@strands.gg/accui 0.2.13 → 0.2.15

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. package/dist/accui.css +1 -1
  2. package/dist/nuxt/runtime/composables/useStrandsAuth.cjs.js +1 -1
  3. package/dist/nuxt/runtime/composables/useStrandsAuth.d.ts +11 -0
  4. package/dist/nuxt/runtime/composables/useStrandsAuth.d.ts.map +1 -1
  5. package/dist/nuxt/runtime/composables/useStrandsAuth.es.js +1 -1
  6. package/dist/nuxt/runtime/plugin.client.cjs.js +1 -1
  7. package/dist/nuxt/runtime/plugin.client.es.js +1 -1
  8. package/dist/nuxt/runtime/plugin.server.cjs.js +1 -1
  9. package/dist/nuxt/runtime/plugin.server.es.js +1 -1
  10. package/dist/nuxt-v4/runtime/composables/useStrandsAuth.cjs.js +1 -1
  11. package/dist/nuxt-v4/runtime/composables/useStrandsAuth.es.js +1 -1
  12. package/dist/nuxt-v4/runtime/plugin.client.cjs.js +1 -1
  13. package/dist/nuxt-v4/runtime/plugin.client.es.js +1 -1
  14. package/dist/nuxt-v4/runtime/plugin.server.cjs.js +1 -1
  15. package/dist/nuxt-v4/runtime/plugin.server.es.js +1 -1
  16. package/dist/strands-auth-ui.cjs.js +5 -2
  17. package/dist/strands-auth-ui.cjs.js.map +1 -1
  18. package/dist/strands-auth-ui.es.js +4147 -1616
  19. package/dist/strands-auth-ui.es.js.map +1 -1
  20. package/dist/types/index.d.ts +33 -0
  21. package/dist/types/index.d.ts.map +1 -1
  22. package/dist/useStrandsAuth-DVmxn9BE.cjs +2 -0
  23. package/dist/useStrandsAuth-DVmxn9BE.cjs.map +1 -0
  24. package/dist/useStrandsAuth-JfjnqhIV.js +272 -0
  25. package/dist/useStrandsAuth-JfjnqhIV.js.map +1 -0
  26. package/dist/useStrandsConfig-BIACvByo.cjs +2 -0
  27. package/dist/useStrandsConfig-BIACvByo.cjs.map +1 -0
  28. package/dist/useStrandsConfig-DK37s9ZC.js +120 -0
  29. package/dist/useStrandsConfig-DK37s9ZC.js.map +1 -0
  30. package/dist/vue/components/StrandsBackupCodesModal.vue.d.ts +12 -0
  31. package/dist/vue/components/StrandsBackupCodesModal.vue.d.ts.map +1 -0
  32. package/dist/vue/components/StrandsConfirmModal.vue.d.ts +22 -0
  33. package/dist/vue/components/StrandsConfirmModal.vue.d.ts.map +1 -0
  34. package/dist/vue/components/StrandsEmailMfaSetupModal.vue.d.ts +12 -0
  35. package/dist/vue/components/StrandsEmailMfaSetupModal.vue.d.ts.map +1 -0
  36. package/dist/vue/components/StrandsMFASetup.vue.d.ts +10 -5
  37. package/dist/vue/components/StrandsMFASetup.vue.d.ts.map +1 -1
  38. package/dist/vue/components/StrandsMfaModal.vue.d.ts +12 -0
  39. package/dist/vue/components/StrandsMfaModal.vue.d.ts.map +1 -0
  40. package/dist/vue/components/StrandsMfaVerification.vue.d.ts +17 -0
  41. package/dist/vue/components/StrandsMfaVerification.vue.d.ts.map +1 -0
  42. package/dist/vue/components/StrandsSignIn.vue.d.ts.map +1 -1
  43. package/dist/vue/components/StrandsTotpSetupModal.vue.d.ts +12 -0
  44. package/dist/vue/components/StrandsTotpSetupModal.vue.d.ts.map +1 -0
  45. package/dist/vue/components/StrandsUserProfile.vue.d.ts.map +1 -1
  46. package/dist/vue/components/index.d.ts +6 -0
  47. package/dist/vue/components/index.d.ts.map +1 -1
  48. package/dist/vue/composables/useStrandsAuth.d.ts +11 -0
  49. package/dist/vue/composables/useStrandsAuth.d.ts.map +1 -1
  50. package/dist/vue/composables/useStrandsConfig.d.ts.map +1 -1
  51. package/dist/vue/composables/useStrandsMfa.d.ts +37 -0
  52. package/dist/vue/composables/useStrandsMfa.d.ts.map +1 -0
  53. package/dist/vue/ui/UiModal.vue.d.ts +33 -0
  54. package/dist/vue/ui/UiModal.vue.d.ts.map +1 -0
  55. package/package.json +1 -1
  56. package/dist/useStrandsAuth-CJsQ5cew.cjs +0 -2
  57. package/dist/useStrandsAuth-CJsQ5cew.cjs.map +0 -1
  58. package/dist/useStrandsAuth-OsoGbmZh.js +0 -248
  59. package/dist/useStrandsAuth-OsoGbmZh.js.map +0 -1
  60. package/dist/useStrandsConfig-BDUymyIP.cjs +0 -2
  61. package/dist/useStrandsConfig-BDUymyIP.cjs.map +0 -1
  62. package/dist/useStrandsConfig-DMkkLRCA.js +0 -102
  63. package/dist/useStrandsConfig-DMkkLRCA.js.map +0 -1
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useStrandsConfig-DK37s9ZC.js","sources":["../../../apps/accounts-ui/src/shared/defaults.ts","../../../apps/accounts-ui/src/vue/composables/useStrandsConfig.ts"],"sourcesContent":["import type { StrandsAuthConfig } from '../types'\n\nexport const STRANDS_AUTH_DEFAULTS: Required<Omit<StrandsAuthConfig, 'clientId' | 'supportEmail'>> = {\n baseUrl: 'https://your-api.example.com',\n accentColor: '#EA00A8',\n redirectUrl: '/',\n onSignInUrl: '/dashboard',\n onSignOutUrl: '/',\n autoRefresh: true,\n refreshInterval: 4,\n protectedRoutes: [],\n guestOnlyRoutes: ['/auth', '/login', '/register'],\n devMode: false,\n styles: true,\n endpoints: {}\n}","import { ref, computed, inject, provide } from 'vue'\nimport { STRANDS_AUTH_DEFAULTS } from '../../shared/defaults'\n\n// Re-export types for components\nexport type { StrandsAuthConfig, StrandsAuthEndpoints } from '../../types'\nimport type { StrandsAuthConfig, StrandsAuthEndpoints } from '../../types'\n\nconst DEFAULT_ENDPOINTS: StrandsAuthEndpoints = {\n signIn: '/api/v1/auth/sign-in',\n signUp: '/api/v1/auth/sign-up',\n signOut: '/api/v1/auth/sign-out',\n refresh: '/api/v1/auth/refresh',\n passwordReset: '/api/v1/auth/password-reset',\n passwordResetConfirm: '/api/v1/auth/password-reset/confirm',\n profile: '/api/v1/user/profile',\n verifyEmail: '/api/v1/auth/verify-email',\n oauthProviders: '/api/v1/oauth/providers',\n oauthProvider: '/api/v1/oauth/providers/{provider_id}',\n changeEmail: '/api/v1/user/change-email',\n avatar: '/api/v1/user/avatar',\n // MFA endpoints\n mfaDevices: '/api/v1/mfa/devices',\n mfaTotpSetup: '/api/v1/mfa/totp/setup',\n mfaTotpVerify: '/api/v1/mfa/totp/verify',\n mfaEmailSetup: '/api/v1/mfa/email/setup',\n mfaEmailSend: '/api/v1/mfa/email/send',\n mfaEmailVerify: '/api/v1/mfa/email/verify',\n mfaDeviceDisable: '/api/v1/mfa/device/disable',\n mfaBackupCodes: '/api/v1/mfa/backup-codes/regenerate'\n}\n\nconst STRANDS_CONFIG_KEY = Symbol('strands-config')\n\n// Global configuration state\nconst globalConfig = ref<StrandsAuthConfig | null>(null)\n\nexport function provideStrandsConfig(config: StrandsAuthConfig) {\n globalConfig.value = config\n \n try {\n provide(STRANDS_CONFIG_KEY, config)\n } catch (error) {\n console.warn('[Strands Auth] Could not provide config via Vue provide/inject. Config available via global state only.', error)\n }\n}\n\nexport function useStrandsConfig(fallbackConfig?: Partial<StrandsAuthConfig>) {\n // Try to get config from provide/inject first\n const injectedConfig = inject<StrandsAuthConfig | null>(STRANDS_CONFIG_KEY, null)\n \n // Try to get Nuxt runtime config as additional fallback\n let nuxtConfig = null\n try {\n if (typeof window !== 'undefined') {\n // Check window global set by plugin\n if ((window as any).__STRANDS_CONFIG__) {\n nuxtConfig = (window as any).__STRANDS_CONFIG__\n }\n // Fallback to __NUXT__ hydration data\n else if ((window as any).__NUXT__) {\n const nuxtData = (window as any).__NUXT__\n nuxtConfig = nuxtData?.config?.public?.strandsAuth ||\n nuxtData?.public?.strandsAuth ||\n nuxtData?.strandsAuth\n }\n }\n } catch (error) {\n console.error('[Strands Auth] Error accessing runtime configuration:', error)\n }\n \n // Merge configuration sources in priority order\n const activeConfig = computed(() => {\n // Start with defaults, then layer on user configurations\n const config = {\n ...STRANDS_AUTH_DEFAULTS,\n ...