@react-keycloak-refork/ssr 6.0.4 → 8.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.md +24 -24
- package/README.md +11 -11
- package/lib/SSRKeycloakProvider.d.ts +20 -20
- package/lib/SSRKeycloakProvider.js +78 -77
- package/lib/SSRKeycloakProvider.js.map +1 -1
- package/lib/index.d.ts +7 -7
- package/lib/index.js +7 -7
- package/lib/internals/KeycloakProvider.d.ts +140 -146
- package/lib/internals/KeycloakProvider.js +3 -3
- package/lib/internals/KeycloakProvider.js.map +1 -1
- package/lib/internals/context.d.ts +3 -4
- package/lib/internals/context.js +7 -7
- package/lib/internals/context.js.map +1 -1
- package/lib/internals/keycloak.d.ts +5 -5
- package/lib/internals/keycloak.js +30 -34
- package/lib/internals/keycloak.js.map +1 -1
- package/lib/internals/utils.d.ts +1 -1
- package/lib/internals/utils.js +1 -1
- package/lib/persistors/client.d.ts +11 -11
- package/lib/persistors/client.js +25 -25
- package/lib/persistors/server.d.ts +3 -3
- package/lib/persistors/server.js +33 -33
- package/lib/persistors/types.d.ts +22 -22
- package/lib/persistors/types.js +1 -1
- package/lib/persistors/utils.d.ts +5 -5
- package/lib/persistors/utils.js +19 -19
- package/lib/persistors/utils.js.map +1 -1
- package/lib/types.d.ts +6 -6
- package/lib/types.js +1 -1
- package/lib/useKeycloak.d.ts +6 -6
- package/lib/useKeycloak.js +11 -11
- package/lib/withKeycloak.d.ts +43 -43
- package/lib/withKeycloak.js +24 -24
- package/lib/withKeycloak.js.map +1 -1
- package/lib-commonjs/SSRKeycloakProvider.d.ts +20 -20
- package/lib-commonjs/SSRKeycloakProvider.js +114 -103
- package/lib-commonjs/SSRKeycloakProvider.js.map +1 -1
- package/lib-commonjs/index.d.ts +7 -7
- package/lib-commonjs/index.js +28 -28
- package/lib-commonjs/internals/KeycloakProvider.d.ts +140 -146
- package/lib-commonjs/internals/KeycloakProvider.js +6 -6
- package/lib-commonjs/internals/KeycloakProvider.js.map +1 -1
- package/lib-commonjs/internals/context.d.ts +3 -4
- package/lib-commonjs/internals/context.js +10 -10
- package/lib-commonjs/internals/context.js.map +1 -1
- package/lib-commonjs/internals/keycloak.d.ts +5 -5
- package/lib-commonjs/internals/keycloak.js +35 -39
- package/lib-commonjs/internals/keycloak.js.map +1 -1
- package/lib-commonjs/internals/utils.d.ts +1 -1
- package/lib-commonjs/internals/utils.js +5 -5
- package/lib-commonjs/persistors/client.d.ts +11 -11
- package/lib-commonjs/persistors/client.js +28 -28
- package/lib-commonjs/persistors/server.d.ts +3 -3
- package/lib-commonjs/persistors/server.js +38 -38
- package/lib-commonjs/persistors/types.d.ts +22 -22
- package/lib-commonjs/persistors/types.js +2 -2
- package/lib-commonjs/persistors/utils.d.ts +5 -5
- package/lib-commonjs/persistors/utils.js +29 -30
- package/lib-commonjs/persistors/utils.js.map +1 -1
- package/lib-commonjs/types.d.ts +6 -6
- package/lib-commonjs/types.js +2 -2
- package/lib-commonjs/useKeycloak.d.ts +6 -6
- package/lib-commonjs/useKeycloak.js +14 -15
- package/lib-commonjs/useKeycloak.js.map +1 -1
- package/lib-commonjs/withKeycloak.d.ts +43 -43
- package/lib-commonjs/withKeycloak.js +27 -51
- package/lib-commonjs/withKeycloak.js.map +1 -1
- package/package.json +11 -10
|
