zudoku 0.23.2 → 0.23.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. package/dist/config/validators/common.d.ts +45 -11
  2. package/dist/config/validators/common.js +2 -1
  3. package/dist/config/validators/common.js.map +1 -1
  4. package/dist/config/validators/validate.d.ts +19 -5
  5. package/dist/lib/authentication/providers/openid.d.ts +7 -0
  6. package/dist/lib/authentication/providers/openid.js +1 -0
  7. package/dist/lib/authentication/providers/openid.js.map +1 -1
  8. package/dist/lib/plugins/api-catalog/Catalog.d.ts +2 -6
  9. package/dist/lib/plugins/api-catalog/Catalog.js +22 -15
  10. package/dist/lib/plugins/api-catalog/Catalog.js.map +1 -1
  11. package/dist/lib/plugins/api-catalog/index.d.ts +8 -1
  12. package/dist/lib/plugins/api-catalog/index.js +2 -2
  13. package/dist/lib/plugins/api-catalog/index.js.map +1 -1
  14. package/dist/lib/plugins/search-inkeep/index.js +21 -7
  15. package/dist/lib/plugins/search-inkeep/index.js.map +1 -1
  16. package/dist/vite/plugin-api.js +12 -7
  17. package/dist/vite/plugin-api.js.map +1 -1
  18. package/lib/{AuthenticationPlugin-DQy635W9.js → AuthenticationPlugin-fB7viE7A.js} +2 -2
  19. package/lib/{AuthenticationPlugin-DQy635W9.js.map → AuthenticationPlugin-fB7viE7A.js.map} +1 -1
  20. package/lib/{MdxPage-CBa4X6L5.js → MdxPage-CPBw4_lf.js} +18 -18
  21. package/lib/{MdxPage-CBa4X6L5.js.map → MdxPage-CPBw4_lf.js.map} +1 -1
  22. package/lib/OperationList-C7ac3kR5.js +5014 -0
  23. package/lib/OperationList-C7ac3kR5.js.map +1 -0
  24. package/lib/{Select-Bb_Hqc70.js → Select-D3XuKKuH.js} +3 -3
  25. package/lib/{Select-Bb_Hqc70.js.map → Select-D3XuKKuH.js.map} +1 -1
  26. package/lib/assets/{worker-BmEAZjUP.js → worker-D2kRl-cG.js} +1487 -1436
  27. package/lib/assets/worker-D2kRl-cG.js.map +1 -0
  28. package/lib/cn-qaFjX9_3.js.map +1 -1
  29. package/lib/{createServer-BVFp6Bl3.js → createServer-69sLlmQA.js} +1968 -1917
  30. package/lib/createServer-69sLlmQA.js.map +1 -0
  31. package/lib/{hook-DMHiUaIV.js → hook-DgGeo5iL.js} +2 -2
  32. package/lib/{hook-DMHiUaIV.js.map → hook-DgGeo5iL.js.map} +1 -1
  33. package/lib/{index-B6rTMjdI.js → index-C8ubT49C.js} +6 -6
  34. package/lib/{index-B6rTMjdI.js.map → index-C8ubT49C.js.map} +1 -1
  35. package/lib/{utils-R0j3Raw1.js → utils-B4O1uet5.js} +8 -8
  36. package/lib/{utils-R0j3Raw1.js.map → utils-B4O1uet5.js.map} +1 -1
  37. package/lib/zudoku.auth-clerk.js +1 -1
  38. package/lib/zudoku.auth-openid.js +70 -69
  39. package/lib/zudoku.auth-openid.js.map +1 -1
  40. package/lib/zudoku.components.js +2 -2
  41. package/lib/zudoku.openapi-worker.js +1 -1
  42. package/lib/zudoku.plugin-api-catalog.js +80 -78
  43. package/lib/zudoku.plugin-api-catalog.js.map +1 -1
  44. package/lib/zudoku.plugin-api-keys.js +3 -3
  45. package/lib/zudoku.plugin-markdown.js +1 -1
  46. package/lib/zudoku.plugin-openapi.js +3 -3
  47. package/lib/zudoku.plugin-search-inkeep.js +34 -26
  48. package/lib/zudoku.plugin-search-inkeep.js.map +1 -1
  49. package/package.json +8 -8
  50. package/src/lib/authentication/providers/openid.tsx +5 -3
  51. package/src/lib/plugins/api-catalog/Catalog.tsx +59 -60
