQ,GAAA;AACtB,IAAA,OAAOA,wBAAW,CAAC,SAAS,EAAE,OAAO,CAAC;AACxC;SAGgB,UAAU,GAAA;AACxB,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,OAAO,CAAC,CAAC,GAAG,IAAI,CAACC,2BAAc,CAAC,GAAG,IAAI,EAAE,CAAC;AAC5C;AAGA;;;AAGG;SACa,sBAAsB,CACpC,UAAyC,EAAE,EAC3C,QAAuB,IAAI,EAAA;AAE3B,IAAA,KAAK,GAAG,KAAK,IAAI,QAAQ,EAAE;AAC3B,IAAA,OAAO,GAAG,OAAO,IAAI,EAAE;AACvB,IAAA,IAAI,KAAK;AAAE,QAAA,OAAO,CAAC,eAAe,CAAC,GAAG,CAAA,OAAA,EAAU,KAAK,EAAE;AACvD,IAAA,OAAO,EAAE,GAAG,OAAO,EAAE;AACvB;AAGA;SACgB,YAAY,GAAA;AAC1B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,IAAI,CAAC,GAAG,IAAIA,2BAAc,CAAC,GAAG,CAAC,EAAE;AAC/B,QAAA,OAAO,CAAC,IAAI,CAAC,oDAAoD,CAAC;AAClE,QAAA,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC;AAChC,QAAA,MAAM,CAAC,QAAQ,CAAC,IAAI,GAAG,GAAG;AAC1B,QAAA,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC;IAC1C;AACA,IAAA,OAAO,GAAG;AACZ;AAKA;SACgB,eAAe,GAAA;AAC7B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,EAAE,QAAQ,EAAE,GAAGC,sBAAS,CAAC,GAAG,CAAC;QACnC,OAAO,QAAQ,IAAI,IAAI;IACzB;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;SACgB,gBAAgB,GAAA;AAC9B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC;AAC5B,QAAA,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC;AAAE,YAAA,OAAO,IAAI;QACnC,IAAI,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC;QACxD,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC;AACpD,QAAA,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC;QAC1B,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC;AACpC,QAAA,OAAO,OAAO,CAAC,QAAQ,IAAI,IAAI;IACjC;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;AAEA;SACgB,WAAW,GAAA;AACzB,IAAA,IAAI;AACF,QAAAF,wBAAW,CAAC,YAAY,EAAE,OAAO,CAAC;IACpC;IAAE,OAAO,GAAG,EAAE;AACZ,QAAA,OAAO,CAAC,IAAI,CAAC,yBAAyB,EAAE,GAAG,CAAC;IAC9C;AACF;;;;;;;;;;"}
1
+ {"version":3,"file":"client.js","sources":["../../src/client/auth/src/token_client.ts"],"sourcesContent":["\nimport {\n isTokenExpired,\n decodeJwt,\n callStorage,\n} from '../../../functions';\n\n\n/** Read raw JWT from LocalStorage (or null if absent) */\nexport function getToken(): string | null | any {\n return callStorage('getItem', 'token');\n}\n\n\nexport function isLoggedIn() {\n const tok = getToken();\n return !!tok && !isTokenExpired(tok ?? \"\");\n}\n\n\n/**\n * Add a Bearer Authorization header.\n * A shallow copy of headers is returned so callers can keep chaining.\n */\nexport function getAuthorizationHeader(\n headers: Record<string, string> | null = {},\n token: string | null = null\n): Record<string, string> {\n token = token ?? getToken();\n headers = headers || {}\n if (token) headers[\"Authorization\"] = `Bearer ${token}`;\n return { ...headers };\n}\n\n\n/** Throw + redirect if there’s no valid token; otherwise return it. */\nexport function requireToken(): string {\n const tok = getToken();\n if (!tok || isTokenExpired(tok)) {\n console.warn(\"→ No token or expired token, redirecting to login…\");\n localStorage.removeItem(\"token\");\n window.location.href = '/';\n throw new Error(\"Redirecting to login…\");\n }\n return tok;\n}\n\n\n\n\n/** Convenience wrapper: return username from the JWT (or null). */\nexport function currentUsername() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const { username } = decodeJwt(tok);\n return username ?? null;\n } catch {\n return null;\n }\n}\nexport function currentUsernames() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const parts = tok.split(\".\");\n if (parts.length !