binoauth 0.0.10 → 0.0.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +359 -165
- package/dist/core/src/admin/client.d.ts +203 -0
- package/dist/core/src/admin/client.d.ts.map +1 -0
- package/dist/core/src/admin/client.js +391 -0
- package/dist/core/src/admin/client.js.map +1 -0
- package/dist/core/src/admin/index.d.ts +6 -0
- package/dist/core/src/admin/index.d.ts.map +1 -0
- package/dist/core/src/admin/index.js +5 -0
- package/dist/core/src/admin/index.js.map +1 -0
- package/dist/core/src/admin/types.d.ts +412 -0
- package/dist/core/src/admin/types.d.ts.map +1 -0
- package/dist/core/src/admin/types.js +5 -0
- package/dist/core/src/admin/types.js.map +1 -0
- package/dist/core/src/auth/client.d.ts +330 -0
- package/dist/core/src/auth/client.d.ts.map +1 -0
- package/dist/core/src/auth/client.js +408 -0
- package/dist/core/src/auth/client.js.map +1 -0
- package/dist/core/src/auth/error.d.ts +113 -0
- package/dist/core/src/auth/error.d.ts.map +1 -0
- package/dist/core/src/auth/error.js +257 -0
- package/dist/core/src/auth/error.js.map +1 -0
- package/dist/core/src/auth/flows/base-flow.d.ts +98 -0
- package/dist/core/src/auth/flows/base-flow.d.ts.map +1 -0
- package/dist/core/src/auth/flows/base-flow.js +182 -0
- package/dist/core/src/auth/flows/base-flow.js.map +1 -0
- package/dist/core/src/auth/flows/magic-link.d.ts +175 -0
- package/dist/core/src/auth/flows/magic-link.d.ts.map +1 -0
- package/dist/core/src/auth/flows/magic-link.js +228 -0
- package/dist/core/src/auth/flows/magic-link.js.map +1 -0
- package/dist/core/src/auth/flows/mfa.d.ts +81 -0
- package/dist/core/src/auth/flows/mfa.d.ts.map +1 -0
- package/dist/core/src/auth/flows/mfa.js +103 -0
- package/dist/core/src/auth/flows/mfa.js.map +1 -0
- package/dist/core/src/auth/flows/otp.d.ts +172 -0
- package/dist/core/src/auth/flows/otp.d.ts.map +1 -0
- package/dist/core/src/auth/flows/otp.js +222 -0
- package/dist/core/src/auth/flows/otp.js.map +1 -0
- package/dist/core/src/auth/flows/password.d.ts +242 -0
- package/dist/core/src/auth/flows/password.d.ts.map +1 -0
- package/dist/core/src/auth/flows/password.js +344 -0
- package/dist/core/src/auth/flows/password.js.map +1 -0
- package/dist/core/src/auth/flows/social.d.ts +209 -0
- package/dist/core/src/auth/flows/social.d.ts.map +1 -0
- package/dist/core/src/auth/flows/social.js +284 -0
- package/dist/core/src/auth/flows/social.js.map +1 -0
- package/dist/core/src/auth/index.d.ts +19 -0
- package/dist/core/src/auth/index.d.ts.map +1 -0
- package/dist/core/src/auth/index.js +32 -0
- package/dist/core/src/auth/index.js.map +1 -0
- package/dist/core/src/auth/types.d.ts +151 -0
- package/dist/core/src/auth/types.d.ts.map +1 -0
- package/dist/core/src/auth/types.js +7 -0
- package/dist/core/src/auth/types.js.map +1 -0
- package/dist/core/src/index.d.ts +53 -49
- package/dist/core/src/index.d.ts.map +1 -1
- package/dist/core/src/index.js +61 -343
- package/dist/core/src/index.js.map +1 -1
- package/dist/core/src/oauth/client.d.ts +322 -0
- package/dist/core/src/oauth/client.d.ts.map +1 -0
- package/dist/core/src/oauth/client.js +491 -0
- package/dist/core/src/oauth/client.js.map +1 -0