  52. package/src/lib/plugins/api-catalog/index.tsx +14 -0
  53. package/src/lib/plugins/search-inkeep/index.tsx +27 -8
  54. package/lib/OperationList-Bj-6EKhp.js +0 -4889
  55. package/lib/OperationList-Bj-6EKhp.js.map +0 -1
  56. package/lib/assets/worker-BmEAZjUP.js.map +0 -1
  57. package/lib/createServer-BVFp6Bl3.js.map +0 -1
@@ -1,10 +1,10 @@
1
1
  var je = Object.defineProperty;
2
2
  var Je = (t, e, n) => e in t ? je(t, e, { enumerable: !0, configurable: !0, writable: !0, value: n }) : t[e] = n;
3
- var b = (t, e, n) => Je(t, typeof e != "symbol" ? e + "" : e, n);
3
+ var _ = (t, e, n) => Je(t, typeof e != "symbol" ? e + "" : e, n);
4
4
  import { j as we } from "./jsx-runtime-Dx-03ztt.js";
5
5
  import { g as Oe } from "./_commonjsHelpers-BkfeUUK-.js";
6
- import { A as ze } from "./AuthenticationPlugin-DQy635W9.js";
7
- import { g as De } from "./utils-R0j3Raw1.js";
6
+ import { A as ze } from "./AuthenticationPlugin-fB7viE7A.js";
7
+ import { u as De } from "./utils-B4O1uet5.js";
8
8
  import { N as Ne } from "./chunk-D52XG6IA-Dl7HLe6j.js";
9
9
  import { Z as Ke } from "./invariant-Caa8-XvF.js";
10
10
  import { u as L } from "./state-CFQsUZUP.js";
@@ -22,8 +22,8 @@ function He() {
22
22
  "warn",
23
23
  "error"
24
24
  ], r = {}, i = null;
25
- function c(l, g) {
26
- var u = l[g];
25
+ function c(l, m) {
26
+ var u = l[m];
27
27
  if (typeof u.bind == "function")
28
28
  return u.bind(l);
29
29
  try {
@@ -37,13 +37,13 @@ function He() {
37
37
  function p() {
38
38
  console.log && (console.log.apply ? console.log.apply(console, arguments) : Function.prototype.apply.apply(console.log, [console, arguments])), console.trace && console.trace();
39
39
  }
40
- function _(l) {
40
+ function b(l) {
41
41
  return l === "debug" && (l = "log"), typeof console === n ? !1 : l === "trace" && o ? p : console[l] !== void 0 ? c(console, l) : console.log !== void 0 ? c(console, "log") : e;
42
42
  }
43
43
  function f() {
44
- for (var l = this.getLevel(), g = 0; g < a.length; g++) {
45
- var u = a[g];
46
- this[u] = g < l ? e : this.methodFactory(u, l, this.name);
44
+ for (var l = this.getLevel(), m = 0; m < a.length; m++) {
45
+ var u = a[m];
46
+ this[u] = m < l ? e : this.methodFactory(u, l, this.name);
47
47
  }
48
48
  if (this.log = this.debug, typeof console === n && l < this.levels.SILENT)
49
49
  return "No console available for logging";
@@ -53,22 +53,22 @@ function He() {
53
53
  typeof console !== n && (f.call(this), this[l].apply(this, arguments));
54
54
  };
55
55
  }
56
- function T(l, g, u) {
57
- return _(l) || y.apply(this, arguments);
56
+ function T(l, m, u) {
57
+ return b(l) || y.apply(this, arguments);
58
58
  }
59
- function h(l, g) {
59
+ function h(l, m) {
60
60
  var u = this, O, M, R, v = "loglevel";
61
61
  typeof l == "string" ? v += ":" + l : typeof l == "symbol" && (v = void 0);
62
62
  function xe(d) {
63
- var m = (a[d] || "silent").toUpperCase();
63
+ var g = (a[d] || "silent").toUpperCase();
64
64
  if (!(typeof window === n || !v)) {
65
65
  try {
66
- window.localStorage[v] = m;
66
+ window.localStorage[v] = g;
67
67
  return;
68
68
  } catch {
69
69
  }
70
70
  try {
71