== 3) return null;\n let b64 = parts[1].replace(/-/g, \"+\").replace(/_/g, \"/\");\n b64 = b64.padEnd(Math.ceil(b64.length / 4) * 4, \"=\");\n const jsonText = atob(b64);\n const payload = JSON.parse(jsonText);\n return payload.username ?? null;\n } catch {\n return null;\n }\n}\n\n/** Remove the JWT from LocalStorage */\nexport function removeToken(): void {\n try {\n callStorage('removeItem', 'token');\n } catch (err) {\n console.warn(\"Failed to remove token:\", err);\n }\n}"],"names":["callStorage","isTokenExpired","decodeJwt"],"mappings":";;;;;;;;;AAQA;SACgB,QAAQ,GAAA;AACtB,IAAA,OAAOA,wBAAW,CAAC,SAAS,EAAE,OAAO,CAAC;AACxC;SAGgB,UAAU,GAAA;AACxB,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,OAAO,CAAC,CAAC,GAAG,IAAI,CAACC,2BAAc,CAAC,GAAG,IAAI,EAAE,CAAC;AAC5C;AAGA;;;AAGG;SACa,sBAAsB,CACpC,UAAyC,EAAE,EAC3C,QAAuB,IAAI,EAAA;AAE3B,IAAA,KAAK,GAAG,KAAK,IAAI,QAAQ,EAAE;AAC3B,IAAA,OAAO,GAAG,OAAO,IAAI,EAAE;AACvB,IAAA,IAAI,KAAK;AAAE,QAAA,OAAO,CAAC,eAAe,CAAC,GAAG,CAAA,OAAA,EAAU,KAAK,EAAE;AACvD,IAAA,OAAO,EAAE,GAAG,OAAO,EAAE;AACvB;AAGA;SACgB,YAAY,GAAA;AAC1B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,IAAI,CAAC,GAAG,IAAIA,2BAAc,CAAC,GAAG,CAAC,EAAE;AAC/B,QAAA,OAAO,CAAC,IAAI,CAAC,oDAAoD,CAAC;AAClE,QAAA,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC;AAChC,QAAA,MAAM,CAAC,QAAQ,CAAC,IAAI,GAAG,GAAG;AAC1B,QAAA,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC;IAC1C;AACA,IAAA,OAAO,GAAG;AACZ;AAKA;SACgB,eAAe,GAAA;AAC7B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,EAAE,QAAQ,EAAE,GAAGC,sBAAS,CAAC,GAAG,CAAC;QACnC,OAAO,QAAQ,IAAI,IAAI;IACzB;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;SACgB,gBAAgB,GAAA;AAC9B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC;AAC5B,QAAA,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC;AAAE,YAAA,OAAO,IAAI;QACnC,IAAI,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC;QACxD,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC;AACpD,QAAA,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC;QAC1B,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC;AACpC,QAAA,OAAO,OAAO,CAAC,QAAQ,IAAI,IAAI;IACjC;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;AAEA;SACgB,WAAW,GAAA;AACzB,IAAA,IAAI;AACF,QAAAF,wBAAW,CAAC,YAAY,EAAE,OAAO,CAAC;IACpC;IAAE,OAAO,GAAG,EAAE;AACZ,QAAA,OAAO,CAAC,IAAI,CAAC,yBAAyB,EAAE,GAAG,CAAC;IAC9C;AACF;;;;;;;;;;"}
@@ -1 +1 @@
1
- {"version":3,"file":"client.js","sources":["../../src/client/auth/src/token_client.ts"],"sourcesContent":["'use client';\nimport {\n isTokenExpired,\n decodeJwt,\n callStorage,\n} from '../../../functions';\n\n\n/** Read raw JWT from LocalStorage (or null if absent) */\nexport function getToken(): string | null | any {\n return callStorage('getItem', 'token');\n}\n\n\nexport function isLoggedIn() {\n const tok = getToken();\n return !!tok && !isTokenExpired(tok ?? \"\");\n}\n\n\n/**\n * Add a Bearer Authorization header.\n * A shallow copy of headers is returned so callers can keep chaining.\n */\nexport function getAuthorizationHeader(\n headers: Record<string, string> | null = {},\n token: string | null = null\n): Record<string, string> {\n token = token ?? getToken();\n headers = headers || {}\n if (token) headers[\"Authorization\"] = `Bearer ${token}`;\n return { ...headers };\n}\n\n\n/** Throw + redirect if there’s no valid token; otherwise return it. */\nexport function requireToken(): string {\n const tok = getToken();\n if (!tok || isTokenExpired(tok)) {\n console.warn(\"→ No token or expired token, redirecting to login…\");\n localStorage.removeItem(\"token\");\n window.location.href = '/';\n throw new Error(\"Redirecting to login…\");\n }\n return tok;\n}\n\n\n\n\n/** Convenience wrapper: return username from the JWT (or null). */\nexport function currentUsername() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const { username } = decodeJwt(tok);\n return username ?? null;\n } catch {\n return null;\n }\n}\nexport function currentUsernames() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const parts = tok.split(\".