@@ -1,146 +1,140 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
initialized: boolean;
|
|
90
|
-
isAuthenticated: boolean;
|
|
91
|
-
isLoading: boolean;
|
|
92
|
-
}
|
|
93
|
-
initialized: boolean;
|
|
94
|
-
isAuthenticated: boolean;
|
|
95
|
-
isLoading: boolean;
|
|
96
|
-
}
|
|
97
|
-
initialized: boolean;
|
|
98
|
-
isAuthenticated: boolean;
|
|
99
|
-
isLoading: boolean;
|
|
100
|
-
}
|
|
101
|
-
initialized: boolean;
|
|
102
|
-
isAuthenticated: boolean;
|
|
103
|
-
isLoading: boolean;
|
|
104
|
-
} | Pick<{
|
|
105
|
-
initialized: boolean;
|
|
106
|
-
isAuthenticated: boolean;
|
|
107
|
-
isLoading: boolean;
|
|
108
|
-
},
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
initialized: boolean;
|
|
120
|
-
isAuthenticated: boolean;
|
|
121
|
-
isLoading: boolean;
|
|
122
|
-
}
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
isAuthenticated: boolean;
|
|
142
|
-
isLoading: boolean;
|
|
143
|
-
}>, nextContext: any): void;
|
|
144
|
-
};
|
|
145
|
-
contextType?: import("react").Context<any> | undefined;
|
|
146
|
-
};
|
|
1
|
+
export declare const KeycloakProvider: {
|
|
2
|
+
new (props: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>): {
|
|
3
|
+
state: {
|
|
4
|
+
initialized: boolean;
|
|
5
|
+
isAuthenticated: boolean;
|
|
6
|
+
isLoading: boolean;
|
|
7
|
+
};
|
|
8
|
+
componentDidMount(): void;
|
|
9
|
+
componentDidUpdate({ authClient: prevAuthClient, initOptions: prevInitOptions, }: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>): void;
|
|
10
|
+
init(): void;
|
|
11
|
+
onError: (event: import("@react-keycloak-fork/core").AuthClientEvent) => (error?: import("@react-keycloak-fork/core").AuthClientError) => void;
|
|
12
|
+
updateState: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
|
|
13
|
+
refreshToken: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
|
|
14
|
+
render(): React.JSX.Element;
|
|
15
|
+
context: unknown;
|
|
16
|
+
setState<K extends keyof {
|
|
17
|
+
initialized: boolean;
|
|
18
|
+
isAuthenticated: boolean;
|
|
19
|
+
isLoading: boolean;
|
|
20
|
+
}>(state: {
|
|
21
|
+
initialized: boolean;
|
|
22
|
+
isAuthenticated: boolean;
|
|
23
|
+
isLoading: boolean;
|
|
24
|
+
} | ((prevState: Readonly<{
|
|
25
|
+
initialized: boolean;
|
|
26
|
+
isAuthenticated: boolean;
|
|
27
|
+
isLoading: boolean;
|
|
28
|
+
}>, props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>) => {
|
|
29
|
+
initialized: boolean;
|
|
30
|
+
isAuthenticated: boolean;
|
|
31
|
+
isLoading: boolean;
|
|
32
|
+
} | Pick<{
|
|
33
|
+
initialized: boolean;
|
|
34
|
+
isAuthenticated: boolean;
|
|
35
|
+
isLoading: boolean;
|
|
36
|
+
}, K> | null) | Pick<{
|
|
37
|
+
initialized: boolean;
|
|
38
|
+
isAuthenticated: boolean;
|
|
39
|
+
isLoading: boolean;
|
|
40
|
+
}, K> | null, callback?: (() => void) | undefined): void;
|
|
41
|
+
forceUpdate(callback?: (() => void) | undefined): void;
|
|
42
|
+
readonly props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>;
|
|
43
|
+
shouldComponentUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
|
|
44
|
+
initialized: boolean;
|
|
45
|
+
isAuthenticated: boolean;
|
|
46
|
+
isLoading: boolean;
|
|
47
|
+
}>, nextContext: any): boolean;
