@tapni/auth 0.0.99 → 0.0.101
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/TapniAuth.es.js +320 -333
- package/dist/TapniAuth.umd.js +6 -6
- package/dist/style.css +1 -1
- package/package.json +1 -1
- package/src/App.vue +8 -4
- package/src/components/Language.vue +3 -3
- package/src/components/ModalOverlay.vue +1 -1
- package/src/mixins/auth.mixin.js +28 -59
- package/src/views/Login.vue +1 -1
- package/src/views/Register.vue +3 -3
- package/src/views/Reset.vue +1 -1
package/dist/TapniAuth.es.js
CHANGED
|
@@ -1,16 +1,16 @@
|
|
|
1
|
-
import { reactive as Ko, readonly as Go, resolveComponent as
|
|
1
|
+
import { reactive as Ko, readonly as Go, resolveComponent as Bt, openBlock as S, createElementBlock as P, createElementVNode as y, toDisplayString as U, createCommentVNode as ee, createVNode as ke, withCtx as nt, createTextVNode as se, pushScopeId as Dt, popScopeId as Ht, createStaticVNode as Vo, nextTick as vr, withModifiers as Oe, normalizeStyle as Lt, withDirectives as me, withKeys as kt, vModelText as wt, vModelDynamic as dn, vShow as mt, createBlock as qe, normalizeClass as Ie, unref as Qo } from "vue";
|
|
2
2
|
import { RouterView as Yo } from "vue-router";
|
|
3
|
-
import
|
|
3
|
+
import ne from "await-to-js";
|
|
4
4
|
import Xn from "axios";
|
|
5
5
|
import { jwtDecode as qr } from "jwt-decode";
|
|
6
6
|
import { Device as pn } from "@capacitor/device";
|
|
7
|
-
import { Capacitor as
|
|
7
|
+
import { Capacitor as Vt, registerPlugin as In, WebPlugin as Wo } from "@capacitor/core";
|
|
8
8
|
import { Browser as hn } from "@capacitor/browser";
|
|
9
9
|
import $o from "qr-code-styling";
|
|
10
10
|
import { sanitizeUrl as Jo } from "@braintree/sanitize-url";
|
|
11
|
-
const Xo = "0.0.
|
|
11
|
+
const Xo = "0.0.100";
|
|
12
12
|
let Un;
|
|
13
|
-
const
|
|
13
|
+
const qt = {
|
|
14
14
|
setApiRootFromOptions(n) {
|
|
15
15
|
Un = n;
|
|
16
16
|
},
|
|
@@ -50,9 +50,9 @@ const Ft = {
|
|
|
50
50
|
return i;
|
|
51
51
|
}), o;
|
|
52
52
|
}
|
|
53
|
-
}, Je =
|
|
53
|
+
}, Je = qt.instance, sn = {
|
|
54
54
|
getMe() {
|
|
55
|
-
return
|
|
55
|
+
return qt(storage).get("/users/me");
|
|
56
56
|
},
|
|
57
57
|
getByUsername(n, e) {
|
|
58
58
|
let t = document.referrer || "", r = n.utmParams || {};
|
|
@@ -92,14 +92,14 @@ const Ft = {
|
|
|
92
92
|
loginUsingQR(n, e) {
|
|
93
93
|
return Je(e).post("/users/qr/login", n);
|
|
94
94
|
}
|
|
95
|
-
}, yr =
|
|
95
|
+
}, yr = qt.instance, kr = {
|
|
96
96
|
registerDevice(n, e) {
|
|
97
97
|
return yr(e).post("/devices/add", n);
|
|
98
98
|
},
|
|
99
99
|
addFcmToken(n, e) {
|
|
100
100
|
return yr(e).post("/devices/fcm/add", n);
|
|
101
101
|
}
|
|
102
|
-
}, _e =
|
|
102
|
+
}, _e = qt.instance;
|
|
103
103
|
let He;
|
|
104
104
|
pn.getId().then((n) => He = n.uuid);
|
|
105
105
|
const Ne = {
|
|
@@ -159,7 +159,7 @@ const Ne = {
|
|
|
159
159
|
exchangeAuthCode(n, e) {
|
|
160
160
|
return _e(e).post("/users/auth-code", n);
|
|
161
161
|
}
|
|
162
|
-
}, xn =
|
|
162
|
+
}, xn = qt.instance, Hn = {
|
|
163
163
|
getBySSOEmail(n, e) {
|
|
164
164
|
return xn(e).get(`/company/sso/${n}`);
|
|
165
165
|
},
|
|
@@ -4268,7 +4268,7 @@ Tanıştığınız herkesi etkileyin 😎 <br> Kendinize bir tane ayırın 👇`
|
|
|
4268
4268
|
return this.$storage && this.$storage.token && this.$storage.username ? "/" + this.$storage.username : "/welcome";
|
|
4269
4269
|
},
|
|
4270
4270
|
isAndroid() {
|
|
4271
|
-
return /Android/i.test(navigator.userAgent) ||
|
|
4271
|
+
return /Android/i.test(navigator.userAgent) || Vt.getPlatform() === "android";
|
|
4272
4272
|
},
|
|
4273
4273
|
isiOS() {
|
|
4274
4274
|
return [
|
|
@@ -4278,10 +4278,10 @@ Tanıştığınız herkesi etkileyin 😎 <br> Kendinize bir tane ayırın 👇`
|
|
|
4278
4278
|
"iPad",
|
|
4279
4279
|
"iPhone",
|
|
4280
4280
|
"iPod"
|
|
4281
|
-
].includes(navigator.platform) || navigator.userAgent.includes("Mac") && "ontouchend" in document ||
|
|
4281
|
+
].includes(navigator.platform) || navigator.userAgent.includes("Mac") && "ontouchend" in document || Vt.getPlatform() === "ios";
|
|
4282
4282
|
},
|
|
4283
4283
|
isNative() {
|
|
4284
|
-
return
|
|
4284
|
+
return Vt.isNativePlatform();
|
|
4285
4285
|
}
|
|
4286
4286
|
},
|
|
4287
4287
|
methods: {
|
|
@@ -4334,7 +4334,7 @@ const ze = {
|
|
|
4334
4334
|
mixins: [ei],
|
|
4335
4335
|
data() {
|
|
4336
4336
|
return {
|
|
4337
|
-
|
|
4337
|
+
lang: "en",
|
|
4338
4338
|
token: "",
|
|
4339
4339
|
refreshToken: "",
|
|
4340
4340
|
refreshing: "",
|
|
@@ -4385,6 +4385,9 @@ const ze = {
|
|
|
4385
4385
|
},
|
|
4386
4386
|
renderView() {
|
|
4387
4387
|
return this.display === "redirect" ? !1 : this.view;
|
|
4388
|
+
},
|
|
4389
|
+
appLanguage() {
|
|
4390
|
+
return this.display === "npm" ? this.appLang : this.lang;
|
|
4388
4391
|
}
|
|
4389
4392
|
},
|
|
4390
4393
|
mounted() {
|
|
@@ -4415,13 +4418,13 @@ const ze = {
|
|
|
4415
4418
|
document.getElementById("snackbar").classList.remove("show-snack"), document.getElementById("successSnack").classList.remove("active-snack"), document.getElementById("errorSnack").classList.remove("active-snack");
|
|
4416
4419
|
},
|
|
4417
4420
|
async eventLog(n) {
|
|
4418
|
-
const [e, t] = await
|
|
4419
|
-
|
|
4421
|
+
const [e, t] = await ne(
|
|
4422
|
+
sn.eventLog(n, this.$storage)
|
|
4420
4423
|
);
|
|
4421
4424
|
return e ? this.errorHandler(e) : t;
|
|
4422
4425
|
},
|
|
4423
4426
|
async maintenance() {
|
|
4424
|
-
const [n, e] = await
|
|
4427
|
+
const [n, e] = await ne(
|
|
4425
4428
|
Xn.get("https://status.tapni.co/data/maintenance.json")
|
|
4426
4429
|
);
|
|
4427
4430
|
if (n)
|
|
@@ -4431,27 +4434,6 @@ const ze = {
|
|
|
4431
4434
|
typeof e.data == "string" && (t = JSON.parse(e.data)), t.api && t.api.maintenanceActive && (location.href = "https://t.link/maintenance?msg=" + t.api.msg);
|
|
4432
4435
|
}
|
|
4433
4436
|
},
|
|
4434
|
-
async getUser(n) {
|
|
4435
|
-
if (n) {
|
|
4436
|
-
let e, t;
|
|
4437
|
-
if (n.username ? [e, t] = await Z(
|
|
4438
|
-
It.getByUsername(n, this.$storage)
|
|
4439
|
-
) : n.serial && ([e, t] = await Z(
|
|
4440
|
-
It.getByNumber(n, this.$storage)
|
|
4441
|
-
)), e)
|
|
4442
|
-
return this.errorHandler(e);
|
|
4443
|
-
if (t.data.success) {
|
|
4444
|
-
if (!t.data.user && t.data.showDemoProfile) {
|
|
4445
|
-
if (this.isLoggedIn)
|
|
4446
|
-
throw this.$router.push("/tags#activate"), new Error("Activate the tag");
|
|
4447
|
-
return this.$router.push("/" + t.data.showDemoProfile);
|
|
4448
|
-
}
|
|
4449
|
-
!t.data.user && n.login && this.logout(), this.registerLang(
|
|
4450
|
-
t.data.user ? t.data.user.ssoLang : "en"
|
|
4451
|
-
), this.setUser(t.data.user);
|
|
4452
|
-
}
|
|
4453
|
-
}
|
|
4454
|
-
},
|
|
4455
4437
|
async loginSetup(n) {
|
|
4456
4438
|
n.data.refreshToken && this.setRefreshToken(n.data.refreshToken), n.data.token && this.setToken(n.data.token), this.setLoggedInUserId(n.data.data.id), this.$storage.UserId = n.data.data.id, this.$storage.username = n.data.data.username, this.$storage.localUser = n.data.data, n.isModal === !0 && this.setLoggedInAccounts([
|
|
4457
4439
|
{
|
|
@@ -4463,17 +4445,14 @@ const ze = {
|
|
|
4463
4445
|
]);
|
|
4464
4446
|
},
|
|
4465
4447
|
async switchAccount(n) {
|
|
4466
|
-
this.$storage.username = n, this.$storage.UserId = this.loggedInAccounts[n].id, this.setLoggedInUserId(this.loggedInAccounts[n].id), this.setRefreshToken(this.loggedInAccounts[n].refreshToken), await this.refreshTokenAction(this.loggedInAccounts[n]), z.$emit("ssoEvent", {
|
|
4467
|
-
name: "switchAccount",
|
|
4468
|
-
data: { lang: this.appLanguage, username: n }
|
|
4469
|
-
});
|
|
4448
|
+
console.log("switch account auth f"), this.$storage.username = n, this.$storage.UserId = this.loggedInAccounts[n].id, this.setLoggedInUserId(this.loggedInAccounts[n].id), this.setRefreshToken(this.loggedInAccounts[n].refreshToken), await this.refreshTokenAction(this.loggedInAccounts[n]), z.$emit("ssoEvent", { name: "switchAccount", data: { username: n } });
|
|
4470
4449
|
},
|
|
4471
4450
|
async refreshTokenAction(n) {
|
|
4472
4451
|
return new Promise(async (e, t) => {
|
|
4473
4452
|
if (!n.refreshToken || this.refreshing)
|
|
4474
4453
|
return e(null);
|
|
4475
4454
|
this.refreshing = !0;
|
|
4476
|
-
const [r, o] = await
|
|
4455
|
+
const [r, o] = await ne(
|
|
4477
4456
|
Ne.refreshToken({
|
|
4478
4457
|
id: n.id,
|
|
4479
4458
|
refreshToken: n.refreshToken,
|
|
@@ -4481,12 +4460,12 @@ const ze = {
|
|
|
4481
4460
|
}, n.storage)
|
|
4482
4461
|
);
|
|
4483
4462
|
if (r && r.response && r.response.data.error === "ACCESS_DENIED")
|
|
4484
|
-
return this.logout(!1), location.reload();
|
|
4463
|
+
return this.logout(n.refreshToken, !1), location.reload();
|
|
4485
4464
|
o && o.data && (z.$emit("setToken", o.data.token), n.storage.token = o.data.token, z.$emit("ssoEvent", { name: "setStorage", data: n.storage }), e(o.data.token)), this.refreshing = !1;
|
|
4486
4465
|
});
|
|
4487
4466
|
},
|
|
4488
4467
|
async login(n) {
|
|
4489
|
-
const [e, t] = await
|
|
4468
|
+
const [e, t] = await ne(Ne.login(n, this.$storage));
|
|
4490
4469
|
if (e)
|
|
4491
4470
|
return this.errorHandler(e);
|
|
4492
4471
|
if (t.data.success)
|
|
@@ -4506,20 +4485,20 @@ const ze = {
|
|
|
4506
4485
|
{ code: n.data.auth_code, state: this.$route.query.state },
|
|
4507
4486
|
e
|
|
4508
4487
|
);
|
|
4509
|
-
}) : this.display === "npm" && (z.$emit("ssoEvent", { name: "setLoading", data: !0 }), z.$emit("ssoEvent", { name: "setStorage", data: this.$storage }), z.$emit("ssoEvent", { name: "getUser", data: {
|
|
4488
|
+
}) : this.display === "npm" && (z.$emit("ssoEvent", { name: "setLoading", data: !0 }), z.$emit("ssoEvent", { name: "setStorage", data: this.$storage }), z.$emit("ssoEvent", { name: "getUser", data: { username: this.$storage.username } }), n.isModal && (z.$emit("closeModal"), this.successSnack(this.ssoLang[this.appLanguage].success_login)), this.$router.push("/" + n.data.data.username + "#edit"));
|
|
4510
4489
|
},
|
|
4511
4490
|
async register(n) {
|
|
4512
|
-
const [e, t] = await
|
|
4491
|
+
const [e, t] = await ne(
|
|
4513
4492
|
Ne.register(n, this.$storage)
|
|
4514
4493
|
);
|
|
4515
4494
|
return e ? this.errorHandler(e) : t;
|
|
4516
4495
|
},
|
|
4517
4496
|
async verify(n) {
|
|
4518
|
-
const [e, t] = await
|
|
4497
|
+
const [e, t] = await ne(Ne.verify(n, this.$storage));
|
|
4519
4498
|
return e ? this.errorHandler(e) : t;
|
|
4520
4499
|
},
|
|
4521
4500
|
async reset(n) {
|
|
4522
|
-
const [e, t] = await
|
|
4501
|
+
const [e, t] = await ne(
|
|
4523
4502
|
Ne.sendResetEmail(n, this.$storage)
|
|
4524
4503
|
);
|
|
4525
4504
|
if (e)
|
|
@@ -4527,26 +4506,26 @@ const ze = {
|
|
|
4527
4506
|
t.data.success && this.successSnack(this.ssoLang[this.appLanguage].password_reset_success);
|
|
4528
4507
|
},
|
|
4529
4508
|
async exchangeAuthCode(n) {
|
|
4530
|
-
const [e, t] = await
|
|
4509
|
+
const [e, t] = await ne(Ne.exchangeAuthCode(n, this.$storage));
|
|
4531
4510
|
if (e)
|
|
4532
4511
|
return this.errorHandler(e);
|
|
4533
4512
|
await this.loginSetup(t), await this.getLoggedInAccounts(), this.loginSuccess(t);
|
|
4534
4513
|
},
|
|
4535
4514
|
async changePassword(n) {
|
|
4536
|
-
const [e, t] = await
|
|
4515
|
+
const [e, t] = await ne(
|
|
4537
4516
|
Ne.changePassword(n, this.$storage)
|
|
4538
4517
|
);
|
|
4539
4518
|
return e ? this.errorHandler(e) : t.data.success;
|
|
4540
4519
|
},
|
|
4541
4520
|
async newPassword(n) {
|
|
4542
|
-
const [e, t] = await
|
|
4543
|
-
|
|
4521
|
+
const [e, t] = await ne(
|
|
4522
|
+
sn.newPassword(n, this.$storage)
|
|
4544
4523
|
);
|
|
4545
4524
|
return e ? this.errorHandler(e) : t.data.success;
|
|
4546
4525
|
},
|
|
4547
4526
|
async deleteAccount(n) {
|
|
4548
|
-
const [e, t] = await
|
|
4549
|
-
|
|
4527
|
+
const [e, t] = await ne(
|
|
4528
|
+
sn.deleteAccount(n, this.$storage)
|
|
4550
4529
|
);
|
|
4551
4530
|
return e ? this.errorHandler(e) : t.data.success;
|
|
4552
4531
|
},
|
|
@@ -4564,30 +4543,30 @@ const ze = {
|
|
|
4564
4543
|
webViewVersion: e.webViewVersion
|
|
4565
4544
|
}
|
|
4566
4545
|
};
|
|
4567
|
-
const [r, o] = await
|
|
4546
|
+
const [r, o] = await ne(
|
|
4568
4547
|
kr.registerDevice(t, this.$storage)
|
|
4569
4548
|
);
|
|
4570
4549
|
return r ? this.errorHandler(r) : o;
|
|
4571
4550
|
},
|
|
4572
4551
|
async addFcmToken(n) {
|
|
4573
|
-
const [e, t] = await
|
|
4552
|
+
const [e, t] = await ne(
|
|
4574
4553
|
kr.addFcmToken(n, this.$storage)
|
|
4575
4554
|
);
|
|
4576
4555
|
return e ? this.errorHandler(e) : t;
|
|
4577
4556
|
},
|
|
4578
4557
|
async acceptCompanyInvitation(n) {
|
|
4579
|
-
const [e, t] = await
|
|
4558
|
+
const [e, t] = await ne(
|
|
4580
4559
|
Hn.acceptCompanyInvitation(n, this.$storage)
|
|
4581
4560
|
);
|
|
4582
4561
|
return e ? this.errorHandler(e) : t;
|
|
4583
4562
|
},
|
|
4584
|
-
async logout(n = !0) {
|
|
4585
|
-
n && Ne.logout({ token:
|
|
4586
|
-
this.loggedInAccounts[
|
|
4563
|
+
async logout(n, e = !0) {
|
|
4564
|
+
e && n && Ne.logout({ token: n }, this.$storage), this.$storage && (this.$storage.username = "", this.$storage.UserId = "", this.$storage.localUser = ""), this.setLoggedInUserId(""), this.setToken(""), this.unsetRefreshToken(n), n ? Object.keys(this.loggedInAccounts).forEach((t) => {
|
|
4565
|
+
this.loggedInAccounts[t].refreshToken === n && this.refreshTokenAction(this.loggedInAccounts[t]).then(() => (this.setLoggedInUserId(this.loggedInAccounts[t].id), this.$storage && (this.$storage.username = t, this.$storage.UserId = this.loggedInAccounts[t].id), this.getLoggedInAccounts(), this.$router.push("/" + t)));
|
|
4587
4566
|
}) : (this.setUser(null), this.$router.push("/welcome"));
|
|
4588
4567
|
},
|
|
4589
4568
|
async getCompanyBySSOEmail(n) {
|
|
4590
|
-
const [e, t] = await
|
|
4569
|
+
const [e, t] = await ne(
|
|
4591
4570
|
Hn.getBySSOEmail(n.email, this.$storage)
|
|
4592
4571
|
);
|
|
4593
4572
|
if (e)
|
|
@@ -4597,7 +4576,7 @@ const ze = {
|
|
|
4597
4576
|
},
|
|
4598
4577
|
async getLoggedInAccounts(n) {
|
|
4599
4578
|
if (n || (n = this.getRefreshTokens()), n && n.length >= 1) {
|
|
4600
|
-
const [e, t] = await
|
|
4579
|
+
const [e, t] = await ne(
|
|
4601
4580
|
Ne.getLoggedInAccounts({ refreshTokens: n }, this.$storage)
|
|
4602
4581
|
);
|
|
4603
4582
|
if (e)
|
|
@@ -4606,8 +4585,8 @@ const ze = {
|
|
|
4606
4585
|
}
|
|
4607
4586
|
},
|
|
4608
4587
|
async loginUsingQR(n) {
|
|
4609
|
-
const [e, t] = await
|
|
4610
|
-
|
|
4588
|
+
const [e, t] = await ne(
|
|
4589
|
+
sn.loginUsingQR(n, this.$storage)
|
|
4611
4590
|
);
|
|
4612
4591
|
return e ? this.errorHandler(e) : t.data.success;
|
|
4613
4592
|
},
|
|
@@ -4627,7 +4606,11 @@ const ze = {
|
|
|
4627
4606
|
},
|
|
4628
4607
|
setRefreshToken(n) {
|
|
4629
4608
|
let e = this.getRefreshTokens();
|
|
4630
|
-
|
|
4609
|
+
e.includes(n) && (e = e.filter((t) => t !== n)), e.unshift(n), this.$storage.refreshTokens = e.join(",");
|
|
4610
|
+
},
|
|
4611
|
+
unsetRefreshToken(n) {
|
|
4612
|
+
let e = this.getRefreshTokens();
|
|
4613
|
+
e = e.filter((t) => t !== n), this.$storage.refreshTokens = e.join(",");
|
|
4631
4614
|
},
|
|
4632
4615
|
setToken(n) {
|
|
4633
4616
|
this.$storage.token = n, this.token = n;
|
|
@@ -4636,7 +4619,7 @@ const ze = {
|
|
|
4636
4619
|
this.$storage.UserId = n;
|
|
4637
4620
|
},
|
|
4638
4621
|
updateLang(n) {
|
|
4639
|
-
this.
|
|
4622
|
+
this.lang = n;
|
|
4640
4623
|
}
|
|
4641
4624
|
},
|
|
4642
4625
|
watch: {
|
|
@@ -4671,7 +4654,7 @@ const ze = {
|
|
|
4671
4654
|
}, 2500);
|
|
4672
4655
|
},
|
|
4673
4656
|
methods: {}
|
|
4674
|
-
}, $r = (n) => (
|
|
4657
|
+
}, $r = (n) => (Dt("data-v-67088d6f"), n = n(), Ht(), n), ri = {
|
|
4675
4658
|
class: "page-login content-boxed content-boxed-padding center-text",
|
|
4676
4659
|
style: { "margin-top": "-1px", overflow: "hidden", border: "solid 0px #ffffff" }
|
|
4677
4660
|
}, oi = ["autoplay"], ii = /* @__PURE__ */ $r(() => /* @__PURE__ */ y("source", {
|
|
@@ -4686,7 +4669,7 @@ const ze = {
|
|
|
4686
4669
|
pi
|
|
4687
4670
|
];
|
|
4688
4671
|
function mi(n, e, t, r, o, i) {
|
|
4689
|
-
const a =
|
|
4672
|
+
const a = Bt("router-link");
|
|
4690
4673
|
return S(), P("div", ri, [
|
|
4691
4674
|
y("video", {
|
|
4692
4675
|
id: "tapniVideo",
|
|
@@ -4699,8 +4682,8 @@ function mi(n, e, t, r, o, i) {
|
|
|
4699
4682
|
}, ai, 8, oi),
|
|
4700
4683
|
y("h1", si, U(n.ssoLang[this.appLanguage].welcome), 1),
|
|
4701
4684
|
y("p", ci, U(n.ssoLang[this.appLanguage].welcome_p1), 1),
|
|
4702
|
-
|
|
4703
|
-
|
|
4685
|
+
ee("", !0),
|
|
4686
|
+
ee("", !0),
|
|
4704
4687
|
ke(a, {
|
|
4705
4688
|
to: "register",
|
|
4706
4689
|
exact: "",
|
|
@@ -4721,7 +4704,7 @@ function mi(n, e, t, r, o, i) {
|
|
|
4721
4704
|
}),
|
|
4722
4705
|
ui
|
|
4723
4706
|
]),
|
|
4724
|
-
this.isNative ?
