@react-keycloak-refork/ssr 6.0.4 → 8.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (68) hide show
  1. package/LICENSE.md +24 -24
  2. package/README.md +11 -11
  3. package/lib/SSRKeycloakProvider.d.ts +20 -20
  4. package/lib/SSRKeycloakProvider.js +78 -77
  5. package/lib/SSRKeycloakProvider.js.map +1 -1
  6. package/lib/index.d.ts +7 -7
  7. package/lib/index.js +7 -7
  8. package/lib/internals/KeycloakProvider.d.ts +140 -146
  9. package/lib/internals/KeycloakProvider.js +3 -3
  10. package/lib/internals/KeycloakProvider.js.map +1 -1
  11. package/lib/internals/context.d.ts +3 -4
  12. package/lib/internals/context.js +7 -7
  13. package/lib/internals/context.js.map +1 -1
  14. package/lib/internals/keycloak.d.ts +5 -5
  15. package/lib/internals/keycloak.js +30 -34
  16. package/lib/internals/keycloak.js.map +1 -1
  17. package/lib/internals/utils.d.ts +1 -1
  18. package/lib/internals/utils.js +1 -1
  19. package/lib/persistors/client.d.ts +11 -11
  20. package/lib/persistors/client.js +25 -25
  21. package/lib/persistors/server.d.ts +3 -3
  22. package/lib/persistors/server.js +33 -33
  23. package/lib/persistors/types.d.ts +22 -22
  24. package/lib/persistors/types.js +1 -1
  25. package/lib/persistors/utils.d.ts +5 -5
  26. package/lib/persistors/utils.js +19 -19
  27. package/lib/persistors/utils.js.map +1 -1
  28. package/lib/types.d.ts +6 -6
  29. package/lib/types.js +1 -1
  30. package/lib/useKeycloak.d.ts +6 -6
  31. package/lib/useKeycloak.js +11 -11
  32. package/lib/withKeycloak.d.ts +43 -43
  33. package/lib/withKeycloak.js +24 -24
  34. package/lib/withKeycloak.js.map +1 -1
  35. package/lib-commonjs/SSRKeycloakProvider.d.ts +20 -20
  36. package/lib-commonjs/SSRKeycloakProvider.js +114 -103
  37. package/lib-commonjs/SSRKeycloakProvider.js.map +1 -1
  38. package/lib-commonjs/index.d.ts +7 -7
  39. package/lib-commonjs/index.js +28 -28
  40. package/lib-commonjs/internals/KeycloakProvider.d.ts +140 -146
  41. package/lib-commonjs/internals/KeycloakProvider.js +6 -6
  42. package/lib-commonjs/internals/KeycloakProvider.js.map +1 -1
  43. package/lib-commonjs/internals/context.d.ts +3 -4
  44. package/lib-commonjs/internals/context.js +10 -10
  45. package/lib-commonjs/internals/context.js.map +1 -1
  46. package/lib-commonjs/internals/keycloak.d.ts +5 -5
  47. package/lib-commonjs/internals/keycloak.js +35 -39
  48. package/lib-commonjs/internals/keycloak.js.map +1 -1
  49. package/lib-commonjs/internals/utils.d.ts +1 -1
  50. package/lib-commonjs/internals/utils.js +5 -5
  51. package/lib-commonjs/persistors/client.d.ts +11 -11
  52. package/lib-commonjs/persistors/client.js +28 -28
  53. package/lib-commonjs/persistors/server.d.ts +3 -3
  54. package/lib-commonjs/persistors/server.js +38 -38
  55. package/lib-commonjs/persistors/types.d.ts +22 -22
  56. package/lib-commonjs/persistors/types.js +2 -2
  57. package/lib-commonjs/persistors/utils.d.ts +5 -5
  58. package/lib-commonjs/persistors/utils.js +29 -30
  59. package/lib-commonjs/persistors/utils.js.map +1 -1
  60. package/lib-commonjs/types.d.ts +6 -6
  61. package/lib-commonjs/types.js +2 -2
  62. package/lib-commonjs/useKeycloak.d.ts +6 -6
  63. package/lib-commonjs/useKeycloak.js +14 -15
  64. package/lib-commonjs/useKeycloak.js.map +1 -1
  65. package/lib-commonjs/withKeycloak.d.ts +43 -43
  66. package/lib-commonjs/withKeycloak.js +27 -51
  67. package/lib-commonjs/withKeycloak.js.map +1 -1
  68. package/package.json +11 -10
@@ -1,146 +1,140 @@
1
- /// <reference types="react" />
2
- export declare const KeycloakProvider: {
3
- new (props: import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>): {
4
- state: {
5
- initialized: boolean;
6
- isAuthenticated: boolean;
7
- isLoading: boolean;
8
- };
9
- componentDidMount(): void;
10
- componentDidUpdate({ authClient: prevAuthClient, initOptions: prevInitOptions, }: import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>): void;
11
- init(): void;
12
- onError: (event: import("@react-keycloak-refork/core").AuthClientEvent) => (error?: import("@react-keycloak-refork/core").AuthClientError | undefined) => void;
13
