@sphereon/ssi-express-support 0.33.1-next.3 → 0.33.1-next.73
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +944 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +403 -0
- package/dist/index.d.ts +403 -9
- package/dist/index.js +911 -26
- package/dist/index.js.map +1 -1
- package/package.json +22 -10
- package/src/openid-connect-rp.ts +1 -0
- package/src/static-bearer-auth.ts +5 -3
- package/dist/auth-utils.d.ts +0 -21
- package/dist/auth-utils.d.ts.map +0 -1
- package/dist/auth-utils.js +0 -148
- package/dist/auth-utils.js.map +0 -1
- package/dist/entra-id-auth.d.ts +0 -10
- package/dist/entra-id-auth.d.ts.map +0 -1
- package/dist/entra-id-auth.js +0 -61
- package/dist/entra-id-auth.js.map +0 -1
- package/dist/express-builders.d.ts +0 -99
- package/dist/express-builders.d.ts.map +0 -1
- package/dist/express-builders.js +0 -281
- package/dist/express-builders.js.map +0 -1
- package/dist/express-utils.d.ts +0 -4
- package/dist/express-utils.d.ts.map +0 -1
- package/dist/express-utils.js +0 -55
- package/dist/express-utils.js.map +0 -1
- package/dist/functions.d.ts +0 -2
- package/dist/functions.d.ts.map +0 -1
- package/dist/functions.js +0 -10
- package/dist/functions.js.map +0 -1
- package/dist/index.d.ts.map +0 -1
- package/dist/openid-connect-rp.d.ts +0 -54
- package/dist/openid-connect-rp.d.ts.map +0 -1
- package/dist/openid-connect-rp.js +0 -214
- package/dist/openid-connect-rp.js.map +0 -1
- package/dist/static-bearer-auth.d.ts +0 -34
- package/dist/static-bearer-auth.d.ts.map +0 -1
- package/dist/static-bearer-auth.js +0 -146
- package/dist/static-bearer-auth.js.map +0 -1
- package/dist/types.d.ts +0 -193
- package/dist/types.d.ts.map +0 -1
- package/dist/types.js +0 -7
- package/dist/types.js.map +0 -1
|
@@ -1,214 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
3
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
4
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
5
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
6
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
7
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
8
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
9
|
-
});
|
|
10
|
-
};
|
|
11
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
12
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
13
|
-
};
|
|
14
|
-
var _a;
|
|
15
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
16
|
-
exports.OpenIDConnectAuthApi = void 0;
|
|
17
|
-
exports.oidcDiscoverIssuer = oidcDiscoverIssuer;
|
|
18
|
-
exports.oidcGetClient = oidcGetClient;
|
|
19
|
-
exports.getLoginEndpoint = getLoginEndpoint;
|
|
20
|
-
exports.getLoginCallbackEndpoint = getLoginCallbackEndpoint;
|
|
21
|
-
exports.getLogoutEndpoint = getLogoutEndpoint;
|
|
22
|
-
exports.getLogoutCallbackEndpoint = getLogoutCallbackEndpoint;
|
|
23
|
-
exports.getIdTokenEndpoint = getIdTokenEndpoint;
|
|
24
|
-
exports.getAuthenticatedUserEndpoint = getAuthenticatedUserEndpoint;
|
|
25
|
-
const express_1 = __importDefault(require("express"));
|
|
26
|
-
const openid_client_1 = require("openid-client");
|
|
27
|
-
const passport_1 = __importDefault(require("passport"));
|
|
28
|
-
const auth_utils_1 = require("./auth-utils");
|
|
29
|
-
const express_utils_1 = require("./express-utils");
|
|
30
|
-
const functions_1 = require("./functions");
|
|
31
|
-
const PREFIX = (_a = process.env.PREFIX) !== null && _a !== void 0 ? _a : '';
|
|
32
|
-
function oidcDiscoverIssuer(opts) {
|
|
33
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
34
|
-
var _a, _b;
|
|
35
|
-
const issuerUrl = (_b = (_a = opts === null || opts === void 0 ? void 0 : opts.issuerUrl) !== null && _a !== void 0 ? _a : (0, functions_1.env)('OIDC_ISSUER', PREFIX)) !== null && _b !== void 0 ? _b : 'https://auth01.test.sphereon.com/auth/realms/energy-shr';
|
|
36
|
-
const issuer = yield openid_client_1.Issuer.discover(issuerUrl);
|
|
37
|
-
console.log('Discovered issuer %s %O', issuer.issuer, issuer.metadata);
|
|
38
|
-
return { issuer, issuerUrl };
|
|
39
|
-
});
|
|
40
|
-
}
|
|
41
|
-
function oidcGetClient(issuer, metadata, opts) {
|
|
42
|
-
return __awaiter(this, void 0, void 0, function* () {
|
|
43
|
-
// @ts-ignore
|
|
44
|
-
return new issuer.Client(metadata, opts === null || opts === void 0 ? void 0 : opts.jwks, opts === null || opts === void 0 ? void 0 : opts.options);
|
|
45
|
-
});
|
|
46
|
-
}
|
|
47
|
-
function getLoginEndpoint(router, opts) {
|
|
48
|
-
var _a, _b, _c, _d, _e, _f;
|
|
49
|
-
if ((opts === null || opts === void 0 ? void 0 : opts.enabled) === false) {
|
|
50
|
-
console.log(`Login endpoint is disabled`);
|
|
51
|
-
return;
|
|
52
|
-
}
|
|
53
|
-
const strategy = (_b = (_a = opts === null || opts === void 0 ? void 0 : opts.endpoint) === null || _a === void 0 ? void 0 : _a.authentication) === null || _b === void 0 ? void 0 : _b.strategy;
|
|
54
|
-
if (!strategy) {
|
|
55
|
-
throw Error('strategy needs to be provided');
|
|
56
|
-
}
|
|
57
|
-
const path = (_c = opts === null || opts === void 0 ? void 0 : opts.path) !== null && _c !== void 0 ? _c : '/authentication/login';
|
|
58
|
-
router.get(path, (req, res, next) => {
|
|
59
|
-
var _a;
|
|
60
|
-
const redirectPage = (_a = req.get('referer')) !== null && _a !== void 0 ? _a : '/';
|
|
61
|
-
req.session.redirectPage = redirectPage;
|
|
62
|
-
next();
|
|
63
|
-
}, passport_1.default.authenticate(strategy, Object.assign(Object.assign(Object.assign({}, (_d = opts.authentication) === null || _d === void 0 ? void 0 : _d.strategyOptions), (_f = (_e = opts.endpoint) === null || _e === void 0 ? void 0 : _e.authentication) === null || _f === void 0 ? void 0 : _f.strategyOptions), { keepSessionInfo: false }), undefined));
|
|
64
|
-
}
|
|
65
|
-
function getLoginCallbackEndpoint(router, opts) {
|
|
66
|
-
var _a, _b, _c, _d, _e, _f;
|
|
67
|
-
if ((opts === null || opts === void 0 ? void 0 : opts.enabled) === false) {
|
|
68
|
-
console.log(`Auth callback endpoint is disabled`);
|
|
69
|
-
return;
|
|
70
|
-
}
|
|
71
|
-
const strategy = (_b = (_a = opts === null || opts === void 0 ? void 0 : opts.endpoint) === null || _a === void 0 ? void 0 : _a.authentication) === null || _b === void 0 ? void 0 : _b.strategy;
|
|
72
|
-
if (!strategy) {
|
|
73
|
-
throw Error('strategy needs to be provided');
|
|
74
|
-
}
|
|
75
|
-
const path = (_c = opts === null || opts === void 0 ? void 0 : opts.path) !== null && _c !== void 0 ? _c : '/authentication/callback';
|
|
76
|
-
router.get(path, passport_1.default.authenticate(strategy, Object.assign(Object.assign(Object.assign({}, (_d = opts.authentication) === null || _d === void 0 ? void 0 : _d.strategyOptions), (_f = (_e = opts.endpoint) === null || _e === void 0 ? void 0 : _e.authentication) === null || _f === void 0 ? void 0 : _f.strategyOptions), { keepSessionInfo: true }), undefined), (req, res, next) => {