- window.document.cookie = encodeURIComponent(v) + "=" + m + ";";
71
+ window.document.cookie = encodeURIComponent(v) + "=" + g + ";";
72
72
  } catch {
73
73
  }
74
74
  }
@@ -82,9 +82,9 @@ function He() {
82
82
  }
83
83
  if (typeof d === n)
84
84
  try {
85
- var m = window.document.cookie, z = encodeURIComponent(v), oe = m.indexOf(z + "=");
85
+ var g = window.document.cookie, z = encodeURIComponent(v), oe = g.indexOf(z + "=");
86
86
  oe !== -1 && (d = /^([^;]+)/.exec(
87
- m.slice(oe + z.length + 1)
87
+ g.slice(oe + z.length + 1)
88
88
  )[1]);
89
89
  } catch {
90
90
  }
@@ -104,9 +104,9 @@ function He() {
104
104
  }
105
105
  }
106
106
  function U(d) {
107
- var m = d;
108
- if (typeof m == "string" && u.levels[m.toUpperCase()] !== void 0 && (m = u.levels[m.toUpperCase()]), typeof m == "number" && m >= 0 && m <= u.levels.SILENT)
109
- return m;
107
+ var g = d;
108
+ if (typeof g == "string" && u.levels[g.toUpperCase()] !== void 0 && (g = u.levels[g.toUpperCase()]), typeof g == "number" && g >= 0 && g <= u.levels.SILENT)
109
+ return g;
110
110
  throw new TypeError("log.setLevel() called with invalid level: " + d);
111
111
  }
112
112
  u.name = l, u.levels = {
@@ -116,10 +116,10 @@ function He() {
116
116
  WARN: 3,
117
117
  ERROR: 4,
118
118
  SILENT: 5
119
- }, u.methodFactory = g || T, u.getLevel = function() {
119
+ }, u.methodFactory = m || T, u.getLevel = function() {
120
120
  return R ?? M ?? O;
121
- }, u.setLevel = function(d, m) {
122
- return R = U(d), m !== !1 && xe(R), f.call(u);
121
+ }, u.setLevel = function(d, g) {
122
+ return R = U(d), g !== !1 && xe(R), f.call(u);
123
123
  }, u.setDefaultLevel = function(d) {
124
124
  M = U(d), ne() || u.setLevel(d, !1);
125
125
  }, u.resetLevel = function() {
@@ -138,12 +138,12 @@ function He() {
138
138
  var re = ne();
139
139
  re != null && (R = U(re)), f.call(u);
140
140
  }
141
- i = new h(), i.getLogger = function(g) {
142
- if (typeof g != "symbol" && typeof g != "string" || g === "")
141
+ i = new h(), i.getLogger = function(m) {
142
+ if (typeof m != "symbol" && typeof m != "string" || m === "")
143
143
  throw new TypeError("You must supply a name when creating a logger.");
144
- var u = r[g];
145
- return u || (u = r[g] = new h(
146
- g,
144
+ var u = r[m];
145
+ return u || (u = r[m] = new h(
146
+ m,
147
147
  i.methodFactory
148
148
  )), u;
149
149
  };
@@ -170,7 +170,7 @@ function Y(t, e) {
170
170
  return !1;
171
171
  }
172
172
  }
173
- const W = Symbol(), Fe = Symbol(), Q = Symbol(), ge = Symbol(), Me = Symbol(), qe = Symbol(), Be = new TextEncoder(), Ve = new TextDecoder();
173
+ const W = Symbol(), Fe = Symbol(), Q = Symbol(), me = Symbol(), Me = Symbol(), qe = Symbol(), Be = new TextEncoder(), Ve = new TextDecoder();
174
174
  function E(t) {
175
175
  return typeof t == "string" ? Be.encode(t) : Ve.decode(t);
176
176
  }
@@ -231,11 +231,11 @@ class Qe extends Error {
231
231
  super(e, n), this.name = this.constructor.name, (o = Error.captureStackTrace) == null || o.call(Error, this, this.constructor);
232
232
  }
233
233
  }
234
- const s = Qe, me = new Ye(100);
234
+ const s = Qe, ge = new Ye(100);
235
235
