fetchguard 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +429 -0
- package/dist/index.d.ts +551 -0
- package/dist/index.js +706 -0
- package/dist/index.js.map +1 -0
- package/dist/worker.d.ts +2 -0
- package/dist/worker.js +587 -0
- package/dist/worker.js.map +1 -0
- package/package.json +69 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/worker.ts","../src/messages.ts","../src/constants.ts","../src/errors.ts","../src/worker-post.ts","../src/utils/registry.ts","../src/provider/create-provider.ts","../src/provider/storage/indexeddb.ts","../src/provider/parser/body.ts","../src/provider/parser/cookie.ts","../src/provider/strategy/cookie.ts","../src/provider/strategy/body.ts","../src/provider/presets.ts","../src/provider/register-presets.ts"],"sourcesContent":["/// <reference lib=\"webworker\" />\n\nimport type { WorkerConfig } from './types'\nimport type { MainToWorkerMessage } from './messages'\nimport { ok, err, type Result } from 'ts-micro-result'\nimport { MSG } from './messages'\nimport { DEFAULT_REFRESH_EARLY_MS } from './constants'\nimport {\n InitErrors,\n DomainErrors,\n NetworkErrors,\n RequestErrors,\n GeneralErrors\n} from './errors'\nimport { sendAuthStateChanged, sendPong, sendReady, sendResult, sendFetchResult, sendFetchError } from './worker-post'\nimport { getProvider } from './utils/registry'\nimport { buildProviderFromPreset } from './provider/register-presets'\n\n/**\n * IIFE Closure to protect sensitive tokens from external access\n * Inspired by api-worker.js security pattern\n */\n;(function () {\n let config: WorkerConfig | null = null\n let provider: any = null\n let accessToken: string | null = null\n let refreshToken: string | null = null\n let expiresAt: number | null = null\n let currentUser: unknown | undefined\n const pendingControllers = new Map<string, AbortController>()\n let refreshPromise: Promise<void> | null = null\n\n/**\n * Ensure we have a valid access token (not expired).\n * If token is missing or expired, refresh it.\n * Prevents concurrent refresh attempts.\n */\nasync function ensureValidToken(): Promise<Result<string | null>> {\n if (accessToken && expiresAt) {\n const refreshEarlyMs = config?.refreshEarlyMs ?? DEFAULT_REFRESH_EARLY_MS\n const timeLeft = expiresAt - Date.now()\n if (timeLeft > refreshEarlyMs) {\n return ok(accessToken)\n }\n }\n\n if (refreshPromise) {\n await refreshPromise\n return ok(accessToken)\n }\n\n refreshPromise = (async () => {\n try {\n const valueRes = await provider.refreshToken(refreshToken)\n\n if (valueRes.isError()) {\n setTokenState({ token: null, expiresAt: null, user: undefined, refreshToken: undefined })\n return\n }\n\n const tokenInfo = valueRes.data\n\n setTokenState(tokenInfo)\n } finally {\n refreshPromise = null\n }\n })()\n\n await refreshPromise\n return ok(accessToken)\n}\n\n/**\n * Validate domain against allowed domains\n */\nfunction validateDomain(url: string): boolean {\n if (!config?.allowedDomains?.length) {\n return true\n }\n\n try {\n const urlObj = new URL(url)\n const hostname = urlObj.hostname\n const port = urlObj.port\n\n for (const entry of config.allowedDomains) {\n const idx = entry.lastIndexOf(':')\n const hasPort = idx > -1 && entry.indexOf(':') === idx\n const pattern = hasPort ? entry.slice(0, idx) : entry\n const entryPort = hasPort ? entry.slice(idx + 1) : ''\n const isWildcard = pattern.startsWith('*.')\n const base = isWildcard ? pattern.slice(2) : pattern\n\n const hostnameMatch = isWildcard\n ? (hostname === base || hostname.endsWith('.' + base))\n : (hostname === base)\n \n if (!hostnameMatch) continue\n\n if (hasPort) {\n if (port === entryPort) return true\n continue\n }\n return true\n }\n return false\n } catch {\n return false\n }\n}\n\n/**\n * Make API request with proactive token management\n */\nasync function makeApiRequest(url: string, options: any = {}) {\n if (!config) {\n return err(InitErrors.NotInitialized())\n }\n\n if (!validateDomain(url)) {\n return err(DomainErrors.NotAllowed({ url }))\n }\n\n const requiresAuth = options.requiresAuth !== false\n const includeHeaders = options.includeHeaders === true\n const fetchOptions: RequestInit = { ...options }\n delete (fetchOptions as any).requiresAuth\n delete (fetchOptions as any).includeHeaders\n\n const headers: Record<string, string> = {\n ...(fetchOptions.headers as Record<string, string> || {})\n }\n\n if (!headers['Content-Type'] && !headers['content-type'] && fetchOptions.body) {\n if (typeof fetchOptions.body === 'object' && !(fetchOptions.body instanceof FormData) && !(fetchOptions.body instanceof URLSearchParams)) {\n headers['Content-Type'] = 'application/json'\n }\n }\n\n if (requiresAuth) {\n const tokenRes = await ensureValidToken()\n if (tokenRes.isError()) return tokenRes\n\n const token = tokenRes.data\n if (token) {\n headers['Authorization'] = `Bearer ${token}`\n }\n }\n\n let response: Response | null = null\n let networkErr: Result<never> | null = null\n response = await fetch(url, { ...fetchOptions, headers, credentials: 'include' }).catch((e) => {\n const aborted = (e && (e as any).name === 'AbortError')\n networkErr = aborted ? err(RequestErrors.Cancelled()) : err(NetworkErrors.NetworkError({ message: String(e) }))\n return null as any\n })\n if (!response) return (networkErr ?? err(NetworkErrors.NetworkError({ message: 'Unknown network error' })))\n\n const body = await response.text()\n let responseHeaders: Record<string, string> | undefined\n if (includeHeaders) {\n responseHeaders = {}\n response.headers.forEach((value, key) => {\n (responseHeaders as Record<string, string>)[key] = value\n })\n }\n\n return response.ok\n ? ok({ body, status: response.status, headers: responseHeaders })\n : err(NetworkErrors.HttpError({ message: `HTTP ${response.status}: ${body}` }))\n}\n\n/**\n * Update token state from TokenInfo and auto emit AUTH_STATE_CHANGED\n */\nfunction setTokenState(tokenInfo: { token: string | null; expiresAt?: number | null; user?: unknown; refreshToken?: string }) {\n accessToken = tokenInfo.token\n expiresAt = tokenInfo.expiresAt ?? null\n currentUser = tokenInfo.user\n refreshToken = tokenInfo.refreshToken ?? null\n\n postAuthChanged()\n}\n\n/**\n * Emit AUTH_STATE_CHANGED event based on current state\n * authenticated = true if we have valid non-expired token\n */\nfunction postAuthChanged() {\n const now = Date.now()\n const authenticated = accessToken !