@schemavaults/auth-server-sdk 0.22.47 → 0.22.49
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli.cjs +2 -2
- package/dist/redirect-with-error.js +5 -5
- package/dist/redirect-with-error.js.map +1 -1
- package/dist/route_guards/withAuthenticatedRouteGuard/initDefaultJwtKeyManagerForAuthenticatedRouteGuard.js +13 -1
- package/dist/route_guards/withAuthenticatedRouteGuard/initDefaultJwtKeyManagerForAuthenticatedRouteGuard.js.map +1 -1
- package/dist/route_guards/withAuthenticatedRouteGuard/withAuthenticatedServerComponentRouteGuard.js +43 -10
- package/dist/route_guards/withAuthenticatedRouteGuard/withAuthenticatedServerComponentRouteGuard.js.map +1 -1
- package/package.json +1 -1
package/dist/cli.cjs
CHANGED
|
@@ -89,7 +89,7 @@ var init_resolve_codegen_templates_directory = __esm({
|
|
|
89
89
|
|
|
90
90
|
// src/NextjsAppDirectoryPlugin/codegen-marker.ts
|
|
91
91
|
function getCodegenMarkerComment() {
|
|
92
|
-
const version = true ? "0.22.
|
|
92
|
+
const version = true ? "0.22.49" : "unknown";
|
|
93
93
|
return `${CODEGEN_MARKER_PREFIX}${version}`;
|
|
94
94
|
}
|
|
95
95
|
function hasCodegenMarker(firstLine) {
|
|
@@ -331,7 +331,7 @@ async function main() {
|
|
|
331
331
|
return;
|
|
332
332
|
}
|
|
333
333
|
if (args.includes("--version") || args.includes("-v")) {
|
|
334
|
-
console.log(`${PACKAGE_NAME}@${"0.22.
|
|
334
|
+
console.log(`${PACKAGE_NAME}@${"0.22.49"}`);
|
|
335
335
|
return;
|
|
336
336
|
}
|
|
337
337
|
const command = args.find((arg) => !arg.startsWith("-")) ?? "codegen";
|
|
@@ -1,7 +1,5 @@
|
|
|
1
1
|
import { isValidErrorId, } from "@schemavaults/auth-common";
|
|
2
|
-
import { getAppEnvironment, } from "@schemavaults/app-definitions";
|
|
3
2
|
export function redirectWithError(redirect, error_code = 500, error_id = "unknown", error_page_url = "/auth/error") {
|
|
4
|
-
const environment = getAppEnvironment();
|
|
5
3
|
if (!isValidErrorId(error_id)) {
|
|
6
4
|
throw new Error("Invalid error ID to redirect to error page with!");
|
|
7
5
|
}
|
|
@@ -9,9 +7,11 @@ export function redirectWithError(redirect, error_code = 500, error_id = "unknow
|
|
|
9
7
|
searchParams.set("error", `${error_code}`);
|
|
10
8
|
searchParams.set("error_id", error_id);
|
|
11
9
|
const errorPageUrl = `${error_page_url}?${searchParams.toString()}`;
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
10
|
+
// Always log error-page redirects (in every environment) so production
|
|
11
|
+
// misconfigurations are diagnosable from server logs. The caller is
|
|
12
|
+
// expected to have already logged the *cause*; this is the audit trail
|
|
13
|
+
// for the redirect itself.
|
|
14
|
+
console.warn(`[redirectWithError] Redirecting to error page '${errorPageUrl}' (error_code=${error_code}, error_id='${error_id}')`);
|
|
15
15
|
redirect(errorPageUrl);
|
|
16
16
|
}
|
|
17
17
|
export default redirectWithError;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"redirect-with-error.js","sourceRoot":"","sources":["../src/redirect-with-error.ts"],"names":[],"mappings":"AACA,OAAO,EACL,cAAc,GAEf,MAAM,2BAA2B,CAAC;
|
|
1
|
+
{"version":3,"file":"redirect-with-error.js","sourceRoot":"","sources":["../src/redirect-with-error.ts"],"names":[],"mappings":"AACA,OAAO,EACL,cAAc,GAEf,MAAM,2BAA2B,CAAC;AAEnC,MAAM,UAAU,iBAAiB,CAC/B,QAA2E,EAC3E,aAAqB,GAAG,EACxB,WAAoC,SAAS,EAC7C,iBAAyB,aAAa;IAEtC,IAAI,CAAC,cAAc,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC9B,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;IACtE,CAAC;IAED,MAAM,YAAY,GAAG,IAAI,eAAe,EAAE,CAAC;IAE3C,YAAY,CAAC,GAAG,CAAC,OAAO,EAAE,GAAG,UAAU,EAAW,CAAC,CAAC;IACpD,YAAY,CAAC,GAAG,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;IAEvC,MAAM,YAAY,GAAG,GAAG,cAAc,IAAI,YAAY,CAAC,QAAQ,EAAE,EAAW,CAAC;IAE7E,uEAAuE;IACvE,oEAAoE;IACpE,uEAAuE;IACvE,2BAA2B;IAC3B,OAAO,CAAC,IAAI,CACV,kDAAkD,YAAY,iBAAiB,UAAU,eAAe,QAAQ,IAAI,CACrH,CAAC;IACF,QAAQ,CAAC,YAAY,CAAC,CAAC;AACzB,CAAC;AAED,eAAe,iBAAiB,CAAC"}
|
|
@@ -2,8 +2,20 @@ import getSchemaVaultsAuthServerUri from "../../env/get-schemavaults-auth-server
|
|
|
2
2
|
import RemoteJwtKeyManager from "../../JwtKeyManager/RemoteJwtKeyManager";
|
|
3
3
|
// default key manager is RemoteJwtKeyManager-- makes it easier for external apps, we can overwrite this once for the auth server
|
|
4
4
|
export function initDefaultJwtKeyManagerForAuthenticatedRouteGuard(debug = process.env.NODE_ENV === "development") {
|
|
5
|
+
let auth_server_uri;
|
|
6
|
+
try {
|
|
7
|
+
auth_server_uri = getSchemaVaultsAuthServerUri();
|
|
8
|
+
}
|
|
9
|
+
catch (e) {
|
|
10
|
+
// getSchemaVaultsAuthServerUri() throws when SCHEMAVAULTS_AUTH_SERVER_URI
|
|
11
|
+
// is set to an invalid value (wrong protocol, or http:// in
|
|
12
|
+
// production/staging). Surface this in the logs before letting the
|
|
13
|
+
// exception propagate up to the route guard.
