zudoku 0.24.0 → 0.25.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/dist/lib/authentication/providers/openid.js +2 -1
  2. package/dist/lib/authentication/providers/openid.js.map +1 -1
  3. package/dist/lib/components/Header.js +13 -13
  4. package/dist/lib/components/Header.js.map +1 -1
  5. package/dist/lib/components/Layout.js +1 -1
  6. package/dist/lib/components/Layout.js.map +1 -1
  7. package/dist/lib/components/TopNavigation.js +2 -2
  8. package/dist/lib/components/TopNavigation.js.map +1 -1
  9. package/dist/lib/components/navigation/SidebarWrapper.js +1 -1
  10. package/dist/lib/components/navigation/SidebarWrapper.js.map +1 -1
  11. package/dist/lib/plugins/openapi/CollapsibleCode.js +2 -1
  12. package/dist/lib/plugins/openapi/CollapsibleCode.js.map +1 -1
  13. package/dist/lib/plugins/openapi/Endpoint.js +1 -1
  14. package/dist/lib/plugins/openapi/Endpoint.js.map +1 -1
  15. package/dist/lib/plugins/openapi/Sidecar.js +1 -1
  16. package/dist/lib/plugins/openapi/SidecarBox.js +4 -4
  17. package/dist/lib/plugins/openapi/SidecarBox.js.map +1 -1
  18. package/dist/lib/plugins/openapi/playground/Headers.js +1 -1
  19. package/dist/lib/plugins/openapi/playground/Headers.js.map +1 -1
  20. package/dist/lib/plugins/openapi/playground/PlaygroundDialog.js +1 -1
  21. package/dist/lib/plugins/openapi/playground/PlaygroundDialog.js.map +1 -1
  22. package/dist/lib/ui/Card.js +1 -1
  23. package/dist/lib/ui/Card.js.map +1 -1
  24. package/lib/{OperationList-CqLL5P5l.js → OperationList-c6V_vcgz.js} +787 -802
  25. package/lib/OperationList-c6V_vcgz.js.map +1 -0
  26. package/lib/{index-DzRORsY1.js → index-DkwDHnit.js} +4 -3
  27. package/lib/index-DkwDHnit.js.map +1 -0
  28. package/lib/ui/Card.js +7 -7
  29. package/lib/ui/Card.js.map +1 -1
  30. package/lib/zudoku.auth-openid.js +176 -175
  31. package/lib/zudoku.auth-openid.js.map +1 -1
  32. package/lib/zudoku.components.js +140 -140
  33. package/lib/zudoku.components.js.map +1 -1
  34. package/lib/zudoku.plugin-openapi.js +1 -1
  35. package/package.json +1 -1
  36. package/src/app/main.css +50 -37
  37. package/src/lib/authentication/providers/openid.tsx +6 -1
  38. package/src/lib/components/Header.tsx +9 -5
  39. package/src/lib/components/Layout.tsx +1 -1
  40. package/src/lib/components/TopNavigation.tsx +2 -2
  41. package/src/lib/components/navigation/SidebarWrapper.tsx +2 -2
  42. package/src/lib/plugins/openapi/CollapsibleCode.tsx +10 -7
  43. package/src/lib/plugins/openapi/Endpoint.tsx +1 -3
  44. package/src/lib/plugins/openapi/Sidecar.tsx +2 -2
  45. package/src/lib/plugins/openapi/SidecarBox.tsx +4 -16
  46. package/src/lib/plugins/openapi/playground/Headers.tsx +1 -0
  47. package/src/lib/plugins/openapi/playground/PlaygroundDialog.tsx +1 -1
  48. package/src/lib/ui/Card.tsx +1 -1
  49. package/lib/OperationList-CqLL5P5l.js.map +0 -1
  50. package/lib/index-DzRORsY1.js.map +0 -1
@@ -1,19 +1,20 @@
1
1
  var je = Object.defineProperty;
2
2
  var Je = (t, e, n) => e in t ? je(t, e, { enumerable: !0, configurable: !0, writable: !0, value: n }) : t[e] = n;
3
3
  var _ = (t, e, n) => Je(t, typeof e != "symbol" ? e + "" : e, n);
4
- import { j as we } from "./jsx-runtime-Dx-03ztt.js";
4
+ import { j as G } from "./jsx-runtime-Dx-03ztt.js";
5
5
  import { g as Oe } from "./_commonjsHelpers-BkfeUUK-.js";
6
- import { A as ze } from "./AuthenticationPlugin-DVLEc6cm.js";
7
- import { u as De } from "./ZudokuContext-hmLMUdf2.js";
8
- import { N as Ne } from "./chunk-D52XG6IA-Dl7HLe6j.js";
9
- import { Z as Ke } from "./invariant-Caa8-XvF.js";
10
- import { u as L } from "./state-CFQsUZUP.js";
11
- var N = { exports: {} }, We = N.exports, ie;
12
- function He() {
13
- return ie || (ie = 1, function(t) {
6
+ import { C as ze } from "./ClientOnly-E7hGysn1.js";
7
+ import { A as De } from "./AuthenticationPlugin-DVLEc6cm.js";
8
+ import { u as Ne } from "./ZudokuContext-hmLMUdf2.js";
9
+ import { N as Ke } from "./chunk-D52XG6IA-Dl7HLe6j.js";
10
+ import { Z as We } from "./invariant-Caa8-XvF.js";
11
+ import { u as x } from "./state-CFQsUZUP.js";
12
+ var N = { exports: {} }, He = N.exports, ae;
13
+ function $e() {
14
+ return ae || (ae = 1, function(t) {
14
15
  (function(e, n) {
15
16
  t.exports ? t.exports = n() : e.log = n();
16
- })(We, function() {
17
+ })(He, function() {
17
18
  var e = function() {
18
19
  }, n = "undefined", o = typeof window !== n && typeof window.navigator !== n && /Trident\/|MSIE /.test(window.navigator.userAgent), a = [
19
20
  "trace",
@@ -59,7 +60,7 @@ function He() {
59
60
  function h(l, m) {
60
61
  var u = this, O, M, R, v = "loglevel";
61
62
  typeof l == "string" ? v += ":" + l : typeof l == "symbol" && (v = void 0);
62
- function xe(d) {
63