  function ye(t) {
236
236
  return t instanceof CryptoKey;
237
237
  }
238
- function be(t) {
238
+ function _e(t) {
239
239
  return ye(t) && t.type === "private";
240
240
  }
241
241
  function Xe(t) {
@@ -244,7 +244,7 @@ function Xe(t) {
244
244
  function X(t) {
245
245
  try {
246
246
  const e = t.headers.get("dpop-nonce");
247
- e && me.set(new URL(t.url).origin, e);
247
+ e && ge.set(new URL(t.url).origin, e);
248
248
  } catch {
249
249
  }
250
250
  return t;
@@ -340,7 +340,7 @@ function it(t) {
340
340
  return {
341
341
  key: t.key,
342
342
  kid: t.kid,
343
- modifyAssertion: t[ge]
343
+ modifyAssertion: t[me]
344
344
  };
345
345
  }
346
346
  function ce(t) {
@@ -386,7 +386,7 @@ function ut(t) {
386
386
  throw new S("unsupported EcKeyAlgorithm namedCurve");
387
387
  }
388
388
  }
389
- function _e(t) {
389
+ function be(t) {
390
390
  switch (t.algorithm.name) {
391
391
  case "RSA-PSS":
392
392
  return st(t);
@@ -425,7 +425,7 @@ function lt(t, e) {
425
425
  };
426
426
  }
427
427
  async function dt(t, e, n, o, a) {
428
- const r = { alg: _e(n), kid: o }, i = lt(t, e);
428
+ const r = { alg: be(n), kid: o }, i = lt(t, e);
429
429
  return a == null || a(r, i), Se(r, i, n);
430
430
  }
431
431
  function I(t) {
@@ -470,7 +470,7 @@ async function ht(t, e, n, o, a) {
470
470
  if (le("private_key_jwt", e.client_secret), a === void 0)
471
471
  throw new TypeError('"options.clientPrivateKey" must be provided when "client.token_endpoint_auth_method" is "private_key_jwt"');
472
472
  const { key: r, kid: i, modifyAssertion: c } = it(a);
473
- if (!be(r))
473
+ if (!_e(r))
474
474
  throw new TypeError('"options.clientPrivateKey.key" must be a private CryptoKey');
475
475
  n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await dt(t, e, r, i, c));
476
476
  break;
@@ -493,8 +493,8 @@ async function Se(t, e, n) {
493
493
  }
494
494
  async function ft(t, e, n, o, a, r) {
495
495
  var T;
496
- const { privateKey: i, publicKey: c, nonce: p = me.get(n.origin) } = e;
497
- if (!be(i))
496
+ const { privateKey: i, publicKey: c, nonce: p = ge.get(n.origin) } = e;
497
+ if (!_e(i))
498
498
  throw new TypeError('"DPoP.privateKey" must be a private CryptoKey');
499
499
  if (!Xe(c))
500
500
  throw new TypeError('"DPoP.publicKey" must be a public CryptoKey');
@@ -502,19 +502,19 @@ async function ft(t, e, n, o, a, r) {
502
502
  throw new TypeError('"DPoP.nonce" must be a non-empty string or undefined');
503
503
  if (!c.extractable)
504
504
  throw new TypeError('"DPoP.publicKey.extractable" must be true');
505
- const _ = F() + a, f = {
506
- alg: _e(i),
505
+ const b = F() + a, f = {
506
+ alg: be(i),
507
507
  typ: "dpop+jwt",
508
508
  jwk: await wt(c)
509
509
  }, y = {
510
- iat: _,
510
+ iat: b,
511
511
  jti: $(),
512
512
  htm: o,
513
513
  nonce: p,
514
514
  htu: `${n.origin}${n.pathname}`,
515
515
  ath: r ? A(await crypto.subtle.digest("SHA-256", E(r))) : void 0
516
516
  };
517
- (T = e[ge]) == null || T.call(e, f, y), t.set("dpop", await Se(f, y, i));
517
+ (T = e[me]) == null || T.call(e, f, y), t.set("dpop", await Se(f, y, i));
518
518
  }
519
519
  let K;
520
520
  async function pt(t) {
