@tapni/auth 1.0.32 → 1.0.33

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1390,7 +1390,7 @@ function aa(n, e, t, r, o, i) {
1390
1390
  const ro = /* @__PURE__ */ pn(Zi, [["render", aa], ["__scopeId", "data-v-cb61958b"]]), sa = /* @__PURE__ */ Object.freeze(/* @__PURE__ */ Object.defineProperty({
1391
1391
  __proto__: null,
1392
1392
  default: ro
1393
- }, Symbol.toStringTag, { value: "Module" })), ca = "1.0.32", ar = {
1393
+ }, Symbol.toStringTag, { value: "Module" })), ca = "1.0.33", ar = {
1394
1394
  getMe() {
1395
1395
  return le().get("/users/me");
1396
1396
  },
@@ -5824,7 +5824,7 @@ Tanıştığınız herkesi etkileyin 😎 <br> Kendinize bir tane ayırın 👇`
5824
5824
  app_region: "지역",
5825
5825
  app_region_p: "맞춤형 결제 및 지원을 위해 지역을 선택하세요"
5826
5826
  }
5827
- }, ko = () => Promise.resolve().then(() => sa), ua = () => Promise.resolve().then(() => uc), da = () => Promise.resolve().then(() => rl), pa = () => Promise.resolve().then(() => Qu), ha = () => Promise.resolve().then(() => Pc), fa = () => Promise.resolve().then(() => vl), ma = () => Promise.resolve().then(() => Zu), ga = () => import("./QR-CRJQNQr7.js"), _a = () => Promise.resolve().then(() => vu), va = () => import("./Apps-Cv7avCHq.js"), ya = () => import("./Billing-omz6Qf60.js"), wa = () => import("./CustomApp-BHP2lUPX.js"), ba = () => import("./General-BjfncFzK.js"), ka = [
5827
+ }, ko = () => Promise.resolve().then(() => sa), ua = () => Promise.resolve().then(() => uc), da = () => Promise.resolve().then(() => rl), pa = () => Promise.resolve().then(() => Qu), ha = () => Promise.resolve().then(() => Pc), fa = () => Promise.resolve().then(() => vl), ma = () => Promise.resolve().then(() => Zu), ga = () => import("./QR-BO4Bxi-9.js"), _a = () => Promise.resolve().then(() => vu), va = () => import("./Apps-DwrMoJ1K.js"), ya = () => import("./Billing-Iza9L7mf.js"), wa = () => import("./CustomApp-Bc4Ed5vg.js"), ba = () => import("./General-DfkudEbe.js"), ka = [
5828
5828
  {
5829
5829
  path: "/welcome",
5830
5830
  name: "AuthWelcome",
@@ -15374,8 +15374,19 @@ const Ps = Er("MsAuthPlugin", {
15374
15374
  return window.crypto.getRandomValues(e), Array.from(e, (t) => ("0" + t.toString(16)).substr(-2)).join("");
15375
15375
  },
15376
15376
  async pkceChallengeFromVerifier(n) {
15377
- const t = new TextEncoder().encode(n), r = await window.crypto.subtle.digest("SHA-256", t);
15378
- return btoa(String.fromCharCode.apply(null, new Uint8Array(r))).replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
15377
+ try {
15378
+ console.log("Creating TextEncoder");
15379
+ const e = new TextEncoder();
15380
+ console.log("Encoding verifier");
15381
+ const t = e.encode(n);
15382
+ console.log("Starting crypto digest");
15383
+ const r = await window.crypto.subtle.digest("SHA-256", t);
15384
+ console.log("Crypto digest completed");
15385
+ const o = btoa(String.fromCharCode.apply(null, new Uint8Array(r))).replace(/\+/g, "-").replace(/\//g, "_").replace(/=+$/, "");
15386
+ return console.log("Base64 encoding completed"), o;
15387
+ } catch (e) {
15388
+ throw console.error("Error in pkceChallengeFromVerifier:", e), e;
15389
+ }
15379
15390
  },
15380
15391
  encryptAES(n, e, t) {
15381
15392
  let o = new TextEncoder().encode(t, storage);
@@ -15479,7 +15490,13 @@ const Ps = Er("MsAuthPlugin", {
15479
15490
  }
15480
15491
  },
15481
15492
  async samlLogin(n) {
15482
- console.log("SAMLLL2", n), this.code_verifier = $n.generateRandomString(28), localStorage.setItem("pkce_code_verifier", this.code_verifier), console.log("SAMLLL2.1"), this.code_challenge = await $n.pkceChallengeFromVerifier(this.code_verifier), console.log("SAMLLL2.2");
15493
