quankee-framework-keycloak 1.7.2 → 1.8.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -84,6 +84,72 @@ i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "19.2.14", ngImpo
|
|
|
84
84
|
}]
|
|
85
85
|
}], ctorParameters: () => [] });
|
|
86
86
|
|
|
87
|
+
class AuthenticationService {
|
|
88
|
+
keycloakService;
|
|
89
|
+
keycloakClientId = '';
|
|
90
|
+
constructor(keycloakService) {
|
|
91
|
+
this.keycloakService = keycloakService;
|
|
92
|
+
}
|
|
93
|
+
async init(keycloakUrl, keycloakRealm, keycloakClientId) {
|
|
94
|
+
this.keycloakClientId = keycloakClientId;
|
|
95
|
+
return this.keycloakService.init({
|
|
96
|
+
url: keycloakUrl,
|
|
97
|
+
realm: keycloakRealm,
|
|
98
|
+
clientId: keycloakClientId,
|
|
99
|
+
onLoad: 'login-required'
|
|
100
|
+
});
|
|
101
|
+
}
|
|
102
|
+
login() {
|
|
103
|
+
this.keycloakService.login();
|
|
104
|
+
}
|
|
105
|
+
logout() {
|
|
106
|
+
this.keycloakService.logout(window.location.origin);
|
|
107
|
+
}
|
|
108
|
+
isLoggedIn() {
|
|
109
|
+
return this.keycloakService.isLoggedIn();
|
|
110
|
+
}
|
|
111
|
+
getToken() {
|
|
112
|
+
return this.keycloakService.getToken();
|
|
113
|
+
}
|
|
114
|
+
getUser() {
|
|
115
|
+
return this.keycloakService.getUser();
|
|
116
|
+
}
|
|
117
|
+
getUsername() {
|
|
118
|
+
const tokenParsed = this.keycloakService.getParsedToken();
|
|
119
|
+
return tokenParsed?.preferred_username ?? "Username is not parsed correctly.";
|
|
120
|
+
}
|
|
121
|
+
getParsedToken() {
|
|
122
|
+
return this.keycloakService.getParsedToken();
|
|
123
|
+
}
|
|
124
|
+
// ------------------------------------------------------
|
|
125
|
+
// ROLES (REALM + CLIENT)
|
|
126
|
+
// ------------------------------------------------------
|
|
127
|
+
getRoles() {
|
|
128
|
+
const token = this.getParsedToken();
|
|
129
|
+
if (!token) {
|
|
130
|
+
return [];
|
|
131
|
+
}
|
|
132
|
+
// Realm roles
|
|
133
|
+
const realmRoles = token.realm_access?.roles ?? [];
|
|
134
|
+
// Client roles
|
|
135
|
+
const clientId = this.keycloakClientId;
|
|
136
|
+
const clientRoles = token.resource_access?.[clientId]?.roles ?? [];
|
|
137
|
+
return [...realmRoles, ...clientRoles];
|
|
138
|
+
}
|
|
139
|
+
// Shortcut helper
|
|
140
|
+
hasRole(role) {
|
|
141
|
+
return this.getRoles().includes(role);
|
|
142
|
+
}
|
|
143
|
+
static ɵfac = i0.ɵɵngDeclareFactory({ minVersion: "12.0.0", version: "19.2.14", ngImport: i0, type: AuthenticationService, deps: [{ token: KeycloakService }], target: i0.ɵɵFactoryTarget.Injectable });
|
|
144
|
+
static ɵprov = i0.ɵɵngDeclareInjectable({ minVersion: "12.0.0", version: "19.2.14", ngImport: i0, type: AuthenticationService, providedIn: 'root' });
|
|
145
|
+
}
|
|
146
|
+
i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "19.2.14", ngImport: i0, type: AuthenticationService, decorators: [{
|
|
147
|
+
type: Injectable,
|
|
148
|
+
args: [{
|
|
149
|
+
providedIn: 'root'
|
|
150
|
+
}]
|
|
151
|
+
}], ctorParameters: () => [{ type: KeycloakService }] });
|
|
152
|
+
|
|
87
153
|
/*
|
|
88
154
|
* Public API Surface of quankee-framework-keycloak
|
|
89
155
|
*/
|
|
@@ -92,5 +158,5 @@ i0.ɵɵngDeclareClassMetadata({ minVersion: "12.0.0", version: "19.2.14", ngImpo
|
|
|
92
158
|
* Generated bundle index. Do not edit.
