@rttnd/gau 0.2.8 → 0.3.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (171) hide show
  1. package/dist/chunk-7WBYR3Q6.js +1 -0
  2. package/dist/chunk-7WBYR3Q6.js.map +1 -0
  3. package/dist/chunk-BU67DYGK.js +1 -0
  4. package/dist/chunk-BU67DYGK.js.map +1 -0
  5. package/dist/chunk-UTAPXIXP.js +1 -0
  6. package/dist/chunk-UTAPXIXP.js.map +1 -0
  7. package/dist/chunk-X6HBHPJD.js +1 -0
  8. package/dist/chunk-X6HBHPJD.js.map +1 -0
  9. package/dist/src/adapters/drizzle/index.d.ts.map +1 -0
  10. package/dist/src/adapters/drizzle/index.js +1 -0
  11. package/dist/src/adapters/drizzle/mysql.d.ts.map +1 -0
  12. package/dist/src/adapters/drizzle/pg.d.ts.map +1 -0
  13. package/dist/{adapters → src/adapters}/drizzle/sqlite.d.ts +1 -1
  14. package/dist/src/adapters/drizzle/sqlite.d.ts.map +1 -0
  15. package/dist/src/adapters/drizzle/transaction.d.ts +13 -0
  16. package/dist/src/adapters/drizzle/transaction.d.ts.map +1 -0
  17. package/dist/src/adapters/index.d.ts.map +1 -0
  18. package/dist/src/adapters/index.js +1 -0
  19. package/dist/src/adapters/memory/index.d.ts.map +1 -0
  20. package/dist/src/adapters/memory/index.js +1 -0
  21. package/dist/{cli → src/cli}/index.d.ts.map +1 -1
  22. package/dist/src/cli/index.js +1 -0
  23. package/dist/src/cli/index.js.map +1 -0
  24. package/dist/{client → src/client}/solid/index.d.ts +6 -2
  25. package/dist/src/client/solid/index.d.ts.map +1 -0
  26. package/dist/src/client/solid/index.js +1 -0
  27. package/dist/src/client/solid/index.js.map +1 -0
  28. package/dist/src/client/svelte/AuthProvider/index.svelte +17 -0
  29. package/dist/src/client/svelte/index.svelte.d.ts +20 -0
  30. package/dist/src/client/svelte/index.svelte.d.ts.map +1 -0
  31. package/dist/src/client/svelte/index.svelte.js +1 -0
  32. package/dist/src/client/svelte/index.svelte.js.map +1 -0
  33. package/dist/src/client/token.d.ts +4 -0
  34. package/dist/src/client/token.d.ts.map +1 -0
  35. package/dist/{core → src/core}/cookies.d.ts +2 -0
  36. package/dist/src/core/cookies.d.ts.map +1 -0
  37. package/dist/{core → src/core}/createAuth.d.ts +11 -7
  38. package/dist/src/core/createAuth.d.ts.map +1 -0
  39. package/dist/src/core/handler.d.ts.map +1 -0
  40. package/dist/src/core/handlers/callback.d.ts +4 -0
  41. package/dist/src/core/handlers/callback.d.ts.map +1 -0
  42. package/dist/src/core/handlers/cors.d.ts +4 -0
  43. package/dist/src/core/handlers/cors.d.ts.map +1 -0
  44. package/dist/src/core/handlers/index.d.ts +7 -0
  45. package/dist/src/core/handlers/index.d.ts.map +1 -0
  46. package/dist/src/core/handlers/index.js +1 -0
  47. package/dist/src/core/handlers/link.d.ts +5 -0
  48. package/dist/src/core/handlers/link.d.ts.map +1 -0
  49. package/dist/src/core/handlers/login.d.ts +5 -0
  50. package/dist/src/core/handlers/login.d.ts.map +1 -0
  51. package/dist/src/core/handlers/session.d.ts +4 -0
  52. package/dist/src/core/handlers/session.d.ts.map +1 -0
  53. package/dist/src/core/handlers/utils.d.ts +5 -0
  54. package/dist/src/core/handlers/utils.d.ts.map +1 -0
  55. package/dist/{core → src/core}/index.d.ts +18 -2
  56. package/dist/src/core/index.d.ts.map +1 -0
  57. package/dist/src/core/index.js +1 -0
  58. package/dist/src/index.d.ts +3 -0
  59. package/dist/src/index.d.ts.map +1 -0
  60. package/dist/src/index.js +1 -0
  61. package/dist/src/jwt/index.d.ts.map +1 -0
  62. package/dist/src/jwt/index.js +1 -0
  63. package/dist/src/jwt/jwt.d.ts.map +1 -0
  64. package/dist/src/jwt/utils.d.ts.map +1 -0
  65. package/dist/src/oauth/index.d.ts.map +1 -0
  66. package/dist/src/oauth/index.js +1 -0
  67. package/dist/src/oauth/index.js.map +1 -0
  68. package/dist/src/oauth/providers/github.d.ts.map +1 -0
  69. package/dist/src/oauth/providers/google.d.ts.map +1 -0
  70. package/dist/src/oauth/providers/microsoft.d.ts.map +1 -0
  71. package/dist/src/oauth/utils.d.ts.map +1 -0
  72. package/dist/src/runtimes/index.d.ts +2 -0
  73. package/dist/src/runtimes/index.d.ts.map +1 -0
  74. package/dist/src/runtimes/index.js +1 -0
  75. package/dist/{runtimes → src/runtimes}/tauri/index.d.ts +1 -3
  76. package/dist/src/runtimes/tauri/index.d.ts.map +1 -0
  77. package/dist/src/runtimes/tauri/index.js +1 -0
  78. package/dist/src/solidstart/index.d.ts.map +1 -0
  79. package/dist/src/solidstart/index.js +1 -0
  80. package/dist/src/solidstart/index.js.map +1 -0
  81. package/dist/{sveltekit → src/sveltekit}/index.d.ts +3 -3
  82. package/dist/src/sveltekit/index.d.ts.map +1 -0
  83. package/dist/src/sveltekit/index.js +1 -0
  84. package/dist/src/sveltekit/index.js.map +1 -0
  85. package/package.json +65 -31
  86. package/dist/adapters/drizzle/index.d.ts.map +0 -1
  87. package/dist/adapters/drizzle/index.js +0 -2
  88. package/dist/adapters/drizzle/mysql.d.ts.map +0 -1
  89. package/dist/adapters/drizzle/pg.d.ts.map +0 -1
  90. package/dist/adapters/drizzle/sqlite.d.ts.map +0 -1
  91. package/dist/adapters/index.d.ts.map +0 -1
  92. package/dist/adapters/index.js +0 -2
  93. package/dist/adapters/memory/index.d.ts.map +0 -1
  94. package/dist/adapters/memory/index.js +0 -2
  95. package/dist/chunk-2I7P37NO.js +0 -50
  96. package/dist/chunk-2I7P37NO.js.map +0 -1
  97. package/dist/chunk-4SBVHUU4.js +0 -2
  98. package/dist/chunk-4SBVHUU4.js.map +0 -1
  99. package/dist/chunk-LWBWVQD2.js +0 -2
  100. package/dist/chunk-LWBWVQD2.js.map +0 -1
  101. package/dist/chunk-RMHERF4D.js +0 -2
  102. package/dist/chunk-RMHERF4D.js.map +0 -1
  103. package/dist/chunk-XKNIVWN6.js +0 -2
  104. package/dist/chunk-XKNIVWN6.js.map +0 -1
  105. package/dist/cli/index.js +0 -4
  106. package/dist/cli/index.js.map +0 -1
  107. package/dist/client/solid/index.d.ts.map +0 -1
