@typekcz-nocobase-plugins/plugin-oidc-plus 1.0.3 → 1.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/client/index.js +1 -1
- package/dist/externalVersion.js +9 -9
- package/dist/node_modules/nanoid/async/index.browser.js +0 -35
- package/dist/node_modules/nanoid/async/index.js +0 -36
- package/dist/node_modules/nanoid/async/index.native.js +0 -31
- package/dist/node_modules/nanoid/index.browser.js +0 -38
- package/dist/node_modules/nanoid/index.cjs +1 -1
- package/dist/node_modules/nanoid/index.js +0 -40
- package/dist/node_modules/nanoid/non-secure/index.js +0 -13
- package/dist/node_modules/nanoid/package.json +1 -1
- package/dist/node_modules/nanoid/url-alphabet/index.js +0 -4
- package/dist/node_modules/openid-client/package.json +1 -1
- package/package.json +1 -1
- package/src/client/OIDCButton.tsx +70 -0
- package/src/client/Options.tsx +359 -0
- package/src/client/index.tsx +19 -0
- package/src/client/locale/index.ts +18 -0
- package/src/constants.ts +7 -0
- package/src/index.ts +2 -0
- package/src/locale/en-US.json +40 -0
- package/src/locale/es-ES.json +25 -0
- package/src/locale/fr-FR.json +21 -0
- package/src/locale/ko_KR.json +28 -0
- package/src/locale/pt-BR.json +21 -0
- package/src/locale/zh-CN.json +28 -0
- package/src/server/__tests__/oidc.test.ts +283 -0
- package/src/server/actions/getAuthUrl.ts +25 -0
- package/src/server/actions/redirect.ts +32 -0
- package/src/server/index.ts +1 -0
- package/src/server/oidc-auth.ts +169 -0
- package/src/server/plugin.ts +63 -0
- package/src/swagger/index.ts +157 -0
- package/dist/node_modules/nanoid/.devcontainer.json +0 -23
- package/dist/node_modules/openid-client/lib/client.js +0 -1884
- package/dist/node_modules/openid-client/lib/device_flow_handle.js +0 -125
- package/dist/node_modules/openid-client/lib/errors.js +0 -55
- package/dist/node_modules/openid-client/lib/helpers/assert.js +0 -24
- package/dist/node_modules/openid-client/lib/helpers/base64url.js +0 -13
- package/dist/node_modules/openid-client/lib/helpers/client.js +0 -208
- package/dist/node_modules/openid-client/lib/helpers/consts.js +0 -7
- package/dist/node_modules/openid-client/lib/helpers/decode_jwt.js +0 -27
- package/dist/node_modules/openid-client/lib/helpers/deep_clone.js +0 -1
- package/dist/node_modules/openid-client/lib/helpers/defaults.js +0 -27
- package/dist/node_modules/openid-client/lib/helpers/generators.js +0 -14
- package/dist/node_modules/openid-client/lib/helpers/is_key_object.js +0 -4
- package/dist/node_modules/openid-client/lib/helpers/is_plain_object.js +0 -1
- package/dist/node_modules/openid-client/lib/helpers/issuer.js +0 -111
- package/dist/node_modules/openid-client/lib/helpers/keystore.js +0 -298
- package/dist/node_modules/openid-client/lib/helpers/merge.js +0 -24
- package/dist/node_modules/openid-client/lib/helpers/pick.js +0 -9
- package/dist/node_modules/openid-client/lib/helpers/process_response.js +0 -71
- package/dist/node_modules/openid-client/lib/helpers/request.js +0 -200
- package/dist/node_modules/openid-client/lib/helpers/unix_timestamp.js +0 -1
- package/dist/node_modules/openid-client/lib/helpers/weak_cache.js +0 -1
- package/dist/node_modules/openid-client/lib/helpers/webfinger_normalize.js +0 -71
- package/dist/node_modules/openid-client/lib/helpers/www_authenticate_parser.js +0 -14
- package/dist/node_modules/openid-client/lib/index.js +0 -1
- package/dist/node_modules/openid-client/lib/issuer.js +0 -192
- package/dist/node_modules/openid-client/lib/issuer_registry.js +0 -3
- package/dist/node_modules/openid-client/lib/passport_strategy.js +0 -205
- package/dist/node_modules/openid-client/lib/token_set.js +0 -35
package/dist/client/index.js
CHANGED
|
@@ -7,4 +7,4 @@
|
|
|
7
7
|
* For more information, please refer to: https://www.nocobase.com/agreement.
|
|
8
8
|
*/
|
|
9
9
|
|
|
10
|
-
!function(e,t){"object"==typeof exports&&"object"==typeof module?module.exports=t(require("react-i18next"),require("@nocobase/plugin-auth/client"),require("@nocobase/client"),require("antd"),require("@ant-design/icons"),require("@formily/react"),require("react-router-dom"),require("react"),require("@formily/antd-v5")):"function"==typeof define&&define.amd?define("@typekcz-nocobase-plugins/plugin-oidc-plus",["react-i18next","@nocobase/plugin-auth/client","@nocobase/client","antd","@ant-design/icons","@formily/react","react-router-dom","react","@formily/antd-v5"],t):"object"==typeof exports?exports["@typekcz-nocobase-plugins/plugin-oidc-plus"]=t(require("react-i18next"),require("@nocobase/plugin-auth/client"),require("@nocobase/client"),require("antd"),require("@ant-design/icons"),require("@formily/react"),require("react-router-dom"),require("react"),require("@formily/antd-v5")):e["@typekcz-nocobase-plugins/plugin-oidc-plus"]=t(e["react-i18next"],e["@nocobase/plugin-auth/client"],e["@nocobase/client"],e.antd,e["@ant-design/icons"],e["@formily/react"],e["react-router-dom"],e.react,e["@formily/antd-v5"])}(self,function(e,t,r,o,n,i,a,c,u){return function(){"use strict";var l={482:function(e){e.exports=n},632:function(e){e.exports=u},505:function(e){e.exports=i},772:function(e){e.exports=r},689:function(e){e.exports=t},721:function(e){e.exports=o},156:function(e){e.exports=c},238:function(t){t.exports=e},128:function(e){e.exports=a}},p={};function s(e){var t=p[e];if(void 0!==t)return t.exports;var r=p[e]={exports:{}};return l[e](r,r.exports,s),r.exports}s.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return s.d(t,{a:t}),t},s.d=function(e,t){for(var r in t)s.o(t,r)&&!s.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},s.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},s.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})};var d={};s.r(d),s.d(d,{PluginOIDCClient:function(){return N},default:function(){return L}});var f=s("772"),m=s("689"),y=s.n(m),b="tnp_oidc_plus_logout",v=s("482"),h=s("721"),x=s("156"),g=s.n(x),S=s("238"),I="oidc";function w(e){return f.i18n.t(e,{ns:I})}function T(){return(0,S.useTranslation)(I)}var P=s("128");function F(e){for(var t=1;t<arguments.length;t++){var r=arguments[t];for(var o in r)e[o]=r[o]}return e}var k=function e(t,r){function o(e,o,n){if("undefined"!=typeof document){"number"==typeof(n=F({},r,n)).expires&&(n.expires=new Date(Date.now()+864e5*n.expires)),n.expires&&(n.expires=n.expires.toUTCString()),e=encodeURIComponent(e).replace(/%(2[346B]|5E|60|7C)/g,decodeURIComponent).replace(/[()]/g,escape);var i="";for(var a in n){if(!n[a])continue;if(i+="; "+a,!0!==n[a])i+="="+n[a].split(";")[0]}return document.cookie=e+"="+t.write(o,e)+i}}return Object.create({set:o,get:function(e){if("undefined"!=typeof document&&(!arguments.length||!!e)){for(var r=document.cookie?document.cookie.split("; "):[],o={},n=0;n<r.length;n++){var i=r[n].split("="),a=i.slice(1).join("=");try{var c=decodeURIComponent(i[0]);if(o[c]=t.read(a,c),e===c)break}catch(e){}}return e?o[e]:o}},remove:function(e,t){o(e,"",F({},t,{expires:-1}))},withAttributes:function(t){return e(this.converter,F({},this.attributes,t))},withConverter:function(t){return e(F({},this.converter,t),this.attributes)}},{attributes:{value:Object.freeze(r)},converter:{value:Object.freeze(t)}})}({read:function(e){return'"'===e[0]&&(e=e.slice(1,-1)),e.replace(/(%[\dA-F]{2})+/gi,decodeURIComponent)},write:function(e){return encodeURIComponent(e).replace(/%(2[346BF]|3[AC-F]|40|5[BDE]|60|7[BCD])/g,decodeURIComponent)}},{path:"/"});function C(e,t,r,o,n,i,a){try{var c=e[i](a),u=c.value}catch(e){r(e);return}c.done?t(u):Promise.resolve(u).then(o,n)}function O(){var e,t,r=(e=["\n display: flex;\n "],!t&&(t=e.slice(0)),Object.freeze(Object.defineProperties(e,{raw:{value:Object.freeze(t)}})));return O=function(){return r},r}var E=function(e){var t,r,o=e.authenticator,n=T().t,i=(0,f.useAPIClient)(),a=new URLSearchParams((0,P.useLocation)().search),c=a.get("redirect");var u=(r=(t=function(){var e,t,r;return function(e,t){var r,o,n,i,a={label:0,sent:function(){if(1&n[0])throw n[1];return n[1]},trys:[],ops:[]};return i={next:c(0),throw:c(1),return:c(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function c(i){return function(c){return function(i){if(r)throw TypeError("Generator is already executing.");for(;a;)try{if(r=1,o&&(n=2&i[0]?o.return:i[0]?o.throw||((n=o.return)&&n.call(o),0):o.next)&&!(n=n.call(o,i[1])).done)return n;switch(o=0,n&&(i=[2&i[0],n.value]),i[0]){case 0:case 1:n=i;break;case 4:return a.label++,{value:i[1],done:!1};case 5:a.label++,o=i[1],i=[0];continue;case 7:i=a.ops.pop(),a.trys.pop();continue;default:if(!