|
|
77
|
-
var _a, _b, _c;
|
|
78
|
-
if (req.user) {
|
|
79
|
-
console.log('User authenticated', (_a = req.user) === null || _a === void 0 ? void 0 : _a.name);
|
|
80
|
-
// console.log(req.session)
|
|
81
|
-
const redirectPage = (_b = req.session.redirectPage) !== null && _b !== void 0 ? _b : '/search';
|
|
82
|
-
// console.log(`PRE LOGIN PAGE in callback: ${redirectPage}`)
|
|
83
|
-
delete req.session.redirectPage;
|
|
84
|
-
return res.redirect(redirectPage);
|
|
85
|
-
}
|
|
86
|
-
else {
|
|
87
|
-
return res.redirect((_c = (0, functions_1.env)('OIDC_FRONTEND_LOGIN_URL', PREFIX)) !== null && _c !== void 0 ? _c : 'http://localhost:3001/authentication/login');
|
|
88
|
-
}
|
|
89
|
-
});
|
|
90
|
-
}
|
|
91
|
-
function getLogoutEndpoint(router, client, opts) {
|
|
92
|
-
var _a;
|
|
93
|
-
if ((opts === null || opts === void 0 ? void 0 : opts.enabled) === false) {
|
|
94
|
-
console.log(`Logout endpoint is disabled`);
|
|
95
|
-
return;
|
|
96
|
-
}
|
|
97
|
-
const path = (_a = opts === null || opts === void 0 ? void 0 : opts.path) !== null && _a !== void 0 ? _a : '/authentication/logout';
|
|
98
|
-
router.get(path, (req, res) => {
|
|
99
|
-
try {
|
|
100
|
-
if (client.endSessionUrl()) {
|
|
101
|
-
return res.redirect(client.endSessionUrl());
|
|
102
|
-
}
|
|
103
|
-
else {
|
|
104
|
-
console.log('IDP does not support end session url');
|
|
105
|
-
return res.redirect('/authentication/logout-callback');
|
|
106
|
-
}
|
|
107
|
-
}
|
|
108
|
-
catch (error) {
|
|
109
|
-
console.log(error);
|
|
110
|
-
return res.redirect('/authentication/logout-callback');
|
|
111
|
-
}
|
|
112
|
-
});
|
|
113
|
-
}
|
|
114
|
-
function getLogoutCallbackEndpoint(router, opts) {
|
|
115
|
-
var _a;
|
|
116
|
-
if ((opts === null || opts === void 0 ? void 0 : opts.enabled) === false) {
|
|
117
|
-
console.log(`Logout callback endpoint is disabled`);
|
|
118
|
-
return;
|
|
119
|
-
}
|
|
120
|
-
const path = (_a = opts === null || opts === void 0 ? void 0 : opts.path) !== null && _a !== void 0 ? _a : '/authentication/logout-callback';
|
|
121
|
-
router.get(path, (req, res, next) => {
|
|
122
|
-
var _a;
|
|
123
|
-
try {
|
|
124
|
-
req.logout((err) => {
|
|
125
|
-
if (err) {
|
|
126
|
-
console.log(`Error during calling logout-callback: ${JSON.stringify(err)}`);
|
|
127
|
-
}
|
|
128
|
-
});
|
|
129
|
-
return res.redirect((_a = (0, functions_1.env)('OIDC_FRONTEND_LOGOUT_REDIRECT_URL', PREFIX)) !== null && _a !== void 0 ? _a : '/');
|
|
130
|
-
}
|
|
131
|
-
catch (e) {
|
|
132
|
-
return (0, express_utils_1.sendErrorResponse)(res, 500, 'An unexpected error occurred during logout callback', e);
|
|
133
|
-
}
|
|
134
|
-
});
|
|
135
|
-
}
|
|
136
|
-
function getIdTokenEndpoint(router, client, opts) {
|
|
137
|
-
var _a;
|
|
138
|
-
if ((opts === null || opts === void 0 ? void 0 : opts.enabled) === false) {
|
|
139
|
-
console.log(`ID Token endpoint is disabled`);
|
|
140
|
-
return;
|
|
141
|
-
}
|
|
142
|
-
const path = (_a = opts.path) !== null && _a !== void 0 ? _a : '/authentication/tokens/id';
|
|
143
|
-
router.get(path, auth_utils_1.isUserAuthenticated, (req, res) => {
|
|
144
|
-
if (req.session.tokens.id_token) {
|
|
145
|
-
return res.json({ id_token: req.session.tokens.id_token });
|
|
146
|
-
}
|
|
147
|
-
else {
|
|
148
|
-
return (0, express_utils_1.sendErrorResponse)(res, 401, 'Authentication required');
|
|
149
|
-
}
|
|
150
|
-
});
|
|
151
|
-
}
|
|
152
|
-
function getAuthenticatedUserEndpoint(router, opts) {
|
|
153
|
-
var _a;
|
|
154
|
-
if ((opts === null || opts === void 0 ? void 0 : opts.enabled) === false) {
|
|
155
|
-
console.log(`Authenticated User endpoint is disabled`);
|
|
156
|
-
return;
|
|
157
|
-
}
|
|
158
|
-
const path = (_a = opts === null || opts === void 0 ? void 0 : opts.path) !== null && _a !== void 0 ? _a : '/authentication/user';
|
|
159
|
-
router.get(path, auth_utils_1.isUserAuthenticated, (req, res, next) => {
|
|
160
|
-
if (!req.user) {
|
|
161
|
-
return (0, express_utils_1.sendErrorResponse)(res, 401, 'Authentication required');
|
|
162
|
-
}
|
|
163
|
-
let user = req.user;
|
|
164
|
-
return res.json(user);
|
|
165
|
-
});
|
|
166
|
-
}
|
|
167
|
-
class OpenIDConnectAuthApi {
|
|
168
|
-
get router() {
|
|
169
|
-
return this._router;
|
|
170
|
-
}
|
|
171
|
-
constructor(args) {
|
|
172
|
-
var _a, _b, _c, _d, _e, _f, _g, _h, _j, _k;
|
|
173
|
-
const { agent, opts } = args;
|
|
174
|
-
this._agent = agent;
|
|
175
|
-
(0, auth_utils_1.copyGlobalAuthToEndpoints)({ opts, keys: ['getLogin'] });
|
|
176
|
-
(0, auth_utils_1.copyGlobalAuthToEndpoints)({ opts, keys: ['getIdToken'] });
|
|
177
|
-
(0, auth_utils_1.copyGlobalAuthToEndpoints)({ opts, keys: ['getAuthenticatedUser'] });
|
|
178
|
-
// no need for the logout, as you these are not protected by auth
|
|
179
|
-
this._opts = opts;
|
|
180
|
-
this._express = args.expressSupport.express;
|
|
181
|
-
this._router = express_1.default.Router();
|
|
182
|
-
const features = (_a = opts === null || opts === void 0 ? void 0 : opts.enabledFeatures) !== null && _a !== void 0 ? _a : ['login', 'logout', 'id-token', 'authenticated-user'];
|
|
183
|
-
console.log(`Authentication API enabled`);
|
|
184
|
-
if (features.includes('login')) {
|
|
185
|
-
getLoginEndpoint(this.router, (_b = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _b === void 0 ? void 0 : _b.getLogin);
|
|
186
|
-
getLoginCallbackEndpoint(this.router, (_c = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _c === void 0 ? void 0 : _c.getLogin);
|
|
187
|
-
}
|
|
188
|
-
if (features.includes('logout')) {
|
|
189
|
-
getLogoutEndpoint(this.router, args.client, (_d = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _d === void 0 ? void 0 : _d.getLogout);
|
|
190
|
-
getLogoutCallbackEndpoint(this.router, (_e = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _e === void 0 ? void 0 : _e.getLogout);
|
|
191
|
-
}
|
|
192
|
-
if (features.includes('id-token')) {
|
|
193
|
-
if (((_f = opts.endpointOpts) === null || _f === void 0 ? void 0 : _f.getIdToken) === undefined) {
|
|
194
|
-
throw Error('Cannot enable id-token endpoint without providing id-token endpoint options');
|
|
195
|
-
}
|
|
196
|
-
getIdTokenEndpoint(this.router, args.client, (_g = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _g === void 0 ? void 0 : _g.getIdToken);
|
|
197
|
-
}
|
|
198
|
-
if (features.includes('authenticated-user')) {
|
|
199
|
-
getAuthenticatedUserEndpoint(this.router, (_h = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _h === void 0 ? void 0 : _h.getAuthenticatedUser);