+ function Ce(d) {
63
64
  var g = (a[d] || "silent").toUpperCase();
64
65
  if (!(typeof window === n || !v)) {
65
66
  try {
@@ -73,7 +74,7 @@ function He() {
73
74
  }
74
75
  }
75
76
  }
76
- function ne() {
77
+ function re() {
77
78
  var d;
78
79
  if (!(typeof window === n || !v)) {
79
80
  try {
@@ -82,16 +83,16 @@ function He() {
82
83
  }
83
84
  if (typeof d === n)
84
85
  try {
85
- var g = window.document.cookie, z = encodeURIComponent(v), oe = g.indexOf(z + "=");
86
- oe !== -1 && (d = /^([^;]+)/.exec(
87
- g.slice(oe + z.length + 1)
86
+ var g = window.document.cookie, z = encodeURIComponent(v), ie = g.indexOf(z + "=");
87
+ ie !== -1 && (d = /^([^;]+)/.exec(
88
+ g.slice(ie + z.length + 1)
88
89
  )[1]);
89
90
  } catch {
90
91
  }
91
92
  return u.levels[d] === void 0 && (d = void 0), d;
92
93
  }
93
94
  }
94
- function Ce() {
95
+ function Le() {
95
96
  if (!(typeof window === n || !v)) {
96
97
  try {
97
98
  window.localStorage.removeItem(v);
@@ -119,11 +120,11 @@ function He() {
119
120
  }, u.methodFactory = m || T, u.getLevel = function() {
120
121
  return R ?? M ?? O;
121
122
  }, u.setLevel = function(d, g) {
122
- return R = U(d), g !== !1 && xe(R), f.call(u);
123
+ return R = U(d), g !== !1 && Ce(R), f.call(u);
123
124
  }, u.setDefaultLevel = function(d) {
124
- M = U(d), ne() || u.setLevel(d, !1);
125
+ M = U(d), re() || u.setLevel(d, !1);
125
126
  }, u.resetLevel = function() {
126
- R = null, Ce(), f.call(u);
127
+ R = null, Le(), f.call(u);
127
128
  }, u.enableAll = function(d) {
128
129
  u.setLevel(u.levels.TRACE, d);
129
130
  }, u.disableAll = function(d) {
@@ -135,8 +136,8 @@ function He() {
135
136
  }, O = U(
136
137
  i ? i.getLevel() : "WARN"
137
138
  );
138
- var re = ne();
139
- re != null && (R = U(re)), f.call(u);
139
+ var oe = re();
140
+ oe != null && (R = U(oe)), f.call(u);
140
141
  }
141
142
  i = new h(), i.getLogger = function(m) {
142
143
  if (typeof m != "symbol" && typeof m != "string" || m === "")
@@ -156,12 +157,12 @@ function He() {
156
157
  });
157
158
  }(N)), N.exports;
158
159
  }
159
- var $e = He();
160
- const ae = /* @__PURE__ */ Oe($e);
161
- let G;
162
- var D, pe;
163
- (typeof navigator > "u" || !((pe = (D = navigator.userAgent) == null ? void 0 : D.startsWith) != null && pe.call(D, "Mozilla/5.0 "))) && (G = "oauth4webapi/v2.17.0");
164
- function Y(t, e) {
160
+ var Fe = $e();
161
+ const se = /* @__PURE__ */ Oe(Fe);
162
+ let Z;
163
+ var D, we;
164
+ (typeof navigator > "u" || !((we = (D = navigator.userAgent) == null ? void 0 : D.startsWith) != null && we.call(D, "Mozilla/5.0 "))) && (Z = "oauth4webapi/v2.17.0");
165
+ function Q(t, e) {
165
166
  if (t == null)
166
167
  return !1;
167
168
  try {
@@ -170,19 +171,19 @@ function Y(t, e) {
170
171
  return !1;
171
172
  }
172
173
  }
173
- const W = Symbol(), Fe = Symbol(), Q = Symbol(), me = Symbol(), Me = Symbol(), qe = Symbol(), Be = new TextEncoder(), Ve = new TextDecoder();
174
+ const W = Symbol(), Me = Symbol(), X = Symbol(), me = Symbol(), qe = Symbol(), Be = Symbol(), Ve = new TextEncoder(), Ge = new TextDecoder();
174
175
  function E(t) {
175
- return typeof t == "string" ? Be.encode(t) : Ve.decode(t);
176
+ return typeof t == "string" ? Ve.encode(t) : Ge.decode(t);
176
177
  }
177
- const se = 32768;
178
- function Ge(t) {
178
+ const ce = 32768;
179
+ function Ze(t) {
179
180
  t instanceof ArrayBuffer && (t = new Uint8Array(t));
180
181
  const e = [];
181
- for (let n = 0; n < t.byteLength; n += se)
182
- e.push(String.fromCharCode.apply(null, t.subarray(n, n + se)));
182
+ for (let n = 0; n < t.byteLength; n += ce)
183
+ e.push(String.fromCharCode.apply(null, t.subarray(n, n + ce)));
183
184
  return btoa(e.join("")).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
184
185
  }
185
- function Ze(t) {
186
+ function Ye(t) {
186
187
  try {
187
188
  const e = atob(t.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "")), n = new Uint8Array(e.length);
188
189
  for (let o = 0; o < e.length; o++)
@@ -193,9 +194,9 @@ function Ze(t) {
193
194
  }
194
195
  }
195
196
  function A(t) {
196
- return typeof t == "string" ? Ze(t) : Ge(t);
197
+ return typeof t == "string" ? Ye(t) : Ze(t);
197
198
  }
198
- class Ye {
199
+ class Qe {
199
200
  constructor(e) {
200
201
  this.cache = /* @__PURE__ */ new Map(), this._cache = /* @__PURE__ */ new Map(), this.maxSize = e;
201
202
  }
@@ -225,23 +226,23 @@ class S extends Error {
225
226
  super(e ?? "operation not supported"), this.name = this.constructor.name, (n = Error.captureStackTrace) == null || n.call(Error, this, this.constructor);
226
227
  }
227
228
  }
228
- class Qe extends Error {
229
+ class Xe extends Error {
229
230
  constructor(e, n) {
230
231
  var o;