  108. package/dist/client/solid/index.js +0 -2
  109. package/dist/client/solid/index.js.map +0 -1
  110. package/dist/client/svelte/index.svelte.d.ts +0 -13
  111. package/dist/client/svelte/index.svelte.d.ts.map +0 -1
  112. package/dist/client/svelte/index.svelte.js +0 -2
  113. package/dist/client/svelte/index.svelte.js.map +0 -1
  114. package/dist/core/cookies.d.ts.map +0 -1
  115. package/dist/core/createAuth.d.ts.map +0 -1
  116. package/dist/core/handler.d.ts.map +0 -1
  117. package/dist/core/index.d.ts.map +0 -1
  118. package/dist/core/index.js +0 -2
  119. package/dist/index.d.ts +0 -3
  120. package/dist/index.d.ts.map +0 -1
  121. package/dist/index.js +0 -2
  122. package/dist/jwt/index.d.ts.map +0 -1
  123. package/dist/jwt/index.js +0 -2
  124. package/dist/jwt/jwt.d.ts.map +0 -1
  125. package/dist/jwt/utils.d.ts.map +0 -1
  126. package/dist/oauth/index.d.ts.map +0 -1
  127. package/dist/oauth/index.js +0 -2
  128. package/dist/oauth/index.js.map +0 -1
  129. package/dist/oauth/providers/github.d.ts.map +0 -1
  130. package/dist/oauth/providers/google.d.ts.map +0 -1
  131. package/dist/oauth/providers/microsoft.d.ts.map +0 -1
  132. package/dist/oauth/utils.d.ts.map +0 -1
  133. package/dist/runtimes/bun/index.d.ts +0 -3
  134. package/dist/runtimes/bun/index.d.ts.map +0 -1
  135. package/dist/runtimes/bun/index.js +0 -2
  136. package/dist/runtimes/index.d.ts +0 -3
  137. package/dist/runtimes/index.d.ts.map +0 -1
  138. package/dist/runtimes/index.js +0 -2
  139. package/dist/runtimes/tauri/index.d.ts.map +0 -1
  140. package/dist/runtimes/tauri/index.js +0 -2
  141. package/dist/solidstart/index.d.ts.map +0 -1
  142. package/dist/solidstart/index.js +0 -2
  143. package/dist/solidstart/index.js.map +0 -1
  144. package/dist/sveltekit/index.d.ts.map +0 -1
  145. package/dist/sveltekit/index.js +0 -2
  146. package/dist/sveltekit/index.js.map +0 -1
  147. /package/dist/{adapters → src/adapters}/drizzle/index.d.ts +0 -0
  148. /package/dist/{adapters → src/adapters}/drizzle/index.js.map +0 -0
  149. /package/dist/{adapters → src/adapters}/drizzle/mysql.d.ts +0 -0
  150. /package/dist/{adapters → src/adapters}/drizzle/pg.d.ts +0 -0
  151. /package/dist/{adapters → src/adapters}/index.d.ts +0 -0
  152. /package/dist/{adapters → src/adapters}/index.js.map +0 -0
  153. /package/dist/{adapters → src/adapters}/memory/index.d.ts +0 -0
  154. /package/dist/{adapters → src/adapters}/memory/index.js.map +0 -0
  155. /package/dist/{cli → src/cli}/index.d.ts +0 -0
  156. /package/dist/{core → src/core}/handler.d.ts +0 -0
  157. /package/dist/{core → src/core/handlers}/index.js.map +0 -0
  158. /package/dist/{index.js.map → src/core/index.js.map} +0 -0
  159. /package/dist/{jwt → src}/index.js.map +0 -0
  160. /package/dist/{jwt → src/jwt}/index.d.ts +0 -0
  161. /package/dist/{runtimes/bun → src/jwt}/index.js.map +0 -0
  162. /package/dist/{jwt → src/jwt}/jwt.d.ts +0 -0
  163. /package/dist/{jwt → src/jwt}/utils.d.ts +0 -0
  164. /package/dist/{oauth → src/oauth}/index.d.ts +0 -0
  165. /package/dist/{oauth → src/oauth}/providers/github.d.ts +0 -0
  166. /package/dist/{oauth → src/oauth}/providers/google.d.ts +0 -0
  167. /package/dist/{oauth → src/oauth}/providers/microsoft.d.ts +0 -0
  168. /package/dist/{oauth → src/oauth}/utils.d.ts +0 -0
  169. /package/dist/{runtimes → src/runtimes}/index.js.map +0 -0
  170. /package/dist/{runtimes → src/runtimes}/tauri/index.js.map +0 -0
  171. /package/dist/{solidstart → src/solidstart}/index.d.ts +0 -0
@@ -1 +0,0 @@
1
- {"version":3,"file":"handler.d.ts","sourceRoot":"","sources":["../../core/handler.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,cAAc,CAAA;AACxC,OAAO,KAAK,EAAE,WAAW,EAAE,YAAY,EAAE,MAAM,SAAS,CAAA;AAiWxD,wBAAgB,aAAa,CAAC,IAAI,EAAE,IAAI,GAAG,CAAC,OAAO,EAAE,WAAW,KAAK,OAAO,CAAC,YAAY,CAAC,CA2EzF"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../core/index.ts"],"names":[],"mappings":"AAAA,MAAM,WAAW,WAAW;IAC1B,+BAA+B;IAC/B,QAAQ,CAAC,GAAG,EAAE,MAAM,CAAA;IACpB,0CAA0C;IAC1C,QAAQ,CAAC,MAAM,EAAE,MAAM,CAAA;IACvB,0DAAwD;IACxD,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAA;IACzB,oCAAoC;IACpC,IAAI,EAAE,CAAC,CAAC,GAAG,OAAO,OAAO,OAAO,CAAC,CAAC,CAAC,CAAA;IACnC,oBAAoB;IACpB,IAAI,EAAE,MAAM,OAAO,CAAC,MAAM,CAAC,CAAA;IAC3B,yFAAyF;IACzF,QAAQ,EAAE,MAAM,OAAO,CAAC,QAAQ,CAAC,CAAA;CAClC;AAED,MAAM,WAAW,YAAY;IAC3B,QAAQ,CAAC,MAAM,EAAE,MAAM,CAAA;IACvB,QAAQ,CAAC,OAAO,EAAE,OAAO,CAAA;IACzB,QAAQ,CAAC,IAAI,CAAC,EAAE,QAAQ,GAAG,IAAI,CAAA;CAChC;AAED,MAAM,WAAW,IAAI;IACnB,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACpB,KAAK,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACrB,aAAa,CAAC,EAAE,OAAO,GAAG,IAAI,CAAA;IAC9B,KAAK,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;CACtB;AAED,MAAM,WAAW,OAAO;IACtB,EAAE,EAAE,MAAM,CAAA;IACV,GAAG,EAAE,MAAM,CAAA;IACX,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAA;CACvB;AAED,MAAM,WAAW,UAAU;IACzB,IAAI,EAAE,IAAI,GAAG,IAAI,CAAA;IACjB,OAAO,EAAE,OAAO,GAAG,IAAI,CAAA;CACxB;AAED,MAAM,WAAW,OAAQ,SAAQ,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC;IAC/C,EAAE,CAAC,EAAE,MAAM,CAAA;CACZ;AAED,MAAM,WAAW,OAAO;IACtB,MAAM,EAAE,MAAM,CAAA;IACd,QAAQ,EAAE,MAAM,CAAA;IAChB,iBAAiB,EAAE,MAAM,CAAA;IACzB,IAAI,CAAC,EAAE,MAAM,CAAA,CAAC,eAAe;IAC7B,WAAW,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IAC3B,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IAC5B,SAAS,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA,CAAC,gBAAgB;IAC1C,OAAO,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACvB,KAAK,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACrB,SAAS,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;IACzB,YAAY,CAAC,EAAE,MAAM,GAAG,IAAI,CAAA;CAC7B;AAED,MAAM,WAAW,UAAW,SAAQ,OAAO;CAAG;AAE9C,MAAM