- package/dist/core/src/oauth/error.d.ts +18 -0
- package/dist/core/src/oauth/error.d.ts.map +1 -0
- package/dist/core/src/oauth/error.js +24 -0
- package/dist/core/src/oauth/error.js.map +1 -0
- package/dist/core/src/oauth/flows/authorization-code.d.ts +122 -0
- package/dist/core/src/oauth/flows/authorization-code.d.ts.map +1 -0
- package/dist/core/src/oauth/flows/authorization-code.js +278 -0
- package/dist/core/src/oauth/flows/authorization-code.js.map +1 -0
- package/dist/core/src/oauth/flows/base-flow.d.ts +17 -0
- package/dist/core/src/oauth/flows/base-flow.d.ts.map +1 -0
- package/dist/core/src/oauth/flows/base-flow.js +107 -0
- package/dist/core/src/oauth/flows/base-flow.js.map +1 -0
- package/dist/core/src/oauth/flows/client-credentials.d.ts +72 -0
- package/dist/core/src/oauth/flows/client-credentials.d.ts.map +1 -0
- package/dist/core/src/oauth/flows/client-credentials.js +100 -0
- package/dist/core/src/oauth/flows/client-credentials.js.map +1 -0
- package/dist/core/src/oauth/flows/device-code.d.ts +108 -0
- package/dist/core/src/oauth/flows/device-code.d.ts.map +1 -0
- package/dist/core/src/oauth/flows/device-code.js +193 -0
- package/dist/core/src/oauth/flows/device-code.js.map +1 -0
- package/dist/core/src/oauth/flows/refresh-token.d.ts +59 -0
- package/dist/core/src/oauth/flows/refresh-token.d.ts.map +1 -0
- package/dist/core/src/oauth/flows/refresh-token.js +105 -0
- package/dist/core/src/oauth/flows/refresh-token.js.map +1 -0
- package/dist/core/src/oauth/index.d.ts +12 -0
- package/dist/core/src/oauth/index.d.ts.map +1 -0
- package/dist/core/src/oauth/index.js +11 -0
- package/dist/core/src/oauth/index.js.map +1 -0
- package/dist/core/src/oauth/storage/encryption.d.ts +12 -0
- package/dist/core/src/oauth/storage/encryption.d.ts.map +1 -0
- package/dist/core/src/oauth/storage/encryption.js +76 -0
- package/dist/core/src/oauth/storage/encryption.js.map +1 -0
- package/dist/core/src/oauth/storage/index.d.ts +201 -0
- package/dist/core/src/oauth/storage/index.d.ts.map +1 -0
- package/dist/core/src/oauth/storage/index.js +322 -0
- package/dist/core/src/oauth/storage/index.js.map +1 -0
- package/dist/core/src/oauth/storage/strategies.d.ts +34 -0
- package/dist/core/src/oauth/storage/strategies.d.ts.map +1 -0
- package/dist/core/src/oauth/storage/strategies.js +100 -0
- package/dist/core/src/oauth/storage/strategies.js.map +1 -0
- package/dist/core/src/oauth/types.d.ts +261 -0
- package/dist/core/src/oauth/types.d.ts.map +1 -0
- package/dist/core/src/oauth/types.js +39 -0
- package/dist/core/src/oauth/types.js.map +1 -0
- package/dist/core/src/oauth/utils.d.ts +56 -0
- package/dist/core/src/oauth/utils.d.ts.map +1 -0
- package/dist/core/src/oauth/utils.js +140 -0
- package/dist/core/src/oauth/utils.js.map +1 -0
- package/dist/tsconfig.tsbuildinfo +1 -1
- package/package.json +1 -1
package/dist/core/src/index.js
CHANGED
@@ -1,349 +1,67 @@
|
|
1
|
-
|
2
|
-
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
1
|
+
/**
|
2
|
+
* BinoAuth Core SDK - Main Exports
|
3
|
+
*
|
4
|
+
* Comprehensive authentication and user management solution with multiple
|
5
|
+
* authentication flows, user management, and admin operations.