- updateState: (event: import("@react-keycloak-refork/core").AuthClientEvent) => () => void;
14
- refreshToken: (event: import("@react-keycloak-refork/core").AuthClientEvent) => () => void;
15
- render(): import("react").JSX.Element;
16
- context: unknown;
17
- setState<K extends keyof {
18
- initialized: boolean;
19
- isAuthenticated: boolean;
20
- isLoading: boolean;
21
- }>(state: {
22
- initialized: boolean;
23
- isAuthenticated: boolean;
24
- isLoading: boolean;
25
- } | ((prevState: Readonly<{
26
- initialized: boolean;
27
- isAuthenticated: boolean;
28
- isLoading: boolean;
29
- }>, props: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>) => {
30
- initialized: boolean;
31
- isAuthenticated: boolean;
32
- isLoading: boolean;
33
- } | Pick<{
34
- initialized: boolean;
35
- isAuthenticated: boolean;
36
- isLoading: boolean;
37
- }, K> | null) | Pick<{
38
- initialized: boolean;
39
- isAuthenticated: boolean;
40
- isLoading: boolean;
41
- }, K> | null, callback?: (() => void) | undefined): void;
42
- forceUpdate(callback?: (() => void) | undefined): void;
43
- readonly props: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>;
44
- refs: {
45
- [key: string]: import("react").ReactInstance;
46
- };
47
- shouldComponentUpdate?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextState: Readonly<{
48
- initialized: boolean;
49
- isAuthenticated: boolean;
50
- isLoading: boolean;
51
- }>, nextContext: any): boolean;
52
- componentWillUnmount?(): void;
53
- componentDidCatch?(error: Error, errorInfo: import("react").ErrorInfo): void;
54
- getSnapshotBeforeUpdate?(prevProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, prevState: Readonly<{
55
- initialized: boolean;
56
- isAuthenticated: boolean;
57
- isLoading: boolean;
58
- }>): any;
59
- componentWillMount?(): void;
60
- UNSAFE_componentWillMount?(): void;
61
- componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextContext: any): void;
62
- UNSAFE_componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextContext: any): void;
63
- componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextState: Readonly<{
64
- initialized: boolean;
65
- isAuthenticated: boolean;
66
- isLoading: boolean;
67
- }>, nextContext: any): void;
68
- UNSAFE_componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextState: Readonly<{
69
- initialized: boolean;
70
- isAuthenticated: boolean;
71
- isLoading: boolean;
72
- }>, nextContext: any): void;
73
- };
74
- new (props: import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>, context: any): {
75
- state: {
76
- initialized: boolean;
77
- isAuthenticated: boolean;
78
- isLoading: boolean;
79
- };
80
- componentDidMount(): void;
81
- componentDidUpdate({ authClient: prevAuthClient, initOptions: prevInitOptions, }: import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>): void;
82
- init(): void;
83
- onError: (event: import("@react-keycloak-refork/core").AuthClientEvent) => (error?: import("@react-keycloak-refork/core").AuthClientError | undefined) => void;
84
- updateState: (event: import("@react-keycloak-refork/core").AuthClientEvent) => () => void;
85
- refreshToken: (event: import("@react-keycloak-refork/core").AuthClientEvent) => () => void;
86
- render(): import("react").JSX.Element;
87
- context: unknown;
88
- setState<K_1 extends keyof {
89
- initialized: boolean;
90
- isAuthenticated: boolean;
91
- isLoading: boolean;
92
- }>(state: {
93
- initialized: boolean;
94
- isAuthenticated: boolean;
95
- isLoading: boolean;
96
- } | ((prevState: Readonly<{
97
- initialized: boolean;
98
- isAuthenticated: boolean;
99
- isLoading: boolean;
100
- }>, props: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>) => {
101
- initialized: boolean;
102
- isAuthenticated: boolean;
103
- isLoading: boolean;
104
- } | Pick<{
105
- initialized: boolean;
106
- isAuthenticated: boolean;
107
- isLoading: boolean;
108
- }, K_1> | null) | Pick<{
109
- initialized: boolean;
110
- isAuthenticated: boolean;
111
- isLoading: boolean;
112
- }, K_1> | null, callback?: (() => void) | undefined): void;
113
- forceUpdate(callback?: (() => void) | undefined): void;
114
- readonly props: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>;