|
|
48
|
+
componentWillUnmount?(): void;
|
|
49
|
+
componentDidCatch?(error: Error, errorInfo: React.ErrorInfo): void;
|
|
50
|
+
getSnapshotBeforeUpdate?(prevProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, prevState: Readonly<{
|
|
51
|
+
initialized: boolean;
|
|
52
|
+
isAuthenticated: boolean;
|
|
53
|
+
isLoading: boolean;
|
|
54
|
+
}>): any;
|
|
55
|
+
componentWillMount?(): void;
|
|
56
|
+
UNSAFE_componentWillMount?(): void;
|
|
57
|
+
componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
|
|
58
|
+
UNSAFE_componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
|
|
59
|
+
componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
|
|
60
|
+
initialized: boolean;
|
|
61
|
+
isAuthenticated: boolean;
|
|
62
|
+
isLoading: boolean;
|
|
63
|
+
}>, nextContext: any): void;
|
|
64
|
+
UNSAFE_componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
|
|
65
|
+
initialized: boolean;
|
|
66
|
+
isAuthenticated: boolean;
|
|
67
|
+
isLoading: boolean;
|
|
68
|
+
}>, nextContext: any): void;
|
|
69
|
+
};
|
|
70
|
+
new (props: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>, context: any): {
|
|
71
|
+
state: {
|
|
72
|
+
initialized: boolean;
|
|
73
|
+
isAuthenticated: boolean;
|
|
74
|
+
isLoading: boolean;
|
|
75
|
+
};
|
|
76
|
+
componentDidMount(): void;
|
|
77
|
+
componentDidUpdate({ authClient: prevAuthClient, initOptions: prevInitOptions, }: import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>): void;
|
|
78
|
+
init(): void;
|
|
79
|
+
onError: (event: import("@react-keycloak-fork/core").AuthClientEvent) => (error?: import("@react-keycloak-fork/core").AuthClientError) => void;
|
|
80
|
+
updateState: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
|
|
81
|
+
refreshToken: (event: import("@react-keycloak-fork/core").AuthClientEvent) => () => void;
|
|
82
|
+
render(): React.JSX.Element;
|
|
83
|
+
context: unknown;
|
|
84
|
+
setState<K extends keyof {
|
|
85
|
+
initialized: boolean;
|
|
86
|
+
isAuthenticated: boolean;
|
|
87
|
+
isLoading: boolean;
|
|
88
|
+
}>(state: {
|
|
89
|
+
initialized: boolean;
|
|
90
|
+
isAuthenticated: boolean;
|
|
91
|
+
isLoading: boolean;
|
|
92
|
+
} | ((prevState: Readonly<{
|
|
93
|
+
initialized: boolean;
|
|
94
|
+
isAuthenticated: boolean;
|
|
95
|
+
isLoading: boolean;
|
|
96
|
+
}>, props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>) => {
|
|
97
|
+
initialized: boolean;
|
|
98
|
+
isAuthenticated: boolean;
|
|
99
|
+
isLoading: boolean;
|
|
100
|
+
} | Pick<{
|
|
101
|
+
initialized: boolean;
|
|
102
|
+
isAuthenticated: boolean;
|
|
103
|
+
isLoading: boolean;
|
|
104
|
+
}, K> | null) | Pick<{
|
|
105
|
+
initialized: boolean;
|
|
106
|
+
isAuthenticated: boolean;
|
|
107
|
+
isLoading: boolean;
|
|
108
|
+
}, K> | null, callback?: (() => void) | undefined): void;
|
|
109
|
+
forceUpdate(callback?: (() => void) | undefined): void;
|
|
110
|
+
readonly props: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>;
|
|
111
|
+
shouldComponentUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
|
|
112
|
+
initialized: boolean;
|
|
113
|
+
isAuthenticated: boolean;
|
|
114
|
+
isLoading: boolean;
|
|
115
|
+