231
232
  super(e, n), this.name = this.constructor.name, (o = Error.captureStackTrace) == null || o.call(Error, this, this.constructor);
232
233
  }
233
234
  }
234
- const s = Qe, ge = new Ye(100);
235
+ const s = Xe, ge = new Qe(100);
235
236
  function ye(t) {
236
237
  return t instanceof CryptoKey;
237
238
  }
238
239
  function _e(t) {
239
240
  return ye(t) && t.type === "private";
240
241
  }
241
- function Xe(t) {
242
+ function et(t) {
242
243
  return ye(t) && t.type === "public";
243
244
  }
244
- function X(t) {
245
+ function ee(t) {
245
246
  try {
246
247
  const e = t.headers.get("dpop-nonce");
247
248
  e && ge.set(new URL(t.url).origin, e);
@@ -249,24 +250,24 @@ function X(t) {
249
250
  }
250
251
  return t;
251
252
  }
252
- function x(t) {
253
+ function C(t) {
253
254
  return !(t === null || typeof t != "object" || Array.isArray(t));
254
255
  }
255
256
  function H(t) {
256
- Y(t, Headers) && (t = Object.fromEntries(t.entries()));
257
+ Q(t, Headers) && (t = Object.fromEntries(t.entries()));
257
258
  const e = new Headers(t);
258
- if (G && !e.has("user-agent") && e.set("user-agent", G), e.has("authorization"))
259
+ if (Z && !e.has("user-agent") && e.set("user-agent", Z), e.has("authorization"))
259
260
  throw new TypeError('"options.headers" must not include the "authorization" header name');
260
261
  if (e.has("dpop"))
261
262
  throw new TypeError('"options.headers" must not include the "dpop" header name');
262
263
  return e;
263
264
  }
264
- function ee(t) {
265
+ function te(t) {
265
266
  if (typeof t == "function" && (t = t()), !(t instanceof AbortSignal))
266
267
  throw new TypeError('"options.signal" must return or be an instance of AbortSignal');
267
268
  return t;
268
269
  }
269
- async function et(t, e) {
270
+ async function tt(t, e) {
270
271
  if (!(t instanceof URL))
271
272
  throw new TypeError('"issuerIdentifier" must be an instance of URL');
272
273
  if (t.protocol !== "https:" && t.protocol !== "http:")
@@ -284,31 +285,31 @@ async function et(t, e) {
284
285
  throw new TypeError('"options.algorithm" must be "oidc" (default), or "oauth2"');
285
286
  }
286
287
  const o = H(e == null ? void 0 : e.headers);
287
- return o.set("accept", "application/json"), ((e == null ? void 0 : e[Q]) || fetch)(n.href, {
288
+ return o.set("accept", "application/json"), ((e == null ? void 0 : e[X]) || fetch)(n.href, {
288
289
  headers: Object.fromEntries(o.entries()),
289
290
  method: "GET",
290
291
  redirect: "manual",
291
- signal: e != null && e.signal ? ee(e.signal) : null
292
- }).then(X);
292
+ signal: e != null && e.signal ? te(e.signal) : null
293
+ }).then(ee);
293
294
  }
294
295
  function w(t) {
295
296
  return typeof t == "string" && t.length !== 0;
296
297
  }
297
- async function tt(t, e) {
298
+ async function nt(t, e) {
298
299
  if (!(t instanceof URL))
299
300
  throw new TypeError('"expectedIssuer" must be an instance of URL');
300
- if (!Y(e, Response))
301
+ if (!Q(e, Response))
301
302
  throw new TypeError('"response" must be an instance of Response');
302
303
  if (e.status !== 200)
303
304
  throw new s('"response" is not a conform Authorization Server Metadata response');
304
- te(e);
305
+ ne(e);
305
306
  let n;
306
307
  try {
307
308
  n = await e.json();
308
309
  } catch (o) {
309
310
  throw new s('failed to parse "response" body as JSON', { cause: o });
310
311
  }
311
- if (!x(n))
312
+ if (!C(n))
312
313
  throw new s('"response" body must be a top level object');
313
314
  if (!w(n.issuer))
314
315
  throw new s('"response" body "issuer" property must be a non-empty string');
@@ -319,18 +320,18 @@ async function tt(t, e) {
319
320
  function $() {
320
321
  return A(crypto.getRandomValues(new Uint8Array(32)));
321
322
  }
322
- function nt() {
323
+ function rt() {
323
324
  return $();
324
325
  }
325
- function rt() {
326
+ function ot() {
326
327
  return $();
327
328
  }
328
- async function ot(t) {
329
+ async function it(t) {
329
330
  if (!w(t))
330
331
  throw new TypeError('"codeVerifier" must be a non-empty string');
331
332
  return A(await crypto.subtle.digest("SHA-256", E(t)));
332
333
  }
333
- function it(t) {
334
+ function at(t) {
334
335
  if (t instanceof CryptoKey)
335
336
  return { key: t };
336
337
  if (!((t == null ? void 0 : t.key) instanceof CryptoKey))
@@ -343,14 +344,14 @@ function it(t) {
343
344
  modifyAssertion: t[me]
344
345
  };
345
346
  }
346
- function ce(t) {
347
+ function ue(t) {
347
348
  return encodeURIComponent(t).replace(/%20/g, "+");
348
349
  }
349
- function at(t, e) {
350
- const n = ce(t), o = ce(e);
350
+ function st(t, e) {
351
+ const n = ue(t), o = ue(e);
351
352
  return `Basic ${btoa(`${n}:${o}`)}`;
352
353
  }