|
6
|
+
*/
|
7
|
+
// Main unified client (recommended)
|
8
|
+
export { BinoAuthClient as default } from "./auth/client";
|
9
|
+
// OAuth 2.0 module
|
10
|
+
export * from "./oauth";
|
11
|
+
// Authentication flows (excluding conflicting exports)
|
12
|
+
export { BinoAuthClient, PasswordFlow, MagicLinkFlow, OTPFlow, MFAFlow, SocialFlow, BaseAuthFlow, createPasswordAuth, createMagicLinkAuth, createOTPAuth, createSocialAuth, createOAuthAuth } from "./auth";
|
13
|
+
// Export auth error handling
|
14
|
+
export { AuthError, AuthErrorCode, getErrorMessage } from "./auth";
|
15
|
+
// Admin operations
|
16
|
+
export * from "./admin";
|
17
|
+
// Pre-configured storage classes for easy setup
|
18
|
+
import { TokenStorage } from "./oauth/storage";
|
19
|
+
/**
|
20
|
+
* In-memory token storage (for server-side or testing)
|
21
|
+
*
|
22
|
+
* @example
|
23
|
+
* ```typescript
|
24
|
+
* const storage = new InMemoryTokenStorage({
|
25
|
+
* clientId: 'your_client_id',
|
26
|
+
* encryptionKey: 'your-encryption-key'
|
27
|
+
* });
|
28
|
+
* ```
|
29
|
+
*/
|
30
|
+
export class InMemoryTokenStorage extends TokenStorage {
|
11
31
|
constructor(config) {
|
12
|
-
|
13
|
-
const baseUrl = this.config.baseUrl || "https://auth.atomatiki.tech";
|
14
|
-
// Configure tenant SDK
|
15
|
-
this.tenantConfig = new TenantConfiguration({
|
16
|
-
basePath: baseUrl,
|
17
|
-
headers: {
|
18
|
-
"X-API-Key": this.config.apiKey,
|
19
|
-
},
|
20
|
-
});
|
21
|
-
// Configure admin SDK
|
22
|
-
this.adminConfig = new AdminConfiguration({
|
23
|
-
basePath: baseUrl,
|
24
|
-
headers: {
|
25
|
-
"X-API-Key": this.config.apiKey,
|
26
|
-
},
|
27
|
-
});
|
28
|
-
// Initialize APIs
|
29
|
-
this.authApi = new AuthenticationApi(this.tenantConfig);
|
30
|
-
this.oauthApi = new OAuth2Api(this.tenantConfig);
|
31
|
-
this.userProfileApi = new UserProfileApi(this.tenantConfig);
|
32
|
-
this.adminApi = new AdminApi(this.adminConfig);
|
32
|
+
super({ ...config, storage: 'memory' });
|
33
33
|
}
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
}
|
49
|
-
}
|
50
|
-
async sendPhoneOTP(phone) {
|
51
|
-
try {
|
52
|
-
const response = await this.authApi.requestOtpViaPhoneApiV1AuthPhonePost({
|
53
|
-
phoneOTPRequest: { phone },
|
54
|
-
});
|
55
|
-
return { ok: true, data: response };
|
56
|
-
}
|
57
|
-
catch (error) {
|
58
|
-
return {
|
59
|
-
ok: false,
|
60
|
-
error: error.message || "Failed to send phone OTP",
|
61
|
-
error_description: error.response?.data?.detail || error.message,
|
62
|
-
};
|
63
|
-
}
|
64
|
-
}
|
65
|
-
async sendMagicLink(email, returnTo) {
|
66
|
-
try {
|
67
|
-
const response = await this.authApi.requestMagicLinkApiV1AuthMlPost({
|
68
|
-
magicLinkRequest: { email, returnTo },
|
69