== null && accessToken !== '' && (expiresAt === null || expiresAt > now)\n sendAuthStateChanged(authenticated, expiresAt, currentUser)\n}\n\n/**\n * Main message handler\n * Each case has its own try-catch for better error isolation\n * Inspired by old-workers/api-worker.ts:24-123\n */\nself.onmessage = async (event: MessageEvent<MainToWorkerMessage>) => {\n const data = event.data\n switch (data.type) {\n case MSG.SETUP: {\n try {\n const payload = data.payload\n config = payload.config\n\n const providerConfig = payload.providerConfig\n\n // Build provider from config\n if (typeof providerConfig === 'string') {\n // Registry lookup\n provider = getProvider(providerConfig)\n } else if (providerConfig && typeof providerConfig === 'object' && 'type' in providerConfig) {\n // ProviderPresetConfig object\n provider = buildProviderFromPreset(providerConfig as any)\n } else {\n throw new Error('Invalid provider config')\n }\n\n sendReady()\n } catch (error) {\n console.error('[FetchGuard Worker] Setup failed:', error)\n }\n break\n }\n\n case MSG.FETCH: {\n const { id } = data\n try {\n const { url, options } = data.payload\n const controller = new AbortController()\n pendingControllers.set(id, controller)\n const merged: RequestInit = { ...(options || {}), signal: controller.signal }\n const result = await makeApiRequest(url, merged)\n\n if (result.isOk()) {\n const response = result.data as { body: string; status: number; headers?: Record<string, string> }\n sendFetchResult(id, response.status, response.body, response.headers)\n } else {\n const error = result.errors?.[0]\n const message = error?.message || 'Unknown error'\n const status = result.status\n sendFetchError(id, message, status)\n }\n\n pendingControllers.delete(id)\n } catch (error) {\n pendingControllers.delete(id)\n sendFetchError(id, error instanceof Error ? error.message : String(error), undefined)\n }\n break\n }\n\n case MSG.AUTH_CALL: {\n const { id, payload } = data\n try {\n const { method, args } = payload\n\n if (typeof provider[method] !== 'function') {\n sendResult(id, err(GeneralErrors.Unexpected({ message: `Method '${method}' not found on provider` })))\n break\n }\n\n const result = await provider[method](...args)\n if (result.isError()) { sendResult(id, result); break }\n\n const tokenInfo = result.data\n\n setTokenState(tokenInfo)\n\n sendResult(id, ok(undefined))\n } catch (error) {\n sendResult(id, err(GeneralErrors.Unexpected({ message: error instanceof Error ? error.message : String(error) })))\n }\n break\n }\n\n case MSG.CANCEL: {\n try {\n const { id } = data\n const controller = pendingControllers.get(id)\n if (controller) {\n controller.abort()\n pendingControllers.delete(id)\n }\n } catch (error) {\n if (config?.debug) {\n console.error('CANCEL error:', error)\n }\n }\n break\n }\n\n case MSG.PING: {\n const { id } = data\n try {\n const ts = data.payload?.timestamp ?? Date.now()\n sendPong(id, ts)\n } catch (error) {\n sendResult(id, err(GeneralErrors.Unexpected({ message: error instanceof Error ? error.message : String(error) })))\n }\n break\n }\n\n default: {\n const anyData: any = data\n sendResult(anyData.id, err(GeneralErrors.UnknownMessage({ message: `Unknown message type: ${String(anyData.type)}` })))\n }\n }\n}\n\n})() // End IIFE - Immediately Invoked Function Expression\n","import type { SerializedResult } from 'ts-micro-result'\r\nimport type { WorkerConfig, FetchGuardRequestInit, ProviderPresetConfig } from './types'\r\n\r\n/**\r\n * MESSAGE PAYLOADS - SINGLE SOURCE OF TRUTH\r\n *\r\n * Define all message payloads here. Type unions and MSG constants are auto-generated.\r\n *\r\n * USAGE:\r\n * - To add a new message: Just add one line to the appropriate interface\r\n * - Payload types are automatically inferred\r\n * - MSG constants are automatically generated\r\n *\r\n * EXAMPLE:\r\n * ```typescript\r\n * interface MainPayloads {\r\n * NEW_MESSAGE: { foo: string } // Add this line\r\n * }\r\n * // => Automatically get MainToWorkerMessage union with NEW_MESSAGE\r\n * // => Automatically get MSG.NEW_MESSAGE = 'NEW_MESSAGE'\r\n * ```\r\n */\r\n\r\n/**\r\n * Payloads for messages sent from Main thread → Worker thread\r\n */\r\nexport interface MainPayloads {\r\n SETUP: { config: WorkerConfig; providerConfig: ProviderPresetConfig | string | null }\r\n FETCH: { url: string; options?: FetchGuardRequestInit }\r\n AUTH_CALL: { method: string; args: unknown[] } // Generic auth method call (login, logout, loginWithPhone, etc.)