|
|
4707
|
+
this.isNative ? ee("", !0) : (S(), P("div", di, hi))
|
|
4725
4708
|
]);
|
|
4726
4709
|
}
|
|
4727
4710
|
const Jr = /* @__PURE__ */ We(ni, [["render", mi], ["__scopeId", "data-v-67088d6f"]]), wr = In("GoogleAuth", {
|
|
@@ -4745,12 +4728,12 @@ const Jr = /* @__PURE__ */ We(ni, [["render", mi], ["__scopeId", "data-v-67088d6
|
|
|
4745
4728
|
async googleLogin() {
|
|
4746
4729
|
var t;
|
|
4747
4730
|
this.googleLoad = !0;
|
|
4748
|
-
let [n, e] = await
|
|
4731
|
+
let [n, e] = await ne(wr.signIn());
|
|
4749
4732
|
if (n)
|
|
4750
4733
|
return this.googleLoad = !1;
|
|
4751
4734
|
if (this.referral && (e.ref = this.referral), e.authentication && (e.authentication.accessToken || e.authentication.idToken)) {
|
|
4752
4735
|
this.referral && (e.ref = this.referral), this.display === "popup" && (e.response_type = "code");
|
|
4753
|
-
const [r, o] = await
|
|
4736
|
+
const [r, o] = await ne(Ne.googleSDK(e, this.$storage));
|
|
4754
4737
|
if (r)
|
|
4755
4738
|
return this.googleLoad = !1, z.$emit("ssoEvent", { name: "setLoading", data: !1 }), this.errorHandler(r);
|
|
4756
4739
|
if (o.data.success) {
|
|
@@ -4801,11 +4784,11 @@ const Zr = {
|
|
|
4801
4784
|
async facebookLogin() {
|
|
4802
4785
|
var r;
|
|
4803
4786
|
this.facebookLoad = !0;
|
|
4804
|
-
const n = ["email"], [e, t] = await
|
|
4787
|
+
const n = ["email"], [e, t] = await ne(fi.login({ permissions: n }));
|
|
4805
4788
|
if (e)
|
|
4806
4789
|
return this.facebookLoad = !1;
|
|
4807
4790
|
if (this.referral && (t.ref = this.referral), this.display === "popup" && (t.response_type = "code"), t && t.accessToken) {
|
|
4808
|
-
const [o, i] = await
|
|
4791
|
+
const [o, i] = await ne(Ne.facebookSDK(t, this.$storage));
|
|
4809
4792
|
if (o)
|
|
4810
4793
|
return this.facebookLoad = !1, z.$emit("ssoEvent", { name: "setLoading", data: !1 }), this.errorHandler(o);
|
|
4811
4794
|
if (i.data.success) {
|
|
@@ -4838,7 +4821,7 @@ const Zr = {
|
|
|
4838
4821
|
async appleLogin() {
|
|
4839
4822
|
var t;
|
|
4840
4823
|
this.appleLoad = !0;
|
|
4841
|
-
const [n, e] = await
|
|
4824
|
+
const [n, e] = await ne(gi.authorize({
|
|
4842
4825
|
clientId: "co.tapni.applelogin",
|
|
4843
4826
|
redirectURI: "https://" + window.location.host + "/login",
|
|
4844
4827
|
scopes: "email name"
|
|
@@ -4847,7 +4830,7 @@ const Zr = {
|
|
|
4847
4830
|
return this.appleLoad = !1;
|
|
4848
4831
|
if (e.response.tokenData = qr(e.response.identityToken), e && e.response && e.response.identityToken) {
|
|
4849
4832
|
this.referral && (e.response.ref = this.referral), this.display === "popup" && (e.response_type = "code");
|
|
4850
|
-
const [r, o] = await
|
|
4833
|
+
const [r, o] = await ne(Ne.appleSDK(e.response, this.$storage));
|
|
4851
4834
|
if (r)
|
|
4852
4835
|
return this.appleLoad = !1, z.$emit("ssoEvent", { name: "setLoading", data: !1 }), this.errorHandler(r);
|
|
4853
4836
|
if (o.data.success) {
|
|
@@ -5059,15 +5042,15 @@ function Ue(n, e) {
|
|
|
5059
5042
|
}
|
|
5060
5043
|
n.prototype = e === null ? Object.create(e) : (t.prototype = e.prototype, new t());
|
|
5061
5044
|
}
|
|
5062
|
-
var
|
|
5063
|
-
return
|
|
5045
|
+
var Z = function() {
|
|
5046
|
+
return Z = Object.assign || function(e) {
|
|
5064
5047
|
for (var t, r = 1, o = arguments.length; r < o; r++) {
|
|
5065
5048
|
t = arguments[r];
|
|
5066
5049
|
for (var i in t)
|
|
5067
5050
|
Object.prototype.hasOwnProperty.call(t, i) && (e[i] = t[i]);
|
|
5068
5051
|
}
|
|
5069
5052
|
return e;
|
|
5070
|
-
},
|
|
5053
|
+
}, Z.apply(this, arguments);
|
|
5071
5054
|
};
|
|
5072
5055
|
function j(n, e, t, r) {
|
|
5073
5056
|
function o(i) {
|
|
@@ -5223,11 +5206,11 @@ var g = {
|
|
|
5223
5206
|
ID_TOKEN_RESPONSE_TYPE: "id_token",
|
|
5224
5207
|
SHR_NONCE_VALIDITY: 240,
|
|
5225
5208
|
INVALID_INSTANCE: "invalid_instance"
|
|
5226
|
-
},
|
|
5209
|
+
}, on = [
|
|
5227
5210
|
g.OPENID_SCOPE,
|
|
5228
5211
|
g.PROFILE_SCOPE,
|
|
5229
5212
|
g.OFFLINE_ACCESS_SCOPE
|
|
5230
|
-
], Cr = Sn(
|
|
5213
|
+
], Cr = Sn(on, [
|
|
5231
5214
|
g.EMAIL_SCOPE
|
|
5232
5215
|
]), De;
|
|
5233
5216
|
(function(n) {
|
|
@@ -5245,10 +5228,10 @@ var V;
|
|
|
5245
5228
|
(function(n) {
|
|
5246
5229
|
n.CLIENT_ID = "client_id", n.REDIRECT_URI = "redirect_uri", n.RESPONSE_TYPE = "response_type", n.RESPONSE_MODE = "response_mode", n.GRANT_TYPE = "grant_type", n.CLAIMS = "claims", n.SCOPE = "scope", n.ERROR = "error", n.ERROR_DESCRIPTION = "error_description", n.ACCESS_TOKEN = "access_token", n.ID_TOKEN = "id_token", n.REFRESH_TOKEN = "refresh_token", n.EXPIRES_IN = "expires_in", n.STATE = "state", n.NONCE = "nonce", n.PROMPT = "prompt", n.SESSION_STATE = "session_state", n.CLIENT_INFO = "client_info", n.CODE = "code", n.CODE_CHALLENGE = "code_challenge", n.CODE_CHALLENGE_METHOD = "code_challenge_method", n.CODE_VERIFIER = "code_verifier", n.CLIENT_REQUEST_ID = "client-request-id", n.X_CLIENT_SKU = "x-client-SKU", n.X_CLIENT_VER = "x-client-VER", n.X_CLIENT_OS = "x-client-OS", n.X_CLIENT_CPU = "x-client-CPU", n.X_CLIENT_CURR_TELEM = "x-client-current-telemetry", n.X_CLIENT_LAST_TELEM = "x-client-last-telemetry", n.X_MS_LIB_CAPABILITY = "x-ms-lib-capability", n.X_APP_NAME = "x-app-name", n.X_APP_VER = "x-app-ver", n.POST_LOGOUT_URI = "post_logout_redirect_uri", n.ID_TOKEN_HINT = "id_token_hint", n.DEVICE_CODE = "device_code", n.CLIENT_SECRET = "client_secret", n.CLIENT_ASSERTION = "client_assertion", n.CLIENT_ASSERTION_TYPE = "client_assertion_type", n.TOKEN_TYPE = "token_type", n.REQ_CNF = "req_cnf", n.OBO_ASSERTION = "assertion", n.REQUESTED_TOKEN_USE = "requested_token_use", n.ON_BEHALF_OF = "on_behalf_of", n.FOCI = "foci", n.CCS_HEADER = "X-AnchorMailbox", n.RETURN_SPA_CODE = "return_spa_code", n.NATIVE_BROKER = "nativebroker", n.LOGOUT_HINT = "logout_hint";
|
|
5247
5230
|
})(V || (V = {}));
|
|
5248
|
-
var
|
|
5231
|
+
var St;
|
|
5249
5232
|
(function(n) {
|
|
5250
5233
|
n.ACCESS_TOKEN = "access_token", n.XMS_CC = "xms_cc";
|
|
5251
|
-
})(
|
|
5234
|
+
})(St || (St = {}));
|
|
5252
5235
|
var Te = {
|
|
5253
5236
|
LOGIN: "login",
|
|
5254
5237
|
SELECT_ACCOUNT: "select_account",
|
|
@@ -5256,10 +5239,10 @@ var Te = {
|
|
|
5256
5239
|
NONE: "none",
|
|
5257
5240
|
CREATE: "create",
|
|
5258
5241
|
NO_SESSION: "no_session"
|
|
5259
|
-
},
|
|
5242
|
+
}, Qt;
|
|
5260
5243
|
(function(n) {
|
|
5261
5244
|
n.ACCOUNT = "account", n.SID = "sid", n.LOGIN_HINT = "login_hint", n.ID_TOKEN = "id_token", n.DOMAIN_HINT = "domain_hint", n.ORGANIZATIONS = "organizations", n.CONSUMERS = "consumers", n.ACCOUNT_ID = "accountIdentifier", n.HOMEACCOUNT_ID = "homeAccountIdentifier";
|
|
5262
|
-
})(
|
|
5245
|
+
})(Qt || (Qt = {}));
|
|
5263
5246
|
var Er = {
|
|
5264
5247
|
PLAIN: "plain",
|
|
5265
5248
|
S256: "S256"
|
|
@@ -5287,7 +5270,7 @@ var it;
|
|
|
5287
5270
|
(function(n) {
|
|
5288
5271
|
n[n.ADFS = 1001] = "ADFS", n[n.MSA = 1002] = "MSA", n[n.MSSTS = 1003] = "MSSTS", n[n.GENERIC = 1004] = "GENERIC", n[n.ACCESS_TOKEN = 2001] = "ACCESS_TOKEN", n[n.REFRESH_TOKEN = 2002] = "REFRESH_TOKEN", n[n.ID_TOKEN = 2003] = "ID_TOKEN", n[n.APP_METADATA = 3001] = "APP_METADATA", n[n.UNDEFINED = 9999] = "UNDEFINED";
|
|
5289
5272
|
})(it || (it = {}));
|
|
5290
|
-
var jn = "appmetadata", vi = "client_info",
|
|
5273
|
+
var jn = "appmetadata", vi = "client_info", Yt = "1", Wt = {
|
|
5291
5274
|
CACHE_KEY: "authority-metadata",
|
|
5292
5275
|
REFRESH_TIME_SECONDS: 3600 * 24
|
|
5293
5276
|
// 24 Hours
|
|
@@ -5306,11 +5289,11 @@ var ye = {
|
|
|
5306
5289
|
OVERFLOW_TRUE: "1",
|
|
5307
5290
|
OVERFLOW_FALSE: "0",
|
|
5308
5291
|
UNKNOWN_ERROR: "unknown_error"
|
|
5309
|
-
},
|
|
5292
|
+
}, te;
|
|
5310
5293
|
(function(n) {
|
|
5311
5294
|
n.BEARER = "Bearer", n.POP = "pop", n.SSH = "ssh-cert";
|
|
5312
|
-
})(
|
|
5313
|
-
var
|
|
5295
|
+
})(te || (te = {}));
|
|
5296
|
+
var $t = {
|
|
5314
5297
|
// Default time to throttle RequestThumbprint in seconds
|
|
5315
5298
|
DEFAULT_THROTTLE_TIME_SECONDS: 60,
|
|
5316
5299
|
// Default maximum time to throttle in seconds, overrides what the server sends back
|
|
@@ -5326,18 +5309,18 @@ var Jt = {
|
|
|
5326
5309
|
(function(n) {
|
|
5327
5310
|
n.username = "username", n.password = "password";
|
|
5328
5311
|
})(gn || (gn = {}));
|
|
5329
|
-
var
|
|
5312
|
+
var At;
|
|
5330
5313
|
(function(n) {
|
|
5331
5314
|
n[n.httpSuccess = 200] = "httpSuccess", n[n.httpBadRequest = 400] = "httpBadRequest";
|
|
5332
|
-
})(
|
|
5315
|
+
})(At || (At = {}));
|
|
5333
5316
|
var dt;
|
|
5334
5317
|
(function(n) {
|
|
5335
5318
|
n.FAILED_AUTO_DETECTION = "1", n.INTERNAL_CACHE = "2", n.ENVIRONMENT_VARIABLE = "3", n.IMDS = "4";
|
|
5336
5319
|
})(dt || (dt = {}));
|
|
5337
|
-
var
|
|
5320
|
+
var Jt;
|
|
5338
5321
|
(function(n) {
|
|
5339
5322
|
n.CONFIGURED_MATCHES_DETECTED = "1", n.CONFIGURED_NO_AUTO_DETECTION = "2", n.CONFIGURED_NOT_DETECTED = "3", n.AUTO_DETECTION_REQUESTED_SUCCESSFUL = "4", n.AUTO_DETECTION_REQUESTED_FAILED = "5";
|
|
5340
|
-
})(
|
|
5323
|
+
})(Jt || (Jt = {}));
|
|
5341
5324
|
var ht;
|
|
5342
5325
|
(function(n) {
|
|
5343
5326
|
n.NO_CACHE_HIT = "0", n.FORCE_REFRESH = "1", n.NO_CACHED_ACCESS_TOKEN = "2", n.CACHED_ACCESS_TOKEN_EXPIRED = "3", n.REFRESH_CACHED_ACCESS_TOKEN = "4", n.CLAIMS_REQUESTED_CACHE_SKIPPED = "5";
|
|
@@ -5903,10 +5886,10 @@ var er = (
|
|
|
5903
5886
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
5904
5887
|
var to = "@azure/msal-common", tr = "13.3.1";
|
|
5905
5888
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
5906
|
-
var
|
|
5889
|
+
var tn;
|
|
5907
5890
|
(function(n) {
|
|
5908
5891
|
n[n.None = 0] = "None", n.AzurePublic = "https://login.microsoftonline.com", n.AzurePpe = "https://login.windows-ppe.net", n.AzureChina = "https://login.chinacloudapi.cn", n.AzureGermany = "https://login.microsoftonline.de", n.AzureUsGovernment = "https://login.microsoftonline.us";
|
|
5909
|
-
})(
|
|
5892
|
+
})(tn || (tn = {}));
|
|
5910
5893
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
5911
5894
|
var F = {
|
|
5912
5895
|
redirectUriNotSet: {
|
|
@@ -6158,7 +6141,7 @@ function vn(n, e) {
|
|
|
6158
6141
|
throw O.createClientInfoDecodingError(r.message);
|
|
6159
6142
|
}
|
|
6160
6143
|
}
|
|
6161
|
-
function
|
|
6144
|
+
function Rt(n) {
|
|
6162
6145
|
if (L.isEmpty(n))
|
|
6163
6146
|
throw O.createClientInfoDecodingError("Home account ID was empty.");
|
|
6164
6147
|
var e = n.split(fe.CLIENT_INFO_SEPARATOR, 2);
|
|
@@ -6382,14 +6365,14 @@ var Me = (
|
|
|
6382
6365
|
if (t.indexOf(H.ID_TOKEN.toLowerCase()) === -1 && t.indexOf(H.ACCESS_TOKEN.toLowerCase()) === -1 && t.indexOf(H.ACCESS_TOKEN_WITH_AUTH_SCHEME.toLowerCase()) === -1 && t.indexOf(H.REFRESH_TOKEN.toLowerCase()) === -1)
|
|
6383
6366
|
return !1;
|
|
6384
6367
|
if (t.indexOf(H.REFRESH_TOKEN.toLowerCase()) > -1) {
|
|
6385
|
-
var r = "" + H.REFRESH_TOKEN + fe.CACHE_KEY_SEPARATOR + this.clientId + fe.CACHE_KEY_SEPARATOR, o = "" + H.REFRESH_TOKEN + fe.CACHE_KEY_SEPARATOR +
|
|
6368
|
+
var r = "" + H.REFRESH_TOKEN + fe.CACHE_KEY_SEPARATOR + this.clientId + fe.CACHE_KEY_SEPARATOR, o = "" + H.REFRESH_TOKEN + fe.CACHE_KEY_SEPARATOR + Yt + fe.CACHE_KEY_SEPARATOR;
|
|
6386
6369
|
if (t.indexOf(r.toLowerCase()) === -1 && t.indexOf(o.toLowerCase()) === -1)
|
|
6387
6370
|
return !1;
|
|
6388
6371
|
} else if (t.indexOf(this.clientId.toLowerCase()) === -1)
|
|
6389
6372
|
return !1;
|
|
6390
6373
|
return !0;
|
|
6391
6374
|
}, n.prototype.credentialMatchesFilter = function(e, t) {
|
|
6392
|
-
return !(t.clientId && !this.matchClientId(e, t.clientId) || t.userAssertionHash && !this.matchUserAssertionHash(e, t.userAssertionHash) || typeof t.homeAccountId == "string" && !this.matchHomeAccountId(e, t.homeAccountId) || t.environment && !this.matchEnvironment(e, t.environment) || t.realm && !this.matchRealm(e, t.realm) || t.credentialType && !this.matchCredentialType(e, t.credentialType) || t.familyId && !this.matchFamilyId(e, t.familyId) || t.target && !this.matchTarget(e, t.target) || (t.requestedClaimsHash || e.requestedClaimsHash) && e.requestedClaimsHash !== t.requestedClaimsHash || e.credentialType === H.ACCESS_TOKEN_WITH_AUTH_SCHEME && (t.tokenType && !this.matchTokenType(e, t.tokenType) || t.tokenType ===
|
|
6375
|
+
return !(t.clientId && !this.matchClientId(e, t.clientId) || t.userAssertionHash && !this.matchUserAssertionHash(e, t.userAssertionHash) || typeof t.homeAccountId == "string" && !this.matchHomeAccountId(e, t.homeAccountId) || t.environment && !this.matchEnvironment(e, t.environment) || t.realm && !this.matchRealm(e, t.realm) || t.credentialType && !this.matchCredentialType(e, t.credentialType) || t.familyId && !this.matchFamilyId(e, t.familyId) || t.target && !this.matchTarget(e, t.target) || (t.requestedClaimsHash || e.requestedClaimsHash) && e.requestedClaimsHash !== t.requestedClaimsHash || e.credentialType === H.ACCESS_TOKEN_WITH_AUTH_SCHEME && (t.tokenType && !this.matchTokenType(e, t.tokenType) || t.tokenType === te.SSH && t.keyId && !this.matchKeyId(e, t.keyId)));
|
|
6393
6376
|
}, n.prototype.getAppMetadataFilteredBy = function(e) {
|
|
6394
6377
|
return this.getAppMetadataFilteredByInternal(e.environment, e.clientId);
|
|
6395
6378
|
}, n.prototype.getAppMetadataFilteredByInternal = function(e, t) {
|
|
@@ -6476,7 +6459,7 @@ var Me = (
|
|
|
6476
6459
|
];
|
|
6477
6460
|
if (t.credentialType.toLowerCase() !== H.ACCESS_TOKEN_WITH_AUTH_SCHEME.toLowerCase())
|
|
6478
6461
|
return [3, 4];
|
|
6479
|
-
if (t.tokenType !==
|
|
6462
|
+
if (t.tokenType !== te.POP)
|
|
6480
6463
|
return [3, 4];
|
|
6481
6464
|
if (r = t, o = r.keyId, !o)
|
|
6482
6465
|
return [3, 4];
|
|
@@ -6525,7 +6508,7 @@ var Me = (
|
|
|
6525
6508
|
}, n.prototype.getIdTokensByFilter = function(e, t) {
|
|
6526
6509
|
var r = this, o = t && t.idToken || this.getTokenKeys().idToken, i = [];
|
|
6527
6510
|
return o.forEach(function(a) {
|
|
6528
|
-
if (r.idTokenKeyMatchesFilter(a,
|
|
6511
|
+
if (r.idTokenKeyMatchesFilter(a, Z({ clientId: r.clientId }, e))) {
|
|
6529
6512
|
var s = r.getIdTokenCredential(a);
|
|
6530
6513
|
s && r.credentialMatchesFilter(s, e) && i.push(s);
|
|
6531
6514
|
}
|
|
@@ -6540,7 +6523,7 @@ var Me = (
|
|
|
6540
6523
|
}, n.prototype.getAccessToken = function(e, t, r) {
|
|
6541
6524
|
var o = this;
|
|
6542
6525
|
this.commonLogger.trace("CacheManager - getAccessToken called");
|
|
6543
|
-
var i = Ee.createSearchScopes(t.scopes), a = t.authenticationScheme ||
|
|
6526
|
+
var i = Ee.createSearchScopes(t.scopes), a = t.authenticationScheme || te.BEARER, s = a && a.toLowerCase() !== te.BEARER.toLowerCase() ? H.ACCESS_TOKEN_WITH_AUTH_SCHEME : H.ACCESS_TOKEN, u = {
|
|
6544
6527
|
homeAccountId: e.homeAccountId,
|
|
6545
6528
|
environment: e.environment,
|
|
6546
6529
|
credentialType: s,
|
|
@@ -6584,7 +6567,7 @@ var Me = (
|
|
|
6584
6567
|
}, n.prototype.getRefreshToken = function(e, t, r) {
|
|
6585
6568
|
var o = this;
|
|
6586
6569
|
this.commonLogger.trace("CacheManager - getRefreshToken called");
|
|
6587
|
-
var i = t ?