(n=(n=a.trys).length>0&&n[n.length-1])&&(6===i[0]||2===i[0])){a=0;continue}if(3===i[0]&&(!n||i[1]>n[0]&&i[1]<n[3])){a.label=i[1];break}if(6===i[0]&&a.label<n[1]){a.label=n[1],n=i;break}if(n&&a.label<n[2]){a.label=n[2],a.ops.push(i);break}n[2]&&a.ops.pop(),a.trys.pop();continue}i=t.call(e,a)}catch(e){i=[6,e],o=0}finally{r=n=0}if(5&i[0])throw i[1];return{value:i[0]?i[1]:void 0,done:!0}}([i,c])}}}(this,function(n){switch(n.label){case 0:return[4,i.request({method:"post",url:"oidc:getAuthUrl",headers:{"X-Authenticator":o.name},data:{redirect:c}})];case 1:return r=null==(t=n.sent())?void 0:null===(e=t.data)||void 0===e?void 0:e.data,window.location.replace(r),[2]}})},function(){var e=this,r=arguments;return new Promise(function(o,n){var i=t.apply(e,r);function a(e){C(i,o,n,a,c,"next",e)}function c(e){C(i,o,n,a,c,"throw",e)}a(void 0)})}),function(){return r.apply(this,arguments)});return(0,x.useEffect)(function(){var e=k.get(b);if(e){var t=new URL(e);t.searchParams.set("post_logout_redirect_uri",window.location.href),k.remove(b,{domain:window.location.hostname}),window.location.href=t.href}var r=a.get("authenticator"),i=a.get("error");if(r===o.name){if(i){h.message.error(n(i));return}}}),g().createElement(h.Space,{direction:"vertical",className:(0,f.css)(O())},g().createElement(h.Button,{shape:"round",block:!0,icon:g().createElement(v.LoginOutlined,null),onClick:u},n(o.title)))},j=s("632"),R=s("505"),q={type:"object",properties:{public:{type:"object",properties:{autoSignup:{"x-decorator":"FormItem",type:"boolean",title:'{{t("Sign up automatically when the user does not exist")}}',"x-component":"Checkbox",default:!0}}},oidc:{type:"object",properties:{collapse:{type:"void","x-component":"FormTab",properties:{basic:{type:"void","x-component":"FormTab.TabPane","x-component-props":{tab:w("Basic configuration")},properties:{issuer:{type:"string",title:'{{t("Issuer")}}',"x-component":"Input","x-decorator":"FormItem",required:!0},clientId:{type:"string",title:'{{t("Client ID")}}',"x-component":"Input","x-decorator":"FormItem",required:!0},clientSecret:{type:"string",title:'{{t("Client Secret")}}',"x-component":"Input","x-decorator":"FormItem",required:!0},scope:{type:"string",title:'{{t("scope")}}',"x-component":"Input","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("Default: openid profile email")}}'}},idTokenSignedResponseAlg:{type:"string",title:'{{t("id_token signed response algorithm")}}',"x-component":"Select","x-decorator":"FormItem",enum:[{label:"HS256",value:"HS256"},{label:"HS384",value:"HS384"},{label:"HS512",value:"HS512"},{label:"RS256",value:"RS256"},{label:"RS384",value:"RS384"},{label:"RS512",value:"RS512"},{label:"ES256",value:"ES256"},{label:"ES384",value:"ES384"},{label:"ES512",value:"ES512"},{label:"PS256",value:"PS256"},{label:"PS384",value:"PS384"},{label:"PS512",value:"PS512"}]}}},mapping:{type:"void","x-component":"FormTab.TabPane","x-component-props":{tab:w("Field mapping")},properties:{fieldMap:{title:'{{t("Field Map")}}',type:"array","x-decorator":"FormItem","x-component":"ArrayItems",items:{type:"object","x-decorator":"ArrayItems.Item",properties:{space:{type:"void","x-component":"Space",properties:{source:{type:"string","x-decorator":"FormItem","x-component":"Input","x-component-props":{placeholder:'{{t("source")}}'}},target:{type:"string","x-decorator":"FormItem","x-component":"Input","x-component-props":{placeholder:'{{t("target")}}'}},remove:{type:"void","x-decorator":"FormItem","x-component":"ArrayItems.Remove"}}}}},properties:{add:{type:"void",title:"Add","x-component":"ArrayItems.Addition"}}},userBindField:{type:"string",title:'{{t("Use this field to bind the user")}}',"x-component":"Select","x-decorator":"FormItem",default:"email",enum:[{label:w("Email"),value:"email"},{label:w("Username"),value:"username"}],required:!0}}},advanced:{type:"void","x-component":"FormTab.TabPane","x-component-props":{tab:w("Advanced configuration")},properties:{logout:{type:"boolean",title:'{{t("RP-initiated logout")}}',"x-component":"Checkbox","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("Performs logout on the issuer (uses end_session_endpoint in the issuer configuration)")}}'}},http:{type:"boolean",title:'{{t("HTTP")}}',"x-component":"Checkbox","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("Check if NocoBase is running on HTTP protocol")}}'}},port:{type:"number",title:'{{t("Port")}}',"x-component":"InputNumber","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("The port number of the NocoBase service if it is not 80 or 443")}}'},"x-component-props":{style:{width:"15%",minWidth:"100px"}}},stateToken:{type:"string",title:'{{t("State token")}}',"x-component":"Input","x-decorator":"FormItem",description:w("The state token helps prevent CSRF attacks. It's recommended to leave it blank for automatic random generation.")},exchangeBodyKeys:{type:"array",title:'{{t("Pass parameters in the authorization code grant exchange")}}',"x-decorator":"FormItem","x-component":"ArrayItems",default:[{paramName:"",optionsKey:"clientId"},{paramName:"",optionsKey:"clientSecret"}],items:{type:"object","x-decorator":"ArrayItems.Item",properties:{space:{type:"void","x-component":"Space",properties:{enabled:{type:"boolean","x-decorator":"FormItem","x-component":"Checkbox"},optionsKey:{type:"string","x-decorator":"FormItem","x-decorator-props":{style:{width:"100px"}},"x-component":"Select","x-read-pretty":!0,enum:[{label:w("Client ID"),value:"clientId"},{label:w("Client Secret"),value:"clientSecret"}]},paramName:{type:"string","x-decorator":"FormItem","x-component":"Input","x-component-props":{placeholder:'{{t("Parameter name")}}'}}}}}}},userInfoMethod:{type:"string",title:'{{t("Method to call the user info endpoint")}}',"x- decorator":"FormItem","x-component":"Radio.Group",default:"GET",enum:[{label:"GET",value:"GET"},{label:"POST",value:"POST"}],"x-reactions":[{dependencies:[".accessTokenVia"],when:'{{$deps[0] === "query"}}',fulfill:{state:{value:"GET"}}},{dependencies:[".accessTokenVia"],when:'{{$deps[0] === "body"}}',fulfill:{state:{value:"POST"}}}]},accessTokenVia:{type:"string",title:'{{t("Where to put the access token when calling the user info endpoint")}}',"x- decorator":"FormItem","x-component":"Radio.Group",default:"header",enum:[{label:w("Header"),value:"header"},{label:w("Body (Use with POST method)"),value:"body"},{label:w("Query parameters (Use with GET method)"),value:"query"}]}}}}}}},usage:{type:"void","x-component":"Usage"}}},A=(0,R.observer)(function(){var e=T().t,t=(0,f.useApp)(),r=(0,x.useMemo)(function(){return t.getApiUrl("oidc:redirect")},[t]),o=function(t){navigator.clipboard.writeText(t),h.message.success(e("Copied"))};return g().createElement(h.Card,{title:e("Usage"),type:"inner"},g().createElement(f.FormItem,{label:e("Redirect URL")},g().createElement(f.Input,{value:r,disabled:!0,addonBefore:g().createElement(v.CopyOutlined,{onClick:function(){return o(r)}})})))},{displayName:"Usage"}),_=function(){var e=T().t;return g().createElement(f.SchemaComponent,{scope:{t:e},components:{Usage:A,ArrayItems:j.ArrayItems,Space:h.Space,FormTab:j.FormTab},schema:q})};function U(e,t,r,o,n,i,a){try{var c=e[i](a),u=c.value}catch(e){r(e);return}c.done?t(u):Promise.resolve(u).then(o,n)}function B(e,t,r){return(B=z()?Reflect.construct:function(e,t,r){var o=[null];o.push.apply(o,t);var n=new(Function.bind.apply(e,o));return r&&G(n,r.prototype),n}).apply(null,arguments)}function M(e,t){for(var r=0;r<t.length;r++){var o=t[r];o.enumerable=o.enumerable||!1,o.configurable=!0,"value"in o&&(o.writable=!0),Object.defineProperty(e,o.key,o)}}function D(e){return(D=Object.setPrototypeOf?Object.getPrototypeOf:function(e){return e.__proto__||Object.getPrototypeOf(e)})(e)}function G(e,t){return(G=Object.setPrototypeOf||function(e,t){return e.__proto__=t,e})(e,t)}function H(e){var t="function"==typeof Map?new Map:void 0;return(H=function(e){var r;if(null===e||(r=e,-1===Function.toString.call(r).indexOf("[native code]")))return e;if("function"!=typeof e)throw TypeError("Super expression must either be null or a function");if(void 0!==t){if(t.has(e))return t.get(e);t.set(e,o)}function o(){return B(e,arguments,D(this).constructor)}return o.prototype=Object.create(e.prototype,{constructor:{value:o,enumerable:!1,writable:!0,configurable:!0}}),G(o,e)})(e)}function z(){try{var e=!Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){}))}catch(e){}return(z=function(){return!!e})()}var N=function(e){var t,r,o;function n(){var e,t,r;return!function(e,t){if(!(e instanceof t))throw TypeError("Cannot call a class as a function")}(this,n),e=this,t=n,r=arguments,t=D(t),function(e,t){return t&&("object"===function(e){return e&&"undefined"!