115
- refs: {
116
- [key: string]: import("react").ReactInstance;
117
- };
118
- shouldComponentUpdate?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextState: Readonly<{
119
- initialized: boolean;
120
- isAuthenticated: boolean;
121
- isLoading: boolean;
122
- }>, nextContext: any): boolean;
123
- componentWillUnmount?(): void;
124
- componentDidCatch?(error: Error, errorInfo: import("react").ErrorInfo): void;
125
- getSnapshotBeforeUpdate?(prevProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, prevState: Readonly<{
126
- initialized: boolean;
127
- isAuthenticated: boolean;
128
- isLoading: boolean;
129
- }>): any;
130
- componentWillMount?(): void;
131
- UNSAFE_componentWillMount?(): void;
132
- componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextContext: any): void;
133
- UNSAFE_componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextContext: any): void;
134
- componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextState: Readonly<{
135
- initialized: boolean;
136
- isAuthenticated: boolean;
137
- isLoading: boolean;
138
- }>, nextContext: any): void;
139
- UNSAFE_componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-refork/core").AuthProviderProps<import("@react-keycloak-refork/core").AuthClient>>, nextState: Readonly<{
140
- initialized: boolean;
141
- isAuthenticated: boolean;
142
- isLoading: boolean;
143
- }>, nextContext: any): void;
144
- };
145
- contextType?: import("react").Context<any> | undefined;
146
- };
1
+ export declare const KeycloakProvider: {
2
+ new (props: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>): {
3
+ state: {
4
+ initialized: boolean;
5
+ isAuthenticated: boolean;
6
+ isLoading: boolean;
7
+ };
8
+ componentDidMount(): void;
9
+ componentDidUpdate({ authClient: prevAuthClient, initOptions: prevInitOptions, }: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>): void;
10
+ init(): void;
11
+ onError: (event: import("@react-keycloak-fork/core").AuthClientEvent) => (error?: import("@react-keycloak-fork/core").AuthClientError) => void;
12
+ updateState: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
13
+ refreshToken: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
14
+ render(): React.JSX.Element;
15
+ context: unknown;
16
+ setState<K extends keyof {
17
+ initialized: boolean;
18
+ isAuthenticated: boolean;
19
+ isLoading: boolean;
20
+ }>(state: {
21
+ initialized: boolean;
22
+ isAuthenticated: boolean;
23
+ isLoading: boolean;
24
+ } | ((prevState: Readonly<{
25
+ initialized: boolean;
26
+ isAuthenticated: boolean;
27
+ isLoading: boolean;
28
+ }>, props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>) => {
29
+ initialized: boolean;
30
+ isAuthenticated: boolean;
31
+ isLoading: boolean;
32
+ } | Pick<{
33
+ initialized: boolean;
34
+ isAuthenticated: boolean;
35
+ isLoading: boolean;
36
+ }, K> | null) | Pick<{
37
+ initialized: boolean;
38
+ isAuthenticated: boolean;
39
+ isLoading: boolean;
40
+ }, K> | null, callback?: (() => void) | undefined): void;
41
+ forceUpdate(callback?: (() => void) | undefined): void;
42
+ readonly props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>;
43
+ shouldComponentUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
44
+ initialized: boolean;
45
+ isAuthenticated: boolean;
46
+ isLoading: boolean;
47
+ }>, nextContext: any): boolean;
48
+ componentWillUnmount?(): void;
49
+ componentDidCatch?(error: Error, errorInfo: React.ErrorInfo): void;
50
+ getSnapshotBeforeUpdate?(prevProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, prevState: Readonly<{
51
+ initialized: boolean;
52
+ isAuthenticated: boolean;
53
+ isLoading: boolean;
54
+ }>): any;
55
+ componentWillMount?(): void;
56
+ UNSAFE_componentWillMount?(): void;
57
+ componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
58
+ UNSAFE_componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
59
+ componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
60
+ initialized: boolean;
61
+ isAuthenticated: boolean;
62
+ isLoading: boolean;
63
+ }>, nextContext: any): void;
64
+ UNSAFE_componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
65
+ initialized: boolean;