|
|
200
|
-
}
|
|
201
|
-
this._express.use((_k = (_j = opts === null || opts === void 0 ? void 0 : opts.endpointOpts) === null || _j === void 0 ? void 0 : _j.basePath) !== null && _k !== void 0 ? _k : '', this.router);
|
|
202
|
-
}
|
|
203
|
-
get agent() {
|
|
204
|
-
return this._agent;
|
|
205
|
-
}
|
|
206
|
-
get opts() {
|
|
207
|
-
return this._opts;
|
|
208
|
-
}
|
|
209
|
-
get express() {
|
|
210
|
-
return this._express;
|
|
211
|
-
}
|
|
212
|
-
}
|
|
213
|
-
exports.OpenIDConnectAuthApi = OpenIDConnectAuthApi;
|
|
214
|
-
//# sourceMappingURL=openid-connect-rp.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"openid-connect-rp.js","sourceRoot":"","sources":["../src/openid-connect-rp.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAUA,gDAKC;AAED,sCAUC;AAED,4CAuBC;AAED,4DA8BC;AAED,8CAmBC;AAED,8DAkBC;AAED,gDAaC;AAED,oEAaC;AA1JD,sDAAgE;AAChE,iDAAiF;AACjF,wDAA+B;AAC/B,6CAA6E;AAC7E,mDAAmD;AACnD,2CAAiC;AAGjC,MAAM,MAAM,GAAG,MAAA,OAAO,CAAC,GAAG,CAAC,MAAM,mCAAI,EAAE,CAAA;AACvC,SAAsB,kBAAkB,CAAC,IAA6B;;;QACpE,MAAM,SAAS,GAAG,MAAA,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,mCAAI,IAAA,eAAG,EAAC,aAAa,EAAE,MAAM,CAAC,mCAAI,yDAAyD,CAAA;QAC5H,MAAM,MAAM,GAAG,MAAM,sBAAM,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAA;QAC/C,OAAO,CAAC,GAAG,CAAC,yBAAyB,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,QAAQ,CAAC,CAAA;QACtE,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,CAAA;IAC9B,CAAC;CAAA;AAED,SAAsB,aAAa,CACjC,MAA0B,EAC1B,QAAwB,EACxB,IAGC;;QAED,aAAa;QACb,OAAO,IAAI,MAAM,CAAC,MAAM,CAAC,QAAQ,EAAE,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,EAAE,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,CAAC,CAAA;IAC/D,CAAC;CAAA;AAED,SAAgB,gBAAgB,CAAC,MAAc,EAAE,IAAqD;;IACpG,IAAI,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,MAAK,KAAK,EAAE,CAAC;QAC5B,OAAO,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAA;QACzC,OAAM;IACR,CAAC;IACD,MAAM,QAAQ,GAAG,MAAA,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,0CAAE,cAAc,0CAAE,QAAQ,CAAA;IACzD,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,KAAK,CAAC,+BAA+B,CAAC,CAAA;IAC9C,CAAC;IACD,MAAM,IAAI,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,mCAAI,uBAAuB,CAAA;IAClD,MAAM,CAAC,GAAG,CACR,IAAI,EACJ,CAAC,GAAQ,EAAE,GAAQ,EAAE,IAAkB,EAAE,EAAE;;QACzC,MAAM,YAAY,GAAG,MAAA,GAAG,CAAC,GAAG,CAAC,SAAS,CAAC,mCAAI,GAAG,CAAA;QAC9C,GAAG,CAAC,OAAO,CAAC,YAAY,GAAG,YAAY,CAAA;QACvC,IAAI,EAAE,CAAA;IACR,CAAC,EACD,kBAAQ,CAAC,YAAY,CACnB,QAAQ,gDACH,MAAA,IAAI,CAAC,cAAc,0CAAE,eAAe,GAAK,MAAA,MAAA,IAAI,CAAC,QAAQ,0CAAE,cAAc,0CAAE,eAAe,KAAE,eAAe,EAAE,KAAK,KACpH,SAAS,CACV,CACF,CAAA;AACH,CAAC;AAED,SAAgB,wBAAwB,CAAC,MAAc,EAAE,IAA0B;;IACjF,IAAI,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,MAAK,KAAK,EAAE,CAAC;QAC5B,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAA;QACjD,OAAM;IACR,CAAC;IACD,MAAM,QAAQ,GAAG,MAAA,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,0CAAE,cAAc,0CAAE,QAAQ,CAAA;IACzD,IAAI,CAAC,QAAQ,EAAE,CAAC;QACd,MAAM,KAAK,CAAC,+BAA+B,CAAC,CAAA;IAC9C,CAAC;IACD,MAAM,IAAI,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,mCAAI,0BAA0B,CAAA;IACrD,MAAM,CAAC,GAAG,CACR,IAAI,EACJ,kBAAQ,CAAC,YAAY,CACnB,QAAQ,gDACH,MAAA,IAAI,CAAC,cAAc,0CAAE,eAAe,GAAK,MAAA,MAAA,IAAI,CAAC,QAAQ,0CAAE,cAAc,0CAAE,eAAe,KAAE,eAAe,EAAE,IAAI,KACnH,SAAS,CACV,EACD,CAAC,GAAQ,EAAE,GAAQ,EAAE,IAAI,EAAE,EAAE;;QAC3B,IAAI,GAAG,CAAC,IAAI,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,oBAAoB,EAAE,MAAA,GAAG,CAAC,IAAI,0CAAE,IAAI,CAAC,CAAA;YACjD,2BAA2B;YAC3B,MAAM,YAAY,GAAG,MAAA,GAAG,CAAC,OAAO,CAAC,YAAY,mCAAI,SAAS,CAAA;YAC1D,6DAA6D;YAC7D,OAAO,GAAG,CAAC,OAAO,CAAC,YAAY,CAAA;YAC/B,OAAO,GAAG,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAA;QACnC,CAAC;aAAM,CAAC;YACN,OAAO,GAAG,CAAC,QAAQ,CAAC,MAAA,IAAA,eAAG,EAAC,yBAAyB,EAAE,MAAM,CAAC,mCAAI,4CAA4C,CAAC,CAAA;QAC7G,CAAC;IACH,CAAC,CACF,CAAA;AACH,CAAC;AAED,SAAgB,iBAAiB,CAAC,MAAc,EAAE,MAAkB,EAAE,IAA0B;;IAC9F,IAAI,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,MAAK,KAAK,EAAE,CAAC;QAC5B,OAAO,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAA;QAC1C,OAAM;IACR,CAAC;IACD,MAAM,IAAI,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,mCAAI,wBAAwB,CAAA;IACnD,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE;QAC5B,IAAI,CAAC;YACH,IAAI,MAAM,CAAC,aAAa,EAAE,EAAE,CAAC;gBAC3B,OAAO,GAAG,CAAC,QAAQ,CAAC,MAAM,CAAC,aAAa,EAAE,CAAC,CAAA;YAC7C,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAA;gBACnD,OAAO,GAAG,CAAC,QAAQ,CAAC,iCAAiC,CAAC,CAAA;YACxD,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,CAAA;YAClB,OAAO,GAAG,CAAC,QAAQ,CAAC,iCAAiC,CAAC,CAAA;QACxD,CAAC;IACH,CAAC,CAAC,CAAA;AACJ,CAAC;AAED,SAAgB,yBAAyB,CAAC,MAAc,EAAE,IAA0B;;IAClF,IAAI,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,MAAK,KAAK,EAAE,CAAC;QAC5B,OAAO,CAAC,GAAG,CAAC,sCAAsC,CAAC,CAAA;QACnD,OAAM;IACR,CAAC;IACD,MAAM,IAAI,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,mCAAI,iCAAiC,CAAA;IAC5D,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC,GAAG,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE;;QAClC,IAAI,CAAC;YACH,GAAG,CAAC,MAAM,CAAC,CAAC,GAAG,EAAE,EAAE;gBACjB,IAAI,GAAG,EAAE,CAAC;oBACR,OAAO,CAAC,GAAG,CAAC,yCAAyC,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,EAAE,CAAC,CAAA;gBAC7E,CAAC;YACH,CAAC,CAAC,CAAA;YACF,OAAO,GAAG,CAAC,QAAQ,CAAC,MAAA,IAAA,eAAG,EAAC,mCAAmC,EAAE,MAAM,CAAC,mCAAI,GAAG,CAAC,CAAA;QAC9E,CAAC;QAAC,OAAO,CAAC,EAAE,CAAC;YACX,OAAO,IAAA,iCAAiB,EAAC,GAAG,EAAE,GAAG,EAAE,qDAAqD,EAAE,CAAC,CAAC,CAAA;QAC9F,CAAC;IACH,CAAC,CAAC,CAAA;AACJ,CAAC;AAED,SAAgB,kBAAkB,CAAC,MAAc,EAAE,MAAkB,EAAE,IAAyB;;IAC9F,IAAI,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,MAAK,KAAK,EAAE,CAAC;QAC5B,OAAO,CAAC,GAAG,CAAC,+BAA+B,CAAC,CAAA;QAC5C,OAAM;IACR,CAAC;IACD,MAAM,IAAI,GAAG,MAAA,IAAI,CAAC,IAAI,mCAAI,2BAA2B,CAAA;IACrD,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,gCAAmB,EAAE,CAAC,GAAQ,EAAE,GAAQ,EAAE,EAAE;QAC3D,IAAI,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC;YAChC,OAAO,GAAG,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAA;QAC5D,CAAC;aAAM,CAAC;YACN,OAAO,IAAA,iCAAiB,EAAC,GAAG,EAAE,GAAG,EAAE,yBAAyB,CAAC,CAAA;QAC/D,CAAC;IACH,CAAC,CAAC,CAAA;AACJ,CAAC;AAED,SAAgB,4BAA4B,CAAC,MAAc,EAAE,IAA0B;;IACrF,IAAI,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,MAAK,KAAK,EAAE,CAAC;QAC5B,OAAO,CAAC,GAAG,CAAC,yCAAyC,CAAC,CAAA;QACtD,OAAM;IACR,CAAC;IACD,MAAM,IAAI,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,IAAI,mCAAI,sBAAsB,CAAA;IACjD,MAAM,CAAC,GAAG,CAAC,IAAI,EAAE,gCAAmB,EAAE,CAAC,GAAQ,EAAE,GAAQ,EAAE,IAAS,EAAE,EAAE;QACtE,IAAI,CAAC,GAAG,CAAC,IAAI,EAAE,CAAC;YACd,OAAO,IAAA,iCAAiB,EAAC,GAAG,EAAE,GAAG,EAAE,yBAAyB,CAAC,CAAA;QAC/D,CAAC;QACD,IAAI,IAAI,GAAG,GAAG,CAAC,IAAI,CAAA;QACnB,OAAO,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,CAAA;IACvB,CAAC,CAAC,CAAA;AACJ,CAAC;AAkBD,MAAa,oBAAoB;IAC/B,IAAI,MAAM;QACR,OAAO,IAAI,CAAC,OAAO,CAAA;IACrB,CAAC;IAOD,YAAY,IAA4G;;QACtH,MAAM,EAAE,KAAK,EAAE,IAAI,EAAE,GAAG,IAAI,CAAA;QAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAA;QACnB,IAAA,sCAAyB,EAAC,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC,UAAU,CAAC,EAAE,CAAC,CAAA;QACvD,IAAA,sCAAyB,EAAC,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC,YAAY,CAAC,EAAE,CAAC,CAAA;QACzD,IAAA,sCAAyB,EAAC,EAAE,IAAI,EAAE,IAAI,EAAE,CAAC,sBAAsB,CAAC,EAAE,CAAC,CAAA;QACnE,iEAAiE;QACjE,IAAI,CAAC,KAAK,GAAG,IAAI,CAAA;QACjB,IAAI,CAAC,QAAQ,GAAG,IAAI,CAAC,cAAc,CAAC,OAAO,CAAA;QAC3C,IAAI,CAAC,OAAO,GAAG,iBAAO,CAAC,MAAM,EAAE,CAAA;QAC/B,MAAM,QAAQ,GAAG,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,eAAe,mCAAI,CAAC,OAAO,EAAE,QAAQ,EAAE,UAAU,EAAE,oBAAoB,CAAC,CAAA;QAC/F,OAAO,CAAC,GAAG,CAAC,4BAA4B,CAAC,CAAA;QAEzC,IAAI,QAAQ,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC/B,gBAAgB,CAAC,IAAI,CAAC,MAAM,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,QAAQ,CAAC,CAAA;YAC3D,wBAAwB,CAAC,IAAI,CAAC,MAAM,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,QAAQ,CAAC,CAAA;QACrE,CAAC;QACD,IAAI,QAAQ,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;YAChC,iBAAiB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,SAAS,CAAC,CAAA;YAC1E,yBAAyB,CAAC,IAAI,CAAC,MAAM,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,SAAS,CAAC,CAAA;QACvE,CAAC;QACD,IAAI,QAAQ,CAAC,QAAQ,CAAC,UAAU,CAAC,EAAE,CAAC;YAClC,IAAI,CAAA,MAAA,IAAI,CAAC,YAAY,0CAAE,UAAU,MAAK,SAAS,EAAE,CAAC;gBAChD,MAAM,KAAK,CAAC,6EAA6E,CAAC,CAAA;YAC5F,CAAC;YACD,kBAAkB,CAAC,IAAI,CAAC,MAAM,EAAE,IAAI,CAAC,MAAM,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,UAAU,CAAC,CAAA;QAC9E,CAAC;QACD,IAAI,QAAQ,CAAC,QAAQ,CAAC,oBAAoB,CAAC,EAAE,CAAC;YAC5C,4BAA4B,CAAC,IAAI,CAAC,MAAM,EAAE,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,oBAAoB,CAAC,CAAA;QACrF,CAAC;QACD,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAA,MAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,0CAAE,QAAQ,mCAAI,EAAE,EAAE,IAAI,CAAC,MAAM,CAAC,CAAA;IACpE,CAAC;IAED,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,MAAM,CAAA;IACpB,CAAC;IAED,IAAI,IAAI;QACN,OAAO,IAAI,CAAC,KAAK,CAAA;IACnB,CAAC;IAED,IAAI,OAAO;QACT,OAAO,IAAI,CAAC,QAAQ,CAAA;IACtB,CAAC;CACF;AAtDD,oDAsDC"}
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
import { BearerUser, IStaticBearerVerifyOptions } from './types';
|
|
2
|
-
export declare class StaticBearerAuth {
|
|
3
|
-
private readonly strategy;
|
|
4
|
-
private static providers;
|
|
5
|
-
private static verifyOptions;
|
|
6
|
-
private hashTokens?;
|
|
7
|
-
static init(strategy: string, provider?: StaticBearerUserProvider): StaticBearerAuth;
|
|
8
|
-
private constructor();
|
|
9
|
-
get provider(): StaticBearerUserProvider;
|
|
10
|
-
withHashTokens(hashTokens: boolean): this;
|
|
11
|
-
withUsers(users: BearerUser[] | BearerUser): this;
|
|
12
|
-
addUser(user: BearerUser[] | BearerUser): this;
|
|
13
|
-
withVerifyOptions(options: IStaticBearerVerifyOptions | string): this;
|
|
14
|
-
connectPassport(): void;
|
|
15
|
-
}
|
|
16
|
-
export interface StaticBearerUserProvider {
|
|
17
|
-
strategy: string;
|
|
18
|
-
addUser(user: BearerUser | BearerUser[], hashToken?: boolean): void;
|
|
19
|
-
getUser(token: string): BearerUser | undefined;
|
|
20
|
-
hashedTokens?: boolean;
|
|
21
|
-
}
|
|
22
|
-
export declare class MapBasedStaticBearerUserProvider implements StaticBearerUserProvider {
|
|
23
|
-
private readonly _strategy;
|
|
24
|
-
private readonly _users;
|
|
25
|
-
private readonly _hashedTokens;
|
|
26
|
-
constructor(strategy: string, hashedTokens?: boolean);
|
|
27
|
-
get users(): BearerUser[];
|
|
28
|
-
get hashedTokens(): boolean;
|
|
29
|
-
get strategy(): string;
|
|
30
|
-
getUser(token: string): BearerUser | undefined;
|
|
31
|
-
addUser(user: BearerUser | BearerUser[], hashToken?: boolean): void;
|
|
32
|
-
getUsers(): BearerUser[];
|
|
33
|
-
}
|
|
34
|
-
//# sourceMappingURL=static-bearer-auth.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"static-bearer-auth.d.ts","sourceRoot":"","sources":["../src/static-bearer-auth.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,UAAU,EAAE,0BAA0B,EAAE,MAAM,SAAS,CAAA;AAChE,qBAAa,gBAAgB;IAC3B,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAQ;IACjC,OAAO,CAAC,MAAM,CAAC,SAAS,CAAmD;IAC3E,OAAO,CAAC,MAAM,CAAC,aAAa,CAA8D;IAC1F,OAAO,CAAC,UAAU,CAAC,CAAiB;WAEtB,IAAI,CAAC,QAAQ,EAAE,MAAM,EAAE,QAAQ,CAAC,EAAE,wBAAwB;IAIxE,OAAO;IAWP,IAAI,QAAQ,6BAMX;IAED,cAAc,CAAC,UAAU,EAAE,OAAO,GAAG,IAAI;IAKzC,SAAS,CAAC,KAAK,EAAE,UAAU,EAAE,GAAG,UAAU,GAAG,IAAI;IAKjD,OAAO,CAAC,IAAI,EAAE,UAAU,EAAE,GAAG,UAAU,GAAG,IAAI;IAK9C,iBAAiB,CAAC,OAAO,EAAE,0BAA0B,GAAG,MAAM,GAAG,IAAI;IAKrE,eAAe;CAuChB;AAED,MAAM,WAAW,wBAAwB;IACvC,QAAQ,EAAE,MAAM,CAAA;IAEhB,OAAO,CAAC,IAAI,EAAE,UAAU,GAAG,UAAU,EAAE,EAAE,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI,CAAA;IAEnE,OAAO,CAAC,KAAK,EAAE,MAAM,GAAG,UAAU,GAAG,SAAS,CAAA;IAE9C,YAAY,CAAC,EAAE,OAAO,CAAA;CACvB;AAED,qBAAa,gCAAiC,YAAW,wBAAwB;IAC/E,OAAO,CAAC,QAAQ,CAAC,SAAS,CAAQ;IAClC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAmB;IAC1C,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAS;gBAE3B,QAAQ,EAAE,MAAM,EAAE,YAAY,CAAC,EAAE,OAAO;IAKpD,IAAI,KAAK,IAAI,UAAU,EAAE,CAExB;IAED,IAAI,YAAY,IAAI,OAAO,CAE1B;IAED,IAAI,QAAQ,IAAI,MAAM,CAErB;IAED,OAAO,CAAC,KAAK,EAAE,MAAM,GAAG,UAAU,GAAG,SAAS;IAI9C,OAAO,CAAC,IAAI,EAAE,UAAU,GAAG,UAAU,EAAE,EAAE,SAAS,CAAC,EAAE,OAAO,GAAG,IAAI;IAkBnE,QAAQ,IAAI,UAAU,EAAE;CAGzB"}
|
|
@@ -1,146 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
26
|
-
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
27
|
-
};
|
|
28
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
29
|
-
exports.MapBasedStaticBearerUserProvider = exports.StaticBearerAuth = void 0;
|
|
30
|
-
const passport_1 = __importDefault(require("passport"));
|
|
31
|
-
const u8a = __importStar(require("uint8arrays"));
|
|
32
|
-
class StaticBearerAuth {
|
|
33
|
-
static init(strategy, provider) {
|
|
34
|
-
return new StaticBearerAuth(strategy !== null && strategy !== void 0 ? strategy : 'bearer', provider !== null && provider !== void 0 ? provider : new MapBasedStaticBearerUserProvider(strategy));
|
|
35
|
-
}
|
|
36
|
-
constructor(strategy, provider) {
|
|
37
|
-
this.hashTokens = false;
|
|
38
|
-
this.strategy = strategy;
|
|
39
|
-
if (StaticBearerAuth.providers.has(strategy)) {
|
|
40
|
-
if (StaticBearerAuth.providers.get(strategy) !== provider) {
|
|
41
|
-
throw Error('Cannot register another user provider for strategy: ' + strategy);
|
|
42
|
-
}
|
|
43
|
-
}
|
|
44
|
-
else {
|
|
45
|
-
StaticBearerAuth.providers.set(strategy, provider);
|
|
46
|
-
}
|
|
47
|
-
}
|
|
48
|
-
get provider() {
|
|
49
|
-
const provider = StaticBearerAuth.providers.get(this.strategy);