|
|
93
159
|
*/
|
|
94
160
|
|
|
95
|
-
export { KeycloakService };
|
|
161
|
+
export { AuthenticationService, KeycloakService };
|
|
96
162
|
//# sourceMappingURL=quankee-framework-keycloak.mjs.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"quankee-framework-keycloak.mjs","sources":["../../../projects/quankee-framework-keycloak/src/lib/core/keycloak.service.ts","../../../projects/quankee-framework-keycloak/src/public-api.ts","../../../projects/quankee-framework-keycloak/src/quankee-framework-keycloak.ts"],"sourcesContent":["import {Injectable} from '@angular/core';\nimport Keycloak from 'keycloak-js';\nimport {AuthenticatedUser} from './authenticated-user';\nimport {KeycloakToken} from './keycloak-token';\n\n// Your own type definition for 'onLoad' because keycloak-js doesn't export it\nexport type AppKeycloakOnLoad = \"login-required\" | \"check-sso\";\n\nexport type KeycloakPkceMethod = \"S256\";\n\n// Your own config interface\nexport interface KeycloakConfig {\n url: string;\n realm: string;\n clientId: string;\n onLoad?: AppKeycloakOnLoad;\n checkLoginIframe?: boolean;\n silentCheckSsoRedirectUri?: string;\n pkceMethod?: KeycloakPkceMethod;\n flow?: \"standard\" | \"implicit\";\n}\n\n\n@Injectable({\n providedIn: 'root',\n})\nexport class KeycloakService{\n\n private keycloak?: Keycloak;\n\n private initialized = false;\n\n constructor() {}\n\n async init(config: KeycloakConfig): Promise<boolean> {\n this.keycloak = new Keycloak({\n url: config.url,\n realm: config.realm,\n clientId: config.clientId,\n });\n\n const initOptions: {\n onLoad: \"login-required\" | \"check-sso\";\n checkLoginIframe: boolean;\n silentCheckSsoRedirectUri?: string;\n pkceMethod: KeycloakPkceMethod;\n flow: \"standard\" | \"implicit\";\n } = {\n onLoad: config.onLoad ?? \"login-required\",\n checkLoginIframe: config.checkLoginIframe ?? false,\n silentCheckSsoRedirectUri: config.silentCheckSsoRedirectUri,\n pkceMethod: config.pkceMethod ?? \"S256\",\n flow: config.flow ?? \"standard\",\n };\n\n try {\n const authenticated = await this.keycloak.init(initOptions);\n this.initialized = true;\n return authenticated;\n } catch (error) {\n console.error(\"Keycloak initialization failed\", error);\n return false;\n }\n\n }\n\n login(): void {\n this.keycloak?.login();\n }\n\n logout(redirectUri?: string): void {\n this.keycloak?.logout({ redirectUri });\n }\n\n accountManagement(): void {\n this.keycloak?.accountManagement();\n }\n\n getToken(): string | undefined {\n return this.keycloak?.token;\n }\n\n getParsedToken(): KeycloakToken | undefined {\n return this.keycloak?.tokenParsed as KeycloakToken;\n }\n\n async refreshToken(minValidity = 5): Promise<boolean> {\n if (!this.keycloak) return false;\n try {\n return await this.keycloak.updateToken(minValidity);\n } catch (e) {\n