66
+ isAuthenticated: boolean;
67
+ isLoading: boolean;
68
+ }>, nextContext: any): void;
69
+ };
70
+ new (props: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>, context: any): {
71
+ state: {
72
+ initialized: boolean;
73
+ isAuthenticated: boolean;
74
+ isLoading: boolean;
75
+ };
76
+ componentDidMount(): void;
77
+ componentDidUpdate({ authClient: prevAuthClient, initOptions: prevInitOptions, }: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>): void;
78
+ init(): void;
79
+ onError: (event: import("@react-keycloak-fork/core").AuthClientEvent) => (error?: import("@react-keycloak-fork/core").AuthClientError) => void;
80
+ updateState: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
81
+ refreshToken: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
82
+ render(): React.JSX.Element;
83
+ context: unknown;
84
+ setState<K extends keyof {
85
+ initialized: boolean;
86
+ isAuthenticated: boolean;
87
+ isLoading: boolean;
88
+ }>(state: {
89
+ initialized: boolean;
90
+ isAuthenticated: boolean;
91
+ isLoading: boolean;
92
+ } | ((prevState: Readonly<{
93
+ initialized: boolean;
94
+ isAuthenticated: boolean;
95
+ isLoading: boolean;
96
+ }>, props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>) => {
97
+ initialized: boolean;
98
+ isAuthenticated: boolean;
99
+ isLoading: boolean;
100
+ } | Pick<{
101
+ initialized: boolean;
102
+ isAuthenticated: boolean;
103
+ isLoading: boolean;
104
+ }, K> | null) | Pick<{
105
+ initialized: boolean;
106
+ isAuthenticated: boolean;
107
+ isLoading: boolean;
108
+ }, K> | null, callback?: (() => void) | undefined): void;
109
+ forceUpdate(callback?: (() => void) | undefined): void;
110
+ readonly props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>;
111
+ shouldComponentUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
112
+ initialized: boolean;
113
+ isAuthenticated: boolean;
114
+ isLoading: boolean;
115
+ }>, nextContext: any): boolean;
116
+ componentWillUnmount?(): void;
117
+ componentDidCatch?(error: Error, errorInfo: React.ErrorInfo): void;
118
+ getSnapshotBeforeUpdate?(prevProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, prevState: Readonly<{
119
+ initialized: boolean;
120
+ isAuthenticated: boolean;
121
+ isLoading: boolean;
122
+ }>): any;
123
+ componentWillMount?(): void;
124
+ UNSAFE_componentWillMount?(): void;
125
+ componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
126
+ UNSAFE_componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
127
+ componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
128
+ initialized: boolean;
129
+ isAuthenticated: boolean;
130
+ isLoading: boolean;
131
+ }>, nextContext: any): void;
132
+ UNSAFE_componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
133
+ initialized: boolean;
134
+ isAuthenticated: boolean;
135
+ isLoading: boolean;
136
+ }>, nextContext: any): void;
137
+ };
138
+ contextType?: React.Context<any> | undefined;
139
+ propTypes?: any;
140
+ };
@@ -1,4 +1,4 @@
1
- import { createAuthProvider } from '@react-keycloak-refork/core';
2
- import { reactKeycloakSsrContext } from './context';
3
- export var KeycloakProvider = createAuthProvider(reactKeycloakSsrContext);
1
+ import { createAuthProvider } from '@react-keycloak-fork/core';
2
+ import { reactKeycloakSsrContext } from './context';
3
+ export var KeycloakProvider = createAuthProvider(reactKeycloakSsrContext);
4
4
  //# sourceMappingURL=KeycloakProvider.js.map
@@ -6,5 +6,5 @@
6
6
  "@react-keycloak-refork\\ssr\\internals\\KeycloakProvider.ts"
7
7
  ],
8
8
  "names": [],
9
- "mappings": "AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAA;AAEhE,OAAO,EAAE,uBAAuB,EAAE,MAAM,WAAW,CAAA;AAEnD,MAAM,CAAC,IAAM,gBAAgB,GAAG,kBAAkB,CAAC,uBAAuB,CAAC,CAAA"
9
+ "mappings": "AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAA;AAE9D,OAAO,EAAE,uBAAuB,EAAE,MAAM,WAAW,CAAA;AAEnD,MAAM,CAAC,IAAM,gBAAgB,GAAG,kBAAkB,CAAC,uBAAuB,CAAC,CAAA"
10
10
  }
@@ -1,4 +1,3 @@
1
- /// <reference types="react" />
2
- import type { AuthClient } from '@react-keycloak-refork/core';
3
- export declare const reactKeycloakSsrContext: import("react").Context<import("@react-keycloak-refork/core").IAuthContextProps<AuthClient>>;
