web-mojo 2.1.758 → 2.1.761
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/admin.cjs.js +1 -1
- package/dist/admin.es.js +10 -10
- package/dist/auth.cjs.js +1 -1
- package/dist/auth.cjs.js.map +1 -1
- package/dist/auth.es.js +10 -9
- package/dist/auth.es.js.map +1 -1
- package/dist/charts.cjs.js +1 -1
- package/dist/charts.es.js +2 -2
- package/dist/chunks/{ChatView-CoCylKpB.js → ChatView-BaKGKYIW.js} +6 -6
- package/dist/chunks/{ChatView-CoCylKpB.js.map → ChatView-BaKGKYIW.js.map} +1 -1
- package/dist/chunks/{ChatView-S4pMSPhI.js → ChatView-CQLSGsuA.js} +2 -2
- package/dist/chunks/{ChatView-S4pMSPhI.js.map → ChatView-CQLSGsuA.js.map} +1 -1
- package/dist/chunks/{ContextMenu-C5RTltSd.js → ContextMenu-Ccy78itn.js} +2 -2
- package/dist/chunks/{ContextMenu-C5RTltSd.js.map → ContextMenu-Ccy78itn.js.map} +1 -1
- package/dist/chunks/{ContextMenu-BKUnE3JT.js → ContextMenu-EtrS3sqW.js} +2 -2
- package/dist/chunks/{ContextMenu-BKUnE3JT.js.map → ContextMenu-EtrS3sqW.js.map} +1 -1
- package/dist/chunks/{DataView-D7CYJ31b.js → DataView-B-NO26Rf.js} +2 -2
- package/dist/chunks/{DataView-D7CYJ31b.js.map → DataView-B-NO26Rf.js.map} +1 -1
- package/dist/chunks/{DataView-idgJVB89.js → DataView-DNnk7fTT.js} +2 -2
- package/dist/chunks/{DataView-idgJVB89.js.map → DataView-DNnk7fTT.js.map} +1 -1
- package/dist/chunks/{Dialog-BPhwGiQx.js → Dialog-CBChqVIZ.js} +5 -5
- package/dist/chunks/{Dialog-BPhwGiQx.js.map → Dialog-CBChqVIZ.js.map} +1 -1
- package/dist/chunks/{Dialog-4ra2w2tV.js → Dialog-v6xXatPb.js} +2 -2
- package/dist/chunks/{Dialog-4ra2w2tV.js.map → Dialog-v6xXatPb.js.map} +1 -1
- package/dist/chunks/{FormView-a7Rl2bmm.js → FormView-B95jjgZr.js} +2 -2
- package/dist/chunks/{FormView-a7Rl2bmm.js.map → FormView-B95jjgZr.js.map} +1 -1
- package/dist/chunks/{FormView-C1ljUoea.js → FormView-BzhM9nar.js} +2 -2
- package/dist/chunks/{FormView-C1ljUoea.js.map → FormView-BzhM9nar.js.map} +1 -1
- package/dist/chunks/{MetricsMiniChartWidget-hdDNDf7M.js → MetricsMiniChartWidget-BLO12yFH.js} +3 -3
- package/dist/chunks/{MetricsMiniChartWidget-hdDNDf7M.js.map → MetricsMiniChartWidget-BLO12yFH.js.map} +1 -1
- package/dist/chunks/{MetricsMiniChartWidget-m_U_ucCF.js → MetricsMiniChartWidget-D5P4K2VW.js} +2 -2
- package/dist/chunks/{MetricsMiniChartWidget-m_U_ucCF.js.map → MetricsMiniChartWidget-D5P4K2VW.js.map} +1 -1
- package/dist/chunks/{PDFViewer-OvkZ_4H3.js → PDFViewer-DHetE0mX.js} +2 -2
- package/dist/chunks/{PDFViewer-OvkZ_4H3.js.map → PDFViewer-DHetE0mX.js.map} +1 -1
- package/dist/chunks/{PDFViewer-DwJDeXQH.js → PDFViewer-DO4ec_8P.js} +3 -3
- package/dist/chunks/{PDFViewer-DwJDeXQH.js.map → PDFViewer-DO4ec_8P.js.map} +1 -1
- package/dist/chunks/{Page-CbWUdARI.js → Page-BQ7bila2.js} +2 -2
- package/dist/chunks/{Page-CbWUdARI.js.map → Page-BQ7bila2.js.map} +1 -1
- package/dist/chunks/{Page-D7lbK30W.js → Page-Dn1oAANw.js} +2 -2
- package/dist/chunks/{Page-D7lbK30W.js.map → Page-Dn1oAANw.js.map} +1 -1
- package/dist/chunks/TokenManager-BXQKyhDc.js +2 -0
- package/dist/chunks/TokenManager-BXQKyhDc.js.map +1 -0
- package/dist/chunks/{TokenManager-Fjt083wv.js → TokenManager-CAZNcCMs.js} +3 -3
- package/dist/chunks/TokenManager-CAZNcCMs.js.map +1 -0
- package/dist/chunks/{TopNav-CKfu-goV.js → TopNav-Dxw-w4PV.js} +2 -2
- package/dist/chunks/{TopNav-CKfu-goV.js.map → TopNav-Dxw-w4PV.js.map} +1 -1
- package/dist/chunks/{TopNav-B7o7jhkD.js → TopNav-OcY6ViTW.js} +5 -5
- package/dist/chunks/{TopNav-B7o7jhkD.js.map → TopNav-OcY6ViTW.js.map} +1 -1
- package/dist/chunks/{WebApp-CYCNA3GB.js → WebApp-D0KJTN0p.js} +13 -13
- package/dist/chunks/{WebApp-CYCNA3GB.js.map → WebApp-D0KJTN0p.js.map} +1 -1
- package/dist/chunks/{WebApp-Cnkm2125.js → WebApp-DlfbVd3B.js} +2 -2
- package/dist/chunks/{WebApp-Cnkm2125.js.map → WebApp-DlfbVd3B.js.map} +1 -1
- package/dist/docit.cjs.js +1 -1
- package/dist/docit.es.js +6 -6
- package/dist/index.cjs.js +1 -1
- package/dist/index.es.js +12 -12
- package/dist/lightbox.cjs.js +1 -1
- package/dist/lightbox.es.js +4 -4
- package/package.json +1 -1
- package/dist/chunks/TokenManager-Bv9T1Pxb.js +0 -2
- package/dist/chunks/TokenManager-Bv9T1Pxb.js.map +0 -1
- package/dist/chunks/TokenManager-Fjt083wv.js.map +0 -1
