@tapni/auth 1.0.31 → 1.0.33
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/.vite/manifest.json +12 -12
- package/dist/{Apps-DyqTyifK.js → Apps-DwrMoJ1K.js} +1 -1
- package/dist/{Billing-lPnJ1Xhe.js → Billing-Iza9L7mf.js} +1 -1
- package/dist/{CustomApp-Bqp5EHVn.js → CustomApp-Bc4Ed5vg.js} +1 -1
- package/dist/{General-BPsKKx1X.js → General-DfkudEbe.js} +1 -1
- package/dist/{QR-hOamVvk4.js → QR-BO4Bxi-9.js} +1 -1
- package/dist/TapniAuth.es.js +1 -1
- package/dist/TapniAuth.umd.js +2 -2
- package/dist/{install-0ubEwhSL.js → install-Dgoj6XAk.js} +25 -7
- package/package.json +1 -1
- package/src/mixins/saml.mixin.js +16 -8
- package/src/services/UtilService.js +19 -8
|
@@ -1390,7 +1390,7 @@ function aa(n, e, t, r, o, i) {
|
|
|
1390
1390
|
const ro = /* @__PURE__ */ pn(Zi, [["render", aa], ["__scopeId", "data-v-cb61958b"]]), sa = /* @__PURE__ */ Object.freeze(/* @__PURE__ */ Object.defineProperty({
|
|
1391
1391
|
__proto__: null,
|
|
1392
1392
|
default: ro
|
|
1393
|
-
}, Symbol.toStringTag, { value: "Module" })), ca = "1.0.
|
|
1393
|
+
}, Symbol.toStringTag, { value: "Module" })), ca = "1.0.33", ar = {
|
|
1394
1394
|
getMe() {
|
|
1395
1395
|
return le().get("/users/me");
|
|
1396
1396
|
},
|
|
@@ -5824,7 +5824,7 @@ Tanıştığınız herkesi etkileyin 😎 <br> Kendinize bir tane ayırın 👇`
|
|
|
5824
5824
|
app_region: "지역",
|
|
5825
5825
|
app_region_p: "맞춤형 결제 및 지원을 위해 지역을 선택하세요"
|
|
5826
5826
|
}
|
|
5827
|
-
}, ko = () => Promise.resolve().then(() => sa), ua = () => Promise.resolve().then(() => uc), da = () => Promise.resolve().then(() => rl), pa = () => Promise.resolve().then(() => Qu), ha = () => Promise.resolve().then(() => Pc), fa = () => Promise.resolve().then(() => vl), ma = () => Promise.resolve().then(() => Zu), ga = () => import("./QR-
|
|
5827
|
+
}, ko = () => Promise.resolve().then(() => sa), ua = () => Promise.resolve().then(() => uc), da = () => Promise.resolve().then(() => rl), pa = () => Promise.resolve().then(() => Qu), ha = () => Promise.resolve().then(() => Pc), fa = () => Promise.resolve().then(() => vl), ma = () => Promise.resolve().then(() => Zu), ga = () => import("./QR-BO4Bxi-9.js"), _a = () => Promise.resolve().then(() => vu), va = () => import("./Apps-DwrMoJ1K.js"), ya = () => import("./Billing-Iza9L7mf.js"), wa = () => import("./CustomApp-Bc4Ed5vg.js"), ba = () => import("./General-DfkudEbe.js"), ka = [
|
|
5828
5828
|
{
|
|
5829
5829
|
path: "/welcome",
|
|
5830
5830
|
name: "AuthWelcome",
|
|
@@ -15374,8 +15374,19 @@ const Ps = Er("MsAuthPlugin", {
|
|
|
15374
15374
|
return window.crypto.getRandomValues(e), Array.from(e, (t) => ("0" + t.toString(16)).substr(-2)).join("");
|
|
15375
15375
|
},
|
|
15376
15376
|
async pkceChallengeFromVerifier(n) {
|
|
15377
|
-
|
|
15378
|
-
|
|
15377
|
+
try {
|
|
15378
|
+
console.log("Creating TextEncoder");
|
|
15379
|
+
const e = new TextEncoder();
|
|
15380
|
+
console.log("Encoding verifier");
|
|
15381
|
+
const t = e.encode(n);
|
|
15382
|
+
console.log("Starting crypto digest");
|
|
15383
|
+
const r = await window.crypto.subtle.digest("SHA-256", t);
|
|
15384
|
+
console.log("Crypto digest completed");
|
|
15385
|
+