console.error(\"Token refresh failed\", e);\n return false;\n }\n }\n\n getUsername(): string | undefined {\n return this.getParsedToken()?.preferred_username;\n }\n\n isLoggedIn(): boolean {\n return !!this.keycloak?.authenticated;\n }\n\n async getUser(): Promise<AuthenticatedUser | undefined> {\n if (!this.keycloak?.token || !this.keycloak.tokenParsed) return;\n\n const profile = await this.keycloak.loadUserProfile();\n return {\n token: this.keycloak.token,\n parsedToken: this.keycloak.tokenParsed as KeycloakToken,\n profile,\n };\n }\n\n getKeycloak(): Keycloak | undefined {\n return this.keycloak;\n }\n\n\n}\n","/*\n * Public API Surface of quankee-framework-keycloak\n */\n\nexport * from './lib/core/keycloak-token';\nexport * from './lib/core/authenticated-user';\nexport * from './lib/core/keycloak.service';\n\n","/**\n * Generated bundle index. Do not edit.\n */\n\nexport * from './public-api';\n"],"names":[],"mappings":";;;;MA0Ba,eAAe,CAAA;AAEjB,IAAA,QAAQ;IAET,WAAW,GAAG,KAAK;AAE3B,IAAA,WAAA,GAAA;IAEA,MAAM,IAAI,CAAC,MAAsB,EAAA;AAC/B,QAAA,IAAI,CAAC,QAAQ,GAAG,IAAI,QAAQ,CAAC;YAC3B,GAAG,EAAE,MAAM,CAAC,GAAG;YACf,KAAK,EAAE,MAAM,CAAC,KAAK;YACnB,QAAQ,EAAE,MAAM,CAAC,QAAQ;AAC1B,SAAA,CAAC;AAEF,QAAA,MAAM,WAAW,GAMb;AACF,YAAA,MAAM,EAAE,MAAM,CAAC,MAAM,IAAI,gBAAgB;AACzC,YAAA,gBAAgB,EAAE,MAAM,CAAC,gBAAgB,IAAI,KAAK;YAClD,yBAAyB,EAAE,MAAM,CAAC,yBAAyB;AAC3D,YAAA,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,MAAM;AACvC,YAAA,IAAI,EAAE,MAAM,CAAC,IAAI,IAAI,UAAU;SAChC;AAED,QAAA,IAAI;YACF,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,CAAC;AAC3D,YAAA,IAAI,CAAC,WAAW,GAAG,IAAI;AACvB,YAAA,OAAO,aAAa;;QACpB,OAAO,KAAK,EAAE;AACd,YAAA,OAAO,CAAC,KAAK,CAAC,gCAAgC,EAAE,KAAK,CAAC;AACtD,YAAA,OAAO,KAAK;;;IAKhB,KAAK,GAAA;AACH,QAAA,IAAI,CAAC,QAAQ,EAAE,KAAK,EAAE;;AAGxB,IAAA,MAAM,CAAC,WAAoB,EAAA;QACzB,IAAI,CAAC,QAAQ,EAAE,MAAM,CAAC,EAAE,WAAW,EAAE,CAAC;;IAGxC,iBAAiB,GAAA;AACf,QAAA,IAAI,CAAC,QAAQ,EAAE,iBAAiB,EAAE;;IAGpC,QAAQ,GAAA;AACN,QAAA,OAAO,IAAI,CAAC,QAAQ,EAAE,KAAK;;IAG7B,cAAc,GAAA;AACZ,QAAA,OAAO,IAAI,CAAC,QAAQ,EAAE,WAA4B;;AAGpD,IAAA,MAAM,YAAY,CAAC,WAAW,GAAG,CAAC,EAAA;QAChC,IAAI,CAAC,IAAI,CAAC,QAAQ;AAAE,YAAA,OAAO,KAAK;AAChC,QAAA,IAAI;YACF,OAAO,MAAM,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,WAAW,CAAC;;QACnD,OAAO,CAAC,EAAE;AACV,YAAA,OAAO,CAAC,KAAK,CAAC,sBAAsB,EAAE,CAAC,CAAC;AACxC,YAAA,OAAO,KAAK;;;IAIhB,WAAW,GAAA;AACT,QAAA,OAAO,IAAI,CAAC,cAAc,EAAE,EAAE,kBAAkB;;IAGlD,UAAU,GAAA;AACR,QAAA,OAAO,CAAC,CAAC,IAAI,CAAC,QAAQ,EAAE,aAAa;;AAGvC,IAAA,MAAM,OAAO,GAAA;AACX,QAAA,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW;YAAE;QAEzD,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE;QACrD,OAAO;AACL,YAAA,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,KAAK;AAC1B,YAAA,WAAW,EAAE,IAAI,CAAC,QAAQ,CAAC,WAA4B;YACvD,OAAO;SACR;;IAGH,WAAW,GAAA;QACT,OAAO,IAAI,CAAC,QAAQ;;wGA1FX,eAAe,EAAA,IAAA,EAAA,EAAA,EAAA,MAAA,EAAA,EAAA,CAAA,eAAA,CAAA,UAAA,EAAA,CAAA;AAAf,IAAA,OAAA,KAAA,GAAA,EAAA,CAAA,qBAAA,CAAA,EAAA,UAAA,EAAA,QAAA,EAAA,OAAA,EAAA,SAAA,EAAA,QAAA,EAAA,EAAA,EAAA,IAAA,EAAA,eAAe,cAFd,MAAM,EAAA,CAAA;;4FAEP,eAAe,EAAA,UAAA,EAAA,CAAA;kBAH3B,UAAU;AAAC,YAAA,IAAA,EAAA,CAAA;AACV,oBAAA,UAAU,EAAE,MAAM;AACnB,iBAAA;;;ACzBD;;AAEG;;ACFH;;AAEG;;;;"}
