webhanger 1.0.8 → 1.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/bin/cli.js CHANGED
@@ -396,11 +396,9 @@ switch (command) {
396
396
  const manifestPath = pathMod.join(pathMod.dirname(atomFile), "wh-manifest.json");
397
397
  await fsExtra.writeJson(manifestPath, manifest, { spaces: 2 });
398
398
 
399
- // Step 4: Write globalJs to a separate file to avoid template literal conflicts
399
+ // Step 4: Write globalJs to separate file
400
400
  const globalJsFile = pathMod.join(pathMod.dirname(atomFile), "wh-global.js");
401
- if (globalJs) {
402
- await fsExtra.writeFile(globalJsFile, globalJs, "utf-8");
403
- }
401
+ if (globalJs) await fsExtra.writeFile(globalJsFile, globalJs, "utf-8");
404
402
 
405
403
  // Step 5: Generate production-ready CDN-powered HTML
406
404
  const mounts = components.map(c => ` <wh-component name="${c.name}"></wh-component>`).join("\n");
@@ -411,15 +409,24 @@ switch (command) {
411
409
  <meta name="viewport" content="width=device-width, initial-scale=1.0">
412
410
  <title>WebHanger</title>
413
411
  ${cdnAssets.filter(a => a.type === "style").map(a => `<link rel="stylesheet" href="${a.url}">`).join("\n ")}
412
+ <script src="https://unpkg.com/webhanger-front@latest/browser.min.js"></script>
414
413
  </head>
415
414
  <body>
416
415
  ${mounts}
417
416
  ${cdnAssets.filter(a => a.type === "script").map(a => `<script src="${a.url}"></script>`).join("\n ")}
418
- <script src="https://unpkg.com/webhanger-front@latest/browser.min.js"></script>
419
417
  <script>
418
+ var totalComponents = document.querySelectorAll("wh-component").length;
419
+ var mountedCount = 0;
420
+ WebHangerFront.on("afterMount", function() {
421
+ mountedCount++;
422
+ if (mountedCount >= totalComponents && !window.__whGlobalRan) {
423
+ window.__whGlobalRan = true;
424
+ ${globalJs ? `var s = document.createElement("script"); s.src = "./wh-global.js"; document.body.appendChild(s);` : ""}
425
+ }
426
+ });
420
427
  WebHangerFront.initialize("./wh-manifest.json");
421
428
  </script>
422
- ${globalJs ? `<script src="./wh-global.js"></script>` : ""}
429
+ ${globalJs ? "" : ""}
423
430
  </body>
424
431
  </html>`;
425
432
 
@@ -453,6 +460,259 @@ ${mounts}
453
460
  }
454
461
  break;
455
462
  }
463
+ case "personalize": {
464
+ const { default: fsExtra } = await import("fs-extra");
465
+ const { default: pathMod } = await import("path");
466
+
467
+ const subCmd = args[1];
468
+
469
+ if (subCmd === "init") {
470
+ // Scaffold a wh-personalization.json
471
+ const example = {
472
+ hero: {
473
+ rules: [
474
+ { if: { country: "IN" }, component: "hero-india" },
475
+ { if: { country: "US" }, component: "hero-us" },
476
+ { if: { device: "mobile" }, component: "hero-mobile" },
477
+ { if: { role: "premium" }, component: "hero-premium" },
478
+ { if: { abTest: "variant-b" }, component: "hero-b" }
479
+ ],
480
+ default: "hero"
481
+ },
482
+ navbar: {
483
+ rules: [
484
+ { if: { role: "admin" }, component: "navbar-admin" },
485
+ { if: { plan: "premium" }, component: "navbar-premium" }
486
+ ],
487
+ default: "navbar"
488
+ }
489
+ };
490
+ const dest = pathMod.join(process.cwd(), "wh-personalization.json");
491
+ await fsExtra.writeJson(dest, example, { spaces: 2 });
492
+ console.log(chalk.green("\nāœ… wh-personalization.json created"));
493
+ console.log(chalk.gray(" Edit the rules to match your use case."));
494
+ console.log(chalk.gray(" Supported conditions: country, device, role, abTest, lang, hour, plan\n"));
495
+
496
+ } else if (subCmd === "test") {
497
+ // Test rule resolution against current context
498
+ const { resolveAll } = await import("../helper/personalization.js");
499