|
|
6570
|
+
var i = t ? Yt : void 0, a = {
|
|
6588
6571
|
homeAccountId: e.homeAccountId,
|
|
6589
6572
|
environment: e.environment,
|
|
6590
6573
|
credentialType: H.REFRESH_TOKEN,
|
|
@@ -6616,7 +6599,7 @@ var Me = (
|
|
|
6616
6599
|
return o[0];
|
|
6617
6600
|
}, n.prototype.isAppMetadataFOCI = function(e) {
|
|
6618
6601
|
var t = this.readAppMetadataFromCache(e);
|
|
6619
|
-
return !!(t && t.familyId ===
|
|
6602
|
+
return !!(t && t.familyId === Yt);
|
|
6620
6603
|
}, n.prototype.matchHomeAccountId = function(e, t) {
|
|
6621
6604
|
return typeof e.homeAccountId == "string" && t === e.homeAccountId;
|
|
6622
6605
|
}, n.prototype.matchLocalAccountId = function(e, t) {
|
|
@@ -6651,9 +6634,9 @@ var Me = (
|
|
|
6651
6634
|
}, n.prototype.isAppMetadata = function(e) {
|
|
6652
6635
|
return e.indexOf(jn) !== -1;
|
|
6653
6636
|
}, n.prototype.isAuthorityMetadata = function(e) {
|
|
6654
|
-
return e.indexOf(
|
|
6637
|
+
return e.indexOf(Wt.CACHE_KEY) !== -1;
|
|
6655
6638
|
}, n.prototype.generateAuthorityMetadataCacheKey = function(e) {
|
|
6656
|
-
return
|
|
6639
|
+
return Wt.CACHE_KEY + "-" + this.clientId + "-" + e;
|
|
6657
6640
|
}, n.toObject = function(e, t) {
|
|
6658
6641
|
for (var r in t)
|
|
6659
6642
|
e[r] = t[r];
|
|
@@ -6784,7 +6767,7 @@ var ki = 300, no = {
|
|
|
6784
6767
|
clientSecret: g.EMPTY_STRING,
|
|
6785
6768
|
clientAssertion: void 0
|
|
6786
6769
|
}, Ii = {
|
|
6787
|
-
azureCloudInstance:
|
|
6770
|
+
azureCloudInstance: tn.None,
|
|
6788
6771
|
tenant: "" + g.DEFAULT_COMMON_TENANT
|
|
6789
6772
|
}, Si = {
|
|
6790
6773
|
application: {
|
|
@@ -6793,25 +6776,25 @@ var ki = 300, no = {
|
|
|
6793
6776
|
}
|
|
6794
6777
|
};
|
|
6795
6778
|
function Ai(n) {
|
|
6796
|
-
var e = n.authOptions, t = n.systemOptions, r = n.loggerOptions, o = n.cacheOptions, i = n.storageInterface, a = n.networkInterface, s = n.cryptoInterface, u = n.clientCredentials, p = n.libraryInfo, d = n.telemetry, f = n.serverTelemetryManager, _ = n.persistencePlugin, k = n.serializableCache, E =
|
|
6779
|
+
var e = n.authOptions, t = n.systemOptions, r = n.loggerOptions, o = n.cacheOptions, i = n.storageInterface, a = n.networkInterface, s = n.cryptoInterface, u = n.clientCredentials, p = n.libraryInfo, d = n.telemetry, f = n.serverTelemetryManager, _ = n.persistencePlugin, k = n.serializableCache, E = Z(Z({}, wi), r);
|
|
6797
6780
|
return {
|
|
6798
6781
|
authOptions: Ri(e),
|
|
6799
|
-
systemOptions:
|
|
6782
|
+
systemOptions: Z(Z({}, no), t),
|
|
6800
6783
|
loggerOptions: E,
|
|
6801
|
-
cacheOptions:
|
|
6784
|
+
cacheOptions: Z(Z({}, bi), o),
|
|
6802
6785
|
storageInterface: i || new yi(e.clientId, _n, new er(E)),
|
|
6803
6786
|
networkInterface: a || Ci,
|
|
6804
6787
|
cryptoInterface: s || _n,
|
|
6805
6788
|
clientCredentials: u || Ti,
|
|
6806
|
-
libraryInfo:
|
|
6807
|
-
telemetry:
|
|
6789
|
+
libraryInfo: Z(Z({}, Ei), p),
|
|
6790
|
+
telemetry: Z(Z({}, Si), d),
|
|
6808
6791
|
serverTelemetryManager: f || null,
|
|
6809
6792
|
persistencePlugin: _ || null,
|
|
6810
6793
|
serializableCache: k || null
|
|
6811
6794
|
};
|
|
6812
6795
|
}
|
|
6813
6796
|
function Ri(n) {
|
|
6814
|
-
return
|
|
6797
|
+
return Z({ clientCapabilities: [], azureCloudOptions: Ii, skipAuthorityMetadataCache: !1 }, n);
|
|
6815
6798
|
}
|
|
6816
6799
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
6817
6800
|
var bt = (
|
|
@@ -6832,7 +6815,7 @@ var yn = (
|
|
|
6832
6815
|
function n() {
|
|
6833
6816
|
}
|
|
6834
6817
|
return n.generateThrottlingStorageKey = function(e) {
|
|
6835
|
-
return
|
|
6818
|
+
return $t.THROTTLING_PREFIX + "." + JSON.stringify(e);
|
|
6836
6819
|
}, n.preProcess = function(e, t) {
|
|
6837
6820
|
var r, o = n.generateThrottlingStorageKey(t), i = e.getThrottlingCache(o);
|
|
6838
6821
|
if (i) {
|
|
@@ -6859,7 +6842,7 @@ var yn = (
|
|
|
6859
6842
|
return e.headers ? e.headers.hasOwnProperty(De.RETRY_AFTER) && (e.status < 200 || e.status >= 300) : !1;
|
|
6860
6843
|
}, n.calculateThrottleTime = function(e) {
|
|
6861
6844
|
var t = e <= 0 ? 0 : e, r = Date.now() / 1e3;
|
|
6862
|
-
return Math.floor(Math.min(r + (t ||
|
|
6845
|
+
return Math.floor(Math.min(r + (t || $t.DEFAULT_THROTTLE_TIME_SECONDS), r + $t.DEFAULT_MAX_THROTTLE_TIME_SECONDS) * 1e3);
|
|
6863
6846
|
}, n.removeThrottle = function(e, t, r, o) {
|
|
6864
6847
|
var i = {
|
|
6865
6848
|
clientId: t,
|
|
@@ -6952,7 +6935,7 @@ var ft = (
|
|
|
6952
6935
|
}()
|
|
6953
6936
|
);
|
|
6954
6937
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
6955
|
-
var
|
|
6938
|
+
var Xt = (
|
|
6956
6939
|
/** @class */
|
|
6957
6940
|
function() {
|
|
6958
6941
|
function n() {
|
|
@@ -6968,7 +6951,7 @@ var Zt = (
|
|
|
6968
6951
|
this.parameters.set(V.NATIVE_BROKER, encodeURIComponent("1"));
|
|
6969
6952
|
}, n.prototype.addScopes = function(e, t) {
|
|
6970
6953
|
t === void 0 && (t = !0);
|
|
6971
|
-
var r = t ? Sn(e || [],
|
|
6954
|
+
var r = t ? Sn(e || [], on) : e || [], o = new Ee(r);
|
|
6972
6955
|
this.parameters.set(V.SCOPE, encodeURIComponent(o.printScopes()));
|
|
6973
6956
|
}, n.prototype.addClientId = function(e) {
|
|
6974
6957
|
this.parameters.set(V.CLIENT_ID, encodeURIComponent(e));
|
|
@@ -6979,15 +6962,15 @@ var Zt = (
|
|
|
6979
6962
|
}, n.prototype.addIdTokenHint = function(e) {
|
|
6980
6963
|
this.parameters.set(V.ID_TOKEN_HINT, encodeURIComponent(e));
|
|
6981
6964
|
}, n.prototype.addDomainHint = function(e) {
|
|
6982
|
-
this.parameters.set(
|
|
6965
|
+
this.parameters.set(Qt.DOMAIN_HINT, encodeURIComponent(e));
|
|
6983
6966
|
}, n.prototype.addLoginHint = function(e) {
|
|
6984
|
-
this.parameters.set(
|
|
6967
|
+
this.parameters.set(Qt.LOGIN_HINT, encodeURIComponent(e));
|
|
6985
6968
|
}, n.prototype.addCcsUpn = function(e) {
|
|
6986
6969
|
this.parameters.set(De.CCS_HEADER, encodeURIComponent("UPN:" + e));
|
|
6987
6970
|
}, n.prototype.addCcsOid = function(e) {
|
|
6988
6971
|
this.parameters.set(De.CCS_HEADER, encodeURIComponent("Oid:" + e.uid + "@" + e.utid));
|
|
6989
6972
|
}, n.prototype.addSid = function(e) {
|
|
6990
|
-
this.parameters.set(
|
|
6973
|
+
this.parameters.set(Qt.SID, encodeURIComponent(e));
|
|
6991
6974
|
}, n.prototype.addClaims = function(e, t) {
|
|
6992
6975
|
var r = this.addClientCapabilitiesToClaims(e, t);
|
|
6993
6976
|
ft.validateClaims(r), this.parameters.set(V.CLAIMS, encodeURIComponent(r));
|
|
@@ -7045,7 +7028,7 @@ var Zt = (
|
|
|
7045
7028
|
} catch {
|
|
7046
7029
|
throw ie.createInvalidClaimsRequestError();
|
|
7047
7030
|
}
|
|
7048
|
-
return t && t.length > 0 && (r.hasOwnProperty(
|
|
7031
|
+
return t && t.length > 0 && (r.hasOwnProperty(St.ACCESS_TOKEN) || (r[St.ACCESS_TOKEN] = {}), r[St.ACCESS_TOKEN][St.XMS_CC] = {
|
|
7049
7032
|
values: t
|
|
7050
7033
|
}), JSON.stringify(r);
|
|
7051
7034
|
}, n.prototype.addUsername = function(e) {
|
|
@@ -7053,13 +7036,13 @@ var Zt = (
|
|
|
7053
7036
|
}, n.prototype.addPassword = function(e) {
|
|
7054
7037
|
this.parameters.set(gn.password, encodeURIComponent(e));
|
|
7055
7038
|
}, n.prototype.addPopToken = function(e) {
|
|
7056
|
-
L.isEmpty(e) || (this.parameters.set(V.TOKEN_TYPE,
|
|
7039
|
+
L.isEmpty(e) || (this.parameters.set(V.TOKEN_TYPE, te.POP), this.parameters.set(V.REQ_CNF, encodeURIComponent(e)));
|
|
7057
7040
|
}, n.prototype.addSshJwk = function(e) {
|
|
7058
|
-
L.isEmpty(e) || (this.parameters.set(V.TOKEN_TYPE,
|
|
7041
|
+
L.isEmpty(e) || (this.parameters.set(V.TOKEN_TYPE, te.SSH), this.parameters.set(V.REQ_CNF, encodeURIComponent(e)));
|
|
7059
7042
|
}, n.prototype.addServerTelemetry = function(e) {
|
|
7060
7043
|
this.parameters.set(V.X_CLIENT_CURR_TELEM, e.generateCurrentRequestHeaderValue()), this.parameters.set(V.X_CLIENT_LAST_TELEM, e.generateLastRequestHeaderValue());
|
|
7061
7044
|
}, n.prototype.addThrottling = function() {
|
|
7062
|
-
this.parameters.set(V.X_MS_LIB_CAPABILITY,
|
|
7045
|
+
this.parameters.set(V.X_MS_LIB_CAPABILITY, $t.X_MS_LIB_CAPABILITY_VALUE);
|
|
7063
7046
|
}, n.prototype.addLogoutHint = function(e) {
|
|
7064
7047
|
this.parameters.set(V.LOGOUT_HINT, encodeURIComponent(e));
|
|
7065
7048
|
}, n.prototype.createQueryString = function() {
|
|
@@ -7083,7 +7066,7 @@ var nr = (
|
|
|
7083
7066
|
switch (e.type) {
|
|
7084
7067
|
case Be.HOME_ACCOUNT_ID:
|
|
7085
7068
|
try {
|
|
7086
|
-
var r =
|
|
7069
|
+
var r = Rt(e.credential);
|
|
7087
7070
|
t[De.CCS_HEADER] = "Oid:" + r.uid + "@" + r.utid;
|
|
7088
7071
|
} catch (o) {
|
|
7089
7072
|
this.logger.verbose("Could not parse home account ID for CCS Header: " + o);
|
|
@@ -7111,7 +7094,7 @@ var nr = (
|
|
|
7111
7094
|
throw O.createEndpointDiscoveryIncompleteError("Updated authority has not completed endpoint discovery.");
|
|
7112
7095
|
this.authority = e;
|
|
7113
7096
|
}, n.prototype.createTokenQueryParameters = function(e) {
|
|
7114
|
-
var t = new
|
|
7097
|
+
var t = new Xt();
|
|
7115
7098
|
return e.tokenQueryParameters && t.addExtraQueryParameters(e.tokenQueryParameters), t.createQueryString();
|
|
7116
7099
|
}, n;
|
|
7117
7100
|
}()
|
|
@@ -7166,7 +7149,7 @@ var rr = (
|
|
|
7166
7149
|
}, n.generateClaimsHashForCacheKey = function(e) {
|
|
7167
7150
|
return (e || g.EMPTY_STRING).toLowerCase();
|
|
7168
7151
|
}, n.generateSchemeForCacheKey = function(e) {
|
|
7169
|
-
return e && e.toLowerCase() !==
|
|
7152
|
+
return e && e.toLowerCase() !== te.BEARER.toLowerCase() ? e.toLowerCase() : g.EMPTY_STRING;
|
|
7170
7153
|
}, n;
|
|
7171
7154
|
}()
|
|
7172
7155
|
);
|
|
@@ -7221,15 +7204,15 @@ var _t = (
|
|
|
7221
7204
|
var X, G, $ = new e();
|
|
7222
7205
|
$.homeAccountId = t, $.credentialType = H.ACCESS_TOKEN, $.secret = o;
|
|
7223
7206
|
var Ae = Ke.nowSeconds();
|
|
7224
|
-
if ($.cachedAt = Ae.toString(), $.expiresOn = u.toString(), $.extendedExpiresOn = p.toString(), f && ($.refreshOn = f.toString()), $.environment = r, $.clientId = i, $.realm = a, $.target = s, $.userAssertionHash = k, $.tokenType = L.isEmpty(_) ?
|
|
7207
|
+
if ($.cachedAt = Ae.toString(), $.expiresOn = u.toString(), $.extendedExpiresOn = p.toString(), f && ($.refreshOn = f.toString()), $.environment = r, $.clientId = i, $.realm = a, $.target = s, $.userAssertionHash = k, $.tokenType = L.isEmpty(_) ? te.BEARER : _, N && ($.requestedClaims = N, $.requestedClaimsHash = Q), ((X = $.tokenType) === null || X === void 0 ? void 0 : X.toLowerCase()) !== te.BEARER.toLowerCase())
|
|
7225
7208
|
switch ($.credentialType = H.ACCESS_TOKEN_WITH_AUTH_SCHEME, $.tokenType) {
|
|
7226
|
-
case
|
|
7209
|
+
case te.POP:
|
|
7227
7210
|
var xe = rt.extractTokenClaims(o, d);
|
|
7228
7211
|
if (!(!((G = xe == null ? void 0 : xe.cnf) === null || G === void 0) && G.kid))
|
|
7229
7212
|
throw O.createTokenClaimsRequiredError();
|
|
7230
7213
|
$.keyId = xe.cnf.kid;
|
|
7231
7214
|
break;
|
|
7232
|
-
case
|
|
7215
|
+
case te.SSH:
|
|
7233
7216
|
$.keyId = E;
|
|
7234
7217
|
}
|
|
7235
7218
|
return $;
|
|
@@ -7239,7 +7222,7 @@ var _t = (
|
|
|
7239
7222
|
}(rr)
|
|
7240
7223
|
);
|
|
7241
7224
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
7242
|
-
var
|
|
7225
|
+
var Pt = (
|
|
7243
7226
|
/** @class */
|
|
7244
7227
|
function(n) {
|
|
7245
7228
|
Ue(e, n);
|
|
@@ -7265,7 +7248,7 @@ var Ir = [
|
|
|
7265
7248
|
"basic_action",
|
|
7266
7249
|
"user_password_expired",
|
|
7267
7250
|
"consent_required"
|
|
7268
|
-
],
|
|
7251
|
+
], Mt = {
|
|
7269
7252
|
noTokensFoundError: {
|
|
7270
7253
|
code: "no_tokens_found",
|
|
7271
7254
|
desc: "No refresh token found in the cache. Please sign-in."
|
|
@@ -7288,14 +7271,14 @@ var Ir = [
|
|
|
7288
7271
|
});
|
|
7289
7272
|
return i || s || a;
|
|
7290
7273
|
}, e.createNoTokensFoundError = function() {
|
|
7291
|
-
return new e(
|
|
7274
|
+
return new e(Mt.noTokensFoundError.code, Mt.noTokensFoundError.desc);
|
|
7292
7275
|
}, e.createNativeAccountUnavailableError = function() {
|
|
7293
|
-
return new e(
|
|
7276
|
+
return new e(Mt.native_account_unavailable.code, Mt.native_account_unavailable.desc);
|
|
7294
7277
|
}, e;
|
|
7295
7278
|
}(D)
|
|
7296
7279
|
);
|
|
7297
7280
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
7298
|
-
var
|
|
7281
|
+
var Zt = (
|
|
7299
7282
|
/** @class */
|
|
7300
7283
|
/* @__PURE__ */ function() {
|
|
7301
7284
|
function n(e, t, r, o, i) {
|
|
@@ -7459,7 +7442,7 @@ var Gn;
|
|
|
7459
7442
|
(function(n) {
|
|
7460
7443
|
n.SW = "sw", n.UHW = "uhw";
|
|
7461
7444
|
})(Gn || (Gn = {}));
|
|
7462
|
-
var
|
|
7445
|
+
var Ut = (
|
|
7463
7446
|
/** @class */
|
|
7464
7447
|
function() {
|
|
7465
7448
|
function n(e, t) {
|
|
@@ -7511,7 +7494,7 @@ var xt = (
|
|
|
7511
7494
|
return K(this, function(f) {
|
|
7512
7495
|
switch (f.label) {
|
|
7513
7496
|
case 0:
|
|
7514
|
-
return i = r.resourceRequestMethod, a = r.resourceRequestUri, s = r.shrClaims, u = r.shrNonce, p = a ? new W(a) : void 0, d = p == null ? void 0 : p.getUrlComponents(), [4, this.cryptoUtils.signJwt(
|
|
7497
|
+
return i = r.resourceRequestMethod, a = r.resourceRequestUri, s = r.shrClaims, u = r.shrNonce, p = a ? new W(a) : void 0, d = p == null ? void 0 : p.getUrlComponents(), [4, this.cryptoUtils.signJwt(Z({ at: e, ts: Ke.nowSeconds(), m: i == null ? void 0 : i.toUpperCase(), u: d == null ? void 0 : d.HostNameAndPort, nonce: u || this.cryptoUtils.createNewGuid(), p: d == null ? void 0 : d.AbsolutePath, q: d != null && d.QueryString ? [[], d.QueryString] : void 0, client_claims: s || void 0 }, o), t, r.correlationId)];
|
|
7515
7498
|
case 1:
|
|
7516
7499
|
return [2, f.sent()];
|
|
7517
7500
|
}
|
|
@@ -7644,9 +7627,9 @@ var wn = (
|
|
|
7644
7627
|
f = _t.createAccessTokenEntity(this.homeAccountIdentifier, u, e.access_token || g.EMPTY_STRING, this.clientId, i ? i.claims.tid || g.EMPTY_STRING : t.tenant, _.printScopes(), Q, X, this.cryptoObj, G, e.token_type, a, e.key_id, o.claims, o.requestedClaimsHash);
|
|
7645
7628
|
}
|
|
7646
7629
|
var $ = null;
|
|
7647
|
-
L.isEmpty(e.refresh_token) || ($ =
|
|
7630
|
+
L.isEmpty(e.refresh_token) || ($ = Pt.createRefreshTokenEntity(this.homeAccountIdentifier, u, e.refresh_token || g.EMPTY_STRING, this.clientId, e.foci, a));
|
|
7648
7631
|
var Ae = null;
|
|
7649
|
-
return L.isEmpty(e.foci) || (Ae = Vn.createAppMetadataEntity(this.clientId, u, e.foci)), new
|
|
7632
|
+
return L.isEmpty(e.foci) || (Ae = Vn.createAppMetadataEntity(this.clientId, u, e.foci)), new Zt(d, p, f, $, Ae);
|
|
7650
7633
|
}, n.prototype.generateAccountEntity = function(e, t, r, o) {
|
|
7651
7634
|
var i = r.authorityType, a = o ? o.cloud_graph_host_name : g.EMPTY_STRING, s = o ? o.msgraph_host : g.EMPTY_STRING;
|
|
7652
7635
|
if (i === Se.Adfs)
|
|
@@ -7663,9 +7646,9 @@ var wn = (
|
|
|
7663
7646
|
case 0:
|
|
7664
7647
|
if (k = g.EMPTY_STRING, E = [], N = null, X = g.EMPTY_STRING, !r.accessToken)
|
|
7665
7648
|
return [3, 4];
|
|
7666
|
-
if (r.accessToken.tokenType !==
|
|
7649
|
+
if (r.accessToken.tokenType !== te.POP)
|
|
7667
7650
|
return [3, 2];
|
|
7668
|
-
if (G = new
|
|
7651
|
+
if (G = new Ut(e), $ = r.accessToken, Ae = $.secret, xe = $.keyId, !xe)
|
|
7669
7652
|
throw O.createKeyIdMissingError();
|
|
7670
7653
|
return [4, G.signPopToken(Ae, xe, i)];
|
|
7671
7654
|
case 1:
|
|
@@ -7675,7 +7658,7 @@ var wn = (
|
|
|
7675
7658
|
case 3:
|
|
7676
7659
|
E = Ee.fromString(r.accessToken.target).asArray(), N = new Date(Number(r.accessToken.expiresOn) * 1e3), Q = new Date(Number(r.accessToken.extendedExpiresOn) * 1e3), ce.label = 4;
|
|
7677
7660
|
case 4:
|
|
7678
|
-
return r.appMetadata && (X = r.appMetadata.familyId ===
|
|
7661
|
+
return r.appMetadata && (X = r.appMetadata.familyId === Yt ? Yt : g.EMPTY_STRING), Ve = (a == null ? void 0 : a.claims.oid) || (a == null ? void 0 : a.claims.sub) || g.EMPTY_STRING, Ct = (a == null ? void 0 : a.claims.tid) || g.EMPTY_STRING, u != null && u.spa_accountid && r.account && (r.account.nativeAccountId = u == null ? void 0 : u.spa_accountid), [2, {
|
|
7679
7662
|
authority: t.canonicalAuthority,
|
|
7680
7663
|
uniqueId: Ve,
|
|
7681
7664
|
tenantId: Ct,
|
|
@@ -7756,7 +7739,7 @@ var ro = (
|
|
|
7756
7739
|
var o = new wn(this.config.authOptions.clientId, this.cacheManager, this.cryptoUtils, this.logger, null, null), i = new W(t), a = W.getDeserializedHash(i.getHash());
|
|
7757
7740
|
if (o.validateServerAuthorizationCodeResponse(a, r, this.cryptoUtils), !a.code)
|
|
7758
7741
|
throw O.createNoAuthCodeInServerResponseError();
|
|
7759
|
-
return
|
|
7742
|
+
return Z(Z({}, a), {
|
|
7760
7743
|
// Code param is optional in ServerAuthorizationCodeResponse but required in AuthorizationCodePaylod
|
|
7761
7744
|
code: a.code
|
|
7762
7745
|
});
|
|
@@ -7804,11 +7787,11 @@ var ro = (
|
|
|
7804
7787
|
return K(this, function(k) {
|
|
7805
7788
|
switch (k.label) {
|
|
7806
7789
|
case 0:
|
|
7807
|
-
return (r = this.performanceClient) === null || r === void 0 || r.addQueueMeasurement(b.AuthClientCreateTokenRequestBody, t.correlationId), i = new
|
|
7790
|
+
return (r = this.performanceClient) === null || r === void 0 || r.addQueueMeasurement(b.AuthClientCreateTokenRequestBody, t.correlationId), i = new Xt(), i.addClientId(this.config.authOptions.clientId), this.includeRedirectUri ? i.addRedirectUri(t.redirectUri) : ft.validateRedirectUri(t.redirectUri), i.addScopes(t.scopes), i.addAuthorizationCode(t.code), i.addLibraryInfo(this.config.libraryInfo), i.addApplicationTelemetry(this.config.telemetry.application), i.addThrottling(), this.serverTelemetryManager && i.addServerTelemetry(this.serverTelemetryManager), t.codeVerifier && i.addCodeVerifier(t.codeVerifier), this.config.clientCredentials.clientSecret && i.addClientSecret(this.config.clientCredentials.clientSecret), this.config.clientCredentials.clientAssertion && (a = this.config.clientCredentials.clientAssertion, i.addClientAssertion(a.assertion), i.addClientAssertionType(a.assertionType)), i.addGrantType(fn.AUTHORIZATION_CODE_GRANT), i.addClientInfo(), t.authenticationScheme !== te.POP ? [3, 2] : (s = new Ut(this.cryptoUtils, this.performanceClient), (o = this.performanceClient) === null || o === void 0 || o.setPreQueueTime(b.PopTokenGenerateCnf, t.correlationId), [4, s.generateCnf(t)]);
|
|
7808
7791
|
case 1:
|
|
7809
7792
|
return u = k.sent(), i.addPopToken(u.reqCnfString), [3, 3];
|
|
7810
7793
|
case 2:
|
|
7811
|
-
if (t.authenticationScheme ===
|
|
7794
|
+
if (t.authenticationScheme === te.SSH)
|
|
7812
7795
|
if (t.sshJwk)
|
|
7813
7796
|
i.addSshJwk(t.sshJwk);
|
|
7814
7797
|
else
|
|
@@ -7830,7 +7813,7 @@ var ro = (
|
|
|
7830
7813
|
switch (d.type) {
|
|
7831
7814
|
case Be.HOME_ACCOUNT_ID:
|
|
7832
7815
|
try {
|
|
7833
|
-
f =
|
|
7816
|
+
f = Rt(d.credential), i.addCcsOid(f);
|
|
7834
7817
|
} catch (E) {
|
|
7835
7818
|
this.logger.verbose("Could not parse home account ID for CCS Header: " + E);
|
|
7836
7819
|
}
|
|
@@ -7850,21 +7833,21 @@ var ro = (
|
|
|
7850
7833
|
return K(this, function(_) {
|
|
7851
7834
|
switch (_.label) {
|
|
7852
7835
|
case 0:
|
|
7853
|
-
if ((r = this.performanceClient) === null || r === void 0 || r.addQueueMeasurement(b.AuthClientCreateQueryString, t.correlationId), o = new
|
|
7836
|
+
if ((r = this.performanceClient) === null || r === void 0 || r.addQueueMeasurement(b.AuthClientCreateQueryString, t.correlationId), o = new Xt(), o.addClientId(this.config.authOptions.clientId), i = Sn(t.scopes || [], t.extraScopesToConsent || []), o.addScopes(i), o.addRedirectUri(t.redirectUri), a = t.correlationId || this.config.cryptoInterface.createNewGuid(), o.addCorrelationId(a), o.addResponseMode(t.responseMode), o.addResponseTypeCode(), o.addLibraryInfo(this.config.libraryInfo), o.addApplicationTelemetry(this.config.telemetry.application), o.addClientInfo(), t.codeChallenge && t.codeChallengeMethod && o.addCodeChallengeParams(t.codeChallenge, t.codeChallengeMethod), t.prompt && o.addPrompt(t.prompt), t.domainHint && o.addDomainHint(t.domainHint), t.prompt !== Te.SELECT_ACCOUNT)
|
|
7854
7837
|
if (t.sid && t.prompt === Te.NONE)
|
|
7855
7838
|
this.logger.verbose("createAuthCodeUrlQueryString: Prompt is none, adding sid from request"), o.addSid(t.sid);
|
|
7856
7839
|
else if (t.account) {
|
|
7857
7840
|
if (s = this.extractAccountSid(t.account), u = this.extractLoginHint(t.account), u) {
|
|
7858
7841
|
this.logger.verbose("createAuthCodeUrlQueryString: login_hint claim present on account"), o.addLoginHint(u);
|
|
7859
7842
|
try {
|
|
7860
|
-
p =
|
|
7843
|
+
p = Rt(t.account.homeAccountId), o.addCcsOid(p);
|
|
7861
7844
|
} catch {
|
|
7862
7845
|
this.logger.verbose("createAuthCodeUrlQueryString: Could not parse home account ID for CCS Header");
|
|
7863
7846
|
}
|
|
7864
7847
|
} else if (s && t.prompt === Te.NONE) {
|
|
7865
7848
|
this.logger.verbose("createAuthCodeUrlQueryString: Prompt is none, adding sid from account"), o.addSid(s);
|
|
7866
7849
|
try {
|
|
7867
|
-
p =
|
|
7850
|
+
p = Rt(t.account.homeAccountId), o.addCcsOid(p);
|
|
7868
7851
|
} catch {
|
|
7869
7852
|
this.logger.verbose("createAuthCodeUrlQueryString: Could not parse home account ID for CCS Header");
|
|
7870
7853
|
}
|
|
@@ -7873,7 +7856,7 @@ var ro = (
|
|
|
7873
7856
|
else if (t.account.username) {
|
|
7874
7857
|
this.logger.verbose("createAuthCodeUrlQueryString: Adding login_hint from account"), o.addLoginHint(t.account.username);
|
|
7875
7858
|
try {
|
|
7876
|
-
p =
|
|
7859
|
+
p = Rt(t.account.homeAccountId), o.addCcsOid(p);
|
|
7877
7860
|
} catch {
|
|
7878
7861
|
this.logger.verbose("createAuthCodeUrlQueryString: Could not parse home account ID for CCS Header");
|
|
7879
7862
|
}
|
|
@@ -7882,7 +7865,7 @@ var ro = (
|
|
|
7882
7865
|
t.loginHint && (this.logger.verbose("createAuthCodeUrlQueryString: No account, adding login_hint from request"), o.addLoginHint(t.loginHint), o.addCcsUpn(t.loginHint));