353
- function st(t) {
354
+ function ct(t) {
354
355
  switch (t.algorithm.hash.name) {
355
356
  case "SHA-256":
356
357
  return "PS256";
@@ -362,7 +363,7 @@ function st(t) {
362
363
  throw new S("unsupported RsaHashedKeyAlgorithm hash name");
363
364
  }
364
365
  }
365
- function ct(t) {
366
+ function ut(t) {
366
367
  switch (t.algorithm.hash.name) {
367
368
  case "SHA-256":
368
369
  return "RS256";
@@ -374,7 +375,7 @@ function ct(t) {
374
375
  throw new S("unsupported RsaHashedKeyAlgorithm hash name");
375
376
  }
376
377
  }
377
- function ut(t) {
378
+ function lt(t) {
378
379
  switch (t.algorithm.namedCurve) {
379
380
  case "P-256":
380
381
  return "ES256";
@@ -389,11 +390,11 @@ function ut(t) {
389
390
  function be(t) {
390
391
  switch (t.algorithm.name) {
391
392
  case "RSA-PSS":
392
- return st(t);
393
- case "RSASSA-PKCS1-v1_5":
394
393
  return ct(t);
395
- case "ECDSA":
394
+ case "RSASSA-PKCS1-v1_5":
396
395
  return ut(t);
396
+ case "ECDSA":
397
+ return lt(t);
397
398
  case "Ed25519":
398
399
  case "Ed448":
399
400
  return "EdDSA";
@@ -401,19 +402,19 @@ function be(t) {
401
402
  throw new S("unsupported CryptoKey algorithm name");
402
403
  }
403
404
  }
404
- function C(t) {
405
+ function L(t) {
405
406
  const e = t == null ? void 0 : t[W];
406
407
  return typeof e == "number" && Number.isFinite(e) ? e : 0;
407
408
  }
408
409
  function ve(t) {
409
- const e = t == null ? void 0 : t[Fe];
410
+ const e = t == null ? void 0 : t[Me];
410
411
  return typeof e == "number" && Number.isFinite(e) && Math.sign(e) !== -1 ? e : 30;
411
412
  }
412
413
  function F() {
413
414
  return Math.floor(Date.now() / 1e3);
414
415
  }
415
- function lt(t, e) {
416
- const n = F() + C(e);
416
+ function dt(t, e) {
417
+ const n = F() + L(e);
417
418
  return {
418
419
  jti: $(),
419
420
  aud: [t.issuer, t.token_endpoint],
@@ -424,8 +425,8 @@ function lt(t, e) {
424
425
  sub: e.client_id
425
426
  };
426
427
  }
427
- async function dt(t, e, n, o, a) {
428
- const r = { alg: be(n), kid: o }, i = lt(t, e);
428
+ async function ht(t, e, n, o, a) {
429
+ const r = { alg: be(n), kid: o }, i = dt(t, e);
429
430
  return a == null || a(r, i), Se(r, i, n);
430
431
  }
431
432
  function I(t) {
@@ -442,7 +443,7 @@ function j(t) {
442
443
  throw new TypeError('"client.client_id" property must be a non-empty string');
443
444
  return !0;
444
445
  }
445
- function ue(t) {
446
+ function le(t) {
446
447
  if (!w(t))
447
448
  throw new TypeError('"client.client_secret" property must be a non-empty string');
448
449
  return t;
@@ -451,34 +452,34 @@ function q(t, e) {
451
452
  if (e !== void 0)
452
453
  throw new TypeError(`"options.clientPrivateKey" property must not be provided when ${t} client authentication method is used.`);
453
454
  }
454
- function le(t, e) {
455
+ function de(t, e) {
455
456
  if (e !== void 0)
456
457
  throw new TypeError(`"client.client_secret" property must not be provided when ${t} client authentication method is used.`);
457
458
  }
458
- async function ht(t, e, n, o, a) {
459
+ async function ft(t, e, n, o, a) {
459
460
  switch (n.delete("client_secret"), n.delete("client_assertion_type"), n.delete("client_assertion"), e.token_endpoint_auth_method) {
460
461
  case void 0:
461
462
  case "client_secret_basic": {
462
- q("client_secret_basic", a), o.set("authorization", at(e.client_id, ue(e.client_secret)));
463
+ q("client_secret_basic", a), o.set("authorization", st(e.client_id, le(e.client_secret)));
463
464
  break;
464
465
  }
465
466
  case "client_secret_post": {
466
- q("client_secret_post", a), n.set("client_id", e.client_id), n.set("client_secret", ue(e.client_secret));
467
+ q("client_secret_post", a), n.set("client_id", e.client_id), n.set("client_secret", le(e.client_secret));
467
468
  break;
468
469
  }
469
470
  case "private_key_jwt": {
470
- if (le("private_key_jwt", e.client_secret), a === void 0)
471
+ if (de("private_key_jwt", e.client_secret), a === void 0)
471
472
  throw new TypeError('"options.clientPrivateKey" must be provided when "client.token_endpoint_auth_method" is "private_key_jwt"');
472
- const { key: r, kid: i, modifyAssertion: c } = it(a);
473
+ const { key: r, kid: i, modifyAssertion: c } = at(a);
473
474
  if (!_e(r))
474
475
  throw new TypeError('"options.clientPrivateKey.key" must be a private CryptoKey');
475
- n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await dt(t, e, r, i, c));
476
+ n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await ht(t, e, r, i, c));
476
477
  break;
477
478
  }
478
479
  case "tls_client_auth":
479
480
  case "self_signed_tls_client_auth":
480
481
  case "none": {
481