(fallbackConfig || {}),\n ...(injectedConfig || {}),\n ...(globalConfig.value || {}),\n ...(nuxtConfig || {})\n }\n \n // Only warn if we're using the exact default URL (indicating no config was provided)\n if (config.baseUrl === STRANDS_AUTH_DEFAULTS.baseUrl && typeof window === 'undefined') {\n console.warn('[Strands Auth] No baseUrl configured for SSR. Please provide a baseUrl in your strandsAuth configuration.')\n }\n \n return config\n })\n\n const endpoints = computed<StrandsAuthEndpoints>(() => {\n const config = activeConfig.value\n const customEndpoints = config.endpoints || {}\n \n return {\n signIn: customEndpoints.signIn || DEFAULT_ENDPOINTS.signIn,\n signUp: customEndpoints.signUp || DEFAULT_ENDPOINTS.signUp,\n signOut: customEndpoints.signOut || DEFAULT_ENDPOINTS.signOut,\n refresh: customEndpoints.refresh || DEFAULT_ENDPOINTS.refresh,\n passwordReset: customEndpoints.passwordReset || DEFAULT_ENDPOINTS.passwordReset,\n passwordResetConfirm: customEndpoints.passwordResetConfirm || DEFAULT_ENDPOINTS.passwordResetConfirm,\n profile: customEndpoints.profile || DEFAULT_ENDPOINTS.profile,\n verifyEmail: customEndpoints.verifyEmail || DEFAULT_ENDPOINTS.verifyEmail,\n oauthProviders: customEndpoints.oauthProviders || DEFAULT_ENDPOINTS.oauthProviders,\n oauthProvider: customEndpoints.oauthProvider || DEFAULT_ENDPOINTS.oauthProvider,\n changeEmail: customEndpoints.changeEmail || DEFAULT_ENDPOINTS.changeEmail,\n avatar: customEndpoints.avatar || DEFAULT_ENDPOINTS.avatar,\n // MFA endpoints\n mfaDevices: customEndpoints.mfaDevices || DEFAULT_ENDPOINTS.mfaDevices,\n mfaTotpSetup: customEndpoints.mfaTotpSetup || DEFAULT_ENDPOINTS.mfaTotpSetup,\n mfaTotpVerify: customEndpoints.mfaTotpVerify || DEFAULT_ENDPOINTS.mfaTotpVerify,\n mfaEmailSetup: customEndpoints.mfaEmailSetup || DEFAULT_ENDPOINTS.mfaEmailSetup,\n mfaEmailSend: customEndpoints.mfaEmailSend || DEFAULT_ENDPOINTS.mfaEmailSend,\n mfaEmailVerify: customEndpoints.mfaEmailVerify || DEFAULT_ENDPOINTS.mfaEmailVerify,\n mfaDeviceDisable: customEndpoints.mfaDeviceDisable || DEFAULT_ENDPOINTS.mfaDeviceDisable,\n mfaBackupCodes: customEndpoints.mfaBackupCodes || DEFAULT_ENDPOINTS.mfaBackupCodes\n }\n })\n\n const getUrl = (endpoint: keyof StrandsAuthEndpoints | string) => {\n const config = activeConfig.value\n if (!config.baseUrl) {\n throw new Error('Base URL is required in configuration')\n }\n \n // If endpoint is a string key, try to find it in endpoints first\n let endpointPath: string\n if (typeof endpoint === 'string' && endpoint in endpoints.value) {\n endpointPath = endpoints.value[endpoint as keyof StrandsAuthEndpoints]\n } else if (typeof endpoint === 'string') {\n // If it's a string but not a key, treat it as a literal path\n endpointPath = endpoint\n } else {\n // It's a keyof StrandsAuthEndpoints\n endpointPath = endpoints.value[endpoint]\n }\n \n // Ensure proper URL construction with slash separation\n const baseUrl = config.baseUrl.replace(/\\/$/, '')\n const path = endpointPath.startsWith('/') ? endpointPath : `/${endpointPath}`\n \n return `${baseUrl}${path}`\n }\n\n const getSupportEmail = () => {\n const config = activeConfig.value\n return config.supportEmail || null\n }\n\n return {\n config: activeConfig,\n endpoints,\n getUrl,\n getSupportEmail\n }\n}\n\n// Convenience function to set global config\nexport function setStrandsConfig(config: StrandsAuthConfig) {\n globalConfig.value = config\n}\n"],"names":["STRANDS_AUTH_DEFAULTS","DEFAULT_ENDPOINTS","STRANDS_CONFIG_KEY","globalConfig","ref","provideStrandsConfig","config","provide","error","useStrandsConfig","fallbackConfig","injectedConfig","inject","nuxtConfig","nuxtData","activeConfig","computed","endpoints","customEndpoints","endpoint","endpointPath","baseUrl","path","setStrandsConfig"],"mappings":";AAEO,MAAMA,IAAwF;AAAA,EACnG,SAAS;AAAA,EACT,aAAa;AAAA,EACb,aAAa;AAAA,EACb,aAAa;AAAA,EACb,cAAc;AAAA,EACd,aAAa;AAAA,EACb,iBAAiB;AAAA,EACjB,iBAAiB,CAAA;AAAA,EACjB,iBAAiB,CAAC,SAAS,UAAU,WAAW;AAAA,EAChD,SAAS;AAAA,EACT,QAAQ;AAAA,EACR,WAAW,CAAA;AACb,GCRMC,IAA0C;AAAA,EAC9C,QAAQ;AAAA,EACR,QAAQ;AAAA,EACR,SAAS;AAAA,EACT,SAAS;AAAA,EACT,eAAe;AAAA,EACf,sBAAsB;AAAA,EACtB,SAAS;AAAA,EACT,aAAa;AAAA,EACb,gBAAgB;AAAA,EAChB,eAAe;AAAA,EACf,aAAa;AAAA,EACb,QAAQ;AAAA;AAAA,EAER,YAAY;AAAA,EACZ,cAAc;AAAA,EACd,eAAe;AAAA,EACf,eAAe;AAAA,EACf,cAAc;AAAA,EACd,gBAAgB;AAAA,EAChB,kBAAkB;AAAA,EAClB,gBAAgB;AAClB,GAEMC,IAAqB,OAAO,gBAAgB,GAG5CC,IAAeC,EAA8B,IAAI;AAEhD,SAASC,EAAqBC,GAA2B;AAC9D,EAAAH,EAAa,QAAQG;AAErB,MAAI;AACF,IAAAC,EAAQL,GAAoBI,CAAM;AAAA,EACpC,SAASE,GAAO;AACd,YAAQ,KAAK,2GAA2GA,CAAK;AAAA,EAC/H;AACF;AAEO,SAASC,EAAiBC,GAA6C;AAE5E,QAAMC,IAAiBC,EAAiCV,GAAoB,IAAI;AAGhF,MAAIW,IAAa;AACjB,MAAI;AACF,QAAI,OAAO,SAAW;AAEpB,UAAK,OAAe;AAClB,QAAAA,IAAc,OAAe;AAAA,eAGrB,OAAe,UAAU;AACjC,cAAMC,IAAY,OAAe;AACjC,QAAAD,IAAaC,GAAU,QAAQ,QAAQ,eAC1BA,GAAU,QAAQ,eAClBA,GAAU;AAAA,MACzB;AAAA;AAAA,EAEJ,SAASN,GAAO;AACd,YAAQ,MAAM,yDAAyDA,CAAK;AAAA,EAC9E;AAGA,QAAMO,IAAeC,EAAS,MAAM;AAElC,UAAMV,IAAS;AAAA,MACb,GAAGN;AAAA,MACH,GAAIU,KAAkB,CAAA;AAAA,MACtB,GAAIC,KAAkB,CAAA;AAAA,MACtB,GAAIR,EAAa,SAAS,CAAA;AAAA,MAC1B,GAAIU,KAAc,CAAA;AAAA,IAAC;AAIrB,WAAIP,EAAO,YAAYN,EAAsB,WAAW,OAAO,SAAW,OACxE,QAAQ,KAAK,2GAA2G,GAGnHM;AAAA,EACT,CAAC,GAEKW,IAAYD,EAA+B,MAAM;AAErD,UAAME,IADSH,EAAa,MACG,aAAa,CAAA;AAE5C,WAAO;AAAA,MACL,QAAQG,EAAgB,UAAUjB,EAAkB;AAAA,MACpD,QAAQiB,EAAgB,UAAUjB,EAAkB;AAAA,MACpD,SAASiB,EAAgB,WAAWjB,EAAkB;AAAA,MACtD,SAASiB,EAAgB,WAAWjB,EAAkB;AAAA,MACtD,eAAeiB,EAAgB,iBAAiBjB,EAAkB;AAAA,MAClE,sBAAsBiB,EAAgB,wBAAwBjB,EAAkB;AAAA,MAChF,SAASiB,EAAgB,WAAWjB,EAAkB;AAAA,MACtD,aAAaiB,EAAgB,eAAejB,EAAkB;AAAA,MAC9D,gBAAgBiB,EAAgB,kBAAkBjB,EAAkB;AAAA,MACpE,eAAeiB,EAAgB,iBAAiBjB,EAAkB;AAAA,MAClE,aAAaiB,EAAgB,eAAejB,EAAkB;AAAA,MAC9D,QAAQiB,EAAgB,UAAUjB,EAAkB;AAAA;AAAA,MAEpD,YAAYiB,EAAgB,cAAcjB,EAAkB;AAAA,MAC5D,cAAciB,EAAgB,gBAAgBjB,EAAkB;AAAA,MAChE,eAAeiB,EAAgB,iBAAiBjB,EAAkB;AAAA,MAClE,eAAeiB,EAAgB,iBAAiBjB,EAAkB;AAAA,MAClE,cAAciB,EAAgB,gBAAgBjB,EAAkB;AAAA,MAChE,gBAAgBiB,EAAgB,kBAAkBjB,EAAkB;AAAA,MACpE,kBAAkBiB,EAAgB,oBAAoBjB,EAAkB;AAAA,MACxE,gBAAgBiB,EAAgB,kBAAkBjB,EAAkB;AAAA,IAAA;AAAA,EAExE,CAAC;AAgCD,SAAO;AAAA,IACL,QAAQc;AAAA,IACR,WAAAE;AAAA,IACA,QAjCa,CAACE,MAAkD;AAChE,YAAMb,IAASS,EAAa;AAC5B,UAAI,CAACT,EAAO;AACV,cAAM,IAAI,MAAM,uCAAuC;AAIzD,UAAIc;AACJ,MAAI,OAAOD,KAAa,YAAYA,KAAYF,EAAU,QACxDG,IAAeH,EAAU,MAAME,CAAsC,IAC5D,OAAOA,KAAa,WAE7BC,IAAeD,IAGfC,IAAeH,EAAU,MAAME,CAAQ;AAIzC,YAAME,IAAUf,EAAO,QAAQ,QAAQ,OAAO,EAAE,GAC1CgB,IAAOF,EAAa,WAAW,GAAG,IAAIA,IAAe,IAAIA,CAAY;AAE3E,aAAO,GAAGC,CAAO,GAAGC,CAAI;AAAA,IAC1B;AAAA,IAWE,iBATsB,MACPP,EAAa,MACd,gBAAgB;AAAA,EAO9B;AAEJ;AAGO,SAASQ,EAAiBjB,GAA2B;AAC1D,EAAAH,EAAa,QAAQG;AACvB;"}
@@ -0,0 +1,12 @@
1
+ import { MfaDevice } from '../../types';
2
+ interface Props {
3
+ show: boolean;
4
+ device?: MfaDevice | null;
5
+ }
6
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
7
+ close: () => any;
8
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
9
+ onClose?: (() => any) | undefined;
10
+ }>, {}, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
11
+ export default _default;
12