}>, nextContext: any): boolean;
|
|
116
|
+
componentWillUnmount?(): void;
|
|
117
|
+
componentDidCatch?(error: Error, errorInfo: React.ErrorInfo): void;
|
|
118
|
+
getSnapshotBeforeUpdate?(prevProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, prevState: Readonly<{
|
|
119
|
+
initialized: boolean;
|
|
120
|
+
isAuthenticated: boolean;
|
|
121
|
+
isLoading: boolean;
|
|
122
|
+
}>): any;
|
|
123
|
+
componentWillMount?(): void;
|
|
124
|
+
UNSAFE_componentWillMount?(): void;
|
|
125
|
+
componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
|
|
126
|
+
UNSAFE_componentWillReceiveProps?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextContext: any): void;
|
|
127
|
+
componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
|
|
128
|
+
initialized: boolean;
|
|
129
|
+
isAuthenticated: boolean;
|
|
130
|
+
isLoading: boolean;
|
|
131
|
+
}>, nextContext: any): void;
|
|
132
|
+
UNSAFE_componentWillUpdate?(nextProps: Readonly<import("@react-keycloak-fork/core").AuthProviderProps<import("@react-keycloak-fork/core").AuthClient>>, nextState: Readonly<{
|
|
133
|
+
initialized: boolean;
|
|
134
|
+
isAuthenticated: boolean;
|
|
135
|
+
isLoading: boolean;
|
|
136
|
+
}>, nextContext: any): void;
|
|
137
|
+
};
|
|
138
|
+
contextType?: React.Context<any> | undefined;
|
|
139
|
+
propTypes?: any;
|
|
140
|
+
};
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { createAuthProvider } from '@react-keycloak-
|
|
2
|
-
import { reactKeycloakSsrContext } from './context';
|
|
3
|
-
export var KeycloakProvider = createAuthProvider(reactKeycloakSsrContext);
|
|
1
|
+
import { createAuthProvider } from '@react-keycloak-fork/core';
|
|
2
|
+
import { reactKeycloakSsrContext } from './context';
|
|
3
|
+
export var KeycloakProvider = createAuthProvider(reactKeycloakSsrContext);
|
|
4
4
|
//# sourceMappingURL=KeycloakProvider.js.map
|
|
@@ -6,5 +6,5 @@
|
|
|
6
6
|
"@react-keycloak-refork\\ssr\\internals\\KeycloakProvider.ts"
|
|
7
7
|
],
|
|
8
8
|
"names": [],
|
|
9
|
-
"mappings": "AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,
|
|
9
|
+
"mappings": "AAAA,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAA;AAE9D,OAAO,EAAE,uBAAuB,EAAE,MAAM,WAAW,CAAA;AAEnD,MAAM,CAAC,IAAM,gBAAgB,GAAG,kBAAkB,CAAC,uBAAuB,CAAC,CAAA"
|
|
10
10
|
}
|
|
@@ -1,4 +1,3 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
export declare const
|
|
4
|
-
export declare const ReactKeycloakSSRContextConsumer: import("react").Consumer<import("@react-keycloak-refork/core").IAuthContextProps<AuthClient>>;
|
|
1
|
+
import type { AuthClient } from '@react-keycloak-fork/core';
|
|
2
|
+
export declare const reactKeycloakSsrContext: import("react").Context<import("@react-keycloak-fork/core").IAuthContextProps<AuthClient>>;
|
|
3
|
+
export declare const ReactKeycloakSSRContextConsumer: import("react").Consumer<import("@react-keycloak-fork/core").IAuthContextProps<AuthClient>>;
|
package/lib/internals/context.js
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
import { createAuthContext } from '@react-keycloak-
|
|
2
|
-
import { isServer } from './utils';
|
|
3
|
-
// Context to hold Keycloak and his state
|
|
4
|
-