=typeof Symbol&&e.constructor===Symbol?"symbol":typeof e}(t)||"function"==typeof t)?t:function(e){if(void 0===e)throw ReferenceError("this hasn't been initialised - super() hasn't been called");return e}(e)}(e,z()?Reflect.construct(t,r||[],D(e).constructor):t.apply(e,r))}return!function(e,t){if("function"!=typeof t&&null!==t)throw TypeError("Super expression must either be null or a function");e.prototype=Object.create(t&&t.prototype,{constructor:{value:e,writable:!0,configurable:!0}}),t&&G(e,t)}(n,e),t=n,r=[{key:"load",value:function(){var e,t=this;return(e=function(){return function(e,t){var r,o,n,i,a={label:0,sent:function(){if(1&n[0])throw n[1];return n[1]},trys:[],ops:[]};return i={next:c(0),throw:c(1),return:c(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function c(i){return function(c){return function(i){if(r)throw TypeError("Generator is already executing.");for(;a;)try{if(r=1,o&&(n=2&i[0]?o.return:i[0]?o.throw||((n=o.return)&&n.call(o),0):o.next)&&!(n=n.call(o,i[1])).done)return n;switch(o=0,n&&(i=[2&i[0],n.value]),i[0]){case 0:case 1:n=i;break;case 4:return a.label++,{value:i[1],done:!1};case 5:a.label++,o=i[1],i=[0];continue;case 7:i=a.ops.pop(),a.trys.pop();continue;default:if(!(n=(n=a.trys).length>0&&n[n.length-1])&&(6===i[0]||2===i[0])){a=0;continue}if(3===i[0]&&(!n||i[1]>n[0]&&i[1]<n[3])){a.label=i[1];break}if(6===i[0]&&a.label<n[1]){a.label=n[1],n=i;break}if(n&&a.label<n[2]){a.label=n[2],a.ops.push(i);break}n[2]&&a.ops.pop(),a.trys.pop();continue}i=t.call(e,a)}catch(e){i=[6,e],o=0}finally{r=n=0}if(5&i[0])throw i[1];return{value:i[0]?i[1]:void 0,done:!0}}([i,c])}}}(this,function(e){return t.app.pm.get(y()).registerType("OIDC+",{components:{SignInButton:E,AdminSettingsForm:_}}),[2]})},function(){var t=this,r=arguments;return new Promise(function(o,n){var i=e.apply(t,r);function a(e){U(i,o,n,a,c,"next",e)}function c(e){U(i,o,n,a,c,"throw",e)}a(void 0)})})()}}],M(t.prototype,r),n}(H(f.Plugin)),L=N;return d}()});
|
|
10
|
+
!function(e,t){"object"==typeof exports&&"object"==typeof module?module.exports=t(require("react-i18next"),require("@nocobase/plugin-auth/client"),require("@nocobase/client"),require("react-router-dom"),require("react"),require("@formily/antd-v5"),require("@formily/react"),require("@ant-design/icons"),require("antd")):"function"==typeof define&&define.amd?define("@typekcz-nocobase-plugins/plugin-oidc-plus",["react-i18next","@nocobase/plugin-auth/client","@nocobase/client","react-router-dom","react","@formily/antd-v5","@formily/react","@ant-design/icons","antd"],t):"object"==typeof exports?exports["@typekcz-nocobase-plugins/plugin-oidc-plus"]=t(require("react-i18next"),require("@nocobase/plugin-auth/client"),require("@nocobase/client"),require("react-router-dom"),require("react"),require("@formily/antd-v5"),require("@formily/react"),require("@ant-design/icons"),require("antd")):e["@typekcz-nocobase-plugins/plugin-oidc-plus"]=t(e["react-i18next"],e["@nocobase/plugin-auth/client"],e["@nocobase/client"],e["react-router-dom"],e.react,e["@formily/antd-v5"],e["@formily/react"],e["@ant-design/icons"],e.antd)}(self,function(e,t,r,o,n,i,a,c,u){return function(){"use strict";var l={482:function(e){e.exports=c},632:function(e){e.exports=i},505:function(e){e.exports=a},772:function(e){e.exports=r},689:function(e){e.exports=t},721:function(e){e.exports=u},156:function(e){e.exports=n},238:function(t){t.exports=e},128:function(e){e.exports=o}},p={};function s(e){var t=p[e];if(void 0!==t)return t.exports;var r=p[e]={exports:{}};return l[e](r,r.exports,s),r.exports}s.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return s.d(t,{a:t}),t},s.d=function(e,t){for(var r in t)s.o(t,r)&&!s.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},s.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},s.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})};var d={};return!function(){s.r(d),s.d(d,{default:function(){return R},PluginOIDCClient:function(){return j}});var e=s(772),t=s(689),r=s.n(t),o="tnp_oidc_plus_logout",n=s(482),i=s(721),a=s(156),c=s.n(a),u=s(238),l="oidc";function p(t){return e.i18n.t(t,{ns:l})}function f(){return(0,u.useTranslation)(l)}var m=s(128);function y(e){for(var t=1;t<arguments.length;t++){var r=arguments[t];for(var o in r)e[o]=r[o]}return e}var b=function e(t,r){function o(e,o,n){if("undefined"!=typeof document){"number"==typeof(n=y({},r,n)).expires&&(n.expires=new Date(Date.now()+864e5*n.expires)),n.expires&&(n.expires=n.expires.toUTCString()),e=encodeURIComponent(e).replace(/%(2[346B]|5E|60|7C)/g,decodeURIComponent).replace(/[()]/g,escape);var i="";for(var a in n)n[a]&&(i+="; "+a,!0!==n[a]&&(i+="="+n[a].split(";")[0]));return document.cookie=e+"="+t.write(o,e)+i}}return Object.create({set:o,get:function(e){if("undefined"!=typeof document&&(!arguments.length||e)){for(var r=document.cookie?document.cookie.split("; "):[],o={},n=0;n<r.length;n++){var i=r[n].split("="),a=i.slice(1).join("=");try{var c=decodeURIComponent(i[0]);if(o[c]=t.read(a,c),e===c)break}catch(e){}}return e?o[e]:o}},remove:function(e,t){o(e,"",y({},t,{expires:-1}))},withAttributes:function(t){return e(this.converter,y({},this.attributes,t))},withConverter:function(t){return e(y({},this.converter,t),this.attributes)}},{attributes:{value:Object.freeze(r)},converter:{value:Object.freeze(t)}})}({read:function(e){return'"'===e[0]&&(e=e.slice(1,-1)),e.replace(/(%[\dA-F]{2})+/gi,decodeURIComponent)},write:function(e){return encodeURIComponent(e).replace(/%(2[346BF]|3[AC-F]|40|5[BDE]|60|7[BCD])/g,decodeURIComponent)}},{path:"/"});function v(e,t,r,o,n,i,a){try{var c=e[i](a),u=c.value}catch(e){r(e);return}c.done?t(u):Promise.resolve(u).then(o,n)}function h(){var e,t,r=(e=["\n display: flex;\n "],t||(t=e.slice(0)),Object.freeze(Object.defineProperties(e,{raw:{value:Object.freeze(t)}})));return h=function(){return r},r}var x=function(t){var r,u,l=t.authenticator,p=f().t,s=(0,e.useAPIClient)(),d=new URLSearchParams((0,m.useLocation)().search),y=d.get("redirect"),x=(r=function(){var e,t,r;return function(e,t){var r,o,n,i,a={label:0,sent:function(){if(1&n[0])throw n[1];return n[1]},trys:[],ops:[]};return i={next:c(0),throw:c(1),return:c(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function c(i){return function(c){var u=[i,c];if(r)throw TypeError("Generator is already executing.");for(;a;)try{if(r=1,o&&(n=2&u[0]?o.return:u[0]?o.throw||((n=o.return)&&n.call(o),0):o.next)&&!(n=n.call(o,u[1])).done)return n;switch(o=0,n&&(u=[2&u[0],n.value]),u[0]){case 0:case 1:n=u;break;case 4:return a.label++,{value:u[1],done:!1};case 5:a.label++,o=u[1],u=[0];continue;case 7:u=a.ops.pop(),a.trys.pop();continue;default:if(!(n=(n=a.trys).length>0&&n[n.length-1])&&(6===u[0]||2===u[0])){a=0;continue}if(3===u[0]&&(!n||u[1]>n[0]&&u[1]<n[3])){a.label=u[1];break}if(6===u[0]&&a.label<n[1]){a.label=n[1],n=u;break}if(n&&a.label<n[2]){a.label=n[2],a.ops.push(u);break}n[2]&&a.ops.pop(),a.trys.pop();continue}u=t.call(e,a)}catch(e){u=[6,e],o=0}finally{r=n=0}if(5&u[0])throw u[1];return{value:u[0]?u[1]:void 0,done:!0}}}}(this,function(o){switch(o.label){case 0:return[4,s.request({method:"post",url:"oidc:getAuthUrl",headers:{"X-Authenticator":l.name},data:{redirect:y}})];case 1:return r=null==(t=o.sent())||null==(e=t.data)?void 0:e.data,window.location.replace(r),[2]}})},u=function(){var e=this,t=arguments;return new Promise(function(o,n){var i=r.apply(e,t);function a(e){v(i,o,n,a,c,"next",e)}function c(e){v(i,o,n,a,c,"throw",e)}a(void 0)})},function(){return u.apply(this,arguments)});return(0,a.useEffect)(function(){var e=b.get(o);if(e){var t=new URL(e);t.searchParams.set("post_logout_redirect_uri",window.location.href),b.remove(o,{domain:window.location.hostname}),window.location.href=t.href}var r=d.get("authenticator"),n=d.get("error");if(r===l.name&&n)return void i.message.error(p(n))}),c().createElement(i.Space,{direction:"vertical",className:(0,e.css)(h())},c().createElement(i.Button,{shape:"round",block:!0,icon:c().createElement(n.LoginOutlined,null),onClick:x},p(l.title)))},g=s(632),S=s(505),I={type:"object",properties:{public:{type:"object",properties:{autoSignup:{"x-decorator":"FormItem",type:"boolean",title:'{{t("Sign up automatically when the user does not exist")}}',"x-component":"Checkbox",default:!0}}},oidc:{type:"object",properties:{collapse:{type:"void","x-component":"FormTab",properties:{basic:{type:"void","x-component":"FormTab.TabPane","x-component-props":{tab:p("Basic configuration")},properties:{issuer:{type:"string",title:'{{t("Issuer")}}',"x-component":"Input","x-decorator":"FormItem",required:!0},clientId:{type:"string",title:'{{t("Client ID")}}',"x-component":"Input","x-decorator":"FormItem",required:!0},clientSecret:{type:"string",title:'{{t("Client