+ //# sourceMappingURL=StrandsBackupCodesModal.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"StrandsBackupCodesModal.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsBackupCodesModal.vue"],"names":[],"mappings":"AA0IA;AAkQA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,aAAa,CAAA;AAE5C,UAAU,KAAK;IACb,IAAI,EAAE,OAAO,CAAA;IACb,MAAM,CAAC,EAAE,SAAS,GAAG,IAAI,CAAA;CAC1B;;;;;;AA2cD,wBAQG"}
@@ -0,0 +1,22 @@
1
+ type ButtonVariant = 'primary' | 'secondary' | 'ghost' | 'outline';
2
+ interface Props {
3
+ show: boolean;
4
+ title: string;
5
+ message: string;
6
+ confirmText?: string;
7
+ cancelText?: string;
8
+ variant?: ButtonVariant;
9
+ }
10
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
11
+ confirm: () => any;
12
+ cancel: () => any;
13
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
14
+ onConfirm?: (() => any) | undefined;
15
+ onCancel?: (() => any) | undefined;
16
+ }>, {
17
+ variant: ButtonVariant;
18
+ confirmText: string;
19
+ cancelText: string;
20
+ }, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
21
+ export default _default;
22
+ //# sourceMappingURL=StrandsConfirmModal.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"StrandsConfirmModal.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsConfirmModal.vue"],"names":[],"mappings":"AA0BA;AA4EA,KAAK,aAAa,GAAG,SAAS,GAAG,WAAW,GAAG,OAAO,GAAG,SAAS,CAAA;AAElE,UAAU,KAAK;IACb,IAAI,EAAE,OAAO,CAAA;IACb,KAAK,EAAE,MAAM,CAAA;IACb,OAAO,EAAE,MAAM,CAAA;IACf,WAAW,CAAC,EAAE,MAAM,CAAA;IACpB,UAAU,CAAC,EAAE,MAAM,CAAA;IACnB,OAAO,CAAC,EAAE,aAAa,CAAA;CACxB;;;;;;;;aADW,aAAa;iBAFT,MAAM;gBACP,MAAM;;AAuJrB,wBASG"}
@@ -0,0 +1,12 @@
1
+ interface Props {
2
+ show: boolean;
3
+ }
4
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
5
+ success: () => any;
6
+ close: () => any;
7
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
8
+ onSuccess?: (() => any) | undefined;
9
+ onClose?: (() => any) | undefined;
10
+ }>, {}, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
11
+ export default _default;
12
+ //# sourceMappingURL=StrandsEmailMfaSetupModal.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"StrandsEmailMfaSetupModal.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsEmailMfaSetupModal.vue"],"names":[],"mappings":"AAuKA;AAyTA,UAAU,KAAK;IACb,IAAI,EAAE,OAAO,CAAA;CACd;;;;;;;;AA6hBD,wBAQG"}
@@ -1,11 +1,16 @@
1
- declare const _default: import('vue').DefineComponent<{}, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
1
+ interface Props {
2
+ show?: boolean;
3
+ }
4
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
2
5
  success: () => any;
3
6
  error: (error: string) => any;
4
- back: () => any;
5
- }, string, import('vue').PublicProps, Readonly<{}> & Readonly<{
7
+ close: () => any;
8
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
6
9
  onSuccess?: (() => any) | undefined;
7
10
  onError?: ((error: string) => any) | undefined;
8
- onBack?: (() => any) | undefined;
9
- }>, {}, {}, {}, {}, string, import('vue').ComponentProvideOptions, true, {}, HTMLDivElement>;
11
+ onClose?: (() => any) | undefined;
12
+ }>, {
13
+ show: boolean;
14
+ }, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
10
15
  export default _default;
11
16
  //# sourceMappingURL=StrandsMFASetup.vue.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"StrandsMFASetup.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsMFASetup.vue"],"names":[],"mappings":"AA2DA;;;;;;;;;;AA4LA,wBAOG"}
1
+ {"version":3,"file":"StrandsMFASetup.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsMFASetup.vue"],"names":[],"mappings":"AA8HA;AAsNA,UAAU,KAAK;IACb,IAAI,CAAC,EAAE,OAAO,CAAA;CACf;;;;;;;;;;UADQ,OAAO;;AAibhB,wBAQG"}
@@ -0,0 +1,12 @@
1
+ interface Props {
2
+ show: boolean;
3
+ }
4
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
5
+ close: () => any;
6
+ "mfa-updated": () => any;
7
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
8
+ onClose?: (() => any) | undefined;
9
+ "onMfa-updated"?: (() => any) | undefined;
10
+ }>, {}, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
11
+ export default _default;
12
+ //# sourceMappingURL=StrandsMfaModal.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"StrandsMfaModal.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsMfaModal.vue"],"names":[],"mappings":"AA+NA;AAkWA,UAAU,KAAK;IACb,IAAI,EAAE,OAAO,CAAA;CACd;;;;;;;;AAmpBD,wBAOG"}
@@ -0,0 +1,17 @@
1
+ import { MfaDevice } from '../../types';
2
+ interface Props {
3
+ show: boolean;
4
+ availableMfaMethods?: MfaDevice[];
5
+ sessionId?: string;
6
+ }
7
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
8
+ success: () => any;
9
+ error: (error: string) => any;
10
+ close: () => any;
11
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
12
+ onSuccess?: (() => any) | undefined;
13
+ onError?: ((error: string) => any) | undefined;
14
+ onClose?: (() => any) | undefined;
15
+ }>, {}, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
16
+ export default _default;
17
+ //# sourceMappingURL=StrandsMfaVerification.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"StrandsMfaVerification.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsMfaVerification.vue"],"names":[],"mappings":"AAuKA;AA2VA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,aAAa,CAAA;AAE5C,UAAU,KAAK;IACb,IAAI,EAAE,OAAO,CAAA;IACb,mBAAmB,CAAC,EAAE,SAAS,EAAE,CAAA;IACjC,SAAS,CAAC,EAAE,MAAM,CAAA;CACnB;;;;;;;;;;AAsjBD,wBAQG"}
@@ -1 +1 @@
1
- {"version":3,"file":"StrandsSignIn.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsSignIn.vue"],"names":[],"mappings":"AAqGA;AAgOA,OAAO,EAAoB,KAAK,iBAAiB,EAAE,MAAM,iCAAiC,CAAA;AAK1F,UAAU,KAAK;IACb,WAAW,CAAC,EAAE,MAAM,CAAA;IACpB,WAAW,CAAC,EAAE,MAAM,EAAE,CAAA;IACtB,MAAM,CAAC,EAAE,iBAAiB,CAAA;CAC3B;;;;;;;;;;;;iBAHe,MAAM;iBACN,MAAM,EAAE;;AAqdxB,wBASG"}
1
+ {"version":3,"file":"StrandsSignIn.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsSignIn.vue"],"names":[],"mappings":"AA8GA;AAmPA,OAAO,EAAoB,KAAK,iBAAiB,EAAE,MAAM,iCAAiC,CAAA;AAK1F,UAAU,KAAK;IACb,WAAW,CAAC,EAAE,MAAM,CAAA;IACpB,WAAW,CAAC,EAAE,MAAM,EAAE,CAAA;IACtB,MAAM,CAAC,EAAE,iBAAiB,CAAA;CAC3B;;;;;;;;;;;;iBAHe,MAAM;iBACN,MAAM,EAAE;;AA8fxB,wBASG"}
@@ -0,0 +1,12 @@
1
+ interface Props {
2
+ show: boolean;
3
+ }
4
+ declare const _default: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {} & {
5
+ success: () => any;
6
+ close: () => any;
7
+ }, string, import('vue').PublicProps, Readonly<Props> & Readonly<{
8
+ onSuccess?: (() => any) | undefined;
9
+ onClose?: (() => any) | undefined;
10
+ }>, {}, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
11
+ export default _default;
12
+ //# sourceMappingURL=StrandsTotpSetupModal.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"StrandsTotpSetupModal.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsTotpSetupModal.vue"],"names":[],"mappings":"AAuNA;AAsUA,UAAU,KAAK;IACb,IAAI,EAAE,OAAO,CAAA;CACd;;;;;;;;AA2kBD,wBAQG"}
@@ -1 +1 @@
1
- {"version":3,"file":"StrandsUserProfile.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsUserProfile.vue"],"names":[],"mappings":"AA0RA;AA0wBA,OAAO,EAAoB,KAAK,iBAAiB,EAAE,MAAM,iCAAiC,CAAA;AAE1F,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,aAAa,CAAA;AAEvC,UAAU,KAAK;IACb,IAAI,CAAC,EAAE,IAAI,CAAA;IACX,MAAM,CAAC,EAAE,iBAAiB,CAAA;IAC1B,SAAS,CAAC,EAAE,OAAO,CAAA;CACpB;;;;;;;;;;;;eADa,OAAO;;;;AAgmCrB,wBAUG"}