@@ -539,7 +539,7 @@ function Z(t) {
539
539
  const e = t;
540
540
  return typeof e != "object" || Array.isArray(e) || e === null ? !1 : e.error !== void 0;
541
541
  }
542
- async function gt(t, e, n, o, a, r) {
542
+ async function mt(t, e, n, o, a, r) {
543
543
  if (!w(t))
544
544
  throw new TypeError('"accessToken" must be a non-empty string');
545
545
  if (!(n instanceof URL))
@@ -552,10 +552,10 @@ async function gt(t, e, n, o, a, r) {
552
552
  signal: r != null && r.signal ? ee(r.signal) : null
553
553
  }).then(X);
554
554
  }
555
- async function mt(t, e, n, o) {
555
+ async function gt(t, e, n, o) {
556
556
  I(t), j(e);
557
557
  const a = Te(t, "userinfo_endpoint", ke(e, o)), r = H(o == null ? void 0 : o.headers);
558
- return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")), gt(n, "GET", a, r, null, {
558
+ return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")), mt(n, "GET", a, r, null, {
559
559
  ...o,
560
560
  [W]: C(e)
561
561
  });
@@ -575,14 +575,14 @@ async function Ae(t, e, n, o, a) {
575
575
  const i = H(a == null ? void 0 : a.headers);
576
576
  return i.set("accept", "application/json"), yt(t, e, "POST", r, o, i, a);
577
577
  }
578
- async function bt(t, e, n, o) {
578
+ async function _t(t, e, n, o) {
579
579
  if (I(t), j(e), !w(n))
580
580
  throw new TypeError('"refreshToken" must be a non-empty string');
581
581
  const a = new URLSearchParams(o == null ? void 0 : o.additionalParameters);
582
582
  return a.set("refresh_token", n), Ae(t, e, "refresh_token", a, o);
583
583
  }
584
584
  const Ee = /* @__PURE__ */ new WeakMap();
585
- function _t(t) {
585
+ function bt(t) {
586
586
  if (!t.id_token)
587
587
  return;
588
588
  const e = Ee.get(t);
@@ -701,7 +701,7 @@ async function Ut(t, e, n, o, a) {
701
701
  if (!w(r.id_token))
702
702
  throw new s('"response" body "id_token" property must be a non-empty string');
703
703
  a ?? (a = e.default_max_age ?? B);
704
- const i = _t(r);
704
+ const i = bt(r);
705
705
  if ((e.require_auth_time || a !== B) && i.auth_time === void 0)
706
706
  throw new s('ID Token "auth_time" (authentication time) claim missing');
707
707
  if (a !== B) {
@@ -792,13 +792,13 @@ async function Ct(t, e, n, o) {
792
792
  throw new s("JWT signature verification failed");
793
793
  }
794
794
  async function It(t, e, n, o, a, r) {
795
- let { 0: i, 1: c, 2: p, length: _ } = t.split(".");
796
- if (_ === 5)
795
+ let { 0: i, 1: c, 2: p, length: b } = t.split(".");
796
+ if (b === 5)
797
797
  if (r !== void 0)
798
- t = await r(t), { 0: i, 1: c, 2: p, length: _ } = t.split(".");
798
+ t = await r(t), { 0: i, 1: c, 2: p, length: b } = t.split(".");
799
799
  else
800
800
  throw new S("JWE structure JWTs are not supported");
801
- if (_ !== 3)
801
+ if (b !== 3)
802
802
  throw new s("Invalid JWT");
803
803
  let f;
804
804
  try {
@@ -952,17 +952,17 @@ class Kt {
952
952
  redirectToAfterSignIn: r,
953
953
  redirectToAfterSignOut: i
954
954
  }) {
955
- b(this, "client");
956
- b(this, "issuer");
957
- b(this, "authorizationServer");
958
- b(this, "callbackUrlPath", "/oauth/callback");
959
- b(this, "logoutRedirectUrlPath", "/");