,WAAW,OAAO;IACtB,OAAO,EAAE,CAAC,EAAE,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC,CAAA;IAC7C,cAAc,EAAE,CAAC,KAAK,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC,CAAA;IACvD,gBAAgB,EAAE,CAAC,QAAQ,EAAE,MAAM,EAAE,iBAAiB,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC,CAAA;IACvF,UAAU,EAAE,CAAC,IAAI,EAAE,OAAO,KAAK,OAAO,CAAC,IAAI,CAAC,CAAA;IAC5C,WAAW,EAAE,CAAC,IAAI,EAAE,UAAU,KAAK,OAAO,CAAC,IAAI,CAAC,CAAA;IAChD,UAAU,EAAE,CAAC,IAAI,EAAE,OAAO,CAAC,IAAI,CAAC,GAAG;QAAE,EAAE,EAAE,MAAM,CAAA;KAAE,KAAK,OAAO,CAAC,IAAI,CAAC,CAAA;CACpE;AAED,qBAAa,SAAU,SAAQ,KAAK;IAClC,SAAkB,KAAK,CAAC,EAAE,OAAO,CAAA;IACjC,YAAY,OAAO,EAAE,MAAM,EAAE,KAAK,CAAC,EAAE,OAAO,EAI3C;CACF;AAED,wBAAgB,IAAI,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,IAAI,GAAE,YAAiB,GAAG,QAAQ,CAKlE;AAED,wBAAgB,QAAQ,CAAC,GAAG,EAAE,MAAM,EAAE,MAAM,GAAE,GAAG,GAAG,GAAS,GAAG,QAAQ,CAOvE;AAED,cAAc,WAAW,CAAA;AACzB,cAAc,cAAc,CAAA;AAC5B,cAAc,WAAW,CAAA"}
@@ -1,2 +0,0 @@
1
- import{a,b,c,d,e,f,g,h,k as i,l as j,m as k,n as l,o as m}from"../chunk-2I7P37NO.js";export{k as AuthError,g as CALLBACK_URI_COOKIE_NAME,d as CSRF_COOKIE_NAME,h as CSRF_MAX_AGE,c as Cookies,a as DEFAULT_COOKIE_SERIALIZE_OPTIONS,f as PKCE_COOKIE_NAME,e as SESSION_COOKIE_NAME,i as createAuth,j as createHandler,l as json,b as parseCookies,m as redirect};
2
- //# sourceMappingURL=index.js.map
package/dist/index.d.ts DELETED
@@ -1,3 +0,0 @@
1
- export * from './core/index';
2
- export type { GauSession, Session, User } from './core/index';
3
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":"AAAA,cAAc,cAAc,CAAA;AAC5B,YAAY,EAAE,UAAU,EAAE,OAAO,EAAE,IAAI,EAAE,MAAM,cAAc,CAAA"}
package/dist/index.js DELETED
@@ -1,2 +0,0 @@
1
- import{a as e,b as o,c as r,d as s,e as i,f as n,g as p,h as t,k as x,l as f,m,n as S,o as a}from"./chunk-2I7P37NO.js";export{m as AuthError,p as CALLBACK_URI_COOKIE_NAME,s as CSRF_COOKIE_NAME,t as CSRF_MAX_AGE,r as Cookies,e as DEFAULT_COOKIE_SERIALIZE_OPTIONS,n as PKCE_COOKIE_NAME,i as SESSION_COOKIE_NAME,x as createAuth,f as createHandler,S as json,o as parseCookies,a as redirect};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../jwt/index.ts"],"names":[],"mappings":"AAAA,cAAc,OAAO,CAAA"}
package/dist/jwt/index.js DELETED
@@ -1,2 +0,0 @@
1
- import{i as a,j as b}from"../chunk-2I7P37NO.js";export{a as sign,b as verify};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"jwt.d.ts","sourceRoot":"","sources":["../../jwt/jwt.ts"],"names":[],"mappings":"AAWA,MAAM,MAAM,kBAAkB,GAAG,OAAO,GAAG,OAAO,CAAA;AAElD,UAAU,iBAAiB;IACzB,iFAAiF;IACjF,GAAG,CAAC,EAAE,MAAM,CAAA;CACb;AAED,MAAM,MAAM,WAAW,GACjB,CAAC;IAAE,SAAS,CAAC,EAAE,OAAO,CAAC;IAAC,UAAU,CAAC,EAAE,SAAS,CAAC;IAAC,MAAM,CAAC,EAAE,MAAM,CAAA;CAAE,GACjE,iBAAiB,GAAG;IAAE,GAAG,CAAC,EAAE,MAAM,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,CAAA;CAAE,CAAC,GAC9E,CAAC;IAAE,SAAS,EAAE,OAAO,CAAC;IAAC,MAAM,CAAC,EAAE,MAAM,GAAG,UAAU,CAAC;IAAC,UAAU,CAAC,EAAE,KAAK,CAAA;CAAE,GACvE,iBAAiB,GAAG;IAAE,GAAG,CAAC,EAAE,MAAM,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,CAAA;CAAE,CAAC,CAAA;AAElF;;;GAGG;AACH,wBAAsB,IAAI,CAAC,CAAC,SAAS,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,OAAO,GAAE,WAAgB,GAAG,OAAO,CAAC,MAAM,CAAC,CA6DpH;AAED,MAAM,MAAM,aAAa,GACnB;IAAE,SAAS,CAAC,EAAE,OAAO,CAAC;IAAC,SAAS,CAAC,EAAE,SAAS,CAAC;IAAC,MAAM,CAAC,EAAE,MAAM,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAA;CAAE,GACtG;IAAE,SAAS,EAAE,OAAO,CAAC;IAAC,MAAM,CAAC,EAAE,MAAM,GAAG,UAAU,CAAC;IAAC,SAAS,CAAC,EAAE,KAAK,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,CAAC;IAAC,GAAG,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAA;CAAE,CAAA;AAEpH;;;;GAIG;AACH,wBAAsB,MAAM,CAAC,CAAC,GAAG,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,EAAE,KAAK,EAAE,MAAM,EAAE,OAAO,EAAE,aAAa,GAAG,OAAO,CAAC,CAAC,CAAC,CA2F3G"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../jwt/utils.ts"],"names":[],"mappings":"AAEA,wBAAgB,iBAAiB,CAAC,CAAC,EAAE,UAAU,EAAE,CAAC,EAAE,UAAU,GAAG,OAAO,CAOvE;AAeD,wBAAsB,oBAAoB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC;IAAE,UAAU,EAAE,SAAS,CAAC;IAAC,SAAS,EAAE,SAAS,CAAA;CAAE,CAAC,CA2BnH;AAED;;GAEG;AACH,wBAAgB,QAAQ,CAAC,GAAG,EAAE,UAAU,GAAG,UAAU,CA2CpD"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../oauth/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAA;AAE1C,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAA;AAC3C,OAAO,EAAE,MAAM,EAAE,MAAM,oBAAoB,CAAA;AAC3C,OAAO,EAAE,SAAS,EAAE,MAAM,uBAAuB,CAAA;AAEjD,MAAM,WAAW,mBAAmB;IAClC,QAAQ,EAAE,MAAM,CAAA;IAChB,YAAY,EAAE,MAAM,CAAA;IACpB,WAAW,CAAC,EAAE,MAAM,CAAA;IACpB,KAAK,CAAC,EAAE,MAAM,EAAE,CAAA;CACjB;AAED,MAAM,WAAW,QAAQ;IACvB,EAAE,EAAE,MAAM,CAAA;IACV,IAAI,EAAE,MAAM,CAAA;IACZ,KAAK,EAAE,MAAM,GAAG,IAAI,CAAA;IACpB,aAAa,EAAE,OAAO,GAAG,IAAI,CAAA;IAC7B,MAAM,EAAE,MAAM,GAAG,IAAI,CAAA;IACrB,GAAG,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAA;CAC7B;AAED,MAAM,WAAW,aAAa,CAAC,CAAC,SAAS,MAAM,GAAG,MAAM;IACtD,EAAE,EAAE,CAAC,CAAA;IACL,mBAAmB,CAAC,EAAE,OAAO,CAAA;IAC7B,mBAAmB,EAAE,CAAC,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE;QAAE,MAAM,CAAC,EAAE,MAAM,EAAE,CAAC;QAAC,WAAW,CAAC,EAAE,MAAM,CAAA;KAAE,KAAK,OAAO,CAAC,GAAG,CAAC,CAAA;IACjI,gBAAgB,EAAE,CAAC,IAAI,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,EAAE,WAAW,CAAC,EAAE,MAAM,KAAK,OAAO,CAAC;QAAE,MAAM,EAAE,YAAY,CAAC;QAAC,IAAI,EAAE,QAAQ,CAAA;KAAE,CAAC,CAAA;CAClI"}
@@ -1,2 +0,0 @@
1