4
- export declare const ReactKeycloakSSRContextConsumer: import("react").Consumer<import("@react-keycloak-refork/core").IAuthContextProps<AuthClient>>;
1
+ import type { AuthClient } from '@react-keycloak-fork/core';
2
+ export declare const reactKeycloakSsrContext: import("react").Context<import("@react-keycloak-fork/core").IAuthContextProps<AuthClient>>;
3
+ export declare const ReactKeycloakSSRContextConsumer: import("react").Consumer<import("@react-keycloak-fork/core").IAuthContextProps<AuthClient>>;
@@ -1,8 +1,8 @@
1
- import { createAuthContext } from '@react-keycloak-refork/core';
2
- import { isServer } from './utils';
3
- // Context to hold Keycloak and his state
4
- export var reactKeycloakSsrContext = createAuthContext({
5
- initialized: isServer(),
6
- });
7
- export var ReactKeycloakSSRContextConsumer = reactKeycloakSsrContext.Consumer;
1
+ import { createAuthContext } from '@react-keycloak-fork/core';
2
+ import { isServer } from './utils';
3
+ // Context to hold Keycloak and his state
4
+ export var reactKeycloakSsrContext = createAuthContext({
5
+ initialized: isServer(),
6
+ });
7
+ export var ReactKeycloakSSRContextConsumer = reactKeycloakSsrContext.Consumer;
8
8
  //# sourceMappingURL=context.js.map
@@ -6,5 +6,5 @@
6
6
  "@react-keycloak-refork\\ssr\\internals\\context.ts"
7
7
  ],
8
8
  "names": [],
9
- "mappings": "AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAA;AAG/D,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,yCAAyC;AACzC,MAAM,CAAC,IAAM,uBAAuB,GAAG,iBAAiB,CAAa;IACnE,WAAW,EAAE,QAAQ,EAAE;CACxB,CAAC,CAAA;AAEF,MAAM,CAAC,IAAM,+BAA+B,GAAG,uBAAuB,CAAC,QAAQ,CAAA"
9
+ "mappings": "AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,2BAA2B,CAAA;AAG7D,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,yCAAyC;AACzC,MAAM,CAAC,IAAM,uBAAuB,GAAG,iBAAiB,CAAa;IACnE,WAAW,EAAE,QAAQ,EAAE;CACxB,CAAC,CAAA;AAEF,MAAM,CAAC,IAAM,+BAA+B,GAAG,uBAAuB,CAAC,QAAQ,CAAA"
10
10
  }
@@ -1,5 +1,5 @@
1
- import type { AuthClient } from '@react-keycloak-refork/core';
2
- import type { KeycloakConfig } from 'keycloak-js';
3
- import type { TokenPersistor } from '../persistors/types';
4
- export declare const getKeycloakStub: (persistor: TokenPersistor) => AuthClient;
5
- export declare const getKeycloakInstance: (keycloakConfig: KeycloakConfig, persistor?: TokenPersistor, recreate?: boolean) => AuthClient;
1
+ import type { AuthClient } from '@react-keycloak-fork/core';
2
+ import type { KeycloakConfig } from 'keycloak-js';
3
+ import type { TokenPersistor } from '../persistors/types';
4
+ export declare const getKeycloakStub: (persistor: TokenPersistor) => AuthClient;
5
+ export declare const getKeycloakInstance: (keycloakConfig: KeycloakConfig, persistor?: TokenPersistor, recreate?: boolean) => AuthClient;
@@ -1,35 +1,31 @@
1
- import { isServer } from './utils';
2
- // Keycloak singleton
3
- var keycloakInstance;
4
- // KeycloakStub singleton
5
- var keycloakStubInstance;
6
- // this is a fake Keycloak instance we use to initialize Keycloak on the server.
7
- // This gets over-written as soon as Keycloak is initialized on the client.
8
- export var getKeycloakStub = function (persistor) {
9
- var kcTokens = persistor.getTokens();
10
- keycloakStubInstance = {
11
- init: function () { return Promise.resolve(true); },
12
- updateToken: function () { return Promise.resolve(false); },
13
- idToken: kcTokens.idToken,
14
- token: kcTokens.token,
15
- refreshToken: kcTokens.refreshToken,
16
- authenticated: !!kcTokens.idToken && !!kcTokens.token,
17
- };
18
- return keycloakStubInstance;
19
- };
20
- var Keycloak = !isServer() ? require('keycloak-js').default : null;
21
- export var getKeycloakInstance = function (keycloakConfig, persistor, recreate) {
22
- if (recreate === void 0) { recreate = false; }
23
- var isServerCheck = isServer();
24
- if (recreate || (!keycloakInstance && !isServerCheck)) {
25
- // If we are on the client, we want to create a Keycloak instance
26
- // If we are on the server, we don't want to create a Keycloak instance
27
- // but rather return a stub instance
28
- // that will be used to initialize Keycloak on the client.