|
|
14
|
+
console.error("[initDefaultJwtKeyManagerForAuthenticatedRouteGuard] Failed to resolve auth server URI from environment. Check the 'SCHEMAVAULTS_AUTH_SERVER_URI' environment variable (must start with 'https://' in production/staging). Underlying error: ", e);
|
|
15
|
+
throw e;
|
|
16
|
+
}
|
|
5
17
|
return new RemoteJwtKeyManager({
|
|
6
|
-
auth_server_uri
|
|
18
|
+
auth_server_uri,
|
|
7
19
|
debug,
|
|
8
20
|
});
|
|
9
21
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"initDefaultJwtKeyManagerForAuthenticatedRouteGuard.js","sourceRoot":"","sources":["../../../src/route_guards/withAuthenticatedRouteGuard/initDefaultJwtKeyManagerForAuthenticatedRouteGuard.ts"],"names":[],"mappings":"AAAA,OAAO,4BAA4B,MAAM,wCAAwC,CAAC;AAElF,OAAO,mBAAmB,MAAM,qCAAqC,CAAC;AAEtE,iIAAiI;AACjI,MAAM,UAAU,kDAAkD,CAChE,QAAiB,OAAO,CAAC,GAAG,CAAC,QAAQ,KAAK,aAAa;IAEvD,
|
|
1
|
+
{"version":3,"file":"initDefaultJwtKeyManagerForAuthenticatedRouteGuard.js","sourceRoot":"","sources":["../../../src/route_guards/withAuthenticatedRouteGuard/initDefaultJwtKeyManagerForAuthenticatedRouteGuard.ts"],"names":[],"mappings":"AAAA,OAAO,4BAA4B,MAAM,wCAAwC,CAAC;AAElF,OAAO,mBAAmB,MAAM,qCAAqC,CAAC;AAEtE,iIAAiI;AACjI,MAAM,UAAU,kDAAkD,CAChE,QAAiB,OAAO,CAAC,GAAG,CAAC,QAAQ,KAAK,aAAa;IAEvD,IAAI,eAAuB,CAAC;IAC5B,IAAI,CAAC;QACH,eAAe,GAAG,4BAA4B,EAAE,CAAC;IACnD,CAAC;IAAC,OAAO,CAAU,EAAE,CAAC;QACpB,0EAA0E;QAC1E,4DAA4D;QAC5D,mEAAmE;QACnE,6CAA6C;QAC7C,OAAO,CAAC,KAAK,CACX,+OAA+O,EAC/O,CAAC,CACF,CAAC;QACF,MAAM,CAAC,CAAC;IACV,CAAC;IACD,OAAO,IAAI,mBAAmB,CAAC;QAC7B,eAAe;QACf,KAAK;KACN,CAAC,CAAC;AACL,CAAC;AAED,eAAe,kDAAkD,CAAC"}
|
package/dist/route_guards/withAuthenticatedRouteGuard/withAuthenticatedServerComponentRouteGuard.js
CHANGED
|
@@ -8,6 +8,7 @@ import RouteGuardFactory from "../../route_guards/route-guard-factory";
|
|
|
8
8
|
import { AccessTokenCookieName } from "../../AccessTokenCookieNames";
|
|
9
9
|
import { RefreshTokenCookieName } from "../../RefreshTokenCookieNames";
|
|
10
10
|
import getSchemavaultsApiServerId from "../../env/get-schemavaults-api-server-id";
|
|
11
|
+
import { JWKS_ACCESS_PRIVATE_KEY_ENV_VAR_NAME } from "../../env/loadJwksAccessPrivateKey";
|
|
11
12
|
import redirectToLogin from "../../redirect-to-login";
|
|
12
13
|
import assertValidRouteGuardType from "../../route_guards/assertValidRouteGuardType";
|
|
13
14
|
import initDefaultJwtKeyManagerForAuthenticatedRouteGuard from "./initDefaultJwtKeyManagerForAuthenticatedRouteGuard";
|
|
@@ -54,13 +55,13 @@ additional_custom_server_component_props = undefined, opts) {
|
|
|
54
55
|
}
|
|
55
56
|
}
|
|
56
57
|
catch (e) {
|
|
57
|
-
console.error(
|
|
58
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] Received bad 'api_server_id' in options object (got typeof='${typeof opts?.api_server_id}', value='${String(opts?.api_server_id)}'). Redirecting to error page with 'server_misconfiguration'. Underlying error: `, e);
|
|
58
59
|
redirectToErrorPage(500, "server_misconfiguration");
|
|
59
60
|
}
|
|
60
61
|