1
+ {"version":3,"file":"StrandsUserProfile.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/StrandsUserProfile.vue"],"names":[],"mappings":"AAgSA;AA0xBA,OAAO,EAAoB,KAAK,iBAAiB,EAAE,MAAM,iCAAiC,CAAA;AAE1F,OAAO,KAAK,EAAE,IAAI,EAAE,MAAM,aAAa,CAAA;AAEvC,UAAU,KAAK;IACb,IAAI,CAAC,EAAE,IAAI,CAAA;IACX,MAAM,CAAC,EAAE,iBAAiB,CAAA;IAC1B,SAAS,CAAC,EAAE,OAAO,CAAA;CACpB;;;;;;;;;;;;eADa,OAAO;;;;AA8nCrB,wBAUG"}
@@ -5,6 +5,12 @@ export { default as StrandsCompleteSignUp } from './StrandsCompleteSignUp.vue';
5
5
  export { default as StrandsUserProfile } from './StrandsUserProfile.vue';
6
6
  export { default as StrandsPasswordReset } from './StrandsPasswordReset.vue';
7
7
  export { default as StrandsMFASetup } from './StrandsMFASetup.vue';
8
+ export { default as StrandsMfaModal } from './StrandsMfaModal.vue';
9
+ export { default as StrandsMfaVerification } from './StrandsMfaVerification.vue';
10
+ export { default as StrandsTotpSetupModal } from './StrandsTotpSetupModal.vue';
11
+ export { default as StrandsEmailMfaSetupModal } from './StrandsEmailMfaSetupModal.vue';
12
+ export { default as StrandsBackupCodesModal } from './StrandsBackupCodesModal.vue';
13
+ export { default as StrandsConfirmModal } from './StrandsConfirmModal.vue';
8
14
  export { default as SignedIn } from './SignedIn.vue';
9
15
  export { default as SignedOut } from './SignedOut.vue';
10
16
  export { default as StrandsLogo } from './StrandsLogo.vue';
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,OAAO,IAAI,WAAW,EAAE,MAAM,mBAAmB,CAAA;AAC1D,OAAO,EAAE,OAAO,IAAI,aAAa,EAAE,MAAM,qBAAqB,CAAA;AAC9D,OAAO,EAAE,OAAO,IAAI,aAAa,EAAE,MAAM,qBAAqB,CAAA;AAC9D,OAAO,EAAE,OAAO,IAAI,qBAAqB,EAAE,MAAM,6BAA6B,CAAA;AAC9E,OAAO,EAAE,OAAO,IAAI,kBAAkB,EAAE,MAAM,0BAA0B,CAAA;AACxE,OAAO,EAAE,OAAO,IAAI,oBAAoB,EAAE,MAAM,4BAA4B,CAAA;AAC5E,OAAO,EAAE,OAAO,IAAI,eAAe,EAAE,MAAM,uBAAuB,CAAA;AAClE,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,gBAAgB,CAAA;AACpD,OAAO,EAAE,OAAO,IAAI,SAAS,EAAE,MAAM,iBAAiB,CAAA;AACtD,OAAO,EAAE,OAAO,IAAI,WAAW,EAAE,MAAM,mBAAmB,CAAA;AAC1D,OAAO,EAAE,OAAO,IAAI,oBAAoB,EAAE,MAAM,4BAA4B,CAAA;AAC5E,OAAO,EAAE,OAAO,IAAI,qBAAqB,EAAE,MAAM,6BAA6B,CAAA;AAC9E,OAAO,EAAE,OAAO,IAAI,OAAO,EAAE,MAAM,eAAe,CAAA"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/components/index.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,OAAO,IAAI,WAAW,EAAE,MAAM,mBAAmB,CAAA;AAC1D,OAAO,EAAE,OAAO,IAAI,aAAa,EAAE,MAAM,qBAAqB,CAAA;AAC9D,OAAO,EAAE,OAAO,IAAI,aAAa,EAAE,MAAM,qBAAqB,CAAA;AAC9D,OAAO,EAAE,OAAO,IAAI,qBAAqB,EAAE,MAAM,6BAA6B,CAAA;AAC9E,OAAO,EAAE,OAAO,IAAI,kBAAkB,EAAE,MAAM,0BAA0B,CAAA;AACxE,OAAO,EAAE,OAAO,IAAI,oBAAoB,EAAE,MAAM,4BAA4B,CAAA;AAC5E,OAAO,EAAE,OAAO,IAAI,eAAe,EAAE,MAAM,uBAAuB,CAAA;AAClE,OAAO,EAAE,OAAO,IAAI,eAAe,EAAE,MAAM,uBAAuB,CAAA;AAClE,OAAO,EAAE,OAAO,IAAI,sBAAsB,EAAE,MAAM,8BAA8B,CAAA;AAChF,OAAO,EAAE,OAAO,IAAI,qBAAqB,EAAE,MAAM,6BAA6B,CAAA;AAC9E,OAAO,EAAE,OAAO,IAAI,yBAAyB,EAAE,MAAM,iCAAiC,CAAA;AACtF,OAAO,EAAE,OAAO,IAAI,uBAAuB,EAAE,MAAM,+BAA+B,CAAA;AAClF,OAAO,EAAE,OAAO,IAAI,mBAAmB,EAAE,MAAM,2BAA2B,CAAA;AAC1E,OAAO,EAAE,OAAO,IAAI,QAAQ,EAAE,MAAM,gBAAgB,CAAA;AACpD,OAAO,EAAE,OAAO,IAAI,SAAS,EAAE,MAAM,iBAAiB,CAAA;AACtD,OAAO,EAAE,OAAO,IAAI,WAAW,EAAE,MAAM,mBAAmB,CAAA;AAC1D,OAAO,EAAE,OAAO,IAAI,oBAAoB,EAAE,MAAM,4BAA4B,CAAA;AAC5E,OAAO,EAAE,OAAO,IAAI,qBAAqB,EAAE,MAAM,6BAA6B,CAAA;AAC9E,OAAO,EAAE,OAAO,IAAI,OAAO,EAAE,MAAM,eAAe,CAAA"}
@@ -35,6 +35,16 @@ export declare function useStrandsAuth(): {
35
35
  isAuthenticated: import('vue').ComputedRef<boolean>;
36
36
  isLoading: import('vue').ComputedRef<boolean>;
37
37
  loading: import('vue').ComputedRef<boolean>;
38
+ mfaRequired: import('vue').ComputedRef<boolean>;
39
+ mfaSessionId: import('vue').ComputedRef<string | null>;
40
+ availableMfaMethods: import('vue').ComputedRef<{
41
+ id: string;
42
+ device_type: import('../..').MfaDeviceType;
43
+ device_name: string;
44
+ is_active: boolean;
45
+ last_used_at?: (string | Date) | undefined;
46
+ created_at: string | Date;
47
+ }[]>;
38
48
  signIn: (credentials: SignInCredentials) => Promise<AuthResponse>;
39
49
  signUp: (userData: SignUpData) => Promise<never>;
40
50
  signOut: () => Promise<void>;
@@ -55,6 +65,7 @@ export declare function useStrandsAuth(): {
55
65
  changeEmail: (newEmail: string, password: string) => Promise<any>;
56
66
  initialize: () => Promise<void>;
57
67
  setAuthData: (authResponse: AuthResponse) => void;
68
+ verifyMfa: (deviceId: string, code: string, isBackupCode?: boolean) => Promise<AuthResponse>;
58
69
  startTokenRefreshTimer: () => void;
59
70
  stopTokenRefreshTimer: () => void;
60
71
  forceReInit: () => void;
@@ -1 +1 @@
1
- {"version":3,"file":"useStrandsAuth.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/composables/useStrandsAuth.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,IAAI,EAAW,iBAAiB,EAAE,UAAU,EAAE,YAAY,EAAE,MAAM,aAAa,CAAA;AAY7F,wBAAgB,cAAc;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;0BAIS,iBAAiB;uBAiCtB,UAAU;;;wBAwFX,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC;iCAkDT,OAAO,CAAC,IAAI,CAAC;;;;;;;;;;;;4BAyDlB,MAAM,YAAY,MAAM;;gCAmD1B,YAAY;;;;EAgKhD"}
1
+ {"version":3,"file":"useStrandsAuth.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/composables/useStrandsAuth.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,IAAI,EAAW,iBAAiB,EAAE,UAAU,EAAE,YAAY,EAAa,MAAM,aAAa,CAAA;AAiBxG,wBAAgB,cAAc;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;0BAIS,iBAAiB;uBAyCtB,UAAU;;;wBA6FX,OAAO,CAAC,IAAI,GAAG,IAAI,CAAC;iCAkDT,OAAO,CAAC,IAAI,CAAC;;;;;;;;;;;;4BAyDlB,MAAM,YAAY,MAAM;;gCA0F1B,YAAY;0BAvCZ,MAAM,QAAQ,MAAM;;;;EA6MxD"}
@@ -1 +1 @@
1
- {"version":3,"file":"useStrandsConfig.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/composables/useStrandsConfig.ts"],"names":[],"mappings":"AAIA,YAAY,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,MAAM,aAAa,CAAA;AAC1E,OAAO,KAAK,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,MAAM,aAAa,CAAA;AAsB1E,wBAAgB,oBAAoB,CAAC,MAAM,EAAE,iBAAiB,QAQ7D;AAED,wBAAgB,gBAAgB,CAAC,cAAc,CAAC,EAAE,OAAO,CAAC,iBAAiB,CAAC;;;uBA+DhD,MAAM,oBAAoB,GAAG,MAAM;;EAoC9D;AAGD,wBAAgB,gBAAgB,CAAC,MAAM,EAAE,iBAAiB,QAEzD"}
1
+ {"version":3,"file":"useStrandsConfig.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/composables/useStrandsConfig.ts"],"names":[],"mappings":"AAIA,YAAY,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,MAAM,aAAa,CAAA;AAC1E,OAAO,KAAK,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,MAAM,aAAa,CAAA;AA+B1E,wBAAgB,oBAAoB,CAAC,MAAM,EAAE,iBAAiB,QAQ7D;AAED,wBAAgB,gBAAgB,CAAC,cAAc,CAAC,EAAE,OAAO,CAAC,iBAAiB,CAAC;;;uBAwEhD,MAAM,oBAAoB,GAAG,MAAM;;EAoC9D;AAGD,wBAAgB,gBAAgB,CAAC,MAAM,EAAE,iBAAiB,QAEzD"}
@@ -0,0 +1,37 @@
1
+ import { MfaDevicesResponse, TotpSetupResponse, BackupCodesResponse } from '../../types';
2
+ export declare function useStrandsMfa(): {
3
+ mfaDevices: import('vue').ComputedRef<{
4
+ id: string;
5
+ device_type: import('../..').MfaDeviceType;
6
+ device_name: string;
7
+ is_active: boolean;
8
+ last_used_at?: (string | Date) | undefined;
9
+ created_at: string | Date;
10
+ }[]>;
11
+ mfaEnabled: import('vue').ComputedRef<boolean>;
12
+ loading: import('vue').ComputedRef<boolean>;
13
+ hasMfaDevices: import('vue').ComputedRef<boolean>;
14
+ activeMfaDevices: import('vue').ComputedRef<{
15
+ id: string;