+ const configPath = args[2] || "./wh-personalization.json";
500
+ if (!fsExtra.existsSync(configPath)) {
501
+ console.log(chalk.red(`${configPath} not found. Run: wh personalize init`));
502
+ process.exit(1);
503
+ }
504
+ const config = await fsExtra.readJson(configPath);
505
+ const country = args[3] || "US";
506
+ const device = args[4] || "desktop";
507
+ const role = args[5] || null;
508
+
509
+ const { resolved, ctx } = resolveAll(config, { country, device, role });
510
+
511
+ console.log(chalk.cyan("\nšŸŽÆ Personalization Resolution\n"));
512
+ console.log(chalk.white("Context:"));
513
+ console.log(chalk.gray(` country : ${ctx.country || "—"}`));
514
+ console.log(chalk.gray(` device : ${ctx.device}`));
515
+ console.log(chalk.gray(` role : ${ctx.role || "—"}`));
516
+ console.log(chalk.gray(` abTest : ${ctx.abTest}`));
517
+ console.log(chalk.gray(` lang : ${ctx.lang}`));
518
+ console.log(chalk.gray(` plan : ${ctx.plan}`));
519
+ console.log(chalk.white("\nResolved components:"));
520
+ for (const [slot, comp] of Object.entries(resolved)) {
521
+ console.log(chalk.gray(` ${slot.padEnd(15)} → ${comp}`));
522
+ }
523
+ console.log();
524
+
525
+ } else {
526
+ console.log(chalk.white("wh personalize commands:"));
527
+ console.log(chalk.gray(" wh personalize init — scaffold wh-personalization.json"));
528
+ console.log(chalk.gray(" wh personalize test [config] [country] [device] [role] — test rule resolution"));
529
+ }
530
+ break;
531
+ }
532
+ case "auth": {
533
+ const authSubCmd = args[1];
534
+
535
+ if (authSubCmd === "init") {
536
+ // ── wh auth init ──────────────────────────────────────────────────
537
+ console.log(chalk.cyan("\nšŸ” WebHanger Auth Setup\n"));
538
+
539
+ const { loadAuthConfig: _l, saveAuthConfig, generateSessionSecret, buildCallbackUrl, PROVIDERS } = await import("../helper/authConfig.js");
540
+
541
+ const providerChoices = [
542
+ { name: "Google", value: "google", checked: true },
543
+ { name: "GitHub", value: "github", checked: true },
544
+ { name: "Facebook", value: "facebook", checked: false }
545
+ ];
546
+
547
+ const answers = await inquirer.prompt([
548
+ {
549
+ type: "checkbox",
550
+ name: "providers",
551
+ message: "Select OAuth providers:",
552
+ choices: providerChoices,
553
+ validate: v => v.length > 0 || "Select at least one provider"
554
+ },
555
+ {
556
+ type: "input",
557
+ name: "baseUrl",
558
+ message: "Your app base URL (e.g. https://myapp.com):",
559
+ validate: v => v.startsWith("http") || "Must be a valid URL"
560
+ },
561
+ {
562
+ type: "input",
563
+ name: "callbackPath",
564
+ message: "OAuth callback path:",
565
+ default: "/auth/callback"
566
+ },
567
+ {
568
+ type: "input",
569
+ name: "port",
570
+ message: "Auth server port:",
571
+ default: "3001"
572
+ }
573
+ ]);
574
+
575
+ const config = {
576
+ baseUrl: answers.baseUrl.replace(/\/$/, ""),
577
+ callbackPath: answers.callbackPath,
578
+ port: parseInt(answers.port),
579
+ providers: {},
580
+ session: {
581
+ secret: generateSessionSecret(),
582
+ expiresIn: "7d"
583
+ }
584
+ };
585
+
586
+ // Collect credentials per provider
587
+ for (const provider of answers.providers) {
588
+ console.log(chalk.cyan(`\nāš™ļø Configure ${provider.charAt(0).toUpperCase() + provider.slice(1)}`));
589
+ const cbUrl = buildCallbackUrl(answers.baseUrl, answers.callbackPath, provider, answers.port);
590
+ console.log(chalk.gray(` Callback URL: ${cbUrl}`));
591
+
592
+ const links = {
593
+ google: "https://console.cloud.google.com/apis/credentials",
594
+ github: "https://github.com/settings/developers",
595
+ facebook: "https://developers.facebook.com/apps"
596
+ };
597