- le(e.token_endpoint_auth_method, e.client_secret), q(e.token_endpoint_auth_method, a), n.set("client_id", e.client_id);
482
+ de(e.token_endpoint_auth_method, e.client_secret), q(e.token_endpoint_auth_method, a), n.set("client_id", e.client_id);
482
483
  break;
483
484
  }
484
485
  default:
@@ -491,12 +492,12 @@ async function Se(t, e, n) {
491
492
  const o = `${A(E(JSON.stringify(t)))}.${A(E(JSON.stringify(e)))}`, a = A(await crypto.subtle.sign(Ue(n), n, E(o)));
492
493
  return `${o}.${a}`;
493
494
  }
494
- async function ft(t, e, n, o, a, r) {
495
+ async function pt(t, e, n, o, a, r) {
495
496
  var T;
496
497
  const { privateKey: i, publicKey: c, nonce: p = ge.get(n.origin) } = e;
497
498
  if (!_e(i))
498
499
  throw new TypeError('"DPoP.privateKey" must be a private CryptoKey');
499
- if (!Xe(c))
500
+ if (!et(c))
500
501
  throw new TypeError('"DPoP.publicKey" must be a public CryptoKey');
501
502
  if (p !== void 0 && !w(p))
502
503
  throw new TypeError('"DPoP.nonce" must be a non-empty string or undefined');
@@ -505,7 +506,7 @@ async function ft(t, e, n, o, a, r) {
505
506
  const b = F() + a, f = {
506
507
  alg: be(i),
507
508
  typ: "dpop+jwt",
508
- jwk: await wt(c)
509
+ jwk: await mt(c)
509
510
  }, y = {
510
511
  iat: b,
511
512
  jti: $(),
@@ -517,72 +518,72 @@ async function ft(t, e, n, o, a, r) {
517
518
  (T = e[me]) == null || T.call(e, f, y), t.set("dpop", await Se(f, y, i));
518
519
  }
519
520
  let K;
520
- async function pt(t) {
521
+ async function wt(t) {
521
522
  const { kty: e, e: n, n: o, x: a, y: r, crv: i } = await crypto.subtle.exportKey("jwk", t), c = { kty: e, e: n, n: o, x: a, y: r, crv: i };
522
523
  return K.set(t, c), c;
523
524
  }
524
- async function wt(t) {
525
- return K || (K = /* @__PURE__ */ new WeakMap()), K.get(t) || pt(t);
525
+ async function mt(t) {
526
+ return K || (K = /* @__PURE__ */ new WeakMap()), K.get(t) || wt(t);
526
527
  }
527
- function de(t, e, n) {
528
+ function he(t, e, n) {
528
529
  if (typeof t != "string")
529
530
  throw n ? new TypeError(`"as.mtls_endpoint_aliases.${e}" must be a string`) : new TypeError(`"as.${e}" must be a string`);
530
531
  return new URL(t);
531
532
  }
532
533
  function Te(t, e, n = !1) {
533
- return n && t.mtls_endpoint_aliases && e in t.mtls_endpoint_aliases ? de(t.mtls_endpoint_aliases[e], e, n) : de(t[e], e, n);
534
+ return n && t.mtls_endpoint_aliases && e in t.mtls_endpoint_aliases ? he(t.mtls_endpoint_aliases[e], e, n) : he(t[e], e, n);
534
535
  }
535
536
  function ke(t, e) {
536
- return !!(t.use_mtls_endpoint_aliases || e != null && e[qe]);
537
+ return !!(t.use_mtls_endpoint_aliases || e != null && e[Be]);
537
538
  }
538
- function Z(t) {
539
+ function Y(t) {
539
540
  const e = t;
540
541
  return typeof e != "object" || Array.isArray(e) || e === null ? !1 : e.error !== void 0;
541
542
  }
542
- async function mt(t, e, n, o, a, r) {
543
+ async function gt(t, e, n, o, a, r) {
543
544
  if (!w(t))
544
545
  throw new TypeError('"accessToken" must be a non-empty string');
545
546
  if (!(n instanceof URL))
546
547
  throw new TypeError('"url" must be an instance of URL');
547
- return o = H(o), (r == null ? void 0 : r.DPoP) === void 0 ? o.set("authorization", `Bearer ${t}`) : (await ft(o, r.DPoP, n, e.toUpperCase(), C({ [W]: r == null ? void 0 : r[W] }), t), o.set("authorization", `DPoP ${t}`)), ((r == null ? void 0 : r[Q]) || fetch)(n.href, {
548
+ return o = H(o), (r == null ? void 0 : r.DPoP) === void 0 ? o.set("authorization", `Bearer ${t}`) : (await pt(o, r.DPoP, n, e.toUpperCase(), L({ [W]: r == null ? void 0 : r[W] }), t), o.set("authorization", `DPoP ${t}`)), ((r == null ? void 0 : r[X]) || fetch)(n.href, {
548
549
  body: a,
549
550
  headers: Object.fromEntries(o.entries()),
550
551
  method: e,
551
552
  redirect: "manual",
552
- signal: r != null && r.signal ? ee(r.signal) : null
553
- }).then(X);
553
+ signal: r != null && r.signal ? te(r.signal) : null
554
+ }).then(ee);
554
555
  }
555
- async function gt(t, e, n, o) {
556
+ async function yt(t, e, n, o) {
556
557
  I(t), j(e);
557
558
  const a = Te(t, "userinfo_endpoint", ke(e, o)), r = H(o == null ? void 0 : o.headers);
558
- return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")), mt(n, "GET", a, r, null, {
559
+ return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")), gt(n, "GET", a, r, null, {
559
560
  ...o,
560
- [W]: C(e)
561
+ [W]: L(e)
561
562
  });
562
563
  }
563
- async function yt(t, e, n, o, a, r, i) {
564
- return await ht(t, e, a, r, i == null ? void 0 : i.clientPrivateKey), r.set("content-type", "application/x-www-form-urlencoded;charset=UTF-8"), ((i == null ? void 0 : i[Q]) || fetch)(o.href, {
564
+ async function _t(t, e, n, o, a, r, i) {
565