- import{CodeChallengeMethod as U,OAuth2Client as g}from"arctic";var A="https://github.com/login/oauth/authorize",v="https://github.com/login/oauth/access_token",m="https://api.github.com";async function C(e){let r=await(await fetch(`${m}/user`,{headers:{Authorization:`Bearer ${e}`,"User-Agent":"gau",Accept:"application/vnd.github+json"}})).json(),t=r.email,n=!1,o=await fetch(`${m}/user/emails`,{headers:{Authorization:`Bearer ${e}`,"User-Agent":"gau",Accept:"application/vnd.github+json"}});if(o.ok){let s=await o.json(),i=s.find(a=>a.primary&&a.verified);if(i)t=i.email,n=!0;else{let a=s.find(l=>l.verified);a&&(t=a.email,n=!0)}}return{id:r.id.toString(),name:r.name??r.login,email:t,emailVerified:n,avatar:r.avatar_url,raw:r}}function b(e){let c=new g(e.clientId,e.clientSecret,e.redirectUri??null);function r(t){return!t||e.redirectUri&&t===e.redirectUri?c:new g(e.clientId,e.clientSecret,t)}return{id:"github",async getAuthorizationUrl(t,n,o){let s=r(o?.redirectUri),i=o?.scopes??e.scope??["user:email"];return await s.createAuthorizationURLWithPKCE(A,t,U.S256,n,i)},async validateCallback(t,n,o){let i=await r(o).validateAuthorizationCode(v,t,n),a=await C(i.accessToken());return{tokens:i,user:a}}}}import{CodeChallengeMethod as O,OAuth2Client as h}from"arctic";var w="https://accounts.google.com/o/oauth2/v2/auth",y="https://oauth2.googleapis.com/token",_="https://openidconnect.googleapis.com/v1/userinfo";async function R(e){let r=await(await fetch(_,{headers:{Authorization:`Bearer ${e}`,"User-Agent":"gau"}})).json();return{id:r.sub,name:r.name,email:r.email,emailVerified:r.email_verified,avatar:r.picture,raw:r}}function P(e){let c=new h(e.clientId,e.clientSecret,e.redirectUri??null);function r(t){return!t||t===e.redirectUri?c:new h(e.clientId,e.clientSecret,t)}return{id:"google",requiresRedirectUri:!0,async getAuthorizationUrl(t,n,o){let s=r(o?.redirectUri),i=o?.scopes??e.scope??["openid","email","profile"];return await s.createAuthorizationURLWithPKCE(w,t,O.S256,n,i)},async validateCallback(t,n,o){let i=await r(o).validateAuthorizationCode(y,t,n),a=await R(i.accessToken());return{tokens:i,user:a}}}}import{CodeChallengeMethod as k,OAuth2Client as p}from"arctic";var G="https://graph.microsoft.com/v1.0/me",L="https://graph.microsoft.com/v1.0/me/photo/$value";function z(e){let c=e.replace(/-/g,"+").replace(/_/g,"/"),r=(4-c.length%4)%4,t=c.padEnd(c.length+r,"="),n=atob(t),o=n.length,s=new Uint8Array(o);for(let i=0;i<o;i++)s[i]=n.charCodeAt(i);return s}async function E(e,c){let t=await(await fetch(G,{headers:{Authorization:`Bearer ${e}`}})).json(),n=t.mail??t.userPrincipalName,o=!1;if(c)try{let a=c.split("."),l=JSON.parse(new TextDecoder().decode(z(a[1]))),u="9188040d-6c67-4c5b-b112-36a304b66dad";if(l.verified_primary_email){let d=Array.isArray(l.verified_primary_email)?l.verified_primary_email[0]:l.verified_primary_email;typeof d=="string"&&(n=d,o=!0)}else(l.tid===u||l.xms_edov===!0)&&(n=l.email??n,o=!0)}catch{}let s=await fetch(L,{headers:{Authorization:`Bearer ${e}`}}),i=null;if(s.ok)try{let a=await s.blob(),l=new FileReader;i=await new Promise((d,f)=>{l.onloadend=()=>d(l.result),l.onerror=f,l.readAsDataURL(a)})}catch{}return{id:t.id,name:t.displayName,email:n,emailVerified:o,avatar:i,raw:t}}function S(e){let c=e.tenant??"common",r=`https://login.microsoftonline.com/${c}/oauth2/v2.0/authorize`,t=`https://login.microsoftonline.com/${c}/oauth2/v2.0/token`,n=new p(e.clientId,e.clientSecret,e.redirectUri??null);function o(s){return!s||s===e.redirectUri?n:new p(e.clientId,e.clientSecret,s)}return{id:"microsoft",requiresRedirectUri:!0,async getAuthorizationUrl(s,i,a){let l=o(a?.redirectUri),u=a?.scopes??e.scope??["openid","profile","email","User.Read"];return await l.createAuthorizationURLWithPKCE(r,s,k.S256,i,u)},async validateCallback(s,i,a){let u=await o(a).validateAuthorizationCode(t,s,i),d=await E(u.accessToken(),u.idToken());return{tokens:u,user:d}}}}export{b as GitHub,P as Google,S as Microsoft};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../../oauth/providers/github.ts","../../oauth/providers/google.ts","../../oauth/providers/microsoft.ts"],"sourcesContent":["import type { AuthUser, OAuthProvider, OAuthProviderConfig } from '../index'\nimport { CodeChallengeMethod, OAuth2Client } from 'arctic'\n\nconst GITHUB_AUTH_URL = 'https://github.com/login/oauth/authorize'\nconst GITHUB_TOKEN_URL = 'https://github.com/login/oauth/access_token'\nconst GITHUB_API_URL = 'https://api.github.com'\n\ninterface GitHubUser {\n id: number\n login: string\n avatar_url: string\n name: string\n email: string | null\n [key: string]: unknown\n}\n\ninterface GitHubEmail {\n email: string\n primary: boolean\n verified: boolean\n visibility: 'public' | 'private' | null\n}\n\nasync function getUser(accessToken: string): Promise<AuthUser> {\n const response = await fetch(`${GITHUB_API_URL}/user`, {\n headers: {\n 'Authorization': `Bearer ${accessToken}`,\n 'User-Agent': 'gau',\n 'Accept': 'application/vnd.github+json',\n },\n })\n const data: GitHubUser = await response.json()\n\n let email: string | null = data.email\n let emailVerified = false\n\n const emailsResponse = await fetch(`${GITHUB_API_URL}/user/emails`, {\n headers: {\n 'Authorization': `Bearer ${accessToken}`,\n 'User-Agent': 'gau',\n 'Accept': 'application/vnd.github+json',\n },\n })\n\n if (emailsResponse.ok) {\n const emails: GitHubEmail[] = await emailsResponse.json()\n const primaryEmail = emails.find(e => e.primary && e.verified)\n if (primaryEmail) {\n email = primaryEmail.email\n emailVerified = true\n }\n else {\n // Fallback to the first verified email if no primary is found\n const verifiedEmail = emails.find(e => e.verified)\n if (verifiedEmail) {\n email = verifiedEmail.email\n emailVerified = true\n }\n }\n }\n\n return {\n id: data.id.toString(),\n name: data.name ?? data.login,\n email,\n emailVerified,\n avatar: data.avatar_url,\n raw: data,\n }\n}\n\nexport function GitHub(config: OAuthProviderConfig): OAuthProvider<'github'> {\n const defaultClient = new OAuth2Client(config.clientId, config.clientSecret, config.redirectUri ?? null)\n\n function