+ console.log(chalk.gray(` Create app at: ${links[provider]}\n`));
598
+
599
+ const creds = await inquirer.prompt([
600
+ { type: "input", name: "clientId", message: `${provider} Client ID:` },
601
+ { type: "password", name: "clientSecret", message: `${provider} Client Secret:` }
602
+ ]);
603
+
604
+ config.providers[provider] = {
605
+ clientId: creds.clientId,
606
+ clientSecret: creds.clientSecret,
607
+ scopes: PROVIDERS[provider].scopes,
608
+ callbackUrl: cbUrl
609
+ };
610
+ }
611
+
612
+ const dest = await saveAuthConfig(config);
613
+ console.log(chalk.green(`\nāœ… wh-auth.config.json created`));
614
+ console.log(chalk.white("\nšŸ“‹ Add these callback URLs to your OAuth apps:"));
615
+ for (const [p, c] of Object.entries(config.providers)) {
616
+ console.log(chalk.gray(` ${p.padEnd(10)} → ${c.callbackUrl}`));
617
+ }
618
+ console.log(chalk.cyan(`\nā–¶ Start auth server: wh auth serve\n`));
619
+
620
+ } else if (authSubCmd === "serve") {
621
+ // ── wh auth serve ─────────────────────────────────────────────────
622
+ const { loadAuthConfig } = await import("../helper/authConfig.js");
623
+ const { buildAuthUrl, exchangeCode, fetchProfile, issueJWT, generateState } = await import("../helper/oauthHandler.js");
624
+ const http = await import("http");
625
+
626
+ const authConfig = loadAuthConfig();
627
+ const PORT = args[2] ? parseInt(args[2]) : authConfig.port || 3001;
628
+ const states = new Map(); // CSRF state store
629
+
630
+ const server = http.default.createServer(async (req, res) => {
631
+ const url = new URL(req.url, `http://localhost:${PORT}`);
632
+ const p = url.pathname;
633
+
634
+ // ── Initiate OAuth ────────────────────────────────────────────
635
+ const initMatch = p.match(/^\/auth\/([a-z]+)$/);
636
+ if (initMatch) {
637
+ const provider = initMatch[1];
638
+ if (!authConfig.providers[provider]) { res.writeHead(404); res.end("Provider not configured"); return; }
639
+ const state = generateState();
640
+ states.set(state, { provider, ts: Date.now() });
641
+ const authUrl = buildAuthUrl(provider, authConfig, state);
642
+ res.writeHead(302, { Location: authUrl });
643
+ res.end(); return;
644
+ }
645
+
646
+ // ── OAuth callback ────────────────────────────────────────────
647
+ const cbMatch = p.match(/^\/auth\/callback\/([a-z]+)$/);
648
+ if (cbMatch) {
649
+ const provider = cbMatch[1];
650
+ const code = url.searchParams.get("code");
651
+ const state = url.searchParams.get("state");
652
+
653
+ if (!states.has(state)) { res.writeHead(400); res.end("Invalid state"); return; }
654
+ states.delete(state);
655
+
656
+ try {
657
+ const accessToken = await exchangeCode(provider, code, authConfig);
658
+ const user = await fetchProfile(provider, accessToken);
659
+ const jwt = issueJWT(user, authConfig.session.secret, authConfig.session.expiresIn);
660
+
661
+ // Return HTML that posts token back to opener or redirects
662
+ res.writeHead(200, { "Content-Type": "text/html" });
663
+ res.end(`<!DOCTYPE html><html><body><script>
664
+ var user = ${JSON.stringify(user)};
665
+ var token = "${jwt}";
666
+ localStorage.setItem("wh_auth_token", token);
667
+ localStorage.setItem("wh_auth_user", JSON.stringify(user));
668
+ if (window.opener) {
669
+ window.opener.postMessage({ type: "WH_AUTH_SUCCESS", user, token }, "*");
670
+ window.close();
671
+ } else {
672
+ var redirect = sessionStorage.getItem("wh_auth_redirect") || "/";
673
+ window.location.href = redirect.replace("{{email}}", encodeURIComponent(user.email)).replace("{{name}}", encodeURIComponent(user.name));
674
+ }
675
+ </script></body></html>`);
676
+ } catch (err) {
677
+ res.writeHead(200, { "Content-Type": "text/html" });
678