16
+ device_type: import('../..').MfaDeviceType;
17
+ device_name: string;
18
+ is_active: boolean;
19
+ last_used_at?: (string | Date) | undefined;
20
+ created_at: string | Date;
21
+ }[]>;
22
+ fetchMfaDevices: () => Promise<MfaDevicesResponse>;
23
+ setupTotp: (deviceName: string) => Promise<TotpSetupResponse>;
24
+ verifyTotpSetup: (deviceId: string, totpCode: string) => Promise<void>;
25
+ setupEmailMfa: (deviceName: string) => Promise<{
26
+ device_id: string;
27
+ email: string;
28
+ }>;
29
+ sendEmailMfaCode: (deviceId: string) => Promise<void>;
30
+ verifyEmailMfaCode: (deviceId: string, code: string) => Promise<boolean>;
31
+ disableMfaDevice: (deviceId: string) => Promise<void>;
32
+ regenerateBackupCodes: (deviceId: string) => Promise<BackupCodesResponse>;
33
+ getDeviceTypeIcon: (deviceType: string) => string;
34
+ getDeviceTypeName: (deviceType: string) => string;
35
+ formatLastUsed: (lastUsedAt?: string | Date) => string;
36
+ };
37
+ //# sourceMappingURL=useStrandsMfa.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"useStrandsMfa.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/composables/useStrandsMfa.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAEV,kBAAkB,EAClB,iBAAiB,EACjB,mBAAmB,EACpB,MAAM,aAAa,CAAA;AAQpB,wBAAgB,aAAa;;;;;;;;;;;;;;;;;;;;2BA2CO,OAAO,CAAC,kBAAkB,CAAC;4BAiBxB,MAAM,KAAG,OAAO,CAAC,iBAAiB,CAAC;gCAkB/B,MAAM,YAAY,MAAM,KAAG,OAAO,CAAC,IAAI,CAAC;gCAmBxC,MAAM,KAAG,OAAO,CAAC;QAAE,SAAS,EAAE,MAAM,CAAC;QAAC,KAAK,EAAE,MAAM,CAAA;KAAE,CAAC;iCAkBrD,MAAM,KAAG,OAAO,CAAC,IAAI,CAAC;mCAapB,MAAM,QAAQ,MAAM,KAAG,OAAO,CAAC,OAAO,CAAC;iCAkBzC,MAAM,KAAG,OAAO,CAAC,IAAI,CAAC;sCAgBjB,MAAM,KAAG,OAAO,CAAC,mBAAmB,CAAC;oCAe7C,MAAM,KAAG,MAAM;oCAgBf,MAAM,KAAG,MAAM;kCAgBjB,MAAM,GAAG,IAAI,KAAG,MAAM;EAsC5D"}
@@ -0,0 +1,33 @@
1
+ interface Props {
2
+ open?: boolean;
3
+ variant?: 'default' | 'modern' | 'minimal';
4
+ padding?: 'sm' | 'md' | 'lg';
5
+ shadow?: 'none' | 'sm' | 'md' | 'lg';
6
+ cardClass?: string;
7
+ }
8
+ declare function __VLS_template(): {
9
+ attrs: Partial<{}>;
10
+ slots: {
11
+ header?(_: {}): any;
12
+ default?(_: {}): any;
13
+ footer?(_: {}): any;
14
+ };
15
+ refs: {};
16
+ rootEl: any;
17
+ };
18
+ type __VLS_TemplateResult = ReturnType<typeof __VLS_template>;
19
+ declare const __VLS_component: import('vue').DefineComponent<Props, {}, {}, {}, {}, import('vue').ComponentOptionsMixin, import('vue').ComponentOptionsMixin, {}, string, import('vue').PublicProps, Readonly<Props> & Readonly<{}>, {
20
+ variant: "default" | "modern" | "minimal";
21
+ padding: "sm" | "md" | "lg";
22
+ shadow: "none" | "sm" | "md" | "lg";
23
+ open: boolean;
24
+ cardClass: string;
25
+ }, {}, {}, {}, string, import('vue').ComponentProvideOptions, false, {}, any>;
26
+ declare const _default: __VLS_WithTemplateSlots<typeof __VLS_component, __VLS_TemplateResult["slots"]>;
27
+ export default _default;
28
+ type __VLS_WithTemplateSlots<T, S> = T & {
29
+ new (): {
30
+ $slots: S;
31
+ };
32
+ };
33
+ //# sourceMappingURL=UiModal.vue.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"UiModal.vue.d.ts","sourceRoot":"","sources":["../../../../../apps/accounts-ui/src/vue/ui/UiModal.vue"],"names":[],"mappings":"AAoBA;AAyDA,UAAU,KAAK;IACd,IAAI,CAAC,EAAE,OAAO,CAAA;IACd,OAAO,CAAC,EAAE,SAAS,GAAG,QAAQ,GAAG,SAAS,CAAA;IAC1C,OAAO,CAAC,EAAE,IAAI,GAAG,IAAI,GAAG,IAAI,CAAA;IAC5B,MAAM,CAAC,EAAE,MAAM,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI,CAAA;IACpC,SAAS,CAAC,EAAE,MAAM,CAAA;CAClB;AAoBD,iBAAS,cAAc;WA6ET,OAAO,IAA6B;;wBAZrB,GAAG;yBACF,GAAG;wBACJ,GAAG;;;;EAe/B;AAUD,KAAK,oBAAoB,GAAG,UAAU,CAAC,OAAO,cAAc,CAAC,CAAC;AAC9D,QAAA,MAAM,eAAe;aArHV,SAAS,GAAG,QAAQ,GAAG,SAAS;aAChC,IAAI,GAAG,IAAI,GAAG,IAAI;YACnB,MAAM,GAAG,IAAI,GAAG,IAAI,GAAG,IAAI;UAH7B,OAAO;eAIF,MAAM;6EA0HjB,CAAC;wBACkB,uBAAuB,CAAC,OAAO,eAAe,EAAE,oBAAoB,CAAC,OAAO,CAAC,CAAC;AAAnG,wBAAoG;AAapG,KAAK,uBAAuB,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,GAAG;IACxC,QAAO;QACN,MAAM,EAAE,CAAC,CAAC;KAEV,CAAA;CACD,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@strands.gg/accui",
3
- "version": "0.2.13",
3
+ "version": "0.2.15",
4
4
  "description": "Strands Authentication UI Components",
5
5
  "type": "module",
6
6
  "main": "./dist/strands-auth-ui.cjs.js",
@@ -1,2 +0,0 @@
1
- "use strict";const o=require("vue"),x=require("./useStrandsConfig-BDUymyIP.cjs"),s=o.ref(null),r=o.ref(null),i=o.ref(!1),n=o.ref(!0),f=o.ref(!1);let l=null;function I(){const{getUrl:u}=x.useStrandsConfig(),p=o.computed(()=>s.value!==null),y=async e=>{n.value=!0;try{const t=await fetch(u("signIn"),{method:"POST",headers:{"Content-Type":"application/json"},body:JSON.stringify(e)});if(!t.ok)throw t.status===401?new Error("Invalid email or password"):t.status===403?new Error("Please verify your email address before signing in"):new Error(`Sign in failed: ${t.status} ${t.statusText}`);const a=await t.json();return v(a),a}finally{n.value=!1}},S=async e=>{n.value=!0;try{throw new Error("Sign up not implemented - please integrate with auth SDK")}finally{n.value=!1}},h=async()=>{n.value=!0;try{w(),s.value=null,r.value=null,typeof window<"u"&&(localStorage.removeItem("strands_auth_session"),localStorage.removeItem("strands_auth_user")),console.log("User signed out successfully")}finally{n.value=!1}},m=async()=>{if(!r.value?.refreshToken)return console.warn("No refresh token available"),!1;console.log("Attempting to refresh token...",{refreshToken:r.value.refreshToken.substring(0,50)+"...",expiresAt:r.value.expiresAt});try{const e=await fetch(u("refresh"),{method:"POST",headers:{"Content-Type":"application/json"},body:JSON.stringify({refresh_token:r.value.refreshToken})});if(!e.ok){const a=await e.text();if(console.error("Token refresh failed:",{status:e.status,statusText:e.statusText,body:a}),e.status===401)return console.warn("Refresh token expired, signing out user"),await h(),!1;throw new Error(`Token refresh failed: ${e.status} ${e.statusText}`)}const t=await e.json();return v(t),console.log("Token refreshed successfully"),!0}catch(e){return console.error("Failed to refresh token:",e),await h(),!1}},T=async()=>{if(!r.value?.accessToken)throw new Error("No access token available");i.value=!0;try{const e=await fetch(u("profile"),{method:"GET",headers:{"Content-Type":"application/json",Authorization:`Bearer ${r.value.accessToken}`}});if(!e.ok)throw e.status===401?new Error("Authentication expired. Please sign in again."):new Error(`Failed to fetch profile: ${e.status} ${e.statusText}`);const t=await e.json();return s.value={id:t.id,email:t.email,firstName:t.first_name,lastName:t.last_name,avatar:t.avatar_url,mfaEnabled:t.mfaEnabled||!1,emailVerified:t.email_verified,passwordUpdatedAt:t.password_updated_at,createdAt:t.created_at,updatedAt:t.updated_at||new Date().toISOString()},typeof window<"u"&&localStorage.setItem("strands_auth_user",JSON.stringify(s.value)),s.value}finally{i.value=!1}},_=async e=>{if(!r.value?.accessToken)throw new Error("No access token available");i.value=!0;try{const t=await fetch(u("profile"),{method:"POST",headers:{"Content-Type":"application/json",Authorization:`Bearer ${r.value.accessToken}`},body:JSON.stringify({first_name:e.firstName,last_name:e.lastName})});if(!t.ok)throw t.status===401?new Error("Authentication expired. Please