export var reactKeycloakSsrContext = createAuthContext({
|
|
5
|
-
initialized: isServer(),
|
|
6
|
-
});
|
|
7
|
-
export var ReactKeycloakSSRContextConsumer = reactKeycloakSsrContext.Consumer;
|
|
1
|
+
import { createAuthContext } from '@react-keycloak-fork/core';
|
|
2
|
+
import { isServer } from './utils';
|
|
3
|
+
// Context to hold Keycloak and his state
|
|
4
|
+
export var reactKeycloakSsrContext = createAuthContext({
|
|
5
|
+
initialized: isServer(),
|
|
6
|
+
});
|
|
7
|
+
export var ReactKeycloakSSRContextConsumer = reactKeycloakSsrContext.Consumer;
|
|
8
8
|
//# sourceMappingURL=context.js.map
|
|
@@ -6,5 +6,5 @@
|
|
|
6
6
|
"@react-keycloak-refork\\ssr\\internals\\context.ts"
|
|
7
7
|
],
|
|
8
8
|
"names": [],
|
|
9
|
-
"mappings": "AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,
|
|
9
|
+
"mappings": "AAAA,OAAO,EAAE,iBAAiB,EAAE,MAAM,2BAA2B,CAAA;AAG7D,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,yCAAyC;AACzC,MAAM,CAAC,IAAM,uBAAuB,GAAG,iBAAiB,CAAa;IACnE,WAAW,EAAE,QAAQ,EAAE;CACxB,CAAC,CAAA;AAEF,MAAM,CAAC,IAAM,+BAA+B,GAAG,uBAAuB,CAAC,QAAQ,CAAA"
|
|
10
10
|
}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
import type { AuthClient } from '@react-keycloak-
|
|
2
|
-
import type { KeycloakConfig } from 'keycloak-js';
|
|
3
|
-
import type { TokenPersistor } from '../persistors/types';
|
|
4
|
-
export declare const getKeycloakStub: (persistor: TokenPersistor) => AuthClient;
|
|
5
|
-
export declare const getKeycloakInstance: (keycloakConfig: KeycloakConfig, persistor?: TokenPersistor, recreate?: boolean) => AuthClient;
|
|
1
|
+
import type { AuthClient } from '@react-keycloak-fork/core';
|
|
2
|
+
import type { KeycloakConfig } from 'keycloak-js';
|
|
3
|
+
import type { TokenPersistor } from '../persistors/types';
|
|
4
|
+
export declare const getKeycloakStub: (persistor: TokenPersistor) => AuthClient;
|
|
5
|
+
export declare const getKeycloakInstance: (keycloakConfig: KeycloakConfig, persistor?: TokenPersistor, recreate?: boolean) => AuthClient;
|
|
@@ -1,35 +1,31 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
//
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
if (recreate
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
keycloakInstance = new Keycloak(keycloakConfig);
|
|
32
|
-
}
|
|
33
|
-
return !isServerCheck ? keycloakInstance : getKeycloakStub(persistor);
|
|
34
|
-
};
|
|
1
|
+
var _a;
|
|
2
|
+
import { isServer } from './utils';
|
|
3
|
+
// Keycloak singleton
|
|
4
|
+
var keycloakInstance;
|
|
5
|
+
// KeycloakStub singleton
|
|
6
|
+
var keycloakStubInstance;
|
|
7
|
+
// this is a fake Keycloak instance we use to initialize Keycloak on the server.
|
|
8
|
+
// This gets over-written as soon as Keycloak is initialized on the client.
|
|
9
|
+
export var getKeycloakStub = function (persistor) {
|
|
10
|
+
var kcTokens = persistor.getTokens();
|
|
11
|
+
keycloakStubInstance = {
|
|
12
|
+
init: function () { return Promise.resolve(true); },
|
|
13
|
+
updateToken: function () { return Promise.resolve(false); },
|
|
14
|
+
idToken: kcTokens.idToken,
|
|
15
|
+
token: kcTokens.token,
|
|
16
|
+
refreshToken: kcTokens.refreshToken,
|
|
17
|
+
authenticated: !!kcTokens.idToken && !!kcTokens.token,