+ return await ft(t, e, a, r, i == null ? void 0 : i.clientPrivateKey), r.set("content-type", "application/x-www-form-urlencoded;charset=UTF-8"), ((i == null ? void 0 : i[X]) || fetch)(o.href, {
565
566
  body: a,
566
567
  headers: Object.fromEntries(r.entries()),
567
568
  method: n,
568
569
  redirect: "manual",
569
- signal: i != null && i.signal ? ee(i.signal) : null
570
- }).then(X);
570
+ signal: i != null && i.signal ? te(i.signal) : null
571
+ }).then(ee);
571
572
  }
572
573
  async function Ae(t, e, n, o, a) {
573
574
  const r = Te(t, "token_endpoint", ke(e, a));
574
575
  o.set("grant_type", n);
575
576
  const i = H(a == null ? void 0 : a.headers);
576
- return i.set("accept", "application/json"), yt(t, e, "POST", r, o, i, a);
577
+ return i.set("accept", "application/json"), _t(t, e, "POST", r, o, i, a);
577
578
  }
578
- async function _t(t, e, n, o) {
579
+ async function bt(t, e, n, o) {
579
580
  if (I(t), j(e), !w(n))
580
581
  throw new TypeError('"refreshToken" must be a non-empty string');
581
582
  const a = new URLSearchParams(o == null ? void 0 : o.additionalParameters);
582
583
  return a.set("refresh_token", n), Ae(t, e, "refresh_token", a, o);
583
584
  }
584
585
  const Ee = /* @__PURE__ */ new WeakMap();
585
- function bt(t) {
586
+ function vt(t) {
586
587
  if (!t.id_token)
587
588
  return;
588
589
  const e = Ee.get(t);
@@ -591,22 +592,22 @@ function bt(t) {
591
592
  return e[0];
592
593
  }
593
594
  async function Re(t, e, n, o = !1, a = !1) {
594
- if (I(t), j(e), !Y(n, Response))
595
+ if (I(t), j(e), !Q(n, Response))
595
596
  throw new TypeError('"response" must be an instance of Response');
596
597
  if (n.status !== 200) {
597
598
  let i;
598
- if (i = await Lt(n))
599
+ if (i = await Ct(n))
599
600
  return i;
600
601
  throw new s('"response" is not a conform Token Endpoint response');
601
602
  }
602
- te(n);
603
+ ne(n);
603
604
  let r;
604
605
  try {
605
606
  r = await n.json();
606
607
  } catch (i) {
607
608
  throw new s('failed to parse "response" body as JSON', { cause: i });
608
609
  }
609
- if (!x(r))
610
+ if (!C(r))
610
611
  throw new s('"response" body must be a top level object');
611
612
  if (!w(r.access_token))
612
613
  throw new s('"response" body "access_token" property must be a non-empty string');
@@ -624,7 +625,7 @@ async function Re(t, e, n, o = !1, a = !1) {
624
625
  if (r.id_token !== void 0 && !w(r.id_token))
625
626
  throw new s('"response" body "id_token" property must be a non-empty string');
626
627
  if (r.id_token) {
627
- const { claims: i, jwt: c } = await It(r.id_token, jt.bind(void 0, e.id_token_signed_response_alg, t.id_token_signing_alg_values_supported), Le, C(e), ve(e), e[Me]).then(Rt.bind(void 0, ["aud", "exp", "iat", "iss", "sub"])).then(Tt.bind(void 0, t.issuer)).then(St.bind(void 0, e.client_id));
628
+ const { claims: i, jwt: c } = await jt(r.id_token, Jt.bind(void 0, e.id_token_signed_response_alg, t.id_token_signing_alg_values_supported), xe, L(e), ve(e), e[qe]).then(Pt.bind(void 0, ["aud", "exp", "iat", "iss", "sub"])).then(kt.bind(void 0, t.issuer)).then(Tt.bind(void 0, e.client_id));
628
629
  if (Array.isArray(i.aud) && i.aud.length !== 1) {
629
630
  if (i.azp === void 0)
630
631
  throw new s('ID Token "aud" (audience) claim includes additional untrusted audiences');
@@ -638,10 +639,10 @@ async function Re(t, e, n, o = !1, a = !1) {
638
639
  }
639
640
  return r;
640
641
  }
641
- async function vt(t, e, n) {
642
+ async function St(t, e, n) {
642
643
  return Re(t, e, n);
643
644
  }
644
- function St(t, e) {
645
+ function Tt(t, e) {
645
646
  if (Array.isArray(e.claims.aud)) {
646
647
  if (!e.claims.aud.includes(t))
647
648
  throw new s('unexpected JWT "aud" (audience) claim value');
@@ -649,16 +650,16 @@ function St(t, e) {
649
650
  throw new s('unexpected JWT "aud" (audience) claim value');
650
651
  return e;
651
652
  }
652
- function Tt(t, e) {
653
+ function kt(t, e) {
653
654
  if (e.claims.iss !== t)
654
655
  throw new s('unexpected JWT "iss" (issuer) claim value');
655
656
  return e;
656
657
  }
657
658
  const Pe = /* @__PURE__ */ new WeakSet();
658
- function kt(t) {
659
+ function At(t) {
659
660
  return Pe.add(t), t;
660
661
  }
661
- async function At(t, e, n, o, a, r) {
662
+ async function Et(t, e, n, o, a, r) {
662
663
  if (I(t), j(e), !Pe.has(n))
663
664
  throw new TypeError('"callbackParameters" must be an instance of URLSearchParams obtained from "validateAuthResponse()", or "validateJwtAuthResponse()');
664
665
  if (!w(o))
@@ -671,7 +672,7 @@ async function At(t, e, n, o, a, r) {
671
672
  const c = new URLSearchParams(r == null ? void 0 : r.additionalParameters);
672
673
  return c.set("redirect_uri", o), c.set("code_verifier", a), c.set("code", i), Ae(t, e, "authorization_code", c, r);