async function parseApiServerIdFromEnvironmentVariables() {
|
|
61
62
|
const parsed_api_server_id = await apiServerIdSchema.safeParseAsync(getSchemavaultsApiServerId());
|
|
62
63
|
if (!parsed_api_server_id.success) {
|
|
63
|
-
console.error("[withAuthenticatedServerComponentRouteGuard] Did not receive a valid API server ID from
|
|
64
|
+
console.error("[withAuthenticatedServerComponentRouteGuard] Did not receive a valid API server ID from the 'SCHEMAVAULTS_API_SERVER_ID' environment variable: ", parsed_api_server_id.error);
|
|
64
65
|
throw parsed_api_server_id.error;
|
|
65
66
|
}
|
|
66
67
|
return parsed_api_server_id.data;
|
|
@@ -72,19 +73,47 @@ additional_custom_server_component_props = undefined, opts) {
|
|
|
72
73
|
await parseApiServerIdFromEnvironmentVariables();
|
|
73
74
|
}
|
|
74
75
|
catch (e) {
|
|
75
|
-
console.error("[withAuthenticatedServerComponentRouteGuard] Failed to
|
|
76
|
+
console.error("[withAuthenticatedServerComponentRouteGuard] Failed to resolve 'api_server_id'. No 'api_server_id' option was provided and reading the 'SCHEMAVAULTS_API_SERVER_ID' environment variable failed. Redirecting to error page with 'server_misconfiguration'. Underlying error: ", e);
|
|
76
77
|
redirectToErrorPage(500, "server_misconfiguration");
|
|
77
78
|
}
|
|
78
79
|
}
|
|
79
80
|
if (typeof extracted_api_server_id !== "string") {
|
|
80
|
-
console.error("[withAuthenticatedServerComponentRouteGuard] Failed to parse 'api_server_id' from either options or environment
|
|
81
|
+
console.error("[withAuthenticatedServerComponentRouteGuard] Failed to parse 'api_server_id' from either the options object or the 'SCHEMAVAULTS_API_SERVER_ID' environment variable. Redirecting to error page with 'server_misconfiguration'.");
|
|
81
82
|
redirectToErrorPage(500, "server_misconfiguration");
|
|
82
83
|
}
|
|
83
84
|
const api_server_id = extracted_api_server_id;
|
|
84
|
-
|
|
85
|
-
|
|
85
|
+
let jwt_keys_manager;
|
|
86
|
+
if (typeof opts?.jwt_keys_manager !== "undefined") {
|
|
87
|
+
jwt_keys_manager = opts.jwt_keys_manager;
|
|
88
|
+
}
|
|
89
|
+
else {
|
|
90
|
+
try {
|
|
91
|
+
jwt_keys_manager = initDefaultJwtKeyManagerForAuthenticatedRouteGuard();
|
|
92
|
+
}
|
|
93
|
+
catch (e) {
|
|
94
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] Failed to construct the default JWT Keys Manager for api_server_id='${api_server_id}'. Redirecting to error page with 'server_misconfiguration'. Underlying error: `, e);
|
|
95
|
+
redirectToErrorPage(500, "server_misconfiguration");
|
|
96
|
+
}
|
|
97
|
+
}
|
|
86
98
|
if (!jwt_keys_manager.isConfigured()) {
|
|
87
|
-
|
|
99
|
+
// Try to diagnose *why* the manager is unconfigured so the operator can
|
|
100
|
+
// fix the deploy without having to read the SDK source. The default
|
|
101
|
+
// JwtKeyManager (RemoteJwtKeyManager) requires the JWKS access private
|
|
102
|
+
// key env var; if the caller supplied a custom manager, we can't know
|
|
103
|
+
// which env vars it needs, so report only what we can.