|
|
1
|
+
{"version":3,"file":"quankee-framework-keycloak.mjs","sources":["../../../projects/quankee-framework-keycloak/src/lib/core/keycloak.service.ts","../../../projects/quankee-framework-keycloak/src/lib/core/authentication.service.ts","../../../projects/quankee-framework-keycloak/src/public-api.ts","../../../projects/quankee-framework-keycloak/src/quankee-framework-keycloak.ts"],"sourcesContent":["import {Injectable} from '@angular/core';\nimport Keycloak from 'keycloak-js';\nimport {AuthenticatedUser} from './authenticated-user';\nimport {KeycloakToken} from './keycloak-token';\n\n// Your own type definition for 'onLoad' because keycloak-js doesn't export it\nexport type AppKeycloakOnLoad = \"login-required\" | \"check-sso\";\n\nexport type KeycloakPkceMethod = \"S256\";\n\n// Your own config interface\nexport interface KeycloakConfig {\n url: string;\n realm: string;\n clientId: string;\n onLoad?: AppKeycloakOnLoad;\n checkLoginIframe?: boolean;\n silentCheckSsoRedirectUri?: string;\n pkceMethod?: KeycloakPkceMethod;\n flow?: \"standard\" | \"implicit\";\n}\n\n\n@Injectable({\n providedIn: 'root',\n})\nexport class KeycloakService{\n\n private keycloak?: Keycloak;\n\n private initialized = false;\n\n constructor() {}\n\n async init(config: KeycloakConfig): Promise<boolean> {\n this.keycloak = new Keycloak({\n url: config.url,\n realm: config.realm,\n clientId: config.clientId,\n });\n\n const initOptions: {\n onLoad: \"login-required\" | \"check-sso\";\n checkLoginIframe: boolean;\n silentCheckSsoRedirectUri?: string;\n pkceMethod: KeycloakPkceMethod;\n flow: \"standard\" | \"implicit\";\n } = {\n onLoad: config.onLoad ?? \"login-required\",\n checkLoginIframe: config.checkLoginIframe ?? false,\n silentCheckSsoRedirectUri: config.silentCheckSsoRedirectUri,\n pkceMethod: config.pkceMethod ?? \"S256\",\n flow: config.flow ?? \"standard\",\n };\n\n try {\n const authenticated = await this.keycloak.init(initOptions);\n this.initialized = true;\n return authenticated;\n } catch (error) {\n console.error(\"Keycloak initialization failed\", error);\n return false;\n }\n\n }\n\n login(): void {\n this.keycloak?.login();\n }\n\n logout(redirectUri?: string): void {\n this.keycloak?.logout({ redirectUri });\n }\n\n accountManagement(): void {\n this.keycloak?.accountManagement();\n }\n\n getToken(): string | undefined {\n return this.keycloak?.token;\n }\n\n getParsedToken(): KeycloakToken | undefined {\n return