oidc-spa 4.13.2 → 4.14.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/mock/oidc.js +15 -3
- package/mock/oidc.js.map +1 -1
- package/oidc.d.ts +22 -5
- package/oidc.js +219 -81
- package/oidc.js.map +1 -1
- package/package.json +11 -5
- package/react/react.d.ts +26 -1
- package/react/react.js +8 -1
- package/react/react.js.map +1 -1
- package/src/mock/oidc.ts +13 -2
- package/src/oidc.ts +229 -45
- package/src/react/react.tsx +38 -2
- package/src/tools/base64.ts +7 -0
- package/src/tools/urlQueryParams.ts +20 -2
- package/tools/base64.d.ts +2 -0
- package/tools/base64.js +11 -0
- package/tools/base64.js.map +1 -0
- package/tools/urlQueryParams.d.ts +6 -0
- package/tools/urlQueryParams.js +16 -2
- package/tools/urlQueryParams.js.map +1 -1
- package/vendor/backend/node-fetch.js +1 -2
- package/vendor/backend/zod.js +1 -1
- package/vendor/frontend/oidc-client-ts-and-jwt-decode.js +1 -1
- package/vendor/backend/370.index.js +0 -2
package/mock/oidc.js
CHANGED
|
@@ -117,7 +117,7 @@ function createMockOidc(params) {
|
|
|
117
117
|
// @ts-expect-error: We know what we are doing
|
|
118
118
|
return oidc;
|
|
119
119
|
}
|
|
120
|
-
return (0, tsafe_1.id)(__assign(__assign({}, common), { "isUserLoggedIn": true, "renewTokens": function () { return __awaiter(_this, void 0, void 0, function () { return __generator(this, function (_a) {
|
|
120
|
+
return (0, tsafe_1.id)(__assign(__assign(__assign({}, common), { "isUserLoggedIn": true, "renewTokens": function () { return __awaiter(_this, void 0, void 0, function () { return __generator(this, function (_a) {
|
|
121
121
|
return [2 /*return*/];
|
|
122
122
|
}); }); }, "getTokens": (function () {
|
|
123
123
|
var _a, _b, _c, _d, _e, _f;
|
|
@@ -159,11 +159,23 @@ function createMockOidc(params) {
|
|
|
159
159
|
return new Promise(function () { });
|
|
160
160
|
}, "subscribeToAutoLogoutCountdown": function () { return ({
|
|
161
161
|
"unsubscribeFromAutoLogoutCountdown": function () { }
|
|
162
|
-
}); },
|
|
162
|
+
}); },
|
|
163
|
+
//"loginScenario": isUserInitiallyLoggedIn ? "silentSignin" : "backFromLoginPages",
|
|
164
|
+
"goToAuthServer": function (_a) { return __awaiter(_this, [_a], void 0, function (_b) {
|
|
163
165
|
var redirectUrl = _b.redirectUrl;
|
|
164
166
|
return __generator(this, function (_c) {
|
|
165
167
|
return [2 /*return*/, loginOrGoToAuthServer({ redirectUrl: redirectUrl })];
|
|
166
168
|
});
|
|
167
|
-
}); } })
|
|
169
|
+
}); } }), (isUserInitiallyLoggedIn
|
|
170
|
+
? {
|
|
171
|
+
"authMethod": "back from auth server",
|
|
172
|
+
"backFromAuthServer": {
|
|
173
|
+
"extraQueryParams": {},
|
|
174
|
+
"result": {}
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
: {
|
|
178
|
+
"authMethod": "silent signin"
|
|
179
|
+
})));
|
|
168
180
|
}
|
|
169
181
|
//# sourceMappingURL=oidc.js.map
|
package/mock/oidc.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"oidc.js","sourceRoot":"","sources":["../src/mock/oidc.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAoBA,
|
|
1
|
+