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"TokenManager-Bv9T1Pxb.js","sources":["../../src/core/services/TokenManager.js"],"sourcesContent":["/**\n * Token - Individual JWT token handling\n * Handles decoding, validation, and data extraction for a single token\n */\nclass Token {\n constructor(token) {\n this.token = token;\n this.payload = null;\n this.uid = null;\n this.email = null;\n this.name = null;\n this.exp = null;\n this.iat = null;\n this.isValidToken = false;\n\n this._decode();\n }\n\n /**\n * Decode JWT token payload (client-side only, no verification)\n * @private\n */\n _decode() {\n if (!this.token || typeof this.token !== 'string') {\n return;\n }\n\n try {\n const parts = this.token.split('.');\n if (parts.length !== 3) {\n return;\n }\n\n // Decode the payload (second part)\n const payload = parts[1];\n\n // Handle URL-safe base64\n let base64 = payload.replace(/-/g, '+').replace(/_/g, '/');\n const padding = 4 - (base64.length % 4);\n if (padding !== 4) {\n base64 += '='.repeat(padding);\n }\n\n const decoded = atob(base64);\n this.payload = JSON.parse(decoded);\n\n // Extract common properties\n this.uid = this.payload.uid || this.payload.sub || this.payload.user_id || null;\n this.email = this.payload.email || null;\n this.name = this.payload.name || this.payload.username || null;\n this.exp = this.payload.exp ? new Date(this.payload.exp * 1000) : null;\n this.iat = this.payload.iat ? new Date(this.payload.iat * 1000) : null;\n\n // Determine validity\n this.isValidToken = this._checkValidity();\n } catch (error) {\n this.payload = null;\n }\n }\n\n /**\n * Check token validity\n * @private\n * @returns {boolean} True if token is valid\n */\n _checkValidity() {\n if (!this.token || !this.payload) {\n return false;\n }\n\n // Check expiry if present\n if (this.payload.exp) {\n const now = Math.floor(Date.now() / 1000);\n return now < this.payload.exp;\n }\n\n // If no expiry, consider valid\n return true;\n }\n\n /**\n * Decode JWT token payload (client-side only, no verification)\n * @returns {object|null} Decoded payload or null if invalid\n */\n decode() {\n return this.payload;\n }\n\n /**\n * Get user ID from token\n * @returns {string|null} User ID or null if not found\n */\n getUserId() {\n return this.uid;\n }\n\n /**\n * Check if token is valid (exists and not expired)\n * @returns {boolean} True if token is valid\n */\n isValid() {\n return this.isValidToken;\n }\n\n /**\n * Check if token will expire soon\n * @param {number} thresholdMinutes - Minutes before expiry to consider \"soon\"\n * @returns {boolean} True if expiring soon\n */\n isExpiringSoon(thresholdMinutes = 5) {\n if (!this.payload?.exp) {\n return false;\n }\n\n const now = Math.floor(Date.now() / 1000);\n const threshold = thresholdMinutes * 60;\n return (this.payload.exp - now) <= threshold;\n }\n\n /**\n * Check if token is expired\n * @returns {boolean} True if expired\n */\n isExpired() {\n if (!this.payload?.exp) {\n return false;\n }\n\n const now = Math.floor(Date.now() / 1000);\n return now >= this.payload.exp;\n }\n\n /**\n * Get token age in minutes\n * @returns {number|null} Age in minutes since token was issued, or null if no iat\n */\n getAgeMinutes() {\n if (!this.payload?.iat) {\n return null;\n }\n const now = Math.floor(Date.now() / 1000);\n const ageSeconds = now - this.payload.iat;\n return Math.floor(ageSeconds / 60);\n }\n\n /**\n * Get authorization header value\n * @returns {string|null} Bearer token string or null if no token\n */\n getAuthHeader() {\n return this.token ? `Bearer ${this.token}` : null;\n }\n\n /**\n * Get basic user info from token\n * @returns {object|null} User info or null\n */\n getUserInfo() {\n if (!this.payload) {\n return null;\n }\n\n return {\n uid: this.uid,\n email: this.email,\n name: this.name,\n exp: this.exp,\n iat: this.iat\n };\n }\n}\n\n/**\n * TokenManager - Simplified JWT token handling for MOJO Auth\n * Focuses on core token operations: storage, validation, and user ID extraction\n */\n\nexport default class TokenManager {\n constructor() {\n this.tokenKey = 'mojo_auth_token';\n this.refreshTokenKey = 'mojo_auth_refresh_token';\n this.tokenInstance = null;\n }\n\n /**\n * Store authentication tokens\n * @param {string} token - Access token\n * @param {string} refreshToken - Refresh token (optional)\n * @param {boolean} persistent - Use localStorage if true, sessionStorage if false\n */\n setTokens(token, refreshToken = null, persistent = true) {\n const storage = persistent ? localStorage : sessionStorage;\n this.tokenInstance = new Token(token);\n if (token) {\n storage.setItem(this.tokenKey, token);\n }\n\n if (refreshToken) {\n storage.setItem(this.refreshTokenKey, refreshToken);\n }\n }\n\n /**\n * Get stored access token\n * @returns {string|null} Access token or null if not found\n */\n getToken() {\n return localStorage.getItem(this.tokenKey) ||\n sessionStorage.getItem(this.tokenKey);\n }\n\n /**\n * Get stored refresh token\n * @returns {string|null} Refresh token or null if not found\n */\n getRefreshToken() {\n return localStorage.getItem(this.refreshTokenKey) ||\n sessionStorage.getItem(this.refreshTokenKey);\n }\n\n /**\n * Clear all stored tokens\n */\n clearTokens() {\n localStorage.removeItem(this.tokenKey);\n localStorage.removeItem(this.refreshTokenKey);\n sessionStorage.removeItem(this.tokenKey);\n sessionStorage.removeItem(this.refreshTokenKey);\n }\n\n /**\n * Get Token instance for current stored token\n * @returns {Token|null} Token instance or null if no token\n */\n getTokenInstance() {\n const currentToken = this.getToken();\n\n // If no token stored, clear instance and return null\n if (!currentToken) {\n this.tokenInstance = null;\n return null;\n }\n\n // If instance doesn't exist or token changed, create new instance\n if (!this.tokenInstance || this.tokenInstance.token !