sign in again."):new Error(`Profile update failed: ${t.status} ${t.statusText}`);const a=await t.json();return s.value&&(s.value={...s.value,id:a.id,firstName:a.first_name,lastName:a.last_name,avatar:a.avatar_url||s.value.avatar,mfaEnabled:s.value.mfaEnabled,email:s.value.email,emailVerified:s.value.emailVerified,createdAt:a.created_at||s.value.createdAt,updatedAt:a.updated_at||new Date().toISOString()},typeof window<"u"&&localStorage.setItem("strands_auth_user",JSON.stringify(s.value))),s.value}finally{i.value=!1}},k=async(e,t)=>{if(!r.value?.accessToken)throw new Error("No access token available");i.value=!0;try{const a=await fetch(u("changeEmail"),{method:"POST",headers:{"Content-Type":"application/json",Authorization:`Bearer ${r.value.accessToken}`},body:JSON.stringify({new_email:e,password:t})});if(!a.ok){if(a.status===401)throw new Error("Authentication expired. Please sign in again.");{const A=await a.json().catch(()=>({}));throw new Error(A.message||`Email change failed: ${a.status} ${a.statusText}`)}}const c=await a.json();return s.value&&(s.value={...s.value,email:e,emailVerified:!1,updatedAt:new Date().toISOString()},typeof window<"u"&&localStorage.setItem("strands_auth_user",JSON.stringify(s.value))),c}finally{i.value=!1}},v=e=>{try{s.value=e.user;const t={accessToken:e.access_token,refreshToken:e.refresh_token,expiresAt:new Date(Date.now()+300*1e3),userId:e.user.id};r.value=t,typeof window<"u"&&(localStorage.setItem("strands_auth_session",JSON.stringify(t)),localStorage.setItem("strands_auth_user",JSON.stringify(e.user))),d(),console.log("Auth data stored successfully",{user:e.user.email})}catch(t){console.error("Failed to store auth data:",t)}},d=()=>{if(l&&clearTimeout(l),!r.value)return;const e=new Date,a=r.value.expiresAt.getTime()-e.getTime()-60*1e3;if(a<=0){console.log("Token expired or expires soon, refreshing immediately"),m();return}console.log(`Scheduling token refresh in ${Math.round(a/1e3)} seconds`),l=setTimeout(async()=>{console.log("Auto-refreshing token..."),await m()&&d()},a)},w=()=>{l&&(clearTimeout(l),l=null)},g=async()=>{if(!f.value){n.value=!0;try{if(typeof window<"u"){const e=localStorage.getItem("strands_auth_session"),t=localStorage.getItem("strands_auth_user");if(e&&t)try{const a=JSON.parse(e),c=JSON.parse(t);a.expiresAt=new Date(a.expiresAt),a.expiresAt>new Date?(r.value=a,s.value=c,console.log("Restored auth session for user:",c.email),d()):(localStorage.removeItem("strands_auth_session"),localStorage.removeItem("strands_auth_user"),console.log("Stored session expired, cleared from storage"))}catch(a){console.warn("Failed to restore auth session:",a),localStorage.removeItem("strands_auth_session"),localStorage.removeItem("strands_auth_user")}}f.value=!0,await new Promise(e=>setTimeout(e,50))}catch(e){console.error("Auth initialization error:",e)}finally{n.value=!1}}};return f.value||g(),{user:o.computed(()=>s.value),currentUser:o.computed(()=>s.value),currentSession:o.computed(()=>r.value),isAuthenticated:p,isLoading:o.computed(()=>n.value||!f.value),loading:o.computed(()=>i.value),signIn:y,signUp:S,signOut:h,refreshToken:m,fetchProfile:T,updateProfile:_,changeEmail:k,initialize:g,setAuthData:v,startTokenRefreshTimer:d,stopTokenRefreshTimer:w,forceReInit:()=>{f.value=!1,n.value=!0,g()}}}exports.useStrandsAuth=I;
2
- //# sourceMappingURL=useStrandsAuth-CJsQ5cew.cjs.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"useStrandsAuth-CJsQ5cew.cjs","sources":["../../../apps/accounts-ui/src/vue/composables/useStrandsAuth.ts"],"sourcesContent":["import { ref, computed } from 'vue'\nimport type { User, Session, SignInCredentials, SignUpData, AuthResponse } from '../../types'\nimport { useStrandsConfig } from './useStrandsConfig'\n\nconst currentUser = ref<User | null>(null)\nconst currentSession = ref<Session | null>(null)\nconst loading = ref(false)\nconst isLoading = ref(true)\nconst isInitialized = ref(false)\n\n// Token refresh timer\nlet refreshTimer: NodeJS.Timeout | null = null\n\nexport function useStrandsAuth() {\n const { getUrl } = useStrandsConfig()\n const isAuthenticated = computed(() => currentUser.value !== null)\n\n const signIn = async (credentials: SignInCredentials) => {\n isLoading.value = true\n try {\n // Make API call to sign-in endpoint\n const response = await fetch(getUrl('signIn'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify(credentials),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Invalid email or password')\n } else if (response.status === 403) {\n throw new Error('Please verify your email address before signing in')\n } else {\n throw new Error(`Sign in failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const authData: AuthResponse = await response.json()\n \n // Store the authentication data\n setAuthData(authData)\n \n return authData\n } finally {\n isLoading.value = false\n }\n }\n\n const signUp = async (userData: SignUpData) => {\n isLoading.value = true\n try {\n // Integration point: Replace with actual auth SDK call\n // Example: const result = await authSDK.signUp(userData)\n \n throw new Error('Sign up not implemented - please integrate with auth SDK')\n } finally {\n isLoading.value = false\n }\n }\n\n const signOut = async () => {\n isLoading.value = true\n try {\n // Stop token refresh timer\n stopTokenRefreshTimer()\n \n // Clear user and session state\n currentUser.value = null\n currentSession.value = null\n \n // Clear stored tokens\n if (typeof window !== 'undefined') {\n localStorage.removeItem('strands_auth_session')\n localStorage.removeItem('strands_auth_user')\n }\n \n console.log('User signed out successfully')\n } finally {\n isLoading.value = false\n }\n }\n\n const refreshToken = async () => {\n if (!currentSession.value?.refreshToken) {\n console.warn('No refresh token available')\n return false\n }\n \n console.log('Attempting to refresh token...', {\n refreshToken: currentSession.value.refreshToken.substring(0, 50) + '...',\n expiresAt: currentSession.value.expiresAt\n })\n \n try {\n const response = await fetch(getUrl('refresh'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n refresh_token: currentSession.value.refreshToken,\n }),\n })\n\n if (!response.ok) {\n const responseText = await response.text()\n console.error('Token refresh failed:', {\n status: response.status,\n statusText: response.statusText,\n body: responseText\n })\n \n if (response.status === 401) {\n // Refresh token is invalid/expired, sign out user\n console.warn('Refresh token expired, signing out user')\n await signOut()\n return false\n }\n throw new Error(`Token refresh failed: ${response.status} ${response.statusText}`)\n }\n\n const authData: AuthResponse = await response.json()\n \n // Update auth data with new tokens\n setAuthData(authData)\n \n console.log('Token refreshed successfully')\n return true\n } catch (error) {\n console.error('Failed to refresh token:', error)\n // On refresh failure, sign out the user\n await signOut()\n return false\n }\n }\n\n const fetchProfile = async (): Promise<User | null> => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n loading.value = true\n try {\n const response = await fetch(getUrl('profile'), {\n method: 