getClient(redirectUri?: string): OAuth2Client {\n if (!redirectUri || (config.redirectUri && redirectUri === config.redirectUri))\n return defaultClient\n\n return new OAuth2Client(config.clientId, config.clientSecret, redirectUri)\n }\n\n return {\n id: 'github',\n\n async getAuthorizationUrl(state: string, codeVerifier: string, options?: { scopes?: string[], redirectUri?: string }) {\n const client = getClient(options?.redirectUri)\n const scopes = options?.scopes ?? config.scope ?? ['user:email']\n const url = await client.createAuthorizationURLWithPKCE(GITHUB_AUTH_URL, state, CodeChallengeMethod.S256, codeVerifier, scopes)\n return url\n },\n\n async validateCallback(code: string, codeVerifier: string, redirectUri?: string) {\n const client = getClient(redirectUri)\n const tokens = await client.validateAuthorizationCode(GITHUB_TOKEN_URL, code, codeVerifier)\n const user = await getUser(tokens.accessToken())\n return { tokens, user }\n },\n }\n}\n","import type { AuthUser, OAuthProvider, OAuthProviderConfig } from '../index'\r\nimport { CodeChallengeMethod, OAuth2Client } from 'arctic'\r\n\r\nconst GOOGLE_AUTH_URL = 'https://accounts.google.com/o/oauth2/v2/auth'\r\nconst GOOGLE_TOKEN_URL = 'https://oauth2.googleapis.com/token'\r\nconst GOOGLE_USERINFO_URL = 'https://openidconnect.googleapis.com/v1/userinfo'\r\n\r\ninterface GoogleUser {\r\n sub: string\r\n name: string\r\n email: string | null\r\n email_verified: boolean\r\n picture: string | null\r\n [key: string]: unknown\r\n}\r\n\r\nasync function getUser(accessToken: string): Promise<AuthUser> {\r\n const response = await fetch(GOOGLE_USERINFO_URL, {\r\n headers: {\r\n 'Authorization': `Bearer ${accessToken}`,\r\n 'User-Agent': 'gau',\r\n },\r\n })\r\n const data: GoogleUser = await response.json()\r\n\r\n return {\r\n id: data.sub,\r\n name: data.name,\r\n email: data.email,\r\n emailVerified: data.email_verified,\r\n avatar: data.picture,\r\n raw: data,\r\n }\r\n}\r\n\r\nexport function Google(config: OAuthProviderConfig): OAuthProvider<'google'> {\r\n const defaultClient = new OAuth2Client(config.clientId, config.clientSecret, config.redirectUri ?? null)\r\n\r\n function getClient(redirectUri?: string): OAuth2Client {\r\n if (!redirectUri || redirectUri === config.redirectUri)\r\n return defaultClient\r\n\r\n return new OAuth2Client(config.clientId, config.clientSecret, redirectUri)\r\n }\r\n\r\n return {\r\n id: 'google',\r\n requiresRedirectUri: true,\r\n\r\n async getAuthorizationUrl(state: string, codeVerifier: string, options?: { scopes?: string[], redirectUri?: string }) {\r\n const client = getClient(options?.redirectUri)\r\n const scopes = options?.scopes ?? config.scope ?? ['openid', 'email', 'profile']\r\n const url = await client.createAuthorizationURLWithPKCE(GOOGLE_AUTH_URL, state, CodeChallengeMethod.S256, codeVerifier, scopes)\r\n return url\r\n },\r\n\r\n async validateCallback(code: string, codeVerifier: string, redirectUri?: string) {\r\n const client = getClient(redirectUri)\r\n const tokens = await client.validateAuthorizationCode(GOOGLE_TOKEN_URL, code, codeVerifier)\r\n const user = await getUser(tokens.accessToken())\r\n return { tokens, user }\r\n },\r\n }\r\n}\r\n","import type { AuthUser, OAuthProvider, OAuthProviderConfig } from '../index'\nimport { CodeChallengeMethod, OAuth2Client } from 'arctic'\n\n// https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc\nconst MICROSOFT_USER_INFO_URL = 'https://graph.microsoft.com/v1.0/me'\n\n// https://learn.microsoft.com/en-us/graph/api/profilephoto-get?view=graph-rest-1.0\nconst MICROSOFT_USER_PHOTO_URL = 'https://graph.microsoft.com/v1.0/me/photo/$value'\n\ninterface MicrosoftConfig extends OAuthProviderConfig {\n tenant?: 'common' | 'organizations' | 'consumers' | string\n}\n\ninterface MicrosoftUser {\n id: string\n displayName: string\n mail: string | null\n userPrincipalName: string\n [key: string]: unknown\n}\n\nfunction base64url_decode(str: string): Uint8Array {\n const base64 = str.replace(/-/g, '+').replace(/_/g, '/')\n const padLength = (4 - (base64.length % 4)) % 4\n const padded = base64.padEnd(base64.length + padLength, '=')\n const binary_string = atob(padded)\n const len = binary_string.length\n const bytes = new Uint8Array(len)\n for (let i = 0; i < len; i++)\n bytes[i] = binary_string.charCodeAt(i)\n\n return bytes\n}\n\nasync function getUser(accessToken: string, idToken: string | null): Promise<AuthUser> {\n const userResponse = await fetch(MICROSOFT_USER_INFO_URL, {\n headers: {\n Authorization: `Bearer ${accessToken}`,\n },\n })\n const userData: MicrosoftUser = await userResponse.json()\n\n let email: string | null = userData.mail ?? userData.userPrincipalName\n let emailVerified = false\n if (idToken) {\n try {\n const parts = idToken.split('.')\n const payload = JSON.parse(new TextDecoder().decode(base64url_decode(parts[1]!))) as Record<string, any>\n const personalTenantId = '9188040d-6c67-4c5b-b112-36a304b66dad'\n\n // For work/school accounts, the `verified_primary_email` is the source of truth.\n if (payload.verified_primary_email) {\n const primaryEmail = Array.isArray(payload.verified_primary_email)\n ? payload.verified_primary_email[0]\n : payload.verified_primary_email\n\n if (typeof primaryEmail === 'string') {\n email = primaryEmail\n emailVerified = true\n }\n }\n // For personal accounts, the `email` claim is reliable and verified.\n else if (payload.tid === personalTenantId) {\n email = payload.email ?? email\n emailVerified = true\n }\n // Legacy fallback for `xms_edov`.