{"version":3,"file":"oidc.js","sourceRoot":"","sources":["../src/mock/oidc.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAoBA,wCA4JC;AA/KD,0DAAwF;AACxF,8FAA6F;AAC7F,kDAA8C;AAC9C,kDAA+D;AAc/D,IAAM,YAAY,GAAG,gBAAgB,CAAC;AAEtC,SAAgB,cAAc,CAI1B,MAAsE;IAJ1E,iBA4JC;;IArJO,IAAA,uBAAuB,GAMvB,MAAM,wBANiB,EACvB,KAKA,MAAM,aALW,EAAjB,YAAY,mBAAG,EAAE,KAAA,EACjB,KAIA,MAAM,aAJW,EAAjB,YAAY,mBAAG,EAAE,KAAA,EACN,gBAAgB,GAG3B,MAAM,UAHqB,EAC3B,KAEA,MAAM,uBAFwB,EAA9B,sBAAsB,mBAAG,KAAK,KAAA,EAC9B,oBAAoB,GACpB,MAAM,qBADc,CACb;IAEX,IAAM,cAAc,GAAG,CAAC;QACpB,IAAM,MAAM,GAAG,IAAA,0CAAyB,EAAC;YACrC,KAAK,EAAE,MAAM,CAAC,QAAQ,CAAC,IAAI;YAC3B,MAAM,EAAE,YAAY;SACvB,CAAC,CAAC;QAEH,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;YACrB,OAAO,uBAAuB,CAAC;QACnC,CAAC;QAED,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,EAAE,EAAE,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC;QAEnD,OAAO,MAAM,CAAC,KAAK,KAAK,MAAM,CAAC;IACnC,CAAC,CAAC,EAAE,CAAC;IAEL,IAAM,SAAS,GAAG,CAAC;QACf,IAAI,gBAAgB,KAAK,SAAS,EAAE,CAAC;YACjC,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;QAClC,CAAC;QAED,OAAO,CACH,gBAAgB,CAAC,UAAU,CAAC,MAAM,CAAC;YAC/B,CAAC,CAAC,gBAAgB;YAClB,CAAC,CAAC,UAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,SAAG,gBAAgB,CAAE,CACvD,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;IACzB,CAAC,CAAC,EAAE,CAAC;IAEL,IAAM,MAAM,GAAgB;QACxB,QAAQ,EAAE;YACN,UAAU,EAAE,MAAA,YAAY,CAAC,QAAQ,mCAAI,cAAc;YACnD,WAAW,EAAE,MAAA,YAAY,CAAC,SAAS,mCAAI,oDAAoD;SAC9F;KACJ,CAAC;IAEF,IAAM,qBAAqB,GAAG,UAAO,MAEpC;;;YACW,WAAW,GAAK,MAAM,YAAX,CAAY;YAEvB,MAAM,GAAK,IAAA,mCAAkB,EAAC;gBAClC,KAAK,EAAE,CAAC;oBACJ,IAAI,WAAW,KAAK,SAAS,EAAE,CAAC;wBAC5B,OAAO,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;oBAChC,CAAC;oBACD,OAAO,WAAW,CAAC,UAAU,CAAC,GAAG,CAAC;wBAC9B,CAAC,CAAC,UAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,SAAG,WAAW,CAAE;wBAC3C,CAAC,CAAC,WAAW,CAAC;gBACtB,CAAC,CAAC,EAAE;gBACJ,MAAM,EAAE,YAAY;gBACpB,OAAO,EAAE,MAAM;aAClB,CAAC,OAXY,CAWX;YAEH,MAAM,CAAC,QAAQ,CAAC,IAAI,GAAG,MAAM,CAAC;YAE9B,sBAAO,IAAI,OAAO,CAAQ,cAAO,CAAC,CAAC,EAAC;;SACvC,CAAC;IAEF,IAAI,CAAC,cAAc,EAAE,CAAC;QAClB,IAAM,IAAI,GAAG,IAAA,UAAE,wBACR,MAAM,KACT,gBAAgB,EAAE,KAAK,EACvB,OAAO,EAAE,UAAC,EAAe;oBAAb,WAAW,iBAAA;gBAAO,OAAA,qBAAqB,CAAC,EAAE,WAAW,aAAA,EAAE,CAAC;YAAtC,CAAsC,EACpE,qBAAqB,EAAE,SAAS,IAClC,CAAC;QACH,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAC1B,IAAI,CAAC,KAAK,CAAC;gBACP,aAAa,EAAE,oBAAoB;gBACnC,6BAA6B,EAAE,IAAI;aACtC,CAAC,CAAC;YACH,IAAA,cAAM,EAAC,KAAK,CAAC,CAAC;QAClB,CAAC;QACD,8CAA8C;QAC9C,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,OAAO,IAAA,UAAE,iCACF,MAAM,KACT,gBAAgB,EAAE,IAAI,EACtB,aAAa,EAAE;;iBAAc,EAC7B,WAAW,EAAE,CAAC;;YACV,IAAM,MAAM,GAAgC;gBACxC,aAAa,EAAE,MAAA,YAAY,CAAC,WAAW,mCAAI,qBAAqB;gBAChE,2BAA2B,EAAE,MAAA,YAAY,CAAC,yBAAyB,mCAAI,QAAQ;gBAC/E,SAAS,EAAE,MAAA,YAAY,CAAC,OAAO,mCAAI,iBAAiB;gBACpD,cAAc,EAAE,MAAA,YAAY,CAAC,YAAY,mCAAI,sBAAsB;gBACnE,4BAA4B,EAAE,MAAA,YAAY,CAAC,0BAA0B,mCAAI,QAAQ;gBACjF,gBAAgB,EACZ,MAAA,YAAY,CAAC,cAAc,mCAC3B,IAAA,mEAAgC,EAAiB;oBAC7C,cAAc,EAAE;wBACZ,8CAA8C;wBAC9C,kDAAkD;qBACrD,CAAC,IAAI,CAAC,IAAI,CAAC;iBACf,CAAC;aACT,CAAC;YAEF,OAAO,cAAM,OAAA,MAAM,EAAN,CAAM,CAAC;QACxB,CAAC,CAAC,EAAE,EACJ,yBAAyB,EAAE,cAAM,OAAA,CAAC;YAC9B,aAAa,EAAE,cAAO,CAAC;SAC1B,CAAC,EAF