\");\n if (parts.length !== 3) return null;\n let b64 = parts[1].replace(/-/g, \"+\").replace(/_/g, \"/\");\n b64 = b64.padEnd(Math.ceil(b64.length / 4) * 4, \"=\");\n const jsonText = atob(b64);\n const payload = JSON.parse(jsonText);\n return payload.username ?? null;\n } catch {\n return null;\n }\n}\n\n/** Remove the JWT from LocalStorage */\nexport function removeToken(): void {\n try {\n callStorage('removeItem', 'token');\n } catch (err) {\n console.warn(\"Failed to remove token:\", err);\n }\n}"],"names":[],"mappings":";;;;;;;AAQA;SACgB,QAAQ,GAAA;AACtB,IAAA,OAAO,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC;AACxC;SAGgB,UAAU,GAAA;AACxB,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,OAAO,CAAC,CAAC,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,CAAC;AAC5C;AAGA;;;AAGG;SACa,sBAAsB,CACpC,UAAyC,EAAE,EAC3C,QAAuB,IAAI,EAAA;AAE3B,IAAA,KAAK,GAAG,KAAK,IAAI,QAAQ,EAAE;AAC3B,IAAA,OAAO,GAAG,OAAO,IAAI,EAAE;AACvB,IAAA,IAAI,KAAK;AAAE,QAAA,OAAO,CAAC,eAAe,CAAC,GAAG,CAAA,OAAA,EAAU,KAAK,EAAE;AACvD,IAAA,OAAO,EAAE,GAAG,OAAO,EAAE;AACvB;AAGA;SACgB,YAAY,GAAA;AAC1B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,IAAI,CAAC,GAAG,IAAI,cAAc,CAAC,GAAG,CAAC,EAAE;AAC/B,QAAA,OAAO,CAAC,IAAI,CAAC,oDAAoD,CAAC;AAClE,QAAA,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC;AAChC,QAAA,MAAM,CAAC,QAAQ,CAAC,IAAI,GAAG,GAAG;AAC1B,QAAA,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC;IAC1C;AACA,IAAA,OAAO,GAAG;AACZ;AAKA;SACgB,eAAe,GAAA;AAC7B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,EAAE,QAAQ,EAAE,GAAG,SAAS,CAAC,GAAG,CAAC;QACnC,OAAO,QAAQ,IAAI,IAAI;IACzB;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;SACgB,gBAAgB,GAAA;AAC9B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC;AAC5B,QAAA,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC;AAAE,YAAA,OAAO,IAAI;QACnC,IAAI,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC;QACxD,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC;AACpD,QAAA,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC;QAC1B,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC;AACpC,QAAA,OAAO,OAAO,CAAC,QAAQ,IAAI,IAAI;IACjC;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;AAEA;SACgB,WAAW,GAAA;AACzB,IAAA,IAAI;AACF,QAAA,WAAW,CAAC,YAAY,EAAE,OAAO,CAAC;IACpC;IAAE,OAAO,GAAG,EAAE;AACZ,QAAA,OAAO,CAAC,IAAI,CAAC,yBAAyB,EAAE,GAAG,CAAC;IAC9C;AACF;;;;"}
1
+ {"version":3,"file":"client.js","sources":["../../src/client/auth/src/token_client.ts"],"sourcesContent":["\nimport {\n isTokenExpired,\n decodeJwt,\n callStorage,\n} from '../../../functions';\n\n\n/** Read raw JWT from LocalStorage (or null if absent) */\nexport function getToken(): string | null | any {\n return callStorage('getItem', 'token');\n}\n\n\nexport function isLoggedIn() {\n const tok = getToken();\n return !!tok && !isTokenExpired(tok ?? \"\");\n}\n\n\n/**\n * Add a Bearer Authorization header.\n * A shallow copy of headers is returned so callers can keep chaining.