@stytch/vanilla-js 5.18.0 → 5.18.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +17 -0
- package/dist/adminPortal/index.esm.js +1 -1
- package/dist/adminPortal/index.js +1 -1
- package/dist/adminPortal/utils/getDisplay.d.ts +3 -2
- package/dist/adminPortal/utils/oAuthProviders.d.ts +3 -2
- package/dist/b2b/index.esm.js +12 -10
- package/dist/b2b/index.headless.esm.js +3 -3
- package/dist/b2b/index.headless.js +3 -2
- package/dist/b2b/index.js +12 -9
- package/dist/{extractErrorMessage-BAKuYOGm.js → extractErrorMessage-C1MkGgw9.js} +248 -256
- package/dist/{extractErrorMessage-D4aCfh3i.js → extractErrorMessage-CBdT83I1.js} +210 -218
- package/dist/index.esm.js +1 -1
- package/dist/index.headless.esm.js +62 -54
- package/dist/index.headless.js +62 -53
- package/dist/index.js +1 -1
- package/dist/{internal-ChLmIjYa.js → internal-CSX7OA60.js} +61 -53
- package/dist/{internal-DKLdlLMO.js → internal-CuNGC8Ow.js} +61 -52
- package/package.json +7 -6
|
@@ -1,3 +1,4 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { KnownOAuthTenantProvider } from './oAuthProviders';
|
|
2
2
|
export declare const getDisplayStatus: (status: string) => string;
|
|
3
|
-
export declare const
|
|
3
|
+
export declare const getDisplayKnownTenantProvider: (provider: KnownOAuthTenantProvider) => "HubSpot" | "Slack" | "GitHub";
|
|
4
|
+
export declare const getDisplayTenantProvider: (provider: string) => "HubSpot" | "Slack" | "GitHub";
|
|
@@ -1,2 +1,3 @@
|
|
|
1
|
-
export declare const
|
|
2
|
-
export type
|
|
1
|
+
export declare const ALL_OAUTH_TENANT_PROVIDERS: ["github", "hubspot", "slack"];
|
|
2
|
+
export type KnownOAuthTenantProvider = (typeof ALL_OAUTH_TENANT_PROVIDERS)[number];
|
|
3
|
+
export declare const getMethodFromProvider: <T extends "hubspot" | "slack" | "github">(provider: T) => `${T}_oauth`;
|
package/dist/b2b/index.esm.js
CHANGED
|
@@ -31,9 +31,9 @@ function _iterableToArray(iter) { if (typeof Symbol !== "undefined" && iter[Symb
|
|
|
31
31
|
function _arrayWithoutHoles(arr) { if (Array.isArray(arr)) return _arrayLikeToArray(arr); }
|
|
32
32
|
function _arrayLikeToArray(arr, len) { if (len == null || len > arr.length) len = arr.length; for (var i = 0, arr2 = new Array(len); i < len; i++) arr2[i] = arr[i]; return arr2; }
|
|
33
33
|
import { StytchB2BHeadlessClient } from './index.headless.esm.js';
|
|
34
|
-
import { i as isTruthy, w as wn, q, F as F$1, m as merge, H as He, p as passwordManagerDisableAutofillProps, U as Ue, a as withMiddleware, u as useSWR, b as useSWRConfig, _ as _$1, c as useStateWithDeps, T as T$1, s as serialize, d as mergeObjects, g as getTimestamp, e as UNDEFINED, f as useIsomorphicLayoutEffect, h as h$2, j as p$1, y, Z as Ze, k as g$1, l as extractErrorMessage, n as w$1, C as Cn, o as s$1, r as F$2, t as CreateSSRSafeWebComponent, v as Fe } from '../extractErrorMessage-
|
|
35
|
-