|
|
50
|
-
if (!provider) {
|
|
51
|
-
throw Error('Could not get user provider for ' + this.strategy);
|
|
52
|
-
}
|
|
53
|
-
return provider;
|
|
54
|
-
}
|
|
55
|
-
withHashTokens(hashTokens) {
|
|
56
|
-
this.hashTokens = hashTokens;
|
|
57
|
-
return this;
|
|
58
|
-
}
|
|
59
|
-
withUsers(users) {
|
|
60
|
-
this.addUser(users);
|
|
61
|
-
return this;
|
|
62
|
-
}
|
|
63
|
-
addUser(user) {
|
|
64
|
-
this.provider.addUser(user);
|
|
65
|
-
return this;
|
|
66
|
-
}
|
|
67
|
-
withVerifyOptions(options) {
|
|
68
|
-
StaticBearerAuth.verifyOptions.set(this.strategy, options);
|
|
69
|
-
return this;
|
|
70
|
-
}
|
|
71
|
-
connectPassport() {
|
|
72
|
-
const _provider = this.provider;
|
|
73
|
-
function findUser(token, cb) {
|
|
74
|
-
const user = _provider.getUser(token);
|
|
75
|
-
if (user) {
|
|
76
|
-
return cb(null, user);
|
|
77
|
-
}
|
|
78
|
-
return cb('bearer token not found or incorrect', false);
|
|
79
|
-
}
|
|
80
|
-
Promise.resolve().then(() => __importStar(require('passport-http-bearer'))).then((httpBearer) => {
|
|
81
|
-
var _a;
|
|
82
|
-
const hashTokens = (_a = this.hashTokens) !== null && _a !== void 0 ? _a : false;
|
|
83
|
-
passport_1.default.use(this.strategy, new httpBearer.Strategy({ passReqToCallback: false }, function (token, cb) {
|
|
84
|
-
if (hashTokens) {
|
|
85
|
-
Promise.resolve().then(() => __importStar(require('@noble/hashes/sha256'))).then((hash) => {
|
|
86
|
-
findUser(u8a.toString(hash.sha256(token)), cb);
|
|
87
|
-
})
|
|
88
|
-
.catch((error) => {
|
|
89
|
-
console.log(`hash problem: ${error}`);
|
|
90
|
-
throw Error('Did you include @noble/hashes in package.json?');
|
|
91
|
-
});
|
|
92
|
-
}
|
|
93
|
-
else {
|
|
94
|
-
findUser(token, cb);
|
|
95
|
-
}
|
|
96
|
-
}));
|
|
97
|
-
})
|
|
98
|
-
.catch((error) => {
|
|
99
|
-
console.log(`passport-http-bearer package problem: ${error}`);
|
|
100
|
-
throw Error('Did you include passport-http-bearer in package.json?');
|
|
101
|
-
});
|
|
102
|
-
}
|
|
103
|
-
}
|
|
104
|
-
exports.StaticBearerAuth = StaticBearerAuth;
|
|
105
|
-
StaticBearerAuth.providers = new Map();
|
|
106
|
-
StaticBearerAuth.verifyOptions = new Map();
|
|
107
|
-
class MapBasedStaticBearerUserProvider {
|
|
108
|
-
constructor(strategy, hashedTokens) {
|
|
109
|
-
this._users = [];
|
|
110
|
-
this._strategy = strategy;
|
|
111
|
-
this._hashedTokens = hashedTokens !== null && hashedTokens !== void 0 ? hashedTokens : false;
|
|
112
|
-
}
|
|
113
|
-
get users() {
|
|
114
|
-
return this._users;
|
|
115
|
-
}
|
|
116
|
-
get hashedTokens() {
|
|
117
|
-
return this._hashedTokens;
|
|
118
|
-
}
|
|
119
|
-
get strategy() {
|
|
120
|
-
return this._strategy;
|
|
121
|
-
}
|
|
122
|
-
getUser(token) {
|
|
123
|
-
return this.users.find((user) => user.token === token);
|
|
124
|
-
}
|
|
125
|
-
addUser(user, hashToken) {
|
|
126
|
-
const users = Array.isArray(user) ? user : [user];
|
|
127
|
-
if (hashToken) {
|
|
128
|
-
if (!this.hashedTokens) {
|
|
129
|
-
throw Error('Cannot hash token, when hashed tokens is not enabled on the user provider for strategy ' + this.strategy);
|
|
130
|
-
}
|
|
131
|
-
Promise.resolve().then(() => __importStar(require('@noble/hashes/sha256'))).then((hash) => {
|
|
132
|
-
users.forEach((user) => (user.token = u8a.toString(hash.sha256(user.token))));
|
|
133
|
-
})
|
|
134
|
-
.catch((error) => {
|
|
135
|
-
console.log(`hash problem: ${error}`);
|
|
136
|
-
throw Error('Did you include @noble/hashes in package.json?');
|
|
137
|
-
});
|
|
138
|
-
}
|
|
139
|
-
this._users.push(...users);
|
|
140
|
-
}
|
|
141
|
-
getUsers() {
|
|
142
|
-
return this._users;
|
|
143
|
-
}
|
|
144
|
-
}
|
|
145
|
-
exports.MapBasedStaticBearerUserProvider = MapBasedStaticBearerUserProvider;
|
|
146
|
-
//# sourceMappingURL=static-bearer-auth.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"static-bearer-auth.js","sourceRoot":"","sources":["../src/static-bearer-auth.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,wDAA+B;AAC/B,iDAAkC;AAElC,MAAa,gBAAgB;IAMpB,MAAM,CAAC,IAAI,CAAC,QAAgB,EAAE,QAAmC;QACtE,OAAO,IAAI,gBAAgB,CAAC,QAAQ,aAAR,QAAQ,cAAR,QAAQ,GAAI,QAAQ,EAAE,QAAQ,aAAR,QAAQ,cAAR,QAAQ,GAAI,IAAI,gCAAgC,CAAC,QAAQ,CAAC,CAAC,CAAA;IAC/G,CAAC;IAED,YAAoB,QAAgB,EAAE,QAAkC;QANhE,eAAU,GAAa,KAAK,CAAA;QAOlC,IAAI,CAAC,QAAQ,GAAG,QAAQ,CAAA;QACxB,IAAI,gBAAgB,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC;YAC7C,IAAI,gBAAgB,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,CAAC,KAAK,QAAQ,EAAE,CAAC;gBAC1D,MAAM,KAAK,CAAC,sDAAsD,GAAG,QAAQ,CAAC,CAAA;YAChF,CAAC;QACH,CAAC;aAAM,CAAC;YACN,gBAAgB,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAA;QACpD,CAAC;IACH,CAAC;IAED,IAAI,QAAQ;QACV,MAAM,QAAQ,GAAG,gBAAgB,CAAC,SAAS,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAA;QAC9D,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,MAAM,KAAK,CAAC,kCAAkC,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAA;QACjE,CAAC;QACD,OAAO,QAAQ,CAAA;IACjB,CAAC;IAED,cAAc,CAAC,UAAmB;QAChC,IAAI,CAAC,UAAU,GAAG,UAAU,CAAA;QAC5B,OAAO,IAAI,CAAA;IACb,CAAC;IAED,SAAS,CAAC,KAAgC;QACxC,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,CAAA;QACnB,OAAO,IAAI,CAAA;IACb,CAAC;IAED,OAAO,CAAC,IAA+B;QACrC,IAAI,CAAC,QAAQ,CAAC,OAAO,CAAC,IAAI,CAAC,CAAA;QAC3B,OAAO,IAAI,CAAA;IACb,CAAC;IAED,iBAAiB,CAAC,OAA4C;QAC5D,gBAAgB,CAAC,aAAa,CAAC,GAAG,CAAC,IAAI,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAA;QAC1D,OAAO,IAAI,CAAA;IACb,CAAC;IAED,eAAe;QACb,MAAM,SAAS,GAAG,IAAI,CAAC,QAAQ,CAAA;QAC/B,SAAS,QAAQ,CAAC,KAAa,EAAE,EAAkF;YACjH,MAAM,IAAI,GAAG,SAAS,CAAC,OAAO,CAAC,KAAK,CAAC,CAAA;YACrC,IAAI,IAAI,EAAE,CAAC;gBACT,OAAO,EAAE,CAAC,IAAI,EAAE,IAAI,CAAC,CAAA;YACvB,CAAC;YACD,OAAO,EAAE,CAAC,qCAAqC,EAAE,KAAK,CAAC,CAAA;QACzD,CAAC;QAED,kDAAO,sBAAsB,IAC1B,IAAI,CAAC,CAAC,UAAU,EAAE,EAAE;;YACnB,MAAM,UAAU,GAAG,MAAA,IAAI,CAAC,UAAU,mCAAI,KAAK,CAAA;YAC3C,kBAAQ,CAAC,GAAG,CACV,IAAI,CAAC,QAAQ,EACb,IAAI,UAAU,CAAC,QAAQ,CAAC,EAAE,iBAAiB,EAAE,KAAK,EAAE,EAAE,UACpD,KAAa,EACb,EAAkF;gBAElF,IAAI,UAAU,EAAE,CAAC;oBACf,kDAAO,sBAAsB,IAC1B,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;wBACb,QAAQ,CAAC,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAA;oBAChD,CAAC,CAAC;yBACD,KAAK,CAAC,CAAC,KAAK,EAAE,EAAE;wBACf,OAAO,CAAC,GAAG,CAAC,iBAAiB,KAAK,EAAE,CAAC,CAAA;wBACrC,MAAM,KAAK,CAAC,gDAAgD,CAAC,CAAA;oBAC/D,CAAC,CAAC,CAAA;gBACN,CAAC;qBAAM,CAAC;oBACN,QAAQ,CAAC,KAAK,EAAE,EAAE,CAAC,CAAA;gBACrB,CAAC;YACH,CAAC,CAAC,CACH,CAAA;QACH,CAAC,CAAC;aACD,KAAK,CAAC,CAAC,KAAK,EAAE,EAAE;YACf,OAAO,CAAC,GAAG,CAAC,yCAAyC,KAAK,EAAE,CAAC,CAAA;YAC7D,MAAM,KAAK,CAAC,uDAAuD,CAAC,CAAA;QACtE,CAAC,CAAC,CAAA;IACN,CAAC;;AAvFH,4CAwFC;AAtFgB,0BAAS,GAA0C,IAAI,GAAG,EAAE,AAAnD,CAAmD;AAC5D,8BAAa,GAAqD,IAAI,GAAG,EAAE,AAA9D,CAA8D;AAiG5F,MAAa,gCAAgC;IAK3C,YAAY,QAAgB,EAAE,YAAsB;QAHnC,WAAM,GAAiB,EAAE,CAAA;QAIxC,IAAI,CAAC,SAAS,GAAG,QAAQ,CAAA;QACzB,IAAI,CAAC,aAAa,GAAG,YAAY,aAAZ,YAAY,cAAZ,YAAY,GAAI,KAAK,CAAA;IAC5C,CAAC;IAED,IAAI,KAAK;QACP,OAAO,IAAI,CAAC,MAAM,CAAA;IACpB,CAAC;IAED,IAAI,YAAY;QACd,OAAO,IAAI,CAAC,aAAa,CAAA;IAC3B,CAAC;IAED,IAAI,QAAQ;QACV,OAAO,IAAI,CAAC,SAAS,CAAA;IACvB,CAAC;IAED,OAAO,CAAC,KAAa;QACnB,OAAO,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,KAAK,KAAK,KAAK,CAAC,CAAA;IACxD,CAAC;IAED,OAAO,CAAC,IAA+B,EAAE,SAAmB;QAC1D,MAAM,KAAK,GAAG,KAAK,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAA;QACjD,IAAI,SAAS,EAAE,CAAC;YACd,IAAI,CAAC,IAAI,CAAC,YAAY,EAAE,CAAC;gBACvB,MAAM,KAAK,CAAC,yFAAyF,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAA;YACxH,CAAC;YACD,kDAAO,sBAAsB,IAC1B,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE;gBACb,KAAK,CAAC,OAAO,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,CAAC,IAAI,CAAC,KAAK,GAAG,GAAG,CAAC,QAAQ,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAA;YAC/E,CAAC,CAAC;iBACD,KAAK,CAAC,CAAC,KAAK,EAAE,EAAE;gBACf,OAAO,CAAC,GAAG,CAAC,iBAAiB,KAAK,EAAE,CAAC,CAAA;gBACrC,MAAM,KAAK,CAAC,gDAAgD,CAAC,CAAA;YAC/D,CAAC,CAAC,CAAA;QACN,CAAC;QACD,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,CAAA;IAC5B,CAAC;IAED,QAAQ;QACN,OAAO,IAAI,CAAC,MAAM,CAAA;IACpB,CAAC;CACF;AA/CD,4EA+CC"}
|
package/dist/types.d.ts
DELETED
|
@@ -1,193 +0,0 @@
|
|
|
1
|
-
import { Enforcer } from 'casbin';
|
|
2
|
-
import { Express, RequestHandler } from 'express';
|
|
3
|
-
import { ParamsDictionary } from 'express-serve-static-core';
|
|
4
|
-
import http from 'http';
|
|
5
|
-
import { HttpTerminator } from 'http-terminator';
|
|
6
|
-
import { AuthenticateCallback, Strategy } from 'passport';
|
|
7
|
-
import { ParsedQs } from 'qs';
|
|
8
|
-
export interface IExpressServerOpts {
|
|
9
|
-
port?: number;
|
|
10
|
-
cookieSigningKey?: string;
|
|
11
|
-
hostname?: string;
|
|
12
|
-
basePath?: string;
|
|
13
|
-
existingExpress?: Express;
|
|
14
|
-
listenCallback?: () => void;
|
|
15
|
-
startListening?: boolean;
|
|
16
|
-
}
|
|
17
|
-
export declare function hasEndpointOpts(opts: any): any;
|
|
18
|
-
export type HasEndpointOpts = {
|
|
19
|
-
endpointOpts?: IEndpointOpts & SingleEndpoints;
|
|
20
|
-
} & Record<string, any>;
|
|
21
|
-
export type SingleEndpoints = Record<string, ISingleEndpointOpts | any>;
|
|
22
|
-
export interface IEndpointOpts {
|
|
23
|
-
basePath?: string;
|
|
24
|
-
baseUrl?: string | URL;
|
|
25
|
-
globalAuth?: GenericAuthArgs;
|
|
26
|
-
}
|
|
27
|
-
export interface ExpressSupport {
|
|
28
|
-
express: Express;
|
|
29
|
-
port: number;
|
|
30
|
-
hostname: string;
|
|
31
|
-
userIsInRole?: string | string[];
|
|
32
|
-
startListening: boolean;
|
|
33
|
-
server?: http.Server;
|
|
34
|
-
enforcer?: Enforcer;
|
|
35
|
-
start: (opts?: {
|
|
36
|
-
disableErrorHandler?: boolean;
|
|
37
|
-
doNotStartListening?: boolean;
|
|
38
|
-
}) => {
|
|
39
|
-
server: http.Server;
|
|
40
|
-
terminator: HttpTerminator;
|
|
41
|
-
};
|
|
42
|
-
stop: (terminator?: HttpTerminator) => Promise<boolean>;
|
|
43
|
-
}
|
|
44
|
-
export interface ISingleEndpointOpts extends GenericAuthArgs {
|
|
45
|
-
endpoint?: EndpointArgs;
|
|
46
|
-
enabled?: boolean;
|
|
47
|
-
path?: string;
|
|
48
|
-
disableGlobalAuth?: boolean;
|
|
49
|
-
}
|
|
50
|
-
export interface GenericAuthArgs {
|
|
51
|
-
authentication?: {
|
|
52
|
-
callback?: AuthenticateCallback | ((...args: any[]) => any);
|
|
53
|
-
useDefaultCallback?: boolean;
|
|
54
|
-
enabled?: boolean;
|
|
55
|
-
strategy?: string | string[] | Strategy;
|
|
56
|
-
strategyOptions?: Record<string, any> | any;
|
|
57
|
-
authInfo?: boolean;
|
|
58
|
-
session?: boolean;
|
|
59
|
-
};
|
|
60
|
-
authorization?: {
|
|
61
|
-
enabled?: boolean;
|
|
62
|
-
requireUserInRoles?: string | string[];
|
|
63
|
-
enforcer?: Enforcer;
|
|
64
|
-
};
|
|
65
|
-
}
|
|
66
|
-
export interface EndpointArgs extends GenericAuthArgs {
|
|
67
|
-
resource?: string;
|
|
68
|
-
operation?: string;
|
|
69
|
-
handlers?: RequestHandler<ParamsDictionary, any, any, ParsedQs, Record<string, any>>[];
|
|
70
|
-
}
|
|
71
|
-
export interface BearerUser extends Express.User {
|
|
72
|
-
id: string | number;
|
|
73
|
-
name?: string;
|
|
74
|
-
token: string;
|
|
75
|
-
}
|
|
76
|
-
export interface IStaticBearerVerifyOptions {
|
|
77
|
-
message?: string | undefined;
|
|
78
|
-
scope: string | Array<string>;
|
|
79
|
-
}
|
|
80
|
-
export interface IBaseStrategyOption {
|
|
81
|
-
identityMetadata: string;
|
|
82
|
-
clientID: string;
|
|
83
|
-
isB2C?: boolean | undefined;
|
|
84
|
-
validateIssuer?: boolean | undefined;
|
|
85
|
-
issuer?: string | string[] | undefined;
|
|
86
|
-
loggingLevel?: 'info' | 'warn' | 'error' | undefined;
|
|
87
|
-
loggingNoPII?: boolean | undefined;
|
|
88
|
-
clockSkew?: number | undefined;
|
|
89
|
-
}
|
|
90
|
-
export interface ITokenPayload {
|
|
91
|
-
/** An App ID URI. Identifies the intended recipient of the token. */
|
|
92
|
-
aud?: string | undefined;
|
|
93
|
-
/** A security token service(STS) URI. Identifies the STS that constructs and returns the token,
|
|
94
|
-
* and the Azure AD tenant in which the user was authenticated.*/
|
|
95
|
-
iss?: string | undefined;
|
|
96
|
-
/** The identity provider that authenticated the subject of the token*/
|
|
97
|
-
idp?: string | undefined;
|
|
98
|
-
/** "Issued At" indicates when the authentication for this token occurred. */
|
|
99
|
-
iat?: number | undefined;
|
|
100
|
-
/** The "nbf" (not before) claim identifies the time before which the JWT must not be accepted for processing. */
|
|
101
|
-
nbf?: number | undefined;
|
|
102
|
-
/** The "exp" (expiration time) claim identifies the expiration time on or after which the JWT must not be accepted for processing. */
|
|
103
|
-
exp?: number | undefined;
|
|
104
|
-
/** An internal claim used by Azure AD to record data for token reuse. */
|
|
105
|
-
aio?: string | undefined;
|
|
106
|
-
/** Only present in v1.0 tokens. The "Authentication context class" claim. A value of "0" indicates the end-user authentication did not meet the requirements of ISO/IEC 29115. */
|
|
107
|
-
acr?: '0' | '1' | undefined;
|
|
108
|
-
/** Only present in v1.0 tokens. Identifies how the subject of the token was authenticated. */
|
|
109
|
-
amr?: string[] | undefined;
|
|
110
|
-
/** Only present in v1.0 tokens. GUID represents the application ID of the client using the token. */
|
|
111
|
-
appid?: string | undefined;
|
|
112
|
-
/** Only present in v2.0 tokens. The application ID of the client using the token. */
|
|
113
|
-
azp?: string | undefined;
|
|
114
|
-
/** Only present in v1.0 tokens. Indicates how the client was authenticated. For a public client, the value is "0".