this.keycloak?.tokenParsed as KeycloakToken;\n }\n\n async refreshToken(minValidity = 5): Promise<boolean> {\n if (!this.keycloak) return false;\n try {\n return await this.keycloak.updateToken(minValidity);\n } catch (e) {\n console.error(\"Token refresh failed\", e);\n return false;\n }\n }\n\n getUsername(): string | undefined {\n return this.getParsedToken()?.preferred_username;\n }\n\n isLoggedIn(): boolean {\n return !!this.keycloak?.authenticated;\n }\n\n async getUser(): Promise<AuthenticatedUser | undefined> {\n if (!this.keycloak?.token || !this.keycloak.tokenParsed) return;\n\n const profile = await this.keycloak.loadUserProfile();\n return {\n token: this.keycloak.token,\n parsedToken: this.keycloak.tokenParsed as KeycloakToken,\n profile,\n };\n }\n\n getKeycloak(): Keycloak | undefined {\n return this.keycloak;\n }\n\n\n}\n","import {Injectable} from \"@angular/core\";\nimport {KeycloakService} from \"./keycloak.service\";\nimport {AuthenticatedUser} from \"./authenticated-user\";\nimport {KeycloakToken} from \"./keycloak-token\";\n\n@Injectable({\n providedIn: 'root'\n})\nexport class AuthenticationService {\n\n keycloakClientId: string = '';\n\n constructor(private readonly keycloakService: KeycloakService) { }\n\n async init(keycloakUrl: string, keycloakRealm: string, keycloakClientId: string): Promise<boolean>{\n\n this.keycloakClientId = keycloakClientId;\n\n return this.keycloakService.init({\n url: keycloakUrl,\n realm: keycloakRealm,\n clientId: keycloakClientId,\n onLoad: 'login-required'\n });\n }\n\n login() {\n this.keycloakService.login();\n }\n\n logout() {\n this.keycloakService.logout(window.location.origin);\n }\n\n isLoggedIn(): boolean {\n return this.keycloakService.isLoggedIn();\n }\n\n getToken(): string | undefined {\n return this.keycloakService.getToken();\n }\n\n getUser(): Promise<AuthenticatedUser | undefined> {\n return this.keycloakService.getUser();\n }\n\n getUsername(): string | undefined {\n const tokenParsed = this.keycloakService.getParsedToken();\n return tokenParsed?.preferred_username ?? \"Username is not parsed correctly.\";\n }\n\n getParsedToken(): KeycloakToken | undefined {\n return this.keycloakService.getParsedToken();\n }\n\n // ------------------------------------------------------\n // ROLES (REALM + CLIENT)\n // ------------------------------------------------------\n getRoles(): string[]{\n const token = this.getParsedToken();\n\n if(!token){\n return [];\n }\n\n // Realm roles\n const realmRoles: string[] = token.realm_access?.roles ?? [];\n\n // Client roles\n const clientId = this.keycloakClientId;\n\n const clientRoles: string[] = token.resource_access?.