+ res.end(`<!DOCTYPE html><html><body><script>
679
+ if (window.opener) {
680
+ window.opener.postMessage({ type: "WH_AUTH_ERROR", message: "${err.message}" }, "*");
681
+ window.close();
682
+ } else { document.body.innerText = "Auth error: ${err.message}"; }
683
+ </script></body></html>`);
684
+ }
685
+ return;
686
+ }
687
+
688
+ // ── Health check ──────────────────────────────────────────────
689
+ if (p === "/health") {
690
+ res.writeHead(200, { "Content-Type": "application/json", "Access-Control-Allow-Origin": "*" });
691
+ res.end(JSON.stringify({ ok: true, providers: Object.keys(authConfig.providers) }));
692
+ return;
693
+ }
694
+
695
+ res.writeHead(404); res.end("Not found");
696
+ });
697
+
698
+ server.listen(PORT, () => {
699
+ console.log(chalk.cyan(`\nšŸ” WebHanger Auth Server\n`));
700
+ console.log(chalk.white(` Listening : http://localhost:${PORT}`));
701
+ console.log(chalk.gray(` Providers : ${Object.keys(authConfig.providers).join(", ")}`));
702
+ console.log(chalk.gray(`\n OAuth URLs:`));
703
+ for (const provider of Object.keys(authConfig.providers)) {
704
+ console.log(chalk.gray(` http://localhost:${PORT}/auth/${provider}`));
705
+ }
706
+ console.log();
707
+ });
708
+
709
+ } else {
710
+ console.log(chalk.white("wh auth commands:"));
711
+ console.log(chalk.gray(" wh auth init — setup OAuth providers"));
712
+ console.log(chalk.gray(" wh auth serve [port] — start OAuth callback server"));
713
+ }
714
+ break;
715
+ }
456
716
  case "access": {
457
717
  const subCmd = args[1]; // grant | revoke | list
458
718
  const loadConfigFn = (await import("../helper/loadConfig.js")).default;
@@ -0,0 +1,68 @@
1
+ import fs from "fs-extra";
2
+ import path from "path";
3
+ import crypto from "crypto";
4
+
5
+ const CONFIG_FILE = "wh-auth.config.json";
6
+
7
+ export const PROVIDERS = {
8
+ google: {
9
+ authUrl: "https://accounts.google.com/o/oauth2/v2/auth",
10
+ tokenUrl: "https://oauth2.googleapis.com/token",
11
+ profileUrl: "https://www.googleapis.com/oauth2/v2/userinfo",
12
+ scopes: ["openid", "email", "profile"],
13
+ fields: ["id", "email", "name", "picture"]
14
+ },
15
+ github: {
16
+ authUrl: "https://github.com/login/oauth/authorize",
17
+ tokenUrl: "https://github.com/login/oauth/access_token",
18
+ profileUrl: "https://api.github.com/user",
19
+ emailUrl: "https://api.github.com/user/emails",
20
+ scopes: ["user:email", "read:user"],
21
+ fields: ["id", "email", "name", "avatar_url", "login"]
22
+ },
23
+ facebook: {
24
+ authUrl: "https://www.facebook.com/v18.0/dialog/oauth",
25
+ tokenUrl: "https://graph.facebook.com/v18.0/oauth/access_token",
26
+ profileUrl: "https://graph.facebook.com/me",
27
+ scopes: ["email", "public_profile"],
28
+ fields: ["id", "email", "name", "picture"]
29
+ }
30
+ };
31
+
32
+ export function loadAuthConfig(configPath = null) {
33
+ const candidates = [
34
+ configPath,
35
+ path.join(process.cwd(), CONFIG_FILE),
36
+ ].filter(Boolean);
37
+
38
+ for (const c of candidates) {
39
+ if (fs.existsSync(c)) return fs.readJsonSync(c);
40
+ }
41
+ throw new Error(`${CONFIG_FILE} not found. Run: wh auth init`);
42
+ }
43
+
44
+ export async function saveAuthConfig(config, configPath = null) {
45
+ const dest = configPath || path.join(process.cwd(), CONFIG_FILE);
46
+ await fs.writeJson(dest, config, { spaces: 2 });
47
+ return dest;
48
+ }
49
+
50
+ export function generateSessionSecret() {
51
+ return crypto.randomBytes(32).toString("hex");
52
+ }
53
+
54
+ export function buildCallbackUrl(baseUrl, callbackPath, provider, port = null) {
55
+ let base = baseUrl.replace(/\/$/, "");
56
+
57
+ // If port is provided and not already in the URL, inject it
58