673
674
  }
674
- const Et = {
675
+ const Rt = {
675
676
  aud: "audience",
676
677
  c_hash: "code hash",
677
678
  client_id: "client id",
@@ -687,33 +688,33 @@ const Et = {
687
688
  htu: "http uri",
688
689
  cnf: "confirmation"
689
690
  };
690
- function Rt(t, e) {
691
+ function Pt(t, e) {
691
692
  for (const n of t)
692
693
  if (e.claims[n] === void 0)
693
- throw new s(`JWT "${n}" (${Et[n]}) claim missing`);
694
+ throw new s(`JWT "${n}" (${Rt[n]}) claim missing`);
694
695
  return e;
695
696
  }
696
- const Pt = Symbol(), B = Symbol();
697
- async function Ut(t, e, n, o, a) {
697
+ const Ut = Symbol(), B = Symbol();
698
+ async function xt(t, e, n, o, a) {
698
699
  const r = await Re(t, e, n);
699
- if (Z(r))
700
+ if (Y(r))
700
701
  return r;
701
702
  if (!w(r.id_token))
702
703
  throw new s('"response" body "id_token" property must be a non-empty string');
703
704
  a ?? (a = e.default_max_age ?? B);
704
- const i = bt(r);
705
+ const i = vt(r);
705
706
  if ((e.require_auth_time || a !== B) && i.auth_time === void 0)
706
707
  throw new s('ID Token "auth_time" (authentication time) claim missing');
707
708
  if (a !== B) {
708
709
  if (typeof a != "number" || a < 0)
709
710
  throw new TypeError('"maxAge" must be a non-negative number');
710
- const c = F() + C(e), p = ve(e);
711
+ const c = F() + L(e), p = ve(e);
711
712
  if (i.auth_time + a < c - p)
712
713
  throw new s("too much time has elapsed since the last End-User authentication");
713
714
  }
714
715
  switch (o) {
715
716
  case void 0:
716
- case Pt:
717
+ case Ut:
717
718
  if (i.nonce !== void 0)
718
719
  throw new s('unexpected ID Token "nonce" claim value');
719
720
  break;
@@ -727,26 +728,26 @@ async function Ut(t, e, n, o, a) {
727
728
  }
728
729
  return r;
729
730
  }
730
- function te(t) {
731
+ function ne(t) {
731
732
  if (t.bodyUsed)
732
733
  throw new TypeError('"response" body has been used already');
733
734
  }
734
- async function Lt(t) {
735
+ async function Ct(t) {
735
736
  if (t.status > 399 && t.status < 500) {
736
- te(t);
737
+ ne(t);
737
738
  try {
738
739
  const e = await t.json();
739
- if (x(e) && typeof e.error == "string" && e.error.length)
740
+ if (C(e) && typeof e.error == "string" && e.error.length)
740
741
  return e.error_description !== void 0 && typeof e.error_description != "string" && delete e.error_description, e.error_uri !== void 0 && typeof e.error_uri != "string" && delete e.error_uri, e.algs !== void 0 && typeof e.algs != "string" && delete e.algs, e.scope !== void 0 && typeof e.scope != "string" && delete e.scope, e;
741
742
  } catch {
742
743
  }
743
744
  }
744
745
  }
745
- function he(t) {
746
+ function fe(t) {
746
747
  if (typeof t.modulusLength != "number" || t.modulusLength < 2048)
747
748
  throw new s(`${t.name} modulusLength must be at least 2048 bits`);
748
749
  }
749
- function xt(t) {
750
+ function Lt(t) {
750
751
  switch (t) {
751
752
  case "P-256":
752
753
  return "SHA-256";
@@ -763,10 +764,10 @@ function Ue(t) {
763
764
  case "ECDSA":
764
765
  return {
765
766
  name: t.algorithm.name,
766
- hash: xt(t.algorithm.namedCurve)
767
+ hash: Lt(t.algorithm.namedCurve)
767
768
  };
768
769
  case "RSA-PSS":
769
- switch (he(t.algorithm), t.algorithm.hash.name) {
770
+ switch (fe(t.algorithm), t.algorithm.hash.name) {
770
771
  case "SHA-256":
771
772
  case "SHA-384":
772
773
  case "SHA-512":
@@ -778,20 +779,20 @@ function Ue(t) {
778
779
  throw new S();
779
780
  }
780
781
  case "RSASSA-PKCS1-v1_5":
781
- return he(t.algorithm), t.algorithm.name;
782
+ return fe(t.algorithm), t.algorithm.name;
782
783
  case "Ed448":
783
784
  case "Ed25519":
784
785
  return t.algorithm.name;
785
786
  }
786
787
  throw new S();
787
788
  }
788
- const Le = Symbol();
789
- async function Ct(t, e, n, o) {
789
+ const xe = Symbol();
790
+ async function It(t, e, n, o) {
790
791
  const a = `${t}.${e}`;
791
792
  if (!await crypto.subtle.verify(Ue(n), n, o, E(a)))
792
793
  throw new s("JWT signature verification failed");
793
794
  }
794
- async function It(t, e, n, o, a, r) {
795
+ async function jt(t, e, n, o, a, r) {
795
796
  let { 0: i, 1: c, 2: p, length: b } = t.split(".");
796
797
  if (b === 5)
797
798
  if (r !== void 0)
@@ -806,20 +807,20 @@ async function It(t, e, n, o, a, r) {
806
807
  } catch (l) {
807
808
  throw new s("failed to parse JWT Header body as base64url encoded JSON", { cause: l });
808
809
  }
809
- if (!x(f))
810
+ if (!C(f))
810
811
  throw new s("JWT Header must be a top level object");
811
812
  if (e(f), f.crit !== void 0)
812
813
  throw new s('unexpected JWT "crit" header parameter');
813
814
  const y = A(p);
814
815
  let T;
815