|
|
7883
7866
|
else
|
|
7884
7867
|
this.logger.verbose("createAuthCodeUrlQueryString: Prompt is select_account, ignoring account hints");
|
|
7885
|
-
return t.nonce && o.addNonce(t.nonce), t.state && o.addState(t.state), (!L.isEmpty(t.claims) || this.config.authOptions.clientCapabilities && this.config.authOptions.clientCapabilities.length > 0) && o.addClaims(t.claims, this.config.authOptions.clientCapabilities), t.extraQueryParameters && o.addExtraQueryParameters(t.extraQueryParameters), t.nativeBroker ? (o.addNativeBroker(), t.authenticationScheme !==
|
|
7868
|
+
return t.nonce && o.addNonce(t.nonce), t.state && o.addState(t.state), (!L.isEmpty(t.claims) || this.config.authOptions.clientCapabilities && this.config.authOptions.clientCapabilities.length > 0) && o.addClaims(t.claims, this.config.authOptions.clientCapabilities), t.extraQueryParameters && o.addExtraQueryParameters(t.extraQueryParameters), t.nativeBroker ? (o.addNativeBroker(), t.authenticationScheme !== te.POP ? [3, 2] : (d = new Ut(this.cryptoUtils), [4, d.generateCnf(t)])) : [3, 2];
|
|
7886
7869
|
case 1:
|
|
7887
7870
|
f = _.sent(), o.addPopToken(f.reqCnfString), _.label = 2;
|
|
7888
7871
|
case 2:
|
|
@@ -7891,7 +7874,7 @@ var ro = (
|
|
|
7891
7874
|
});
|
|
7892
7875
|
});
|
|
7893
7876
|
}, e.prototype.createLogoutUrlQueryString = function(t) {
|
|
7894
|
-
var r = new
|
|
7877
|
+
var r = new Xt();
|
|
7895
7878
|
return t.postLogoutRedirectUri && r.addPostLogoutRedirectUri(t.postLogoutRedirectUri), t.correlationId && r.addCorrelationId(t.correlationId), t.idTokenHint && r.addIdTokenHint(t.idTokenHint), t.state && r.addState(t.state), t.logoutHint && r.addLogoutHint(t.logoutHint), t.extraQueryParameters && r.addExtraQueryParameters(t.extraQueryParameters), r.createQueryString();
|
|
7896
7879
|
}, e.prototype.extractAccountSid = function(t) {
|
|
7897
7880
|
var r;
|
|
@@ -7950,7 +7933,7 @@ var oo = (
|
|
|
7950
7933
|
try {
|
|
7951
7934
|
return (o = this.performanceClient) === null || o === void 0 || o.setPreQueueTime(b.RefreshTokenClientAcquireTokenWithCachedRefreshToken, t.correlationId), [2, this.acquireTokenWithCachedRefreshToken(t, !0)];
|
|
7952
7935
|
} catch (f) {
|
|
7953
|
-
if (u = f instanceof Ye && f.errorCode ===
|
|
7936
|
+
if (u = f instanceof Ye && f.errorCode === Mt.noTokensFoundError.code, p = f instanceof bt && f.errorCode === Tr.INVALID_GRANT_ERROR && f.subError === Tr.CLIENT_MISMATCH_ERROR, u || p)
|
|
7954
7937
|
return (i = this.performanceClient) === null || i === void 0 || i.setPreQueueTime(b.RefreshTokenClientAcquireTokenWithCachedRefreshToken, t.correlationId), [2, this.acquireTokenWithCachedRefreshToken(t, !1)];
|
|
7955
7938
|
throw f;
|
|
7956
7939
|
}
|
|
@@ -7966,7 +7949,7 @@ var oo = (
|
|
|
7966
7949
|
throw s == null || s.discardMeasurement(), Ye.createNoTokensFoundError();
|
|
7967
7950
|
return s == null || s.endMeasurement({
|
|
7968
7951
|
success: !0
|
|
7969
|
-
}), p =
|
|
7952
|
+
}), p = Z(Z({}, t), { refreshToken: u.secret, authenticationScheme: t.authenticationScheme || te.BEARER, ccsCredential: {
|
|
7970
7953
|
credential: t.account.homeAccountId,
|
|
7971
7954
|
type: Be.HOME_ACCOUNT_ID
|
|
7972
7955
|
} }), (a = this.performanceClient) === null || a === void 0 || a.setPreQueueTime(b.RefreshTokenClientAcquireToken, t.correlationId), [2, this.acquireToken(p)];
|
|
@@ -8010,11 +7993,11 @@ var oo = (
|
|
|
8010
7993
|
return K(this, function(k) {
|
|
8011
7994
|
switch (k.label) {
|
|
8012
7995
|
case 0:
|
|
8013
|
-
return (r = this.performanceClient) === null || r === void 0 || r.addQueueMeasurement(b.RefreshTokenClientCreateTokenRequestBody, t.correlationId), a = t.correlationId, s = (o = this.performanceClient) === null || o === void 0 ? void 0 : o.startMeasurement(b.BaseClientCreateTokenRequestHeaders, a), u = new
|
|
7996
|
+
return (r = this.performanceClient) === null || r === void 0 || r.addQueueMeasurement(b.RefreshTokenClientCreateTokenRequestBody, t.correlationId), a = t.correlationId, s = (o = this.performanceClient) === null || o === void 0 ? void 0 : o.startMeasurement(b.BaseClientCreateTokenRequestHeaders, a), u = new Xt(), u.addClientId(this.config.authOptions.clientId), u.addScopes(t.scopes), u.addGrantType(fn.REFRESH_TOKEN_GRANT), u.addClientInfo(), u.addLibraryInfo(this.config.libraryInfo), u.addApplicationTelemetry(this.config.telemetry.application), u.addThrottling(), this.serverTelemetryManager && u.addServerTelemetry(this.serverTelemetryManager), u.addCorrelationId(a), u.addRefreshToken(t.refreshToken), this.config.clientCredentials.clientSecret && u.addClientSecret(this.config.clientCredentials.clientSecret), this.config.clientCredentials.clientAssertion && (p = this.config.clientCredentials.clientAssertion, u.addClientAssertion(p.assertion), u.addClientAssertionType(p.assertionType)), t.authenticationScheme !== te.POP ? [3, 2] : (d = new Ut(this.cryptoUtils, this.performanceClient), (i = this.performanceClient) === null || i === void 0 || i.setPreQueueTime(b.PopTokenGenerateCnf, t.correlationId), [4, d.generateCnf(t)]);
|
|
8014
7997
|
case 1:
|
|
8015
7998
|
return f = k.sent(), u.addPopToken(f.reqCnfString), [3, 3];
|
|
8016
7999
|
case 2:
|
|
8017
|
-
if (t.authenticationScheme ===
|
|
8000
|
+
if (t.authenticationScheme === te.SSH)
|
|
8018
8001
|
if (t.sshJwk)
|
|
8019
8002
|
u.addSshJwk(t.sshJwk);
|
|
8020
8003
|
else
|
|
@@ -8027,7 +8010,7 @@ var oo = (
|
|
|
8027
8010
|
switch (t.ccsCredential.type) {
|
|
8028
8011
|
case Be.HOME_ACCOUNT_ID:
|
|
8029
8012
|
try {
|
|
8030
|
-
_ =
|
|
8013
|
+
_ = Rt(t.ccsCredential.credential), u.addCcsOid(_);
|
|
8031
8014
|
} catch (E) {
|
|
8032
8015
|
this.logger.verbose("Could not parse home account ID for CCS Header: " + E);
|
|
8033
8016
|
}
|
|
@@ -8129,16 +8112,16 @@ function zi(n) {
|
|
|
8129
8112
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
8130
8113
|
var io = { endpointMetadata: { "https://login.microsoftonline.com/common/": { token_endpoint: "https://login.microsoftonline.com/common/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.microsoftonline.com/common/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.microsoftonline.com/{tenantid}/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo", authorization_endpoint: "https://login.microsoftonline.com/common/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.microsoftonline.com/common/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.microsoftonline.com/common/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.microsoftonline.com/common/kerberos", tenant_region_scope: null, cloud_instance_name: "microsoftonline.com", cloud_graph_host_name: "graph.windows.net", msgraph_host: "graph.microsoft.com", rbac_url: "https://pas.windows.net" }, "https://login.chinacloudapi.cn/common/": { token_endpoint: "https://login.chinacloudapi.cn/common/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.chinacloudapi.cn/common/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.partner.microsoftonline.cn/{tenantid}/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://microsoftgraph.chinacloudapi.cn/oidc/userinfo", authorization_endpoint: "https://login.chinacloudapi.cn/common/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.chinacloudapi.cn/common/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.chinacloudapi.cn/common/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.chinacloudapi.cn/common/kerberos", tenant_region_scope: null, cloud_instance_name: "partner.microsoftonline.cn", cloud_graph_host_name: "graph.chinacloudapi.cn", msgraph_host: "microsoftgraph.chinacloudapi.cn", rbac_url: "https://pas.chinacloudapi.cn" }, "https://login.microsoftonline.us/common/": { token_endpoint: "https://login.microsoftonline.us/common/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.microsoftonline.us/common/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.microsoftonline.us/{tenantid}/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo", authorization_endpoint: "https://login.microsoftonline.us/common/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.microsoftonline.us/common/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.microsoftonline.us/common/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.microsoftonline.us/common/kerberos", tenant_region_scope: null, cloud_instance_name: "microsoftonline.us", cloud_graph_host_name: "graph.windows.net", msgraph_host: "graph.microsoft.com", rbac_url: "https://pasff.usgovcloudapi.net" }, "https://login.microsoftonline.com/consumers/": { token_endpoint: "https://login.microsoftonline.com/consumers/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.microsoftonline.com/consumers/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo", authorization_endpoint: "https://login.microsoftonline.com/consumers/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.microsoftonline.com/consumers/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.microsoftonline.com/consumers/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.microsoftonline.com/consumers/kerberos", tenant_region_scope: null, cloud_instance_name: "microsoftonline.com", cloud_graph_host_name: "graph.windows.net", msgraph_host: "graph.microsoft.com", rbac_url: "https://pas.windows.net" }, "https://login.chinacloudapi.cn/consumers/": { token_endpoint: "https://login.chinacloudapi.cn/consumers/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.chinacloudapi.cn/consumers/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.partner.microsoftonline.cn/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://microsoftgraph.chinacloudapi.cn/oidc/userinfo", authorization_endpoint: "https://login.chinacloudapi.cn/consumers/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.chinacloudapi.cn/consumers/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.chinacloudapi.cn/consumers/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.chinacloudapi.cn/consumers/kerberos", tenant_region_scope: null, cloud_instance_name: "partner.microsoftonline.cn", cloud_graph_host_name: "graph.chinacloudapi.cn", msgraph_host: "microsoftgraph.chinacloudapi.cn", rbac_url: "https://pas.chinacloudapi.cn" }, "https://login.microsoftonline.us/consumers/": { token_endpoint: "https://login.microsoftonline.us/consumers/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.microsoftonline.us/consumers/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.microsoftonline.us/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo", authorization_endpoint: "https://login.microsoftonline.us/consumers/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.microsoftonline.us/consumers/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.microsoftonline.us/consumers/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.microsoftonline.us/consumers/kerberos", tenant_region_scope: null, cloud_instance_name: "microsoftonline.us", cloud_graph_host_name: "graph.windows.net", msgraph_host: "graph.microsoft.com", rbac_url: "https://pasff.usgovcloudapi.net" }, "https://login.microsoftonline.com/organizations/": { token_endpoint: "https://login.microsoftonline.com/organizations/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.microsoftonline.com/organizations/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.microsoftonline.com/{tenantid}/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo", authorization_endpoint: "https://login.microsoftonline.com/organizations/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.microsoftonline.com/organizations/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.microsoftonline.com/organizations/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.microsoftonline.com/organizations/kerberos", tenant_region_scope: null, cloud_instance_name: "microsoftonline.com", cloud_graph_host_name: "graph.windows.net", msgraph_host: "graph.microsoft.com", rbac_url: "https://pas.windows.net" }, "https://login.chinacloudapi.cn/organizations/": { token_endpoint: "https://login.chinacloudapi.cn/organizations/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.chinacloudapi.cn/organizations/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.partner.microsoftonline.cn/{tenantid}/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://microsoftgraph.chinacloudapi.cn/oidc/userinfo", authorization_endpoint: "https://login.chinacloudapi.cn/organizations/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.chinacloudapi.cn/organizations/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.chinacloudapi.cn/organizations/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.chinacloudapi.cn/organizations/kerberos", tenant_region_scope: null, cloud_instance_name: "partner.microsoftonline.cn", cloud_graph_host_name: "graph.chinacloudapi.cn", msgraph_host: "microsoftgraph.chinacloudapi.cn", rbac_url: "https://pas.chinacloudapi.cn" }, "https://login.microsoftonline.us/organizations/": { token_endpoint: "https://login.microsoftonline.us/organizations/oauth2/v2.0/token", token_endpoint_auth_methods_supported: ["client_secret_post", "private_key_jwt", "client_secret_basic"], jwks_uri: "https://login.microsoftonline.us/organizations/discovery/v2.0/keys", response_modes_supported: ["query", "fragment", "form_post"], subject_types_supported: ["pairwise"], id_token_signing_alg_values_supported: ["RS256"], response_types_supported: ["code", "id_token", "code id_token", "id_token token"], scopes_supported: ["openid", "profile", "email", "offline_access"], issuer: "https://login.microsoftonline.us/{tenantid}/v2.0", request_uri_parameter_supported: !1, userinfo_endpoint: "https://graph.microsoft.com/oidc/userinfo", authorization_endpoint: "https://login.microsoftonline.us/organizations/oauth2/v2.0/authorize", device_authorization_endpoint: "https://login.microsoftonline.us/organizations/oauth2/v2.0/devicecode", http_logout_supported: !0, frontchannel_logout_supported: !0, end_session_endpoint: "https://login.microsoftonline.us/organizations/oauth2/v2.0/logout", claims_supported: ["sub", "iss", "cloud_instance_name", "cloud_instance_host_name", "cloud_graph_host_name", "msgraph_host", "aud", "exp", "iat", "auth_time", "acr", "nonce", "preferred_username", "name", "tid", "ver", "at_hash", "c_hash", "email"], kerberos_endpoint: "https://login.microsoftonline.us/organizations/kerberos", tenant_region_scope: null, cloud_instance_name: "microsoftonline.us", cloud_graph_host_name: "graph.windows.net", msgraph_host: "graph.microsoft.com", rbac_url: "https://pasff.usgovcloudapi.net" } }, instanceDiscoveryMetadata: { "https://login.microsoftonline.com/common/": { tenant_discovery_endpoint: "https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.chinacloudapi.cn/common/": { tenant_discovery_endpoint: "https://login.chinacloudapi.cn/common/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.microsoftonline.us/common/": { tenant_discovery_endpoint: "https://login.microsoftonline.us/common/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.microsoftonline.com/consumers/": { tenant_discovery_endpoint: "https://login.microsoftonline.com/consumers/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.chinacloudapi.cn/consumers/": { tenant_discovery_endpoint: "https://login.chinacloudapi.cn/consumers/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.microsoftonline.us/consumers/": { tenant_discovery_endpoint: "https://login.microsoftonline.us/consumers/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.microsoftonline.com/organizations/": { tenant_discovery_endpoint: "https://login.microsoftonline.com/organizations/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.chinacloudapi.cn/organizations/": { tenant_discovery_endpoint: "https://login.chinacloudapi.cn/organizations/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] }, "https://login.microsoftonline.us/organizations/": { tenant_discovery_endpoint: "https://login.microsoftonline.us/organizations/v2.0/.well-known/openid-configuration", "api-version": "1.1", metadata: [{ preferred_network: "login.microsoftonline.com", preferred_cache: "login.windows.net", aliases: ["login.microsoftonline.com", "login.windows.net", "login.microsoft.com", "sts.windows.net"] }, { preferred_network: "login.partner.microsoftonline.cn", preferred_cache: "login.partner.microsoftonline.cn", aliases: ["login.partner.microsoftonline.cn", "login.chinacloudapi.cn"] }, { preferred_network: "login.microsoftonline.de", preferred_cache: "login.microsoftonline.de", aliases: ["login.microsoftonline.de"] }, { preferred_network: "login.microsoftonline.us", preferred_cache: "login.microsoftonline.us", aliases: ["login.microsoftonline.us", "login.usgovcloudapi.net"] }, { preferred_network: "login-us.microsoftonline.com", preferred_cache: "login-us.microsoftonline.com", aliases: ["login-us.microsoftonline.com"] }] } } }, Sr = io.endpointMetadata, Ar = io.instanceDiscoveryMetadata;
|
|
8131
8114
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
8132
|
-
var
|
|
8115
|
+
var nn;
|
|
8133
8116
|
(function(n) {
|
|
8134
8117
|
n.AAD = "AAD", n.OIDC = "OIDC";
|
|
8135
|
-
})(
|
|
8118
|
+
})(nn || (nn = {}));
|
|
8136
8119
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
8137
8120
|
var Qn = (
|
|
8138
8121
|
/** @class */
|
|
8139
8122
|
function() {
|
|
8140
8123
|
function n() {
|
|
8141
|
-
this.expiresAt = Ke.nowSeconds() +
|
|
8124
|
+
this.expiresAt = Ke.nowSeconds() + Wt.REFRESH_TIME_SECONDS;
|
|
8142
8125
|
}
|
|
8143
8126
|
return n.prototype.updateCloudDiscoveryMetadata = function(e, t) {
|
|
8144
8127
|
this.aliases = e.aliases, this.preferred_cache = e.preferred_cache, this.preferred_network = e.preferred_network, this.aliasesFromNetwork = t;
|
|
@@ -8147,11 +8130,11 @@ var Qn = (
|
|
|
8147
8130
|
}, n.prototype.updateCanonicalAuthority = function(e) {
|
|
8148
8131
|
this.canonical_authority = e;
|
|
8149
8132
|
}, n.prototype.resetExpiresAt = function() {
|
|
8150
|
-
this.expiresAt = Ke.nowSeconds() +
|
|
8133
|
+
this.expiresAt = Ke.nowSeconds() + Wt.REFRESH_TIME_SECONDS;
|
|
8151
8134
|
}, n.prototype.isExpired = function() {
|
|
8152
8135
|
return this.expiresAt <= Ke.nowSeconds();
|
|
8153
8136
|
}, n.isAuthorityMetadataEntity = function(e, t) {
|
|
8154
|
-
return t ? e.indexOf(
|
|
8137
|
+
return t ? e.indexOf(Wt.CACHE_KEY) === 0 && t.hasOwnProperty("aliases") && t.hasOwnProperty("preferred_cache") && t.hasOwnProperty("preferred_network") && t.hasOwnProperty("canonical_authority") && t.hasOwnProperty("authorization_endpoint") && t.hasOwnProperty("token_endpoint") && t.hasOwnProperty("issuer") && t.hasOwnProperty("aliasesFromNetwork") && t.hasOwnProperty("endpointsFromNetwork") && t.hasOwnProperty("expiresAt") && t.hasOwnProperty("jwks_uri") : !1;
|
|
8155
8138
|
}, n;
|
|
8156
8139
|
}()
|
|
8157
8140
|
);
|
|
@@ -8183,11 +8166,11 @@ var Bi = (
|
|
|
8183
8166
|
case 1:
|
|
8184
8167
|
return _.trys.push([1, 6, , 7]), (o = this.performanceClient) === null || o === void 0 || o.setPreQueueTime(b.RegionDiscoveryGetRegionFromIMDS, this.correlationId), [4, this.getRegionFromIMDS(g.IMDS_VERSION, u)];
|
|
8185
8168
|
case 2:
|
|
8186
|
-
return p = _.sent(), p.status ===
|
|
8169
|
+
return p = _.sent(), p.status === At.httpSuccess && (s = p.body, t.region_source = dt.IMDS), p.status !== At.httpBadRequest ? [3, 5] : ((i = this.performanceClient) === null || i === void 0 || i.setPreQueueTime(b.RegionDiscoveryGetCurrentVersion, this.correlationId), [4, this.getCurrentVersion(u)]);
|
|
8187
8170
|
case 3:
|
|
8188
8171
|
return d = _.sent(), d ? ((a = this.performanceClient) === null || a === void 0 || a.setPreQueueTime(b.RegionDiscoveryGetRegionFromIMDS, this.correlationId), [4, this.getRegionFromIMDS(d, u)]) : (t.region_source = dt.FAILED_AUTO_DETECTION, [2, null]);
|
|
8189
8172
|
case 4:
|
|
8190
|
-
f = _.sent(), f.status ===
|
|
8173
|
+
f = _.sent(), f.status === At.httpSuccess && (s = f.body, t.region_source = dt.IMDS), _.label = 5;
|
|
8191
8174
|
case 5:
|
|
8192
8175
|
return [3, 7];
|
|
8193
8176
|
case 6:
|
|
@@ -8219,7 +8202,7 @@ var Bi = (
|
|
|
8219
8202
|
case 1:
|
|
8220
8203
|
return o.trys.push([1, 3, , 4]), [4, this.networkInterface.sendGetRequestAsync(g.IMDS_ENDPOINT + "?format=json", e)];
|
|
8221
8204
|
case 2:
|
|
8222
|
-
return r = o.sent(), r.status ===
|
|
8205
|
+
return r = o.sent(), r.status === At.httpBadRequest && r.body && r.body["newest-versions"] && r.body["newest-versions"].length > 0 ? [2, r.body["newest-versions"][0]] : [2, null];
|
|
8223
8206
|
case 3:
|
|
8224
8207
|
return o.sent(), [2, null];
|
|
8225
8208
|
case 4:
|
|
@@ -8238,7 +8221,7 @@ var Bi = (
|
|
|
8238
8221
|
}()
|
|
8239
8222
|
);
|
|
8240
8223
|
/*! @azure/msal-common v13.3.1 2023-10-27 */
|
|
8241
|
-
var
|
|
8224
|
+
var rn = (
|
|
8242
8225
|
/** @class */
|
|
8243
8226
|
function() {
|
|
8244
8227
|
function n(e, t, r, o, i, a, s) {
|
|
@@ -8390,7 +8373,7 @@ var on = (
|
|
|
8390
8373
|
enumerable: !1,
|
|
8391
8374
|
configurable: !0
|
|
8392
8375
|
}), n.prototype.canReplaceTenant = function(e) {
|
|
8393
|
-
return e.PathSegments.length === 1 && !n.reservedTenantDomains.has(e.PathSegments[0]) && this.getAuthorityType(e) === Se.Default && this.protocolMode ===
|
|
8376
|
+
return e.PathSegments.length === 1 && !n.reservedTenantDomains.has(e.PathSegments[0]) && this.getAuthorityType(e) === Se.Default && this.protocolMode === nn.AAD;
|
|
8394
8377
|
}, n.prototype.replaceTenant = function(e) {
|
|
8395
8378
|
return e.replace(/{tenant}|{tenantid}/g, this.tenant);
|
|
8396
8379
|
}, n.prototype.replacePath = function(e) {
|
|
@@ -8408,7 +8391,7 @@ var on = (
|
|
|
8408
8391
|
* The default open id configuration endpoint for any canonical authority.