|
-
});
|
70
|
-
return { ok: true, data: response };
|
71
|
-
}
|
72
|
-
catch (error) {
|
73
|
-
return {
|
74
|
-
ok: false,
|
75
|
-
error: error.message || "Failed to send magic link",
|
76
|
-
error_description: error.response?.data?.detail || error.message,
|
77
|
-
};
|
78
|
-
}
|
79
|
-
}
|
80
|
-
async login(type, credentials) {
|
81
|
-
try {
|
82
|
-
let response;
|
83
|
-
if (type === "password") {
|
84
|
-
if (!credentials.email || !credentials.password) {
|
85
|
-
return {
|
86
|
-
ok: false,
|
87
|
-
error: "Missing credentials",
|
88
|
-
error_description: "Email and password are required for password login",
|
89
|
-
};
|
90
|
-
}
|
91
|
-
response = await this.authApi.loginApiV1AuthLoginPost({
|
92
|
-
loginRequest: {
|
93
|
-
email: credentials.email,
|
94
|
-
password: credentials.password,
|
95
|
-
},
|
96
|
-
});
|
97
|
-
}
|
98
|
-
else if (type === "otp") {
|
99
|
-
if (!credentials.otp) {
|
100
|
-
return {
|
101
|
-
ok: false,
|
102
|
-
error: "Missing OTP",
|
103
|
-
error_description: "OTP code is required for OTP login",
|
104
|
-
};
|
105
|
-
}
|
106
|
-
// For OTP login, we need to verify the OTP
|
107
|
-
if (credentials.phone) {
|
108
|
-
response = await this.authApi.verifyPhoneOtpApiV1AuthPhoneVerifyPost({
|
109
|
-
phoneOTPVerificationRequest: {
|
110
|
-
otp: credentials.otp.toString(),
|
111
|
-
},
|
112
|
-
});
|
113
|
-
}
|
114
|
-
else {
|
115
|
-
response =
|
116
|
-
await this.authApi.verifyMagicLinkCodeApiV1AuthMlCodeVerifyPost({
|
117
|
-
verifyMagicLinkCodeRequest: {
|
118
|
-
code: credentials.otp.toString(),
|
119
|
-
},
|
120
|
-
});
|
121
|
-
}
|
122
|
-
}
|
123
|
-
return { ok: true, data: response };
|
124
|
-
}
|
125
|
-
catch (error) {
|
126
|
-
return {
|
127
|
-
ok: false,
|
128
|
-
error: error.message || "Login failed",
|
129
|
-
error_description: error.response?.data?.detail || error.message,
|
130
|
-
};
|
131
|
-
}
|
132
|
-
}
|
133
|
-
// Password Reset
|
134
|
-
async sendResetPasswordEmailOTP(email, returnTo) {
|
135
|
-
try {
|
136
|
-
const response = await this.authApi.requestMagicLinkApiV1AuthMlPost({
|
137
|
-
magicLinkRequest: { email, returnTo },
|
138
|
-
});
|
139
|
-
return { ok: true, data: response };
|
140
|
-
}
|
141
|
-
catch (error) {
|
142
|
-
return {
|
143
|
-
ok: false,
|
144
|
-
error: error.message || "Failed to send reset password email",
|
145
|
-
error_description: error.response?.data?.detail || error.message,
|
146
|
-
};
|
147
|
-
}
|
148
|
-
}
|
149
|
-
async sendResetPasswordPhoneOTP(phone) {
|
150
|
-
try {
|
151
|
-
const response = await this.authApi.requestOtpViaPhoneApiV1AuthPhonePost({
|
152
|
-
phoneOTPRequest: { phone },
|
153
|
-
});
|
154
|
-
return { ok: true, data: response };
|
155
|
-