|
|
104
|
+
const missing_env_vars = [];
|
|
105
|
+
if (typeof process.env[JWKS_ACCESS_PRIVATE_KEY_ENV_VAR_NAME] !== "string" ||
|
|
106
|
+
process.env[JWKS_ACCESS_PRIVATE_KEY_ENV_VAR_NAME].length === 0) {
|
|
107
|
+
missing_env_vars.push(JWKS_ACCESS_PRIVATE_KEY_ENV_VAR_NAME);
|
|
108
|
+
}
|
|
109
|
+
if (missing_env_vars.length > 0) {
|
|
110
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] JWT Keys Manager is not configured for api_server_id='${api_server_id}'. Missing required environment variable(s): ${missing_env_vars
|
|
111
|
+
.map((v) => `'${v}'`)
|
|
112
|
+
.join(", ")}. Redirecting to error page with 'server_misconfiguration'.`);
|
|
113
|
+
}
|
|
114
|
+
else {
|
|
115
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] JWT Keys Manager (${jwt_keys_manager.constructor?.name ?? "unknown"}) reports it is not configured for api_server_id='${api_server_id}', but no missing env vars were detected. A custom 'jwt_keys_manager' option may be missing configuration. Redirecting to error page with 'server_misconfiguration'.`);
|
|
116
|
+
}
|
|
88
117
|
redirectToErrorPage(500, "server_misconfiguration");
|
|
89
118
|
}
|
|
90
119
|
const cookies = await loadCookies();
|
|
@@ -141,12 +170,15 @@ additional_custom_server_component_props = undefined, opts) {
|
|
|
141
170
|
}
|
|
142
171
|
const user = route_guard.user;
|
|
143
172
|
if (user.disabled) {
|
|
173
|
+
console.warn(`[withAuthenticatedServerComponentRouteGuard] Blocking disabled user '${user.uid}' from api_server_id='${api_server_id}'. Redirecting to error page with 'account_disabled'.`);
|
|
144
174
|
return redirectToErrorPage(403, "account_disabled");
|
|
145
175
|
}
|
|
146
176
|
if (!route_guard.isAccessAllowed()) {
|
|
177
|
+
console.warn(`[withAuthenticatedServerComponentRouteGuard] Access denied for user '${user.uid}' on api_server_id='${api_server_id}' (route_guard.isAccessAllowed() returned false). Redirecting to error page with 'forbidden'.`);
|
|
147
178
|
redirectToErrorPage(403, "forbidden");
|
|
148
179
|
}
|
|
149
180
|
if (!user.admin && route_guard_type === "admin") {
|
|
181
|
+
console.warn(`[withAuthenticatedServerComponentRouteGuard] Non-admin user '${user.uid}' attempted to access an 'admin' route_guard on api_server_id='${api_server_id}'. Redirecting to error page with 'forbidden'.`);
|
|
150
182
|
redirectToErrorPage(403, "forbidden");
|
|
151
183
|
}
|
|
152
184
|
if (typeof server_component !== "function") {
|
|
@@ -190,7 +222,7 @@ additional_custom_server_component_props = undefined, opts) {
|
|
|
190
222
|
if (opts?.required_organization && !user.admin) {
|
|
191
223
|
const required_organization = opts?.required_organization;
|
|
192
224
|
if (!isValidOrganizationID(required_organization)) {
|
|
193
|
-
console.error(
|
|
225
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] Invalid organization ID passed as 'required_organization' option: '${String(required_organization)}'. Redirecting to error page with 'server_misconfiguration'.`);
|
|
194
226
|
redirectToErrorPage(500, "server_misconfiguration");
|
|
195
227
|
}
|
|