|
|
8409
8392
|
*/
|
|
8410
8393
|
get: function() {
|
|
8411
|
-
return this.authorityType === Se.Adfs || this.authorityType === Se.Dsts || this.protocolMode ===
|
|
8394
|
+
return this.authorityType === Se.Adfs || this.authorityType === Se.Dsts || this.protocolMode === nn.OIDC ? this.canonicalAuthority + ".well-known/openid-configuration" : this.canonicalAuthority + "v2.0/.well-known/openid-configuration";
|
|
8412
8395
|
},
|
|
8413
8396
|
enumerable: !1,
|
|
8414
8397
|
configurable: !0
|
|
@@ -8499,11 +8482,11 @@ var on = (
|
|
|
8499
8482
|
return K(this, function(u) {
|
|
8500
8483
|
switch (u.label) {
|
|
8501
8484
|
case 0:
|
|
8502
|
-
return (t = this.performanceClient) === null || t === void 0 || t.addQueueMeasurement(b.AuthorityUpdateMetadataWithRegionalInformation, this.correlationId), a = (r = this.authorityOptions.azureRegionConfiguration) === null || r === void 0 ? void 0 : r.azureRegion, a ? a !== g.AZURE_REGION_AUTO_DISCOVER_FLAG ? (this.regionDiscoveryMetadata.region_outcome =
|
|
8485
|
+
return (t = this.performanceClient) === null || t === void 0 || t.addQueueMeasurement(b.AuthorityUpdateMetadataWithRegionalInformation, this.correlationId), a = (r = this.authorityOptions.azureRegionConfiguration) === null || r === void 0 ? void 0 : r.azureRegion, a ? a !== g.AZURE_REGION_AUTO_DISCOVER_FLAG ? (this.regionDiscoveryMetadata.region_outcome = Jt.CONFIGURED_NO_AUTO_DETECTION, this.regionDiscoveryMetadata.region_used = a, [2, n.replaceWithRegionalInformation(e, a)]) : ((o = this.performanceClient) === null || o === void 0 || o.setPreQueueTime(b.RegionDiscoveryDetectRegion, this.correlationId), [4, this.regionDiscovery.detectRegion((i = this.authorityOptions.azureRegionConfiguration) === null || i === void 0 ? void 0 : i.environmentRegion, this.regionDiscoveryMetadata)]) : [3, 2];
|
|
8503
8486
|
case 1:
|
|
8504
8487
|
if (s = u.sent(), s)
|
|
8505
|
-
return this.regionDiscoveryMetadata.region_outcome =
|
|
8506
|
-
this.regionDiscoveryMetadata.region_outcome =
|
|
8488
|
+
return this.regionDiscoveryMetadata.region_outcome = Jt.AUTO_DETECTION_REQUESTED_SUCCESSFUL, this.regionDiscoveryMetadata.region_used = s, [2, n.replaceWithRegionalInformation(e, s)];
|
|
8489
|
+
this.regionDiscoveryMetadata.region_outcome = Jt.AUTO_DETECTION_REQUESTED_FAILED, u.label = 2;
|
|
8507
8490
|
case 2:
|
|
8508
8491
|
return [2, e];
|
|
8509
8492
|
}
|
|
@@ -8582,7 +8565,7 @@ Error Description: ` + p.message)), [2, null];
|
|
|
8582
8565
|
return t.length > 0;
|
|
8583
8566
|
}, n.generateAuthority = function(e, t) {
|
|
8584
8567
|
var r;
|
|
8585
|
-
if (t && t.azureCloudInstance !==
|
|
8568
|
+
if (t && t.azureCloudInstance !== tn.None) {
|
|
8586
8569
|
var o = t.tenant ? t.tenant : g.DEFAULT_COMMON_TENANT;
|
|
8587
8570
|
r = t.azureCloudInstance + "/" + o + "/";
|
|
8588
8571
|
}
|
|
@@ -8613,7 +8596,7 @@ Error Description: ` + p.message)), [2, null];
|
|
|
8613
8596
|
o.validateAsUri();
|
|
8614
8597
|
var i = o.getUrlComponents(), a = t + "." + i.HostNameAndPort;
|
|
8615
8598
|
this.isPublicCloudAuthority(i.HostNameAndPort) && (a = t + "." + g.REGIONAL_AUTH_PUBLIC_CLOUD_SUFFIX);
|
|
8616
|
-
var s = W.constructAuthorityUriFromObject(
|
|
8599
|
+
var s = W.constructAuthorityUriFromObject(Z(Z({}, o.getUrlComponents()), { HostNameAndPort: a })).urlString;
|
|
8617
8600
|
return r ? s + "?" + r : s;
|
|
8618
8601
|
}, n.replaceWithRegionalInformation = function(e, t) {
|
|
8619
8602
|
return e.authorization_endpoint = n.buildRegionalAuthorityString(e.authorization_endpoint, t), e.token_endpoint = n.buildRegionalAuthorityString(e.token_endpoint, t, g.REGIONAL_AUTH_NON_MSI_QUERY_STRING), e.end_session_endpoint && (e.end_session_endpoint = n.buildRegionalAuthorityString(e.end_session_endpoint, t)), e;
|
|
@@ -8645,7 +8628,7 @@ var bn = (
|
|
|
8645
8628
|
return K(this, function(f) {
|
|
8646
8629
|
switch (f.label) {
|
|
8647
8630
|
case 0:
|
|
8648
|
-
a == null || a.addQueueMeasurement(b.AuthorityFactoryCreateDiscoveredInstance, s), u =
|
|
8631
|
+
a == null || a.addQueueMeasurement(b.AuthorityFactoryCreateDiscoveredInstance, s), u = rn.transformCIAMAuthority(e), p = n.createInstance(u, t, r, o, i, a, s), f.label = 1;
|
|
8649
8632
|
case 1:
|
|
8650
8633
|
return f.trys.push([1, 3, , 4]), a == null || a.setPreQueueTime(b.AuthorityResolveEndpointsAsync, s), [4, p.resolveEndpointsAsync()];
|
|
8651
8634
|
case 2:
|
|
@@ -8663,7 +8646,7 @@ var bn = (
|
|
|
8663
8646
|
}, n.createInstance = function(e, t, r, o, i, a, s) {
|
|
8664
8647
|
if (L.isEmpty(e))
|
|
8665
8648
|
throw ie.createUrlEmptyError();
|
|
8666
|
-
return new
|
|
8649
|
+
return new rn(e, t, r, o, i, a, s);
|
|
8667
8650
|
}, n;
|
|
8668
8651
|
}()
|
|
8669
8652
|
);
|
|
@@ -8688,7 +8671,7 @@ var Rr = (
|
|
|
8688
8671
|
}
|
|
8689
8672
|
return n.isThrottlingEntity = function(e, t) {
|
|
8690
8673
|
var r = !1;
|
|
8691
|
-
e && (r = e.indexOf(
|
|
8674
|
+
e && (r = e.indexOf($t.THROTTLING_PREFIX) === 0);
|
|
8692
8675
|
var o = !0;
|
|
8693
8676
|
return t && (o = t.hasOwnProperty("throttleTime")), r && o;
|
|
8694
8677
|
}, n;
|
|
@@ -8869,7 +8852,7 @@ var ao = (
|
|
|
8869
8852
|
};
|
|
8870
8853
|
return this.cacheEventByCorrelationId(u), {
|
|
8871
8854
|
endMeasurement: function(p) {
|
|
8872
|
-
return r.endMeasurement(
|
|
8855
|
+
return r.endMeasurement(Z(Z({}, u), p), s);
|
|
8873
8856
|
},
|
|
8874
8857
|
discardMeasurement: function() {
|
|
8875
8858
|
return r.discardMeasurements(u.correlationId);
|
|
@@ -8897,15 +8880,15 @@ var ao = (
|
|
|
8897
8880
|
if (!p)
|
|
8898
8881
|
return this.logger.trace("PerformanceClient: Performance measurement not taken", a.correlationId), null;
|
|
8899
8882
|
if (this.logger.trace("PerformanceClient: Performance measurement ended for " + e.name + ": " + p + " ms", e.correlationId), !s)
|
|
8900
|
-
return a[e.name + "DurationMs"] = Math.floor(p),
|
|
8901
|
-
var d =
|
|
8883
|
+
return a[e.name + "DurationMs"] = Math.floor(p), Z({}, a);
|
|
8884
|
+
var d = Z(Z({}, a), e), f = 0;
|
|
8902
8885
|
return (i = d.incompleteSubMeasurements) === null || i === void 0 || i.forEach(function(_) {
|
|
8903
8886
|
r.logger.trace("PerformanceClient: Incomplete submeasurement " + _.name + " found for " + e.name, d.correlationId), f++;
|
|
8904
|
-
}), d.incompleteSubMeasurements = void 0, d =
|
|
8887
|
+
}), d.incompleteSubMeasurements = void 0, d = Z(Z({}, d), { durationMs: Math.round(p), queuedTimeMs: u.totalQueueTime, queuedCount: u.totalQueueCount, queuedManuallyCompletedCount: u.manuallyCompletedCount, status: kn.Completed, incompleteSubsCount: f }), this.truncateIntegralFields(d, this.getIntFields()), this.emitEvents([d], e.correlationId), d;
|
|
8905
8888
|
}, n.prototype.addStaticFields = function(e, t) {
|
|
8906
8889
|
this.logger.trace("PerformanceClient: Updating static fields");
|
|
8907
8890
|
var r = this.eventsByCorrelationId.get(t);
|
|
8908
|
-
r ? this.eventsByCorrelationId.set(t,
|
|
8891
|
+
r ? this.eventsByCorrelationId.set(t, Z(Z({}, r), e)) : this.logger.trace("PerformanceClient: Event not found for", t);
|
|
8909
8892
|
}, n.prototype.increment = function(e, t) {
|
|
8910
8893
|
this.logger.trace("PerformanceClient: Updating counters");
|
|
8911
8894
|
var r = this.eventsByCorrelationId.get(t);
|
|
@@ -8916,7 +8899,7 @@ var ao = (
|
|
|
8916
8899
|
this.logger.trace("PerformanceClient: Event not found for", t);
|
|
8917
8900
|
}, n.prototype.cacheEventByCorrelationId = function(e) {
|
|
8918
8901
|
var t = this.eventsByCorrelationId.get(e.correlationId);
|
|
8919
|
-
t ? (this.logger.trace("PerformanceClient: Performance measurement for " + e.name + " added/updated", e.correlationId), t.incompleteSubMeasurements = t.incompleteSubMeasurements || /* @__PURE__ */ new Map(), t.incompleteSubMeasurements.set(e.eventId, { name: e.name, startTimeMs: e.startTimeMs })) : (this.logger.trace("PerformanceClient: Performance measurement for " + e.name + " started", e.correlationId), this.eventsByCorrelationId.set(e.correlationId,
|
|
8902
|
+
t ? (this.logger.trace("PerformanceClient: Performance measurement for " + e.name + " added/updated", e.correlationId), t.incompleteSubMeasurements = t.incompleteSubMeasurements || /* @__PURE__ */ new Map(), t.incompleteSubMeasurements.set(e.eventId, { name: e.name, startTimeMs: e.startTimeMs })) : (this.logger.trace("PerformanceClient: Performance measurement for " + e.name + " started", e.correlationId), this.eventsByCorrelationId.set(e.correlationId, Z({}, e)));
|
|
8920
8903
|
}, n.prototype.getQueueInfo = function(e) {
|
|
8921
8904
|
var t = this.queueMeasurements.get(e);
|
|
8922
8905
|
t || this.logger.trace("PerformanceClient: no queue measurements found for for correlationId: " + e);
|
|
@@ -9296,7 +9279,7 @@ var Qe = {
|
|
|
9296
9279
|
* Msal-browser SKU
|
|
9297
9280
|
*/
|
|
9298
9281
|
MSAL_SKU: "msal.js.browser"
|
|
9299
|
-
},
|
|
9282
|
+
}, Gt = {
|
|
9300
9283
|
CHANNEL_ID: "53ee284d-920a-4b59-9d30-a60315b26836",
|
|
9301
9284
|
PREFERRED_EXTENSION_ID: "ppnbnpeolgkicgegkbkbjmhlideopiji",
|
|
9302
9285
|
MATS_TELEMETRY: "MATS"
|
|
@@ -9320,10 +9303,10 @@ var Xe;
|
|
|
9320
9303
|
(function(n) {
|
|
9321
9304
|
n.ACCOUNT_KEYS = "msal.account.keys", n.TOKEN_KEYS = "msal.token.keys";
|
|
9322
9305
|
})(Xe || (Xe = {}));
|
|
9323
|
-
var
|
|
9306
|
+
var Nt;
|
|
9324
9307
|
(function(n) {
|
|
9325
9308
|
n.WRAPPER_SKU = "wrapper.sku", n.WRAPPER_VER = "wrapper.version";
|
|
9326
|
-
})(
|
|
9309
|
+
})(Nt || (Nt = {}));
|
|
9327
9310
|
var oe;
|
|
9328
9311
|
(function(n) {
|
|
9329
9312
|
n[n.acquireTokenRedirect = 861] = "acquireTokenRedirect", n[n.acquireTokenPopup = 862] = "acquireTokenPopup", n[n.ssoSilent = 863] = "ssoSilent", n[n.acquireTokenSilent_authCode = 864] = "acquireTokenSilent_authCode", n[n.handleRedirectPromise = 865] = "handleRedirectPromise", n[n.acquireTokenByCode = 866] = "acquireTokenByCode", n[n.acquireTokenSilent_silentFlow = 61] = "acquireTokenSilent_silentFlow", n[n.logout = 961] = "logout", n[n.logoutPopup = 962] = "logoutPopup";
|
|
@@ -9337,8 +9320,8 @@ var Nr;
|
|
|
9337
9320
|
n.Startup = "startup", n.Login = "login", n.Logout = "logout", n.AcquireToken = "acquireToken", n.SsoSilent = "ssoSilent", n.HandleRedirect = "handleRedirect", n.None = "none";
|
|
9338
9321
|
})(Nr || (Nr = {}));
|
|
9339
9322
|
var Lr = {
|
|
9340
|
-
scopes:
|
|
9341
|
-
},
|
|
9323
|
+
scopes: on
|
|
9324
|
+
}, xt = "jwk", Or;
|
|
9342
9325
|
(function(n) {
|
|
9343
9326
|
n.React = "@azure/msal-react", n.Angular = "@azure/msal-angular";
|
|
9344
9327
|
})(Or || (Or = {}));
|
|
@@ -9556,9 +9539,9 @@ var $n = (
|
|
|
9556
9539
|
t.logger.trace("BrowserCacheManager:createKeyMaps - key found matching accessToken schema with value containing accessToken credentialType field but value failed AccessTokenEntity validation, skipping."), t.logger.tracePii("BrowserCacheManager:createKeyMaps - failed accessToken validation on key: " + a);
|
|
9557
9540
|
break;
|
|
9558
9541
|
case H.REFRESH_TOKEN:
|
|
9559
|
-
if (
|
|
9542
|
+
if (Pt.isRefreshTokenEntity(u)) {
|
|
9560
9543
|
t.logger.trace("BrowserCacheManager:createKeyMaps - refreshToken found, saving key to token key map"), t.logger.tracePii("BrowserCacheManager:createKeyMaps - refreshToken with key: " + a + " found, saving key to token key map");
|
|
9561
|
-
var _ = Me.toObject(new
|
|
9544
|
+
var _ = Me.toObject(new Pt(), u), d = t.updateCredentialCacheKey(a, _);
|
|
9562
9545
|
t.addTokenKey(d, H.REFRESH_TOKEN);
|
|
9563
9546
|
return;
|
|
9564
9547
|
} else
|
|
@@ -9711,7 +9694,7 @@ var $n = (
|
|
|
9711
9694
|
if (!r)
|
|
9712
9695
|
return this.logger.trace("BrowserCacheManager.getRefreshTokenCredential: called, no cache hit"), this.removeTokenKey(t, H.REFRESH_TOKEN), null;
|
|
9713
9696
|
var o = this.validateAndParseJson(r);
|
|
9714
|
-
return !o || !
|
|
9697
|
+
return !o || !Pt.isRefreshTokenEntity(o) ? (this.logger.trace("BrowserCacheManager.getRefreshTokenCredential: called, no cache hit"), this.removeTokenKey(t, H.REFRESH_TOKEN), null) : (this.logger.trace("BrowserCacheManager.getRefreshTokenCredential: cache hit"), Me.toObject(new Pt(), o));
|
|
9715
9698
|
}, e.prototype.setRefreshTokenCredential = function(t) {
|
|
9716
9699
|
this.logger.trace("BrowserCacheManager.setRefreshTokenCredential called");
|
|
9717
9700
|
var r = t.generateCredentialKey();
|
|
@@ -9746,9 +9729,9 @@ var $n = (
|
|
|
9746
9729
|
return t.isAuthorityMetadata(o);
|
|
9747
9730
|
});
|
|
9748
9731
|
}, e.prototype.setWrapperMetadata = function(t, r) {
|
|
9749
|
-
this.internalStorage.setItem(
|
|
9732
|
+
this.internalStorage.setItem(Nt.WRAPPER_SKU, t), this.internalStorage.setItem(Nt.WRAPPER_VER, r);
|
|
9750
9733
|
}, e.prototype.getWrapperMetadata = function() {
|
|
9751
|
-
var t = this.internalStorage.getItem(
|
|
9734
|
+
var t = this.internalStorage.getItem(Nt.WRAPPER_SKU) || g.EMPTY_STRING, r = this.internalStorage.getItem(Nt.WRAPPER_VER) || g.EMPTY_STRING;
|
|
9752
9735
|
return [t, r];
|
|
9753
9736
|
}, e.prototype.setAuthorityMetadata = function(t, r) {
|
|
9754
9737
|
this.logger.trace("BrowserCacheManager.setAuthorityMetadata called"), this.internalStorage.setItem(t, JSON.stringify(r));
|
|
@@ -10040,7 +10023,7 @@ var $n = (
|
|
|
10040
10023
|
return new $n(n, t, _n, e);
|
|
10041
10024
|
};
|
|
10042
10025
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
10043
|
-
var Bn = "@azure/msal-browser",
|
|
10026
|
+
var Bn = "@azure/msal-browser", en = "2.38.3";
|
|
10044
10027
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
10045
10028
|
var Vi = (
|
|
10046
10029
|
/** @class */
|
|
@@ -10240,7 +10223,7 @@ var co = (
|
|
|
10240
10223
|
/** @class */
|
|
10241
10224
|
function() {
|
|
10242
10225
|
function n(e, t, r, o, i, a, s, u, p) {
|
|
10243
|
-
this.config = e, this.browserStorage = t, this.browserCrypto = r, this.networkClient = this.config.system.networkClient, this.eventHandler = i, this.navigationClient = a, this.nativeMessageHandler = u, this.correlationId = p || this.browserCrypto.createNewGuid(), this.logger = o.clone(Qe.MSAL_SKU,
|
|
10226
|
+
this.config = e, this.browserStorage = t, this.browserCrypto = r, this.networkClient = this.config.system.networkClient, this.eventHandler = i, this.navigationClient = a, this.nativeMessageHandler = u, this.correlationId = p || this.browserCrypto.createNewGuid(), this.logger = o.clone(Qe.MSAL_SKU, en, this.correlationId), this.performanceClient = s;
|
|
10244
10227
|
}
|
|
10245
10228
|
return n.prototype.clearCacheOnLogout = function(e) {
|
|
10246
10229
|
return T(this, void 0, void 0, function() {
|
|
@@ -10289,9 +10272,9 @@ var co = (
|
|
|
10289
10272
|
authority: r,
|
|
10290
10273
|
scopes: o
|
|
10291
10274
|
}), !i.authenticationScheme)
|
|
10292
|
-
i.authenticationScheme =
|
|
10275
|
+
i.authenticationScheme = te.BEARER, this.logger.verbose(`Authentication Scheme wasn't explicitly set in request, defaulting to "Bearer" request`);
|
|
10293
10276
|
else {
|
|
10294
|
-
if (i.authenticationScheme ===
|
|
10277
|
+
if (i.authenticationScheme === te.SSH) {
|
|
10295
10278
|
if (!e.sshJwk)
|
|
10296
10279
|
throw ie.createMissingSshJwkError();
|
|
10297
10280
|
if (!e.sshKid)
|
|
@@ -10364,7 +10347,7 @@ var co = (
|
|
|
10364
10347
|
}()
|
|
10365
10348
|
);
|
|
10366
10349
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
10367
|
-
var
|
|
10350
|
+
var Ft = (
|
|
10368
10351
|
/** @class */
|
|
10369
10352
|
function(n) {
|
|
10370
10353
|
be(e, n);
|
|
@@ -10451,7 +10434,7 @@ var jt = (
|
|
|
10451
10434
|
serverTelemetryManager: t,
|
|
10452
10435
|
libraryInfo: {
|
|
10453
10436
|
sku: Qe.MSAL_SKU,
|
|
10454
|
-
version:
|
|
10437
|
+
version: en,
|
|
10455
10438
|
cpu: g.EMPTY_STRING,
|
|
10456
10439
|
os: g.EMPTY_STRING
|
|
10457
10440
|
},
|
|
@@ -10482,7 +10465,7 @@ var jt = (
|
|
|
10482
10465
|
cloudDiscoveryMetadata: this.config.auth.cloudDiscoveryMetadata,
|
|
10483
10466
|
authorityMetadata: this.config.auth.authorityMetadata,
|
|
10484
10467
|
skipAuthorityMetadataCache: this.config.auth.skipAuthorityMetadataCache
|
|
10485
|
-
}, s = t || this.config.auth.authority, u =
|
|
10468
|
+
}, s = t || this.config.auth.authority, u = rn.generateAuthority(s, r || this.config.auth.azureCloudOptions), this.logger.verbose("Creating discovered authority with configured authority", this.correlationId), this.performanceClient.setPreQueueTime(b.AuthorityFactoryCreateDiscoveredInstance, this.correlationId), [4, bn.createDiscoveredInstance(u, this.config.system.networkClient, this.browserStorage, a, this.logger, this.performanceClient, this.correlationId).then(function(d) {
|
|
10486
10469
|
return i.endMeasurement({
|
|
10487
10470
|
success: !0
|
|
10488
10471
|
}), d;
|
|
@@ -10672,7 +10655,7 @@ var pt;
|
|
|
10672
10655
|
(function(n) {
|
|
10673
10656
|
n.USER_INTERACTION_REQUIRED = "USER_INTERACTION_REQUIRED", n.USER_CANCEL = "USER_CANCEL", n.NO_NETWORK = "NO_NETWORK", n.TRANSIENT_ERROR = "TRANSIENT_ERROR", n.PERSISTENT_ERROR = "PERSISTENT_ERROR", n.DISABLED = "DISABLED", n.ACCOUNT_UNAVAILABLE = "ACCOUNT_UNAVAILABLE";
|
|
10674
10657
|
})(pt || (pt = {}));
|
|
10675
|
-
var
|
|
10658
|
+
var Kt = {
|
|
10676
10659
|
extensionError: {
|
|
10677
10660
|
code: "ContentError"
|
|
10678
10661
|
},
|
|
@@ -10696,7 +10679,7 @@ var Gt = {
|
|
|
10696
10679
|
if (this.ext && this.ext.status && (this.ext.status === pt.PERSISTENT_ERROR || this.ext.status === pt.DISABLED))
|
|
10697
10680
|
return !0;
|
|
10698
10681
|
switch (this.errorCode) {
|
|
10699
|
-
case
|
|
10682
|
+
case Kt.extensionError.code:
|
|
10700
10683
|
return !0;
|
|
10701
10684
|
default:
|
|
10702
10685
|
return !1;
|
|
@@ -10715,9 +10698,9 @@ var Gt = {
|
|
|
10715
10698
|
}
|
|
10716
10699
|
return new e(t, r, o);
|
|
10717
10700
|
}, e.createUserSwitchError = function() {
|
|
10718
|
-
return new e(
|
|
10701
|
+
return new e(Kt.userSwitch.code, Kt.userSwitch.desc);
|
|
10719
10702
|
}, e.createTokensNotFoundInCacheError = function() {
|
|
10720
|
-
return new e(
|
|
10703
|
+
return new e(Kt.tokensNotFoundInCache.code, Kt.tokensNotFoundInCache.desc);
|
|
10721
10704
|
}, e;
|
|
10722
10705
|
}(D)
|
|
10723
10706
|
);
|
|
@@ -10786,10 +10769,10 @@ var lo = (
|
|
|
10786
10769
|
});
|
|
10787
10770
|
});
|
|
10788
10771
|
}, e;
|
|
10789
|
-
}(
|
|
10772
|
+
}(Ft)
|
|
10790
10773
|
);
|
|
10791
10774
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
10792
|
-
var
|
|
10775
|
+
var Ot = (
|
|
10793
10776
|
/** @class */
|
|
10794
10777
|
function(n) {
|
|
10795
10778
|
be(e, n);
|
|
@@ -10967,11 +10950,11 @@ var zt = (
|
|
|
10967
10950
|
return I(this, function(a) {
|
|
10968
10951
|
switch (a.label) {
|
|
10969
10952
|
case 0:
|
|
10970
|
-
if (r.tokenType !==
|
|
10953
|
+
if (r.tokenType !== te.POP)
|
|
10971
10954
|
return [3, 2];
|
|
10972
10955
|
if (t.shr)
|
|
10973
10956
|
return this.logger.trace("handleNativeServerResponse: SHR is enabled in native layer"), [2, t.shr];
|
|
10974
|
-
if (o = new
|
|
10957
|
+
if (o = new Ut(this.browserCrypto), i = {
|
|
10975
10958
|
resourceRequestMethod: r.resourceRequestMethod,
|
|
10976
10959
|
resourceRequestUri: r.resourceRequestUri,
|
|
10977
10960
|
shrClaims: r.shrClaims,
|
|
@@ -10994,7 +10977,7 @@ var zt = (
|
|
|
10994
10977
|
case 0:
|
|
10995
10978
|
return u = this.addTelemetryFromNativeResponse(t), p = t.scope ? Ee.fromString(t.scope) : Ee.fromString(r.scope), d = t.account.properties || {}, f = d.UID || o.claims.oid || o.claims.sub || g.EMPTY_STRING, _ = d.TenantId || o.claims.tid || g.EMPTY_STRING, [4, this.generatePopAccessToken(t, r)];
|
|
10996
10979
|
case 1:
|
|
10997
|
-
return k = Q.sent(), E = r.tokenType ===
|
|
10980
|
+
return k = Q.sent(), E = r.tokenType === te.POP ? te.POP : te.BEARER, N = {
|
|
10998
10981
|
authority: a,
|
|
10999
10982
|
uniqueId: f,
|
|
11000
10983
|
tenantId: _,
|
|
@@ -11019,7 +11002,7 @@ var zt = (
|
|
|
11019
11002
|
r.logger.error("Error occurred while removing account context from browser storage. " + o);
|
|
11020
11003
|
});
|
|
11021
11004
|
}, e.prototype.cacheNativeTokens = function(t, r, o, i, a, s, u, p) {
|
|
11022
|
-
var d = gt.createIdTokenEntity(o, r.authority, t.id_token || g.EMPTY_STRING, r.clientId, a.claims.tid || g.EMPTY_STRING), f = r.tokenType ===
|
|
11005
|
+
var d = gt.createIdTokenEntity(o, r.authority, t.id_token || g.EMPTY_STRING, r.clientId, a.claims.tid || g.EMPTY_STRING), f = r.tokenType === te.POP ? g.SHR_NONCE_VALIDITY : (typeof t.expires_in == "string" ? parseInt(t.expires_in, 10) : t.expires_in) || 0, _ = p + f, k = this.generateScopes(t, r), E = _t.createAccessTokenEntity(o, r.authority, s, r.clientId, a ? a.claims.tid || g.EMPTY_STRING : u, k.printScopes(), _, 0, this.browserCrypto), N = new Zt(i, d, E);
|
|
11023
11006
|
this.nativeStorageManager.saveCacheRecord(N);
|
|
11024
11007
|
}, e.prototype.addTelemetryFromNativeResponse = function(t) {
|
|
11025
11008
|
var r = this.getMATSFromResponse(t);
|
|
@@ -11064,7 +11047,7 @@ var zt = (
|
|
|
11064
11047
|
case 1:
|
|
11065
11048
|
E.sent(), E.label = 2;
|
|
11066
11049
|
case 2:
|
|
11067
|
-
return o = new W(r), o.validateAsUri(), i = t.scopes, a = br(t, ["scopes"]), s = new Ee(i || []), s.appendScopes(
|
|
11050
|
+
return o = new W(r), o.validateAsUri(), i = t.scopes, a = br(t, ["scopes"]), s = new Ee(i || []), s.appendScopes(on), u = function() {
|
|
11068
11051
|
switch (k.apiId) {
|
|
11069
11052
|
case oe.ssoSilent:
|
|
11070
11053
|
case oe.acquireTokenSilent_silentFlow:
|
|
@@ -11092,15 +11075,15 @@ var zt = (
|
|
|
11092
11075
|
correlationId: this.correlationId,
|
|
11093
11076
|
tokenType: t.authenticationScheme,
|
|
11094
11077
|
windowTitleSubstring: document.title,
|
|
11095
|
-
extraParameters: B(B(B({}, t.extraQueryParameters), t.tokenQueryParameters), { telemetry:
|
|
11078
|
+
extraParameters: B(B(B({}, t.extraQueryParameters), t.tokenQueryParameters), { telemetry: Gt.MATS_TELEMETRY }),
|
|
11096
11079
|
extendedExpiryToken: !1
|
|
11097
11080
|
// Make this configurable?