}
|
156
|
-
catch (error) {
|
157
|
-
return {
|
158
|
-
ok: false,
|
159
|
-
error: error.message || "Failed to send reset password phone OTP",
|
160
|
-
error_description: error.response?.data?.detail || error.message,
|
161
|
-
};
|
162
|
-
}
|
163
|
-
}
|
164
|
-
async resetPassword(params) {
|
165
|
-
try {
|
166
|
-
if (params.newPassword !== params.repeatNewPassword) {
|
167
|
-
return {
|
168
|
-
ok: false,
|
169
|
-
error: "Password mismatch",
|
170
|
-
error_description: "New password and repeat password do not match",
|
171
|
-
};
|
172
|
-
}
|
173
|
-
// This would typically be handled by verifying the OTP first, then updating password
|
174
|
-
// For now, we'll verify the magic link code
|
175
|
-
const response = await this.authApi.verifyMagicLinkCodeApiV1AuthMlCodeVerifyPost({
|
176
|
-
verifyMagicLinkCodeRequest: {
|
177
|
-
code: params.otp,
|
178
|
-
},
|
179
|
-
});
|
180
|
-
return { ok: true, data: response };
|
181
|
-
}
|
182
|
-
catch (error) {
|
183
|
-
return {
|
184
|
-
ok: false,
|
185
|
-
error: error.message || "Failed to reset password",
|
186
|
-
error_description: error.response?.data?.detail || error.message,
|
187
|
-
};
|
188
|
-
}
|
189
|
-
}
|
190
|
-
// Token Management
|
191
|
-
async refreshToken(refreshToken) {
|
192
|
-
try {
|
193
|
-
const response = await this.oauthApi.getTokensApiV1OauthTokenPost({
|
194
|
-
tokenRequest: {
|
195
|
-
grantType: "refresh_token",
|
196
|
-
clientId: "binoauth-sdk",
|
197
|
-
refreshToken: refreshToken,
|
198
|
-
},
|
199
|
-
});
|
200
|
-
return { ok: true, data: response };
|
201
|
-
}
|
202
|
-
catch (error) {
|
203
|
-
return {
|
204
|
-
ok: false,
|
205
|
-
error: error.message || "Failed to refresh token",
|
206
|
-
error_description: error.response?.data?.detail || error.message,
|
207
|
-
};
|
208
|
-
}
|
209
|
-
}
|
210
|
-
async logout() {
|
211
|
-
try {
|
212
|
-
const response = await this.authApi.logoutApiV1AuthLogoutPost();
|
213
|
-
return { ok: true, data: response };
|
214
|
-
}
|
215
|
-
catch (error) {
|
216
|
-
return {
|
217
|
-
ok: false,
|
218
|
-
error: error.message || "Failed to logout",
|
219
|
-
error_description: error.response?.data?.detail || error.message,
|
220
|
-
};
|
221
|
-
}
|
222
|
-
}
|
223
|
-
// User Profile
|
224
|
-
async getProfile() {
|
225
|
-
try {
|
226
|
-
const response = await this.userProfileApi.getCurrentUserApiV1AuthUserinfoGet();
|
227
|
-
return { ok: true, data: response };
|
228
|
-
}
|
229
|
-
catch (error) {
|
230
|
-
return {
|
231
|
-
ok: false,
|
232
|
-
error: error.message || "Failed to get profile",
|
233
|
-
error_description: error.response?.data?.detail || error.message,
|
234
|
-
};
|
235
|
-
}
|
236
|
-
}
|
237
|
-
// Device Code Flow
|
238
|
-