== currentToken) {\n this.tokenInstance = new Token(currentToken);\n }\n\n return this.tokenInstance;\n }\n\n /**\n * Get Token instance for refresh token\n * @returns {Token|null} Token instance or null if no refresh token\n */\n getRefreshTokenInstance() {\n const currentRefreshToken = this.getRefreshToken();\n\n // If no refresh token stored, clear instance and return null\n if (!currentRefreshToken) {\n this._refreshTokenInstance = null;\n return null;\n }\n\n // If instance doesn't exist or token changed, create new instance\n if (!this._refreshTokenInstance || this._refreshTokenInstance.token !== currentRefreshToken) {\n this._refreshTokenInstance = new Token(currentRefreshToken);\n }\n\n return this._refreshTokenInstance;\n }\n\n /**\n * Decode JWT token payload (client-side only, no verification)\n * @param {string} token - JWT token\n * @returns {object|null} Decoded payload or null if invalid\n */\n decode(token = null) {\n const jwt = token || this.getToken();\n return new Token(jwt).decode();\n }\n\n /**\n * Get user ID from token\n * @returns {string|null} User ID or null if not found\n */\n getUserId() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.getUserId() : null;\n }\n\n /**\n * Check if current token is valid (exists and not expired)\n * @returns {boolean} True if token is valid\n */\n isValid() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.isValid() : false;\n }\n\n /**\n * Check if token will expire soon\n * @param {number} thresholdMinutes - Minutes before expiry to consider \"soon\"\n * @returns {boolean} True if expiring soon\n */\n isExpiringSoon(thresholdMinutes = 5) {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.isExpiringSoon(thresholdMinutes) : false;\n }\n\n /**\n * Get authorization header value\n * @returns {string|null} Bearer token string or null if no token\n */\n getAuthHeader() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.getAuthHeader() : null;\n }\n\n /**\n * Get basic user info from token\n * @returns {object|null} User info or null\n */\n getUserInfo() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.getUserInfo() : null;\n }\n\n /**\n * Check current token status and determine what action is needed\n * @returns {object} Status object with action and details\n */\n checkTokenStatus() {\n const token = this.getTokenInstance();\n const refreshToken = this.getRefreshTokenInstance();\n\n // If no access token or it's invalid/expired\n if (!token || !token.isValid() || token.isExpired()) {\n // Check if refresh is possible\n if (!refreshToken || !refreshToken.isValid() || refreshToken.isExpired()) {\n return {\n action: 'logout',\n reason: 'Both access and refresh tokens are invalid/expired'\n };\n }\n\n return {\n action: 'refresh',\n reason: 'Access token invalid/expired but refresh token valid'\n };\n }\n\n // Access token is valid - check if it needs refreshing soon\n if (token.isExpiringSoon(10) || (token.getAgeMinutes() && token.getAgeMinutes() > 60)) {\n // Only suggest refresh if refresh token is still valid\n if (!refreshToken || !refreshToken.isValid() || refreshToken.isExpired()) {\n return {\n action: 'none',\n reason: 'Access token expiring but refresh token invalid'\n };\n }\n\n return {\n action: 'refresh',\n reason: 'Access token expiring soon or aged'\n };\n }\n\n return {\n action: 'none',\n reason: 'All tokens valid and not expiring soon'\n };\n }\n\n /**\n * Check tokens and take appropriate action\n * @param {object} app - App instance for events and API calls\n * @returns {Promise<boolean>} True if action was taken\n */\n async checkAndRefreshTokens(app) {\n const status = this.checkTokenStatus();\n\n switch (status.action) {\n case 'logout':\n app.events.emit(\"auth:unauthorized\");\n this.stopAutoRefresh();\n return true;\n\n case 'refresh':\n await this.refreshToken(app);\n return true;\n\n default:\n return false;\n }\n }\n\n startAutoRefresh(app) {\n this.stopAutoRefresh();\n this._tokenWatcher = setInterval(() => {\n this.checkAndRefreshTokens(app);\n }, 60000);\n }\n\n stopAutoRefresh() {\n if (this._tokenWatcher) {\n clearInterval(this._tokenWatcher);\n this._tokenWatcher = null;\n }\n }\n\n async refreshToken(app) {\n const refreshTokenInstance = this.getRefreshTokenInstance();\n\n // Double-check refresh token validity before attempting refresh\n if (!refreshTokenInstance || !refreshTokenInstance.isValid() || refreshTokenInstance.isExpired()) {\n\n app.events.emit(\"auth:unauthorized\");\n