[clientId]?.roles ?? [];\n\n return [...realmRoles, ...clientRoles];\n }\n\n // Shortcut helper\n hasRole(role: string): boolean {\n return this.getRoles().includes(role);\n }\n\n}","/*\n * Public API Surface of quankee-framework-keycloak\n */\n\nexport * from './lib/core/keycloak-token';\nexport * from './lib/core/authenticated-user';\nexport * from './lib/core/keycloak.service';\nexport * from './lib/core/authentication.service';\n\n","/**\n * Generated bundle index. Do not edit.\n */\n\nexport * from './public-api';\n"],"names":["i1.KeycloakService"],"mappings":";;;;MA0Ba,eAAe,CAAA;AAEjB,IAAA,QAAQ;IAET,WAAW,GAAG,KAAK;AAE3B,IAAA,WAAA,GAAA;IAEA,MAAM,IAAI,CAAC,MAAsB,EAAA;AAC/B,QAAA,IAAI,CAAC,QAAQ,GAAG,IAAI,QAAQ,CAAC;YAC3B,GAAG,EAAE,MAAM,CAAC,GAAG;YACf,KAAK,EAAE,MAAM,CAAC,KAAK;YACnB,QAAQ,EAAE,MAAM,CAAC,QAAQ;AAC1B,SAAA,CAAC;AAEF,QAAA,MAAM,WAAW,GAMb;AACF,YAAA,MAAM,EAAE,MAAM,CAAC,MAAM,IAAI,gBAAgB;AACzC,YAAA,gBAAgB,EAAE,MAAM,CAAC,gBAAgB,IAAI,KAAK;YAClD,yBAAyB,EAAE,MAAM,CAAC,yBAAyB;AAC3D,YAAA,UAAU,EAAE,MAAM,CAAC,UAAU,IAAI,MAAM;AACvC,YAAA,IAAI,EAAE,MAAM,CAAC,IAAI,IAAI,UAAU;SAChC;AAED,QAAA,IAAI;YACF,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,CAAC;AAC3D,YAAA,IAAI,CAAC,WAAW,GAAG,IAAI;AACvB,YAAA,OAAO,aAAa;;QACpB,OAAO,KAAK,EAAE;AACd,YAAA,OAAO,CAAC,KAAK,CAAC,gCAAgC,EAAE,KAAK,CAAC;AACtD,YAAA,OAAO,KAAK;;;IAKhB,KAAK,GAAA;AACH,QAAA,IAAI,CAAC,QAAQ,EAAE,KAAK,EAAE;;AAGxB,IAAA,MAAM,CAAC,WAAoB,EAAA;QACzB,IAAI,CAAC,QAAQ,EAAE,MAAM,CAAC,EAAE,WAAW,EAAE,CAAC;;IAGxC,iBAAiB,GAAA;AACf,QAAA,IAAI,CAAC,QAAQ,EAAE,iBAAiB,EAAE;;IAGpC,QAAQ,GAAA;AACN,QAAA,OAAO,IAAI,CAAC,QAAQ,EAAE,KAAK;;IAG7B,cAAc,GAAA;AACZ,QAAA,OAAO,IAAI,CAAC,QAAQ,EAAE,WAA4B;;AAGpD,IAAA,MAAM,YAAY,CAAC,WAAW,GAAG,CAAC,EAAA;QAChC,IAAI,CAAC,IAAI,CAAC,QAAQ;AAAE,YAAA,OAAO,KAAK;AAChC,QAAA,IAAI;YACF,OAAO,MAAM,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,WAAW,CAAC;;QACnD,OAAO,CAAC,EAAE;AACV,YAAA,OAAO,CAAC,KAAK,CAAC,sBAAsB,EAAE,CAAC,CAAC;AACxC,YAAA,OAAO,KAAK;;;IAIhB,WAAW,GAAA;AACT,QAAA,OAAO,IAAI,CAAC,cAAc,EAAE,EAAE,kBAAkB;;IAGlD,UAAU,GAAA;AACR,QAAA,OAAO,CAAC,CAAC,IAAI,CAAC,QAAQ,EAAE,aAAa;;AAGvC,IAAA,MAAM,OAAO,GAAA;AACX,QAAA,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,WAAW;YAAE;QAEzD,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAe,EAAE;QACrD,OAAO;AACL,YAAA,KAAK,EAAE,IAAI,CAAC,QAAQ,CAAC,KAAK;AAC1B,YAAA,WAAW,EAAE,IAAI,CAAC,QAAQ,CAAC,WAA4B;YACvD,OAAO;SACR;;IAGH,WAAW,GAAA;QACT,OAAO,IAAI,CAAC,QAAQ;;wGA1FX,eAAe,EAAA,IAAA,EAAA,EAAA,EAAA,MAAA,EAAA,EAAA,CAAA,eAAA,CAAA,UAAA,EAAA,CAAA;AAAf,IAAA,OAAA,KAAA,GAAA,EAAA,CAAA,qBAAA,CAAA,EAAA,UAAA,EAAA,QAAA,EAAA,OAAA,EAAA,SAAA,EAAA,QAAA,EAAA,EAAA,EAAA,IAAA,EAAA,eAAe,cAFd,MAAM,EAAA,CAAA;;4FAEP,eAAe,EAAA,UAAA,EAAA,CAAA;kBAH3B,UAAU;AAAC,YAAA,IAAA,EAAA,CAAA;AACV,oBAAA,UAAU,EAAE,MAAM;AACnB,iBAAA;;;MCjBY,qBAAqB,CAAA;AAID,IAAA,eAAA;IAF7B,gBAAgB,GAAW,EAAE;AAE7B,IAAA,WAAA,CAA6B,eAAgC,EAAA;QAAhC,IAAe,CAAA,eAAA,GAAf,eAAe;;AAE5C,IAAA,MAAM,IAAI,CAAC,WAAmB,EAAE,aAAqB,EAAE,gBAAwB,EAAA;AAE3E,QAAA,IAAI,CAAC,gBAAgB,GAAG,gBAAgB