const o = btoa(String.fromCharCode.apply(null, new Uint8Array(r))).replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
|
|
15386
|
+
return console.log("Base64 encoding completed"), o;
|
|
15387
|
+
} catch (e) {
|
|
15388
|
+
throw console.error("Error in pkceChallengeFromVerifier:", e), e;
|
|
15389
|
+
}
|
|
15379
15390
|
},
|
|
15380
15391
|
encryptAES(n, e, t) {
|
|
15381
15392
|
let o = new TextEncoder().encode(t, storage);
|
|
@@ -15479,10 +15490,17 @@ const Ps = Er("MsAuthPlugin", {
|
|
|
15479
15490
|
}
|
|
15480
15491
|
},
|
|
15481
15492
|
async samlLogin(n) {
|
|
15482
|
-
console.log("SAMLLL2", n), this.code_verifier = $n.generateRandomString(28), localStorage.setItem("pkce_code_verifier", this.code_verifier),
|
|
15493
|
+
console.log("SAMLLL2", n), this.code_verifier = $n.generateRandomString(28), localStorage.setItem("pkce_code_verifier", this.code_verifier), console.log("SAMLLL2.1");
|
|
15494
|
+
try {
|
|
15495
|
+
console.log("Starting PKCE challenge generation"), this.code_challenge = await $n.pkceChallengeFromVerifier(this.code_verifier), console.log("PKCE challenge generated successfully");
|
|
15496
|
+
} catch (i) {
|
|
15497
|
+
throw console.error("Error generating PKCE challenge:", i), i;
|
|
15498
|
+
}
|
|
15499
|
+
console.log("SAMLLL2.2");
|
|
15483
15500
|
const e = Hn.getPlatform();
|
|
15501
|
+
console.log("SAMLLL2.3");
|
|
15484
15502
|
let t = `code_challenge=${this.code_challenge}&platform=${e}&redirect_uri=${location.origin + "/app/callback/saml"}&realm=${this.realm}&display=${this.display}`, r = btoa(t);
|
|
15485
|
-
n = `${n}&RelayState=${r}`;
|
|
15503
|
+
console.log("SAMLLL2.4"), n = `${n}&RelayState=${r}`;
|
|
15486
15504
|
let o = this;
|
|
15487
15505
|
window.addEventListener(
|
|
15488
15506
|
"message",
|
|
@@ -15497,7 +15515,7 @@ const Ps = Er("MsAuthPlugin", {
|
|
|
15497
15515
|
}
|
|
15498
15516
|
},
|
|
15499
15517
|
{ once: !0 }
|
|
15500
|
-
), this.isNative ? (console.log("SAMLLL3"), this.popupWindow = await dr.open({ url: n, presentationStyle: "popover" }), console.log("SAMLLL4")) : (this.checkInterval = setInterval(() => {
|
|
15518
|
+
), console.log("SAMLLL2.5"), console.log("SAMLLL2.6-NATIVE" + this.isNative), this.isNative ? (console.log("SAMLLL3"), this.popupWindow = await dr.open({ url: n, presentationStyle: "popover" }), console.log("SAMLLL4")) : (this.checkInterval = setInterval(() => {
|
|
15501
15519
|
var s;
|
|
15502
15520
|
const i = localStorage.getItem("auth_code"), a = localStorage.getItem("pkce_code_verifier");
|
|
15503
15521
|
i && (clearInterval(this.checkInterval), localStorage.removeItem("auth_code"), localStorage.removeItem("pkce_code_verifier"), (s = window.parent) == null || s.postMessage({ code: i, state: this.$route.query.state, code_verifier: a }, "*"), a && (this.display === "npm" || this.display === "redirect") && this.exchangeAuthCode({ code: i, code_verifier: a }));
|
package/package.json
CHANGED
package/src/mixins/saml.mixin.js
CHANGED
|
@@ -3,7 +3,7 @@ import UtilService from '@/services/UtilService';
|
|
|
3
3
|
import { Capacitor } from "@capacitor/core";
|
|
4
4
|
import { EventBus } from '@/store/event-bus.js';
|
|
5
5
|
export default {
|
|
6
|
-
data
|
|
6
|
+
data() {