+ console.log("SAMLLL2", n), this.code_verifier = $n.generateRandomString(28), localStorage.setItem("pkce_code_verifier", this.code_verifier), console.log("SAMLLL2.1");
15494
+ try {
15495
+ console.log("Starting PKCE challenge generation"), this.code_challenge = await $n.pkceChallengeFromVerifier(this.code_verifier), console.log("PKCE challenge generated successfully");
15496
+ } catch (i) {
15497
+ throw console.error("Error generating PKCE challenge:", i), i;
15498
+ }
15499
+ console.log("SAMLLL2.2");
15483
15500
  const e = Hn.getPlatform();
15484
15501
  console.log("SAMLLL2.3");
15485
15502
  let t = `code_challenge=${this.code_challenge}&platform=${e}&redirect_uri=${location.origin + "/app/callback/saml"}&realm=${this.realm}&display=${this.display}`, r = btoa(t);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@tapni/auth",
3
- "version": "1.0.32",
3
+ "version": "1.0.33",
4
4
  "type": "module",
5
5
  "main": "./dist/TapniAuth.umd.js",
6
6
  "module": "./dist/TapniAuth.es.js",
@@ -3,7 +3,7 @@ import UtilService from '@/services/UtilService';
3
3
  import { Capacitor } from "@capacitor/core";
4
4
  import { EventBus } from '@/store/event-bus.js';
5
5
  export default {
6
- data () {
6
+ data() {
7
7
  return {
8
8
  code_verifier: '',
9
9
  code_challenge: '',
@@ -15,7 +15,7 @@ export default {
15
15
  computed: {
16
16
  },
17
17
  watch: {
18
- '$route.path' (nv) {
18
+ '$route.path'(nv) {
19
19
  if (nv === '/callback/saml') {
20
20
  this.handleSamlRedirect(nv)
21
21
  }
@@ -36,8 +36,14 @@ export default {
36
36
  this.code_verifier = UtilService.generateRandomString(28);
37
37
  localStorage.setItem("pkce_code_verifier", this.code_verifier);
38
38
  console.log('SAMLLL2.1');
39
- // Hash and base64-urlencode the secret to use as the challenge
40
- this.code_challenge = await UtilService.pkceChallengeFromVerifier(this.code_verifier);
39
+ try {
40
+ console.log('Starting PKCE challenge generation');
41
+ this.code_challenge = await UtilService.pkceChallengeFromVerifier(this.code_verifier);
42
+ console.log('PKCE challenge generated successfully');
43
+ } catch (error) {
44
+ console.error('Error generating PKCE challenge:', error);
45
+ throw error;
46
+ }
41
47
  console.log('SAMLLL2.2');
42
48
  const platform = Capacitor.getPlatform();
43
49
  console.log('SAMLLL2.3');
@@ -216,14 +216,25 @@ export default {
216
216
  return Array.from(array, (dec) => ('0' + dec.toString(16)).substr(-2)).join('');
217
217
  },
218
218
  async pkceChallengeFromVerifier(v) {
219
- const encoder = new TextEncoder();
220
- const data = encoder.encode(v);
221
- const hashed = await window.crypto.subtle.digest('SHA-256', data);
222
- // base64 url encode
223
- return btoa(String.fromCharCode.apply(null, new Uint8Array(hashed)))
224
- .replace(/\+/g, '-')
225
- .replace(/\//g, '_')
226
- .replace(/=+$/, '');
219
+ try {
220
+ console.log('Creating TextEncoder');
221
+ const encoder = new TextEncoder();
222
+ console.log('Encoding verifier');
223
+ const data = encoder.encode(v);
224
+ console.log('Starting crypto digest');
225
+ const hashed = await window.crypto.subtle.digest('SHA-256', data);
226
+ console.log('Crypto digest completed');
227
+ // base64 url encode
228
+ const base64 = btoa(String.fromCharCode.apply(null, new Uint8Array(hashed)))
229
+ .replace(/\+/g, '-')
230
+ .replace(/\//g, '_')
231
+ .replace(/=+$/, '');
232
+ console.log('Base64 encoding completed');
233
+ return base64;
234
+ } catch (error) {
235
+ console.error('Error in pkceChallengeFromVerifier:', error);
236
+ throw error;
237
+ }
227
238
  },
228
239
  encryptAES(key, iv, data) {
229
240
  let encoder = new TextEncoder();