this.stopAutoRefresh();\n return;\n }\n\n try {\n\n const response = await app.rest.POST('/api/token/refresh', {\n refresh_token: refreshTokenInstance.token\n });\n\n const { access_token, refresh_token } = response.data.data;\n\n // Clear old cached instances so new tokens are loaded\n this.tokenInstance = null;\n this._refreshTokenInstance = null;\n\n // Store new tokens\n this.setTokens(access_token, refresh_token);\n app.rest.setAuthToken(access_token);\n\n // Emit success event\n app.events.emit('auth:token:refreshed', {\n newToken: access_token,\n newRefreshToken: refresh_token\n });\n\n console.log('Token refreshed successfully');\n\n } catch (error) {\n\n\n // Check if it's an authentication error (refresh token invalid)\n if (error.status === 401 || error.status === 403) {\n\n app.events.emit(\"auth:unauthorized\");\n this.stopAutoRefresh();\n } else {\n // For other errors, emit specific event but don't logout\n app.events.emit('auth:token:refresh:failed', { error });\n }\n }\n }\n}\n"],"names":["Token","constructor","token","this","payload","uid","email","name","exp","iat","isValidToken","_decode","parts","split","length","base64","replace","padding","repeat","decoded","atob","JSON","parse","sub","user_id","username","Date","_checkValidity","error","Math","floor","now","decode","getUserId","isValid","isExpiringSoon","thresholdMinutes","threshold","isExpired","getAgeMinutes","ageSeconds","getAuthHeader","getUserInfo","tokenKey","refreshTokenKey","tokenInstance","setTokens","refreshToken","persistent","storage","localStorage","sessionStorage","setItem","getToken","getItem","getRefreshToken","clearTokens","removeItem","getTokenInstance","currentToken","getRefreshTokenInstance","currentRefreshToken","_refreshTokenInstance","jwt","checkTokenStatus","action","reason","checkAndRefreshTokens","app","events","emit","stopAutoRefresh","startAutoRefresh","_tokenWatcher","setInterval","clearInterval","refreshTokenInstance","response","rest","POST","refresh_token","access_token","data","setAuthToken","newToken","newRefreshToken","console","log","status"],"mappings":"aAIA,MAAMA,MACF,WAAAC,CAAYC,GACRC,KAAKD,MAAQA,EACbC,KAAKC,QAAU,KACfD,KAAKE,IAAM,KACXF,KAAKG,MAAQ,KACbH,KAAKI,KAAO,KACZJ,KAAKK,IAAM,KACXL,KAAKM,IAAM,KACXN,KAAKO,cAAe,EAEpBP,KAAKQ,SACT,CAMA,OAAAA,GACI,GAAKR,KAAKD,OAA+B,iBAAfC,KAAKD,MAI/B,IACI,MAAMU,EAAQT,KAAKD,MAAMW,MAAM,KAC/B,GAAqB,IAAjBD,EAAME,OACN,OAOJ,IAAIC,EAHYH,EAAM,GAGDI,QAAQ,KAAM,KAAKA,QAAQ,KAAM,KACtD,MAAMC,EAAU,EAAKF,EAAOD,OAAS,EACrB,IAAZG,IACAF,GAAU,IAAIG,OAAOD,IAGzB,MAAME,EAAUC,KAAKL,GACrBZ,KAAKC,QAAUiB,KAAKC,MAAMH,GAG1BhB,KAAKE,IAAMF,KAAKC,QAAQC,KAAOF,KAAKC,QAAQmB,KAAOpB,KAAKC,QAAQoB,SAAW,KAC3ErB,KAAKG,MAAQH,KAAKC,QAAQE,OAAS,KACnCH,KAAKI,KAAOJ,KAAKC,QAAQG,MAAQJ,KAAKC,QAAQqB,UAAY,KAC1DtB,KAAKK,IAAML,KAAKC,QAAQI,IAAM,IAAIkB,KAAwB,IAAnBvB,KAAKC,QAAQI,KAAc,KAClEL,KAAKM,IAAMN,KAAKC,QAAQK,IAAM,IAAIiB,KAAwB,IAAnBvB,KAAKC,QAAQK,KAAc,KAGlEN,KAAKO,aAAeP,KAAKwB,gBAC7B,OAASC,GACLzB,KAAKC,QAAU,IACnB,CACJ,CAOA,cAAAuB,GACI,SAAKxB,KAAKD,QAAUC,KAAKC,YAKrBD,KAAKC,QAAQI,KACDqB,KAAKC,MAAMJ,KAAKK,MAAQ,KACvB5B,KAAKC,QAAQI,IAKlC,CAMA,MAAAwB,GACI,OAAO7B,KAAKC,OAChB,CAMA,SAAA6B,GACI,OAAO9B,KAAKE,GAChB,CAMA,OAAA6B,GACI,OAAO/B,KAAKO,YAChB,CAOA,cAAAyB,CAAeC,EAAmB,GAC9B,IAAKjC,KAAKC,SAASI,IACf,OAAO,EAGX,MAAMuB,EAAMF,KAAKC,MAAMJ,KAAKK,MAAQ,KAC9BM,EAA+B,GAAnBD,EAClB,OAAQjC,KAAKC,QAAQI,IAAMuB,GAAQM,CACvC,CAMA,SAAAC,GACI,QAAKnC,KAAKC,SAASI,KAIPqB,KAAKC,MAAMJ,KAAKK,MAAQ,MACtB5B,KAAKC,QAAQI,GAC/B,CAMA,aAAA+B,GACI,IAAKpC,KAAKC,SAASK,IACf,OAAO,KAEX,MACM+B,EADMX,KAAKC,MAAMJ,KAAKK,MAAQ,KACX5B,KAAKC,QAAQK,IACtC,OAAOoB,KAAKC,MAAMU,EAAa,GACnC,CAMA,aAAAC,GACI,OAAOtC,KAAKD,MAAQ,UAAUC,KAAKD,QAAU,IACjD,CAMA,WAAAwC,GACI,OAAKvC,KAAKC,QAIH,CACHC,IAAKF,KAAKE,IACVC,MAAOH,KAAKG,MACZC,KAAMJ,KAAKI,KACXC,IAAKL,KAAKK,IACVC,IAAKN,KAAKM,KARH,IAUf,uBAQW,MACX,WAAAR,GACIE,KAAKwC,SAAW,kBAChBxC,KAAKyC,gBAAkB,0BACvBzC,KAAK0C,cAAgB,IACzB,CAQA,SAAAC,CAAU5C,EAAO6C,EAAe,KAAMC,GAAa,GAC/C,MAAMC,EAAUD,EAAaE,aAAeC,eAC5ChD,KAAK0C,cAAgB,IAAI7C,MAAME,GAC3BA,GACA+C,EAAQG,QAAQjD,KAAKwC,SAAUzC,GAG/B6C,GACAE,EAAQG,QAAQjD,KAAKyC,gBAAiBG,EAE9C,CAMA,QAAAM,GACI,OAAOH,aAAaI,QAAQnD,KAAKwC,WAC1BQ,eAAeG,QAAQnD,KAAKwC,SACvC,CAMA,eAAAY,GACI,OAAOL,aAAaI,QAAQnD,KAAKyC,kBAC1BO,eAAeG,QAAQnD,KAAKyC,gBACvC,CAKA,WAAAY,GACIN,aAAaO,WAAWtD,KAAKwC,UAC7BO,aAAaO,WAAWtD,KAAKyC,iBAC7BO,eAAeM,WAAWtD,KAAKwC,UAC/BQ,eAAeM,WAAWtD,KAAKyC,gBACnC,CAMA,gBAAAc,GACI,MAAMC,EAAexD,KAAKkD,WAG1B,OAAKM,GAMAxD,KAAK0C,eAAiB1C,KAAK0C,cAAc3C,QAAUyD,IACpDxD,KAAK0C,cAAgB,IAAI7C,MAAM2D,IAG5BxD,KAAK0C,gBATR1C,KAAK0C,cAAgB,KACd,KASf,CAMA,uBAAAe,GACI,MAAMC,EAAsB1D,KAAKoD,kBAGjC,OAAKM,GAMA1D,KAAK2D,uBAAyB3D,KAAK2D,sBAAsB5D,QAAU2D,IACpE1D,KAAK2D,sBAAwB,IAAI9D,MAAM6D,IAGpC1D,KAAK2D,wBATR3D,KAAK2D,sBAAwB,KACtB,KASf,CAOA,MAAA9B,CAAO9B,EAAQ,MACX,MAAM6D,EAAM7D,GAASC,KAAKkD,WAC1B,OAAO,IAAIrD,MAAM+D,GAAK/B,QAC1B,CAMA,SAAAC,GACI,MAAM0B,EAAexD,KAAKuD,mBAC1B,OAAOC,EAAeA,EAAa1B,YAAc,IACrD,CAMA,OAAAC,GACI,MAAMyB,EAAexD,KAAKuD,mBAC1B,QAAOC,GAAeA,EAAazB,SACvC,CAOA,cAAAC,CAAeC,EAAmB,GAC9B,MAAMuB,EAAexD,KAAKuD,mBAC1B,QAAOC,GAAeA,EAAaxB,eAAeC,EACtD,CAMA,aAAAK,GACI,MAAMkB,EAAexD,KAAKuD,mBAC1B,OAAOC,EAAeA,EAAalB,gBAAkB,IACzD,CAMA,WAAAC,GACI,MAAMiB,EAAexD,KAAKuD,mBAC1B,OAAOC,EAAeA,EAAajB,cAAgB,IACvD,CAMA,gBAAAsB,GACI,MAAM9D,EAAQC,KAAKuD,mBACbX,EAAe5C,KAAKyD,0BAG1B,OAAK1D,GAAUA,EAAMgC,YAAahC,EAAMoC,YAgBpCpC,EAAMiC,eAAe,KAAQjC,EAAMqC,iBAAmBrC,EAAMqC,gBAAkB,GAEzEQ,GAAiBA,EAAab,YAAaa,EAAaT,YAOtD,CACH2B,OAAQ,UACRC,OAAQ,sCARD,CACHD,OAAQ,OACRC,OAAQ,mDAUb,CACHD,OAAQ,OACRC,OAAQ,0CA/BHnB,GAAiBA,EAAab,YAAaa,EAAaT,YAOtD,CACH2B,OAAQ,UACRC,OAAQ,wDARD,CACHD,OAAQ,SACRC,OAAQ,qDA8BxB,CAOA,2BAAMC,CAAsBC,GAGxB,OAFejE,KAAK6D,mBAELC,QACX,IAAK,SAGD,OAFAG,EAAIC,OAAOC,KAAK,qBAChBnE,KAAKoE,mBACE,EAEX,IAAK,UAED,aADMpE,KAAK4C,aAAaqB,IACjB,EAEX,QACI,OAAO,EAEnB,CAEA,gBAAAI,CAAiBJ,GACbjE,KAAKoE,kBACLpE,KAAKsE,cAAgBC,YAAY,KAC7BvE,KAAKgE,sBAAsBC,IAC5B,IACP,CAEA,eAAAG,GACQpE,KAAKsE,gBACLE,cAAcxE,KAAKsE,eACnBtE,KAAKsE,cAAgB,KAE7B,CAEA,kBAAM1B,CAAaqB,GACf,MAAMQ,EAAuBzE,KAAKyD,0BAGlC,IAAKgB,IAAyBA,EAAqB1C,WAAa0C,EAAqBtC,YAIjF,OAFA8B,EAAIC,OAAOC,KAAK,0BAChBnE,KAAKoE,kBAIT,IAEI,MAAMM,QAAiBT,EAAIU,KAAKC,KAAK,qBAAsB,CACvDC,cAAeJ,EAAqB1E,SAGlC+E,aAAEA,EAAAD,cAAcA,GAAkBH,EAASK,KAAKA,KAGtD/E,KAAK0C,cAAgB,KACrB1C,KAAK2D,sBAAwB,KAG7B3D,KAAK2C,UAAUmC,EAAcD,GAC7BZ,EAAIU,KAAKK,aAAaF,GAGtBb,EAAIC,OAAOC,KAAK,uBAAwB,CACpCc,SAAUH,EACVI,gBAAiBL,IAGrBM,QAAQC,IAAI,+BAEhB,OAAS3D,GAIgB,MAAjBA,EAAM4D,QAAmC,MAAjB5D,EAAM4D,QAE9BpB,EAAIC,OAAOC,KAAK,qBAChBnE,KAAKoE,mBAGLH,EAAIC,OAAOC,KAAK,4BAA6B,CAAE1C,SAEvD,CACJ"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"TokenManager-Fjt083wv.js","sources":["../../src/core/services/TokenManager.js"],"sourcesContent":["/**\n * Token - Individual JWT token handling\n * Handles decoding, validation, and data extraction for a single token\n */\nclass Token {\n constructor(token) {\n this.token = token;\n this.payload = null;\n this.uid = null;\n this.email = null;\n this.name = null;\n this.exp = null;\n this.iat = null;\n this.isValidToken = false;\n\n this._decode();\n }\n\n /**\n * Decode JWT token payload (client-side only, no verification)\n * @private\n */\n _decode() {\n if (!this.token || typeof this.token !== 'string') {\n return;\n }\n\n try {\n const parts = this.token.split('.');\n if (parts.length !== 3) {\n return;\n }\n\n // Decode the payload (second part)\n const payload = parts[1];\n\n // Handle URL-safe base64\n let base64 = payload.replace(/-/g, '+').replace(/_/g, '/');\n const padding = 4 - (base64.length % 4);\n if (padding !== 4) {\n base64 += '='.repeat(padding);\n }\n\n const decoded = atob(base64);\n this.payload = JSON.parse(decoded);\n\n // Extract common properties\n this.uid = this.payload.uid || this.payload.sub || this.payload.user_id || null;\n this.email = this.payload.email || null;\n this.name = this.payload.name || this.payload.username || null;\n this.exp = this.payload.exp ? new Date(this.payload.exp * 1000) : null;\n this.iat = this.payload.iat ? new Date(this.payload.iat * 1000) : null;\n\n // Determine validity\n this.isValidToken = this._checkValidity();\n } catch (error) {\n this.payload = null;\n }\n }\n\n /**\n * Check token validity\n * @private\n * @returns {boolean} True if token is valid\n */\n _checkValidity() {\n if (!this.token || !this.payload) {\n return false;\n }\n\n // Check expiry if present\n if (this.payload.exp) {\n const now = Math.floor(Date.now() / 1000);\n return now < this.payload.exp;\n }\n\n // If no expiry, consider valid\n return true;\n }\n\n /**\n * Decode JWT token payload (client-side only, no verification)\n * @returns {object|null} Decoded payload or null if invalid\n */\n decode() {\n return this.payload;\n }\n\n /**\n * Get user ID from token\n * @returns {string|null} User ID or null if not found\n */\n getUserId() {\n return this.uid;\n }\n\n /**\n * Check if token is valid (exists and not expired)\n * @returns {boolean} True if token is valid\n */\n isValid() {\n return this.isValidToken;\n }\n\n /**\n * Check if token will expire soon\n * @param {number} thresholdMinutes - Minutes before expiry to consider \"soon\"\n * @returns {boolean} True if expiring soon\n */\n isExpiringSoon(thresholdMinutes = 5) {\n if (!this.payload?.exp) {\n return false;\n }\n\n const now = Math.floor(Date.now() / 1000);\n const threshold = thresholdMinutes * 60;\n return (this.payload.exp - now) <= threshold;\n }\n\n /**\n * Check if token is expired\n * @returns {boolean} True if expired\n */\n isExpired() {\n if (!this.payload?.exp) {\n return false;\n }\n\n const now = Math.floor(Date.now() / 1000);\n return now >= this.payload.exp;\n }\n\n /**\n * Get token age in minutes\n * @returns {number|null} Age in minutes since token was issued, or null if no iat\n */\n getAgeMinutes() {\n if (!this.payload?.iat) {\n return