;AAExC,QAAA,OAAO,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC;AAC7B,YAAA,GAAG,EAAE,WAAW;AAChB,YAAA,KAAK,EAAE,aAAa;AACpB,YAAA,QAAQ,EAAE,gBAAgB;AAC1B,YAAA,MAAM,EAAE;AACX,SAAA,CAAC;;IAGN,KAAK,GAAA;AACD,QAAA,IAAI,CAAC,eAAe,CAAC,KAAK,EAAE;;IAGhC,MAAM,GAAA;QACF,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;;IAGvD,UAAU,GAAA;AACN,QAAA,OAAO,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE;;IAG5C,QAAQ,GAAA;AACJ,QAAA,OAAO,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE;;IAG1C,OAAO,GAAA;AACH,QAAA,OAAO,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE;;IAGzC,WAAW,GAAA;QACP,MAAM,WAAW,GAAG,IAAI,CAAC,eAAe,CAAC,cAAc,EAAE;AACzD,QAAA,OAAO,WAAW,EAAE,kBAAkB,IAAI,mCAAmC;;IAGjF,cAAc,GAAA;AACV,QAAA,OAAO,IAAI,CAAC,eAAe,CAAC,cAAc,EAAE;;;;;IAMhD,QAAQ,GAAA;AACJ,QAAA,MAAM,KAAK,GAAG,IAAI,CAAC,cAAc,EAAE;QAEnC,IAAG,CAAC,KAAK,EAAC;AACN,YAAA,OAAO,EAAE;;;QAIb,MAAM,UAAU,GAAa,KAAK,CAAC,YAAY,EAAE,KAAK,IAAI,EAAE;;AAG5D,QAAA,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB;AAEtC,QAAA,MAAM,WAAW,GAAa,KAAK,CAAC,eAAe,GAAG,QAAQ,CAAC,EAAE,KAAK,IAAI,EAAE;AAE5E,QAAA,OAAO,CAAC,GAAG,UAAU,EAAE,GAAG,WAAW,CAAC;;;AAI1C,IAAA,OAAO,CAAC,IAAY,EAAA;QAChB,OAAO,IAAI,CAAC,QAAQ,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC;;wGAtEhC,qBAAqB,EAAA,IAAA,EAAA,CAAA,EAAA,KAAA,EAAAA,eAAA,EAAA,CAAA,EAAA,MAAA,EAAA,EAAA,CAAA,eAAA,CAAA,UAAA,EAAA,CAAA;AAArB,IAAA,OAAA,KAAA,GAAA,EAAA,CAAA,qBAAA,CAAA,EAAA,UAAA,EAAA,QAAA,EAAA,OAAA,EAAA,SAAA,EAAA,QAAA,EAAA,EAAA,EAAA,IAAA,EAAA,qBAAqB,cAFlB,MAAM,EAAA,CAAA;;4FAET,qBAAqB,EAAA,UAAA,EAAA,CAAA;kBAHjC,UAAU;AAAC,YAAA,IAAA,EAAA,CAAA;AACR,oBAAA,UAAU,EAAE;AACf,iBAAA;;;ACPD;;AAEG;;ACFH;;AAEG;;;;"}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
import { KeycloakService } from "./keycloak.service";
|
|
2
|
+
import { AuthenticatedUser } from "./authenticated-user";
|
|
3
|
+
import { KeycloakToken } from "./keycloak-token";
|
|
4
|
+
import * as i0 from "@angular/core";
|
|
5
|
+
export declare class AuthenticationService {
|
|
6
|
+
private readonly keycloakService;
|
|
7
|
+
keycloakClientId: string;
|
|
8
|
+
constructor(keycloakService: KeycloakService);
|
|
9
|
+
init(keycloakUrl: string, keycloakRealm: string, keycloakClientId: string): Promise<boolean>;
|
|
10
|
+
login(): void;
|
|
11
|
+
logout(): void;
|
|
12
|
+
isLoggedIn(): boolean;
|
|
13
|
+
getToken(): string | undefined;
|
|
14
|
+
getUser(): Promise<AuthenticatedUser | undefined>;
|
|
15
|
+
getUsername(): string | undefined;
|
|
16
|
+
getParsedToken(): KeycloakToken | undefined;
|
|
17
|
+
getRoles(): string[];
|
|
18
|
+
hasRole(role: string): boolean;
|
|
19
|
+
static ɵfac: i0.ɵɵFactoryDeclaration<AuthenticationService, never>;
|
|
20
|
+
static ɵprov: i0.ɵɵInjectableDeclaration<AuthenticationService>;
|
|
21
|
+
}
|
package/package.json
CHANGED
package/public-api.d.ts
CHANGED