\n else if (payload.xms_edov === true) {\n email = payload.email ?? email\n emailVerified = true\n }\n }\n catch {\n }\n }\n\n const photoResponse = await fetch(MICROSOFT_USER_PHOTO_URL, {\n headers: {\n Authorization: `Bearer ${accessToken}`,\n },\n })\n\n let avatar: string | null = null\n if (photoResponse.ok) {\n try {\n const blob = await photoResponse.blob()\n const reader = new FileReader()\n const dataUrlPromise = new Promise<string>((resolve, reject) => {\n reader.onloadend = () => resolve(reader.result as string)\n reader.onerror = reject\n reader.readAsDataURL(blob)\n })\n avatar = await dataUrlPromise\n }\n catch {\n }\n }\n\n return {\n id: userData.id,\n name: userData.displayName,\n email,\n emailVerified,\n avatar,\n raw: userData,\n }\n}\n\nexport function Microsoft(config: MicrosoftConfig): OAuthProvider<'microsoft'> {\n const tenant = config.tenant ?? 'common'\n\n const authURL = `https://login.microsoftonline.com/${tenant}/oauth2/v2.0/authorize`\n const tokenURL = `https://login.microsoftonline.com/${tenant}/oauth2/v2.0/token`\n\n const defaultClient = new OAuth2Client(config.clientId, config.clientSecret, config.redirectUri ?? null)\n\n function getClient(redirectUri?: string): OAuth2Client {\n if (!redirectUri || redirectUri === config.redirectUri)\n return defaultClient\n\n return new OAuth2Client(config.clientId, config.clientSecret, redirectUri)\n }\n\n return {\n id: 'microsoft',\n requiresRedirectUri: true,\n\n async getAuthorizationUrl(state: string, codeVerifier: string, options?: { scopes?: string[], redirectUri?: string }) {\n const client = getClient(options?.redirectUri)\n const scopes = options?.scopes ?? config.scope ?? ['openid', 'profile', 'email', 'User.Read']\n const url = await client.createAuthorizationURLWithPKCE(authURL, state, CodeChallengeMethod.S256, codeVerifier, scopes)\n return url\n },\n\n async validateCallback(code: string, codeVerifier: string, redirectUri?: string) {\n const client = getClient(redirectUri)\n const tokens = await client.validateAuthorizationCode(tokenURL, code, codeVerifier)\n const user = await getUser(tokens.accessToken(), tokens.idToken())\n return { tokens, user }\n },\n }\n}\n"],"mappings":"AACA,OAAS,uBAAAA,EAAqB,gBAAAC,MAAoB,SAElD,IAAMC,EAAkB,2CAClBC,EAAmB,8CACnBC,EAAiB,yBAkBvB,eAAeC,EAAQC,EAAwC,CAQ7D,IAAMC,EAAmB,MAPR,MAAM,MAAM,GAAGH,CAAc,QAAS,CACrD,QAAS,CACP,cAAiB,UAAUE,CAAW,GACtC,aAAc,MACd,OAAU,6BACZ,CACF,CAAC,GACuC,KAAK,EAEzCE,EAAuBD,EAAK,MAC5BE,EAAgB,GAEdC,EAAiB,MAAM,MAAM,GAAGN,CAAc,eAAgB,CAClE,QAAS,CACP,cAAiB,UAAUE,CAAW,GACtC,aAAc,MACd,OAAU,6BACZ,CACF,CAAC,EAED,GAAII,EAAe,GAAI,CACrB,IAAMC,EAAwB,MAAMD,EAAe,KAAK,EAClDE,EAAeD,EAAO,KAAKE,GAAKA,EAAE,SAAWA,EAAE,QAAQ,EAC7D,GAAID,EACFJ,EAAQI,EAAa,MACrBH,EAAgB,OAEb,CAEH,IAAMK,EAAgBH,EAAO,KAAKE,GAAKA,EAAE,QAAQ,EAC7CC,IACFN,EAAQM,EAAc,MACtBL,EAAgB,GAEpB,CACF,CAEA,MAAO,CACL,GAAIF,EAAK,GAAG,SAAS,EACrB,KAAMA,EAAK,MAAQA,EAAK,MACxB,MAAAC,EACA,cAAAC,EACA,OAAQF,EAAK,WACb,IAAKA,CACP,CACF,CAEO,SAASQ,EAAOC,EAAsD,CAC3E,IAAMC,EAAgB,IAAIhB,EAAae,EAAO,SAAUA,EAAO,aAAcA,EAAO,aAAe,IAAI,EAEvG,SAASE,EAAUC,EAAoC,CACrD,MAAI,CAACA,GAAgBH,EAAO,aAAeG,IAAgBH,EAAO,YACzDC,EAEF,IAAIhB,EAAae,EAAO,SAAUA,EAAO,aAAcG,CAAW,CAC3E,CAEA,MAAO,CACL,GAAI,SAEJ,MAAM,oBAAoBC,EAAeC,EAAsBC,EAAuD,CACpH,IAAMC,EAASL,EAAUI,GAAS,WAAW,EACvCE,EAASF,GAAS,QAAUN,EAAO,OAAS,CAAC,YAAY,EAE/D,OADY,MAAMO,EAAO,+BAA+BrB,EAAiBkB,EAAOpB,EAAoB,KAAMqB,EAAcG,CAAM,CAEhI,EAEA,MAAM,iBAAiBC,EAAcJ,EAAsBF,EAAsB,CAE/E,IAAMO,EAAS,MADAR,EAAUC,CAAW,EACR,0BAA0BhB,EAAkBsB,EAAMJ,CAAY,EACpFM,EAAO,MAAMtB,EAAQqB,EAAO,YAAY,CAAC,EAC/C,MAAO,CAAE,OAAAA,EAAQ,KAAAC,CAAK,CACxB,CACF,CACF,CCjGA,OAAS,uBAAAC,EAAqB,gBAAAC,MAAoB,SAElD,IAAMC,EAAkB,+CAClBC,EAAmB,sCACnBC,EAAsB,mDAW5B,eAAeC,EAAQC,EAAwC,CAO7D,IAAMC,EAAmB,MANR,MAAM,MAAMH,EAAqB,CAChD,QAAS,CACP,cAAiB,UAAUE,CAAW,GACtC,aAAc,KAChB,CACF,CAAC,GACuC,KAAK,EAE7C,MAAO,CACL,GAAIC,EAAK,IACT,KAAMA,EAAK,KACX,MAAOA,EAAK,MACZ,cAAeA,EAAK,eACpB,OAAQA,EAAK,QACb,IAAKA,CACP,CACF,CAEO,SAASC,EAAOC,EAAsD,CAC3E,IAAMC,EAAgB,IAAIT,EAAaQ,EAAO,SAAUA,EAAO,aAAcA,EAAO,aAAe,IAAI,EAEvG,SAASE,EAAUC,EAAoC,CACrD,MAAI,CAACA,GAAeA,IAAgBH,EAAO,YAClCC,EAEF,IAAIT,EAAaQ,EAAO,SAAUA,EAAO,aAAcG,CAAW,CAC3E,CAEA,MAAO,CACL,GAAI,SACJ,oBAAqB,GAErB,MAAM,oBAAoBC,EAAeC,EAAsBC,EAAuD,CACpH,IAAMC,EAASL,EAAUI,GAAS,WAAW,EACvCE,EAASF,GAAS,QAAUN,EAAO,OAAS,CAAC,SAAU,QAAS,SAAS,EAE/E,OADY,MAAMO,EAAO,+BAA+Bd,EAAiBW,EAAOb,EAAoB,KAAMc,EAAcG,CAAM,CAEhI,EAEA,MAAM,iBAAiBC,EAAcJ,EAAsBF,EAAsB,CAE/E,IAAMO,EAAS,MADAR,EAAUC,CAAW,EACR,0BAA0BT,EAAkBe,EAAMJ,CAAY,EACpFM,EAAO,MAAMf,EAAQc,EAAO,YAAY,CAAC,EAC/C,MAAO,CAAE,OAAAA,EAAQ,KAAAC,CAAK,CACxB,CACF,CACF,CC9DA,OAAS,uBAAAC,EAAqB,gBAAAC,MAAoB,SAGlD,IAAMC,EAA0B,sCAG1BC,EAA2B,mDAcjC,SAASC,EAAiBC,EAAyB,CACjD,IAAMC,EAASD,EAAI,QAAQ,KAAM,GAAG,EAAE,QAAQ,KAAM,GAAG,EACjDE,GAAa,EAAKD,EAAO,OAAS,GAAM,EACxCE,EAASF,EAAO,OAAOA,EAAO,OAASC,EAAW,GAAG,EACrDE,EAAgB,KAAKD,CAAM,EAC3BE,EAAMD,EAAc,OACpBE,EAAQ,IAAI,WAAWD,CAAG,EAChC,QAAS,EAAI,EAAG,EAAIA,EAAK,IACvBC,EAAM,CAAC,EAAIF,EAAc,WAAW,CAAC,EAEvC,OAAOE,CACT,CAEA,eAAeC,EAAQC,EAAqBC,EAA2C,CAMrF,IAAMC,EAA0B,MALX,MAAM,MAAMb,EAAyB,CACxD,QAAS,CACP,cAAe,UAAUW,CAAW,EACtC,CACF,CAAC,GACkD,KAAK,EAEpDG,EAAuBD,EAAS,MAAQA,EAAS,kBACjDE,EAAgB,GACpB,GAAIH,EACF,GAAI,CACF,IAAMI,EAAQJ,EAAQ,MAAM,GAAG,EACzBK,EAAU,KAAK,MAAM,IAAI,YAAY,EAAE,OAAOf,EAAiBc,EAAM,CAAC,CAAE,CAAC,CAAC,EAC1EE,EAAmB,uCAGzB,GAAID,EAAQ,uBAAwB,CAClC,IAAME,EAAe,MAAM,QAAQF,EAAQ,sBAAsB,EAC7DA,EAAQ,uBAAuB,CAAC,EAChCA,EAAQ,uBAER,OAAOE,GAAiB,WAC1BL,EAAQK,EACRJ,EAAgB,GAEpB,MAESE,EAAQ,MAAQC,GAKhBD,EAAQ,WAAa,MAC5BH,EAAQG,EAAQ,OAASH,EACzBC,EAAgB,GAEpB,MACM,CACN,CAGF,IAAMK,EAAgB,MAAM,MAAMnB,EAA0B,CAC1D,QAAS,CACP,cAAe,UAAUU,CAAW,EACtC,CACF,CAAC,EAEGU,EAAwB,KAC5B,GAAID,EAAc,GAChB,GAAI,CACF,IAAME,EAAO,MAAMF,EAAc,KAAK,EAChCG,EAAS,IAAI,WAMnBF,EAAS,MALc,IAAI,QAAgB,CAACG,EAASC,IAAW,CAC9DF,EAAO,UAAY,IAAMC,EAAQD,EAAO,MAAgB,EACxDA,EAAO,QAAUE,EACjBF,EAAO,cAAcD,CAAI,CAC3B,CAAC,CAEH,MACM,CACN,CAGF,MAAO,CACL,GAAIT,EAAS,GACb,KAAMA,EAAS,YACf,