|
|
115
|
-
* If client ID and client secret are used, the value is "1". If a client certificate was used for authentication, the value is "2". */
|
|
116
|
-
appidacr?: '0' | '1' | '2' | undefined;
|
|
117
|
-
/** Only present in v2.0 tokens. Indicates how the client was authenticated.
|
|
118
|
-
* For a public client, the value is "0". If client ID and client secret are used, the value is "1". If a client certificate was used for authentication, the value is "2". */
|
|
119
|
-
azpacr?: '0' | '1' | '2' | undefined;
|
|
120
|
-
/** Only present in v2.0 tokens. The primary username that represents the user. It could be an email address, phone number, or a generic username without a specified format */
|
|
121
|
-
preferred_username?: string | undefined;
|
|
122
|
-
/** Provides a human-readable value that identifies the subject of the token.
|
|
123
|
-
* The value is not guaranteed to be unique, it is mutable, and it's designed to be used only for display purposes. The profile scope is required in order to receive this claim. */
|
|
124
|
-
name?: string | undefined;
|
|
125
|
-
/** The set of scopes exposed by your application for which the client application has requested (and received) consent. */
|
|
126
|
-
scp?: string | undefined;
|
|
127
|
-
/** The set of permissions exposed by your application that the requesting application has been given permission to call. */
|
|
128
|
-
roles?: string[] | undefined;
|
|
129
|
-
/** Provides object IDs that represent the subject's group memberships. */
|
|
130
|
-
groups?: string | string[] | undefined;
|
|
131
|
-
/** Denoting the user is in at least one group. */
|
|
132
|
-
hasgroups?: true | undefined;
|
|
133
|
-
/** The principal about which the token asserts information, such as the user of an app. This value is immutable and cannot be reassigned or reused.
|
|
134
|
-
* It can be used to perform authorization checks safely, such as when the token is used to access a resource,
|
|
135
|
-
* and can be used as a key in database tables. Because the subject is always present in the tokens that Azure AD issues,
|
|
136
|
-
* we recommend using this value in a general-purpose authorization system. The subject is, however, a pairwise identifier - it is unique to a particular application ID. */
|
|
137
|
-
sub?: string | undefined;
|
|
138
|
-
/** GUID represents a user. This ID uniquely identifies the user across applications. */
|
|
139
|
-
oid?: string | undefined;
|
|
140
|
-
/** Represents the Azure AD tenant that the user is from. */
|
|
141
|
-
tid?: string | undefined;
|
|
142
|
-
/** Only present in v1.0 tokens. Provides a human readable value that identifies the subject of the token. */
|
|
143
|
-
unique_name?: string | undefined;
|
|
144
|
-
/** An internal claim used by Azure to revalidate tokens. */
|
|
145
|
-
uti?: string | undefined;
|
|
146
|
-
/** An internal claim used by Azure to revalidate tokens. */
|
|
147
|
-
rh?: string | undefined;
|
|
148
|
-
/** Indicates the version of the access token. */
|
|
149
|
-
ver?: '1.0' | '2.0' | undefined;
|
|
150
|
-
/** v1.0 basic claims */
|
|
151
|
-
/** The IP address the user authenticated from. */
|
|
152
|
-
ipaddr?: string | undefined;
|
|
153
|
-
/** In cases where the user has an on-premises authentication, this claim provides their SID. */
|
|
154
|
-
onprem_sid?: string | undefined;
|
|
155
|
-
/** Indicates when the user's password expires. */
|
|
156
|
-
pwd_exp?: number | undefined;
|
|
157
|
-
/** A URL where users can be sent to reset their password. */
|
|
158
|
-
pwd_url?: string | undefined;
|
|
159
|
-
/** Signals if the client is logging in from the corporate network. If they aren't, the claim isn't included. */
|
|
160
|
-
in_corp?: string | undefined;
|
|
161
|
-
/** An additional name for the user, separate from first or last name */
|
|
162
|
-
nickname?: string | undefined;
|
|
163
|
-
/** Provides the last name, surname, or family name of the user as defined on the user object. */
|
|
164
|
-
family_name?: string | undefined;
|
|
165
|
-
/** Provides the first or given name of the user, as set on the user object. */
|
|
166
|
-
given_name?: string | undefined;
|
|
167
|
-
/** The username of the user. May be a phone number, email address, or unformatted string. */
|
|
168
|
-
upn?: string | undefined;
|
|
169
|
-
}
|
|
170
|
-
export interface IBaseStrategyOption {
|
|
171
|
-
identityMetadata: string;
|
|
172
|
-
clientID: string;
|
|
173
|
-
isB2C?: boolean | undefined;
|
|
174
|
-
validateIssuer?: boolean | undefined;
|
|
175
|
-
issuer?: string | string[] | undefined;
|
|
176
|
-
loggingLevel?: 'info' | 'warn' | 'error' | undefined;
|
|
177
|
-
loggingNoPII?: boolean | undefined;
|
|
178
|
-
clockSkew?: number | undefined;
|
|
179
|
-
}
|
|
180
|
-
export interface IBearerStrategyOption extends IBaseStrategyOption {
|
|
181
|
-
audience?: string | string[] | undefined;
|
|
182
|
-
policyName?: String | undefined;
|
|
183
|
-
allowMultiAudiencesInToken?: boolean | undefined;
|
|
184
|
-
scope?: string[] | undefined;
|
|
185
|
-
}
|
|
186
|
-
export interface IBearerStrategyOptionWithRequest extends IBearerStrategyOption {
|
|
187
|
-
passReqToCallback: boolean;
|
|
188
|
-
}
|
|
189
|
-
export type VerifyBearerFunction = (token: ITokenPayload, done: VerifyCallback) => void;
|
|
190
|
-
export interface VerifyCallback {
|
|
191
|
-
(error: any, user?: any, info?: any): void;
|
|
192
|
-
}
|
|
193
|
-
//# sourceMappingURL=types.d.ts.map
|