import { B as B2BMFAProducts, A as AuthFlowType, a as B2BProducts, b as OTPMethods, W as Wallets, P as Products, _ as __rest, c as B2BOAuthProviders, S as StytchEventType, r as readB2BInternals, D as DEFAULT_SESSION_DURATION_MINUTES, d as __awaiter, E as EMAIL_REGEX, e as StytchAPIError, l as logger, f as OneTapPositions, i as isTestPublicToken, g as debounce, C as COUNTRIES_LIST, h as StytchSDKError, I as IDPOAuthFlowMissingParamError, N as NoCurrentSessionError, R as RedirectURLType, j as checkB2BNotSSR } from '../internal-
|
|
36
|
-
export { k as
|
|
34
|
+
import { i as isTruthy, w as wn, q, F as F$1, m as merge, H as He, p as passwordManagerDisableAutofillProps, U as Ue, a as withMiddleware, u as useSWR, b as useSWRConfig, _ as _$1, c as useStateWithDeps, T as T$1, s as serialize, d as mergeObjects, g as getTimestamp, e as UNDEFINED, f as useIsomorphicLayoutEffect, h as h$2, j as p$1, y, Z as Ze, k as g$1, l as extractErrorMessage, n as w$1, C as Cn, o as s$1, r as F$2, t as CreateSSRSafeWebComponent, v as Fe } from '../extractErrorMessage-C1MkGgw9.js';
|
|
35
|
+
import { B as B2BMFAProducts, A as AuthFlowType, a as B2BProducts, b as OTPMethods, W as Wallets, P as Products, _ as __rest, c as B2BOAuthProviders, S as StytchEventType, r as readB2BInternals, D as DEFAULT_SESSION_DURATION_MINUTES, d as __awaiter, E as EMAIL_REGEX, e as StytchAPIError, l as logger, f as OneTapPositions, i as isTestPublicToken, g as debounce, C as COUNTRIES_LIST, h as StytchSDKError, I as IDPOAuthFlowMissingParamError, N as NoCurrentSessionError, R as RedirectURLType, j as checkB2BNotSSR } from '../internal-CSX7OA60.js';
|
|
36
|
+
export { k as BiometricsAlreadyEnrolledError, m as BiometricsFailedError, n as BiometricsUnavailableError, o as ChallengeSigningFailedError, p as DeviceCredentialsNotAllowedError, F as FailedCodeChallengeError, q as FailedToDecryptDataError, s as InternalError, t as InvalidAuthorizationCredentialError, u as InvalidCredentialTypeError, v as InvalidRedirectSchemeError, w as InvalidStartUrlError, J as JSONDataNotConvertibleToStringError, K as KeyInvalidatedError, x as KeystoreUnavailableError, M as MissingAttestationObjectError, y as MissingAuthorizationCredentialIDTokenError, z as MissingGoogleClientIDError, G as MissingPKCEError, H as MissingPublicKeyError, L as MissingUrlError, Q as NoBiometricsEnrolledError, T as NoBiometricsRegistrationError, U as NoCredentialsPresentError, O as OAuthProviders, V as PasskeysInvalidEncoding, X as PasskeysMisconfigured, Y as PasskeysUnsupportedError, Z as RNUIProducts, $ as RandomNumberGenerationFailed, a0 as SDKAPIUnreachableError, a1 as SDKNotConfiguredError, a2 as SignInWithAppleMisconfigured, a3 as StytchAPISchemaError, a4 as StytchAPIUnreachableError, a5 as StytchError, a6 as StytchSDKAPIError, a7 as StytchSDKSchemaError, a8 as StytchSDKUsageError, a9 as UNRECOVERABLE_ERROR_TYPES, aa as UserCancellationError, ab as UserLockedOutError, ac as errorToStytchError } from '../internal-CSX7OA60.js';
|
|
37
37
|
var DEFAULT_MFA_STATE = {
|
|
38
38
|
primaryInfo: null,
|
|
39
39
|
isEnrolling: false,
|
|
@@ -3972,6 +3972,7 @@ var LoadingBar = function LoadingBar(_ref85) {
|
|
|
3972
3972