|
|
18
|
+
};
|
|
19
|
+
return keycloakStubInstance;
|
|
20
|
+
};
|
|
21
|
+
var KeycloakModule = !isServer() ? require('keycloak-js') : null;
|
|
22
|
+
var Keycloak = (_a = KeycloakModule === null || KeycloakModule === void 0 ? void 0 : KeycloakModule.default) !== null && _a !== void 0 ? _a : KeycloakModule;
|
|
23
|
+
export var getKeycloakInstance = function (keycloakConfig, persistor, recreate) {
|
|
24
|
+
if (recreate === void 0) { recreate = false; }
|
|
25
|
+
var isServerCheck = isServer();
|
|
26
|
+
if (recreate || (!keycloakInstance && !isServerCheck)) {
|
|
27
|
+
keycloakInstance = new Keycloak(keycloakConfig);
|
|
28
|
+
}
|
|
29
|
+
return !isServerCheck ? keycloakInstance : getKeycloakStub(persistor);
|
|
30
|
+
};
|
|
35
31
|
//# sourceMappingURL=keycloak.js.map
|
|
@@ -6,5 +6,5 @@
|
|
|
6
6
|
"@react-keycloak-refork\\ssr\\internals\\keycloak.ts"
|
|
7
7
|
],
|
|
8
8
|
"names": [],
|
|
9
|
-
"mappings": "AAMA,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,qBAAqB;AACrB,IAAI,gBAA4B,CAAA;AAEhC,yBAAyB;AACzB,IAAI,oBAAmC,CAAA;AAEvC,gFAAgF;AAChF,2EAA2E;AAC3E,MAAM,CAAC,IAAM,eAAe,GAAG,UAAC,SAAyB;IACvD,IAAM,QAAQ,GAAG,SAAS,CAAC,SAAS,EAAE,CAAA;IAEtC,oBAAoB,GAAG;QACrB,IAAI,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,EAArB,CAAqB;QACjC,WAAW,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,EAAtB,CAAsB;QACzC,OAAO,EAAE,QAAQ,CAAC,OAAO;QACzB,KAAK,EAAE,QAAQ,CAAC,KAAK;QACrB,YAAY,EAAE,QAAQ,CAAC,YAAY;QACnC,aAAa,EAAE,CAAC,CAAC,QAAQ,CAAC,OAAO,IAAI,CAAC,CAAC,QAAQ,CAAC,KAAK;KAC1B,CAAA;IAE7B,OAAO,oBAAoB,CAAA;AAC7B,CAAC,CAAA;AAED,IAAM,
|
|
9
|
+
"mappings": ";AAMA,OAAO,EAAE,QAAQ,EAAE,MAAM,SAAS,CAAA;AAElC,qBAAqB;AACrB,IAAI,gBAA4B,CAAA;AAEhC,yBAAyB;AACzB,IAAI,oBAAmC,CAAA;AAEvC,gFAAgF;AAChF,2EAA2E;AAC3E,MAAM,CAAC,IAAM,eAAe,GAAG,UAAC,SAAyB;IACvD,IAAM,QAAQ,GAAG,SAAS,CAAC,SAAS,EAAE,CAAA;IAEtC,oBAAoB,GAAG;QACrB,IAAI,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,EAArB,CAAqB;QACjC,WAAW,EAAE,cAAM,OAAA,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,EAAtB,CAAsB;QACzC,OAAO,EAAE,QAAQ,CAAC,OAAO;QACzB,KAAK,EAAE,QAAQ,CAAC,KAAK;QACrB,YAAY,EAAE,QAAQ,CAAC,YAAY;QACnC,aAAa,EAAE,CAAC,CAAC,QAAQ,CAAC,OAAO,IAAI,CAAC,CAAC,QAAQ,CAAC,KAAK;KAC1B,CAAA;IAE7B,OAAO,oBAAoB,CAAA;AAC7B,CAAC,CAAA;AAED,IAAM,cAAc,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,IAAI,CAAA;AAClE,IAAM,QAAQ,GAAG,MAAA,cAAc,aAAd,cAAc,uBAAd,cAAc,CAAE,OAAO,mCAAI,cAAc,CAAA;AAE1D,MAAM,CAAC,IAAM,mBAAmB,GAAG,UACjC,cAA8B,EAC9B,SAA0B,EAC1B,QAAgB;IAAhB,yBAAA,EAAA,gBAAgB;IAEhB,IAAM,aAAa,GAAG,QAAQ,EAAE,CAAA;IAEhC,IAAI,QAAQ,IAAI,CAAC,CAAC,gBAAgB,IAAI,CAAC,aAAa,CAAC,EAAE,CAAC;QACtD,gBAAgB,GAAG,IAAI,QAAQ,CAAC,cAAc,CAAC,CAAA;IACjD,CAAC;IAED,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,gBAAgB,CAAC,CAAC,CAAC,eAAe,CAAC,SAAU,CAAC,CAAA;AACxE,CAAC,CAAA"
|
|
10
10
|
}
|
package/lib/internals/utils.d.ts
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
export declare const isServer: () => boolean;
|
|
1
|
+
export declare const isServer: () => boolean;
|
package/lib/internals/utils.js
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
export var isServer = function () { return typeof window === 'undefined'; };
|
|
1
|
+