|
|
7
7
|
return {
|
|
8
8
|
code_verifier: '',
|
|
9
9
|
code_challenge: '',
|
|
@@ -15,7 +15,7 @@ export default {
|
|
|
15
15
|
computed: {
|
|
16
16
|
},
|
|
17
17
|
watch: {
|
|
18
|
-
'$route.path'
|
|
18
|
+
'$route.path'(nv) {
|
|
19
19
|
if (nv === '/callback/saml') {
|
|
20
20
|
this.handleSamlRedirect(nv)
|
|
21
21
|
}
|
|
@@ -35,16 +35,22 @@ export default {
|
|
|
35
35
|
// Create and store a new PKCE code_verifier (the plaintext random secret)
|
|
36
36
|
this.code_verifier = UtilService.generateRandomString(28);
|
|
37
37
|
localStorage.setItem("pkce_code_verifier", this.code_verifier);
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
38
|
+
console.log('SAMLLL2.1');
|
|
39
|
+
try {
|
|
40
|
+
console.log('Starting PKCE challenge generation');
|
|
41
|
+
this.code_challenge = await UtilService.pkceChallengeFromVerifier(this.code_verifier);
|
|
42
|
+
console.log('PKCE challenge generated successfully');
|
|
43
|
+
} catch (error) {
|
|
44
|
+
console.error('Error generating PKCE challenge:', error);
|
|
45
|
+
throw error;
|
|
46
|
+
}
|
|
47
|
+
console.log('SAMLLL2.2');
|
|
42
48
|
const platform = Capacitor.getPlatform();
|
|
43
|
-
|
|
49
|
+
console.log('SAMLLL2.3');
|
|
44
50
|
// append public key as relayState
|
|
45
51
|
let dataString = `code_challenge=${this.code_challenge}&platform=${platform}&redirect_uri=${location.origin + '/app/callback/saml'}&realm=${this.realm}&display=${this.display}`;
|
|
46
52
|
let relayState = btoa(dataString);
|
|
47
|
-
|
|
53
|
+
console.log('SAMLLL2.4');
|
|
48
54
|
loginUrl = `${loginUrl}&RelayState=${relayState}`
|
|
49
55
|
|
|
50
56
|
let self = this;
|
|
@@ -67,6 +73,8 @@ export default {
|
|
|
67
73
|
},
|
|
68
74
|
{ once: true }
|
|
69
75
|
);
|
|
76
|
+
console.log('SAMLLL2.5');
|
|
77
|
+
console.log('SAMLLL2.6-NATIVE' + this.isNative);
|
|
70
78
|
|
|
71
79
|
if (this.isNative) {
|
|
72
80
|
console.log('SAMLLL3');
|
|
@@ -216,14 +216,25 @@ export default {
|
|
|
216
216
|
return Array.from(array, (dec) => ('0' + dec.toString(16)).substr(-2)).join('');
|
|
217
217
|
},
|
|
218
218
|
async pkceChallengeFromVerifier(v) {
|
|
219
|
-
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
|
|
223
|
-
|
|
224
|
-
.
|
|
225
|
-
.
|
|
226
|
-
.
|
|
219
|
+
try {
|
|
220
|
+
console.log('Creating TextEncoder');
|
|
221
|
+
const encoder = new TextEncoder();
|
|
222
|
+
console.log('Encoding verifier');
|
|
223
|
+
const data = encoder.encode(v);
|
|
224
|
+
console.log('Starting crypto digest');
|
|
225
|
+
const hashed = await window.crypto.subtle.digest('SHA-256', data);
|
|
226
|
+
console.log('Crypto digest completed');
|
|
227
|
+
// base64 url encode
|
|
228
|
+
const base64 = btoa(String.fromCharCode.apply(null, new Uint8Array(hashed)))
|
|
229
|
+
.replace(/\+/g, '-')
|
|
230
|
+
.replace(/\//g, '_')
|
|
231
|
+
.replace(/=+$/, '');
|
|
232
|
+
console.log('Base64 encoding completed');
|
|
233
|
+
return base64;
|
|
234
|
+
} catch (error) {
|
|
235
|
+
console.error('Error in pkceChallengeFromVerifier:', error);
|
|
236
|
+
throw error;
|
|
237
|
+
}
|
|
227
238
|
},
|
|
228
239
|
encryptAES(key, iv, data) {
|
|
229
240
|
let encoder = new TextEncoder();
|