|
var isLoading = _ref85.isLoading;
|
|
3973
3973
|
return /*#__PURE__*/wn.createElement(Container, null, isLoading && /*#__PURE__*/wn.createElement(Progress, null));
|
|
3974
3974
|
};
|
|
3975
|
+
var OTP_LENGTH = 6;
|
|
3975
3976
|
var GAP = '8px';
|
|
3976
3977
|
var WIDTH = '46px';
|
|
3977
3978
|
var INPUT_HEIGHT = '46px';
|
|
@@ -4029,11 +4030,13 @@ var OTPInput = function OTPInput(_ref90) {
|
|
|
4029
4030
|
var otp = _ref90.otp,
|
|
4030
4031
|
setOtp = _ref90.setOtp,
|
|
4031
4032
|
disabled = _ref90.disabled;
|
|
4032
|
-
var
|
|
4033
|
-
|
|
4034
|
-
|
|
4033
|
+
var handleInput = function handleInput(e) {
|
|
4034
|
+
var target = e.target;
|
|
4035
|
+
var newValue = target.value.replace(/\D/g, '').slice(0, OTP_LENGTH);
|
|
4036
|
+
target.value = newValue;
|
|
4037
|
+
if (newValue !== otp) {
|
|
4038
|
+
setOtp(newValue);
|
|
4035
4039
|
}
|
|
4036
|
-
setOtp(e.target.value);
|
|
4037
4040
|
};
|
|
4038
4041
|
return /*#__PURE__*/wn.createElement("div", {
|
|
4039
4042
|
style: otpContainerStyles
|
|
@@ -4043,14 +4046,13 @@ var OTPInput = function OTPInput(_ref90) {
|
|
|
4043
4046
|
autoFocus: true,
|
|
4044
4047
|
disabled: disabled,
|
|
4045
4048
|
style: invisibleInputStyles,
|
|
4046
|
-
|
|
4047
|
-
onChange: onPasscodeChange,
|
|
4049
|
+
onInput: handleInput,
|
|
4048
4050
|
type: "text",
|
|
4049
4051
|
inputMode: "numeric",
|
|
4050
4052
|
value: otp
|
|
4051
4053
|
}, passwordManagerDisableAutofillProps)), /*#__PURE__*/wn.createElement("div", {
|
|
4052
4054
|
style: digitsContainerStyles
|
|
4053
|
-
}, _toConsumableArray(Array(
|
|
4055
|
+
}, _toConsumableArray(Array(OTP_LENGTH).keys()).map(function (i) {
|
|
4054
4056
|
return /*#__PURE__*/wn.createElement(DigitAtIndex, {
|
|
4055
4057
|
key: "digit-".concat(i),
|
|
4056
4058
|
index: i,
|
|
@@ -22,8 +22,8 @@ function _defineProperties(target, props) { for (var i = 0; i < props.length; i+
|
|
|
22
22
|
function _createClass(Constructor, protoProps, staticProps) { if (protoProps) _defineProperties(Constructor.prototype, protoProps); if (staticProps) _defineProperties(Constructor, staticProps); Object.defineProperty(Constructor, "prototype", { writable: false }); return Constructor; }
|
|
23
23
|
function _toPropertyKey(t) { var i = _toPrimitive(t, "string"); return "symbol" == _typeof(i) ? i : String(i); }
|
|
24
24
|
function _toPrimitive(t, r) { if ("object" != _typeof(t) || !t) return t; var e = t[Symbol.toPrimitive]; if (void 0 !== e) { var i = e.call(t, r || "default"); if ("object" != _typeof(i)) return i; throw new TypeError("@@toPrimitive must return a primitive value."); } return ("string" === r ? String : Number)(t); }
|
|
25
|
-
import { l as logger, d as __awaiter,
|
|
26
|
-
export { A as AuthFlowType, B as B2BMFAProducts, c as B2BOAuthProviders, a as B2BProducts, k as
|
|
25
|
+