'GET',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n throw new Error(`Failed to fetch profile: ${response.status} ${response.statusText}`)\n }\n }\n\n const userData = await response.json()\n \n // Update the current user state\n currentUser.value = {\n id: userData.id,\n email: userData.email,\n firstName: userData.first_name,\n lastName: userData.last_name,\n avatar: userData.avatar_url,\n mfaEnabled: userData.mfaEnabled || false,\n emailVerified: userData.email_verified,\n passwordUpdatedAt: userData.password_updated_at,\n createdAt: userData.created_at,\n updatedAt: userData.updated_at || new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n \n return currentUser.value\n } finally {\n loading.value = false\n }\n }\n\n const updateProfile = async (profileData: Partial<User>) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n loading.value = true\n try {\n const response = await fetch(getUrl('profile'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({\n first_name: profileData.firstName,\n last_name: profileData.lastName,\n }),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n throw new Error(`Profile update failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const updatedUserData = await response.json()\n \n // Update the current user state\n if (currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n id: updatedUserData.id,\n firstName: updatedUserData.first_name,\n lastName: updatedUserData.last_name,\n // Keep existing properties not returned by API\n avatar: updatedUserData.avatar_url || currentUser.value.avatar,\n mfaEnabled: currentUser.value.mfaEnabled,\n email: currentUser.value.email, // Keep existing email since we don't update it here\n emailVerified: currentUser.value.emailVerified,\n createdAt: updatedUserData.created_at || currentUser.value.createdAt,\n updatedAt: updatedUserData.updated_at || new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n return currentUser.value\n } finally {\n loading.value = false\n }\n }\n\n const changeEmail = async (newEmail: string, password: string) => {\n if (!currentSession.value?.accessToken) {\n throw new Error('No access token available')\n }\n \n loading.value = true\n try {\n const response = await fetch(getUrl('changeEmail'), {\n method: 'POST',\n headers: {\n 'Content-Type': 'application/json',\n 'Authorization': `Bearer ${currentSession.value.accessToken}`,\n },\n body: JSON.stringify({\n new_email: newEmail,\n password: password,\n }),\n })\n\n if (!response.ok) {\n if (response.status === 401) {\n throw new Error('Authentication expired. Please sign in again.')\n } else {\n const errorData = await response.json().catch(() => ({}))\n throw new Error(errorData.message || `Email change failed: ${response.status} ${response.statusText}`)\n }\n }\n\n const result = await response.json()\n \n // Update the current user state with new email\n if (currentUser.value) {\n currentUser.value = {\n ...currentUser.value,\n email: newEmail,\n emailVerified: false, // Email needs to be verified again\n updatedAt: new Date().toISOString(),\n }\n \n // Update localStorage\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_user', JSON.stringify(currentUser.value))\n }\n }\n \n return result\n } finally {\n loading.value = false\n }\n }\n\n const setAuthData = (authResponse: AuthResponse) => {\n try {\n // Set current user\n currentUser.value = authResponse.user\n \n // Create session object\n const session: Session = {\n accessToken: authResponse.access_token,\n refreshToken: authResponse.refresh_token,\n expiresAt: new Date(Date.now() + 5 * 60 * 1000), // 5 minutes from now (matching API token expiry)\n userId: authResponse.user.id,\n }\n \n currentSession.value = session\n \n // Store in localStorage for persistence\n if (typeof window !== 'undefined') {\n localStorage.setItem('strands_auth_session', JSON.stringify(session))\n localStorage.setItem('strands_auth_user', JSON.stringify(authResponse.user))\n }\n \n // Start automatic token refresh\n startTokenRefreshTimer()\n \n console.log('Auth data stored successfully', { user: authResponse.user.email })\n } catch (error) {\n console.error('Failed to store auth data:', error)\n }\n }\n\n // Token refresh timer management\n const startTokenRefreshTimer = () => {\n // Clear existing timer\n if (refreshTimer) {\n clearTimeout(refreshTimer)\n }\n \n if (!currentSession.value) return\n \n // Calculate time until token expires (refresh 1 minute before expiry)\n const now = new Date()\n const expiresAt = currentSession.value.expiresAt\n const timeUntilRefresh = expiresAt.getTime() - now.getTime() - (1 * 60 * 1000) // 1 minute before expiry\n \n // If token is already expired or expires very soon, refresh immediately\n if (timeUntilRefresh <= 0) {\n console.log('Token expired or expires soon, refreshing immediately')\n refreshToken()\n return\n }\n \n console.log(`Scheduling token refresh in ${Math.round(timeUntilRefresh / 1000)} seconds`)\n \n // Set timer to refresh token\n refreshTimer = setTimeout(async () => {\n console.log('Auto-refreshing token...')\n const success = await refreshToken()\n \n if (success) {\n // Schedule next refresh\n startTokenRefreshTimer()\n }\n }, timeUntilRefresh)\n }\n\n const stopTokenRefreshTimer = () => {\n if (refreshTimer) {\n clearTimeout(refreshTimer)\n refreshTimer = null\n }\n }\n\n const initialize = async () => {\n if (isInitialized.value) return\n \n isLoading.value = true\n try {\n // Check for existing session/token in localStorage\n if (typeof window !== 'undefined') {\n const storedSession = localStorage.getItem('strands_auth_session')\n const storedUser = localStorage.getItem('strands_auth_user')\n \n if (storedSession && storedUser) {\n try {\n const session = JSON.parse(storedSession) as Session\n const user = JSON.parse(storedUser) as User\n \n // Convert expiresAt back to Date object\n session.expiresAt = new Date(session.expiresAt)\n \n // Check if session is still valid\n if (session.expiresAt > new Date()) {\n currentSession.value = session\n currentUser.value = user\n console.log('Restored auth session for user:', user.email)\n \n // Start token refresh timer for restored session\n startTokenRefreshTimer()\n } else {\n // Session expired, clear storage\n localStorage.removeItem('strands_auth_session')\n localStorage.removeItem('strands_auth_user')\n console.log('Stored session expired, cleared from storage')\n }\n } catch (error) {\n console.warn('Failed to restore auth session:', error)\n // Clear corrupted data\n localStorage.removeItem('strands_auth_session')\n localStorage.removeItem('strands_auth_user')\n }\n }\n }\n \n isInitialized.value = true\n \n // Add a small delay to ensure state is fully settled before hiding loading\n await new Promise(resolve => setTimeout(resolve, 50))\n } catch (error) {\n console.error('Auth initialization error:', error)\n } finally {\n isLoading.value = false\n }\n }\n\n // Auto-initialize on first use\n if (!isInitialized.value) {\n initialize()\n }\n\n return {\n // State\n user: computed(() => currentUser.value),\n currentUser: computed(() => currentUser.value),\n currentSession: computed(() => currentSession.value),\n isAuthenticated,\n isLoading: computed(() => isLoading.value || !isInitialized.value),\n loading: computed(() => loading.value),\n\n // Methods\n signIn,\n signUp,\n signOut,\n refreshToken,\n fetchProfile,\n updateProfile,\n changeEmail,\n initialize,\n setAuthData,\n \n // Token management\n startTokenRefreshTimer,\n stopTokenRefreshTimer,\n \n // Force re-initialization (useful for testing or navigation)\n forceReInit: () => {\n isInitialized.value = false\n isLoading.value = true\n initialize()\n },\n }\n}"],"names":["currentUser","ref","currentSession","loading","isLoading","isInitialized","refreshTimer","useStrandsAuth","getUrl","useStrandsConfig","isAuthenticated","computed","signIn","credentials","response","authData","setAuthData","signUp","userData","signOut","stopTokenRefreshTimer","refreshToken","responseText","error","fetchProfile","updateProfile","profileData","updatedUserData","changeEmail","newEmail","password","errorData","result","authResponse","session","startTokenRefreshTimer","now","timeUntilRefresh","initialize","storedSession","storedUser","user","resolve"],"mappings":"iFAIMA,EAAcC,EAAAA,IAAiB,IAAI,EACnCC,EAAiBD,EAAAA,IAAoB,IAAI,EACzCE,EAAUF,EAAAA,IAAI,EAAK,EACnBG,EAAYH,EAAAA,IAAI,EAAI,EACpBI,EAAgBJ,EAAAA,IAAI,EAAK,EAG/B,IAAIK,EAAsC,KAEnC,SAASC,GAAiB,CAC/B,KAAM,CAAE,OAAAC,CAAA,EAAWC,mBAAA,EACbC,EAAkBC,EAAAA,SAAS,IAAMX,EAAY,QAAU,IAAI,EAEzDY,EAAS,MAAOC,GAAmC,CACzDT,EAAU,MAAQ,GAClB,GAAI,CAEF,MAAMU,EAAW,MAAM,MAAMN,EAAO,QAAQ,EAAG,CAC7C,OAAQ,OACR,QAAS,CACP,eAAgB,kBAAA,EAElB,KAAM,KAAK,UAAUK,CAAW,CAAA,CACjC,EAED,GAAI,CAACC,EAAS,GACZ,MAAIA,EAAS,SAAW,IAChB,IAAI,MAAM,2BAA2B,EAClCA,EAAS,SAAW,IACvB,IAAI,MAAM,oDAAoD,EAE9D,IAAI,MAAM,mBAAmBA,EAAS,MAAM,IAAIA,EAAS,UAAU,EAAE,EAI/E,MAAMC,EAAyB,MAAMD,EAAS,KAAA,EAG9C,OAAAE,EAAYD,CAAQ,EAEbA,CACT,QAAA,CACEX,EAAU,MAAQ,EACpB,CACF,EAEMa,EAAS,MAAOC,GAAyB,CAC7Cd,EAAU,MAAQ,GAClB,GAAI,CAIF,MAAM,IAAI,MAAM,0DAA0D,CAC5E,QAAA,CACEA,EAAU,MAAQ,EACpB,CACF,EAEMe,EAAU,SAAY,CAC1Bf,EAAU,MAAQ,GAClB,GAAI,CAEFgB,EAAA,EAGApB,EAAY,MAAQ,KACpBE,EAAe,MAAQ,KAGnB,OAAO,OAAW,MACpB,aAAa,WAAW,sBAAsB,EAC9C,aAAa,WAAW,mBAAmB,GAG7C,QAAQ,IAAI,8BAA8B,CAC5C,QAAA,CACEE,EAAU,MAAQ,EACpB,CACF,EAEMiB,EAAe,SAAY,CAC/B,GAAI,CAACnB,EAAe,OAAO,aACzB,eAAQ,KAAK,4BAA4B,EAClC,GAGT,QAAQ,IAAI,iCAAkC,CAC5C,aAAcA,EAAe,MAAM,aAAa,UAAU,EAAG,EAAE,EAAI,MACnE,UAAWA,EAAe,MAAM,SAAA,CACjC,EAED,GAAI,CACF,MAAMY,EAAW,MAAM,MAAMN,EAAO,SAAS,EAAG,CAC9C,OAAQ,OACR,QAAS,CACP,eAAgB,kBAAA,EAElB,KAAM,KAAK,UAAU,CACnB,cAAeN,EAAe,MAAM,YAAA,CACrC,CAAA,CACF,EAED,GAAI,CAACY,EAAS,GAAI,CAChB,MAAMQ,EAAe,MAAMR,EAAS,KAAA,EAOpC,GANA,QAAQ,MAAM,wBAAyB,CACrC,OAAQA,EAAS,OACjB,WAAYA,EAAS,WACrB,KAAMQ,CAAA,CACP,EAEGR,EAAS,SAAW,IAEtB,eAAQ,KAAK,yCAAyC,EACtD,MAAMK,EAAA,EACC,GAET,MAAM,IAAI,MAAM,yBAAyBL,EAAS,MAAM,IAAIA,EAAS,UAAU,EAAE,CACnF,CAEA,MAAMC,EAAyB,MAAMD,EAAS,KAAA,EAG9C,OAAAE,EAAYD,CAAQ,EAEpB,QAAQ,IAAI,8BAA8B,EACnC,EACT,OAASQ,EAAO,CACd,eAAQ,MAAM,2BAA4BA,CAAK,EAE/C,MAAMJ,EAAA,EACC,EACT,CACF,EAEMK,EAAe,SAAkC,CACrD,GAAI,CAACtB,EAAe,OAAO,YACzB,MAAM,IAAI,MAAM,2BAA2B,EAG7CC,EAAQ,MAAQ,GAChB,GAAI,CACF,MAAMW,EAAW,MAAM,MAAMN,EAAO,SAAS,EAAG,CAC9C,OAAQ,MACR,QAAS,CACP,eAAgB,mBAChB,cAAiB,UAAUN,EAAe,MAAM,WAAW,EAAA,CAC7D,CACD,EAED,GAAI,CAACY,EAAS,GACZ,MAAIA,EAAS,SAAW,IAChB,IAAI,MAAM,+CAA+C,EAEzD,IAAI,MAAM,4BAA4BA,EAAS,MAAM,IAAIA,EAAS,UAAU,EAAE,EAIxF,MAAMI,EAAW,MAAMJ,EAAS,KAAA,EAGhC,OAAAd,EAAY,MAAQ,CAClB,GAAIkB,EAAS,GACb,MAAOA,EAAS,MAChB,UAAWA,EAAS,WACpB,SAAUA,EAAS,UACnB,OAAQA,EAAS,WACjB,WAAYA,EAAS,YAAc,GACnC,cAAeA,EAAS,eACxB,kBAAmBA,EAAS,oBAC5B,UAAWA,EAAS,WACpB,UAAWA,EAAS,YAAc,IAAI,KAAA,EAAO,YAAA,CAAY,EAIvD,OAAO,OAAW,KACpB,aAAa,QAAQ,oBAAqB,KAAK,UAAUlB,EAAY,KAAK,CAAC,EAGtEA,EAAY,KACrB,QAAA,CACEG,EAAQ,MAAQ,EAClB,CACF,EAEMsB,EAAgB,MAAOC,GAA+B,CAC1D,GAAI,CAACxB,EAAe,OAAO,YACzB,MAAM,IAAI,MAAM,2BAA2B,EAG7CC,EAAQ,MAAQ,GAChB,GAAI,CACF,MAAMW,EAAW,MAAM,MAAMN,EAAO,SAAS,EAAG,CAC9C,OAAQ,OACR,QAAS,CACP,eAAgB,mBAChB,cAAiB,UAAUN,EAAe,MAAM,WAAW,EAAA,EAE7D,KAAM,KAAK,UAAU,CACnB,WAAYwB,EAAY,UACxB,UAAWA,EAAY,QAAA,CACxB,CAAA,CACF,EAED,GAAI,CAACZ,EAAS,GACZ,MAAIA,EAAS,SAAW,IAChB,IAAI,MAAM,+CAA+C,EAEzD,IAAI,MAAM,0BAA0BA,EAAS,MAAM,IAAIA,EAAS,UAAU,EAAE,EAItF,MAAMa,EAAkB,MAAMb,EAAS,KAAA,EAGvC,OAAId,EAAY,QACdA,EAAY,MAAQ,CAClB,GAAGA,EAAY,MACf,GAAI2B,EAAgB,GACpB,UAAWA,EAAgB,WAC3B,SAAUA,EAAgB,UAE1B,OAAQA,EAAgB,YAAc3B,EAAY,MAAM,OACxD,WAAYA,EAAY,MAAM,WAC9B,MAAOA,EAAY,MAAM,MACzB,cAAeA,EAAY,MAAM,cACjC,UAAW2B,EAAgB,YAAc3B,EAAY,MAAM,UAC3D,UAAW2B,EAAgB,YAAc,IAAI,KAAA,EAAO,YAAA,CAAY,EAI9D,OAAO,OAAW,KACpB,aAAa,QAAQ,oBAAqB,KAAK,UAAU3B,EAAY,KAAK,CAAC,GAIxEA,EAAY,KACrB,QAAA,CACEG,EAAQ,MAAQ,EAClB,CACF,EAEMyB,EAAc,MAAOC,EAAkBC,IAAqB,CAChE,GAAI,CAAC5B,EAAe,OAAO,YACzB,MAAM,IAAI,MAAM,2BAA2B,EAG7CC,EAAQ,MAAQ,GAChB,GAAI,CACF,MAAMW,EAAW,MAAM,MAAMN,EAAO,aAAa,EAAG,CAClD,OAAQ,OACR,QAAS,CACP,eAAgB,mBAChB,cAAiB,UAAUN,EAAe,MAAM,WAAW,EAAA,EAE7D,KAAM,KAAK,UAAU,CACnB,UAAW2B,EACX,SAAAC,CAAA,CACD,CAAA,CACF,EAED,GAAI,CAAChB,EAAS,GAAI,CAChB,GAAIA,EAAS,SAAW,IACtB,MAAM,IAAI,MAAM,+CAA+C,EAC1D,CACL,MAAMiB,EAAY,MAAMjB,EAAS,KAAA,EAAO,MAAM,KAAO,CAAA,EAAG,EACxD,MAAM,IAAI,MAAMiB,EAAU,SAAW,wBAAwBjB,EAAS,MAAM,IAAIA,EAAS,UAAU,EAAE,CACvG,CACF,CAEA,MAAMkB,EAAS,MAAMlB,EAAS,KAAA,EAG9B,OAAId,EAAY,QACdA,EAAY,MAAQ,CAClB,GAAGA,EAAY,MACf,MAAO6B,EACP,cAAe,GACf,UAAW,IAAI,KAAA,EAAO,YAAA,CAAY,EAIhC,OAAO,OAAW,KACpB,aAAa,QAAQ,oBAAqB,KAAK,UAAU7B,EAAY,KAAK,CAAC,GAIxEgC,CACT,QAAA,CACE7B,EAAQ,MAAQ,EAClB,CACF,EAEMa,EAAeiB,GAA+B,CAClD,GAAI,CAEFjC,EAAY,MAAQiC,EAAa,KAGjC,MAAMC,EAAmB,CACvB,YAAaD,EAAa,aAC1B,aAAcA,EAAa,cAC3B,UAAW,IAAI,KAAK,KAAK,MAAQ,IAAS,GAAI,EAC9C,OAAQA,EAAa,KAAK,EAAA,EAG5B/B,EAAe,MAAQgC,EAGnB,OAAO,OAAW,MACpB,aAAa,QAAQ,uBAAwB,KAAK,UAAUA,CAAO,CAAC,EACpE,aAAa,QAAQ,oBAAqB,KAAK,UAAUD,EAAa,IAAI,CAAC,GAI7EE,EAAA,EAEA,QAAQ,IAAI,gCAAiC,CAAE,KAAMF,EAAa,KAAK,MAAO,CAChF,OAASV,EAAO,CACd,QAAQ,MAAM,6BAA8BA,CAAK,CACnD,CACF,EAGMY,EAAyB,IAAM,CAMnC,GAJI7B,GACF,aAAaA,CAAY,EAGvB,CAACJ,EAAe,MAAO,OAG3B,MAAMkC,MAAU,KAEVC,EADYnC,EAAe,MAAM,UACJ,QAAA,EAAYkC,EAAI,QAAA,EAAa,GAAS,IAGzE,GAAIC,GAAoB,EAAG,CACzB,QAAQ,IAAI,uDAAuD,EACnEhB,EAAA,EACA,MACF,CAEA,QAAQ,IAAI,+BAA+B,KAAK,MAAMgB,EAAmB,GAAI,CAAC,UAAU,EAGxF/B,EAAe,WAAW,SAAY,CACpC,QAAQ,IAAI,0BAA0B,EACtB,MAAMe,EAAA,GAIpBc,EAAA,CAEJ,EAAGE,CAAgB,CACrB,EAEMjB,EAAwB,IAAM,CAC9Bd,IACF,aAAaA,CAAY,EACzBA,EAAe,KAEnB,EAEMgC,EAAa,SAAY,CAC7B,GAAI,CAAAjC,EAAc,MAElB,CAAAD,EAAU,MAAQ,GAClB,GAAI,CAEF,GAAI,OAAO,OAAW,IAAa,CACjC,MAAMmC,EAAgB,aAAa,QAAQ,sBAAsB,EAC3DC,EAAa,aAAa,QAAQ,mBAAmB,EAE3D,GAAID,GAAiBC,EACnB,GAAI,CACF,MAAMN,EAAU,KAAK,MAAMK,CAAa,EAClCE,EAAO,KAAK,MAAMD,CAAU,EAGlCN,EAAQ,UAAY,IAAI,KAAKA,EAAQ,SAAS,EAG1CA,EAAQ,UAAY,IAAI,MAC1BhC,EAAe,MAAQgC,EACvBlC,EAAY,MAAQyC,EACpB,QAAQ,IAAI,kCAAmCA,EAAK,KAAK,EAGzDN,EAAA,IAGA,aAAa,WAAW,sBAAsB,EAC9C,aAAa,WAAW,mBAAmB,EAC3C,QAAQ,IAAI,8CAA8C,EAE9D,OAASZ,EAAO,CACd,QAAQ,KAAK,kCAAmCA,CAAK,EAErD,aAAa,WAAW,sBAAsB,EAC9C,aAAa,WAAW,mBAAmB,CAC7C,CAEJ,CAEAlB,EAAc,MAAQ,GAGtB,MAAM,IAAI,QAAQqC,GAAW,WAAWA,EAAS,EAAE,CAAC,CACtD,OAASnB,EAAO,CACd,QAAQ,MAAM,6BAA8BA,CAAK,CACnD,QAAA,CACEnB,EAAU,MAAQ,EACpB,EACF,EAGA,OAAKC,EAAc,OACjBiC,EAAA,EAGK,CAEL,KAAM3B,EAAAA,SAAS,IAAMX,EAAY,KAAK,EACtC,YAAaW,EAAAA,SAAS,IAAMX,EAAY,KAAK,EAC7C,eAAgBW,EAAAA,SAAS,IAAMT,EAAe,KAAK,EACnD,gBAAAQ,EACA,UAAWC,EAAAA,SAAS,IAAMP,EAAU,OAAS,CAACC,EAAc,KAAK,EACjE,QAASM,EAAAA,SAAS,IAAMR,EAAQ,KAAK,EAGrC,OAAAS,EACA,OAAAK,EACA,QAAAE,EACA,aAAAE,EACA,aAAAG,EACA,cAAAC,EACA,YAAAG,EACA,WAAAU,EACA,YAAAtB,EAGA,uBAAAmB,EACA,sBAAAf,EAGA,YAAa,IAAM,CACjBf,EAAc,MAAQ,GACtBD,EAAU,MAAQ,GAClBkC,EAAA,CACF,CAAA,CAEJ"}