\n */\nexport function getAuthorizationHeader(\n headers: Record<string, string> | null = {},\n token: string | null = null\n): Record<string, string> {\n token = token ?? getToken();\n headers = headers || {}\n if (token) headers[\"Authorization\"] = `Bearer ${token}`;\n return { ...headers };\n}\n\n\n/** Throw + redirect if there’s no valid token; otherwise return it. */\nexport function requireToken(): string {\n const tok = getToken();\n if (!tok || isTokenExpired(tok)) {\n console.warn(\"→ No token or expired token, redirecting to login…\");\n localStorage.removeItem(\"token\");\n window.location.href = '/';\n throw new Error(\"Redirecting to login…\");\n }\n return tok;\n}\n\n\n\n\n/** Convenience wrapper: return username from the JWT (or null). */\nexport function currentUsername() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const { username } = decodeJwt(tok);\n return username ?? null;\n } catch {\n return null;\n }\n}\nexport function currentUsernames() {\n const tok = getToken();\n if (!tok) return null;\n try {\n const parts = tok.split(\".\");\n if (parts.length !== 3) return null;\n let b64 = parts[1].replace(/-/g, \"+\").replace(/_/g, \"/\");\n b64 = b64.padEnd(Math.ceil(b64.length / 4) * 4, \"=\");\n const jsonText = atob(b64);\n const payload = JSON.parse(jsonText);\n return payload.username ?? null;\n } catch {\n return null;\n }\n}\n\n/** Remove the JWT from LocalStorage */\nexport function removeToken(): void {\n try {\n callStorage('removeItem', 'token');\n } catch (err) {\n console.warn(\"Failed to remove token:\", err);\n }\n}"],"names":[],"mappings":";;;;;;;AAQA;SACgB,QAAQ,GAAA;AACtB,IAAA,OAAO,WAAW,CAAC,SAAS,EAAE,OAAO,CAAC;AACxC;SAGgB,UAAU,GAAA;AACxB,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,OAAO,CAAC,CAAC,GAAG,IAAI,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,CAAC;AAC5C;AAGA;;;AAGG;SACa,sBAAsB,CACpC,UAAyC,EAAE,EAC3C,QAAuB,IAAI,EAAA;AAE3B,IAAA,KAAK,GAAG,KAAK,IAAI,QAAQ,EAAE;AAC3B,IAAA,OAAO,GAAG,OAAO,IAAI,EAAE;AACvB,IAAA,IAAI,KAAK;AAAE,QAAA,OAAO,CAAC,eAAe,CAAC,GAAG,CAAA,OAAA,EAAU,KAAK,EAAE;AACvD,IAAA,OAAO,EAAE,GAAG,OAAO,EAAE;AACvB;AAGA;SACgB,YAAY,GAAA;AAC1B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;IACtB,IAAI,CAAC,GAAG,IAAI,cAAc,CAAC,GAAG,CAAC,EAAE;AAC/B,QAAA,OAAO,CAAC,IAAI,CAAC,oDAAoD,CAAC;AAClE,QAAA,YAAY,CAAC,UAAU,CAAC,OAAO,CAAC;AAChC,QAAA,MAAM,CAAC,QAAQ,CAAC,IAAI,GAAG,GAAG;AAC1B,QAAA,MAAM,IAAI,KAAK,CAAC,uBAAuB,CAAC;IAC1C;AACA,IAAA,OAAO,GAAG;AACZ;AAKA;SACgB,eAAe,GAAA;AAC7B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,EAAE,QAAQ,EAAE,GAAG,SAAS,CAAC,GAAG,CAAC;QACnC,OAAO,QAAQ,IAAI,IAAI;IACzB;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;SACgB,gBAAgB,GAAA;AAC9B,IAAA,MAAM,GAAG,GAAG,QAAQ,EAAE;AACtB,IAAA,IAAI,CAAC,GAAG;AAAE,QAAA,OAAO,IAAI;AACrB,IAAA,IAAI;QACF,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC;AAC5B,QAAA,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC;AAAE,YAAA,OAAO,IAAI;QACnC,IAAI,GAAG,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC;QACxD,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,GAAG,CAAC,CAAC,GAAG,CAAC,EAAE,GAAG,CAAC;AACpD,QAAA,MAAM,QAAQ,GAAG,IAAI,CAAC,GAAG,CAAC;QAC1B,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC;AACpC,QAAA,OAAO,OAAO,CAAC,QAAQ,IAAI,IAAI;IACjC;AAAE,IAAA,MAAM;AACN,QAAA,OAAO,IAAI;IACb;AACF;AAEA;SACgB,WAAW,GAAA;AACzB,IAAA,IAAI;AACF,QAAA,WAAW,CAAC,YAAY,EAAE,OAAO,CAAC;IACpC;IAAE,OAAO,GAAG,EAAE;AACZ,QAAA,OAAO,CAAC,IAAI,CAAC,yBAAyB,EAAE,GAAG,CAAC;IAC9C;AACF;;;;"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@putkoff/abstract-utilities",
3
- "version": "1.0.129",
3
+ "version": "1.0.131",
4
4
  "type": "module",
5
5
  "description": "A reusable React Login component with JWT authentication",
6
6
  "main": "dist/cjs/index.js",