+ if (port) {
59
+ try {
60
+ const u = new URL(base);
61
+ if (!u.port) u.port = String(port);
62
+ base = u.origin;
63
+ } catch (_) {}
64
+ }
65
+
66
+ const cb = callbackPath.replace(/\/$/, "");
67
+ return `${base}${cb}/${provider}`;
68
+ }
package/helper/bundler.js CHANGED
@@ -49,13 +49,14 @@ export async function bundle(componentDir, projectId) {
49
49
  const encryptChunk = (content, salt) => encrypt(content, projectId, salt);
50
50
 
51
51
  const payload = {
52
- v: 2, // version 2 = AES encrypted
52
+ v: 2,
53
53
  h: encryptChunk(html, "::html"),
54
54
  c: encryptChunk(css, "::css"),
55
55
  j: encryptChunk(js, "::js"),
56
56
  assets: meta.assets || [],
57
57
  dependencies: meta.dependencies || [],
58
- integrity: integrityHash(html + css + js) // tamper detection
58
+ props: meta.props || {},
59
+ integrity: integrityHash(html + css + js)
59
60
  };
60
61
 
61
62
  return JSON.stringify(payload);
@@ -31,10 +31,17 @@ function getFirestore(serviceAccountPath) {
31
31
 
32
32
  async function firebaseRegister(db, projectId, meta) {
33
33
  const { name, version, cdnUrl, token, expires, dependencies = [] } = meta;
34
- await db
35
- .collection("projects").doc(projectId)
36
- .collection("components").doc(name)
37
- .collection("versions").doc(version)
34
+
35
+ // Ensure parent project document exists (required for Firestore queries)
36
+ const projectRef = db.collection("projects").doc(projectId);
37
+ await projectRef.set({ projectId, updatedAt: admin.firestore.FieldValue.serverTimestamp() }, { merge: true });
38
+
39
+ // Ensure component document exists
40
+ const compRef = projectRef.collection("components").doc(name);
41
+ await compRef.set({ name, updatedAt: admin.firestore.FieldValue.serverTimestamp() }, { merge: true });
42
+
43
+ // Write version
44
+ await compRef.collection("versions").doc(version)
38
45
  .set({ name, version, cdnUrl, token, expires, dependencies, createdAt: admin.firestore.FieldValue.serverTimestamp() });
39
46
  }
40
47
 
@@ -0,0 +1,149 @@
1
+ import crypto from "crypto";
2
+ import { PROVIDERS } from "./authConfig.js";
3
+
4
+ /**
5
+ * Build the OAuth redirect URL for a provider.
6
+ */
7
+ export function buildAuthUrl(provider, config, state) {
8
+ const p = PROVIDERS[provider];
9
+ const providerConfig = config.providers[provider];
10
+ if (!p || !providerConfig) throw new Error(`Provider "${provider}" not configured.`);
11
+
12
+ const params = new URLSearchParams({
13
+ client_id: providerConfig.clientId,
14
+ redirect_uri: providerConfig.callbackUrl,
15
+ response_type: "code",
16
+ scope: p.scopes.join(" "),
17
+ state
18
+ });
19
+
20
+ if (provider === "google") params.set("access_type", "offline");
21
+
22
+ return `${p.authUrl}?${params.toString()}`;
23
+ }
24
+
25
+ /**
26
+ * Exchange authorization code for access token.
27
+ */
28
+ export async function exchangeCode(provider, code, config) {
29
+ const p = PROVIDERS[provider];
30
+ const providerConfig = config.providers[provider];
31
+
32
+ const body = new URLSearchParams({
33
+ client_id: providerConfig.clientId,
34
+ client_secret: providerConfig.clientSecret,
35
+ code,
36
+ redirect_uri: providerConfig.callbackUrl,
37
+ grant_type: "authorization_code"
38
+ });
39
+
40
+ const res = await fetch(p.tokenUrl, {
41
+ method: "POST",
42
+ headers: { "Content-Type": "application/x-www-form-urlencoded", "Accept": "application/json" },
43
+ body: body.toString()
44
+ });
45
+
46
+ const data = await res.json();
47
+ if (data.error) throw new Error(`Token exchange failed: ${data.error_description || data.error}`);
48
+ return data.access_token;
49
+ }
50
+
51
+ /**
52
+ * Fetch user profile from provider.