package/dist/types.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../src/types.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,QAAQ,EAAE,MAAM,QAAQ,CAAA;AACjC,OAAO,EAAE,OAAO,EAAE,cAAc,EAAE,MAAM,SAAS,CAAA;AACjD,OAAO,EAAE,gBAAgB,EAAE,MAAM,2BAA2B,CAAA;AAC5D,OAAO,IAAI,MAAM,MAAM,CAAA;AACvB,OAAO,EAAE,cAAc,EAAE,MAAM,iBAAiB,CAAA;AAChD,OAAO,EAAE,oBAAoB,EAAE,QAAQ,EAAE,MAAM,UAAU,CAAA;AACzD,OAAO,EAAE,QAAQ,EAAE,MAAM,IAAI,CAAA;AAE7B,MAAM,WAAW,kBAAkB;IACjC,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,gBAAgB,CAAC,EAAE,MAAM,CAAA;IACzB,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,eAAe,CAAC,EAAE,OAAO,CAAA;IACzB,cAAc,CAAC,EAAE,MAAM,IAAI,CAAA;IAC3B,cAAc,CAAC,EAAE,OAAO,CAAA;CAEzB;AAED,wBAAgB,eAAe,CAAC,IAAI,EAAE,GAAG,OAExC;AAED,MAAM,MAAM,eAAe,GAAG;IAAE,YAAY,CAAC,EAAE,aAAa,GAAG,eAAe,CAAA;CAAE,GAAG,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAA;AAEtG,MAAM,MAAM,eAAe,GAAG,MAAM,CAAC,MAAM,EAAE,mBAAmB,GAAG,GAAG,CAAC,CAAA;AACvE,MAAM,WAAW,aAAa;IAC5B,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,OAAO,CAAC,EAAE,MAAM,GAAG,GAAG,CAAA;IACtB,UAAU,CAAC,EAAE,eAAe,CAAA;CAC7B;AACD,MAAM,WAAW,cAAc;IAC7B,OAAO,EAAE,OAAO,CAAA;IAChB,IAAI,EAAE,MAAM,CAAA;IACZ,QAAQ,EAAE,MAAM,CAAA;IAChB,YAAY,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAA;IAChC,cAAc,EAAE,OAAO,CAAA;IACvB,MAAM,CAAC,EAAE,IAAI,CAAC,MAAM,CAAA;IACpB,QAAQ,CAAC,EAAE,QAAQ,CAAA;IACnB,KAAK,EAAE,CAAC,IAAI,CAAC,EAAE;QAAE,mBAAmB,CAAC,EAAE,OAAO,CAAC;QAAC,mBAAmB,CAAC,EAAE,OAAO,CAAA;KAAE,KAAK;QAAE,MAAM,EAAE,IAAI,CAAC,MAAM,CAAC;QAAC,UAAU,EAAE,cAAc,CAAA;KAAE,CAAA;IACvI,IAAI,EAAE,CAAC,UAAU,CAAC,EAAE,cAAc,KAAK,OAAO,CAAC,OAAO,CAAC,CAAA;CACxD;AAED,MAAM,WAAW,mBAAoB,SAAQ,eAAe;IAC1D,QAAQ,CAAC,EAAE,YAAY,CAAA;IACvB,OAAO,CAAC,EAAE,OAAO,CAAA;IACjB,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,iBAAiB,CAAC,EAAE,OAAO,CAAA;CAC5B;AAED,MAAM,WAAW,eAAe;IAC9B,cAAc,CAAC,EAAE;QACf,QAAQ,CAAC,EAAE,oBAAoB,GAAG,CAAC,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,KAAK,GAAG,CAAC,CAAA;QAC3D,kBAAkB,CAAC,EAAE,OAAO,CAAA;QAC5B,OAAO,CAAC,EAAE,OAAO,CAAA;QACjB,QAAQ,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,QAAQ,CAAA;QACvC,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,GAAG,GAAG,CAAA;QAC3C,QAAQ,CAAC,EAAE,OAAO,CAAA;QAClB,OAAO,CAAC,EAAE,OAAO,CAAA;KAClB,CAAA;IACD,aAAa,CAAC,EAAE;QACd,OAAO,CAAC,EAAE,OAAO,CAAA;QACjB,kBAAkB,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,CAAA;QACtC,QAAQ,CAAC,EAAE,QAAQ,CAAA;KACpB,CAAA;CACF;AAED,MAAM,WAAW,YAAa,SAAQ,eAAe;IACnD,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,QAAQ,CAAC,EAAE,cAAc,CAAC,gBAAgB,EAAE,GAAG,EAAE,GAAG,EAAE,QAAQ,EAAE,MAAM,CAAC,MAAM,EAAE,GAAG,CAAC,CAAC,EAAE,CAAA;CACvF;AAED,MAAM,WAAW,UAAW,SAAQ,OAAO,CAAC,IAAI;IAC9C,EAAE,EAAE,MAAM,GAAG,MAAM,CAAA;IACnB,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,KAAK,EAAE,MAAM,CAAA;CACd;AAED,MAAM,WAAW,0BAA0B;IACzC,OAAO,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC5B,KAAK,EAAE,MAAM,GAAG,KAAK,CAAC,MAAM,CAAC,CAAA;CAC9B;AAED,MAAM,WAAW,mBAAmB;IAClC,gBAAgB,EAAE,MAAM,CAAA;IACxB,QAAQ,EAAE,MAAM,CAAA;IAChB,KAAK,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IAC3B,cAAc,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IACpC,MAAM,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;IACtC,YAAY,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,OAAO,GAAG,SAAS,CAAA;IACpD,YAAY,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IAClC,SAAS,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;CAC/B;AAED,MAAM,WAAW,aAAa;IAC5B,qEAAqE;IACrE,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB;qEACiE;IACjE,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,uEAAuE;IACvE,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,6EAA6E;IAC7E,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,iHAAiH;IACjH,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,sIAAsI;IACtI,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,yEAAyE;IACzE,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,kLAAkL;IAClL,GAAG,CAAC,EAAE,GAAG,GAAG,GAAG,GAAG,SAAS,CAAA;IAC3B,+FAA+F;IAC/F,GAAG,CAAC,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;IAC1B,qGAAqG;IACrG,KAAK,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC1B,qFAAqF;IACrF,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB;2IACuI;IACvI,QAAQ,CAAC,EAAE,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,SAAS,CAAA;IACtC;kLAC8K;IAC9K,MAAM,CAAC,EAAE,GAAG,GAAG,GAAG,GAAG,GAAG,GAAG,SAAS,CAAA;IACpC,+KAA+K;IAC/K,kBAAkB,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACvC;wLACoL;IACpL,IAAI,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACzB,2HAA2H;IAC3H,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,4HAA4H;IAC5H,KAAK,CAAC,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;IAC5B,0EAA0E;IAC1E,MAAM,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;IACtC,kDAAkD;IAClD,SAAS,CAAC,EAAE,IAAI,GAAG,SAAS,CAAA;IAC5B;;;kLAG8K;IAC9K,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,wFAAwF;IACxF,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,4DAA4D;IAC5D,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,8GAA8G;IAC9G,WAAW,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAChC,4DAA4D;IAC5D,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACxB,4DAA4D;IAC5D,EAAE,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IACvB,iDAAiD;IACjD,GAAG,CAAC,EAAE,KAAK,GAAG,KAAK,GAAG,SAAS,CAAA;IAE/B,wBAAwB;IAExB,kDAAkD;IAClD,MAAM,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC3B,gGAAgG;IAChG,UAAU,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC/B,kDAAkD;IAClD,OAAO,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC5B,6DAA6D;IAC7D,OAAO,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC5B,gHAAgH;IAChH,OAAO,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC5B,wEAAwE;IACxE,QAAQ,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC7B,iGAAiG;IACjG,WAAW,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAChC,+EAA+E;IAC/E,UAAU,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC/B,6FAA6F;IAC7F,GAAG,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;CACzB;AACD,MAAM,WAAW,mBAAmB;IAClC,gBAAgB,EAAE,MAAM,CAAA;IACxB,QAAQ,EAAE,MAAM,CAAA;IAChB,KAAK,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IAC3B,cAAc,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IACpC,MAAM,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;IACtC,YAAY,CAAC,EAAE,MAAM,GAAG,MAAM,GAAG,OAAO,GAAG,SAAS,CAAA;IACpD,YAAY,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IAClC,SAAS,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;CAC/B;AAED,MAAM,WAAW,qBAAsB,SAAQ,mBAAmB;IAChE,QAAQ,CAAC,EAAE,MAAM,GAAG,MAAM,EAAE,GAAG,SAAS,CAAA;IACxC,UAAU,CAAC,EAAE,MAAM,GAAG,SAAS,CAAA;IAC/B,0BAA0B,CAAC,EAAE,OAAO,GAAG,SAAS,CAAA;IAChD,KAAK,CAAC,EAAE,MAAM,EAAE,GAAG,SAAS,CAAA;CAC7B;AAED,MAAM,WAAW,gCAAiC,SAAQ,qBAAqB;IAC7E,iBAAiB,EAAE,OAAO,CAAA;CAC3B;AACD,MAAM,MAAM,oBAAoB,GAAG,CAAC,KAAK,EAAE,aAAa,EAAE,IAAI,EAAE,cAAc,KAAK,IAAI,CAAA;AACvF,MAAM,WAAW,cAAc;IAC7B,CAAC,KAAK,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,GAAG,EAAE,IAAI,CAAC,EAAE,GAAG,GAAG,IAAI,CAAA;CAC3C"}
|
package/dist/types.js
DELETED
package/dist/types.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"types.js","sourceRoot":"","sources":["../src/types.ts"],"names":[],"mappings":";;AAmBA,0CAEC;AAFD,SAAgB,eAAe,CAAC,IAAS;IACvC,OAAO,cAAc,IAAI,IAAI,IAAI,IAAI,CAAC,YAAY,CAAA;AACpD,CAAC"}
|