\r\n CANCEL: undefined\r\n PING: { timestamp: number }\r\n}\r\n\r\n/**\r\n * Payloads for messages sent from Worker thread → Main thread\r\n */\r\nexport interface WorkerPayloads {\r\n RESULT: { result: SerializedResult | object }\r\n READY: undefined\r\n PONG: { timestamp: number }\r\n LOG: { level: 'info' | 'warn' | 'error'; message: string }\r\n AUTH_STATE_CHANGED: { authenticated: boolean; expiresAt?: number | null; user?: unknown }\r\n FETCH_RESULT: { status: number; headers?: Record<string, string>; body: string }\r\n FETCH_ERROR: { error: string; status?: number }\r\n}\r\n\r\n/**\r\n * Generate message type from payload definition\r\n * Handles optional payloads (undefined) gracefully\r\n */\r\ntype MessageFromPayloads<P> = {\r\n [K in keyof P]: { id: string; type: K } & (\r\n P[K] extends undefined ? {} : { payload: P[K] }\r\n )\r\n}[keyof P]\r\n\r\n/**\r\n * Message type unions - auto-generated from payload interfaces\r\n */\r\nexport type MainToWorkerMessage = MessageFromPayloads<MainPayloads>\r\nexport type WorkerToMainMessage = MessageFromPayloads<WorkerPayloads>\r\n\r\n/**\r\n * Message type unions for compile-time type checking\r\n */\r\nexport type MainType = keyof MainPayloads\r\nexport type WorkerType = keyof WorkerPayloads\r\nexport type MessageType = MainType | WorkerType\r\n\r\n/**\r\n * MSG constants object - auto-generated from payload keys\r\n * Usage: MSG.SETUP, MSG.FETCH, etc.\r\n */\r\nexport const MSG = Object.freeze({\r\n ...Object.fromEntries(\r\n (Object.keys({} as MainPayloads) as (keyof MainPayloads)[]).map(k => [k, k])\r\n ),\r\n ...Object.fromEntries(\r\n (Object.keys({} as WorkerPayloads) as (keyof WorkerPayloads)[]).map(k => [k, k])\r\n ),\r\n}) as { readonly [K in MessageType]: K }\r\n","/**\n * FetchGuard Default Configuration Values\n */\n\n/**\n * Default time (in milliseconds) to refresh token before expiry\n * @default 60000 (60 seconds)\n */\nexport const DEFAULT_REFRESH_EARLY_MS = 60_000\n\n/**\n * Default timeout for API requests (in milliseconds)\n * @default 30000 (30 seconds)\n */\nexport const DEFAULT_TIMEOUT_MS = 30_000\n\n/**\n * Default number of retry attempts for failed requests\n * @default 3\n */\nexport const DEFAULT_RETRY_COUNT = 3\n\n/**\n * Default delay between retry attempts (in milliseconds)\n * @default 1000 (1 second)\n */\nexport const DEFAULT_RETRY_DELAY_MS = 1_000\n","/**\n * Error definitions organized by domain\n * Using ts-micro-result's defineError for consistency\n */\n\nimport { defineError, defineErrorAdvanced } from 'ts-micro-result'\n\n/**\n * General errors\n */\nexport const GeneralErrors = {\n Unexpected: defineError('UNEXPECTED', 'Unexpected error', 500),\n UnknownMessage: defineError('UNKNOWN_MESSAGE', 'Unknown message type', 400),\n ResultParse: defineError('RESULT_PARSE_ERROR', 'Failed to parse result', 500),\n} as const\n\n/**\n * Initialization errors\n */\nexport const InitErrors = {\n NotInitialized: defineError('INIT_ERROR', 'Worker not initialized', 500),\n ProviderInitFailed: defineError('PROVIDER_INIT_FAILED', 'Failed to initialize provider', 500),\n InitFailed: defineError('INIT_FAILED', 'Initialization failed', 500),\n} as const\n\n/**\n * Authentication & Token errors\n */\nexport const AuthErrors = {\n TokenRefreshFailed: defineError('TOKEN_REFRESH_FAILED', 'Token refresh failed', 401),\n LoginFailed: defineError('LOGIN_FAILED', 'Login failed', 401),\n LogoutFailed: defineError('LOGOUT_FAILED', 'Logout failed', 500),\n NotAuthenticated: defineError('NOT_AUTHENTICATED', 'User is not authenticated', 401),\n} as const\n\n/**\n * Domain validation errors\n */\nexport const DomainErrors = {\n NotAllowed: defineErrorAdvanced('DOMAIN_NOT_ALLOWED', 'Domain not allowed: {url}', 403),\n} as const\n\n/**\n * Network & HTTP errors\n */\nexport const NetworkErrors = {\n NetworkError: defineError('NETWORK_ERROR', 'Network error', 500),\n HttpError: defineError('HTTP_ERROR', 'HTTP error', 500),\n FetchError: defineError('FETCH_ERROR', 'Fetch error', 500),\n} as const\n\n/**\n * Request errors\n */\nexport const RequestErrors = {\n Cancelled: defineError('REQUEST_CANCELLED', 'Request was cancelled', 499),\n Timeout: defineError('REQUEST_TIMEOUT', 'Request timeout', 408),\n} as const\n","/**\r\n * Worker postMessage helpers\r\n * Utilities to send messages from worker thread to main thread\r\n */\r\n\r\nimport type { WorkerToMainMessage } from './messages'\r\nimport type { Result } from 'ts-micro-result'\r\nimport { MSG } from './messages'\r\n\r\n/**\r\n * Internal helper to post message to main thread\r\n */\r\nfunction post(message: WorkerToMainMessage): void {\r\n ;(self as DedicatedWorkerGlobalScope).postMessage(message)\r\n}\r\n\r\n/**\r\n * Send generic Result for non-fetch operations (INIT, LOGIN, LOGOUT, etc.)\r\n */\r\nexport function sendResult(id: string, result: Result<any>): void {\r\n post({\r\n type: MSG.RESULT,\r\n id,\r\n payload: { result: result.toJSON() }\r\n } as any)\r\n}\r\n\r\n/**\r\n * Send successful fetch response\r\n */\r\nexport function sendFetchResult(id: string, status: number, body: string, headers?: Record<string, string>): void {\r\n post({\r\n type: MSG.FETCH_RESULT,\r\n id,\r\n payload: headers ? ({ status, body, headers }) : ({ status, body })\r\n } as any)\r\n}\r\n\r\n/**\r\n * Send fetch error response\r\n */\r\nexport function sendFetchError(id: string, error: string, status?: number): void {\r\n post({\r\n type: MSG.FETCH_ERROR,\r\n id,\r\n payload: { error, status }\r\n } as any)\r\n}\r\n\r\n/**\r\n * Send READY event (worker initialized)\r\n */\r\nexport function sendReady(): void {\r\n post({\r\n type: MSG.READY,\r\n id: `evt_${Date.now()}`\r\n } as any)\r\n}\r\n\r\n/**\r\n * Send PONG response to PING\r\n */\r\nexport function sendPong(id: string, timestamp: number): void {\r\n post({\r\n type: MSG.PONG,\r\n id,\r\n payload: { timestamp }\r\n } as any)\r\n}\r\n\r\n/**\r\n * Send AUTH_STATE_CHANGED event\r\n */\r\nexport function sendAuthStateChanged(authenticated: boolean, expiresAt?: number | null, user?: unknown): void {\r\n post({\r\n type: MSG.AUTH_STATE_CHANGED,\r\n id: `evt_${Date.now()}`,\r\n payload: { authenticated, expiresAt, user }\r\n } as any)\r\n}\r\n","import type { TokenProvider } from '../types'\r\n\r\n/**\r\n * Registry to manage token providers\r\n */\r\nconst registry = new Map<string, TokenProvider>()\r\n\r\n/**\r\n * Register a token provider with name\r\n */\r\nexport function registerProvider(name: string, provider: TokenProvider): void {\r\n if (typeof name !