53
+ */
54
+ export async function fetchProfile(provider, accessToken) {
55
+ const p = PROVIDERS[provider];
56
+
57
+ const res = await fetch(
58
+ provider === "facebook"
59
+ ? `${p.profileUrl}?fields=${p.fields.join(",")}&access_token=${accessToken}`
60
+ : p.profileUrl,
61
+ { headers: { Authorization: `Bearer ${accessToken}`, "User-Agent": "WebHanger-Auth/1.0" } }
62
+ );
63
+
64
+ const profile = await res.json();
65
+
66
+ // GitHub: email may need separate request
67
+ if (provider === "github" && !profile.email) {
68
+ const emailRes = await fetch(p.emailUrl, {
69
+ headers: { Authorization: `Bearer ${accessToken}`, "User-Agent": "WebHanger-Auth/1.0" }
70
+ });
71
+ const emails = await emailRes.json();
72
+ const primary = emails.find(e => e.primary && e.verified);
73
+ if (primary) profile.email = primary.email;
74
+ }
75
+
76
+ // Normalize profile across providers
77
+ return normalizeProfile(provider, profile);
78
+ }
79
+
80
+ function normalizeProfile(provider, raw) {
81
+ switch (provider) {
82
+ case "google":
83
+ return {
84
+ id: raw.id,
85
+ email: raw.email,
86
+ name: raw.name,
87
+ avatar: raw.picture,
88
+ provider: "google"
89
+ };
90
+ case "github":
91
+ return {
92
+ id: String(raw.id),
93
+ email: raw.email || "",
94
+ name: raw.name || raw.login,
95
+ avatar: raw.avatar_url,
96
+ username: raw.login,
97
+ provider: "github"
98
+ };
99
+ case "facebook":
100
+ return {
101
+ id: raw.id,
102
+ email: raw.email || "",
103
+ name: raw.name,
104
+ avatar: raw.picture?.data?.url || "",
105
+ provider: "facebook"
106
+ };
107
+ default:
108
+ return { ...raw, provider };
109
+ }
110
+ }
111
+
112
+ /**
113
+ * Issue a signed JWT for the user.
114
+ */
115
+ export function issueJWT(user, sessionSecret, expiresIn = "7d") {
116
+ const header = btoa(JSON.stringify({ alg: "HS256", typ: "JWT" }));
117
+ const exp = Math.floor(Date.now() / 1000) + parseDuration(expiresIn);
118
+ const payload = btoa(JSON.stringify({ ...user, exp, iat: Math.floor(Date.now() / 1000) }));
119
+ const sig = crypto.createHmac("sha256", sessionSecret)
120
+ .update(`${header}.${payload}`).digest("base64url");
121
+ return `${header}.${payload}.${sig}`;
122
+ }
123
+
124
+ /**
125
+ * Verify and decode a JWT.
126
+ */
127
+ export function verifyJWT(token, sessionSecret) {
128
+ const [header, payload, sig] = token.split(".");
129
+ const expected = crypto.createHmac("sha256", sessionSecret)
130
+ .update(`${header}.${payload}`).digest("base64url");
131
+ if (sig !== expected) throw new Error("Invalid token signature.");
132
+ const data = JSON.parse(Buffer.from(payload, "base64").toString("utf-8"));
133
+ if (data.exp && Date.now() / 1000 > data.exp) throw new Error("Token expired.");
134
+ return data;
135
+ }
136
+
137
+ function parseDuration(str) {
138
+ const units = { s: 1, m: 60, h: 3600, d: 86400 };
139
+ const match = str.match(/^(\d+)([smhd])$/);
140
+ if (!match) return 604800; // default 7d
141
+ return parseInt(match[1]) * (units[match[2]] || 1);
142
+ }
143
+
144
+ /**
145
+ * Generate a random state token for CSRF protection.
146
+ */
147
+ export function generateState() {
148
+ return crypto.randomBytes(16).toString("hex");
149
+ }