|
|
11098
|
-
}), t.authenticationScheme !==
|
|
11081
|
+
}), t.authenticationScheme !== te.POP ? [3, 4] : (d = {
|
|
11099
11082
|
resourceRequestUri: t.resourceRequestUri,
|
|
11100
11083
|
resourceRequestMethod: t.resourceRequestMethod,
|
|
11101
11084
|
shrClaims: t.shrClaims,
|
|
11102
11085
|
shrNonce: t.shrNonce
|
|
11103
|
-
}, f = new
|
|
11086
|
+
}, f = new Ut(this.browserCrypto), [4, f.generateCnf(d)]);
|
|
11104
11087
|
case 3:
|
|
11105
11088
|
_ = E.sent(), p.reqCnf = _.reqCnfString, p.keyId = _.kid, E.label = 4;
|
|
11106
11089
|
case 4:
|
|
@@ -11123,7 +11106,7 @@ var yt = (
|
|
|
11123
11106
|
var t, r = this;
|
|
11124
11107
|
return I(this, function(o) {
|
|
11125
11108
|
return this.logger.trace("NativeMessageHandler - sendMessage called."), t = {
|
|
11126
|
-
channel:
|
|
11109
|
+
channel: Gt.CHANNEL_ID,
|
|
11127
11110
|
extensionId: this.extensionId,
|
|
11128
11111
|
responseId: this.responseId++,
|
|
11129
11112
|
body: e
|
|
@@ -11140,7 +11123,7 @@ var yt = (
|
|
|
11140
11123
|
case 0:
|
|
11141
11124
|
e.trace("NativeMessageHandler - createProvider called."), a.label = 1;
|
|
11142
11125
|
case 1:
|
|
11143
|
-
return a.trys.push([1, 3, , 5]), o = new n(e, t, r,
|
|
11126
|
+
return a.trys.push([1, 3, , 5]), o = new n(e, t, r, Gt.PREFERRED_EXTENSION_ID), [4, o.sendHandshakeRequest()];
|
|
11144
11127
|
case 2:
|
|
11145
11128
|
return a.sent(), [2, o];
|
|
11146
11129
|
case 3:
|
|
@@ -11160,7 +11143,7 @@ var yt = (
|
|
|
11160
11143
|
var e, t = this;
|
|
11161
11144
|
return I(this, function(r) {
|
|
11162
11145
|
return this.logger.trace("NativeMessageHandler - sendHandshakeRequest called."), window.addEventListener("message", this.windowListener, !1), e = {
|
|
11163
|
-
channel:
|
|
11146
|
+
channel: Gt.CHANNEL_ID,
|
|
11164
11147
|
extensionId: this.extensionId,
|
|
11165
11148
|
responseId: this.responseId++,
|
|
11166
11149
|
body: {
|
|
@@ -11181,7 +11164,7 @@ var yt = (
|
|
|
11181
11164
|
}, n.prototype.onWindowMessage = function(e) {
|
|
11182
11165
|
if (this.logger.trace("NativeMessageHandler - onWindowMessage called"), e.source === window) {
|
|
11183
11166
|
var t = e.data;
|
|
11184
|
-
if (!(!t.channel || t.channel !==
|
|
11167
|
+
if (!(!t.channel || t.channel !== Gt.CHANNEL_ID) && !(t.extensionId && t.extensionId !== this.extensionId) && t.body.method === at.HandshakeRequest) {
|
|
11185
11168
|
this.logger.verbose(t.extensionId ? "Extension with id: " + t.extensionId + " not installed" : "No extension installed"), clearTimeout(this.timeoutId), this.messageChannel.port1.close(), this.messageChannel.port2.close(), window.removeEventListener("message", this.windowListener, !1);
|
|
11186
11169
|
var r = this.handshakeResolvers.get(t.responseId);
|
|
11187
11170
|
r && (this.handshakeEvent.endMeasurement({ success: !1, extensionInstalled: !1 }), r.reject(M.createNativeExtensionNotInstalledError()));
|
|
@@ -11222,8 +11205,8 @@ var yt = (
|
|
|
11222
11205
|
return t.trace("isNativeAvailable: WAM extension provider is not initialized, returning false"), !1;
|
|
11223
11206
|
if (o)
|
|
11224
11207
|
switch (o) {
|
|
11225
|
-
case
|
|
11226
|
-
case
|
|
11208
|
+
case te.BEARER:
|
|
11209
|
+
case te.POP:
|
|
11227
11210
|
return t.trace("isNativeAvailable: authenticationScheme is supported, returning true"), !0;
|
|
11228
11211
|
default:
|
|
11229
11212
|
return t.trace("isNativeAvailable: authenticationScheme is not supported, returning false"), !1;
|
|
@@ -11344,7 +11327,7 @@ var Yi = (
|
|
|
11344
11327
|
if (i = this.browserStorage.getCachedRequest(r, this.browserCrypto), this.logger.verbose("handleHash called, retrieved cached request"), a = W.getDeserializedHash(t), a.accountId) {
|
|
11345
11328
|
if (this.logger.verbose("Account id found in hash, calling WAM for token"), !this.nativeMessageHandler)
|
|
11346
11329
|
throw M.createNativeConnectionNotEstablishedError();
|
|
11347
|
-
return s = new
|
|
11330
|
+
return s = new Ot(this.config, this.browserStorage, this.browserCrypto, this.logger, this.eventHandler, this.navigationClient, oe.acquireTokenPopup, this.performanceClient, this.nativeMessageHandler, a.accountId, this.nativeStorage, i.correlationId), u = st.parseRequestState(this.browserCrypto, r).userRequestState, [2, s.acquireToken(B(B({}, i), {
|
|
11348
11331
|
state: u,
|
|
11349
11332
|
prompt: void 0
|
|
11350
11333
|
// Server should handle the prompt, ideally native broker can do this part silently
|
|
@@ -11411,7 +11394,7 @@ var Yi = (
|
|
|
11411
11394
|
var r = t || window.location.href;
|
|
11412
11395
|
return W.getAbsoluteUrl(r, de.getCurrentUri());
|
|
11413
11396
|
}, e;
|
|
11414
|
-
}(
|
|
11397
|
+
}(Ft)
|
|
11415
11398
|
);
|
|
11416
11399
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
11417
11400
|
var Wi = (
|
|
@@ -11424,7 +11407,7 @@ var Wi = (
|
|
|
11424
11407
|
}
|
|
11425
11408
|
return e.prototype.acquireToken = function(t) {
|
|
11426
11409
|
try {
|
|
11427
|
-
var r = this.generatePopupName(t.scopes ||
|
|
11410
|
+
var r = this.generatePopupName(t.scopes || on, t.authority || this.config.auth.authority), o = t.popupWindowAttributes || {};
|
|
11428
11411
|
if (this.config.system.asyncPopups)
|
|
11429
11412
|
return this.logger.verbose("asyncPopups set to true, acquiring token"), this.acquireTokenPopupAsync(t, r, o);
|
|
11430
11413
|
this.logger.verbose("asyncPopup set to false, opening popup before acquiring token");
|
|
@@ -11473,7 +11456,7 @@ var Wi = (
|
|
|
11473
11456
|
isNativeBroker: !0
|
|
11474
11457
|
}), !this.nativeMessageHandler)
|
|
11475
11458
|
throw M.createNativeConnectionNotEstablishedError();
|
|
11476
|
-
return $ = new
|
|
11459
|
+
return $ = new Ot(this.config, this.browserStorage, this.browserCrypto, this.logger, this.eventHandler, this.navigationClient, oe.acquireTokenPopup, this.performanceClient, this.nativeMessageHandler, X.accountId, this.nativeStorage, s.correlationId), Ae = st.parseRequestState(this.browserCrypto, G).userRequestState, [2, $.acquireToken(B(B({}, s), {
|
|
11477
11460
|
state: Ae,
|
|
11478
11461
|
prompt: void 0
|
|
11479
11462
|
// Server should handle the prompt, ideally native broker can do this part silently
|
|
@@ -11581,7 +11564,7 @@ var Wi = (
|
|
|
11581
11564
|
var r = t.account && t.account.homeAccountId;
|
|
11582
11565
|
return Qe.POPUP_NAME_PREFIX + "." + this.config.auth.clientId + "." + r + "." + this.correlationId;
|
|
11583
11566
|
}, e;
|
|
11584
|
-
}(
|
|
11567
|
+
}(Ft)
|
|
11585
11568
|
);
|
|
11586
11569
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
11587
11570
|
var $i = (
|
|
@@ -11615,9 +11598,9 @@ function ea(n, e) {
|
|
|
11615
11598
|
postLogoutRedirectUri: g.EMPTY_STRING,
|
|
11616
11599
|
navigateToLoginRequestUrl: !0,
|
|
11617
11600
|
clientCapabilities: [],
|
|
11618
|
-
protocolMode:
|
|
11601
|
+
protocolMode: nn.AAD,
|
|
11619
11602
|
azureCloudOptions: {
|
|
11620
|
-
azureCloudInstance:
|
|
11603
|
+
azureCloudInstance: tn.None,
|
|
11621
11604
|
tenant: g.EMPTY_STRING
|
|
11622
11605
|
},
|
|
11623
11606
|
skipAuthorityMetadataCache: !1
|
|
@@ -11804,7 +11787,7 @@ var ta = (
|
|
|
11804
11787
|
if (u = E.sent(), p = W.getDeserializedHash(u), d = this.validateAndExtractStateFromHash(p, x.Silent, o.correlationId), p.accountId) {
|
|
11805
11788
|
if (this.logger.verbose("Account id found in hash, calling WAM for token"), !this.nativeMessageHandler)
|
|
11806
11789
|
throw M.createNativeConnectionNotEstablishedError();
|
|
11807
|
-
return f = new
|
|
11790
|
+
return f = new Ot(this.config, this.browserStorage, this.browserCrypto, this.logger, this.eventHandler, this.navigationClient, this.apiId, this.performanceClient, this.nativeMessageHandler, p.accountId, this.browserStorage, this.correlationId), _ = st.parseRequestState(this.browserCrypto, d).userRequestState, [2, f.acquireToken(B(B({}, r), { state: _, prompt: r.prompt || Te.NONE })).finally(function() {
|
|
11808
11791
|
k.browserStorage.cleanRequestByState(d);
|
|
11809
11792
|
})];
|
|
11810
11793
|
}
|
|
@@ -11813,7 +11796,7 @@ var ta = (
|
|
|
11813
11796
|
});
|
|
11814
11797
|
});
|
|
11815
11798
|
}, e;
|
|
11816
|
-
}(
|
|
11799
|
+
}(Ft)
|
|
11817
11800
|
);
|
|
11818
11801
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
11819
11802
|
var na = (
|
|
@@ -11864,7 +11847,7 @@ var na = (
|
|
|
11864
11847
|
});
|
|
11865
11848
|
});
|
|
11866
11849
|
}, e;
|
|
11867
|
-
}(
|
|
11850
|
+
}(Ft)
|
|
11868
11851
|
);
|
|
11869
11852
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
11870
11853
|
var ra = (
|
|
@@ -12122,13 +12105,13 @@ var sa = (
|
|
|
12122
12105
|
}, n.prototype.exportKey = function(e) {
|
|
12123
12106
|
return T(this, void 0, void 0, function() {
|
|
12124
12107
|
return I(this, function(t) {
|
|
12125
|
-
return [2, window.crypto.subtle.exportKey(
|
|
12108
|
+
return [2, window.crypto.subtle.exportKey(xt, e)];
|
|
12126
12109
|
});
|
|
12127
12110
|
});
|
|
12128
12111
|
}, n.prototype.importKey = function(e, t, r, o) {
|
|
12129
12112
|
return T(this, void 0, void 0, function() {
|
|
12130
12113
|
return I(this, function(i) {
|
|
12131
|
-
return [2, window.crypto.subtle.importKey(
|
|
12114
|
+
return [2, window.crypto.subtle.importKey(xt, e, t, r, o)];
|
|
12132
12115
|
});
|
|
12133
12116
|
});
|
|
12134
12117
|
}, n.prototype.sign = function(e, t, r) {
|
|
@@ -12165,13 +12148,13 @@ var ca = (
|
|
|
12165
12148
|
}, n.prototype.exportKey = function(e) {
|
|
12166
12149
|
return T(this, void 0, void 0, function() {
|
|
12167
12150
|
return I(this, function(t) {
|
|
12168
|
-
return [2, window.msrCrypto.subtle.exportKey(
|
|
12151
|
+
return [2, window.msrCrypto.subtle.exportKey(xt, e)];
|
|
12169
12152
|
});
|
|
12170
12153
|
});
|
|
12171
12154
|
}, n.prototype.importKey = function(e, t, r, o) {
|
|
12172
12155
|
return T(this, void 0, void 0, function() {
|
|
12173
12156
|
return I(this, function(i) {
|
|
12174
|
-
return [2, window.msrCrypto.subtle.importKey(
|
|
12157
|
+
return [2, window.msrCrypto.subtle.importKey(xt, e, t, r, o)];
|
|
12175
12158
|
});
|
|
12176
12159
|
});
|
|
12177
12160
|
}, n.prototype.sign = function(e, t, r) {
|
|
@@ -12214,7 +12197,7 @@ var la = (
|
|
|
12214
12197
|
return T(this, void 0, void 0, function() {
|
|
12215
12198
|
return I(this, function(t) {
|
|
12216
12199
|
return [2, new Promise(function(r, o) {
|
|
12217
|
-
var i = window.msCrypto.subtle.exportKey(
|
|
12200
|
+
var i = window.msCrypto.subtle.exportKey(xt, e);
|
|
12218
12201
|
i.addEventListener("complete", function(a) {
|
|
12219
12202
|
var s = a.target.result, u = ct.utf8ArrToString(new Uint8Array(s)).replace(/\r/g, g.EMPTY_STRING).replace(/\n/g, g.EMPTY_STRING).replace(/\t/g, g.EMPTY_STRING).split(" ").join(g.EMPTY_STRING).replace("\0", g.EMPTY_STRING);
|
|
12220
12203
|
try {
|
|
@@ -12233,7 +12216,7 @@ var la = (
|
|
|
12233
12216
|
var i, a;
|
|
12234
12217
|
return I(this, function(s) {
|
|
12235
12218
|
return i = ct.getSortedObjectString(e), a = ct.stringToArrayBuffer(i), [2, new Promise(function(u, p) {
|
|
12236
|
-
var d = window.msCrypto.subtle.importKey(
|
|
12219
|
+
var d = window.msCrypto.subtle.importKey(xt, a, t, r, o);
|
|
12237
12220
|
d.addEventListener("complete", function(f) {
|
|
12238
12221
|
u(f.target.result);
|
|
12239
12222
|
}), d.addEventListener("error", function(f) {
|
|
@@ -12920,23 +12903,23 @@ var _a = (
|
|
|
12920
12903
|
var o = new rt(t.id_token, this.cryptoObj), i, a;
|
|
12921
12904
|
if (e.account) {
|
|
12922
12905
|
var s = this.loadAccount(o, e.account.environment, void 0, void 0, e.account.homeAccountId);
|
|
12923
|
-
i = new
|
|
12906
|
+
i = new Zt(s, this.loadIdToken(o, s.homeAccountId, e.account.environment, e.account.tenantId), this.loadAccessToken(e, t, s.homeAccountId, e.account.environment, e.account.tenantId, r), this.loadRefreshToken(e, t, s.homeAccountId, e.account.environment));
|
|
12924
12907
|
} else if (e.authority) {
|
|
12925
|
-
var u =
|
|
12908
|
+
var u = rn.generateAuthority(e.authority, e.azureCloudOptions), p = {
|
|
12926
12909
|
protocolMode: this.config.auth.protocolMode,
|
|
12927
12910
|
knownAuthorities: this.config.auth.knownAuthorities,
|
|
12928
12911
|
cloudDiscoveryMetadata: this.config.auth.cloudDiscoveryMetadata,
|
|
12929
12912
|
authorityMetadata: this.config.auth.authorityMetadata,
|
|
12930
12913
|
skipAuthorityMetadataCache: this.config.auth.skipAuthorityMetadataCache
|
|
12931
12914
|
};
|
|
12932
|
-
if (a = new
|
|
12915
|
+
if (a = new rn(u, this.config.system.networkClient, this.storage, p, this.logger), r.clientInfo) {
|
|
12933
12916
|
this.logger.trace("TokenCache - homeAccountId from options");
|
|
12934
12917
|
var s = this.loadAccount(o, a.hostnameAndPort, r.clientInfo, a.authorityType);
|
|
12935
|
-
i = new
|
|
12918
|
+
i = new Zt(s, this.loadIdToken(o, s.homeAccountId, a.hostnameAndPort, a.tenant), this.loadAccessToken(e, t, s.homeAccountId, a.hostnameAndPort, a.tenant, r), this.loadRefreshToken(e, t, s.homeAccountId, a.hostnameAndPort));
|
|
12936
12919
|
} else if (t.client_info) {
|
|
12937
12920
|
this.logger.trace("TokenCache - homeAccountId from response");
|
|
12938
12921
|
var s = this.loadAccount(o, a.hostnameAndPort, t.client_info, a.authorityType);
|
|
12939
|
-
i = new
|
|
12922
|
+
i = new Zt(s, this.loadIdToken(o, s.homeAccountId, a.hostnameAndPort, a.tenant), this.loadAccessToken(e, t, s.homeAccountId, a.hostnameAndPort, a.tenant, r), this.loadRefreshToken(e, t, s.homeAccountId, a.hostnameAndPort));
|
|
12940
12923
|
} else
|
|
12941
12924
|
throw M.createUnableToLoadTokenError("Please provide clientInfo in the response or options.");
|
|
12942
12925
|
} else
|
|
@@ -12969,7 +12952,7 @@ var _a = (
|
|
|
12969
12952
|
}, n.prototype.loadRefreshToken = function(e, t, r, o) {
|
|
12970
12953
|
if (!t.refresh_token)
|
|
12971
12954
|
return this.logger.verbose("TokenCache - No refresh token provided for caching"), null;
|
|
12972
|
-
var i =
|
|
12955
|
+
var i = Pt.createRefreshTokenEntity(r, o, t.refresh_token, this.config.auth.clientId);
|
|
12973
12956
|
if (this.isBrowserEnvironment)
|
|
12974
12957
|
return this.logger.verbose("TokenCache - loading refresh token"), this.storage.setRefreshTokenCredential(i), i;
|
|
12975
12958
|
throw M.createUnableToLoadTokenError("loadExternalTokens is designed to work in browser environments only.");
|
|
@@ -13056,14 +13039,14 @@ var ya = (
|
|
|
13056
13039
|
}, e.prototype.logout = function() {
|
|
13057
13040
|
return Promise.reject(M.createSilentLogoutUnsupportedError());
|
|
13058
13041
|
}, e;
|
|
13059
|
-
}(
|
|
13042
|
+
}(Ft)
|
|
13060
13043
|
);
|
|
13061
13044
|
/*! @azure/msal-browser v2.38.3 2023-10-27 */
|
|
13062
13045
|
var ka = (
|
|
13063
13046
|
/** @class */
|
|
13064
13047
|
function() {
|
|
13065
13048
|
function n(e) {
|
|
13066
|
-
this.isBrowserEnvironment = typeof window < "u", this.config = ea(e, this.isBrowserEnvironment), this.initialized = !1, this.logger = new er(this.config.system.loggerOptions, Bn,
|
|
13049
|
+
this.isBrowserEnvironment = typeof window < "u", this.config = ea(e, this.isBrowserEnvironment), this.initialized = !1, this.logger = new er(this.config.system.loggerOptions, Bn, en), this.networkClient = this.config.system.networkClient, this.navigationClient = this.config.system.navigationClient, this.redirectResponse = /* @__PURE__ */ new Map(), this.hybridAuthCodeResponses = /* @__PURE__ */ new Map(), this.performanceClient = this.isBrowserEnvironment ? new ga(this.config.auth.clientId, this.config.auth.authority, this.logger, Bn, en, this.config.telemetry.application, this.config.system.cryptoOptions) : new Fi(this.config.auth.clientId, this.config.auth.authority, this.logger, Bn, en, this.config.telemetry.application), this.browserCrypto = this.isBrowserEnvironment ? new fa(this.logger, this.performanceClient, this.config.system.cryptoOptions) : _n, this.eventHandler = new ra(this.logger, this.browserCrypto), this.browserStorage = this.isBrowserEnvironment ? new $n(this.config.auth.clientId, this.config.cache, this.browserCrypto, this.logger) : Gi(this.config.auth.clientId, this.logger);
|
|
13067
13050
|
var t = {
|
|
13068
13051
|
cacheLocation: pe.MemoryStorage,
|
|
13069
13052
|
temporaryCacheLocation: pe.MemoryStorage,
|
|
@@ -13110,7 +13093,7 @@ var ka = (
|
|
|
13110
13093
|
return T(this, void 0, void 0, function() {
|
|
13111
13094
|
var t, r, o, i, a, s, u, p, d = this;
|
|
13112
13095
|
return I(this, function(f) {
|
|
13113
|
-
return this.logger.verbose("handleRedirectPromise called"), de.blockNativeBrokerCalledBeforeInitialized(this.config.system.allowNativeBroker, this.initialized), t = this.getAllAccounts(), this.isBrowserEnvironment ? (r = e || g.EMPTY_STRING, o = this.redirectResponse.get(r), typeof o > "u" ? (this.eventHandler.emitEvent(q.HANDLE_REDIRECT_START, x.Redirect), this.logger.verbose("handleRedirectPromise has been called for the first time, storing the promise"), i = this.browserStorage.getCachedNativeRequest(), a = void 0, i && yt.isNativeAvailable(this.config, this.logger, this.nativeExtensionProvider) && this.nativeExtensionProvider && !e ? (this.logger.trace("handleRedirectPromise - acquiring token from native platform"), s = new
|
|
13096
|
+
return this.logger.verbose("handleRedirectPromise called"), de.blockNativeBrokerCalledBeforeInitialized(this.config.system.allowNativeBroker, this.initialized), t = this.getAllAccounts(), this.isBrowserEnvironment ? (r = e || g.EMPTY_STRING, o = this.redirectResponse.get(r), typeof o > "u" ? (this.eventHandler.emitEvent(q.HANDLE_REDIRECT_START, x.Redirect), this.logger.verbose("handleRedirectPromise has been called for the first time, storing the promise"), i = this.browserStorage.getCachedNativeRequest(), a = void 0, i && yt.isNativeAvailable(this.config, this.logger, this.nativeExtensionProvider) && this.nativeExtensionProvider && !e ? (this.logger.trace("handleRedirectPromise - acquiring token from native platform"), s = new Ot(this.config, this.browserStorage, this.browserCrypto, this.logger, this.eventHandler, this.navigationClient, oe.handleRedirectPromise, this.performanceClient, this.nativeExtensionProvider, i.accountId, this.nativeInternalStorage, i.correlationId), a = s.handleRedirectPromise()) : (this.logger.trace("handleRedirectPromise - acquiring token from web flow"), u = this.browserStorage.getTemporaryCache(J.CORRELATION_ID, !0) || g.EMPTY_STRING, p = this.createRedirectClient(u), a = p.handleRedirectPromise(e)), o = a.then(function(_) {
|
|
13114
13097
|
if (_) {
|
|
13115
13098
|
var k = t.length < d.getAllAccounts().length;
|
|
13116
13099
|
k ? (d.eventHandler.emitEvent(q.LOGIN_SUCCESS, x.Redirect, _), d.logger.verbose("handleRedirectResponse returned result, login success")) : (d.eventHandler.emitEvent(q.ACQUIRE_TOKEN_SUCCESS, x.Redirect, _), d.logger.verbose("handleRedirectResponse returned result, acquire token success"));
|
|
@@ -13125,7 +13108,7 @@ var ka = (
|
|
|
13125
13108
|
return T(this, void 0, void 0, function() {
|
|
13126
13109
|
var t, r, o, i, a, s = this;
|
|
13127
13110
|
return I(this, function(u) {
|
|
13128
|
-
return t = this.getRequestCorrelationId(e), this.logger.verbose("acquireTokenRedirect called", t), this.preflightBrowserEnvironmentCheck(x.Redirect), r = this.getAllAccounts().length > 0, r ? this.eventHandler.emitEvent(q.ACQUIRE_TOKEN_START, x.Redirect, e) : this.eventHandler.emitEvent(q.LOGIN_START, x.Redirect, e), this.nativeExtensionProvider && this.canUseNative(e) ? (i = new
|
|
13111
|
+
return t = this.getRequestCorrelationId(e), this.logger.verbose("acquireTokenRedirect called", t), this.preflightBrowserEnvironmentCheck(x.Redirect), r = this.getAllAccounts().length > 0, r ? this.eventHandler.emitEvent(q.ACQUIRE_TOKEN_START, x.Redirect, e) : this.eventHandler.emitEvent(q.LOGIN_START, x.Redirect, e), this.nativeExtensionProvider && this.canUseNative(e) ? (i = new Ot(this.config, this.browserStorage, this.browserCrypto, this.logger, this.eventHandler, this.navigationClient, oe.acquireTokenRedirect, this.performanceClient, this.nativeExtensionProvider, this.getNativeAccountId(e), this.nativeInternalStorage, e.correlationId), o = i.acquireTokenRedirect(e).catch(function(p) {
|
|
13129
13112
|
if (p instanceof tt && p.isFatal()) {
|
|
13130
13113
|
s.nativeExtensionProvider = void 0;
|
|
13131
13114
|
var d = s.createRedirectClient(e.correlationId);
|
|
@@ -13412,7 +13395,7 @@ var ka = (
|
|
|
13412
13395
|
return I(this, function(i) {
|
|
13413
13396
|
if (this.logger.trace("acquireTokenNative called"), !this.nativeExtensionProvider)
|
|
13414
13397
|
throw M.createNativeConnectionNotEstablishedError();
|
|
13415
|
-
return o = new
|
|
13398
|
+
return o = new Ot(this.config, this.browserStorage, this.browserCrypto, this.logger, this.eventHandler, this.navigationClient, t, this.performanceClient, this.nativeExtensionProvider, r || this.getNativeAccountId(e), this.nativeInternalStorage, e.correlationId), [2, o.acquireToken(e)];
|
|
13416
13399
|
});
|
|
13417
13400
|
});
|
|
13418
13401
|
}, n.prototype.canUseNative = function(e, t) {
|
|
@@ -13564,7 +13547,7 @@ var wa = (
|
|
|
13564
13547
|
if (p.cacheLookupPolicy === Le.AccessToken)
|
|
13565
13548
|
throw _;
|
|
13566
13549
|
return de.blockReloadInHiddenIframes(), d.eventHandler.emitEvent(q.ACQUIRE_TOKEN_NETWORK_START, x.Silent, u), d.performanceClient.setPreQueueTime(b.AcquireTokenByRefreshToken, u.correlationId), d.acquireTokenByRefreshToken(u, p).catch(function(k) {