MAAAC,EACA,cAAAC,EACA,OAAAM,EACA,IAAKR,CACP,CACF,CAEO,SAASa,EAAUC,EAAqD,CAC7E,IAAMC,EAASD,EAAO,QAAU,SAE1BE,EAAU,qCAAqCD,CAAM,yBACrDE,EAAW,qCAAqCF,CAAM,qBAEtDG,EAAgB,IAAIhC,EAAa4B,EAAO,SAAUA,EAAO,aAAcA,EAAO,aAAe,IAAI,EAEvG,SAASK,EAAUC,EAAoC,CACrD,MAAI,CAACA,GAAeA,IAAgBN,EAAO,YAClCI,EAEF,IAAIhC,EAAa4B,EAAO,SAAUA,EAAO,aAAcM,CAAW,CAC3E,CAEA,MAAO,CACL,GAAI,YACJ,oBAAqB,GAErB,MAAM,oBAAoBC,EAAeC,EAAsBC,EAAuD,CACpH,IAAMC,EAASL,EAAUI,GAAS,WAAW,EACvCE,EAASF,GAAS,QAAUT,EAAO,OAAS,CAAC,SAAU,UAAW,QAAS,WAAW,EAE5F,OADY,MAAMU,EAAO,+BAA+BR,EAASK,EAAOpC,EAAoB,KAAMqC,EAAcG,CAAM,CAExH,EAEA,MAAM,iBAAiBC,EAAcJ,EAAsBF,EAAsB,CAE/E,IAAMO,EAAS,MADAR,EAAUC,CAAW,EACR,0BAA0BH,EAAUS,EAAMJ,CAAY,EAC5EM,EAAO,MAAM/B,EAAQ8B,EAAO,YAAY,EAAGA,EAAO,QAAQ,CAAC,EACjE,MAAO,CAAE,OAAAA,EAAQ,KAAAC,CAAK,CACxB,CACF,CACF","names":["CodeChallengeMethod","OAuth2Client","GITHUB_AUTH_URL","GITHUB_TOKEN_URL","GITHUB_API_URL","getUser","accessToken","data","email","emailVerified","emailsResponse","emails","primaryEmail","e","verifiedEmail","GitHub","config","defaultClient","getClient","redirectUri","state","codeVerifier","options","client","scopes","code","tokens","user","CodeChallengeMethod","OAuth2Client","GOOGLE_AUTH_URL","GOOGLE_TOKEN_URL","GOOGLE_USERINFO_URL","getUser","accessToken","data","Google","config","defaultClient","getClient","redirectUri","state","codeVerifier","options","client","scopes","code","tokens","user","CodeChallengeMethod","OAuth2Client","MICROSOFT_USER_INFO_URL","MICROSOFT_USER_PHOTO_URL","base64url_decode","str","base64","padLength","padded","binary_string","len","bytes","getUser","accessToken","idToken","userData","email","emailVerified","parts","payload","personalTenantId","primaryEmail","photoResponse","avatar","blob","reader","resolve","reject","Microsoft","config","tenant","authURL","tokenURL","defaultClient","getClient","redirectUri","state","codeVerifier","options","client","scopes","code","tokens","user"]}
@@ -1 +0,0 @@
1
- {"version":3,"file":"github.d.ts","sourceRoot":"","sources":["../../../oauth/providers/github.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAY,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAA;AAuE5E,wBAAgB,MAAM,CAAC,MAAM,EAAE,mBAAmB,GAAG,aAAa,CAAC,QAAQ,CAAC,CA2B3E"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"google.d.ts","sourceRoot":"","sources":["../../../oauth/providers/google.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAY,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAA;AAmC5E,wBAAgB,MAAM,CAAC,MAAM,EAAE,mBAAmB,GAAG,aAAa,CAAC,QAAQ,CAAC,CA4B3E"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"microsoft.d.ts","sourceRoot":"","sources":["../../../oauth/providers/microsoft.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAY,aAAa,EAAE,mBAAmB,EAAE,MAAM,UAAU,CAAA;AAS5E,UAAU,eAAgB,SAAQ,mBAAmB;IACnD,MAAM,CAAC,EAAE,QAAQ,GAAG,eAAe,GAAG,WAAW,GAAG,MAAM,CAAA;CAC3D;AAiGD,wBAAgB,SAAS,CAAC,MAAM,EAAE,eAAe,GAAG,aAAa,CAAC,WAAW,CAAC,CAiC7E"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../oauth/utils.ts"],"names":[],"mappings":"AAEA,wBAAgB,eAAe;;;EAQ9B"}
@@ -1,3 +0,0 @@
1
- // TODO: Bun runtime helper implementation
2
- export declare const _bunRuntimePlaceholder = true;
3
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../runtimes/bun/index.ts"],"names":[],"mappings":"AAAA,0CAA0C;AAC1C,eAAO,MAAM,sBAAsB,OAAO,CAAA"}
@@ -1,2 +0,0 @@
1
- import{a}from"../../chunk-LWBWVQD2.js";export{a as _bunRuntimePlaceholder};
2
- //# sourceMappingURL=index.js.map
@@ -1,3 +0,0 @@
1
- export * from './bun';
2
- export * from './tauri';
3
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../runtimes/index.ts"],"names":[],"mappings":"AAAA,cAAc,OAAO,CAAA;AACrB,cAAc,SAAS,CAAA"}
@@ -1,2 +0,0 @@
1
- import{a as r,b as e,c as f,d as m,e as p,f as t,g as x}from"../chunk-4SBVHUU4.js";import{a as o}from"../chunk-LWBWVQD2.js";export{o as _bunRuntimePlaceholder,x as clearSessionToken,t as getSessionToken,m as handleTauriDeepLink,r as isTauri,f as setupTauriListener,e as signInWithTauri,p as storeSessionToken};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../runtimes/tauri/index.ts"],"names":[],"mappings":"AAGA,eAAO,MAAM,OAAO,SAA6C,CAAA;AAEjE,wBAAsB,eAAe,CACnC,QAAQ,EAAE,MAAM,EAChB,OAAO,EAAE,MAAM,EACf,MAAM,GAAE,MAAc,EACtB,gBAAgB,CAAC,EAAE,MAAM,iBAsB1B;AAED,wBAAgB,kBAAkB,CAAC,OAAO,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,CAAC,IAAI,CAAC,QAOzE;AAED,wBAAgB,mBAAmB,CAAC,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,CAAC,KAAK,EAAE,MAAM,KAAK,IAAI,QASjH;AAED,wBAAgB,iBAAiB,CAAC,KAAK,EAAE,MAAM,QAQ9C;AAED,wBAAgB,eAAe,IAAI,MAAM,GAAG,IAAI,CAI/C;AAED,wBAAgB,iBAAiB,SAQhC"}
@@ -1,2 +0,0 @@
1
- import{a,b,c,d,e,f,g}from"../../chunk-4SBVHUU4.js";export{g as clearSessionToken,f as getSessionToken,d as handleTauriDeepLink,a as isTauri,c as setupTauriListener,b as signInWithTauri,e as storeSessionToken};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../solidstart/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,SAAS,CAAA;AAChD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAC7C,OAAO,EAAE,UAAU,EAAiB,MAAM,SAAS,CAAA;AAEnD,KAAK,YAAY,CAAC,UAAU,SAAS,aAAa,CAAC,GAAG,CAAC,EAAE,IAAI,UAAU,CAAC,OAAO,UAAU,CAAC,UAAU,CAAC,CAAC,CAAA;AAEtG;;;;;;;;;;;GAWG;AACH,wBAAgB,SAAS,CAAC,KAAK,CAAC,UAAU,SAAS,aAAa,CAAC,GAAG,CAAC,EAAE,EAAE,aAAa,EAAE,iBAAiB,CAAC,UAAU,CAAC,GAAG,YAAY,CAAC,UAAU,CAAC;;;;EAe/I"}
@@ -1,2 +0,0 @@
1