null;\n }\n const now = Math.floor(Date.now() / 1000);\n const ageSeconds = now - this.payload.iat;\n return Math.floor(ageSeconds / 60);\n }\n\n /**\n * Get authorization header value\n * @returns {string|null} Bearer token string or null if no token\n */\n getAuthHeader() {\n return this.token ? `Bearer ${this.token}` : null;\n }\n\n /**\n * Get basic user info from token\n * @returns {object|null} User info or null\n */\n getUserInfo() {\n if (!this.payload) {\n return null;\n }\n\n return {\n uid: this.uid,\n email: this.email,\n name: this.name,\n exp: this.exp,\n iat: this.iat\n };\n }\n}\n\n/**\n * TokenManager - Simplified JWT token handling for MOJO Auth\n * Focuses on core token operations: storage, validation, and user ID extraction\n */\n\nexport default class TokenManager {\n constructor() {\n this.tokenKey = 'mojo_auth_token';\n this.refreshTokenKey = 'mojo_auth_refresh_token';\n this.tokenInstance = null;\n }\n\n /**\n * Store authentication tokens\n * @param {string} token - Access token\n * @param {string} refreshToken - Refresh token (optional)\n * @param {boolean} persistent - Use localStorage if true, sessionStorage if false\n */\n setTokens(token, refreshToken = null, persistent = true) {\n const storage = persistent ? localStorage : sessionStorage;\n this.tokenInstance = new Token(token);\n if (token) {\n storage.setItem(this.tokenKey, token);\n }\n\n if (refreshToken) {\n storage.setItem(this.refreshTokenKey, refreshToken);\n }\n }\n\n /**\n * Get stored access token\n * @returns {string|null} Access token or null if not found\n */\n getToken() {\n return localStorage.getItem(this.tokenKey) ||\n sessionStorage.getItem(this.tokenKey);\n }\n\n /**\n * Get stored refresh token\n * @returns {string|null} Refresh token or null if not found\n */\n getRefreshToken() {\n return localStorage.getItem(this.refreshTokenKey) ||\n sessionStorage.getItem(this.refreshTokenKey);\n }\n\n /**\n * Clear all stored tokens\n */\n clearTokens() {\n localStorage.removeItem(this.tokenKey);\n localStorage.removeItem(this.refreshTokenKey);\n sessionStorage.removeItem(this.tokenKey);\n sessionStorage.removeItem(this.refreshTokenKey);\n }\n\n /**\n * Get Token instance for current stored token\n * @returns {Token|null} Token instance or null if no token\n */\n getTokenInstance() {\n const currentToken = this.getToken();\n\n // If no token stored, clear instance and return null\n if (!currentToken) {\n this.tokenInstance = null;\n return null;\n }\n\n // If instance doesn't exist or token changed, create new instance\n if (!this.tokenInstance || this.tokenInstance.token !== currentToken) {\n this.tokenInstance = new Token(currentToken);\n }\n\n return this.tokenInstance;\n }\n\n /**\n * Get Token instance for refresh token\n * @returns {Token|null} Token instance or null if no refresh token\n */\n getRefreshTokenInstance() {\n const currentRefreshToken = this.getRefreshToken();\n\n // If no refresh token stored, clear instance and return null\n if (!currentRefreshToken) {\n this._refreshTokenInstance = null;\n return null;\n }\n\n // If instance doesn't exist or token changed, create new instance\n if (!this._refreshTokenInstance || this._refreshTokenInstance.token !== currentRefreshToken) {\n this._refreshTokenInstance = new Token(currentRefreshToken);\n }\n\n return this._refreshTokenInstance;\n }\n\n /**\n * Decode JWT token payload (client-side only, no verification)\n * @param {string} token - JWT token\n * @returns {object|null} Decoded payload or null if invalid\n */\n decode(token = null) {\n const jwt = token || this.getToken();\n return new Token(jwt).decode();\n }\n\n /**\n * Get user ID from token\n * @returns {string|null} User ID or null if not found\n */\n getUserId() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.getUserId() : null;\n }\n\n /**\n * Check if current token is valid (exists and not expired)\n * @returns {boolean} True if token is valid\n */\n isValid() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.isValid() : false;\n }\n\n /**\n * Check if token will expire soon\n * @param {number} thresholdMinutes - Minutes before expiry to consider \"soon\"\n * @returns {boolean} True if expiring soon\n */\n isExpiringSoon(thresholdMinutes = 5) {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.isExpiringSoon(thresholdMinutes) : false;\n }\n\n /**\n * Get authorization header value\n * @returns {string|null} Bearer token string or null if no token\n */\n getAuthHeader() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.getAuthHeader() : null;\n }\n\n /**\n * Get basic user info from token\n * @returns {object|null} User info or null\n */\n getUserInfo() {\n const currentToken = this.getTokenInstance();\n return currentToken ? currentToken.getUserInfo() : null;\n }\n\n /**\n * Check current token status and determine what action