== 'string' || !name.trim()) {\r\n throw new Error('Provider name must be a non-empty string')\r\n }\r\n \r\n if (!provider || typeof provider.refreshToken !== 'function') {\r\n throw new Error('Provider must implement TokenProvider interface')\r\n }\r\n \r\n registry.set(name, provider)\r\n}\r\n\r\n/**\r\n * Get provider by name\r\n */\r\nexport function getProvider(name: string): TokenProvider {\r\n const provider = registry.get(name)\r\n if (!provider) {\r\n throw new Error(`Provider '${name}' not found. Available providers: ${Array.from(registry.keys()).join(', ')}`)\r\n }\r\n return provider\r\n}\r\n\r\n/**\r\n * Check if provider exists\r\n */\r\nexport function hasProvider(name: string): boolean {\r\n return registry.has(name)\r\n}\r\n\r\n/**\r\n * Get list of all provider names\r\n */\r\nexport function listProviders(): string[] {\r\n return Array.from(registry.keys())\r\n}\r\n\r\n/**\r\n * Remove provider\r\n */\r\nexport function unregisterProvider(name: string): boolean {\r\n return registry.delete(name)\r\n}\r\n\r\n/**\r\n * Remove all providers\r\n */\r\nexport function clearProviders(): void {\r\n registry.clear()\r\n}\r\n","import type {\r\n TokenProvider,\r\n RefreshTokenStorage,\r\n TokenParser,\r\n AuthStrategy,\r\n TokenInfo\r\n} from '../types'\r\nimport { ok, err, type Result } from 'ts-micro-result'\r\nimport { AuthErrors, NetworkErrors } from '../errors'\r\n\r\n/**\r\n * Custom auth method type\r\n */\r\ntype CustomAuthMethod = (...args: any[]) => Promise<Result<TokenInfo>>\r\n\r\n/**\r\n * Configuration for creating provider\r\n *\r\n * refreshStorage: OPTIONAL - to load refresh token initially when worker starts\r\n * - undefined: cookie-based auth (httpOnly cookie, no need to load)\r\n * - RefreshTokenStorage: body-based auth (load from IndexedDB on startup)\r\n *\r\n * strategy: AuthStrategy with refresh (required), login/logout (required)\r\n *\r\n * customMethods: OPTIONAL - custom auth methods (loginWithPhone, loginWithGoogle, etc.)\r\n */\r\nexport interface ProviderConfig {\r\n refreshStorage?: RefreshTokenStorage\r\n parser: TokenParser\r\n strategy: AuthStrategy\r\n customMethods?: Record<string, CustomAuthMethod>\r\n}\r\n\r\n/**\r\n * Factory function to create TokenProvider from modular components\r\n *\r\n * Provider automatically handles refresh token:\r\n * - If refreshToken is null and storage exists → load from storage initially\r\n * - If refreshToken exists → use token from worker memory\r\n * - Cookie-based (no storage) → always null\r\n *\r\n * Custom methods:\r\n * - User can add custom auth methods (loginWithPhone, loginWithGoogle, etc.)\r\n * - Custom methods will be spread into provider object\r\n */\r\nexport function createProvider(config: ProviderConfig): TokenProvider {\r\n const baseProvider: Pick<TokenProvider, 'refreshToken' | 'login' | 'logout'> = {\r\n async refreshToken(refreshToken: string | null) {\r\n let currentRefreshToken = refreshToken\r\n if (currentRefreshToken === null && config.refreshStorage) {\r\n currentRefreshToken = await config.refreshStorage.get()\r\n }\r\n\r\n try {\r\n const response = await config.strategy.refresh(currentRefreshToken)\r\n\r\n if (!response.ok) {\r\n return err(AuthErrors.TokenRefreshFailed({ message: `HTTP ${response.status}` }))\r\n }\r\n\r\n const tokenInfo = await config.parser.parse(response)\r\n if (!tokenInfo.token) {\r\n return err(AuthErrors.TokenRefreshFailed({ message: 'No access token in response' }))\r\n }\r\n\r\n if (config.refreshStorage && tokenInfo.refreshToken) {\r\n await config.refreshStorage.set(tokenInfo.refreshToken)\r\n }\r\n\r\n return ok(tokenInfo)\r\n } catch (error) {\r\n return err(NetworkErrors.NetworkError({ message: String(error) }))\r\n }\r\n },\r\n\r\n async login(payload: unknown) {\r\n try {\r\n const response = await config.strategy.login(payload)\r\n\r\n if (!response.ok) {\r\n return err(AuthErrors.LoginFailed({ message: `HTTP ${response.status}` }))\r\n }\r\n\r\n const tokenInfo = await config.parser.parse(response)\r\n if (!tokenInfo.token) {\r\n return err(AuthErrors.LoginFailed({ message: 'No access token in response' }))\r\n }\r\n\r\n if (config.refreshStorage && tokenInfo.refreshToken) {\r\n await config.refreshStorage.set(tokenInfo.refreshToken)\r\n }\r\n\r\n return ok(tokenInfo)\r\n } catch (error) {\r\n return err(NetworkErrors.NetworkError({ message: String(error) }))\r\n }\r\n },\r\n\r\n async logout(payload?: unknown) {\r\n try {\r\n const response = await config.strategy.logout(payload)\r\n\r\n if (!response.ok) {\r\n return err(AuthErrors.LogoutFailed({ message: `HTTP ${response.status}` }))\r\n }\r\n\r\n if (config.refreshStorage) {\r\n await config.refreshStorage.set(null)\r\n }\r\n\r\n return ok({\r\n token: '',\r\n refreshToken: undefined,\r\n expiresAt: undefined,\r\n user: undefined\r\n })\r\n } catch (error) {\r\n return err(NetworkErrors.NetworkError({ message: String(error) }))\r\n }\r\n }\r\n }\r\n\r\n // Merge custom methods if provided\r\n if (config.customMethods) {\r\n return {\r\n ...baseProvider,\r\n ...config.customMethods\r\n } as TokenProvider\r\n }\r\n\r\n return baseProvider as TokenProvider\r\n}\r\n","import type { RefreshTokenStorage } from '../../types'\r\n\r\n/**\r\n * IndexedDB storage - only stores refresh token in IndexedDB\r\n * Suitable for body-based refresh strategy\r\n * Persists refresh token for reuse after reload\r\n */\r\nexport function createIndexedDBStorage(dbName = 'FetchGuardDB', refreshTokenKey = 'refreshToken'): RefreshTokenStorage {\r\n const storeName = 'tokens'\r\n\r\n const openDB = (): Promise<IDBDatabase> => {\r\n return new Promise((resolve, reject) => {\r\n const request = indexedDB.open(dbName, 1)\r\n \r\n request.onerror = () => reject(request.error)\r\n request.onsuccess = () => resolve(request.result)\r\n \r\n request.onupgradeneeded = (event) => {\r\n const db = (event.target as IDBOpenDBRequest).result\r\n if (!db.objectStoreNames.contains(storeName)) {\r\n const store = db.createObjectStore(storeName, { keyPath: 'key' })\r\n store.createIndex('timestamp', 'timestamp', { unique: false })\r\n }\r\n }\r\n })\r\n }\r\n\r\n const promisifyRequest = <T>(request: IDBRequest<T>): Promise<T> => {\r\n return new Promise((resolve, reject) => {\r\n request.onsuccess = () => resolve(request.result)\r\n request.onerror = () => reject(request.error)\r\n })\r\n }\r\n\r\n return {\r\n async get() {\r\n try {\r\n const db = await openDB()\r\n const transaction = db.transaction([storeName], 'readonly')\r\n const store = transaction.objectStore(storeName)\r\n const result = await promisifyRequest(store.get(refreshTokenKey))\r\n return result?.value || null\r\n } catch (error) {\r\n console.warn('Failed to get refresh token from IndexedDB:', error)\r\n return null\r\n }\r\n },\r\n async set(token) {\r\n try {\r\n const db = await openDB()\r\n const transaction = db.transaction([storeName], 'readwrite')\r\n const store = transaction.objectStore(storeName)\r\n\r\n if (token) {\r\n await promisifyRequest(store.put({ key: refreshTokenKey, value: token, timestamp: Date.now() }))\r\n } else {\r\n await promisifyRequest(store.delete(refreshTokenKey))\r\n }\r\n } catch (error) {\r\n console.warn('Failed to save refresh token to IndexedDB:', error)\r\n }\r\n }\r\n }\r\n}\r\n","import type { TokenParser } from '../../types'\r\n\r\n/**\r\n * Body parser - parse token from response body (JSON)\r\n * Expects response format: { data: { accessToken, refreshToken, expiresAt?, user? } }\r\n */\r\nexport const bodyParser: TokenParser = {\r\n async parse(response) {\r\n const json = await response.clone().json()\r\n return {\r\n token: json.data.accessToken,\r\n refreshToken: json.data.refreshToken,\r\n expiresAt: json.data.expiresAt,\r\n user: json.data.user\r\n }\r\n }\r\n}\r\n","import type { TokenParser } from '../../types'\r\n\r\n/**\r\n * Cookie parser - parse access token from response body\r\n * Expects response format: { data: { accessToken, expiresAt?, user? } }\r\n * Refresh token is automatically set by backend into httpOnly cookie\r\n */\r\nexport const cookieParser: TokenParser = {\r\n async parse(response) {\r\n const json = await response.clone().json()\r\n return {\r\n token: json.data.accessToken,\r\n expiresAt: json.data.expiresAt,\r\n user: json.data.user\r\n }\r\n }\r\n}\r\n","import type { AuthStrategy } from '../../types'\r\n\r\n/**\r\n * Cookie auth strategy - all auth operations via httpOnly cookies\r\n * Suitable for SSR and cross-domain authentication\r\n *\r\n * Refresh token is sent automatically via httpOnly cookie\r\n * Credentials are sent in request body\r\n */\r\nexport function createCookieStrategy(config: {\r\n refreshUrl: string\r\n loginUrl: string\r\n logoutUrl: string\r\n}): AuthStrategy {\r\n return {\r\n async refresh() {\r\n return fetch(config.refreshUrl, {\r\n method: 'POST',\r\n headers: { 'Content-Type': 'application/json' },\r\n credentials: 'include'\r\n })\r\n },\r\n\r\n async login(payload) {\r\n return fetch(config.loginUrl, {\r\n method: 'POST',\r\n headers: { 'Content-Type': 'application/json' },\r\n body: JSON.stringify(payload),\r\n credentials: 'include'\r\n })\r\n },\r\n\r\n async logout(payload) {\r\n return fetch(config.logoutUrl, {\r\n method: 'POST',\r\n headers: { 'Content-Type': 'application/json' },\r\n body: payload ? JSON.stringify(payload) : undefined,\r\n credentials: 'include'\r\n })\r\n }\r\n }\r\n}\r\n\r\n/**\r\n * Standard cookie strategy\r\n */\r\nexport const cookieStrategy = createCookieStrategy({\r\n refreshUrl: '/auth/refresh',\r\n loginUrl: '/auth/login',\r\n logoutUrl: '/auth/logout'\r\n})\r\n","import type { AuthStrategy } from '../../types'\r\n\r\n/**\r\n * Body auth strategy - all auth operations via request body\r\n * Suitable for SPA applications\r\n *\r\n * All tokens/credentials are sent in request body\r\n */\r\nexport function createBodyStrategy(config: {\r\n refreshUrl: string\r\n loginUrl: string\r\n logoutUrl: string\r\n}): AuthStrategy {\r\n return {\r\n async refresh(refreshToken) {\r\n if (!refreshToken) {\r\n throw new Error('No refresh token available')\r\n }\r\n\r\n return fetch(config.refreshUrl, {\r\n method: 'POST',\r\n headers: { 'Content-Type': 'application/json' },\r\n body: JSON.stringify({ refreshToken }),\r\n credentials: 'include'\r\n })\r\n },\r\n\r\n async login(payload) {\r\n return fetch(config.loginUrl, {\r\n method: 'POST',\r\n headers: { 'Content-Type': 'application/json' },\r\n body: JSON.stringify(payload),\r\n credentials: 'include'\r\n })\r\n },\r\n\r\n async logout(payload) {\r\n return fetch(config.logoutUrl, {\r\n method: 'POST',\r\n headers: { 'Content-Type': 'application/json' },\r\n body: payload ? JSON.stringify(payload) : undefined,\r\n credentials: 'include'\r\n })\r\n }\r\n }\r\n}\r\n\r\n/**\r\n * Standard body strategy\r\n */\r\nexport const bodyStrategy = createBodyStrategy({\r\n refreshUrl: '/auth/refresh',\r\n loginUrl: '/auth/login',\r\n logoutUrl: '/auth/logout'\r\n})\r\n","import { createProvider } from './create-provider'\r\nimport { createIndexedDBStorage } from './storage/indexeddb'\r\nimport { bodyParser } from './parser/body'\r\nimport { cookieParser } from './parser/cookie'\r\nimport { createCookieStrategy } from './strategy/cookie'\r\nimport { createBodyStrategy } from './strategy/body'\r\nimport type { TokenProvider } from '../types'\r\n\r\n/**\r\n * Cookie Provider - uses httpOnly cookies\r\n * Suitable for SSR and cross-domain authentication\r\n *\r\n * Access token: Worker memory\r\n * Refresh token: httpOnly cookie (managed by backend)\r\n */\r\nexport function createCookieProvider(config: {\r\n refreshUrl: string\r\n loginUrl: string\r\n logoutUrl: string\r\n}): TokenProvider {\r\n return createProvider({\r\n refreshStorage: undefined,\r\n parser: cookieParser,\r\n strategy: createCookieStrategy(config)\r\n })\r\n}\r\n\r\n/**\r\n * Body Provider - refresh token in response body, persisted to IndexedDB\r\n * Suitable for SPA applications\r\n *\r\n * Access token: Worker memory\r\n * Refresh token: IndexedDB (persists across reload)\r\n */\r\nexport function createBodyProvider(config: {\r\n refreshUrl: string\r\n loginUrl: string\r\n logoutUrl: string\r\n refreshTokenKey?: string\r\n}): TokenProvider {\r\n return createProvider({\r\n refreshStorage: createIndexedDBStorage('FetchGuardDB', config.refreshTokenKey || 'refreshToken'),\r\n parser: bodyParser,\r\n strategy: createBodyStrategy(config)\r\n })\r\n}\r\n","import { createCookieProvider, createBodyProvider } from './presets'\r\nimport type { TokenProvider, ProviderPresetConfig } from '../types'\r\n\r\n/**\r\n * Build provider from preset config\r\n * This is called in worker when receiving SETUP message\r\n */\r\nexport function buildProviderFromPreset(config: ProviderPresetConfig): TokenProvider {\r\n switch (config.type) {\r\n case 'cookie-auth':\r\n return createCookieProvider({\r\n refreshUrl: config.refreshUrl,\r\n loginUrl: config.loginUrl,\r\n logoutUrl: config.logoutUrl\r\n })\r\n\r\n case 'body-auth':\r\n return createBodyProvider({\r\n refreshUrl: config.refreshUrl,\r\n loginUrl: config.loginUrl,\r\n logoutUrl: config.logoutUrl,\r\n refreshTokenKey: config.refreshTokenKey\r\n })\r\n\r\n default:\r\n throw new Error(`Unknown provider type: ${(config as any).type}`)\r\n }\r\n}\r\n"],"mappings":";AAIA,SAAS,MAAAA,KAAI,OAAAC,YAAwB;;;ACsE9B,IAAM,MAAM,OAAO,OAAO;AAAA,EAC/B,GAAG,OAAO;AAAA,IACP,OAAO,KAAK,CAAC,CAAiB,EAA6B,IAAI,OAAK,CAAC,GAAG,CAAC,CAAC;AAAA,EAC7E;AAAA,EACA,GAAG,OAAO;AAAA,IACP,OAAO,KAAK,CAAC,CAAmB,EAA+B,IAAI,OAAK,CAAC,GAAG,CAAC,CAAC;AAAA,EACjF;AACF,CAAC;;;ACzEM,IAAM,2BAA2B;;;ACHxC,SAAS,aAAa,2BAA2B;AAK1C,IAAM,gBAAgB;AAAA,EAC3B,YAAY,YAAY,cAAc,oBAAoB,GAAG;AAAA,EAC7D,gBAAgB,YAAY,mBAAmB,wBAAwB,GAAG;AAAA,EAC1E,aAAa,YAAY,sBAAsB,0BAA0B,GAAG;AAC9E;AAKO,IAAM,aAAa;AAAA,EACxB,gBAAgB,YAAY,cAAc,0BAA0B,GAAG;AAAA,EACvE,oBAAoB,YAAY,wBAAwB,iCAAiC,GAAG;AAAA,EAC5F,YAAY,YAAY,eAAe,yBAAyB,GAAG;AACrE;AAKO,IAAM,aAAa;AAAA,EACxB,oBAAoB,YAAY,wBAAwB,wBAAwB,GAAG;AAAA,EACnF,aAAa,YAAY,gBAAgB,gBAAgB,GAAG;AAAA,EAC5D,cAAc,YAAY,iBAAiB,iBAAiB,GAAG;AAAA,EAC/D,kBAAkB,YAAY,qBAAqB,6BAA6B,GAAG;AACrF;AAKO,IAAM,eAAe;AAAA,EAC1B,YAAY,oBAAoB,sBAAsB,6BAA6B,GAAG;AACxF;AAKO,IAAM,gBAAgB;AAAA,EAC3B,cAAc,YAAY,iBAAiB,iBAAiB,GAAG;AAAA,EAC/D,WAAW,YAAY,cAAc,cAAc,GAAG;AAAA,EACtD,YAAY,YAAY,eAAe,eAAe,GAAG;AAC3D;AAKO,IAAM,gBAAgB;AAAA,EAC3B,WAAW,YAAY,qBAAqB,yBAAyB,GAAG;AAAA,EACxE,SAAS,YAAY,mBAAmB,mBAAmB,GAAG;AAChE;;;AC7CA,SAAS,KAAK,SAAoC;AAChD;AAAC,EAAC,KAAoC,YAAY,OAAO;AAC3D;AAKO,SAAS,WAAW,IAAY,QAA2B;AAChE,OAAK;AAAA,IACH,MAAM,IAAI;AAAA,IACV;AAAA,IACA,SAAS,EAAE,QAAQ,OAAO,OAAO,EAAE;AAAA,EACrC,CAAQ;AACV;AAKO,SAAS,gBAAgB,IAAY,QAAgB,MAAc,SAAwC;AAChH,OAAK;AAAA,IACH,MAAM,IAAI;AAAA,IACV;AAAA,IACA,SAAS,UAAW,EAAE,QAAQ,MAAM,QAAQ,IAAM,EAAE,QAAQ,KAAK;AAAA,EACnE,CAAQ;AACV;AAKO,SAAS,eAAe,IAAY,OAAe,QAAuB;AAC/E,OAAK;AAAA,IACH,MAAM,IAAI;AAAA,IACV;AAAA,IACA,SAAS,EAAE,OAAO,OAAO;AAAA,EAC3B,CAAQ;AACV;AAKO,SAAS,YAAkB;AAChC,OAAK;AAAA,IACH,MAAM,IAAI;AAAA,IACV,IAAI,OAAO,KAAK,IAAI,CAAC;AAAA,EACvB,CAAQ;AACV;AAKO,SAAS,SAAS,IAAY,WAAyB;AAC5D,OAAK;AAAA,IACH,MAAM,IAAI;AAAA,IACV;AAAA,IACA,SAAS,EAAE,UAAU;AAAA,EACvB,CAAQ;AACV;AAKO,SAAS,qBAAqB,eAAwB,WAA2B,MAAsB;AAC5G,OAAK;AAAA,IACH,MAAM,IAAI;AAAA,IACV,IAAI,OAAO,KAAK,IAAI,CAAC;AAAA,IACrB,SAAS,EAAE,eAAe,WAAW,KAAK;AAAA,EAC5C,CAAQ;AACV;;;AC1EA,IAAM,WAAW,oBAAI,IAA2B;AAoBzC,SAAS,YAAY,MAA6B;AACvD,QAAM,WAAW,SAAS,IAAI,IAAI;AAClC,MAAI,CAAC,UAAU;AACb,UAAM,IAAI,MAAM,aAAa,IAAI,qCAAqC,MAAM,KAAK,SAAS,KAAK,CAAC,EAAE,KAAK,IAAI,CAAC,EAAE;AAAA,EAChH;AACA,SAAO;AACT;;;ACxBA,SAAS,IAAI,WAAwB;AAsC9B,SAAS,eAAe,QAAuC;AACpE,QAAM,eAAyE;AAAA,IAC7E,MAAM,aAAa,cAA6B;AAC9C,UAAI,sBAAsB;AAC1B,UAAI,wBAAwB,QAAQ,OAAO,gBAAgB;AACzD,8BAAsB,MAAM,OAAO,eAAe,IAAI;AAAA,MACxD;AAEA,UAAI;AACF,cAAM,WAAW,MAAM,OAAO,SAAS,QAAQ,mBAAmB;AAElE,YAAI,CAAC,SAAS,IAAI;AAChB,iBAAO,IAAI,WAAW,mBAAmB,EAAE,SAAS,QAAQ,SAAS,MAAM,GAAG,CAAC,CAAC;AAAA,QAClF;AAEA,cAAM,YAAY,MAAM,OAAO,OAAO,MAAM,QAAQ;AACpD,YAAI,CAAC,UAAU,OAAO;AACpB,iBAAO,IAAI,WAAW,mBAAmB,EAAE,SAAS,8BAA8B,CAAC,CAAC;AAAA,QACtF;AAEA,YAAI,OAAO,kBAAkB,UAAU,cAAc;AACnD,gBAAM,OAAO,eAAe,IAAI,UAAU,YAAY;AAAA,QACxD;AAEA,eAAO,GAAG,SAAS;AAAA,MACrB,SAAS,OAAO;AACd,eAAO,IAAI,cAAc,aAAa,EAAE,SAAS,OAAO,KAAK,EAAE,CAAC,CAAC;AAAA,MACnE;AAAA,IACF;AAAA,IAEA,MAAM,MAAM,SAAkB;AAC5B,UAAI;AACF,cAAM,WAAW,MAAM,OAAO,SAAS,MAAM,OAAO;AAEpD,YAAI,CAAC,SAAS,IAAI;AAChB,iBAAO,IAAI,WAAW,YAAY,EAAE,SAAS,QAAQ,SAAS,MAAM,GAAG,CAAC,CAAC;AAAA,QAC3E;AAEA,cAAM,YAAY,MAAM,OAAO,OAAO,MAAM,QAAQ;AACpD,YAAI,CAAC,UAAU,OAAO;AACpB,iBAAO,IAAI,WAAW,YAAY,EAAE,SAAS,8BAA8B,CAAC,CAAC;AAAA,QAC/E;AAEA,YAAI,OAAO,kBAAkB,UAAU,cAAc;AACnD,gBAAM,OAAO,eAAe,IAAI,UAAU,YAAY;AAAA,QACxD;AAEA,eAAO,GAAG,SAAS;AAAA,MACrB,SAAS,OAAO;AACd,eAAO,IAAI,cAAc,aAAa,EAAE,SAAS,OAAO,KAAK,EAAE,CAAC,CAAC;AAAA,MACnE;AAAA,IACF;AAAA,IAEA,MAAM,OAAO,SAAmB;AAC9B,UAAI;AACF,cAAM,WAAW,MAAM,OAAO,SAAS,OAAO,OAAO;AAErD,YAAI,CAAC,SAAS,IAAI;AAChB,iBAAO,IAAI,WAAW,aAAa,EAAE,SAAS,QAAQ,SAAS,MAAM,GAAG,CAAC,CAAC;AAAA,QAC5E;AAEA,YAAI,OAAO,gBAAgB;AACzB,gBAAM,OAAO,eAAe,IAAI,IAAI;AAAA,QACtC;AAEA,eAAO,GAAG;AAAA,UACR,OAAO;AAAA,UACP,cAAc;AAAA,UACd,WAAW;AAAA,UACX,MAAM;AAAA,QACR,CAAC;AAAA,MACH,SAAS,OAAO;AACd,eAAO,IAAI,cAAc,aAAa,EAAE,SAAS,OAAO,KAAK,EAAE,CAAC,CAAC;AAAA,MACnE;AAAA,IACF;AAAA,EACF;AAGA,MAAI,OAAO,eAAe;AACxB,WAAO;AAAA,MACL,GAAG;AAAA,MACH,GAAG,OAAO;AAAA,IACZ;AAAA,EACF;AAEA,SAAO;AACT;;;AC5HO,SAAS,uBAAuB,SAAS,gBAAgB,kBAAkB,gBAAqC;AACrH,QAAM,YAAY;AAElB,QAAM,SAAS,MAA4B;AACzC,