- import{k as r,l as n}from"../chunk-2I7P37NO.js";function c(e){let o="providerMap"in e&&"signJWT"in e?e:r(e),s=n(o),t=a=>s(a.request);return{GET:t,POST:t,OPTIONS:t}}export{c as SolidAuth};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../../solidstart/index.ts"],"sourcesContent":["import type { CreateAuthOptions } from '../core'\r\nimport type { OAuthProvider } from '../oauth'\r\nimport { createAuth, createHandler } from '../core'\r\n\r\ntype AuthInstance<TProviders extends OAuthProvider<any>[]> = ReturnType<typeof createAuth<TProviders>>\r\n\r\n/**\r\n * Creates GET and POST handlers for SolidStart.\r\n *\r\n * @example\r\n * ```ts\r\n * // src/routes/api/auth/[...auth].ts\r\n * import { SolidAuth } from '@rttnd/gau/solid-start'\r\n * import { authOptions } from '~/server/auth'\r\n *\r\n * export const { GET, POST } = SolidAuth(authOptions)\r\n * ```\r\n */\r\nexport function SolidAuth<const TProviders extends OAuthProvider<any>[]>(optionsOrAuth: CreateAuthOptions<TProviders> | AuthInstance<TProviders>) {\r\n // TODO: Duck-type to check if we have an instance or raw options\r\n const isInstance = 'providerMap' in optionsOrAuth && 'signJWT' in optionsOrAuth\r\n\r\n const auth = isInstance\r\n ? (optionsOrAuth as AuthInstance<TProviders>)\r\n : createAuth(optionsOrAuth as CreateAuthOptions<TProviders>)\r\n\r\n const handler = createHandler(auth)\r\n const solidHandler = (event: any) => handler(event.request)\r\n return {\r\n GET: solidHandler,\r\n POST: solidHandler,\r\n OPTIONS: solidHandler,\r\n }\r\n}\r\n"],"mappings":"gDAkBO,SAASA,EAAyDC,EAAyE,CAIhJ,IAAMC,EAFa,gBAAiBD,GAAiB,YAAaA,EAG7DA,EACDE,EAAWF,CAA8C,EAEvDG,EAAUC,EAAcH,CAAI,EAC5BI,EAAgBC,GAAeH,EAAQG,EAAM,OAAO,EAC1D,MAAO,CACL,IAAKD,EACL,KAAMA,EACN,QAASA,CACX,CACF","names":["SolidAuth","optionsOrAuth","auth","createAuth","handler","createHandler","solidHandler","event"]}
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../sveltekit/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,MAAM,EAAE,YAAY,EAAE,MAAM,eAAe,CAAA;AACzD,OAAO,KAAK,EAAE,iBAAiB,EAAiB,MAAM,SAAS,CAAA;AAC/D,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,UAAU,CAAA;AAC7C,OAAO,EAAE,UAAU,EAAoD,MAAM,SAAS,CAAA;AAEtF,KAAK,YAAY,CAAC,UAAU,SAAS,aAAa,CAAC,GAAG,CAAC,EAAE,IAAI,UAAU,CAAC,OAAO,UAAU,CAAC,UAAU,CAAC,CAAC,CAAA;AAEtG;;;;;;;;;;;GAWG;AACH,wBAAgB,aAAa,CAAC,KAAK,CAAC,UAAU,SAAS,aAAa,CAAC,GAAG,CAAC,EAAE,EAAE,aAAa,EAAE,iBAAiB,CAAC,UAAU,CAAC,GAAG,YAAY,CAAC,UAAU,CAAC;;;;;EA4CnJ"}
@@ -1,2 +0,0 @@
1
- import{b as i,e as a,k as u,l as d}from"../chunk-2I7P37NO.js";function T(t){let n="providerMap"in t&&"signJWT"in t?t:u(t),c=d(n),r=e=>c(e.request);return{GET:r,POST:r,OPTIONS:r,handle:async({event:e,resolve:h})=>(e.locals.getSession=async()=>{let s=i(e.request.headers.get("Cookie")).get(a);if(!s){let o=e.request.headers.get("Authorization");o?.startsWith("Bearer ")&&(s=o.substring(7))}if(!s)return null;try{return await n.validateSession(s)}catch{return null}},h(e))}}export{T as SvelteKitAuth};
2
- //# sourceMappingURL=index.js.map
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../../sveltekit/index.ts"],"sourcesContent":["import type { Handle, RequestEvent } from '@sveltejs/kit'\r\nimport type { CreateAuthOptions, Session, User } from '../core'\r\nimport type { OAuthProvider } from '../oauth'\r\nimport { createAuth, createHandler, parseCookies, SESSION_COOKIE_NAME } from '../core'\r\n\r\ntype AuthInstance<TProviders extends OAuthProvider<any>[]> = ReturnType<typeof createAuth<TProviders>>\r\n\r\n/**\r\n * Creates GET and POST handlers for SvelteKit.\r\n *\r\n * @example\r\n * ```ts\r\n * // src/routes/api/auth/[...gau]/+server.ts\r\n * import { SvelteKitAuth } from '@rttnd/gau/sveltekit'\r\n * import { auth } from '$lib/server/auth'\r\n *\r\n * export const { GET, POST } = SvelteKitAuth(auth)\r\n * ```\r\n */\r\nexport function SvelteKitAuth<const TProviders extends OAuthProvider<any>[]>(optionsOrAuth: CreateAuthOptions<TProviders> | AuthInstance<TProviders>) {\r\n // TODO: Duck-type to check if we have an instance or raw options\r\n const isInstance = 'providerMap' in optionsOrAuth && 'signJWT' in optionsOrAuth\r\n\r\n const auth = isInstance\r\n ? (optionsOrAuth as AuthInstance<TProviders>)\r\n : createAuth(optionsOrAuth as CreateAuthOptions<TProviders>)\r\n\r\n const handler = createHandler(auth)\r\n const sveltekitHandler = (event: RequestEvent) => handler(event.request)\r\n\r\n const handle: Handle = async ({ event, resolve }) => {\r\n (event.locals as any).getSession = async (): Promise<{\r\n user: User\r\n session: Session\r\n } | null> => {\r\n const requestCookies = parseCookies(event.request.headers.get('Cookie'))\r\n let sessionToken = requestCookies.get(SESSION_COOKIE_NAME)\r\n\r\n if (!sessionToken) {\r\n const authHeader = event.request.headers.get('Authorization')\r\n if (authHeader?.startsWith('Bearer '))\r\n sessionToken = authHeader.substring(7)\r\n }\r\n\r\n if (!sessionToken)\r\n return null\r\n\r\n try {\r\n return await auth.validateSession(sessionToken)\r\n }\r\n catch {\r\n return null\r\n }\r\n }\r\n return resolve(event)\r\n }\r\n\r\n return {\r\n GET: sveltekitHandler,\r\n POST: sveltekitHandler,\r\n OPTIONS: sveltekitHandler,\r\n handle,\r\n }\r\n}\r\n"],"mappings":"8DAmBO,SAASA,EAA6DC,EAAyE,CAIpJ,IAAMC,EAFa,gBAAiBD,GAAiB,YAAaA,EAG7DA,EACDE,EAAWF,CAA8C,EAEvDG,EAAUC,EAAcH,CAAI,EAC5BI,EAAoBC,GAAwBH,EAAQG,EAAM,OAAO,EA6BvE,MAAO,CACL,IAAKD,EACL,KAAMA,EACN,QAASA,EACT,OA/BqB,MAAO,CAAE,MAAAC,EAAO,QAAAC,CAAQ,KAC5CD,EAAM,OAAe,WAAa,SAGtB,CAEX,IAAIE,EADmBC,EAAaH,EAAM,QAAQ,QAAQ,IAAI,QAAQ,CAAC,EACrC,IAAII,CAAmB,EAEzD,GAAI,CAACF,EAAc,CACjB,IAAMG,EAAaL,EAAM,QAAQ,QAAQ,IAAI,eAAe,EACxDK,GAAY,WAAW,SAAS,IAClCH,EAAeG,EAAW,UAAU,CAAC,EACzC,CAEA,GAAI,CAACH,EACH,OAAO,KAET,GAAI,CACF,OAAO,MAAMP,EAAK,gBAAgBO,CAAY,CAChD,MACM,CACJ,OAAO,IACT,CACF,EACOD,EAAQD,CAAK,EAQtB,CACF","names":["SvelteKitAuth","optionsOrAuth","auth","createAuth","handler","createHandler","sveltekitHandler","event","resolve","sessionToken","parseCookies","SESSION_COOKIE_NAME","authHeader"]}
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes
File without changes