196
228
|
let org_role = false;
|
|
@@ -198,7 +230,7 @@ additional_custom_server_component_props = undefined, opts) {
|
|
|
198
230
|
org_role = await isUserInOrganization(user, required_organization);
|
|
199
231
|
}
|
|
200
232
|
catch (e) {
|
|
201
|
-
console.error(
|
|
233
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] Organization membership check failed for user '${user.uid}' / required_organization='${required_organization}' / api_server_id='${api_server_id}'. Redirecting to error page with 'internal_server_error'. Underlying error: `, e);
|
|
202
234
|
redirectToErrorPage(500, "internal_server_error");
|
|
203
235
|
}
|
|
204
236
|
if (org_role === false || !org_role) {
|
|
@@ -213,10 +245,11 @@ additional_custom_server_component_props = undefined, opts) {
|
|
|
213
245
|
is_authorized = await custom_is_authorized_check(final_server_component_props);
|
|
214
246
|
}
|
|
215
247
|
catch (e) {
|
|
216
|
-
console.error(
|
|
248
|
+
console.error(`[withAuthenticatedServerComponentRouteGuard] Error in 'custom_is_authorized_check' handler for user '${user.uid}' on api_server_id='${api_server_id}'. Redirecting to error page with 'internal_server_error'. Underlying error: `, e);
|
|
217
249
|
redirectToErrorPage(500, "internal_server_error");
|
|
218
250
|
}
|
|
219
251
|
if (!is_authorized) {
|
|
252
|
+
console.warn(`[withAuthenticatedServerComponentRouteGuard] 'custom_is_authorized_check' returned false for user '${user.uid}' on api_server_id='${api_server_id}'. Redirecting to error page with 'forbidden'.`);
|
|
220
253
|
redirectToErrorPage(403, "forbidden");
|
|
221
254
|
}
|
|
222
255
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"withAuthenticatedServerComponentRouteGuard.js","sourceRoot":"","sources":["../../../src/route_guards/withAuthenticatedRouteGuard/withAuthenticatedServerComponentRouteGuard.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,wBAAwB,EAExB,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,cAAc,GAGf,MAAM,2BAA2B,CAAC;AAKnC,OAAO,kCAAkC,MAAM,wBAAwB,CAAC;AACxE,OAAO,4BAA4B,MAAM,wCAAwC,CAAC;AAClF,OAAO,wBAAwB,MAAM,yDAAyD,CAAC;AAG/F,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,iBAAiB,MAAM,oCAAoC,CAAC;AACnE,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AACjE,OAAO,EAAE,sBAAsB,EAAE,MAAM,2BAA2B,CAAC;AACnE,OAAO,0BAA0B,MAAM,sCAAsC,CAAC;
|
|
1
|
+
{"version":3,"file":"withAuthenticatedServerComponentRouteGuard.js","sourceRoot":"","sources":["../../../src/route_guards/withAuthenticatedRouteGuard/withAuthenticatedServerComponentRouteGuard.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,wBAAwB,EAExB,iBAAiB,EACjB,iBAAiB,GAClB,MAAM,+BAA+B,CAAC;AACvC,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,cAAc,GAGf,MAAM,2BAA2B,CAAC;AAKnC,OAAO,kCAAkC,MAAM,wBAAwB,CAAC;AACxE,OAAO,4BAA4B,MAAM,wCAAwC,CAAC;AAClF,OAAO,wBAAwB,MAAM,yDAAyD,CAAC;AAG/F,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,iBAAiB,MAAM,oCAAoC,CAAC;AACnE,OAAO,EAAE,qBAAqB,EAAE,MAAM,0BAA0B,CAAC;AACjE,OAAO,EAAE,sBAAsB,EAAE,MAAM,2BAA2B,CAAC;AACnE,OAAO,0BAA0B,MAAM,sCAAsC,CAAC;AAC9E,OAAO,EAAE,oCAAoC,EAAE,MAAM,gCAAgC,CAAC