import { l as logger, d as __awaiter, af as loadESModule, ag as IframeHostClient, i as isTestPublicToken, ah as EventLogger, ai as DEFAULT_MAX_BATCH_SIZE, aj as DEFAULT_INTERVAL_DURATION_MS, ak as createEventId, al as createAppSessionId, am as createPersistentId, an as baseFetchSDK, ao as baseSubmitFormSDK, ap as _retriableFetchSDK, ae as getPersistentStorageKey, aq as validate, ar as hasMultipleCookies, as as isLocalhost, at as HeadlessB2BOAuthClient$1, au as DisabledDFPProtectedAuthProvider, f as OneTapPositions, a8 as StytchSDKUsageError, av as GOOGLE_ONE_TAP_HOST, aw as GOOGLE_ONE_TAP_SCRIPT_URL, j as checkB2BNotSSR, ax as checkPublicToken, ay as buildFinalConfig, az as StateChangeClient, aA as DFPProtectedAuthProvider, aB as HeadlessB2BOrganizationClient, aC as HeadlessB2BSelfClient, aD as HeadlessB2BSessionClient, aE as HeadlessB2BMagicLinksClient, aF as HeadlessB2BSSOClient, aG as HeadlessB2BDiscoveryClient, aH as HeadlessB2BPasswordsClient, aI as HeadlessB2BOTPsClient, aJ as HeadlessB2BTOTPsClient, aK as HeadlessB2BRecoveryCodesClient, aL as HeadlessB2BRBACClient, aM as HeadlessB2BSCIMClient, aN as HeadlessB2BImpersonationClient, aO as SessionManager, aP as SearchDataManager, aQ as writeB2BInternals } from '../internal-CSX7OA60.js';
|
|
26
|
+
export { A as AuthFlowType, B as B2BMFAProducts, c as B2BOAuthProviders, a as B2BProducts, k as BiometricsAlreadyEnrolledError, m as BiometricsFailedError, n as BiometricsUnavailableError, o as ChallengeSigningFailedError, p as DeviceCredentialsNotAllowedError, F as FailedCodeChallengeError, q as FailedToDecryptDataError, I as IDPOAuthFlowMissingParamError, s as InternalError, t as InvalidAuthorizationCredentialError, u as InvalidCredentialTypeError, v as InvalidRedirectSchemeError, w as InvalidStartUrlError, J as JSONDataNotConvertibleToStringError, K as KeyInvalidatedError, x as KeystoreUnavailableError, M as MissingAttestationObjectError, y as MissingAuthorizationCredentialIDTokenError, z as MissingGoogleClientIDError, G as MissingPKCEError, H as MissingPublicKeyError, L as MissingUrlError, Q as NoBiometricsEnrolledError, T as NoBiometricsRegistrationError, U as NoCredentialsPresentError, N as NoCurrentSessionError, O as OAuthProviders, b as OTPMethods, V as PasskeysInvalidEncoding, X as PasskeysMisconfigured, Y as PasskeysUnsupportedError, P as Products, Z as RNUIProducts, $ as RandomNumberGenerationFailed, R as RedirectURLType, a0 as SDKAPIUnreachableError, a1 as SDKNotConfiguredError, a2 as SignInWithAppleMisconfigured, e as StytchAPIError, a3 as StytchAPISchemaError, a4 as StytchAPIUnreachableError, a5 as StytchError, S as StytchEventType, a6 as StytchSDKAPIError, h as StytchSDKError, a7 as StytchSDKSchemaError, a9 as UNRECOVERABLE_ERROR_TYPES, aa as UserCancellationError, ab as UserLockedOutError, W as Wallets, ac as errorToStytchError } from '../internal-CSX7OA60.js';
|
|
27
27
|
var BOOTSTRAP_CACHE_KEY = 'bootstrap';
|
|
28
28
|
var DEFAULT_BOOTSTRAP = function DEFAULT_BOOTSTRAP() {
|
|
29
29
|
return {
|
|
@@ -216,7 +216,7 @@ var ClientsideServicesProvider = /*#__PURE__*/function () {
|
|
|
216
216
|
}]);
|
|
217
217
|
return ClientsideServicesProvider;
|
|
218
218
|
}();
|
|
219
|
-
var version = "5.18.