Secret")}}',"x-component":"Input","x-decorator":"FormItem",required:!0},scope:{type:"string",title:'{{t("scope")}}',"x-component":"Input","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("Default: openid profile email")}}'}},idTokenSignedResponseAlg:{type:"string",title:'{{t("id_token signed response algorithm")}}',"x-component":"Select","x-decorator":"FormItem",enum:[{label:"HS256",value:"HS256"},{label:"HS384",value:"HS384"},{label:"HS512",value:"HS512"},{label:"RS256",value:"RS256"},{label:"RS384",value:"RS384"},{label:"RS512",value:"RS512"},{label:"ES256",value:"ES256"},{label:"ES384",value:"ES384"},{label:"ES512",value:"ES512"},{label:"PS256",value:"PS256"},{label:"PS384",value:"PS384"},{label:"PS512",value:"PS512"}]}}},mapping:{type:"void","x-component":"FormTab.TabPane","x-component-props":{tab:p("Field mapping")},properties:{fieldMap:{title:'{{t("Field Map")}}',type:"array","x-decorator":"FormItem","x-component":"ArrayItems",items:{type:"object","x-decorator":"ArrayItems.Item",properties:{space:{type:"void","x-component":"Space",properties:{source:{type:"string","x-decorator":"FormItem","x-component":"Input","x-component-props":{placeholder:'{{t("source")}}'}},target:{type:"string","x-decorator":"FormItem","x-component":"Input","x-component-props":{placeholder:'{{t("target")}}'}},remove:{type:"void","x-decorator":"FormItem","x-component":"ArrayItems.Remove"}}}}},properties:{add:{type:"void",title:"Add","x-component":"ArrayItems.Addition"}}},userBindField:{type:"string",title:'{{t("Use this field to bind the user")}}',"x-component":"Select","x-decorator":"FormItem",default:"email",enum:[{label:p("Email"),value:"email"},{label:p("Username"),value:"username"}],required:!0}}},advanced:{type:"void","x-component":"FormTab.TabPane","x-component-props":{tab:p("Advanced configuration")},properties:{logout:{type:"boolean",title:'{{t("RP-initiated logout")}}',"x-component":"Checkbox","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("Performs logout on the issuer (uses end_session_endpoint in the issuer configuration)")}}'}},http:{type:"boolean",title:'{{t("HTTP")}}',"x-component":"Checkbox","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("Check if NocoBase is running on HTTP protocol")}}'}},port:{type:"number",title:'{{t("Port")}}',"x-component":"InputNumber","x-decorator":"FormItem","x-decorator-props":{tooltip:'{{t("The port number of the NocoBase service if it is not 80 or 443")}}'},"x-component-props":{style:{width:"15%",minWidth:"100px"}}},stateToken:{type:"string",title:'{{t("State token")}}',"x-component":"Input","x-decorator":"FormItem",description:p("The state token helps prevent CSRF attacks. It's recommended to leave it blank for automatic random generation.")},exchangeBodyKeys:{type:"array",title:'{{t("Pass parameters in the authorization code grant exchange")}}',"x-decorator":"FormItem","x-component":"ArrayItems",default:[{paramName:"",optionsKey:"clientId"},{paramName:"",optionsKey:"clientSecret"}],items:{type:"object","x-decorator":"ArrayItems.Item",properties:{space:{type:"void","x-component":"Space",properties:{enabled:{type:"boolean","x-decorator":"FormItem","x-component":"Checkbox"},optionsKey:{type:"string","x-decorator":"FormItem","x-decorator-props":{style:{width:"100px"}},"x-component":"Select","x-read-pretty":!0,enum:[{label:p("Client ID"),value:"clientId"},{label:p("Client Secret"),value:"clientSecret"}]},paramName:{type:"string","x-decorator":"FormItem","x-component":"Input","x-component-props":{placeholder:'{{t("Parameter name")}}'}}}}}}},userInfoMethod:{type:"string",title:'{{t("Method to call the user info endpoint")}}',"x- decorator":"FormItem","x-component":"Radio.Group",default:"GET",enum:[{label:"GET",value:"GET"},{label:"POST",value:"POST"}],"x-reactions":[{dependencies:[".accessTokenVia"],when:'{{$deps[0] === "query"}}',fulfill:{state:{value:"GET"}}},{dependencies:[".accessTokenVia"],when:'{{$deps[0] === "body"}}',fulfill:{state:{value:"POST"}}}]},accessTokenVia:{type:"string",title:'{{t("Where to put the access token when calling the user info endpoint")}}',"x- decorator":"FormItem","x-component":"Radio.Group",default:"header",enum:[{label:p("Header"),value:"header"},{label:p("Body (Use with POST method)"),value:"body"},{label:p("Query parameters (Use with GET method)"),value:"query"}]}}}}}}},usage:{type:"void","x-component":"Usage"}}},w=(0,S.observer)(function(){var t=f().t,r=(0,e.useApp)(),o=(0,a.useMemo)(function(){return r.getApiUrl("oidc:redirect")},[r]),u=function(e){navigator.clipboard.writeText(e),i.message.success(t("Copied"))};return c().createElement(i.Card,{title:t("Usage"),type:"inner"},c().createElement(e.FormItem,{label:t("Redirect URL")},c().createElement(e.Input,{value:o,disabled:!0,addonBefore:c().createElement(n.CopyOutlined,{onClick:function(){return u(o)}})})))},{displayName:"Usage"}),T=function(){var t=f().t;return c().createElement(e.SchemaComponent,{scope:{t:t},components:{Usage:w,ArrayItems:g.ArrayItems,Space:i.Space,FormTab:g.FormTab},schema:I})};function P(e,t,r,o,n,i,a){try{var c=e[i](a),u=c.value}catch(e){r(e);return}c.done?t(u):Promise.resolve(u).then(o,n)}function F(e,t,r){return(F=E()?Reflect.construct:function(e,t,r){var o=[null];o.push.apply(o,t);var n=new(Function.bind.apply(e,o));return r&&C(n,r.prototype),n}).apply(null,arguments)}function k(e){return(k=Object.setPrototypeOf?Object.getPrototypeOf:function(e){return e.__proto__||Object.getPrototypeOf(e)})(e)}function C(e,t){return(C=Object.setPrototypeOf||function(e,t){return e.__proto__=t,e})(e,t)}function O(e){var t="function"==typeof Map?new Map:void 0;return(O=function(e){if(null===e||-1===Function.toString.call(e).indexOf("[native code]"))return e;if("function"!=typeof e)throw TypeError("Super expression must either be null or a function");if(void 0!==t){if(t.has(e))return t.get(e);t.set(e,r)}function r(){return F(e,arguments,k(this).constructor)}return r.prototype=Object.create(e.prototype,{constructor:{value:r,enumerable:!1,writable:!0,configurable:!0}}),C(r,e)})(e)}function E(){try{var e=!Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){}))}catch(e){}return(E=function(){return!!e})()}var j=function(e){var t;if("function"!=typeof e&&null!==e)throw TypeError("Super expression must either be null or a function");function o(){var e,t;if(!(this instanceof o))throw TypeError("Cannot call a class as a function");return e=o,t=arguments,e=k(e),function(e,t){var r;if(t&&("object"==((r=t)&&"undefined"!=typeof Symbol&&r.constructor===Symbol?"symbol":typeof r)||"function"==typeof t))return t;if(void 0===e)throw ReferenceError("this hasn't been initialised - super() hasn't been called");return e}(this,E()?Reflect.construct(e,t||[],k(this).constructor):e.apply(this,t))}return o.prototype=Object.create(e&&e.prototype,{constructor:{value:o,writable:!0,configurable:!0}}),e&&C(o,e),t=[{key:"load",value:function(){var e,t=this;return(e=function(){return function(e,t){var r,o,n,i,a={label:0,sent:function(){if(1&n[0])throw n[1];return n[1]},trys:[],ops:[]};return i={next:c(0),throw:c(1),return:c(2)},"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function c(i){return function(c){var u=[i,c];if(r)throw TypeError("Generator is already executing.");for(;a;)try{if(r=1,o&&(n=2&u[0]?o.return:u[0]?o.throw||((n=o.return)&&n.call(o),0):o.next)&&!(n=n.call(o,u[1])).done)return n;switch(o=0,n&&(u=[2&u[0],n.value]),u[0]){case 0:case 1:n=u;break;case 4:return a.label++,{value:u[1],done:!1};case 5:a.label++,o=u[1],u=[0];continue;case 7:u=a.ops.pop(),a.trys.pop();continue;default:if(!(n=(n=a.trys).length>0&&n[n.length-1])&&(6===u[0]||2===u[0])){a=0;continue}if(3===u[0]&&(!n||u[1]>n[0]&&u[1]<n[3])){a.label=u[1];break}if(6===u[0]&&a.label<n[1]){a.label=n[1],n=u;break}if(n&&a.label<n[2]){a.label=n[2],a.ops.push(u);break}n[2]&&a.ops.pop(),a.trys.pop();continue}u=t.call(e,a)}catch(e){u=[6,e],o=0}finally{r=n=0}if(5&u[0])throw u[1];return{value:u[0]?u[1]:void 0,done:!0}}}}(this,function(e){return t.app.pm.get(r()).registerType("OIDC+",{components:{SignInButton:x,AdminSettingsForm:T}}),[2]})},function(){var t=this,r=arguments;return new Promise(function(o,n){var i=e.apply(t,r);function a(e){P(i,o,n,a,c,"next",e)}function c(e){P(i,o,n,a,c,"throw",e)}a(void 0)})})()}}],function(e,t){for(var r=0;r<t.length;r++){var o=t[r];o.enumerable=o.enumerable||!1,o.configurable=!0,"value"in o&&(o.writable=!0),Object.defineProperty(e,o.key,o)}}(o.prototype,t),o}(O(e.Plugin)),R=j}(),d}()});
|
package/dist/externalVersion.js
CHANGED
|
@@ -8,16 +8,16 @@
|
|
|
8
8
|
*/
|
|
9
9
|
|
|
10
10
|
module.exports = {
|
|
11
|
-
"@ant-design/icons": "5.