|
|
13567
|
-
var E = k instanceof bt, N = k instanceof Ye, Q = k.errorCode ===
|
|
13550
|
+
var E = k instanceof bt, N = k instanceof Ye, Q = k.errorCode === Mt.noTokensFoundError.code, X = k.errorCode === Qe.INVALID_GRANT_ERROR;
|
|
13568
13551
|
if ((!E || !X || N || p.cacheLookupPolicy === Le.AccessTokenAndRefreshToken || p.cacheLookupPolicy === Le.RefreshToken) && p.cacheLookupPolicy !== Le.Skip && !Q)
|
|
13569
13552
|
throw k;
|
|
13570
13553
|
return d.logger.verbose("Refresh token expired/invalid or CacheLookupPolicy is set to Skip, attempting acquire token by iframe.", t.correlationId), d.performanceClient.setPreQueueTime(b.AcquireTokenBySilentIframe, u.correlationId), d.acquireTokenBySilentIframe(u);
|
|
@@ -13666,7 +13649,7 @@ const An = {
|
|
|
13666
13649
|
async microsoftLogin(n, e = {}) {
|
|
13667
13650
|
var o, i, a;
|
|
13668
13651
|
n === "sso" ? this.microsoftSSOLoad = !0 : this.microsoftLoad = !0, Object.keys(e).length || (e = ((i = (o = this.ssoCompany.sso) == null ? void 0 : o.azure) == null ? void 0 : i.sso) || {});
|
|
13669
|
-
const [t, r] = await
|
|
13652
|
+
const [t, r] = await ne(
|
|
13670
13653
|
Ca.login({
|
|
13671
13654
|
clientId: n === "sso" ? e.clientID : "9cd47053-080a-4df8-8fd8-ca4389163fde",
|
|
13672
13655
|
tenant: n === "sso" ? e.tenant : "consumers",
|
|
@@ -13680,7 +13663,7 @@ const An = {
|
|
|
13680
13663
|
if (t)
|
|
13681
13664
|
return console.log("Error: " + JSON.stringify(t)), this.microsoftLoad = !1;
|
|
13682
13665
|
if (this.referral && (r.ref = this.referral), this.display === "popup" && (r.response_type = "code"), r && (r.accessToken || r.idToken)) {
|
|
13683
|
-
const [s, u] = await
|
|
13666
|
+
const [s, u] = await ne(
|
|
13684
13667
|
Ne.microsoftSDK(r, this.$storage)
|
|
13685
13668
|
);
|
|
13686
13669
|
if (s)
|
|
@@ -13703,7 +13686,7 @@ const An = {
|
|
|
13703
13686
|
z.$emit("toggleSSOModal");
|
|
13704
13687
|
}
|
|
13705
13688
|
}
|
|
13706
|
-
},
|
|
13689
|
+
}, zt = {
|
|
13707
13690
|
getFirstBrowserLanguage() {
|
|
13708
13691
|
let n = window.navigator, e = ["language", "browserLanguage", "systemLanguage", "userLanguage"], t, r;
|
|
13709
13692
|
if (Array.isArray(n.languages)) {
|
|
@@ -13807,12 +13790,12 @@ const An = {
|
|
|
13807
13790
|
methods: {
|
|
13808
13791
|
async exchangeCode(n) {
|
|
13809
13792
|
var o, i;
|
|
13810
|
-
let [e, t] = await
|
|
13793
|
+
let [e, t] = await ne(Xn.post(n.domain + "/v1/token", new URLSearchParams({ code: n.code, client_id: n.clientID, grant_type: "authorization_code", redirect_uri: this.isNative ? "tapni://t.link/callback/okta" : location.origin + "/callback/okta", code_verifier: localStorage.getItem("pkce_code_verifier") })));
|
|
13811
13794
|
if (e)
|
|
13812
13795
|
return this.errorHandler(e);
|
|
13813
13796
|
localStorage.removeItem("pkce_code_verifier");
|
|
13814
13797
|
let r = { accessToken: (o = t.data) == null ? void 0 : o.access_token, domain: n.domain };
|
|
13815
|
-
if (this.display === "popup" && (r.response_type = "code"), [e, t] = await
|
|
13798
|
+
if (this.display === "popup" && (r.response_type = "code"), [e, t] = await ne(Ne.oktaSDK(r, this.$storage)), e)
|
|
13816
13799
|
return this.oktaLoad = !1, z.$emit("ssoEvent", { name: "setLoading", data: !1 }), this.errorHandler(e);
|
|
13817
13800
|
if (t.data.success) {
|
|
13818
13801
|
if (this.display === "popup")
|
|
@@ -13824,10 +13807,10 @@ const An = {
|
|
|
13824
13807
|
this.errorSnack(this.ssoLang[this.appLanguage].unexpected_err);
|
|
13825
13808
|
},
|
|
13826
13809
|
async oktaLogin(n) {
|
|
13827
|
-
const e =
|
|
13828
|
-
let t = btoa("domain=" + n.domain + "&client_id=" + n.clientID + "&platform=" + e + "&rand=" +
|
|
13810
|
+
const e = Vt.getPlatform() || "web";
|
|
13811
|
+
let t = btoa("domain=" + n.domain + "&client_id=" + n.clientID + "&platform=" + e + "&rand=" + zt.generateRandomString(28)), r = zt.generateRandomString(28);
|
|
13829
13812
|
localStorage.setItem("pkce_code_verifier", r);
|
|
13830
|
-
let o = await
|
|
13813
|
+
let o = await zt.pkceChallengeFromVerifier(r), i = n.domain + "/v1/authorize", a;
|
|
13831
13814
|
this.isNative ? a = "tapni://t.link/callback/okta" : a = location.origin + "/callback/okta";
|
|
13832
13815
|
let s = i + "?response_type=code&client_id=" + encodeURIComponent(n.clientID) + "&state=" + encodeURIComponent(t) + "&scope=" + encodeURIComponent("openid email profile") + "&redirect_uri=" + encodeURIComponent(a) + "&code_challenge=" + encodeURIComponent(o) + "&code_challenge_method=S256", u = this, p;
|
|
13833
13816
|
window.addEventListener("message", async (d) => {
|
|
@@ -13852,8 +13835,8 @@ Pn.byteLength = Sa;
|
|
|
13852
13835
|
Pn.toByteArray = Ra;
|
|
13853
13836
|
Pn.fromByteArray = Na;
|
|
13854
13837
|
var et = [], je = [], Ta = typeof Uint8Array < "u" ? Uint8Array : Array, Dn = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
|
|
13855
|
-
for (var
|
|
13856
|
-
et[
|
|
13838
|
+
for (var It = 0, Ia = Dn.length; It < Ia; ++It)
|
|
13839
|
+
et[It] = Dn[It], je[Dn.charCodeAt(It)] = It;
|
|
13857
13840
|
je[45] = 62;
|
|
13858
13841
|
je[95] = 63;
|
|
13859
13842
|
function go(n) {
|
|
@@ -14333,16 +14316,16 @@ ir.write = function(n, e, t, r, o, i) {
|
|
|
14333
14316
|
return C;
|
|
14334
14317
|
}
|
|
14335
14318
|
function So(h, c, l, m) {
|
|
14336
|
-
return
|
|
14319
|
+
return an(On(c, h.length - l), h, l, m);
|
|
14337
14320
|
}
|
|
14338
14321
|
function Ao(h, c, l, m) {
|
|
14339
|
-
return
|
|
14322
|
+
return an(Ho(c), h, l, m);
|
|
14340
14323
|
}
|
|
14341
14324
|
function Ro(h, c, l, m) {
|
|
14342
|
-
return
|
|
14325
|
+
return an(_r(c), h, l, m);
|
|
14343
14326
|
}
|
|
14344
14327
|
function Po(h, c, l, m) {
|
|
14345
|
-
return
|
|
14328
|
+
return an(qo(c, h.length - l), h, l, m);
|
|
14346
14329
|
}
|
|
14347
14330
|
d.prototype.write = function(c, l, m, v) {
|
|
14348
14331
|
if (l === void 0)
|
|
@@ -14498,13 +14481,13 @@ ir.write = function(n, e, t, r, o, i) {
|
|
|
14498
14481
|
}, d.prototype.readBigUInt64LE = ut(function(c) {
|
|
14499
14482
|
c = c >>> 0, Tt(c, "offset");
|
|
14500
14483
|
const l = this[c], m = this[c + 7];
|
|
14501
|
-
(l === void 0 || m === void 0) &&
|
|
14484
|
+
(l === void 0 || m === void 0) && jt(c, this.length - 8);
|
|
14502
14485
|
const v = l + this[++c] * 2 ** 8 + this[++c] * 2 ** 16 + this[++c] * 2 ** 24, w = this[++c] + this[++c] * 2 ** 8 + this[++c] * 2 ** 16 + m * 2 ** 24;
|
|
14503
14486
|
return BigInt(v) + (BigInt(w) << BigInt(32));
|
|
14504
14487
|
}), d.prototype.readBigUInt64BE = ut(function(c) {
|
|
14505
14488
|
c = c >>> 0, Tt(c, "offset");
|
|
14506
14489
|
const l = this[c], m = this[c + 7];
|
|
14507
|
-
(l === void 0 || m === void 0) &&
|
|
14490
|
+
(l === void 0 || m === void 0) && jt(c, this.length - 8);
|
|
14508
14491
|
const v = l * 2 ** 24 + this[++c] * 2 ** 16 + this[++c] * 2 ** 8 + this[++c], w = this[++c] * 2 ** 24 + this[++c] * 2 ** 16 + this[++c] * 2 ** 8 + m;
|
|
14509
14492
|
return (BigInt(v) << BigInt(32)) + BigInt(w);
|
|
14510
14493
|
}), d.prototype.readIntLE = function(c, l, m) {
|
|
@@ -14536,13 +14519,13 @@ ir.write = function(n, e, t, r, o, i) {
|
|
|
14536
14519
|
}, d.prototype.readBigInt64LE = ut(function(c) {
|
|
14537
14520
|
c = c >>> 0, Tt(c, "offset");
|
|
14538
14521
|
const l = this[c], m = this[c + 7];
|
|
14539
|
-
(l === void 0 || m === void 0) &&
|
|
14522
|
+
(l === void 0 || m === void 0) && jt(c, this.length - 8);
|
|
14540
14523
|
const v = this[c + 4] + this[c + 5] * 2 ** 8 + this[c + 6] * 2 ** 16 + (m << 24);
|
|
14541
14524
|
return (BigInt(v) << BigInt(32)) + BigInt(l + this[++c] * 2 ** 8 + this[++c] * 2 ** 16 + this[++c] * 2 ** 24);
|
|
14542
14525
|
}), d.prototype.readBigInt64BE = ut(function(c) {
|
|
14543
14526
|
c = c >>> 0, Tt(c, "offset");
|
|
14544
14527
|
const l = this[c], m = this[c + 7];
|
|
14545
|
-
(l === void 0 || m === void 0) &&
|
|
14528
|
+
(l === void 0 || m === void 0) && jt(c, this.length - 8);
|
|
14546
14529
|
const v = (l << 24) + // Overflow
|
|
14547
14530
|
this[++c] * 2 ** 16 + this[++c] * 2 ** 8 + this[++c];
|
|
14548
14531
|
return (BigInt(v) << BigInt(32)) + BigInt(this[++c] * 2 ** 24 + this[++c] * 2 ** 16 + this[++c] * 2 ** 8 + m);
|
|
@@ -14766,7 +14749,7 @@ ir.write = function(n, e, t, r, o, i) {
|
|
|
14766
14749
|
return `${h.slice(0, l)}${c}`;
|
|
14767
14750
|
}
|
|
14768
14751
|
function xo(h, c, l) {
|
|
14769
|
-
Tt(c, "offset"), (h[c] === void 0 || h[c + l] === void 0) &&
|
|
14752
|
+
Tt(c, "offset"), (h[c] === void 0 || h[c + l] === void 0) && jt(c, h.length - (l + 1));
|
|
14770
14753
|
}
|
|
14771
14754
|
function gr(h, c, l, m, v, w) {
|
|
14772
14755
|
if (h > l || h < c) {
|
|
@@ -14780,7 +14763,7 @@ ir.write = function(n, e, t, r, o, i) {
|
|
|
14780
14763
|
if (typeof h != "number")
|
|
14781
14764
|
throw new Et.ERR_INVALID_ARG_TYPE(c, "number", h);
|
|
14782
14765
|
}
|
|
14783
|
-
function
|
|
14766
|
+
function jt(h, c, l) {
|
|
14784
14767
|
throw Math.floor(h) !== h ? (Tt(h, l), new Et.ERR_OUT_OF_RANGE(l || "offset", "an integer", h)) : c < 0 ? new Et.ERR_BUFFER_OUT_OF_BOUNDS() : new Et.ERR_OUT_OF_RANGE(
|
|
14785
14768
|
l || "offset",
|
|
14786
14769
|
`>= ${l ? 1 : 0} and <= ${c}`,
|
|
@@ -14870,7 +14853,7 @@ ir.write = function(n, e, t, r, o, i) {
|
|
|
14870
14853
|
function _r(h) {
|
|
14871
14854
|
return e.toByteArray(Do(h));
|
|
14872
14855
|
}
|
|
14873
|
-
function
|
|
14856
|
+
function an(h, c, l, m) {
|
|
14874
14857
|
let v;
|
|
14875
14858
|
for (v = 0; v < m && !(v + l >= c.length || v >= h.length); ++v)
|
|
14876
14859
|
c[v + l] = h[v];
|
|
@@ -14915,8 +14898,8 @@ const La = fo.Buffer, Mn = {
|
|
|
14915
14898
|
},
|
|
14916
14899
|
methods: {
|
|
14917
14900
|
async samlLogin(n) {
|
|
14918
|
-
this.code_verifier =
|
|
14919
|
-
const e =
|
|
14901
|
+
this.code_verifier = zt.generateRandomString(28), localStorage.setItem("pkce_code_verifier", this.code_verifier), this.code_challenge = await zt.pkceChallengeFromVerifier(this.code_verifier);
|
|
14902
|
+
const e = Vt.getPlatform();
|
|
14920
14903
|
let t = La.from(`code_challenge=${this.code_challenge}&platform=${e}&redirect_uri=${location.origin + "/callback/saml"}&realm=${this.$storage.realm}`).toString("base64");
|
|
14921
14904
|
n = `${n}&RelayState=${t}`;
|
|
14922
14905
|
let r = this;
|
|
@@ -15008,7 +14991,7 @@ const La = fo.Buffer, Mn = {
|
|
|
15008
14991
|
},
|
|
15009
14992
|
async startQrCodePooling() {
|
|
15010
14993
|
this.poolingInterval = setInterval(async () => {
|
|
15011
|
-
const [n, e] = await
|
|
14994
|
+
const [n, e] = await ne(Hn.qrCodePooling({
|
|
15012
14995
|
qrToken: this.qrCodeHash
|
|
15013
14996
|
}, this.$storage));
|
|
15014
14997
|
if (n)
|
|
@@ -15079,7 +15062,7 @@ const La = fo.Buffer, Mn = {
|
|
|
15079
15062
|
// captchaToken: await this.getCaptchaToken('account_verify')
|
|
15080
15063
|
};
|
|
15081
15064
|
this.emailOrUsername.indexOf("@") !== -1 ? e.email = this.emailOrUsername : e.username = this.emailOrUsername;
|
|
15082
|
-
const [t, r] = await
|
|
15065
|
+
const [t, r] = await ne(this.login(e));
|
|
15083
15066
|
t && console.error(t), this.submitted = !1, r === !0 && (this.emailOrUsername = "", this.password = "");
|
|
15084
15067
|
},
|
|
15085
15068
|
close() {
|
|
@@ -15140,7 +15123,7 @@ const La = fo.Buffer, Mn = {
|
|
|
15140
15123
|
style: { position: "absolute", "margin-left": "-11px", padding: "8px 0", height: "100%" }
|
|
15141
15124
|
}, null, -1), ts = { key: 0 }, ns = {
|
|
15142
15125
|
key: 1,
|
|
15143
|
-
class: "button--loading button__loader"
|
|
15126
|
+
class: "button--loading-black button__loader"
|
|
15144
15127
|
}, rs = /* @__PURE__ */ y("img", {
|
|
15145
15128
|
src: "https://cdn.tapni.co/icons/g-logo.png",
|
|
15146
15129
|
style: { position: "absolute", "margin-left": "-10px", padding: "8px 0", height: "100%" }
|
|
@@ -15182,19 +15165,19 @@ const La = fo.Buffer, Mn = {
|
|
|
15182
15165
|
class: "page-login-links"
|
|
15183
15166
|
}, Is = /* @__PURE__ */ y("div", { class: "clear" }, null, -1), Ss = { class: "forgot center-text pointer small-top" }, As = /* @__PURE__ */ y("br", null, null, -1), Rs = /* @__PURE__ */ y("div", { class: "clear" }, null, -1);
|
|
15184
15167
|
function Ps(n, e, t, r, o, i) {
|
|
15185
|
-
const a =
|
|
15168
|
+
const a = Bt("router-link");
|
|
15186
15169
|
return S(), P("form", {
|
|
15187
15170
|
class: "page-login content-boxed content-boxed-padding",
|
|
15188
15171
|
onSubmit: e[13] || (e[13] = Oe((...s) => i.submit && i.submit(...s), ["prevent"])),
|
|
15189
15172
|
autocomplete: "on",
|
|
15190
|
-
style:
|
|
15173
|
+
style: Lt(t.isModal ? "max-width: 500px;" : "")
|
|
15191
15174
|
}, [
|
|
15192
15175
|
t.isModal ? (S(), P("a", {
|
|
15193
15176
|
key: 0,
|
|
15194
15177
|
onClick: e[0] || (e[0] = (...s) => i.close && i.close(...s)),
|
|
15195
15178
|
class: "color-black pull-right pointer",
|
|
15196
15179
|
style: { "margin-top": "0px", position: "absolute", right: "-20px", "text-align": "right" }
|
|
15197
|
-
}, xa)) :
|
|
15180
|
+
}, xa)) : ee("", !0),
|
|
15198
15181
|
y("h1", Ba, U(this.ssoLang[this.appLanguage].login), 1),
|
|
15199
15182
|
Da,
|
|
15200
15183
|
i.displayFormLogin ? (S(), P("span", Ha, [
|
|
@@ -15243,7 +15226,7 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15243
15226
|
y("button", $a, [
|
|
15244
15227
|
o.submitted ? (S(), P("span", Xa)) : (S(), P("span", Ja, U(n.ssoLang[n.appLanguage].login), 1))
|
|
15245
15228
|
])
|
|
15246
|
-
])) :
|
|
15229
|
+
])) : ee("", !0),
|
|
15247
15230
|
Za,
|
|
15248
15231
|
n.displayAppleLogin ? (S(), P("a", {
|
|
15249
15232
|
key: 2,
|
|
@@ -15252,7 +15235,7 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15252
15235
|
}, [
|
|
15253
15236
|
es,
|
|
15254
15237
|
n.appleLoad ? (S(), P("span", ns)) : (S(), P("span", ts, U(n.ssoLang[n.appLanguage].sign_in_with) + " Apple", 1))
|
|
15255
|
-
])) :
|
|
15238
|
+
])) : ee("", !0),
|
|
15256
15239
|
n.displayGoogleLogin ? (S(), P("a", {
|
|
15257
15240
|
key: 3,
|
|
15258
15241
|
onClick: e[6] || (e[6] = (...s) => n.googleLogin && n.googleLogin(...s)),
|
|
@@ -15260,7 +15243,7 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15260
15243
|
}, [
|
|
15261
15244
|
rs,
|
|
15262
15245
|
n.googleLoad ? (S(), P("span", is)) : (S(), P("span", os, U(n.ssoLang[n.appLanguage].sign_in_with) + " Google", 1))
|
|
15263
|
-
])) :
|
|
15246
|
+
])) : ee("", !0),
|
|
15264
15247
|
n.displayFacebookLogin ? (S(), P("a", {
|
|
15265
15248
|
key: 4,
|
|
15266
15249
|
onClick: e[7] || (e[7] = (...s) => n.facebookLogin && n.facebookLogin(...s)),
|
|
@@ -15268,8 +15251,8 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15268
15251
|
}, [
|
|
15269
15252
|
as,
|
|
15270
15253
|
n.facebookLoad ? (S(), P("span", cs)) : (S(), P("span", ss, U(n.ssoLang[n.appLanguage].sign_in_with) + " Facebook", 1))
|
|
15271
|
-
])) :
|
|
15272
|
-
n.displayMicrosoftSSOLogin ?
|
|
15254
|
+
])) : ee("", !0),
|
|
15255
|
+
n.displayMicrosoftSSOLogin ? ee("", !0) : (S(), P("a", {
|
|
15273
15256
|
key: 5,
|
|
15274
15257
|
onClick: e[8] || (e[8] = (...s) => n.microsoftLogin && n.microsoftLogin(...s)),
|
|
15275
15258
|
class: "button-center button button-90 google-button pointer"
|
|
@@ -15277,7 +15260,7 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15277
15260
|
ls,
|
|
15278
15261
|
n.microsoftLoad ? (S(), P("span", ds)) : (S(), P("span", us, U(n.ssoLang[n.appLanguage].sign_in_with) + " Outlook", 1))
|
|
15279
15262
|
])),
|
|
15280
|
-
n.displayMicrosoftSSOLogin ?
|
|
15263
|
+
n.displayMicrosoftSSOLogin ? ee("", !0) : (S(), P("a", {
|
|
15281
15264
|
key: 6,
|
|
15282
15265
|
onClick: e[9] || (e[9] = (...s) => n.ssoLogin && n.ssoLogin(...s)),
|
|
15283
15266
|
class: "button-center button button-90 google-button pointer"
|
|
@@ -15292,8 +15275,8 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15292
15275
|
}, [
|
|
15293
15276
|
fs,
|
|
15294
15277
|
n.microsoftSSOLoad ? (S(), P("span", gs, U(n.ssoLang[n.appLanguage].sign_in_with) + " SSO", 1)) : (S(), P("span", _s))
|
|
15295
|
-
])) :
|
|
15296
|
-
i.displayFormLogin ?
|
|
15278
|
+
])) : ee("", !0),
|
|
15279
|
+
i.displayFormLogin ? ee("", !0) : (S(), P("a", {
|
|
15297
15280
|
key: 8,
|
|
15298
15281
|
onClick: e[11] || (e[11] = (s) => o.emailLogin = !0),
|
|
15299
15282
|
class: "button-center button button-90 google-button pointer"
|
|
@@ -15331,7 +15314,7 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15331
15314
|
se(U(n.ssoLang[n.appLanguage].create_account), 1)
|
|
15332
15315
|
]),
|
|
15333
15316
|
_: 1
|
|
15334
|
-
})) :
|
|
15317
|
+
})) : ee("", !0),
|
|
15335
15318
|
i.displayResetPasswordLogin ? (S(), qe(a, {
|
|
15336
15319
|
key: 1,
|
|
15337
15320
|
class: "create float-left",
|
|
@@ -15341,7 +15324,7 @@ function Ps(n, e, t, r, o, i) {
|
|
|
15341
15324
|
se(U(n.ssoLang[n.appLanguage].reset_password), 1)
|
|
15342
15325
|
]),
|
|
15343
15326
|
_: 1
|
|
15344
|
-
})) :
|
|
15327
|
+
})) : ee("", !0),
|
|
15345
15328
|
Is
|
|
15346
15329
|
]))
|
|
15347
15330
|
], 36);
|
|
@@ -15459,19 +15442,19 @@ const _o = /* @__PURE__ */ We(za, [["render", Ps]]), Ms = {
|
|
|
15459
15442
|
style: { position: "absolute", "margin-left": "-11px", padding: "8px 0", height: "100%" }
|
|
15460
15443
|
}, null, -1), rc = { key: 0 }, oc = {
|
|
15461
15444
|
key: 1,
|
|
15462
|
-
class: "button--loading button__loader"
|
|
15445
|
+
class: "button--loading-black button__loader"
|
|
15463
15446
|
}, ic = /* @__PURE__ */ y("img", {
|
|
15464
15447
|
src: "https://cdn.tapni.co/icons/g-logo.png",
|
|
15465
15448
|
style: { position: "absolute", "margin-left": "-9px", padding: "8px 0", height: "100%" }
|
|
15466
15449
|
}, null, -1), ac = { key: 0 }, sc = {
|
|
15467
15450
|
key: 1,
|
|
15468
|
-
class: "button--loading button__loader"
|
|
15451
|
+
class: "button--loading-black button__loader"
|
|
15469
15452
|
}, cc = /* @__PURE__ */ y("img", {
|
|
15470
15453
|
src: "https://cdn.tapni.co/icons/facebook-blue.png",
|
|
15471
15454
|
style: { position: "absolute", "margin-left": "-10px", padding: "10px 0", height: "100%" }
|
|
15472
15455
|
}, null, -1), lc = { key: 0 }, uc = {
|
|
15473
15456
|
key: 1,
|
|
15474
|
-
class: "button--loading button__loader"
|
|
15457
|
+
class: "button--loading-black button__loader"
|
|
15475
15458
|
}, dc = /* @__PURE__ */ y("img", {
|
|
15476
15459
|
src: "https://cdn.tapni.co/icons/mail.png",
|
|
15477
15460
|
style: { position: "absolute", "margin-left": "-8px", padding: "12px 0", height: "100%" }
|
|
@@ -15483,25 +15466,25 @@ const _o = /* @__PURE__ */ We(za, [["render", Ps]]), Ms = {
|
|
|
15483
15466
|
class: "page-login-links"
|
|
15484
15467
|
}, yc = /* @__PURE__ */ y("div", { class: "clear" }, null, -1), kc = { class: "forgot center-text pointer small-top" }, wc = /* @__PURE__ */ y("br", null, null, -1), bc = /* @__PURE__ */ y("div", { class: "clear" }, null, -1);
|
|
15485
15468
|
function Cc(n, e, t, r, o, i) {
|
|
15486
|
-
const a =
|
|
15469
|
+
const a = Bt("router-link");
|
|
15487
15470
|
return S(), P("form", {
|
|
15488
15471
|
class: "page-login content-boxed content-boxed-padding",
|
|
15489
15472
|
onSubmit: e[12] || (e[12] = Oe((...s) => i.submit && i.submit(...s), ["prevent"])),
|
|
15490
15473
|
autocomplete: "on",
|
|
15491
|
-
style:
|
|
15474
|
+
style: Lt(t.isModal ? "max-width: 500px;" : "")
|
|
15492
15475
|
}, [
|
|
15493
15476
|
t.isModal ? (S(), P("a", {
|
|
15494
15477
|
key: 0,
|
|
15495
15478
|
onClick: e[0] || (e[0] = (...s) => i.close && i.close(...s)),
|
|
15496
15479
|
class: "color-black pull-right pointer",
|
|
15497
15480
|
style: { "margin-top": "0px", position: "absolute", right: "-20px", "text-align": "right" }
|
|
15498
|
-
}, Ls)) :
|
|
15481
|
+
}, Ls)) : ee("", !0),
|
|
15499
15482
|
y("h1", Os, U(n.ssoLang[this.appLanguage].register), 1),
|
|
15500
15483
|
y("p", zs, [
|
|
15501
15484
|
o.usernameRegister ? (S(), P("span", Us, [
|
|
15502
15485
|
se(" t.link/" + U(o.username) + " " + U(n.ssoLang[this.appLanguage].username_is_free) + " ✅ ", 1),
|
|
15503
15486
|
xs
|
|
15504
|
-
])) :
|
|
15487
|
+
])) : ee("", !0)
|
|
15505
15488
|
]),
|
|
15506
15489
|
o.emailLogin ? (S(), P("span", Bs, [
|
|
15507
15490
|
y("div", Ds, [
|
|
@@ -15566,7 +15549,7 @@ function Cc(n, e, t, r, o, i) {
|
|
|
15566
15549
|
y("button", Xs, [
|
|
15567
15550
|
o.submitted ? (S(), P("span", ec)) : (S(), P("span", Zs, U(o.formButtonText), 1))
|
|
15568
15551
|
])
|
|
15569
|
-
])) :
|
|
15552
|
+
])) : ee("", !0),
|
|
15570
15553
|
tc,
|
|
15571
15554
|
n.displayAppleLogin ? (S(), P("a", {
|
|
15572
15555
|
key: 2,
|
|
@@ -15575,7 +15558,7 @@ function Cc(n, e, t, r, o, i) {
|
|
|
15575
15558
|
}, [
|
|
15576
15559
|
nc,
|
|
15577
15560
|
n.appleLoad ? (S(), P("span", oc)) : (S(), P("span", rc, U(n.ssoLang[this.appLanguage].sign_up_with) + " Apple", 1))
|
|
15578
|
-
])) :
|
|
15561
|
+
])) : ee("", !0),
|
|
15579
15562
|
y("a", {
|
|
15580
15563
|
onClick: e[8] || (e[8] = (...s) => n.googleLogin && n.googleLogin(...s)),
|
|
15581
15564
|
class: "button-center button button-90 google-button pointer"
|
|
@@ -15590,8 +15573,8 @@ function Cc(n, e, t, r, o, i) {
|
|
|
15590
15573
|
}, [
|
|
15591
15574
|
cc,
|
|
15592
15575
|
n.facebookLoad ? (S(), P("span", uc)) : (S(), P("span", lc, U(n.ssoLang[this.appLanguage].sign_up_with) + " Facebook", 1))
|
|
15593
|
-
])) :
|
|
15594
|
-
o.emailLogin ?