|
|
219
|
+
var version = "5.18.2";
|
|
220
220
|
var NetworkClient = /*#__PURE__*/function () {
|
|
221
221
|
function NetworkClient(_publicToken, _subscriptionDataLayer, _liveAPIURL, _testAPIURL, additionalTelemetryDataFn) {
|
|
222
222
|
_classCallCheck(this, NetworkClient);
|
|
@@ -24,7 +24,7 @@ function _defineProperties(target, props) { for (var i = 0; i < props.length; i+
|
|
|
24
24
|
function _createClass(Constructor, protoProps, staticProps) { if (protoProps) _defineProperties(Constructor.prototype, protoProps); if (staticProps) _defineProperties(Constructor, staticProps); Object.defineProperty(Constructor, "prototype", { writable: false }); return Constructor; }
|
|
25
25
|
function _toPropertyKey(t) { var i = _toPrimitive(t, "string"); return "symbol" == _typeof(i) ? i : String(i); }
|
|
26
26
|
function _toPrimitive(t, r) { if ("object" != _typeof(t) || !t) return t; var e = t[Symbol.toPrimitive]; if (void 0 !== e) { var i = e.call(t, r || "default"); if ("object" != _typeof(i)) return i; throw new TypeError("@@toPrimitive must return a primitive value."); } return ("string" === r ? String : Number)(t); }
|
|
27
|
-
var internal = require('../internal-
|
|
27
|
+
var internal = require('../internal-CuNGC8Ow.js');
|
|
28
28
|
var BOOTSTRAP_CACHE_KEY = 'bootstrap';
|
|
29
29
|
var DEFAULT_BOOTSTRAP = function DEFAULT_BOOTSTRAP() {
|
|
30
30
|
return {
|
|
@@ -217,7 +217,7 @@ var ClientsideServicesProvider = /*#__PURE__*/function () {
|
|
|
217
217
|
}]);
|
|
218
218
|
return ClientsideServicesProvider;
|
|
219
219
|
}();
|
|
220
|
-
var version = "5.18.
|
|
220
|
+
var version = "5.18.2";
|
|
221
221
|
var NetworkClient = /*#__PURE__*/function () {
|
|
222
222
|
function NetworkClient(_publicToken, _subscriptionDataLayer, _liveAPIURL, _testAPIURL, additionalTelemetryDataFn) {
|
|
223
223
|
_classCallCheck(this, NetworkClient);
|
|
@@ -1743,6 +1743,7 @@ Object.defineProperty(exports, "B2BProducts", {
|
|
|
1743
1743
|
return internal.B2BProducts;
|
|
1744
1744
|
}
|
|
1745
1745
|
});
|
|
1746
|
+
exports.BiometricsAlreadyEnrolledError = internal.BiometricsAlreadyEnrolledError;
|
|
1746
1747
|
exports.BiometricsFailedError = internal.BiometricsFailedError;
|
|
1747
1748
|
exports.BiometricsUnavailableError = internal.BiometricsUnavailableError;
|
|
1748
1749
|
exports.ChallengeSigningFailedError = internal.ChallengeSigningFailedError;
|
package/dist/b2b/index.js
CHANGED
|
@@ -33,8 +33,8 @@ function _iterableToArray(iter) { if (typeof Symbol !== "undefined" && iter[Symb
|
|
|
33
33
|
function _arrayWithoutHoles(arr) { if (Array.isArray(arr)) return _arrayLikeToArray(arr); }
|
|
34
34
|
function _arrayLikeToArray(arr, len) { if (len == null || len > arr.length) len = arr.length; for (var i = 0, arr2 = new Array(len); i < len; i++) arr2[i] = arr[i]; return arr2; }
|
|
35
35
|
var b2b_index_headless = require('./index.headless.js');