|
|
12
|
-
"@nocobase/client": "1.5
|
|
13
|
-
"antd": "5.
|
|
11
|
+
"@ant-design/icons": "5.6.1",
|
|
12
|
+
"@nocobase/client": "1.9.5",
|
|
13
|
+
"antd": "5.24.2",
|
|
14
14
|
"react": "18.2.0",
|
|
15
|
-
"react-router-dom": "6.
|
|
16
|
-
"@nocobase/plugin-auth": "1.5
|
|
17
|
-
"@formily/antd-v5": "1.
|
|
15
|
+
"react-router-dom": "6.28.1",
|
|
16
|
+
"@nocobase/plugin-auth": "1.9.5",
|
|
17
|
+
"@formily/antd-v5": "1.2.3",
|
|
18
18
|
"@formily/react": "2.3.0",
|
|
19
|
-
"@nocobase/auth": "1.5
|
|
20
|
-
"@nocobase/server": "1.5
|
|
19
|
+
"@nocobase/auth": "1.9.5",
|
|
20
|
+
"@nocobase/server": "1.9.5",
|
|
21
21
|
"react-i18next": "11.18.6",
|
|
22
|
-
"@nocobase/actions": "1.5
|
|
22
|
+
"@nocobase/actions": "1.9.5"
|
|
23
23
|
};
|
|
@@ -1,61 +1,27 @@
|
|
|
1
1
|
let random = async bytes => crypto.getRandomValues(new Uint8Array(bytes))
|
|
2
|
-
|
|
3
2
|
let customAlphabet = (alphabet, defaultSize = 21) => {
|
|
4
|
-
// First, a bitmask is necessary to generate the ID. The bitmask makes bytes
|
|
5
|
-
// values closer to the alphabet size. The bitmask calculates the closest
|
|
6
|
-
// `2^31 - 1` number, which exceeds the alphabet size.
|
|
7
|
-
// For example, the bitmask for the alphabet size 30 is 31 (00011111).
|
|
8
|
-
// `Math.clz32` is not used, because it is not available in browsers.
|
|
9
3
|
let mask = (2 << (Math.log(alphabet.length - 1) / Math.LN2)) - 1
|
|
10
|
-
// Though, the bitmask solution is not perfect since the bytes exceeding
|
|
11
|
-
// the alphabet size are refused. Therefore, to reliably generate the ID,
|
|
12
|
-
// the random bytes redundancy has to be satisfied.
|
|
13
|
-
|
|
14
|
-
// Note: every hardware random generator call is performance expensive,
|
|
15
|
-
// because the system call for entropy collection takes a lot of time.
|
|
16
|
-
// So, to avoid additional system calls, extra bytes are requested in advance.
|
|
17
|
-
|
|
18
|
-
// Next, a step determines how many random bytes to generate.
|
|
19
|
-
// The number of random bytes gets decided upon the ID size, mask,
|
|
20
|
-
// alphabet size, and magic number 1.6 (using 1.6 peaks at performance
|
|
21
|
-
// according to benchmarks).
|
|
22
|
-
|
|
23
|
-
// `-~f => Math.ceil(f)` if f is a float
|
|
24
|
-
// `-~i => i + 1` if i is an integer
|
|
25
4
|
let step = -~((1.6 * mask * defaultSize) / alphabet.length)
|
|
26
|
-
|
|
27
5
|
return async (size = defaultSize) => {
|
|
28
6
|
let id = ''
|
|
29
7
|
while (true) {
|
|
30
8
|
let bytes = crypto.getRandomValues(new Uint8Array(step))
|
|
31
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
32
9
|
let i = step | 0
|
|
33
10
|
while (i--) {
|
|
34
|
-
// Adding `|| ''` refuses a random byte that exceeds the alphabet size.
|
|
35
11
|
id += alphabet[bytes[i] & mask] || ''
|
|
36
12
|
if (id.length === size) return id
|
|
37
13
|
}
|
|
38
14
|
}
|
|
39
15
|
}
|
|
40
16
|
}
|
|
41
|
-
|
|
42
17
|
let nanoid = async (size = 21) => {
|
|
43
18
|
let id = ''
|
|
44
19
|
let bytes = crypto.getRandomValues(new Uint8Array((size |= 0)))
|
|
45
|
-
|
|
46
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
47
20
|
while (size--) {
|
|
48
|
-
// It is incorrect to use bytes exceeding the alphabet size.
|
|
49
|
-
// The following mask reduces the random byte in the 0-255 value
|
|
50
|
-
// range to the 0-63 value range. Therefore, adding hacks, such
|
|
51
|
-
// as empty string fallback or magic numbers, is unneccessary because
|
|
52
|
-
// the bitmask trims bytes down to the alphabet size.
|
|
53
21
|
let byte = bytes[size] & 63
|
|
54
22
|
if (byte < 36) {
|
|
55
|
-
// `0-9a-z`
|
|
56
23
|
id += byte.toString(36)
|
|
57
24
|
} else if (byte < 62) {
|
|
58
|
-
// `A-Z`
|
|
59
25
|
id += (byte - 26).toString(36).toUpperCase()
|
|
60
26
|
} else if (byte < 63) {
|
|
61
27
|
id += '_'
|
|
@@ -65,5 +31,4 @@ let nanoid = async (size = 21) => {
|
|
|
65
31
|
}
|
|
66
32
|
return id
|
|
67
33
|
}
|
|
68
|
-
|
|
69
34
|
export { nanoid, customAlphabet, random }
|
|
@@ -1,14 +1,7 @@
|
|
|
1
1
|
import crypto from 'crypto'
|
|
2
|
-
|
|
3
2
|
import { urlAlphabet } from '../url-alphabet/index.js'
|
|
4
|
-
|
|
5
|
-
// `crypto.randomFill()` is a little faster than `crypto.randomBytes()`,
|
|
6
|
-
// because it is possible to use in combination with `Buffer.allocUnsafe()`.
|
|
7
3
|
let random = bytes =>
|
|
8
4
|
new Promise((resolve, reject) => {
|
|
9
|
-
// `Buffer.allocUnsafe()` is faster because it doesn’t flush the memory.
|
|
10
|
-
// Memory flushing is unnecessary since the buffer allocation itself resets
|
|
11
|
-
// the memory with the new bytes.
|
|
12
5
|
crypto.randomFill(Buffer.allocUnsafe(bytes), (err, buf) => {
|
|
13
6
|
if (err) {
|
|
14
7
|
reject(err)
|
|
@@ -17,55 +10,26 @@ let random = bytes =>
|
|
|
17
10
|
}
|
|
18
11
|
})
|
|
19
12
|
})
|
|
20
|
-
|
|
21
13
|
let customAlphabet = (alphabet, defaultSize = 21) => {
|
|
22
|
-
// First, a bitmask is necessary to generate the ID. The bitmask makes bytes
|
|
23
|
-
// values closer to the alphabet size. The bitmask calculates the closest
|
|
24
|
-
// `2^31 - 1` number, which exceeds the alphabet size.
|
|
25
|
-
// For example, the bitmask for the alphabet size 30 is 31 (00011111).
|
|
26
14
|
let mask = (2 << (31 - Math.clz32((alphabet.length - 1) | 1))) - 1
|
|
27
|
-
// Though, the bitmask solution is not perfect since the bytes exceeding
|
|
28
|
-
// the alphabet size are refused. Therefore, to reliably generate the ID,
|
|
29
|
-
// the random bytes redundancy has to be satisfied.
|
|
30
|
-
|
|
31
|
-
// Note: every hardware random generator call is performance expensive,
|
|
32
|
-
// because the system call for entropy collection takes a lot of time.
|
|
33
|
-
// So, to avoid additional system calls, extra bytes are requested in advance.