|
|
15576
|
+
])) : ee("", !0),
|
|
15577
|
+
o.emailLogin ? ee("", !0) : (S(), P("a", {
|
|
15595
15578
|
key: 4,
|
|
15596
15579
|
onClick: e[10] || (e[10] = (s) => o.emailLogin = !0),
|
|
15597
15580
|
class: "button-center button button-90 google-button pointer"
|
|
@@ -15705,7 +15688,7 @@ const vo = /* @__PURE__ */ We(Ms, [["render", Cc]]), Ec = {
|
|
|
15705
15688
|
deep: !0
|
|
15706
15689
|
}
|
|
15707
15690
|
}
|
|
15708
|
-
}, Ge = (n) => (
|
|
15691
|
+
}, Ge = (n) => (Dt("data-v-75db7f02"), n = n(), Ht(), n), Tc = /* @__PURE__ */ Ge(() => /* @__PURE__ */ y("i", { class: "font-17 color-black" }, [
|
|
15709
15692
|
/* @__PURE__ */ y("img", {
|
|
15710
15693
|
src: "https://cdn.tapni.co/icons/down-arrow.png",
|
|
15711
15694
|
class: "responsive-image",
|
|
@@ -15742,18 +15725,18 @@ const vo = /* @__PURE__ */ We(Ms, [["render", Cc]]), Ec = {
|
|
|
15742
15725
|
class: "page-login-links"
|
|
15743
15726
|
}, Vc = /* @__PURE__ */ Ge(() => /* @__PURE__ */ y("div", { class: "clear" }, null, -1)), Qc = { class: "forgot center-text pointer small-top" }, Yc = /* @__PURE__ */ Ge(() => /* @__PURE__ */ y("br", null, null, -1)), Wc = /* @__PURE__ */ Ge(() => /* @__PURE__ */ y("div", { class: "clear" }, null, -1));
|
|
15744
15727
|
function $c(n, e, t, r, o, i) {
|
|
15745
|
-
const a =
|
|
15728
|
+
const a = Bt("router-link");
|
|
15746
15729
|
return S(), P("form", {
|
|
15747
15730
|
class: "page-login content-boxed content-boxed-padding",
|
|
15748
15731
|
onSubmit: e[6] || (e[6] = Oe((...s) => i.submit && i.submit(...s), ["prevent"])),
|
|
15749
|
-
style:
|
|
15732
|
+
style: Lt(t.isModal ? "max-width: 500px;" : "")
|
|
15750
15733
|
}, [
|
|
15751
15734
|
t.isModal ? (S(), P("a", {
|
|
15752
15735
|
key: 0,
|
|
15753
15736
|
onClick: e[0] || (e[0] = (...s) => i.close && i.close(...s)),
|
|
15754
15737
|
class: "color-black pull-right pointer",
|
|
15755
15738
|
style: { "margin-top": "0px", position: "absolute", right: "-20px", "text-align": "right" }
|
|
15756
|
-
}, Ic)) :
|
|
15739
|
+
}, Ic)) : ee("", !0),
|
|
15757
15740
|
y("h1", Sc, U(n.ssoLang[this.appLanguage].verify_account), 1),
|
|
15758
15741
|
Ac,
|
|
15759
15742
|
y("div", Rc, [
|
|
@@ -15885,10 +15868,10 @@ const yo = /* @__PURE__ */ We(Ec, [["render", $c], ["__scopeId", "data-v-75db7f0
|
|
|
15885
15868
|
this.$storage.verifyEmail = n;
|
|
15886
15869
|
}
|
|
15887
15870
|
}
|
|
15888
|
-
}, lt = (n) => (
|
|
15871
|
+
}, lt = (n) => (Dt("data-v-61e353a6"), n = n(), Ht(), n), Xc = {
|
|
15889
15872
|
class: "bold no-bottom center-text",
|
|
15890
15873
|
style: { "margin-top": "63px" }
|
|
15891
|
-
}, Zc = /* @__PURE__ */ lt(() => /* @__PURE__ */ y("p", { class: "half-bottom small-top center-text color-black" }, null, -1)), el = { class: "page-login-field half-top color-black" }, tl = /* @__PURE__ */ lt(() => /* @__PURE__ */ y("i", { style: { "padding-top": "
|
|
15874
|
+
}, Zc = /* @__PURE__ */ lt(() => /* @__PURE__ */ y("p", { class: "half-bottom small-top center-text color-black" }, null, -1)), el = { class: "page-login-field half-top color-black" }, tl = /* @__PURE__ */ lt(() => /* @__PURE__ */ y("i", { style: { "padding-top": "10px", "margin-left": "10px" } }, [
|
|
15892
15875
|
/* @__PURE__ */ y("img", {
|
|
15893
15876
|
src: "https://cdn.tapni.co/icons/mail.png",
|
|
15894
15877
|
class: "responsive-image",
|
|
@@ -15941,7 +15924,7 @@ const yo = /* @__PURE__ */ We(Ec, [["render", $c], ["__scopeId", "data-v-75db7f0
|
|
|
15941
15924
|
class: "button--loading button__loader"
|
|
15942
15925
|
}, Rl = /* @__PURE__ */ lt(() => /* @__PURE__ */ y("div", { class: "decoration decoration-lines-thin no-bottom half-top" }, null, -1)), Pl = { class: "close-text center-text half-top color-black" }, Ml = ["innerHTML"], Nl = ["href"];
|
|
15943
15926
|
function Ll(n, e, t, r, o, i) {
|
|
15944
|
-
const a =
|
|
15927
|
+
const a = Bt("router-link");
|
|
15945
15928
|
return o.passwordChange ? (S(), P("form", {
|
|
15946
15929
|
key: 1,
|
|
15947
15930
|
class: "page-login content-boxed content-boxed-padding",
|
|
@@ -16063,7 +16046,7 @@ function Ll(n, e, t, r, o, i) {
|
|
|
16063
16046
|
])
|
|
16064
16047
|
], 32));
|
|
16065
16048
|
}
|
|
16066
|
-
const ko = /* @__PURE__ */ We(Jc, [["render", Ll], ["__scopeId", "data-v-
|
|
16049
|
+
const ko = /* @__PURE__ */ We(Jc, [["render", Ll], ["__scopeId", "data-v-61e353a6"]]), Ol = {
|
|
16067
16050
|
name: "AuthCallback",
|
|
16068
16051
|
mixins: [Rn, Mn, ze],
|
|
16069
16052
|
data() {
|
|
@@ -16117,7 +16100,7 @@ const wo = /* @__PURE__ */ We(Ol, [["render", Dl]]), Hl = {
|
|
|
16117
16100
|
this.toggle = !1, window.document.body.style.overflow = "auto", window.document.body.style.height = "auto";
|
|
16118
16101
|
}), z.$on("openModalOverlay", () => {
|
|
16119
16102
|
this.toggle = !0;
|
|
16120
|
-
}), z.$on("
|
|
16103
|
+
}), z.$on("toggleSSOLanguageModal", this.toggleModal), z.$on("toggleSSOModal", this.toggleModal), z.$on("toggleSSOPickModal", this.toggleModal);
|
|
16121
16104
|
},
|
|
16122
16105
|
methods: {
|
|
16123
16106
|
toggleModal(n = !0) {
|
|
@@ -16135,7 +16118,7 @@ function ql(n, e, t, r, o, i) {
|
|
|
16135
16118
|
onClick: e[0] || (e[0] = (...a) => i.toggleEmit && i.toggleEmit(...a))
|
|
16136
16119
|
}, null, 2);
|
|
16137
16120
|
}
|
|
16138
|
-
const bo = /* @__PURE__ */ We(Hl, [["render", ql], ["__scopeId", "data-v-
|
|
16121
|
+
const bo = /* @__PURE__ */ We(Hl, [["render", ql], ["__scopeId", "data-v-6fff03da"]]), Fl = {
|
|
16139
16122
|
name: "SSO",
|
|
16140
16123
|
mixins: [An, Rn, Mn, ze],
|
|
16141
16124
|
data() {
|
|
@@ -16178,7 +16161,7 @@ const bo = /* @__PURE__ */ We(Hl, [["render", ql], ["__scopeId", "data-v-a128c2f
|
|
|
16178
16161
|
this.toggle = !this.toggle;
|
|
16179
16162
|
}
|
|
16180
16163
|
}
|
|
16181
|
-
}, jl = (n) => (
|
|
16164
|
+
}, jl = (n) => (Dt("data-v-11f19a09"), n = n(), Ht(), n), Kl = /* @__PURE__ */ jl(() => /* @__PURE__ */ y("i", { class: "font-17 color-black" }, [
|
|
16182
16165
|
/* @__PURE__ */ y("img", {
|
|
16183
16166
|
src: "https://cdn.tapni.co/icons/down-arrow.png",
|
|
16184
16167
|
class: "responsive-image",
|
|
@@ -16264,7 +16247,7 @@ const Co = /* @__PURE__ */ We(Fl, [["render", Jl], ["__scopeId", "data-v-11f19a0
|
|
|
16264
16247
|
this.azureLoad = !1, this.oktaLoad = !1, this.samlLoad = !1, this.sso = null, this.email = null, n && (this.sso = n.sso, this.email = n.email), this.toggle = !this.toggle;
|
|
16265
16248
|
}
|
|
16266
16249
|
}
|
|
16267
|
-
}, Nn = (n) => (
|
|
16250
|
+
}, Nn = (n) => (Dt("data-v-4f821f65"), n = n(), Ht(), n), Zl = /* @__PURE__ */ Nn(() => /* @__PURE__ */ y("i", { class: "font-17 color-black" }, [
|
|
16268
16251
|
/* @__PURE__ */ y("img", {
|
|
16269
16252
|
src: "https://cdn.tapni.co/icons/down-arrow.png",
|
|
16270
16253
|
class: "responsive-image",
|
|
@@ -16312,7 +16295,7 @@ function du(n, e, t, r, o, i) {
|
|
|
16312
16295
|
}, [
|
|
16313
16296
|
nu,
|
|
16314
16297
|
o.azureLoad ? (S(), P("span", ou)) : (S(), P("span", ru, U(n.ssoLang[n.appLanguage].sign_in_with) + " Azure", 1))
|
|
16315
|
-
])) :
|
|
16298
|
+
])) : ee("", !0),
|
|
16316
16299
|
(s = o.sso) != null && s.okta ? (S(), P("a", {
|
|
16317
16300
|
key: 1,
|
|
16318
16301
|
onClick: e[2] || (e[2] = (p) => i.ssoLogin("okta")),
|
|
@@ -16320,7 +16303,7 @@ function du(n, e, t, r, o, i) {
|
|
|
16320
16303
|
}, [
|
|
16321
16304
|
iu,
|
|
16322
16305
|
o.oktaLoad ? (S(), P("span", su)) : (S(), P("span", au, U(n.ssoLang[n.appLanguage].sign_in_with) + " Okta", 1))
|
|
16323
|
-
])) :
|
|
16306
|
+
])) : ee("", !0),
|
|
16324
16307
|
(u = o.sso) != null && u.saml ? (S(), P("a", {
|
|
16325
16308
|
key: 2,
|
|
16326
16309
|
onClick: e[3] || (e[3] = (p) => i.ssoLogin("saml")),
|
|
@@ -16328,7 +16311,7 @@ function du(n, e, t, r, o, i) {
|
|
|
16328
16311
|
}, [
|
|
16329
16312
|
cu,
|
|
16330
16313
|
o.samlLoad ? (S(), P("span", uu)) : (S(), P("span", lu, U(n.ssoLang[n.appLanguage].sign_in_with) + " SAML", 1))
|
|
16331
|
-
])) :
|
|
16314
|
+
])) : ee("", !0)
|
|
16332
16315
|
], 34);
|
|
16333
16316
|
}
|
|
16334
16317
|
const Eo = /* @__PURE__ */ We(Xl, [["render", du], ["__scopeId", "data-v-4f821f65"]]), pu = {
|
|
@@ -16408,7 +16391,7 @@ function _u(n, e, t, r, o, i) {
|
|
|
16408
16391
|
var a, s;
|
|
16409
16392
|
return S(), P("a", {
|
|
16410
16393
|
class: Ie(["disable-select", t.linkStyle + (t.disabled ? " opacity-50" : "")]),
|
|
16411
|
-
style:
|
|
16394
|
+
style: Lt(
|
|
16412
16395
|
(t.editing ? "cursor: move" : "cursor: pointer") + "!important; overflow: visible;"
|
|
16413
16396
|
)
|
|
16414
16397
|
}, [
|
|
@@ -16418,7 +16401,7 @@ function _u(n, e, t, r, o, i) {
|
|
|
16418
16401
|
"pulse pulse-border": t.pulse,
|
|
16419
16402
|
"link-drag": t.editing
|
|
16420
16403
|
}),
|
|
16421
|
-
style:
|
|
16404
|
+
style: Lt({ ...(a = t.customLinkStyle) == null ? void 0 : a.linkIcon })
|
|
16422
16405
|
}, [
|
|
16423
16406
|
!t.data.custom_icon && t.data.type !== "customlink" ? (S(), P("img", {
|
|
16424
16407
|
key: 0,
|
|
@@ -16453,7 +16436,7 @@ function _u(n, e, t, r, o, i) {
|
|
|
16453
16436
|
], 6),
|
|
16454
16437
|
y("span", {
|
|
16455
16438
|
class: "link-text link-drag color-black",
|
|
16456
|
-
style:
|
|
16439
|
+
style: Lt({ color: (s = t.customLinkStyle) == null ? void 0 : s.color })
|
|
16457
16440
|
}, U(i.linkText), 5)
|
|
16458
16441
|
], 6);
|
|
16459
16442
|
}
|
|
@@ -16474,14 +16457,14 @@ const vu = /* @__PURE__ */ We(pu, [["render", _u]]), yu = {
|
|
|
16474
16457
|
};
|
|
16475
16458
|
},
|
|
16476
16459
|
async mounted() {
|
|
16477
|
-
z.$on("
|
|
16460
|
+
z.$on("toggleSSOLanguageModal", this.toggleModal), z.$on("closeModal", () => {
|
|
16478
16461
|
this.toggle = !1;
|
|
16479
16462
|
});
|
|
16480
|
-
let n = this.isNative ? await pn.getLanguageCode() :
|
|
16463
|
+
let n = this.isNative ? await pn.getLanguageCode() : zt.getFirstBrowserLanguage();
|
|
16481
16464
|
n && yu.SUPPORTED_LANGUAGES.includes(n) && this.updateLanguage(n);
|
|
16482
16465
|
},
|
|
16483
16466
|
beforeDestroy() {
|
|
16484
|
-
z._events.
|
|
16467
|
+
z._events.toggleSSOLanguageModal.pop();
|
|
16485
16468
|
},
|
|
16486
16469
|
methods: {
|
|
16487
16470
|
forceClose() {
|
|
@@ -16497,7 +16480,7 @@ const vu = /* @__PURE__ */ We(pu, [["render", _u]]), yu = {
|
|
|
16497
16480
|
this.toggle = !this.toggle;
|
|
16498
16481
|
}
|
|
16499
16482
|
}
|
|
16500
|
-
}, wu = (n) => (
|
|
16483
|
+
}, wu = (n) => (Dt("data-v-29699ad7"), n = n(), Ht(), n), bu = /* @__PURE__ */ wu(() => /* @__PURE__ */ y("i", { class: "font-17 fa color-black" }, [
|
|
16501
16484
|
/* @__PURE__ */ y("img", {
|
|
16502
16485
|
src: "https://cdn.tapni.co/icons/down-arrow.png",
|
|
16503
16486
|
class: "fa responsive-image",
|
|
@@ -16507,7 +16490,7 @@ const vu = /* @__PURE__ */ We(pu, [["render", _u]]), yu = {
|
|
|
16507
16490
|
bu
|
|
16508
16491
|
], Eu = { class: "bold center-text color-black small-bottom" };
|
|
16509
16492
|
function Tu(n, e, t, r, o, i) {
|
|
16510
|
-
const a =
|
|
16493
|
+
const a = Bt("LinkIcon");
|
|
16511
16494
|
return S(), P("div", {
|
|
16512
16495
|
class: Ie(["menu-wrapper menu-light menu-white menu-modal center-text activate-page", { "active-menu": o.toggle }]),
|
|
16513
16496
|
style: { height: "auto", "max-height": "92vh", "margin-top": "-172.5px" }
|
|
@@ -16576,7 +16559,7 @@ function Tu(n, e, t, r, o, i) {
|
|
|
16576
16559
|
}, null, 8, ["data"])
|
|
16577
16560
|
], 2);
|
|
16578
16561
|
}
|
|
16579
|
-
const To = /* @__PURE__ */ We(ku, [["render", Tu], ["__scopeId", "data-v-
|
|
16562
|
+
const To = /* @__PURE__ */ We(ku, [["render", Tu], ["__scopeId", "data-v-29699ad7"]]);
|
|
16580
16563
|
var Iu = { VITE_APP_MODE: "npm", VITE_APP_APP_ROOT: "https://t.link", VITE_APP_API_ROOT: "https://api.tapni.co", VITE_APP_GOOGLE_RECAPTCHA_SITE_KEY: "6LenkC0mAAAAADWBxPOhpmwXCwzCJd7cilNgtOLk", VITE_APP_SSO_ID: "9cd47053-080a-4df8-8fd8-ca4389163fde", VITE_APP_POPUP_LOGIN_ALLOWED_ORIGIN: "https://auth.tapni.com", BASE_URL: "/", MODE: "production", DEV: !1, PROD: !0, SSR: !1 };
|
|
16581
16564
|
const Su = { id: "ssoapp" }, Au = {
|
|
16582
16565
|
key: 0,
|
|
@@ -16635,6 +16618,10 @@ const Su = { id: "ssoapp" }, Au = {
|
|
|
16635
16618
|
isModal: {
|
|
16636
16619
|
type: Boolean,
|
|
16637
16620
|
default: !1
|
|
16621
|
+
},
|
|
16622
|
+
appLang: {
|
|
16623
|
+
type: String,
|
|
16624
|
+
default: "en"
|
|
16638
16625
|
}
|
|
16639
16626
|
},
|
|
16640
16627
|
computed: {
|
|
@@ -16643,7 +16630,7 @@ const Su = { id: "ssoapp" }, Au = {
|
|
|
16643
16630
|
}
|
|
16644
16631
|
},
|
|
16645
16632
|
async mounted() {
|
|
16646
|
-
this.applyBgStyle(), z.$on("ssoEvent", this.ssoOutgoingEvent), z.$on("ssoLogout", (n) => this.logout(n)), z.$on("getLoggedInAccounts", (n) => this.getLoggedInAccounts(n)), z.$on("refreshTokenAction", (n) => this.refreshTokenAction({ ...n, storage: this.$storage })), z.$on("switchAccount", (n) => this.switchAccount(n)), z.$on("setToken", (n) => this.setToken(n));
|
|
16633
|
+
this.applyBgStyle(), z.$on("ssoEvent", this.ssoOutgoingEvent), z.$on("ssoLogout", (n) => this.logout(n.refreshToken)), z.$on("getLoggedInAccounts", (n) => this.getLoggedInAccounts(n)), z.$on("refreshTokenAction", (n) => this.refreshTokenAction({ ...n, storage: this.$storage })), z.$on("switchAccount", (n) => this.switchAccount(n)), z.$on("setToken", (n) => this.setToken(n));
|
|
16647
16634
|
},
|
|
16648
16635
|
methods: {
|
|
16649
16636
|
async init() {
|
|
@@ -16662,8 +16649,8 @@ const Su = { id: "ssoapp" }, Au = {
|
|
|
16662
16649
|
applyBgStyle() {
|
|
16663
16650
|
this.display === "redirect" ? document.getElementsByTagName("html")[0].style = "background: #dfeefe;" : document.getElementsByTagName("html")[0].style = "";
|
|
16664
16651
|
},
|
|
16665
|
-
|
|
16666
|
-
z.$emit("
|
|
16652
|
+
toggleSSOLanguageModal() {
|
|
16653
|
+
z.$emit("toggleSSOLanguageModal", !0);
|
|
16667
16654
|
}
|
|
16668
16655
|
},
|
|
16669
16656
|
watch: {
|
|
@@ -16682,19 +16669,19 @@ const Su = { id: "ssoapp" }, Au = {
|
|
|
16682
16669
|
const e = document.createElement("script");
|
|
16683
16670
|
e.src = `https://www.google.com/recaptcha/api.js?render=${Iu.VITE_GOOGLE_RECAPTCHA_SITE_KEY}`, document.head.appendChild(e);
|
|
16684
16671
|
}), (e, t) => (S(), P("div", Su, [
|
|
16685
|
-
e.display === "redirect" || e.renderView.includes("Auth") ? (S(), P("a", Au, Pu)) :
|
|
16672
|
+
e.display === "redirect" || e.renderView.includes("Auth") ? (S(), P("a", Au, Pu)) : ee("", !0),
|
|
16686
16673
|
e.display === "redirect" ? (S(), P("a", {
|
|
16687
16674
|
key: 1,
|
|
16688
|
-
onClick: t[0] || (t[0] = (...r) => e.
|
|
16675
|
+
onClick: t[0] || (t[0] = (...r) => e.toggleSSOLanguageModal && e.toggleSSOLanguageModal(...r)),
|
|
16689
16676
|
class: "font-18 no-border pointer color-black",
|
|
16690
16677
|
style: { position: "absolute", right: "20px", top: "-10px", "z-index": "1" }
|
|
16691
16678
|
}, [
|
|
16692
16679
|
y("span", Mu, U(e.appLanguage.toUpperCase()), 1)
|
|
16693
|
-
])) :
|
|
16680
|
+
])) : ee("", !0),
|
|
16694
16681
|
ke(bo),
|
|
16695
|
-
n.isModal ?
|
|
16696
|
-
n.isModal ?
|
|
16697
|
-
n.isModal ?
|
|
16682
|
+
n.isModal ? ee("", !0) : (S(), qe(To, { key: 2 })),
|
|
16683
|
+
n.isModal ? ee("", !0) : (S(), qe(Co, { key: 3 })),
|
|
16684
|
+
n.isModal ? ee("", !0) : (S(), qe(Eo, { key: 4 })),
|
|
16698
16685
|
e.initialized && e.renderView === "AuthWelcome" ? (S(), qe(Jr, { key: 5 })) : e.initialized && e.renderView === "AuthLogin" ? (S(), qe(_o, {
|
|
16699
16686
|
key: 6,
|
|
16700
16687
|
isModal: n.isModal
|
|
@@ -16704,7 +16691,7 @@ const Su = { id: "ssoapp" }, Au = {
|
|
|
16704
16691
|
}, null, 8, ["isModal"])) : e.initialized && e.renderView === "AuthVerify" ? (S(), qe(yo, {
|
|
16705
16692
|
key: 8,
|
|
16706
16693
|
isModal: n.isModal
|
|
16707
|
-
}, null, 8, ["isModal"])) : e.initialized && e.renderView === "AuthReset" ? (S(), qe(ko, { key: 9 })) : e.initialized && e.renderView === "AuthCallback" ? (S(), qe(wo, { key: 10 })) : e.display !== "npm" ? (S(), qe(Qo(Yo), { key: 11 })) :
|
|
16694
|
+
}, null, 8, ["isModal"])) : e.initialized && e.renderView === "AuthReset" ? (S(), qe(ko, { key: 9 })) : e.initialized && e.renderView === "AuthCallback" ? (S(), qe(wo, { key: 10 })) : e.display !== "npm" ? (S(), qe(Qo(Yo), { key: 11 })) : ee("", !0),
|
|
16708
16695
|
y("div", Nu, [
|
|
16709
16696
|
y("p", Lu, [
|
|
16710
16697
|
y("span", Ou, U(e.ssoLang[e.appLanguage].error), 1),
|
|
@@ -16727,7 +16714,7 @@ const Su = { id: "ssoapp" }, Au = {
|
|
|
16727
16714
|
TapniAuth: Hr,
|
|
16728
16715
|
AuthMixin: ze,
|
|
16729
16716
|
install: (n, e) => {
|
|
16730
|
-
e && e.API_ROOT &&
|
|
16717
|
+
e && e.API_ROOT && qt.setApiRootFromOptions(e.API_ROOT), n.component("TapniAuth", Hr);
|
|
16731
16718
|
}
|
|
16732
16719
|
};
|
|
16733
16720
|
export {
|