WAAO,IAAI,QAAQ,CAAC,SAAS,WAAW;AACtC,YAAM,UAAU,UAAU,KAAK,QAAQ,CAAC;AAExC,cAAQ,UAAU,MAAM,OAAO,QAAQ,KAAK;AAC5C,cAAQ,YAAY,MAAM,QAAQ,QAAQ,MAAM;AAEhD,cAAQ,kBAAkB,CAAC,UAAU;AACnC,cAAM,KAAM,MAAM,OAA4B;AAC9C,YAAI,CAAC,GAAG,iBAAiB,SAAS,SAAS,GAAG;AAC5C,gBAAM,QAAQ,GAAG,kBAAkB,WAAW,EAAE,SAAS,MAAM,CAAC;AAChE,gBAAM,YAAY,aAAa,aAAa,EAAE,QAAQ,MAAM,CAAC;AAAA,QAC/D;AAAA,MACF;AAAA,IACF,CAAC;AAAA,EACH;AAEA,QAAM,mBAAmB,CAAI,YAAuC;AAClE,WAAO,IAAI,QAAQ,CAAC,SAAS,WAAW;AACtC,cAAQ,YAAY,MAAM,QAAQ,QAAQ,MAAM;AAChD,cAAQ,UAAU,MAAM,OAAO,QAAQ,KAAK;AAAA,IAC9C,CAAC;AAAA,EACH;AAEA,SAAO;AAAA,IACL,MAAM,MAAM;AACV,UAAI;AACF,cAAM,KAAK,MAAM,OAAO;AACxB,cAAM,cAAc,GAAG,YAAY,CAAC,SAAS,GAAG,UAAU;AAC1D,cAAM,QAAQ,YAAY,YAAY,SAAS;AAC/C,cAAM,SAAS,MAAM,iBAAiB,MAAM,IAAI,eAAe,CAAC;AAChE,eAAO,QAAQ,SAAS;AAAA,MAC1B,SAAS,OAAO;AACd,gBAAQ,KAAK,+CAA+C,KAAK;AACjE,eAAO;AAAA,MACT;AAAA,IACF;AAAA,IACA,MAAM,IAAI,OAAO;AACf,UAAI;AACF,cAAM,KAAK,MAAM,OAAO;AACxB,cAAM,cAAc,GAAG,YAAY,CAAC,SAAS,GAAG,WAAW;AAC3D,cAAM,QAAQ,YAAY,YAAY,SAAS;AAE/C,YAAI,OAAO;AACT,gBAAM,iBAAiB,MAAM,IAAI,EAAE,KAAK,iBAAiB,OAAO,OAAO,WAAW,KAAK,IAAI,EAAE,CAAC,CAAC;AAAA,QACjG,OAAO;AACL,gBAAM,iBAAiB,MAAM,OAAO,eAAe,CAAC;AAAA,QACtD;AAAA,MACF,SAAS,OAAO;AACd,gBAAQ,KAAK,8CAA8C,KAAK;AAAA,MAClE;AAAA,IACF;AAAA,EACF;AACF;;;ACzDO,IAAM,aAA0B;AAAA,EACrC,MAAM,MAAM,UAAU;AACpB,UAAM,OAAO,MAAM,SAAS,MAAM,EAAE,KAAK;AACzC,WAAO;AAAA,MACL,OAAO,KAAK,KAAK;AAAA,MACjB,cAAc,KAAK,KAAK;AAAA,MACxB,WAAW,KAAK,KAAK;AAAA,MACrB,MAAM,KAAK,KAAK;AAAA,IAClB;AAAA,EACF;AACF;;;ACTO,IAAM,eAA4B;AAAA,EACvC,MAAM,MAAM,UAAU;AACpB,UAAM,OAAO,MAAM,SAAS,MAAM,EAAE,KAAK;AACzC,WAAO;AAAA,MACL,OAAO,KAAK,KAAK;AAAA,MACjB,WAAW,KAAK,KAAK;AAAA,MACrB,MAAM,KAAK,KAAK;AAAA,IAClB;AAAA,EACF;AACF;;;ACPO,SAAS,qBAAqB,QAIpB;AACf,SAAO;AAAA,IACL,MAAM,UAAU;AACd,aAAO,MAAM,OAAO,YAAY;AAAA,QAC9B,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAAA,IAEA,MAAM,MAAM,SAAS;AACnB,aAAO,MAAM,OAAO,UAAU;AAAA,QAC5B,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,KAAK,UAAU,OAAO;AAAA,QAC5B,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAAA,IAEA,MAAM,OAAO,SAAS;AACpB,aAAO,MAAM,OAAO,WAAW;AAAA,QAC7B,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,UAAU,KAAK,UAAU,OAAO,IAAI;AAAA,QAC1C,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAAA,EACF;AACF;AAKO,IAAM,iBAAiB,qBAAqB;AAAA,EACjD,YAAY;AAAA,EACZ,UAAU;AAAA,EACV,WAAW;AACb,CAAC;;;AC1CM,SAAS,mBAAmB,QAIlB;AACf,SAAO;AAAA,IACL,MAAM,QAAQ,cAAc;AAC1B,UAAI,CAAC,cAAc;AACjB,cAAM,IAAI,MAAM,4BAA4B;AAAA,MAC9C;AAEA,aAAO,MAAM,OAAO,YAAY;AAAA,QAC9B,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,KAAK,UAAU,EAAE,aAAa,CAAC;AAAA,QACrC,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAAA,IAEA,MAAM,MAAM,SAAS;AACnB,aAAO,MAAM,OAAO,UAAU;AAAA,QAC5B,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,KAAK,UAAU,OAAO;AAAA,QAC5B,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAAA,IAEA,MAAM,OAAO,SAAS;AACpB,aAAO,MAAM,OAAO,WAAW;AAAA,QAC7B,QAAQ;AAAA,QACR,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAC9C,MAAM,UAAU,KAAK,UAAU,OAAO,IAAI;AAAA,QAC1C,aAAa;AAAA,MACf,CAAC;AAAA,IACH;AAAA,EACF;AACF;AAKO,IAAM,eAAe,mBAAmB;AAAA,EAC7C,YAAY;AAAA,EACZ,UAAU;AAAA,EACV,WAAW;AACb,CAAC;;;ACvCM,SAAS,qBAAqB,QAInB;AAChB,SAAO,eAAe;AAAA,IACpB,gBAAgB;AAAA,IAChB,QAAQ;AAAA,IACR,UAAU,qBAAqB,MAAM;AAAA,EACvC,CAAC;AACH;AASO,SAAS,mBAAmB,QAKjB;AAChB,SAAO,eAAe;AAAA,IACpB,gBAAgB,uBAAuB,gBAAgB,OAAO,mBAAmB,cAAc;AAAA,IAC/F,QAAQ;AAAA,IACR,UAAU,mBAAmB,MAAM;AAAA,EACrC,CAAC;AACH;;;ACtCO,SAAS,wBAAwB,QAA6C;AACnF,UAAQ,OAAO,MAAM;AAAA,IACnB,KAAK;AACH,aAAO,qBAAqB;AAAA,QAC1B,YAAY,OAAO;AAAA,QACnB,UAAU,OAAO;AAAA,QACjB,WAAW,OAAO;AAAA,MACpB,CAAC;AAAA,IAEH,KAAK;AACH,aAAO,mBAAmB;AAAA,QACxB,YAAY,OAAO;AAAA,QACnB,UAAU,OAAO;AAAA,QACjB,WAAW,OAAO;AAAA,QAClB,iBAAiB,OAAO;AAAA,MAC1B,CAAC;AAAA,IAEH;AACE,YAAM,IAAI,MAAM,0BAA2B,OAAe,IAAI,EAAE;AAAA,EACpE;AACF;;;CbLE,WAAY;AACZ,MAAI,SAA8B;AAClC,MAAI,WAAgB;AACpB,MAAI,cAA6B;AACjC,MAAI,eAA8B;AAClC,MAAI,YAA2B;AAC/B,MAAI;AACJ,QAAM,qBAAqB,oBAAI,IAA6B;AAC5D,MAAI,iBAAuC;AAO7C,iBAAe,mBAAmD;AAChE,QAAI,eAAe,WAAW;AAC5B,YAAM,iBAAiB,QAAQ,kBAAkB;AACjD,YAAM,WAAW,YAAY,KAAK,IAAI;AACtC,UAAI,WAAW,gBAAgB;AAC7B,eAAOC,IAAG,WAAW;AAAA,MACvB;AAAA,IACF;AAEA,QAAI,gBAAgB;AAClB,YAAM;AACN,aAAOA,IAAG,WAAW;AAAA,IACvB;AAEA,sBAAkB,YAAY;AAC5B,UAAI;AACF,cAAM,WAAW,MAAM,SAAS,aAAa,YAAY;AAEzD,YAAI,SAAS,QAAQ,GAAG;AACtB,wBAAc,EAAE,OAAO,MAAM,WAAW,MAAM,MAAM,QAAW,cAAc,OAAU,CAAC;AACxF;AAAA,QACF;AAEA,cAAM,YAAY,SAAS;AAE3B,sBAAc,SAAS;AAAA,MACzB,UAAE;AACA,yBAAiB;AAAA,MACnB;AAAA,IACF,GAAG;AAEH,UAAM;AACN,WAAOA,IAAG,WAAW;AAAA,EACvB;AAKA,WAAS,eAAe,KAAsB;AAC5C,QAAI,CAAC,QAAQ,gBAAgB,QAAQ;AACnC,aAAO;AAAA,IACT;AAEA,QAAI;AACF,YAAM,SAAS,IAAI,IAAI,GAAG;AAC1B,YAAM,WAAW,OAAO;AACxB,YAAM,OAAO,OAAO;AAEpB,iBAAW,SAAS,OAAO,gBAAgB;AACzC,cAAM,MAAM,MAAM,YAAY,GAAG;AACjC,cAAM,UAAU,MAAM,MAAM,MAAM,QAAQ,GAAG,MAAM;AACnD,cAAM,UAAU,UAAU,MAAM,MAAM,GAAG,GAAG,IAAI;AAChD,cAAM,YAAY,UAAU,MAAM,MAAM,MAAM,CAAC,IAAI;AACnD,cAAM,aAAa,QAAQ,WAAW,IAAI;AAC1C,cAAM,OAAO,aAAa,QAAQ,MAAM,CAAC,IAAI;AAE7C,cAAM,gBAAgB,aACjB,aAAa,QAAQ,SAAS,SAAS,MAAM,IAAI,IACjD,aAAa;AAElB,YAAI,CAAC,cAAe;AAEpB,YAAI,SAAS;AACX,cAAI,SAAS,UAAW,QAAO;AAC/B;AAAA,QACF;AACA,eAAO;AAAA,MACT;AACA,aAAO;AAAA,IACT,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAKA,iBAAe,eAAe,KAAa,UAAe,CAAC,GAAG;AAC5D,QAAI,CAAC,QAAQ;AACX,aAAOC,KAAI,WAAW,eAAe,CAAC;AAAA,IACxC;AAEA,QAAI,CAAC,eAAe,GAAG,GAAG;AACxB,aAAOA,KAAI,aAAa,WAAW,EAAE,IAAI,CAAC,CAAC;AAAA,IAC7C;AAEA,UAAM,eAAe,QAAQ,iBAAiB;AAC9C,UAAM,iBAAiB,QAAQ,mBAAmB;AAClD,UAAM,eAA4B,EAAE,GAAG,QAAQ;AAC/C,WAAQ,aAAqB;AAC7B,WAAQ,aAAqB;AAE7B,UAAM,UAAkC;AAAA,MACtC,GAAI,aAAa,WAAqC,CAAC;AAAA,IACzD;AAEA,QAAI,CAAC,QAAQ,cAAc,KAAK,CAAC,QAAQ,cAAc,KAAK,aAAa,MAAM;AAC7E,UAAI,OAAO,aAAa,SAAS,YAAY,EAAE,aAAa,gBAAgB,aAAa,EAAE,aAAa,gBAAgB,kBAAkB;AACxI,gBAAQ,cAAc,IAAI;AAAA,MAC5B;AAAA,IACF;AAEA,QAAI,cAAc;AAChB,YAAM,WAAW,MAAM,iBAAiB;AACxC,UAAI,SAAS,QAAQ,EAAG,QAAO;AAE/B,YAAM,QAAQ,SAAS;AACvB,UAAI,OAAO;AACT,gBAAQ,eAAe,IAAI,UAAU,KAAK;AAAA,MAC5C;AAAA,IACF;AAEA,QAAI,WAA4B;AAChC,