960
- b(this, "onAuthorizationUrl");
961
- b(this, "redirectToAfterSignUp");
962
- b(this, "redirectToAfterSignIn");
963
- b(this, "redirectToAfterSignOut");
964
- b(this, "audience");
965
- b(this, "signOut", async () => {
955
+ _(this, "client");
956
+ _(this, "issuer");
957
+ _(this, "authorizationServer");
958
+ _(this, "callbackUrlPath", "/oauth/callback");
959
+ _(this, "logoutRedirectUrlPath", "/");
960
+ _(this, "onAuthorizationUrl");
961
+ _(this, "redirectToAfterSignUp");
962
+ _(this, "redirectToAfterSignIn");
963
+ _(this, "redirectToAfterSignOut");
964
+ _(this, "audience");
965
+ _(this, "signOut", async () => {
966
966
  L.setState({
967
967
  isAuthenticated: !1,
968
968
  isPending: !1,
@@ -979,7 +979,7 @@ class Kt {
979
979
  n.toString()
980
980
  )) : o = n;
981
981
  });
982
- b(this, "handleCallback", async () => {
982
+ _(this, "handleCallback", async () => {
983
983
  const e = new URL(window.location.href), n = e.searchParams.get("state"), o = sessionStorage.getItem(V);
984
984
  if (sessionStorage.removeItem(V), !o)
985
985
  throw new P("No code verifier found in state.");
@@ -1008,10 +1008,10 @@ class Kt {
1008
1008
  c
1009
1009
  );
1010
1010
  this.setTokensFromResponse(p);
1011
- const _ = await this.getAccessToken(), y = await (await mt(
1011
+ const b = await this.getAccessToken(), y = await (await gt(
1012
1012
  a,
1013
1013
  this.client,
1014
- _
1014
+ b
1015
1015
  )).json(), T = {
1016
1016
  sub: y.sub,
1017
1017
  email: y.email,
@@ -1054,6 +1054,7 @@ class Kt {
1054
1054
  const n = {
1055
1055
  accessToken: e.access_token,
1056
1056
  refreshToken: e.refresh_token,
1057
+ idToken: e.id_token,
1057
1058
  expiresOn: new Date(Date.now() + e.expires_in * 1e3),
1058
1059
  tokenType: e.token_type
1059
1060
  };
@@ -1076,7 +1077,7 @@ class Kt {
1076
1077
  redirectTo: e,
1077
1078
  isSignUp: n = !1
1078
1079
  }) {
1079
- var _, f;
1080
+ var b, f;
1080
1081
  const o = "S256", a = await this.getAuthServer();
1081
1082
  if (!a.authorization_endpoint)
1082
1083
  throw new P("No authorization endpoint");
@@ -1090,7 +1091,7 @@ class Kt {
1090
1091
  if (p.pathname = this.callbackUrlPath, p.search = "", c.searchParams.set("client_id", this.client.client_id), c.searchParams.set("redirect_uri", p.toString()), c.searchParams.set("response_type", "code"), c.searchParams.set("scope", "openid profile email"), c.searchParams.set("code_challenge", i), c.searchParams.set(
1091
1092
  "code_challenge_method",
1092
1093
  o
1093
- ), this.audience && c.searchParams.set("audience", this.audience), (_ = this.onAuthorizationUrl) == null || _.call(this, c, {
1094
+ ), this.audience && c.searchParams.set("audience", this.audience), (b = this.onAuthorizationUrl) == null || b.call(this, c, {
1094
1095
  isSignIn: !n,
1095
1096
  isSignUp: n
1096
1097
  }), ((f = a.code_challenge_methods_supported) == null ? void 0 : f.includes("S256")) !== !0) {
@@ -1112,7 +1113,7 @@ class Kt {
1112
1113
  profile: null,
1113
1114
  providerData: null
1114
1115
  }), "";
1115
- const a = await bt(
1116
+ const a = await _t(
1116
1117
  e,
1117
1118
  this.client,
1118
1119
  o.refreshToken