is needed\n * @returns {object} Status object with action and details\n */\n checkTokenStatus() {\n const token = this.getTokenInstance();\n const refreshToken = this.getRefreshTokenInstance();\n\n // If no access token or it's invalid/expired\n if (!token || !token.isValid() || token.isExpired()) {\n // Check if refresh is possible\n if (!refreshToken || !refreshToken.isValid() || refreshToken.isExpired()) {\n return {\n action: 'logout',\n reason: 'Both access and refresh tokens are invalid/expired'\n };\n }\n\n return {\n action: 'refresh',\n reason: 'Access token invalid/expired but refresh token valid'\n };\n }\n\n // Access token is valid - check if it needs refreshing soon\n if (token.isExpiringSoon(10) || (token.getAgeMinutes() && token.getAgeMinutes() > 60)) {\n // Only suggest refresh if refresh token is still valid\n if (!refreshToken || !refreshToken.isValid() || refreshToken.isExpired()) {\n return {\n action: 'none',\n reason: 'Access token expiring but refresh token invalid'\n };\n }\n\n return {\n action: 'refresh',\n reason: 'Access token expiring soon or aged'\n };\n }\n\n return {\n action: 'none',\n reason: 'All tokens valid and not expiring soon'\n };\n }\n\n /**\n * Check tokens and take appropriate action\n * @param {object} app - App instance for events and API calls\n * @returns {Promise<boolean>} True if action was taken\n */\n async checkAndRefreshTokens(app) {\n const status = this.checkTokenStatus();\n\n switch (status.action) {\n case 'logout':\n app.events.emit(\"auth:unauthorized\");\n this.stopAutoRefresh();\n return true;\n\n case 'refresh':\n await this.refreshToken(app);\n return true;\n\n default:\n return false;\n }\n }\n\n startAutoRefresh(app) {\n this.stopAutoRefresh();\n this._tokenWatcher = setInterval(() => {\n this.checkAndRefreshTokens(app);\n }, 60000);\n }\n\n stopAutoRefresh() {\n if (this._tokenWatcher) {\n clearInterval(this._tokenWatcher);\n this._tokenWatcher = null;\n }\n }\n\n async refreshToken(app) {\n const refreshTokenInstance = this.getRefreshTokenInstance();\n\n // Double-check refresh token validity before attempting refresh\n if (!refreshTokenInstance || !refreshTokenInstance.isValid() || refreshTokenInstance.isExpired()) {\n\n app.events.emit(\"auth:unauthorized\");\n this.stopAutoRefresh();\n return;\n }\n\n try {\n\n const response = await app.rest.POST('/api/token/refresh', {\n refresh_token: refreshTokenInstance.token\n });\n\n const { access_token, refresh_token } = response.data.data;\n\n // Clear old cached instances so new tokens are loaded\n this.tokenInstance = null;\n this._refreshTokenInstance = null;\n\n // Store new tokens\n this.setTokens(access_token, refresh_token);\n app.rest.setAuthToken(access_token);\n\n // Emit success event\n app.events.emit('auth:token:refreshed', {\n newToken: access_token,\n newRefreshToken: refresh_token\n });\n\n console.log('Token refreshed successfully');\n\n } catch (error) {\n\n\n // Check if it's an authentication error (refresh token invalid)\n if (error.status === 401 || error.status === 403) {\n\n app.events.emit(\"auth:unauthorized\");\n this.stopAutoRefresh();\n } else {\n // For other errors, emit specific event but don't logout\n app.events.emit('auth:token:refresh:failed', { error });\n }\n }\n }\n}\n"],"names":[],"mappings":"AAIA,MAAM,MAAM;AAAA,EACR,YAAY,OAAO;AACf,SAAK,QAAQ;AACb,SAAK,UAAU;AACf,SAAK,MAAM;AACX,SAAK,QAAQ;AACb,SAAK,OAAO;AACZ,SAAK,MAAM;AACX,SAAK,MAAM;AACX,SAAK,eAAe;AAEpB,SAAK,QAAO;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,UAAU;AACN,QAAI,CAAC,KAAK,SAAS,OAAO,KAAK,UAAU,UAAU;AAC/C;AAAA,IACJ;AAEA,QAAI;AACA,YAAM,QAAQ,KAAK,MAAM,MAAM,GAAG;AAClC,UAAI,MAAM,WAAW,GAAG;AACpB;AAAA,MACJ;AAGA,YAAM,UAAU,MAAM,CAAC;AAGvB,UAAI,SAAS,QAAQ,QAAQ,MAAM,GAAG,EAAE,QAAQ,MAAM,GAAG;AACzD,YAAM,UAAU,IAAK,OAAO,SAAS;AACrC,UAAI,YAAY,GAAG;AACf,kBAAU,IAAI,OAAO,OAAO;AAAA,MAChC;AAEA,YAAM,UAAU,KAAK,MAAM;AAC3B,WAAK,UAAU,KAAK,MAAM,OAAO;AAGjC,WAAK,MAAM,KAAK,QAAQ,OAAO,KAAK,QAAQ,OAAO,KAAK,QAAQ,WAAW;AAC3E,WAAK,QAAQ,KAAK,QAAQ,SAAS;AACnC,WAAK,OAAO,KAAK,QAAQ,QAAQ,KAAK,QAAQ,YAAY;AAC1D,WAAK,MAAM,KAAK,QAAQ,MAAM,IAAI,KAAK,KAAK,QAAQ,MAAM,GAAI,IAAI;AAClE,WAAK,MAAM,KAAK,QAAQ,MAAM,IAAI,KAAK,KAAK,QAAQ,MAAM,GAAI,IAAI;AAGlE,WAAK,eAAe,KAAK,eAAc;AAAA,IAC3C,SAAS,OAAO;AACZ,WAAK,UAAU;AAAA,IACnB;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,iBAAiB;AACb,QAAI,CAAC,KAAK,SAAS,CAAC,KAAK,SAAS;AAC9B,aAAO;AAAA,IACX;AAGA,QAAI,KAAK,QAAQ,KAAK;AAClB,YAAM,MAAM,KAAK,MAAM,KAAK,IAAG,IAAK,GAAI;AACxC,aAAO,MAAM,KAAK,QAAQ;AAAA,IAC9B;AAGA,WAAO;AAAA,EACX;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,SAAS;AACL,WAAO,KAAK;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAY;AACR,WAAO,KAAK;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,UAAU;AACN,WAAO,KAAK;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,eAAe,mBAAmB,GAAG;AACjC,QAAI,CAAC,KAAK,SAAS,KAAK;AACpB,aAAO;AAAA,IACX;AAEA