QAAI,aAAmC;AACvC,eAAW,MAAM,MAAM,KAAK,EAAE,GAAG,cAAc,SAAS,aAAa,UAAU,CAAC,EAAE,MAAM,CAAC,MAAM;AAC7F,YAAM,UAAW,KAAM,EAAU,SAAS;AAC1C,mBAAa,UAAUA,KAAI,cAAc,UAAU,CAAC,IAAIA,KAAI,cAAc,aAAa,EAAE,SAAS,OAAO,CAAC,EAAE,CAAC,CAAC;AAC9G,aAAO;AAAA,IACT,CAAC;AACD,QAAI,CAAC,SAAU,QAAQ,cAAcA,KAAI,cAAc,aAAa,EAAE,SAAS,wBAAwB,CAAC,CAAC;AAEzG,UAAM,OAAO,MAAM,SAAS,KAAK;AACjC,QAAI;AACJ,QAAI,gBAAgB;AAClB,wBAAkB,CAAC;AACnB,eAAS,QAAQ,QAAQ,CAAC,OAAO,QAAQ;AACvC,QAAC,gBAA2C,GAAG,IAAI;AAAA,MACrD,CAAC;AAAA,IACH;AAEA,WAAO,SAAS,KACZD,IAAG,EAAE,MAAM,QAAQ,SAAS,QAAQ,SAAS,gBAAgB,CAAC,IAC9DC,KAAI,cAAc,UAAU,EAAE,SAAS,QAAQ,SAAS,MAAM,KAAK,IAAI,GAAG,CAAC,CAAC;AAAA,EAClF;AAKA,WAAS,cAAc,WAAuG;AAC5H,kBAAc,UAAU;AACxB,gBAAY,UAAU,aAAa;AACnC,kBAAc,UAAU;AACxB,mBAAe,UAAU,gBAAgB;AAEzC,oBAAgB;AAAA,EAClB;AAMA,WAAS,kBAAkB;AACzB,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,gBAAgB,gBAAgB,QAAQ,gBAAgB,OAAO,cAAc,QAAQ,YAAY;AACvG,yBAAqB,eAAe,WAAW,WAAW;AAAA,EAC5D;AAOA,OAAK,YAAY,OAAO,UAA6C;AACnE,UAAM,OAAO,MAAM;AACnB,YAAQ,KAAK,MAAM;AAAA,MACjB,KAAK,IAAI,OAAO;AACd,YAAI;AACF,gBAAM,UAAU,KAAK;AACrB,mBAAS,QAAQ;AAEjB,gBAAM,iBAAiB,QAAQ;AAG/B,cAAI,OAAO,mBAAmB,UAAU;AAEtC,uBAAW,YAAY,cAAc;AAAA,UACvC,WAAW,kBAAkB,OAAO,mBAAmB,YAAY,UAAU,gBAAgB;AAE3F,uBAAW,wBAAwB,cAAqB;AAAA,UAC1D,OAAO;AACL,kBAAM,IAAI,MAAM,yBAAyB;AAAA,UAC3C;AAEA,oBAAU;AAAA,QACZ,SAAS,OAAO;AACd,kBAAQ,MAAM,qCAAqC,KAAK;AAAA,QAC1D;AACA;AAAA,MACF;AAAA,MAEA,KAAK,IAAI,OAAO;AACd,cAAM,EAAE,GAAG,IAAI;AACf,YAAI;AACF,gBAAM,EAAE,KAAK,QAAQ,IAAI,KAAK;AAC9B,gBAAM,aAAa,IAAI,gBAAgB;AACvC,6BAAmB,IAAI,IAAI,UAAU;AACrC,gBAAM,SAAsB,EAAE,GAAI,WAAW,CAAC,GAAI,QAAQ,WAAW,OAAO;AAC5E,gBAAM,SAAS,MAAM,eAAe,KAAK,MAAM;AAE/C,cAAI,OAAO,KAAK,GAAG;AACjB,kBAAM,WAAW,OAAO;AACxB,4BAAgB,IAAI,SAAS,QAAQ,SAAS,MAAM,SAAS,OAAO;AAAA,UACtE,OAAO;AACL,kBAAM,QAAQ,OAAO,SAAS,CAAC;AAC/B,kBAAM,UAAU,OAAO,WAAW;AAClC,kBAAM,SAAS,OAAO;AACtB,2BAAe,IAAI,SAAS,MAAM;AAAA,UACpC;AAEA,6BAAmB,OAAO,EAAE;AAAA,QAC9B,SAAS,OAAO;AACd,6BAAmB,OAAO,EAAE;AAC5B,yBAAe,IAAI,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,GAAG,MAAS;AAAA,QACtF;AACA;AAAA,MACF;AAAA,MAEA,KAAK,IAAI,WAAW;AAClB,cAAM,EAAE,IAAI,QAAQ,IAAI;AACxB,YAAI;AACF,gBAAM,EAAE,QAAQ,KAAK,IAAI;AAEzB,cAAI,OAAO,SAAS,MAAM,MAAM,YAAY;AAC1C,uBAAW,IAAIA,KAAI,cAAc,WAAW,EAAE,SAAS,WAAW,MAAM,0BAA0B,CAAC,CAAC,CAAC;AACrG;AAAA,UACF;AAEA,gBAAM,SAAS,MAAM,SAAS,MAAM,EAAE,GAAG,IAAI;AAC7C,cAAI,OAAO,QAAQ,GAAG;AAAE,uBAAW,IAAI,MAAM;AAAG;AAAA,UAAM;AAEtD,gBAAM,YAAY,OAAO;AAEzB,wBAAc,SAAS;AAEvB,qBAAW,IAAID,IAAG,MAAS,CAAC;AAAA,QAC9B,SAAS,OAAO;AACd,qBAAW,IAAIC,KAAI,cAAc,WAAW,EAAE,SAAS,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,EAAE,CAAC,CAAC,CAAC;AAAA,QACnH;AACA;AAAA,MACF;AAAA,MAEA,KAAK,IAAI,QAAQ;AACf,YAAI;AACF,gBAAM,EAAE,GAAG,IAAI;AACf,gBAAM,aAAa,mBAAmB,IAAI,EAAE;AAC5C,cAAI,YAAY;AACd,uBAAW,MAAM;AACjB,+BAAmB,OAAO,EAAE;AAAA,UAC9B;AAAA,QACF,SAAS,OAAO;AACd,cAAI,QAAQ,OAAO;AACjB,oBAAQ,MAAM,iBAAiB,KAAK;AAAA,UACtC;AAAA,QACF;AACA;AAAA,MACF;AAAA,MAEA,KAAK,IAAI,MAAM;AACb,cAAM,EAAE,GAAG,IAAI;AACf,YAAI;AACF,gBAAM,KAAK,KAAK,SAAS,aAAa,KAAK,IAAI;AAC/C,mBAAS,IAAI,EAAE;AAAA,QACjB,SAAS,OAAO;AACd,qBAAW,IAAIA,KAAI,cAAc,WAAW,EAAE,SAAS,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,EAAE,CAAC,CAAC,CAAC;AAAA,QACnH;AACA;AAAA,MACF;AAAA,MAEA,SAAS;AACP,cAAM,UAAe;AACrB,mBAAW,QAAQ,IAAIA,KAAI,cAAc,eAAe,EAAE,SAAS,yBAAyB,OAAO,QAAQ,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;AAAA,MACxH;AAAA,IACF;AAAA,EACF;AAEA,GAAG;","names":["ok","err","ok","err"]}
|
package/package.json
ADDED
|
@@ -0,0 +1,69 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "fetchguard",
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "A secure fetch API library that runs in Web Workers with automatic token management",
|
|
5
|
+
"type": "module",
|
|
6
|
+
"main": "dist/index.js",
|
|
7
|
+
"types": "dist/index.d.ts",
|
|
8
|
+
"exports": {
|
|
9
|
+
".": {
|
|
10
|
+
"import": "./dist/index.js",
|
|
11
|
+
"types": "./dist/index.d.ts"
|
|
12
|
+
},
|
|
13
|
+
"./worker": {
|
|
14
|
+
"import": "./dist/worker.js"
|
|
15
|
+
}
|
|
16
|
+
},
|
|
17
|
+
"files": [
|
|
18
|
+
"dist"
|
|
19
|
+
],
|
|
20
|
+
"scripts": {
|
|
21
|
+
"build": "tsup && npm run typecheck",
|
|
22
|
+
"dev": "tsup --watch",
|
|
23
|
+
"clean": "rm -rf dist",
|
|
24
|
+
"typecheck": "tsc --noEmit",
|
|
25
|
+
"test": "npm run test:node && npm run test:browser",
|
|
26
|
+
"test:node": "vitest run --config vitest.config.ts",
|
|
27
|
+
"test:watch": "vitest --config vitest.config.ts",
|
|
28
|
+
"test:ui": "vitest --config vitest.config.ts --ui",
|
|
29
|
+
"test:coverage": "vitest run --config vitest.config.ts --coverage",
|
|
30
|
+
"test:browser": "npm run build && vitest --config vitest.browser.config.ts --browser chromium",
|
|
31
|
+
"prepublishOnly": "npm run build",
|
|
32
|
+
"prepack": "npm run build"
|
|
33
|
+
},
|
|
34
|
+
"keywords": [
|
|
35
|
+
"fetch",
|
|
36
|
+
"web-worker",
|
|
37
|
+
"token",
|
|
38
|
+
"authentication",
|
|
39
|
+
"api",
|
|
40
|
+
"proxy"
|
|
41
|
+
],
|
|
42
|
+
"author": "",
|
|
43
|
+
"license": "MIT",
|
|
44
|
+
"devDependencies": {
|
|
45
|
+
"@vitest/browser": "^4.0.2",
|
|
46
|
+
"@vitest/browser-playwright": "^4.0.2",
|
|
47
|
+
"@vitest/ui": "^4.0.2",
|
|
48
|
+
"happy-dom": "^20.0.8",
|
|
49
|
+
"playwright": "^1.45.1",
|
|
50
|
+
"ts-micro-result": "^2.1.10",
|
|
51
|
+
"tsup": "^8.0.0",
|
|
52
|
+
"typescript": "^5.0.0",
|
|
53
|
+
"vitest": "^4.0.2"
|
|
54
|
+
},
|
|
55
|
+
"peerDependencies": {
|
|
56
|
+
"ts-micro-result": "^2.1.10"
|
|
57
|
+
},
|
|
58
|
+
"engines": {
|
|
59
|
+
"node": ">=16.0.0"
|
|
60
|
+
},
|
|
61
|
+
"repository": {
|
|
62
|
+
"type": "git",
|
|
63
|
+
"url": "git+https://github.com/your-username/fetchguard.git"
|
|
64
|
+
},
|
|
65
|
+
"bugs": {
|
|
66
|
+
"url": "https://github.com/your-username/fetchguard/issues"
|
|
67
|
+
},
|
|
68
|
+
"homepage": "https://github.com/your-username/fetchguard#readme"
|
|
69
|
+
}
|