|
|
34
|
-
|
|
35
|
-
// Next, a step determines how many random bytes to generate.
|
|
36
|
-
// The number of random bytes gets decided upon the ID size, mask,
|
|
37
|
-
// alphabet size, and magic number 1.6 (using 1.6 peaks at performance
|
|
38
|
-
// according to benchmarks).
|
|
39
15
|
let step = Math.ceil((1.6 * mask * defaultSize) / alphabet.length)
|
|
40
|
-
|
|
41
16
|
let tick = (id, size = defaultSize) =>
|
|
42
17
|
random(step).then(bytes => {
|
|
43
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
44
18
|
let i = step
|
|
45
19
|
while (i--) {
|
|
46
|
-
// Adding `|| ''` refuses a random byte that exceeds the alphabet size.
|
|
47
20
|
id += alphabet[bytes[i] & mask] || ''
|
|
48
21
|
if (id.length >= size) return id
|
|
49
22
|
}
|
|
50
23
|
return tick(id, size)
|
|
51
24
|
})
|
|
52
|
-
|
|
53
25
|
return size => tick('', size)
|
|
54
26
|
}
|
|
55
|
-
|
|
56
27
|
let nanoid = (size = 21) =>
|
|
57
28
|
random((size |= 0)).then(bytes => {
|
|
58
29
|
let id = ''
|
|
59
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
60
30
|
while (size--) {
|
|
61
|
-
// It is incorrect to use bytes exceeding the alphabet size.
|
|
62
|
-
// The following mask reduces the random byte in the 0-255 value
|
|
63
|
-
// range to the 0-63 value range. Therefore, adding hacks, such
|
|
64
|
-
// as empty string fallback or magic numbers, is unneccessary because
|
|
65
|
-
// the bitmask trims bytes down to the alphabet size.
|
|
66
31
|
id += urlAlphabet[bytes[size] & 63]
|
|
67
32
|
}
|
|
68
33
|
return id
|
|
69
34
|
})
|
|
70
|
-
|
|
71
35
|
export { nanoid, customAlphabet, random }
|
|
@@ -1,57 +1,26 @@
|
|
|
1
1
|
import { getRandomBytesAsync } from 'expo-random'
|
|
2
|
-
|
|
3
2
|
import { urlAlphabet } from '../url-alphabet/index.js'
|
|
4
|
-
|
|
5
3
|
let random = getRandomBytesAsync
|
|
6
|
-
|
|
7
4
|
let customAlphabet = (alphabet, defaultSize = 21) => {
|
|
8
|
-
// First, a bitmask is necessary to generate the ID. The bitmask makes bytes
|
|
9
|
-
// values closer to the alphabet size. The bitmask calculates the closest
|
|
10
|
-
// `2^31 - 1` number, which exceeds the alphabet size.
|
|
11
|
-
// For example, the bitmask for the alphabet size 30 is 31 (00011111).
|
|
12
5
|
let mask = (2 << (31 - Math.clz32((alphabet.length - 1) | 1))) - 1
|
|
13
|
-
// Though, the bitmask solution is not perfect since the bytes exceeding
|
|
14
|
-
// the alphabet size are refused. Therefore, to reliably generate the ID,
|
|
15
|
-
// the random bytes redundancy has to be satisfied.
|
|
16
|
-
|
|
17
|
-
// Note: every hardware random generator call is performance expensive,
|
|
18
|
-
// because the system call for entropy collection takes a lot of time.
|
|
19
|
-
// So, to avoid additional system calls, extra bytes are requested in advance.
|
|
20
|
-
|
|
21
|
-
// Next, a step determines how many random bytes to generate.
|
|
22
|
-
// The number of random bytes gets decided upon the ID size, mask,
|
|
23
|
-
// alphabet size, and magic number 1.6 (using 1.6 peaks at performance
|
|
24
|
-
// according to benchmarks).
|
|
25
6
|
let step = Math.ceil((1.6 * mask * defaultSize) / alphabet.length)
|
|
26
|
-
|
|
27
7
|
let tick = (id, size = defaultSize) =>
|
|
28
8
|
random(step).then(bytes => {
|
|
29
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
30
9
|
let i = step
|
|
31
10
|
while (i--) {
|
|
32
|
-
// Adding `|| ''` refuses a random byte that exceeds the alphabet size.
|
|
33
11
|
id += alphabet[bytes[i] & mask] || ''
|
|
34
12
|
if (id.length >= size) return id
|
|
35
13
|
}
|
|
36
14
|
return tick(id, size)
|
|
37
15
|
})
|
|
38
|
-
|
|
39
16
|
return size => tick('', size)
|
|
40
17
|
}
|
|
41
|
-
|
|
42
18
|
let nanoid = (size = 21) =>
|
|
43
19
|
random((size |= 0)).then(bytes => {
|
|
44
20
|
let id = ''
|
|
45
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
46
21
|
while (size--) {
|
|
47
|
-
// It is incorrect to use bytes exceeding the alphabet size.
|
|
48
|
-
// The following mask reduces the random byte in the 0-255 value
|
|
49
|
-
// range to the 0-63 value range. Therefore, adding hacks, such
|
|
50
|
-
// as empty string fallback or magic numbers, is unneccessary because
|
|
51
|
-
// the bitmask trims bytes down to the alphabet size.
|
|
52
22
|
id += urlAlphabet[bytes[size] & 63]
|
|
53
23
|
}
|
|
54
24
|
return id
|
|
55
25
|
})
|
|
56
|
-
|
|
57
26
|
export { nanoid, customAlphabet, random }
|
|
@@ -1,65 +1,28 @@
|
|
|
1
|
-
// This file replaces `index.js` in bundlers like webpack or Rollup,
|
|
2
|
-
// according to `browser` config in `package.json`.
|
|
3
|
-
|
|
4
1
|
import { urlAlphabet } from './url-alphabet/index.js'
|
|
5
|
-
|
|
6
2
|
let random = bytes => crypto.getRandomValues(new Uint8Array(bytes))
|
|
7
|
-
|
|
8
3
|
let customRandom = (alphabet, defaultSize, getRandom) => {
|
|
9
|
-
// First, a bitmask is necessary to generate the ID. The bitmask makes bytes
|
|
10
|
-
// values closer to the alphabet size. The bitmask calculates the closest
|
|
11
|
-
// `2^31 - 1` number, which exceeds the alphabet size.
|
|
12
|
-
// For example, the bitmask for the alphabet size 30 is 31 (00011111).
|
|
13
|
-
// `Math.clz32` is not used, because it is not available in browsers.
|
|
14
4
|
let mask = (2 << (Math.log(alphabet.length - 1) / Math.LN2)) - 1
|
|
15
|
-
// Though, the bitmask solution is not perfect since the bytes exceeding
|
|
16
|
-
// the alphabet size are refused. Therefore, to reliably generate the ID,
|
|
17
|
-
// the random bytes redundancy has to be satisfied.
|
|
18
|
-
|
|
19
|
-
// Note: every hardware random generator call is performance expensive,
|
|
20
|
-
// because the system call for entropy collection takes a lot of time.
|
|
21
|
-
// So, to avoid additional system calls, extra bytes are requested in advance.
|
|
22
|
-
|
|
23
|
-
// Next, a step determines how many random bytes to generate.
|
|
24
|
-
// The number of random bytes gets decided upon the ID size, mask,
|
|
25
|
-
// alphabet size, and magic number 1.6 (using 1.6 peaks at performance
|
|
26
|
-
// according to benchmarks).
|
|
27
|
-
|
|
28
|
-
// `-~f => Math.ceil(f)` if f is a float
|
|
29
|
-
// `-~i => i + 1` if i is an integer
|
|
30
5
|
let step = -~((1.6 * mask * defaultSize) / alphabet.length)
|
|
31
|
-
|
|
32
6
|
return (size = defaultSize) => {
|
|
33
7
|
let id = ''
|
|
34
8
|
while (true) {
|
|
35
9
|
let bytes = getRandom(step)
|
|
36
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
37
10
|
let j = step | 0
|
|
38
11
|
while (j--) {
|
|
39
|
-
// Adding `|| ''` refuses a random byte that exceeds the alphabet size.
|
|
40
12
|
id += alphabet[bytes[j] & mask] || ''
|
|
41
13
|
if (id.length === size) return id
|
|
42
14
|
}
|
|
43
15
|
}
|
|
44
16
|
}
|
|
45
17
|
}
|
|
46
|
-
|
|
47
18
|
let customAlphabet = (alphabet, size = 21) =>
|
|
48
19
|
customRandom(alphabet, size, random)
|
|
49
|
-
|
|
50
20
|
let nanoid = (size = 21) =>
|
|
51
21
|
crypto.getRandomValues(new Uint8Array(size)).reduce((id, byte) => {
|
|
52
|
-
// It is incorrect to use bytes exceeding the alphabet size.
|
|
53
|
-
// The following mask reduces the random byte in the 0-255 value
|
|
54
|
-
// range to the 0-63 value range. Therefore, adding hacks, such
|
|
55
|
-
// as empty string fallback or magic numbers, is unneccessary because
|
|
56
|
-
// the bitmask trims bytes down to the alphabet size.