|
|
36
|
-
var extractErrorMessage = require('../extractErrorMessage-
|
|
37
|
-
var internal = require('../internal-
|
|
36
|
+
var extractErrorMessage = require('../extractErrorMessage-CBdT83I1.js');
|
|
37
|
+
var internal = require('../internal-CuNGC8Ow.js');
|
|
38
38
|
var DEFAULT_MFA_STATE = {
|
|
39
39
|
primaryInfo: null,
|
|
40
40
|
isEnrolling: false,
|
|
@@ -3973,6 +3973,7 @@ var LoadingBar = function LoadingBar(_ref85) {
|
|
|
3973
3973
|
var isLoading = _ref85.isLoading;
|
|
3974
3974
|
return /*#__PURE__*/extractErrorMessage.wn.createElement(Container, null, isLoading && /*#__PURE__*/extractErrorMessage.wn.createElement(Progress, null));
|
|
3975
3975
|
};
|
|
3976
|
+
var OTP_LENGTH = 6;
|
|
3976
3977
|
var GAP = '8px';
|
|
3977
3978
|
var WIDTH = '46px';
|
|
3978
3979
|
var INPUT_HEIGHT = '46px';
|
|
@@ -4030,11 +4031,13 @@ var OTPInput = function OTPInput(_ref90) {
|
|
|
4030
4031
|
var otp = _ref90.otp,
|
|
4031
4032
|
setOtp = _ref90.setOtp,
|
|
4032
4033
|
disabled = _ref90.disabled;
|
|
4033
|
-
var
|
|
4034
|
-
|
|
4035
|
-
|
|
4034
|
+
var handleInput = function handleInput(e) {
|
|
4035
|
+
var target = e.target;
|
|
4036
|
+
var newValue = target.value.replace(/\D/g, '').slice(0, OTP_LENGTH);
|
|
4037
|
+
target.value = newValue;
|
|
4038
|
+
if (newValue !== otp) {
|
|
4039
|
+
setOtp(newValue);
|
|
4036
4040
|
}
|
|
4037
|
-
setOtp(e.target.value);
|
|
4038
4041
|
};
|
|
4039
4042
|
return /*#__PURE__*/extractErrorMessage.wn.createElement("div", {
|
|
4040
4043
|
style: otpContainerStyles
|
|
@@ -4044,14 +4047,13 @@ var OTPInput = function OTPInput(_ref90) {
|
|
|
4044
4047
|
autoFocus: true,
|
|
4045
4048
|
disabled: disabled,
|
|
4046
4049
|
style: invisibleInputStyles,
|
|
4047
|
-
|
|
4048
|
-
onChange: onPasscodeChange,
|
|
4050
|
+
onInput: handleInput,
|
|
4049
4051
|
type: "text",
|
|
4050
4052
|
inputMode: "numeric",
|
|
4051
4053
|
value: otp
|
|
4052
4054
|
}, extractErrorMessage.passwordManagerDisableAutofillProps)), /*#__PURE__*/extractErrorMessage.wn.createElement("div", {
|
|
4053
4055
|
style: digitsContainerStyles
|
|
4054
|
-
}, _toConsumableArray(Array(
|
|
4056
|
+
}, _toConsumableArray(Array(OTP_LENGTH).keys()).map(function (i) {
|
|
4055
4057
|
return /*#__PURE__*/extractErrorMessage.wn.createElement(DigitAtIndex, {
|
|
4056
4058
|
key: "digit-".concat(i),
|
|
4057
4059
|
index: i,
|
|
@@ -8222,6 +8224,7 @@ Object.defineProperty(exports, "B2BProducts", {
|
|
|
8222
8224
|
return internal.B2BProducts;
|
|
8223
8225
|
}
|
|
8224
8226
|
});
|
|
8227
|
+
exports.BiometricsAlreadyEnrolledError = internal.BiometricsAlreadyEnrolledError;
|
|
8225
8228
|
exports.BiometricsFailedError = internal.BiometricsFailedError;
|
|
8226
8229
|
exports.BiometricsUnavailableError = internal.BiometricsUnavailableError;
|
|
8227
8230
|
exports.ChallengeSigningFailedError = internal.ChallengeSigningFailedError;
|