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAG,IAAK,GAAI;AACxC,UAAM,YAAY,mBAAmB;AACrC,WAAQ,KAAK,QAAQ,MAAM,OAAQ;AAAA,EACvC;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAY;AACR,QAAI,CAAC,KAAK,SAAS,KAAK;AACpB,aAAO;AAAA,IACX;AAEA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAG,IAAK,GAAI;AACxC,WAAO,OAAO,KAAK,QAAQ;AAAA,EAC/B;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,gBAAgB;AACZ,QAAI,CAAC,KAAK,SAAS,KAAK;AACpB,aAAO;AAAA,IACX;AACA,UAAM,MAAM,KAAK,MAAM,KAAK,IAAG,IAAK,GAAI;AACxC,UAAM,aAAa,MAAM,KAAK,QAAQ;AACtC,WAAO,KAAK,MAAM,aAAa,EAAE;AAAA,EACrC;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,gBAAgB;AACZ,WAAO,KAAK,QAAQ,UAAU,KAAK,KAAK,KAAK;AAAA,EACjD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,cAAc;AACV,QAAI,CAAC,KAAK,SAAS;AACf,aAAO;AAAA,IACX;AAEA,WAAO;AAAA,MACH,KAAK,KAAK;AAAA,MACV,OAAO,KAAK;AAAA,MACZ,MAAM,KAAK;AAAA,MACX,KAAK,KAAK;AAAA,MACV,KAAK,KAAK;AAAA,IACtB;AAAA,EACI;AACJ;AAOe,MAAM,aAAa;AAAA,EAC9B,cAAc;AACV,SAAK,WAAW;AAChB,SAAK,kBAAkB;AACvB,SAAK,gBAAgB;AAAA,EACzB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,UAAU,OAAO,eAAe,MAAM,aAAa,MAAM;AACrD,UAAM,UAAU,aAAa,eAAe;AAC5C,SAAK,gBAAgB,IAAI,MAAM,KAAK;AACpC,QAAI,OAAO;AACP,cAAQ,QAAQ,KAAK,UAAU,KAAK;AAAA,IACxC;AAEA,QAAI,cAAc;AACd,cAAQ,QAAQ,KAAK,iBAAiB,YAAY;AAAA,IACtD;AAAA,EACJ;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,WAAW;AACP,WAAO,aAAa,QAAQ,KAAK,QAAQ,KAClC,eAAe,QAAQ,KAAK,QAAQ;AAAA,EAC/C;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,kBAAkB;AACd,WAAO,aAAa,QAAQ,KAAK,eAAe,KACzC,eAAe,QAAQ,KAAK,eAAe;AAAA,EACtD;AAAA;AAAA;AAAA;AAAA,EAKA,cAAc;AACV,iBAAa,WAAW,KAAK,QAAQ;AACrC,iBAAa,WAAW,KAAK,eAAe;AAC5C,mBAAe,WAAW,KAAK,QAAQ;AACvC,mBAAe,WAAW,KAAK,eAAe;AAAA,EAClD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,mBAAmB;AACf,UAAM,eAAe,KAAK,SAAQ;AAGlC,QAAI,CAAC,cAAc;AACf,WAAK,gBAAgB;AACrB,aAAO;AAAA,IACX;AAGA,QAAI,CAAC,KAAK,iBAAiB,KAAK,cAAc,UAAU,cAAc;AAClE,WAAK,gBAAgB,IAAI,MAAM,YAAY;AAAA,IAC/C;AAEA,WAAO,KAAK;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,0BAA0B;AACtB,UAAM,sBAAsB,KAAK,gBAAe;AAGhD,QAAI,CAAC,qBAAqB;AACtB,WAAK,wBAAwB;AAC7B,aAAO;AAAA,IACX;AAGA,QAAI,CAAC,KAAK,yBAAyB,KAAK,sBAAsB,UAAU,qBAAqB;AACzF,WAAK,wBAAwB,IAAI,MAAM,mBAAmB;AAAA,IAC9D;AAEA,WAAO,KAAK;AAAA,EAChB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,OAAO,QAAQ,MAAM;AACjB,UAAM,MAAM,SAAS,KAAK,SAAQ;AAClC,WAAO,IAAI,MAAM,GAAG,EAAE,OAAM;AAAA,EAChC;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAY;AACR,UAAM,eAAe,KAAK,iBAAgB;AAC1C,WAAO,eAAe,aAAa,UAAS,IAAK;AAAA,EACrD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,UAAU;AACN,UAAM,eAAe,KAAK,iBAAgB;AAC1C,WAAO,eAAe,aAAa,QAAO,IAAK;AAAA,EACnD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,eAAe,mBAAmB,GAAG;AACjC,UAAM,eAAe,KAAK,iBAAgB;AAC1C,WAAO,eAAe,aAAa,eAAe,gBAAgB,IAAI;AAAA,EAC1E;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,gBAAgB;AACZ,UAAM,eAAe,KAAK,iBAAgB;AAC1C,WAAO,eAAe,aAAa,cAAa,IAAK;AAAA,EACzD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,cAAc;AACV,UAAM,eAAe,KAAK,iBAAgB;AAC1C,WAAO,eAAe,aAAa,YAAW,IAAK;AAAA,EACvD;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,mBAAmB;AACf,UAAM,QAAQ,KAAK,iBAAgB;AACnC,UAAM,eAAe,KAAK,wBAAuB;AAGjD,QAAI,CAAC,SAAS,CAAC,MAAM,QAAO,KAAM,MAAM,aAAa;AAEjD,UAAI,CAAC,gBAAgB,CAAC,aAAa,QAAO,KAAM,aAAa,aAAa;AACtE,eAAO;AAAA,UACH,QAAQ;AAAA,UACR,QAAQ;AAAA,QAC5B;AAAA,MACY;AAEA,aAAO;AAAA,QACH,QAAQ;AAAA,QACR,QAAQ;AAAA,MACxB;AAAA,IACQ;AAGA,QAAI,MAAM,eAAe,EAAE,KAAM,MAAM,cAAa,KAAM,MAAM,kBAAkB,IAAK;AAEnF,UAAI,CAAC,gBAAgB,CAAC,aAAa,QAAO,KAAM,aAAa,aAAa;AACtE,eAAO;AAAA,UACH,QAAQ;AAAA,UACR,QAAQ;AAAA,QAC5B;AAAA,MACY;AAEA,aAAO;AAAA,QACH,QAAQ;AAAA,QACR,QAAQ;AAAA,MACxB;AAAA,IACQ;AAEA,WAAO;AAAA,MACH,QAAQ;AAAA,MACR,QAAQ;AAAA,IACpB;AAAA,EACI;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAM,sBAAsB,KAAK;AAC7B,UAAM,SAAS,KAAK,iBAAgB;AAEpC,YAAQ,OAAO,QAAM;AAAA,MACjB,KAAK;AACD,YAAI,OAAO,KAAK,mBAAmB;AACnC,aAAK,gBAAe;AACpB,eAAO;AAAA,MAEX,KAAK;AACD,cAAM,KAAK,aAAa,GAAG;AAC3B,eAAO;AAAA,MAEX;AACI,eAAO;AAAA,IACvB;AAAA,EACI;AAAA,EAEA,iBAAiB,KAAK;AAClB,SAAK,gBAAe;AACpB,SAAK,gBAAgB,YAAY,MAAM;AACnC,WAAK,sBAAsB,GAAG;AAAA,IAClC,GAAG,GAAK;AAAA,EACZ;AAAA,EAEA,kBAAkB;AACd,QAAI,KAAK,eAAe;AACpB,oBAAc,KAAK,aAAa;AAChC,WAAK,gBAAgB;AAAA,IACzB;AAAA,EACJ;AAAA,EAEA,MAAM,aAAa,KAAK;AACpB,UAAM,uBAAuB,KAAK,wBAAuB;AAGzD,QAAI,CAAC,wBAAwB,CAAC,qBAAqB,QAAO,KAAM,qBAAqB,aAAa;AAE9F,UAAI,OAAO,KAAK,mBAAmB;AACnC,WAAK,gBAAe;AACpB;AAAA,IACJ;AAEA,QAAI;AAEA,YAAM,WAAW,MAAM,IAAI,KAAK,KAAK,sBAAsB;AAAA,QACvD,eAAe,qBAAqB;AAAA,MACpD,CAAa;AAED,YAAM,EAAE,cAAc,cAAa,IAAK,SAAS,KAAK;AAGtD,WAAK,gBAAgB;AACrB,WAAK,wBAAwB;AAG7B,WAAK,UAAU,cAAc,aAAa;AAC1C,UAAI,KAAK,aAAa,YAAY;AAGlC,UAAI,OAAO,KAAK,wBAAwB;AAAA,QACpC,UAAU;AAAA,QACV,iBAAiB;AAAA,MACjC,CAAa;AAED,cAAQ,IAAI,8BAA8B;AAAA,IAE9C,SAAS,OAAO;AAIZ,UAAI,MAAM,WAAW,OAAO,MAAM,WAAW,KAAK;AAE9C,YAAI,OAAO,KAAK,mBAAmB;AACnC,aAAK,gBAAe;AAAA,MACxB,OAAO;AAEH,YAAI,OAAO,KAAK,6BAA6B,EAAE,MAAK,CAAE;AAAA,MAC1D;AAAA,IACJ;AAAA,EACJ;AACJ;"}
|