|
|
57
22
|
byte &= 63
|
|
58
23
|
if (byte < 36) {
|
|
59
|
-
// `0-9a-z`
|
|
60
24
|
id += byte.toString(36)
|
|
61
25
|
} else if (byte < 62) {
|
|
62
|
-
// `A-Z`
|
|
63
26
|
id += (byte - 26).toString(36).toUpperCase()
|
|
64
27
|
} else if (byte > 62) {
|
|
65
28
|
id += '-'
|
|
@@ -68,5 +31,4 @@ let nanoid = (size = 21) =>
|
|
|
68
31
|
}
|
|
69
32
|
return id
|
|
70
33
|
}, '')
|
|
71
|
-
|
|
72
34
|
export { nanoid, customAlphabet, customRandom, urlAlphabet, random }
|
|
@@ -1 +1 @@
|
|
|
1
|
-
(function(){var e={113:function(e){"use strict";e.exports=require("crypto")},
|
|
1
|
+
(function(){var e={113:function(e){"use strict";e.exports=require("crypto")},592:function(e,t,r){let l=r(113);let{urlAlphabet:n}=r(651);const a=128;let u,i;let fillPool=e=>{if(!u||u.length<e){u=Buffer.allocUnsafe(e*a);l.randomFillSync(u);i=0}else if(i+e>u.length){l.randomFillSync(u);i=0}i+=e};let random=e=>{fillPool(e|=0);return u.subarray(i-e,i)};let customRandom=(e,t,r)=>{let l=(2<<31-Math.clz32(e.length-1|1))-1;let n=Math.ceil(1.6*l*t/e.length);return(a=t)=>{let u="";while(true){let t=r(n);let i=n;while(i--){u+=e[t[i]&l]||"";if(u.length===a)return u}}}};let customAlphabet=(e,t=21)=>customRandom(e,t,random);let nanoid=(e=21)=>{fillPool(e|=0);let t="";for(let r=i-e;r<i;r++){t+=n[u[r]&63]}return t};e.exports={nanoid:nanoid,customAlphabet:customAlphabet,customRandom:customRandom,urlAlphabet:n,random:random}},651:function(e){let t="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";e.exports={urlAlphabet:t}}};var t={};function __nccwpck_require__(r){var l=t[r];if(l!==undefined){return l.exports}var n=t[r]={exports:{}};var a=true;try{e[r](n,n.exports,__nccwpck_require__);a=false}finally{if(a)delete t[r]}return n.exports}if(typeof __nccwpck_require__!=="undefined")__nccwpck_require__.ab=__dirname+"/";var r=__nccwpck_require__(592);module.exports=r})();
|
|
@@ -1,15 +1,7 @@
|
|
|
1
1
|
import crypto from 'crypto'
|
|
2
|
-
|
|
3
2
|
import { urlAlphabet } from './url-alphabet/index.js'
|
|
4
|
-
|
|
5
|
-
// It is best to make fewer, larger requests to the crypto module to
|
|
6
|
-
// avoid system call overhead. So, random numbers are generated in a
|
|
7
|
-
// pool. The pool is a Buffer that is larger than the initial random
|
|
8
|
-
// request size by this multiplier. The pool is enlarged if subsequent
|
|
9
|
-
// requests exceed the maximum buffer size.
|
|
10
3
|
const POOL_SIZE_MULTIPLIER = 128
|
|
11
4
|
let pool, poolOffset
|
|
12
|
-
|
|
13
5
|
let fillPool = bytes => {
|
|
14
6
|
if (!pool || pool.length < bytes) {
|
|
15
7
|
pool = Buffer.allocUnsafe(bytes * POOL_SIZE_MULTIPLIER)
|
|
@@ -21,65 +13,33 @@ let fillPool = bytes => {
|
|
|
21
13
|
}
|
|
22
14
|
poolOffset += bytes
|
|
23
15
|
}
|
|
24
|
-
|
|
25
16
|
let random = bytes => {
|
|
26
|
-
// `|=` convert `bytes` to number to prevent `valueOf` abusing and pool pollution
|
|
27
17
|
fillPool((bytes |= 0))
|
|
28
18
|
return pool.subarray(poolOffset - bytes, poolOffset)
|
|
29
19
|
}
|
|
30
|
-
|
|
31
20
|
let customRandom = (alphabet, defaultSize, getRandom) => {
|
|
32
|
-
// First, a bitmask is necessary to generate the ID. The bitmask makes bytes
|
|
33
|
-
// values closer to the alphabet size. The bitmask calculates the closest
|
|
34
|
-
// `2^31 - 1` number, which exceeds the alphabet size.
|
|
35
|
-
// For example, the bitmask for the alphabet size 30 is 31 (00011111).
|
|
36
21
|
let mask = (2 << (31 - Math.clz32((alphabet.length - 1) | 1))) - 1
|
|
37
|
-
// Though, the bitmask solution is not perfect since the bytes exceeding
|
|
38
|
-
// the alphabet size are refused. Therefore, to reliably generate the ID,
|
|
39
|
-
// the random bytes redundancy has to be satisfied.
|
|
40
|
-
|
|
41
|
-
// Note: every hardware random generator call is performance expensive,
|
|
42
|
-
// because the system call for entropy collection takes a lot of time.
|
|
43
|
-
// So, to avoid additional system calls, extra bytes are requested in advance.
|
|
44
|
-
|
|
45
|
-
// Next, a step determines how many random bytes to generate.
|
|
46
|
-
// The number of random bytes gets decided upon the ID size, mask,
|
|
47
|
-
// alphabet size, and magic number 1.6 (using 1.6 peaks at performance
|
|
48
|
-
// according to benchmarks).
|
|
49
22
|
let step = Math.ceil((1.6 * mask * defaultSize) / alphabet.length)
|
|
50
|
-
|
|
51
23
|
return (size = defaultSize) => {
|
|
52
24
|
let id = ''
|
|
53
25
|
while (true) {
|
|
54
26
|
let bytes = getRandom(step)
|
|
55
|
-
// A compact alternative for `for (let i = 0; i < step; i++)`.
|
|
56
27
|
let i = step
|
|
57
28
|
while (i--) {
|
|
58
|
-
// Adding `|| ''` refuses a random byte that exceeds the alphabet size.
|
|
59
29
|
id += alphabet[bytes[i] & mask] || ''
|
|
60
30
|
if (id.length === size) return id
|
|
61
31
|
}
|
|
62
32
|
}
|
|
63
33
|
}
|
|
64
34
|
}
|
|
65
|
-
|
|
66
35
|
let customAlphabet = (alphabet, size = 21) =>
|
|
67
36
|
customRandom(alphabet, size, random)
|
|
68
|
-
|
|
69
37
|
let nanoid = (size = 21) => {
|
|
70
|
-
// `|=` convert `size` to number to prevent `valueOf` abusing and pool pollution
|
|
71
38
|
fillPool((size |= 0))
|
|
72
39
|
let id = ''
|
|
73
|
-
// We are reading directly from the random pool to avoid creating new array
|
|
74
40
|
for (let i = poolOffset - size; i < poolOffset; i++) {
|
|
75
|
-
// It is incorrect to use bytes exceeding the alphabet size.
|
|
76
|
-
// The following mask reduces the random byte in the 0-255 value
|
|
77
|
-
// range to the 0-63 value range. Therefore, adding hacks, such
|
|
78
|
-
// as empty string fallback or magic numbers, is unneccessary because
|
|
79
|
-
// the bitmask trims bytes down to the alphabet size.
|
|
80
41
|
id += urlAlphabet[pool[i] & 63]
|
|
81
42
|
}
|
|
82
43
|
return id
|
|
83
44
|
}
|
|
84
|
-
|
|
85
45
|
export { nanoid, customAlphabet, customRandom, urlAlphabet, random }
|
|
@@ -1,34 +1,21 @@
|
|
|
1
|
-
// This alphabet uses `A-Za-z0-9_-` symbols.
|
|
2
|
-
// The order of characters is optimized for better gzip and brotli compression.
|
|
3
|
-
// References to the same file (works both for gzip and brotli):
|
|
4
|
-
// `'use`, `andom`, and `rict'`
|
|
5
|
-
// References to the brotli default dictionary:
|
|
6
|
-
// `-26T`, `1983`, `40px`, `75px`, `bush`, `jack`, `mind`, `very`, and `wolf`
|
|
7
1
|
let urlAlphabet =
|
|
8
2
|
'useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict'
|
|
9
|
-
|
|
10
3
|
let customAlphabet = (alphabet, defaultSize = 21) => {
|
|
11
4
|
return (size = defaultSize) => {
|
|
12
5
|
let id = ''
|
|
13
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
14
6
|
let i = size | 0
|
|
15
7
|
while (i--) {
|
|
16
|
-
// `| 0` is more compact and faster than `Math.floor()`.
|
|
17
8
|
id += alphabet[(Math.random() * alphabet.length) | 0]
|
|
18
9
|
}
|
|
19
10
|
return id
|
|
20
11
|
}
|
|
21
12
|
}
|
|
22
|
-
|
|
23
13
|
let nanoid = (size = 21) => {
|
|
24
14
|
let id = ''
|
|
25
|
-
// A compact alternative for `for (var i = 0; i < step; i++)`.
|
|
26
15
|
let i = size | 0
|
|
27
16
|
while (i--) {
|
|
28
|
-
// `| 0` is more compact and faster than `Math.floor()`.
|
|
29
17
|
id += urlAlphabet[(Math.random() * 64) | 0]
|
|
30
18
|
}
|
|
31
19
|
return id
|
|
32
20
|
}
|
|
33
|
-
|
|
34
21
|
export { nanoid, customAlphabet }
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"name":"nanoid","version":"3.3.