;AAEtF,OAAO,eAAe,MAAM,qBAAqB,CAAC;AAClD,OAAO,yBAAyB,MAAM,0CAA0C,CAAC;AAEjF,OAAO,kDAAkD,MAAM,sDAAsD,CAAC;AAqCtH,MAAM,CAAC,KAAK,UAAU,0CAA0C;AAI9D,iCAAiC;AACjC,gBAAoE;AAEpE,sGAAsG;AACtG,2CAEgB,SAAS,EACzB,IAAmE;IAEnE,MAAM,gBAAgB,GACpB,IAAI,EAAE,gBAAgB,IAAI,eAAe,CAAC;IAC5C,yBAAyB,CAAC,gBAAgB,CAAC,CAAC;IAE5C,IACE,OAAO,IAAI,EAAE,cAAc,KAAK,WAAW;QAC3C,OAAO,IAAI,EAAE,cAAc,KAAK,QAAQ,EACxC,CAAC;QACD,MAAM,IAAI,SAAS,CACjB,qEAAqE,OAAO,IAAI,EAAE,cAAc,EAAE,CACnG,CAAC;IACJ,CAAC;IACD,MAAM,cAAc,GAAW,IAAI,EAAE,cAAc,IAAI,aAAa,CAAC;IAErE,MAAM,WAAW,GAA+B,iBAAiB,EAAE,CAAC;IAEpE,MAAM,CAAC,WAAW,EAAE,QAAQ,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;QAChD,MAAM,CAAC,cAAc,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,OAAO,CAAC;QACjD,MAAM,CAAC,iBAAiB,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC;KACtD,CAAC,CAAC;IACH,IAAI,OAAO,WAAW,KAAK,UAAU,EAAE,CAAC;QACtC,MAAM,IAAI,SAAS,CAAC,yCAAyC,CAAC,CAAC;IACjE,CAAC;SAAM,IAAI,OAAO,QAAQ,KAAK,UAAU,EAAE,CAAC;QAC1C,MAAM,IAAI,SAAS,CAAC,sCAAsC,CAAC,CAAC;IAC9D,CAAC;IAED,SAAS,mBAAmB,CAC1B,UAAkB,EAClB,QAAiD;QAEjD,OAAO,iBAAiB,CAAC,QAAQ,EAAE,UAAU,EAAE,QAAQ,EAAE,cAAc,CAAC,CAAC;IAC3E,CAAC;IAED,IAAI,uBAAuB,GAA4B,SAAS,CAAC;IACjE,KAAK,UAAU,yCAAyC;QACtD,MAAM,oBAAoB,GAAG,MAAM,iBAAiB,CAAC,cAAc,CACjE,IAAI,EAAE,aAAa,CACpB,CAAC;QACF,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAAE,CAAC;YAClC,OAAO,CAAC,KAAK,CACX,gKAAgK,EAChK,oBAAoB,CAAC,KAAK,CAC3B,CAAC;YACF,MAAM,oBAAoB,CAAC,KAAK,CAAC;QACnC,CAAC;QACD,OAAO,oBAAoB,CAAC,IAAI,CAAC;IACnC,CAAC;IAED,IAAI,CAAC;QACH,IACE,OAAO,IAAI,EAAE,aAAa,KAAK,QAAQ;YACvC,IAAI,CAAC,aAAa,CAAC,MAAM,GAAG,CAAC,EAC7B,CAAC;YACD,uBAAuB;gBACrB,MAAM,yCAAyC,EAAE,CAAC;QACtD,CAAC;IACH,CAAC;IAAC,OAAO,CAAU,EAAE,CAAC;QACpB,OAAO,CAAC,KAAK,CACX,4GAA4G,OAAO,IAAI,EAAE,aAAa,aAAa,MAAM,CAAC,IAAI,EAAE,aAAa,CAAC,kFAAkF,EAChQ,CAAC,CACF,CAAC;QACF,mBAAmB,CAAC,GAAG,EAAE,yBAAyB,CAAC,CAAC;IACtD,CAAC;IAED,KAAK,UAAU,wCAAwC;QACrD,MAAM,oBAAoB,GAAG,MAAM,iBAAiB,CAAC,cAAc,CACjE,0BAA0B,EAAE,CAC7B,CAAC;QACF,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAAE,CAAC;YAClC,OAAO,CAAC,KAAK,CACX,iJAAiJ,EACjJ,oBAAoB,CAAC,KAAK,CAC3B,CAAC;YACF,MAAM,oBAAoB,CAAC,KAAK,CAAC;QACnC,CAAC;QACD,OAAO,oBAAoB,CAAC,IAAI,CAAC;IACnC,CAAC;IAED,0FAA0F;IAC1F,IAAI,OAAO,uBAAuB,KAAK,WAAW,EAAE,CAAC;QACnD,IAAI,CAAC;YACH,uBAAuB;gBACrB,MAAM,wCAAwC,EAAE,CAAC;QACrD,CAAC;QAAC,OAAO,CAAU,EAAE,CAAC;YACpB,OAAO,CAAC,KAAK,CACX,+QAA+Q,EAC/Q,CAAC,CACF,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,yBAAyB,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IAED,IAAI,OAAO,uBAAuB,KAAK,QAAQ,EAAE,CAAC;QAChD,OAAO,CAAC,KAAK,CACX,iOAAiO,CAClO,CAAC;QACF,mBAAmB,CAAC,GAAG,EAAE,yBAAyB,CAAC,CAAC;IACtD,CAAC;IACD,MAAM,aAAa,GAAgB,uBAAuB,CAAC;IAE3D,IAAI,gBAAgC,CAAC;IACrC,IAAI,OAAO,IAAI,EAAE,gBAAgB,KAAK,WAAW,EAAE,CAAC;QAClD,gBAAgB,GAAG,IAAI,CAAC,gBAAgB,CAAC;IAC3C,CAAC;SAAM,CAAC;QACN,IAAI,CAAC;YACH,gBAAgB,GAAG,kDAAkD,EAAE,CAAC;QAC1E,CAAC;QAAC,OAAO,CAAU,EAAE,CAAC;YACpB,OAAO,CAAC,KAAK,CACX,oHAAoH,aAAa,iFAAiF,EAClN,CAAC,CACF,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,yBAAyB,CAAC,CAAC;QACtD,CAAC;IACH,CAAC;IACD,IAAI,CAAC,gBAAgB,CAAC,YAAY,EAAE,EAAE,CAAC;QACrC,wEAAwE;QACxE,oEAAoE;QACpE,uEAAuE;QACvE,sEAAsE;QACtE,uDAAuD;QACvD,MAAM,gBAAgB,GAAa,EAAE,CAAC;QACtC,IACE,OAAO,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,KAAK,QAAQ;YACrE,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC,MAAM,KAAK,CAAC,EAC9D,CAAC;YACD,gBAAgB,CAAC,IAAI,CAAC,oCAAoC,CAAC,CAAC;QAC9D,CAAC;QACD,IAAI,gBAAgB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAChC,OAAO,CAAC,KAAK,CACX,sGAAsG,aAAa,gDAAgD,gBAAgB;iBAChL,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,IAAI,CAAC,GAAG,CAAC;iBACpB,IAAI,CACH,IAAI,CACL,6DAA6D,CACjE,CAAC;QACJ,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,KAAK,CACX,kEAAkE,gBAAgB,CAAC,WAAW,EAAE,IAAI,IAAI,SAAS,qDAAqD,aAAa,sKAAsK,CAC1V,CAAC;QACJ,CAAC;QACD,mBAAmB,CAAC,GAAG,EAAE,yBAAyB,CAAC,CAAC;IACtD,CAAC;IAED,MAAM,OAAO,GAAmB,MAAM,WAAW,EAAE,CAAC;IACpD,IAAI,CAAC,CAAC,KAAK,IAAI,OAAO,CAAC,IAAI,OAAO,OAAO,CAAC,GAAG,KAAK,UAAU,EAAE,CAAC;QAC7D,MAAM,IAAI,SAAS,CACjB,uEAAuE,CACxE,CAAC;IACJ,CAAC;IAED,MAAM,aAAa,GAAkC,EAAE,CAAC;IAExD,qCAAqC;IACrC,IAAI,aAAa,KAAK,wBAAwB,EAAE,CAAC;QAC/C,MAAM,oBAAoB,GAAG,OAAO,CAAC,GAAG,CACtC,sBAAsB,CAAC,wBAAwB,CAAC,CACjD,CAAC;QACF,IAAI,OAAO,oBAAoB,EAAE,KAAK,KAAK,QAAQ,EAAE,CAAC;YACpD,aAAa,CAAC,IAAI,CAAC;gBACjB,UAAU,EAAE,2BAA2B;gBACvC,IAAI,EAAE,SAAS;gBACf,KAAK,EAAE,oBAAoB,CAAC,KAAK;aAClC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,8DAA8D;IAC9D,MAAM,wBAAwB,GAAW,qBAAqB,CAAC,aAAa,CAAC,CAAC;IAC9E,MAAM,mBAAmB,GAAG,OAAO,CAAC,GAAG,CAAC,wBAAwB,CAAC,CAAC;IAClE,IACE,OAAO,mBAAmB,EAAE,KAAK,KAAK,QAAQ;QAC9C,mBAAmB,CAAC,KAAK,CAAC,MAAM,GAAG,EAAE,EACrC,CAAC;QACD,IAAI,UAAU,GAAkB,IAAI,CAAC;QACrC,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,mBAAmB,CAAC,KAAK,CAAC,CAAC;YACrD,IAAI,MAAM,IAAI,OAAO,MAAM,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;gBAC/C,UAAU,GAAG,MAAM,CAAC,KAAK,CAAC;YAC5B,CAAC;QACH,CAAC;QAAC,MAAM,CAAC;YACP,0BAA0B;YAC1B,UAAU,GAAG,mBAAmB,CAAC,KAAK,CAAC;QACzC,CAAC;QACD,IAAI,UAAU,EAAE,CAAC;YACf,aAAa,CAAC,IAAI,CAAC;gBACjB,UAAU,EAAE,6BAA6B,wBAAyC,GAAG;gBACrF,IAAI,EAAE,QAAQ;gBACd,KAAK,EAAE,UAAU;aAClB,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,IAAI,aAAa,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC/B,eAAe,CAAC,QAAQ,CAAC,CAAC;IAC5B,CAAC;IAED,MAAM,mBAAmB,GAAG,IAAI,iBAAiB,CAAC;QAChD,WAAW;QACX,cAAc,EAAE,aAAa,KAAK,wBAAwB;QAC1D,gBAAgB;KACjB,CAAC,CAAC;IACH,MAAM,WAAW,GACf,MAAM,mBAAmB,CAAC,2BAA2B,CACnD,gBAAgB,EAChB,aAAa,EACb,aAAa,CACd,CAAC;IAEJ,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;QACtB,eAAe,CAAC,QAAQ,CAAC,CAAC;IAC5B,CAAC;IACD,MAAM,IAAI,GAAa,WAAW,CAAC,IAAI,CAAC;IAExC,IAAI,IAAI,CAAC,QAAQ,EAAE,CAAC;QAClB,OAAO,CAAC,IAAI,CACV,wEAAwE,IAAI,CAAC,GAAG,yBAAyB,aAAa,uDAAuD,CAC9K,CAAC;QACF,OAAO,mBAAmB,CAAC,GAAG,EAAE,kBAAkB,CAAC,CAAC;IACtD,CAAC;IAED,IAAI,CAAC,WAAW,CAAC,eAAe,EAAE,EAAE,CAAC;QACnC,OAAO,CAAC,IAAI,CACV,wEAAwE,IAAI,CAAC,GAAG,uBAAuB,aAAa,+FAA+F,CACpN,CAAC;QACF,mBAAmB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IACxC,CAAC;IAED,IAAI,CAAC,IAAI,CAAC,KAAK,IAAI,gBAAgB,KAAK,OAAO,EAAE,CAAC;QAChD,OAAO,CAAC,IAAI,CACV,gEAAgE,IAAI,CAAC,GAAG,kEAAkE,aAAa,gDAAgD,CACxM,CAAC;QACF,mBAAmB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;IACxC,CAAC;IAED