29
- //FIXED: using new Keycloak() directly instead of Keycloak.default()
30
- // to avoid issues with the Keycloak library not being a default export.
31
- keycloakInstance = new Keycloak(keycloakConfig);
32
- }
33
- return !isServerCheck ? keycloakInstance : getKeycloakStub(persistor);
34
- };
1
+ var _a;
2
+ import { isServer } from './utils';
3
+ // Keycloak singleton
4
+ var keycloakInstance;
5
+ // KeycloakStub singleton
6
+ var keycloakStubInstance;
7
+ // this is a fake Keycloak instance we use to initialize Keycloak on the server.
8
+ // This gets over-written as soon as Keycloak is initialized on the client.
9
+ export var getKeycloakStub = function (persistor) {
10
+ var kcTokens = persistor.getTokens();
11
+ keycloakStubInstance = {
12
+ init: function () { return Promise.resolve(true); },
13
+ updateToken: function () { return Promise.resolve(false); },
14
+ idToken: kcTokens.idToken,
15
+ token: kcTokens.token,
16
+ refreshToken: kcTokens.refreshToken,
17
+ authenticated: !!kcTokens.idToken && !!kcTokens.token,
18
+ };
19
+ return keycloakStubInstance;
20
+ };
21
+ var KeycloakModule = !isServer() ? require('keycloak-js') : null;
22
+ var Keycloak = (_a = KeycloakModule === null || KeycloakModule === void 0 ? void 0 : KeycloakModule.default) !== null && _a !== void 0 ? _a : KeycloakModule;
23
+ export var getKeycloakInstance = function (keycloakConfig, persistor, recreate) {
24
+ if (recreate === void 0) { recreate = false; }
25
+ var isServerCheck = isServer();
26
+ if (recreate || (!keycloakInstance && !isServerCheck)) {
27
+ keycloakInstance = new Keycloak(keycloakConfig);
28
+ }
29
+ return !isServerCheck ? keycloakInstance : getKeycloakStub(persistor);
30
+ };
35
31
  //# sourceMappingURL=keycloak.js.map
@@ -6,5 +6,5 @@
6
6
  "@react-keycloak-refork\\ssr\\internals\\keycloak.ts"
7
7
  ],
8
8
  "names": [],
9
- "mappings": "AAMA,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,qBAAqB;AACrB,IAAI,gBAA4B,CAAA;AAEhC,yBAAyB;AACzB,IAAI,oBAAmC,CAAA;AAEvC,gFAAgF;AAChF,2EAA2E;AAC3E,MAAM,CAAC,IAAM,eAAe,GAAG,UAAC,SAAyB;IACvD,IAAM,QAAQ,GAAG,SAAS,CAAC,SAAS,EAAE,CAAA;IAEtC,oBAAoB,GAAG;QACrB,IAAI,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,EAArB,CAAqB;QACjC,WAAW,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,EAAtB,CAAsB;QACzC,OAAO,EAAE,QAAQ,CAAC,OAAO;QACzB,KAAK,EAAE,QAAQ,CAAC,KAAK;QACrB,YAAY,EAAE,QAAQ,CAAC,YAAY;QACnC,aAAa,EAAE,CAAC,CAAC,QAAQ,CAAC,OAAO,IAAI,CAAC,CAAC,QAAQ,CAAC,KAAK;KAC1B,CAAA;IAE7B,OAAO,oBAAoB,CAAA;AAC7B,CAAC,CAAA;AAED,IAAM,QAAQ,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,CAAA;AAEpE,MAAM,CAAC,IAAM,mBAAmB,GAAG,UACjC,cAA8B,EAC9B,SAA0B,EAC1B,QAAgB;IAAhB,yBAAA,EAAA,gBAAgB;IAEhB,IAAM,aAAa,GAAG,QAAQ,EAAE,CAAA;IAEhC,IAAI,QAAQ,IAAI,CAAC,CAAC,gBAAgB,IAAI,CAAC,aAAa,CAAC,EAAE;QACrD,iEAAiE;QACjE,wEAAwE;QACxE,oCAAoC;QACpC,0DAA0D;QAC1D,oEAAoE;QACpE,wEAAwE;QACxE,gBAAgB,GAAG,IAAI,QAAQ,CAAC,cAAc,CAAC,CAAA;KAChD;IAED,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,eAAe,CAAC,SAAU,CAAC,CAAA;AACxE,CAAC,CAAA"
9