async requestDeviceCode() {
|
239
|
-
try {
|
240
|
-
const response = await this.oauthApi.deviceAuthorizationApiV1OauthDeviceCodePost({
|
241
|
-
deviceAuthorizationRequest: {
|
242
|
-
clientId: "binoauth-sdk",
|
243
|
-
},
|
244
|
-
});
|
245
|
-
return { ok: true, data: response };
|
246
|
-
}
|
247
|
-
catch (error) {
|
248
|
-
return {
|
249
|
-
ok: false,
|
250
|
-
error: error.message || "Failed to request device code",
|
251
|
-
error_description: error.response?.data?.detail || error.message,
|
252
|
-
};
|
253
|
-
}
|
254
|
-
}
|
255
|
-
async pollDeviceToken(deviceCode) {
|
256
|
-
try {
|
257
|
-
const response = await this.oauthApi.getTokensApiV1OauthTokenPost({
|
258
|
-
tokenRequest: {
|
259
|
-
grantType: "urn:ietf:params:oauth:grant-type:device_code",
|
260
|
-
clientId: "binoauth-sdk",
|
261
|
-
deviceCode: deviceCode,
|
262
|
-
},
|
263
|
-
});
|
264
|
-
return { ok: true, data: response };
|
265
|
-
}
|
266
|
-
catch (error) {
|
267
|
-
return {
|
268
|
-
ok: false,
|
269
|
-
error: error.message || "Failed to poll device token",
|
270
|
-
error_description: error.response?.data?.detail || error.message,
|
271
|
-
};
|
272
|
-
}
|
273
|
-
}
|
274
|
-
// User Management (Admin API)
|
275
|
-
async createUser(userData) {
|
276
|
-
try {
|
277
|
-
// Admin API user creation method may not be available - this is a placeholder
|
278
|
-
throw new Error("User creation not implemented in admin SDK");
|
279
|
-
}
|
280
|
-
catch (error) {
|
281
|
-
return {
|
282
|
-
ok: false,
|
283
|
-
error: error.message || "Failed to create user",
|
284
|
-
error_description: error.response?.data?.detail || error.message,
|
285
|
-
};
|
286
|
-
}
|
287
|
-
}
|
288
|
-
async getUser(userId) {
|
289
|
-
try {
|
290
|
-
const response = await this.adminApi.getUserApiV1UsersUserIdGet({
|
291
|
-
userId,
|
292
|
-
xTenantId: this.config.tenant,
|
293
|
-
});
|
294
|
-
return { ok: true, data: response };
|
295
|
-
}
|
296
|
-
catch (error) {
|
297
|
-
return {
|
298
|
-
ok: false,
|
299
|
-
error: error.message || "Failed to get user",
|
300
|
-
error_description: error.response?.data?.detail || error.message,
|
301
|
-
};
|
302
|
-
}
|
303
|
-
}
|
304
|
-
async getUsers(params = {}) {
|
305
|
-
try {
|
306
|
-
const response = await this.adminApi.getUsersApiV1UsersGet({
|
307
|
-
page: params.page || 1,
|
308
|
-
limit: params.limit || 10,
|
309
|
-
xTenantId: this.config.tenant,
|
310
|
-
});
|
311
|
-
return { ok: true, data: response };
|
312
|
-
}
|
313
|
-
catch (error) {
|
314
|
-
return {
|
315
|
-
ok: false,
|
316
|
-
error: error.message || "Failed to get users",
|
317
|
-
error_description: error.response?.data?.detail || error.message,
|
318
|
-
};
|
319
|
-
}
|
320
|
-
}
|
321
|
-