,IAAI,OAAO,gBAAgB,KAAK,UAAU,EAAE,CAAC;QAC3C,MAAM,IAAI,SAAS,CACjB,mGAAmG,CACpG,CAAC;IACJ,CAAC;IACD,MAAM,yCAAyC,GAAG,gBAAgB,CAAC;IAEnE,KAAK,UAAU,oBAAoB,CACjC,IAAc,EACd,MAAsB;QAEtB,IAAI,CAAC,CAAC,MAAM,cAAc,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YACzD,MAAM,IAAI,SAAS,CACjB,2DAA2D,CAC5D,CAAC;QACJ,CAAC;aAAM,IAAI,CAAC,CAAC,MAAM,oBAAoB,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,EAAE,CAAC;YACxE,MAAM,IAAI,SAAS,CAAC,mDAAmD,CAAC,CAAC;QAC3E,CAAC;QAED,MAAM,8BAA8B,GAAG,IAAI,EAAE,8BAA8B,CAAC;QAE5E,IACE,aAAa,KAAK,wBAAwB;YAC1C,OAAO,8BAA8B,KAAK,UAAU,EACpD,CAAC;YACD,MAAM,IAAI,SAAS,CACjB,kHAAkH,CACnH,CAAC;QACJ,CAAC;QAED,IAAI,OAAO,8BAA8B,KAAK,UAAU,EAAE,CAAC;YACzD,MAAM,QAAQ,GACZ,MAAM,8BAA8B,CAAC,IAAI,EAAE,MAAM,CAAC,CAAC;YACrD,OAAO,QAAQ,CAAC;QAClB,CAAC;QAED,MAAM,eAAe,GAAG,4BAA4B,EAAE,CAAC;QACvD,MAAM,uBAAuB,GAAG,MAAM,wBAAwB,EAAE,CAAC;QAEjE,gFAAgF;QAChF,MAAM,QAAQ,GACZ,MAAM,kCAAkC,CACtC,eAAe,EACf,aAAa,EACb,uBAAuB,EACvB,IAAI,CAAC,GAAG,EACR,MAAM,CACP,CAAC;QACJ,OAAO,QAAQ,CAAC;IAClB,CAAC;IAED,MAAM,2BAA2B,GAC/B;QACE,IAAI;QACJ,WAAW;QACX,oBAAoB;KACrB,CAAC;IAEJ,MAAM,4BAA4B,GAChC,OAAO,wCAAwC,KAAK,QAAQ;QAC5D,wCAAwC;QACtC,CAAC,CAAE;YACC,GAAG,2BAA2B;YAC9B,GAAG,wCAAwC;SACtB;QACzB,CAAC,CAAE,2BAAiD,CAAC;IAEzD,IAAI,IAAI,EAAE,qBAAqB,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;QAC/C,MAAM,qBAAqB,GAAmB,IAAI,EAAE,qBAAqB,CAAC;QAC1E,IAAI,CAAC,qBAAqB,CAAC,qBAAqB,CAAC,EAAE,CAAC;YAClD,OAAO,CAAC,KAAK,CACX,mHAAmH,MAAM,CAAC,qBAAqB,CAAC,8DAA8D,CAC/M,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,yBAAyB,CAAC,CAAC;QACtD,CAAC;QACD,IAAI,QAAQ,GAA2C,KAAK,CAAC;QAC7D,IAAI,CAAC;YACH,QAAQ,GAAG,MAAM,oBAAoB,CAAC,IAAI,EAAE,qBAAqB,CAAC,CAAC;QACrE,CAAC;QAAC,OAAO,CAAU,EAAE,CAAC;YACpB,OAAO,CAAC,KAAK,CACX,+FAA+F,IAAI,CAAC,GAAG,8BAA8B,qBAAqB,sBAAsB,aAAa,+EAA+E,EAC5Q,CAAC,CACF,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,uBAAuB,CAAC,CAAC;QACpD,CAAC;QAED,IAAI,QAAQ,KAAK,KAAK,IAAI,CAAC,QAAQ,EAAE,CAAC;YACpC,OAAO,CAAC,IAAI,CACV,sDAAsD,IAAI,CAAC,GAAG,qDAAqD,qBAAqB,IAAI,CAC7I,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,6BAA6B,CAAC,CAAC;QAC1D,CAAC;IACH,CAAC;IAED,IAAI,OAAO,IAAI,EAAE,0BAA0B,KAAK,UAAU,EAAE,CAAC;QAC3D,IAAI,aAAa,GAAY,KAAK,CAAC;QACnC,IAAI,CAAC;YACH,MAAM,0BAA0B,GAAG,IAAI,CAAC,0BAA0B,CAAC;YACnE,aAAa,GAAG,MAAM,0BAA0B,CAC9C,4BAA4B,CAC7B,CAAC;QACJ,CAAC;QAAC,OAAO,CAAU,EAAE,CAAC;YACpB,OAAO,CAAC,KAAK,CACX,wGAAwG,IAAI,CAAC,GAAG,uBAAuB,aAAa,+EAA+E,EACnO,CAAC,CACF,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,uBAAuB,CAAC,CAAC;QACpD,CAAC;QACD,IAAI,CAAC,aAAa,EAAE,CAAC;YACnB,OAAO,CAAC,IAAI,CACV,sGAAsG,IAAI,CAAC,GAAG,uBAAuB,aAAa,gDAAgD,CACnM,CAAC;YACF,mBAAmB,CAAC,GAAG,EAAE,WAAW,CAAC,CAAC;QACxC,CAAC;IACH,CAAC;IAED,OAAO,CAAC,MAAM,yCAAyC,CACrD,4BAA4B,CAC7B,CAAwB,CAAC;AAC5B,CAAC;AAED,eAAe,0CAA0C,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@schemavaults/auth-server-sdk",
|
|
3
3
|
"description": "TypeScript SDK for building authenticated endpoints/middlewares for the Auth Server and Resource Servers",
|
|
4
|
-
"version": "0.22.
|
|
4
|
+
"version": "0.22.49",
|
|
5
5
|
"license": "UNLICENSED",
|
|
6
6
|
"private": false,
|
|
7
7
|
"repository": {
|