+ "mappings": ";AAMA,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,qBAAqB;AACrB,IAAI,gBAA4B,CAAA;AAEhC,yBAAyB;AACzB,IAAI,oBAAmC,CAAA;AAEvC,gFAAgF;AAChF,2EAA2E;AAC3E,MAAM,CAAC,IAAM,eAAe,GAAG,UAAC,SAAyB;IACvD,IAAM,QAAQ,GAAG,SAAS,CAAC,SAAS,EAAE,CAAA;IAEtC,oBAAoB,GAAG;QACrB,IAAI,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,EAArB,CAAqB;QACjC,WAAW,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,EAAtB,CAAsB;QACzC,OAAO,EAAE,QAAQ,CAAC,OAAO;QACzB,KAAK,EAAE,QAAQ,CAAC,KAAK;QACrB,YAAY,EAAE,QAAQ,CAAC,YAAY;QACnC,aAAa,EAAE,CAAC,CAAC,QAAQ,CAAC,OAAO,IAAI,CAAC,CAAC,QAAQ,CAAC,KAAK;KAC1B,CAAA;IAE7B,OAAO,oBAAoB,CAAA;AAC7B,CAAC,CAAA;AAED,IAAM,cAAc,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,IAAI,CAAA;AAClE,IAAM,QAAQ,GAAG,MAAA,cAAc,aAAd,cAAc,uBAAd,cAAc,CAAE,OAAO,mCAAI,cAAc,CAAA;AAE1D,MAAM,CAAC,IAAM,mBAAmB,GAAG,UACjC,cAA8B,EAC9B,SAA0B,EAC1B,QAAgB;IAAhB,yBAAA,EAAA,gBAAgB;IAEhB,IAAM,aAAa,GAAG,QAAQ,EAAE,CAAA;IAEhC,IAAI,QAAQ,IAAI,CAAC,CAAC,gBAAgB,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC;QACtD,gBAAgB,GAAG,IAAI,QAAQ,CAAC,cAAc,CAAC,CAAA;IACjD,CAAC;IAED,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,eAAe,CAAC,SAAU,CAAC,CAAA;AACxE,CAAC,CAAA"
10
10
  }
@@ -1 +1 @@
1
- export declare const isServer: () => boolean;
1
+ export declare const isServer: () => boolean;
@@ -1,2 +1,2 @@
1
- export var isServer = function () { return typeof window === 'undefined'; };
1
+ export var isServer = function () { return typeof window === 'undefined'; };
2
2
  //# sourceMappingURL=utils.js.map
@@ -1,11 +1,11 @@
1
- import type { AuthClientTokens } from '@react-keycloak-refork/core';
2
- import type { TokenPersistor } from './types';
3
- export declare class Cookies implements TokenPersistor {
4
- setTokens({ idToken, token }: AuthClientTokens): void;
5
- getTokens(): {
6
- idToken: string | undefined;
7
- refreshToken: string;
8
- token: string | undefined;
9
- };
10
- resetTokens(): void;
11
- }
1
+ import type { AuthClientTokens } from '@react-keycloak-fork/core';
2
+ import type { TokenPersistor } from './types';
3
+ export declare class Cookies implements TokenPersistor {
4
+ setTokens({ idToken, token }: AuthClientTokens): void;
5
+ getTokens(): {
6
+ idToken: string | undefined;
7
+ refreshToken: string;
8
+ token: string | undefined;
9
+ };
10
+ resetTokens(): void;
11
+ }
@@ -1,26 +1,26 @@
1
- import { getCookie, removeCookie, setCookie } from './utils';
2
- var Cookies = /** @class */ (function () {
3
- function Cookies() {
4
- }
5
- Cookies.prototype.setTokens = function (_a) {
6
- var idToken = _a.idToken, token = _a.token;
7
- !!token && setCookie('kcToken', btoa(token));
8
- !!idToken && setCookie('kcIdToken', btoa(idToken));
9
- };
10
- Cookies.prototype.getTokens = function () {
11
- var tknStr = getCookie('kcToken');
12
- var idTknStr = getCookie('kcIdToken');
13
- return {
14
- idToken: idTknStr ? atob(idTknStr) : undefined,
15
- refreshToken: '',
16
- token: tknStr ? atob(tknStr) : undefined,
17
- };
18
- };
19
- Cookies.prototype.resetTokens = function () {
20
- removeCookie('kcToken');
21
- removeCookie('kcIdToken');
22
- };
23
- return Cookies;
24
- }());
25
- export { Cookies };
1
+ import { getCookie, removeCookie, setCookie } from './utils';
2
+ var Cookies = /** @class */ (function () {
3
+ function Cookies() {
4
+ }
5
+ Cookies.prototype.setTokens = function (_a) {
6
+ var idToken = _a.idToken, token = _a.token;
7
+ !!token && setCookie('kcToken', btoa(token));
8
+ !!idToken && setCookie('kcIdToken', btoa(idToken));
9
+ };
10
+ Cookies.prototype.getTokens = function () {