export var isServer = function () { return typeof window === 'undefined'; };
|
|
2
2
|
//# sourceMappingURL=utils.js.map
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
import type { AuthClientTokens } from '@react-keycloak-
|
|
2
|
-
import type { TokenPersistor } from './types';
|
|
3
|
-
export declare class Cookies implements TokenPersistor {
|
|
4
|
-
setTokens({ idToken, token }: AuthClientTokens): void;
|
|
5
|
-
getTokens(): {
|
|
6
|
-
idToken: string | undefined;
|
|
7
|
-
refreshToken: string;
|
|
8
|
-
token: string | undefined;
|
|
9
|
-
};
|
|
10
|
-
resetTokens(): void;
|
|
11
|
-
}
|
|
1
|
+
import type { AuthClientTokens } from '@react-keycloak-fork/core';
|
|
2
|
+
import type { TokenPersistor } from './types';
|
|
3
|
+
export declare class Cookies implements TokenPersistor {
|
|
4
|
+
setTokens({ idToken, token }: AuthClientTokens): void;
|
|
5
|
+
getTokens(): {
|
|
6
|
+
idToken: string | undefined;
|
|
7
|
+
refreshToken: string;
|
|
8
|
+
token: string | undefined;
|
|
9
|
+
};
|
|
10
|
+
resetTokens(): void;
|
|
11
|
+
}
|
package/lib/persistors/client.js
CHANGED
|
@@ -1,26 +1,26 @@
|
|
|
1
|
-
import { getCookie, removeCookie, setCookie } from './utils';
|
|
2
|
-
var Cookies = /** @class */ (function () {
|
|
3
|
-
function Cookies() {
|
|
4
|
-
}
|
|
5
|
-
Cookies.prototype.setTokens = function (_a) {
|
|
6
|
-
var idToken = _a.idToken, token = _a.token;
|
|
7
|
-
!!token && setCookie('kcToken', btoa(token));
|
|
8
|
-
!!idToken && setCookie('kcIdToken', btoa(idToken));
|
|
9
|
-
};
|
|
10
|
-
Cookies.prototype.getTokens = function () {
|
|
11
|
-
var tknStr = getCookie('kcToken');
|
|
12
|
-
var idTknStr = getCookie('kcIdToken');
|
|
13
|
-
return {
|
|
14
|
-
idToken: idTknStr ? atob(idTknStr) : undefined,
|
|
15
|
-
refreshToken: '',
|
|
16
|
-
token: tknStr ? atob(tknStr) : undefined,
|
|
17
|
-
};
|
|
18
|
-
};
|
|
19
|
-
Cookies.prototype.resetTokens = function () {
|
|
20
|
-
removeCookie('kcToken');
|
|
21
|
-
removeCookie('kcIdToken');
|
|
22
|
-
};
|
|
23
|
-
return Cookies;
|
|
24
|
-
}());
|
|
25
|
-
export { Cookies };
|
|
1
|
+
import { getCookie, removeCookie, setCookie } from './utils';
|
|
2
|
+
var Cookies = /** @class */ (function () {
|
|
3
|
+
function Cookies() {
|
|
4
|
+
}
|
|
5
|
+
Cookies.prototype.setTokens = function (_a) {
|
|
6
|
+
var idToken = _a.idToken, token = _a.token;
|
|
7
|
+
!!token && setCookie('kcToken', btoa(token));
|
|
8
|
+
!!idToken && setCookie('kcIdToken', btoa(idToken));
|
|
9
|
+
};
|
|
10
|
+
Cookies.prototype.getTokens = function () {
|
|
11
|
+
var tknStr = getCookie('kcToken');
|
|
12
|
+
var idTknStr = getCookie('kcIdToken');
|
|
13
|
+
return {
|
|
14
|
+
idToken: idTknStr ? atob(idTknStr) : undefined,
|
|
15
|
+
refreshToken: '',
|
|
16
|
+
token: tknStr ? atob(tknStr) : undefined,
|
|
17
|
+
};
|
|
18
|
+
};
|
|
19
|
+
Cookies.prototype.resetTokens = function () {
|
|
20
|
+
removeCookie('kcToken');
|
|
21
|
+
removeCookie('kcIdToken');
|
|
22
|
+
};
|
|
23
|
+
return Cookies;
|
|
24
|
+
}());
|
|
25
|
+
export { Cookies };
|
|
26
26
|
//# sourceMappingURL=client.js.map
|
|
@@ -1,3 +1,3 @@
|
|
|
1
|
-
import type { TokenPersistor } from './types';
|
|
2
|
-