async updateUser(userId, userData) {
|
322
|
-
try {
|
323
|
-
// Admin API user update method may not be available - this is a placeholder
|
324
|
-
throw new Error("User update not implemented in admin SDK");
|
325
|
-
}
|
326
|
-
catch (error) {
|
327
|
-
return {
|
328
|
-
ok: false,
|
329
|
-
error: error.message || "Failed to update user",
|
330
|
-
error_description: error.response?.data?.detail || error.message,
|
331
|
-
};
|
332
|
-
}
|
34
|
+
}
|
35
|
+
/**
|
36
|
+
* localStorage-based token storage (for browsers)
|
37
|
+
*
|
38
|
+
* @example
|
39
|
+
* ```typescript
|
40
|
+
* const storage = new LocalStorageTokenStorage({
|
41
|
+
* clientId: 'your_client_id',
|
42
|
+
* encryptionKey: 'your-encryption-key'
|
43
|
+
* });
|
44
|
+
* ```
|
45
|
+
*/
|
46
|
+
export class LocalStorageTokenStorage extends TokenStorage {
|
47
|
+
constructor(config) {
|
48
|
+
super({ ...config, storage: 'localStorage' });
|
333
49
|
}
|
334
|
-
|
335
|
-
|
336
|
-
|
337
|
-
|
338
|
-
|
339
|
-
|
340
|
-
|
341
|
-
|
342
|
-
|
343
|
-
|
344
|
-
|
345
|
-
|
50
|
+
}
|
51
|
+
/**
|
52
|
+
* sessionStorage-based token storage (for browsers)
|
53
|
+
*
|
54
|
+
* @example
|
55
|
+
* ```typescript
|
56
|
+
* const storage = new SessionStorageTokenStorage({
|
57
|
+
* clientId: 'your_client_id',
|
58
|
+
* encryptionKey: 'your-encryption-key'
|
59
|
+
* });
|
60
|
+
* ```
|
61
|
+
*/
|
62
|
+
export class SessionStorageTokenStorage extends TokenStorage {
|
63
|
+
constructor(config) {
|
64
|
+
super({ ...config, storage: 'sessionStorage' });
|
346
65
|
}
|
347
66
|
}
|
348
|
-
export default BinoAuth;
|
349
67
|
//# sourceMappingURL=index.js.map
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":"AAAA
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/index.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,oCAAoC;AACpC,OAAO,EAAE,cAAc,IAAI,OAAO,EAAE,MAAM,eAAe,CAAC;AAE1D,mBAAmB;AACnB,cAAc,SAAS,CAAC;AAExB,uDAAuD;AACvD,OAAO,EACL,cAAc,EACd,YAAY,EACZ,aAAa,EACb,OAAO,EACP,OAAO,EACP,UAAU,EACV,YAAY,EACZ,kBAAkB,EAClB,mBAAmB,EACnB,aAAa,EACb,gBAAgB,EAChB,eAAe,EAChB,MAAM,QAAQ,CAAC;AAkChB,6BAA6B;AAC7B,OAAO,EAAE,SAAS,EAAE,aAAa,EAAE,eAAe,EAAE,MAAM,QAAQ,CAAC;AAEnE,mBAAmB;AACnB,cAAc,SAAS,CAAC;AAExB,gDAAgD;AAChD,OAAO,EAAE,YAAY,EAAE,MAAM,iBAAiB,CAAC;AAG/C;;;;;;;;;;GAUG;AACH,MAAM,OAAO,oBAAqB,SAAQ,YAAY;IACpD,YAAY,MAAsC;QAChD,KAAK,CAAC,EAAE,GAAG,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,CAAC,CAAC;IAC1C,CAAC;CACF;AAED;;;;;;;;;;GAUG;AACH,MAAM,OAAO,wBAAyB,SAAQ,YAAY;IACxD,YAAY,MAAsC;QAChD,KAAK,CAAC,EAAE,GAAG,MAAM,EAAE,OAAO,EAAE,cAAc,EAAE,CAAC,CAAC;IAChD,CAAC;CACF;AAED;;;;;;;;;;GAUG;AACH,MAAM,OAAO,0BAA2B,SAAQ,YAAY;IAC1D,YAAY,MAAsC;QAChD,KAAK,CAAC,EAAE,GAAG,MAAM,EAAE,OAAO,EAAE,gBAAgB,EAAE,CAAC,CAAC;IAClD,CAAC;CACF"}
|