+B,CAE/B,EACF,QAAQ,EAAE,UAAA,MAAM;YACJ,IAAA,MAAM,GAAK,IAAA,mCAAkB,EAAC;gBAClC,KAAK,EAAE,CAAC;oBACJ,QAAQ,MAAM,CAAC,UAAU,EAAE,CAAC;wBACxB,KAAK,cAAc;4BACf,OAAO,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC;wBAChC,KAAK,MAAM;4BACP,OAAO,SAAS,CAAC;wBACrB,KAAK,cAAc;4BACf,OAAO,MAAM,CAAC,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC;gCAC7B,CAAC,CAAC,UAAG,MAAM,CAAC,QAAQ,CAAC,MAAM,SAAG,MAAM,CAAC,GAAG,CAAE;gCAC1C,CAAC,CAAC,MAAM,CAAC,GAAG,CAAC;oBACzB,CAAC;oBACD,IAAA,cAAM,EAA+B,KAAK,CAAC,CAAC;gBAChD,CAAC,CAAC,EAAE;gBACJ,MAAM,EAAE,YAAY;gBACpB,OAAO,EAAE,OAAO;aACnB,CAAC,OAhBY,CAgBX;YAEH,MAAM,CAAC,QAAQ,CAAC,IAAI,GAAG,MAAM,CAAC;YAE9B,OAAO,IAAI,OAAO,CAAQ,cAAO,CAAC,CAAC,CAAC;QACxC,CAAC,EACD,gCAAgC,EAAE,cAAM,OAAA,CAAC;YACrC,oCAAoC,EAAE,cAAO,CAAC;SACjD,CAAC,EAFsC,CAEtC;QACF,mFAAmF;QACnF,gBAAgB,EAAE,gEAAO,EAAe;gBAAb,WAAW,iBAAA;;gBAAO,sBAAA,qBAAqB,CAAC,EAAE,WAAW,aAAA,EAAE,CAAC,EAAA;;aAAA,KAChF,CAAC,uBAAuB;QACvB,CAAC,CAAC;YACI,YAAY,EAAE,uBAAuB;YACrC,oBAAoB,EAAE;gBAClB,kBAAkB,EAAE,EAAE;gBACtB,QAAQ,EAAE,EAAE;aACf;SACJ;QACH,CAAC,CAAC;YACI,YAAY,EAAE,eAAe;SAChC,CAAC,EACV,CAAC;AACP,CAAC"}
|
package/oidc.d.ts
CHANGED
|
@@ -53,14 +53,31 @@ export declare namespace Oidc {
|
|
|
53
53
|
}) => void) => {
|
|
54
54
|
unsubscribeFromAutoLogoutCountdown: () => void;
|
|
55
55
|
};
|
|
56
|
+
} & ({
|
|
56
57
|
/**
|
|
58
|
+
* "back from auth server":
|
|
59
|
+
* The user was redirected to the authentication server login/registration page and then redirected back to the application.
|
|
60
|
+
* "session storage":
|
|
61
|
+
* The user's authentication was restored from the browser session storage, typically after a page refresh.
|
|
62
|
+
* "silent signin":
|
|
63
|
+
* The user was authenticated silently using an iframe to check the session with the authentication server.
|
|
64
|
+
*/
|
|
65
|
+
authMethod: "back from auth server";
|
|
66
|
+
/**
|
|
67
|
+
* Defined when authMethod is "back from auth server".
|
|
68
|
+
* If you called `goToAuthServer` or `login` with extraQueryParams, this object let you know the outcome of the
|
|
69
|
+
* of the action that was intended.
|
|
57
70
|
*
|
|
58
|
-
*
|
|
59
|
-
*
|
|
60
|
-
* silentSignin: Silent Single Sign-On (SSO) was achieved by creating an iframe to the identity server in the background. HttpOnly cookies were utilized to restore the session without redirecting the user to the login pages.
|
|
71
|
+
* For example, on a Keycloak server, if you called `goToAuthServer({ extraQueryParams: { kc_action: "UPDATE_PASSWORD" } })`
|
|
72
|
+
* you'll get back: `{ extraQueryParams: { kc_action: "UPDATE_PASSWORD" }, result: { kc_action_status: "success" } }` (or "cancelled")
|
|
61
73
|
*/
|
|
62
|
-
|
|
63
|
-
|
|
74
|
+
backFromAuthServer: {
|
|
75
|
+
extraQueryParams: Record<string, string>;
|
|
76
|
+
result: Record<string, string>;
|
|
77
|
+
};
|
|
78
|
+
} | {
|
|
79
|
+
authMethod: "session storage" | "silent signin";
|
|
80
|
+
});
|
|
64
81
|
type Tokens<DecodedIdToken extends Record<string, unknown> = Record<string, unknown>> = Readonly<{
|
|
65
82
|
accessToken: string;
|
|
66
83
|
accessTokenExpirationTime: number;
|