11
+ var tknStr = getCookie('kcToken');
12
+ var idTknStr = getCookie('kcIdToken');
13
+ return {
14
+ idToken: idTknStr ? atob(idTknStr) : undefined,
15
+ refreshToken: '',
16
+ token: tknStr ? atob(tknStr) : undefined,
17
+ };
18
+ };
19
+ Cookies.prototype.resetTokens = function () {
20
+ removeCookie('kcToken');
21
+ removeCookie('kcIdToken');
22
+ };
23
+ return Cookies;
24
+ }());
25
+ export { Cookies };
26
26
  //# sourceMappingURL=client.js.map
@@ -1,3 +1,3 @@
1
- import type { TokenPersistor } from './types';
2
- export declare const ExpressCookies: (req: any) => TokenPersistor;
3
- export declare const SSRCookies: (cookies: any) => TokenPersistor;
1
+ import type { TokenPersistor } from './types';
2
+ export declare const ExpressCookies: (req: any) => TokenPersistor;
3
+ export declare const SSRCookies: (cookies: any) => TokenPersistor;
@@ -1,34 +1,34 @@
1
- import { Base64 } from 'js-base64';
2
- import { decode, encode, getCookie, removeCookie, setCookie } from './utils';
3
- export var ExpressCookies = function (req) { return ({
4
- setTokens: function () { },
5
- getTokens: function () {
6
- var _a = req.cookies || {}, kcIdToken = _a.kcIdToken, kcToken = _a.kcToken;
7
- return {
8
- idToken: kcIdToken ? Base64.decode(kcIdToken) : undefined,
9
- token: kcToken ? Base64.decode(kcToken) : undefined,
10
- };
11
- },
12
- resetTokens: function () { },
13
- }); };
14
- export var SSRCookies = function (cookies) { return ({
15
- setTokens: function (_a) {
16
- var idToken = _a.idToken, token = _a.token;
17
- !!token && setCookie('kcToken', encode(token));
18
- !!idToken && setCookie('kcIdToken', encode(idToken));
19
- },
20
- getTokens: function () {
21
- var tknStr = getCookie('kcToken', cookies);
22
- var idTknStr = getCookie('kcIdToken', cookies);
23
- return {
24
- idToken: idTknStr ? decode(idTknStr) : '',
25
- refreshToken: '',
26
- token: tknStr ? decode(tknStr) : '',
27
- };
28
- },
29
- resetTokens: function () {
30
- removeCookie('kcToken');
31
- removeCookie('kcIdToken');
32
- },
33
- }); };
1
+ import { Base64 } from 'js-base64';
2
+ import { decode, encode, getCookie, removeCookie, setCookie } from './utils';
3
+ export var ExpressCookies = function (req) { return ({
4
+ setTokens: function () { },
5
+ getTokens: function () {
6
+ var _a = req.cookies || {}, kcIdToken = _a.kcIdToken, kcToken = _a.kcToken;
7
+ return {
8
+ idToken: kcIdToken ? Base64.decode(kcIdToken) : undefined,
9
+ token: kcToken ? Base64.decode(kcToken) : undefined,
10
+ };
11
+ },
12
+ resetTokens: function () { },
13
+ }); };
14
+ export var SSRCookies = function (cookies) { return ({
15
+ setTokens: function (_a) {
16
+ var idToken = _a.idToken, token = _a.token;
17
+ !!token && setCookie('kcToken', encode(token));
18
+ !!idToken && setCookie('kcIdToken', encode(idToken));
19
+ },
20
+ getTokens: function () {
21
+ var tknStr = getCookie('kcToken', cookies);
22
+ var idTknStr = getCookie('kcIdToken', cookies);
23
+ return {
24
+ idToken: idTknStr ? decode(idTknStr) : '',
25
+ refreshToken: '',
26
+ token: tknStr ? decode(tknStr) : '',
27
+ };
28
+ },
29
+ resetTokens: function () {
30
+ removeCookie('kcToken');
31
+ removeCookie('kcIdToken');
32
+ },
33
+ }); };
34
34
  //# sourceMappingURL=server.js.map