export declare const ExpressCookies: (req: any) => TokenPersistor;
|
|
3
|
-
export declare const SSRCookies: (cookies: any) => TokenPersistor;
|
|
1
|
+
import type { TokenPersistor } from './types';
|
|
2
|
+
export declare const ExpressCookies: (req: any) => TokenPersistor;
|
|
3
|
+
export declare const SSRCookies: (cookies: any) => TokenPersistor;
|
package/lib/persistors/server.js
CHANGED
|
@@ -1,34 +1,34 @@
|
|
|
1
|
-
import { Base64 } from 'js-base64';
|
|
2
|
-
import { decode, encode, getCookie, removeCookie, setCookie } from './utils';
|
|
3
|
-
export var ExpressCookies = function (req) { return ({
|
|
4
|
-
setTokens: function () { },
|
|
5
|
-
getTokens: function () {
|
|
6
|
-
var _a = req.cookies || {}, kcIdToken = _a.kcIdToken, kcToken = _a.kcToken;
|
|
7
|
-
return {
|
|
8
|
-
idToken: kcIdToken ? Base64.decode(kcIdToken) : undefined,
|
|
9
|
-
token: kcToken ? Base64.decode(kcToken) : undefined,
|
|
10
|
-
};
|
|
11
|
-
},
|
|
12
|
-
resetTokens: function () { },
|
|
13
|
-
}); };
|
|
14
|
-
export var SSRCookies = function (cookies) { return ({
|
|
15
|
-
setTokens: function (_a) {
|
|
16
|
-
var idToken = _a.idToken, token = _a.token;
|
|
17
|
-
!!token && setCookie('kcToken', encode(token));
|
|
18
|
-
!!idToken && setCookie('kcIdToken', encode(idToken));
|
|
19
|
-
},
|
|
20
|
-
getTokens: function () {
|
|
21
|
-
var tknStr = getCookie('kcToken', cookies);
|
|
22
|
-
var idTknStr = getCookie('kcIdToken', cookies);
|
|
23
|
-
return {
|
|
24
|
-
idToken: idTknStr ? decode(idTknStr) : '',
|
|
25
|
-
refreshToken: '',
|
|
26
|
-
token: tknStr ? decode(tknStr) : '',
|
|
27
|
-
};
|
|
28
|
-
},
|
|
29
|
-
resetTokens: function () {
|
|
30
|
-
removeCookie('kcToken');
|
|
31
|
-
removeCookie('kcIdToken');
|
|
32
|
-
},
|
|
33
|
-
}); };
|
|
1
|
+
import { Base64 } from 'js-base64';
|
|
2
|
+
import { decode, encode, getCookie, removeCookie, setCookie } from './utils';
|
|
3
|
+
export var ExpressCookies = function (req) { return ({
|
|
4
|
+
setTokens: function () { },
|
|
5
|
+
getTokens: function () {
|
|
6
|
+
var _a = req.cookies || {}, kcIdToken = _a.kcIdToken, kcToken = _a.kcToken;
|
|
7
|
+
return {
|
|
8
|
+
idToken: kcIdToken ? Base64.decode(kcIdToken) : undefined,
|
|
9
|
+
token: kcToken ? Base64.decode(kcToken) : undefined,
|
|
10
|
+
};
|
|
11
|
+
},
|
|
12
|
+
resetTokens: function () { },
|
|
13
|
+
}); };
|
|
14
|
+
export var SSRCookies = function (cookies) { return ({
|
|
15
|
+
setTokens: function (_a) {
|
|
16
|
+
var idToken = _a.idToken, token = _a.token;
|
|
17
|
+
!!token && setCookie('kcToken', encode(token));
|
|
18
|
+
!!idToken && setCookie('kcIdToken', encode(idToken));
|
|
19
|
+
},
|
|
20
|
+
getTokens: function () {
|
|
21
|
+
var tknStr = getCookie('kcToken', cookies);
|
|
22
|
+
var idTknStr = getCookie('kcIdToken', cookies);
|
|
23
|
+
return {
|
|
24
|
+
idToken: idTknStr ? decode(idTknStr) : '',
|
|
25
|
+
refreshToken: '',
|
|
26
|
+
token: tknStr ? decode(tknStr) : '',
|
|
27
|
+
};
|
|
28
|
+
},
|
|
29
|
+
resetTokens: function () {
|
|
30
|
+
removeCookie('kcToken');
|
|
31
|
+
removeCookie('kcIdToken');
|
|
32
|
+
},
|
|
33
|
+
}); };
|
|
34
34
|
//# sourceMappingURL=server.js.map
|