|
|
1
|
+
{"name":"nanoid","version":"3.3.11","description":"A tiny (116 bytes), secure URL-friendly unique string ID generator","keywords":["uuid","random","id","url"],"engines":{"node":"^10 || ^12 || ^13.7 || ^14 || >=15.0.1"},"funding":[{"type":"github","url":"https://github.com/sponsors/ai"}],"author":"Andrey Sitnik <andrey@sitnik.ru>","license":"MIT","repository":"ai/nanoid","browser":{"./index.js":"./index.browser.js","./async/index.js":"./async/index.browser.js","./async/index.cjs":"./async/index.browser.cjs","./index.cjs":"./index.browser.cjs"},"react-native":"index.js","bin":"./bin/nanoid.cjs","sideEffects":false,"types":"./index.d.ts","type":"module","main":"index.cjs","module":"index.js","exports":{".":{"react-native":"./index.browser.js","browser":"./index.browser.js","require":{"types":"./index.d.cts","default":"./index.cjs"},"import":{"types":"./index.d.ts","default":"./index.js"},"default":"./index.js"},"./package.json":"./package.json","./async/package.json":"./async/package.json","./async":{"browser":"./async/index.browser.js","require":{"types":"./index.d.cts","default":"./async/index.cjs"},"import":{"types":"./index.d.ts","default":"./async/index.js"},"default":"./async/index.js"},"./non-secure/package.json":"./non-secure/package.json","./non-secure":{"require":{"types":"./index.d.cts","default":"./non-secure/index.cjs"},"import":{"types":"./index.d.ts","default":"./non-secure/index.js"},"default":"./non-secure/index.js"},"./url-alphabet/package.json":"./url-alphabet/package.json","./url-alphabet":{"require":{"types":"./index.d.cts","default":"./url-alphabet/index.cjs"},"import":{"types":"./index.d.ts","default":"./url-alphabet/index.js"},"default":"./url-alphabet/index.js"}},"_lastModified":"2025-09-08T08:59:20.125Z"}
|
|
@@ -1,7 +1,3 @@
|
|
|
1
|
-
// This alphabet uses `A-Za-z0-9_-` symbols.
|
|
2
|
-
// The order of characters is optimized for better gzip and brotli compression.
|
|
3
|
-
// Same as in non-secure/index.js
|
|
4
1
|
let urlAlphabet =
|
|
5
2
|
'useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict'
|
|
6
|
-
|
|
7
3
|
export { urlAlphabet }
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"name":"openid-client","version":"5.7.1","description":"OpenID Connect Relying Party (RP, Client) implementation for Node.js runtime, supports passportjs","keywords":["auth","authentication","basic","certified","client","connect","dynamic","electron","hybrid","identity","implicit","oauth","oauth2","oidc","openid","passport","relying party","strategy"],"homepage":"https://github.com/panva/openid-client","repository":"panva/openid-client","funding":{"url":"https://github.com/sponsors/panva"},"license":"MIT","author":"Filip Skokan <panva.ip@gmail.com>","exports":{"types":"./types/index.d.ts","import":"./lib/index.mjs","require":"./lib/index.js"},"main":"./lib/index.js","types":"./types/index.d.ts","files":["lib","types/index.d.ts"],"scripts":{"format":"npx prettier --loglevel silent --write ./lib ./test ./certification ./types","test":"mocha test/**/*.test.js"},"dependencies":{"jose":"^4.15.9","lru-cache":"^6.0.0","object-hash":"^2.2.0","oidc-token-hash":"^5.0.3"},"devDependencies":{"@types/node":"^16.18.106","@types/passport":"^1.0.16","base64url":"^3.0.1","chai":"^4.5.0","mocha":"^10.7.3","nock":"^13.5.5","prettier":"^2.8.8","readable-mock-req":"^0.2.2","sinon":"^9.2.4","timekeeper":"^2.3.1"},"standard-version":{"scripts":{"postchangelog":"sed -i '' -e 's/### \\[/## [/g' CHANGELOG.md"},"types":[{"type":"feat","section":"Features"},{"type":"fix","section":"Fixes"},{"type":"chore","hidden":true},{"type":"docs","hidden":true},{"type":"style","hidden":true},{"type":"refactor","section":"Refactor","hidden":false},{"type":"perf","section":"Performance","hidden":false},{"type":"test","hidden":true}]},"_lastModified":"2025-
|
|
1
|
+
{"name":"openid-client","version":"5.7.1","description":"OpenID Connect Relying Party (RP, Client) implementation for Node.js runtime, supports passportjs","keywords":["auth","authentication","basic","certified","client","connect","dynamic","electron","hybrid","identity","implicit","oauth","oauth2","oidc","openid","passport","relying party","strategy"],"homepage":"https://github.com/panva/openid-client","repository":"panva/openid-client","funding":{"url":"https://github.com/sponsors/panva"},"license":"MIT","author":"Filip Skokan <panva.ip@gmail.com>","exports":{"types":"./types/index.d.ts","import":"./lib/index.mjs","require":"./lib/index.js"},"main":"./lib/index.js","types":"./types/index.d.ts","files":["lib","types/index.d.ts"],"scripts":{"format":"npx prettier --loglevel silent --write ./lib ./test ./certification ./types","test":"mocha test/**/*.test.js"},"dependencies":{"jose":"^4.15.9","lru-cache":"^6.0.0","object-hash":"^2.2.0","oidc-token-hash":"^5.0.3"},"devDependencies":{"@types/node":"^16.18.106","@types/passport":"^1.0.16","base64url":"^3.0.1","chai":"^4.5.0","mocha":"^10.7.3","nock":"^13.5.5","prettier":"^2.8.8","readable-mock-req":"^0.2.2","sinon":"^9.2.4","timekeeper":"^2.3.1"},"standard-version":{"scripts":{"postchangelog":"sed -i '' -e 's/### \\[/## [/g' CHANGELOG.md"},"types":[{"type":"feat","section":"Features"},{"type":"fix","section":"Fixes"},{"type":"chore","hidden":true},{"type":"docs","hidden":true},{"type":"style","hidden":true},{"type":"refactor","section":"Refactor","hidden":false},{"type":"perf","section":"Performance","hidden":false},{"type":"test","hidden":true}]},"_lastModified":"2025-09-08T08:59:19.903Z"}
|
package/package.json
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
"name": "@typekcz-nocobase-plugins/plugin-oidc-plus",
|
|
3
3
|
"displayName": "Auth: OIDC Plus",
|
|
4
4
|
"description": "OIDC (OpenID Connect) authentication with extra features.",
|
|
5
|
-
"version": "1.0.
|
|
5
|
+
"version": "1.0.5",
|
|
6
6
|
"license": "AGPL-3.0",
|
|
7
7
|
"main": "dist/server/index.js",
|
|
8
8
|
"devDependencies": {
|
|
@@ -0,0 +1,70 @@
|
|
|
1
|
+
import { LoginOutlined } from '@ant-design/icons';
|
|
2
|
+
import { css, useAPIClient } from '@nocobase/client';
|
|
3
|
+
import { Button, Space, message } from 'antd';
|
|
4
|
+
import React, { useEffect } from 'react';
|
|
5
|
+
import { useOidcTranslation } from './locale';
|
|
6
|
+
import { useLocation } from 'react-router-dom';
|
|
7
|
+
import { Authenticator } from '@nocobase/plugin-auth/client';
|
|
8
|
+
import Cookies from 'js-cookie';
|
|
9
|
+
import { logoutCookieName } from '../constants';
|
|
10
|
+
|
|
11
|
+
export interface OIDCProvider {
|
|
12
|
+
clientId: string;
|
|
13
|
+
title: string;
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
export const OIDCButton = ({ authenticator }: { authenticator: Authenticator }) => {
|
|
17
|
+
const { t } = useOidcTranslation();
|
|
18
|
+
const api = useAPIClient();
|
|
19
|
+
const location = useLocation();
|
|
20
|
+
const params = new URLSearchParams(location.search);
|
|
21
|
+
const redirect = params.get('redirect');
|
|
22
|
+
|
|
23
|
+
const login = async () => {
|
|
24
|
+
const response = await api.request({
|
|
25
|
+
method: 'post',
|
|
26
|
+
url: 'oidc:getAuthUrl',
|
|
27
|
+
headers: {
|
|
28
|
+
'X-Authenticator': authenticator.name,
|
|
29
|
+
},
|
|
30
|
+
data: {
|
|
31
|
+
redirect,
|
|
32
|
+
},
|
|
33
|
+
});
|
|
34
|
+
|
|
35
|
+
const authUrl = response?.data?.data;
|
|
36
|
+
window.location.replace(authUrl);
|
|
37
|
+
};
|
|
38
|
+
|
|
39
|
+
useEffect(() => {
|
|
40
|
+
const logoutUrl = Cookies.get(logoutCookieName);
|
|
41
|
+
if (logoutUrl) {
|
|
42
|
+
const logoutUrlObj = new URL(logoutUrl);
|
|
43
|
+
logoutUrlObj.searchParams.set('post_logout_redirect_uri', window.location.href);
|
|
44
|
+
Cookies.remove(logoutCookieName, { domain: window.location.hostname });
|
|
45
|
+
window.location.href = logoutUrlObj.href;
|
|
46
|
+
}
|
|
47
|
+
const name = params.get('authenticator');
|
|
48
|
+
const error = params.get('error');
|
|
49
|
+
if (name !== authenticator.name) {
|
|
50
|
+
return;
|
|
51
|
+
}
|
|
52
|
+
if (error) {
|
|
53
|
+
message.error(t(error));
|
|
54
|
+
return;
|
|
55
|
+
}
|
|
56
|
+
});
|
|
57
|
+
|
|
58
|
+
return (
|
|
59
|
+
<Space
|
|
60
|
+
direction="vertical"
|
|
61
|
+
className={css`
|
|
62
|
+
display: flex;
|
|
63
|
+
`}
|
|
64
|
+
>
|
|
65
|
+
<Button shape="round" block icon={<LoginOutlined />} onClick={login}>
|
|
66
|
+
{t(authenticator.title)}
|
|
67
|
+
</Button>
|
|
68
|
+
</Space>
|
|
69
|
+
);
|
|
70
|
+
};
|