- n !== Le && (T = await n(f), await Ct(i, c, T, y));
816
+ n !== xe && (T = await n(f), await It(i, c, T, y));
816
817
  let h;
817
818
  try {
818
819
  h = JSON.parse(E(A(c)));
819
820
  } catch (l) {
820
821
  throw new s("failed to parse JWT Payload body as base64url encoded JSON", { cause: l });
821
822
  }
822
- if (!x(h))
823
+ if (!C(h))
823
824
  throw new s("JWT Payload must be a top level object");
824
825
  const J = F() + o;
825
826
  if (h.exp !== void 0) {
@@ -842,7 +843,7 @@ async function It(t, e, n, o, a, r) {
842
843
  throw new s('unexpected JWT "aud" (audience) claim type');
843
844
  return { header: f, claims: h, signature: y, key: T, jwt: t };
844
845
  }
845
- function jt(t, e, n) {
846
+ function Jt(t, e, n) {
846
847
  if (t !== void 0) {
847
848
  if (n.alg !== t)
848
849
  throw new s('unexpected JWT "alg" header parameter');
@@ -862,8 +863,8 @@ function k(t, e) {
862
863
  throw new s(`"${e}" parameter must be provided only once`);
863
864
  return n;
864
865
  }
865
- const Jt = Symbol(), Ot = Symbol();
866
- function zt(t, e, n, o) {
866
+ const Ot = Symbol(), zt = Symbol();
867
+ function Dt(t, e, n, o) {
867
868
  if (I(t), j(e), n instanceof URL && (n = n.searchParams), !(n instanceof URLSearchParams))
868
869
  throw new TypeError('"parameters" must be an instance of URLSearchParams, or URL');
869
870
  if (k(n, "response"))
@@ -875,11 +876,11 @@ function zt(t, e, n, o) {
875
876
  throw new s('unexpected "iss" (issuer) response parameter value');
876
877
  switch (o) {
877
878
  case void 0:
878
- case Ot:
879
+ case zt:
879
880
  if (r !== void 0)
880
881
  throw new s('unexpected "state" response parameter encountered');
881
882
  break;
882
- case Jt:
883
+ case Ot:
883
884
  break;
884
885
  default:
885
886
  if (!w(o))
@@ -899,19 +900,19 @@ function zt(t, e, n, o) {
899
900
  const c = k(n, "id_token"), p = k(n, "token");
900
901
  if (c !== void 0 || p !== void 0)
901
902
  throw new S("implicit and hybrid flows are not supported");
902
- return kt(new URLSearchParams(n));
903
+ return At(new URLSearchParams(n));
903
904
  }
904
- function Dt({
905
+ function Nt({
905
906
  handleCallback: t
906
907
  }) {
907
- const e = De({
908
+ const e = Ne({
908
909
  retry: !1,
909
910
  queryKey: ["oauth-callback"],
910
911
  queryFn: async () => {
911
912
  try {
912
913
  return await t();
913
914
  } catch (n) {
914
- throw new Ke("Could not validate user", {
915
+ throw new We("Could not validate user", {
915
916
  cause: n,
916
917
  title: "Authentication Error",
917
918
  developerHint: "Check the configuration of your authorization provider and ensure all settings such as the callback URL are configured correctly."
@@ -919,17 +920,17 @@ function Dt({
919
920
  }
920
921
  }
921
922
  });
922
- return /* @__PURE__ */ we.jsx(Ne, { to: e.data });
923
+ return /* @__PURE__ */ G.jsx(Ke, { to: e.data });
923
924
  }
924
925
  class P extends Error {
925
926
  }
926
- class fe extends P {
927
+ class pe extends P {
927
928
  constructor(e, n, o) {
928
929
  super(e, o), this.error = n;
929
930
  }
930
931
  }
931
932
  const V = "code-verifier";
932
- class Nt extends ze {
933
+ class Kt extends De {
933
934
  constructor(e, n) {
934
935
  super(), this.callbackUrlPath = e, this.handleCallback = n;
935
936
  }
@@ -938,12 +939,12 @@ class Nt extends ze {
938
939
  ...super.getRoutes(),
939
940
  {
940
941
  path: this.callbackUrlPath,
941
- element: /* @__PURE__ */ we.jsx(Dt, { handleCallback: this.handleCallback })
942
+ element: /* @__PURE__ */ G.jsx(ze, { children: /* @__PURE__ */ G.jsx(Nt, { handleCallback: this.handleCallback }) })
942
943
  }
943
944
  ];
944
945
  }
945
946
  }
946
- class Kt {
947
+ class Wt {
947
948
  constructor({
948
949
  issuer: e,
949
950
  audience: n,
@@ -963,7 +964,7 @@ class Kt {
963
964
  _(this, "redirectToAfterSignOut");
964
965
  _(this, "audience");
965
966
  _(this, "signOut", async () => {
966
- L.setState({
967
+ x.setState({
967
968
  isAuthenticated: !1,
968
969
  isPending: !1,
969
970
  profile: void 0,
@@ -983,32 +984,32 @@ class Kt {
983
984
  const e = new URL(window.location.href), n = e.searchParams.get("state"), o = sessionStorage.getItem(V);
984
985
  if (sessionStorage.removeItem(V), !o)
985
986
  throw new P("No code verifier found in state.");
986
- const a = await this.getAuthServer(), r = zt(
987
+ const a = await this.getAuthServer(), r = Dt(
987
988
  a,
988
989
  this.client,
989
990
  e.searchParams,
990
991
  n ?? void 0
991
992
  );
992
- if (Z(r))
993
- throw ae.error("Error validating OAuth response", r), new fe(
993
+ if (Y(r))
994
+ throw se.error("Error validating OAuth response", r), new pe(
994
995
  "Error validating OAuth response",
995
996
  r
996
997
  );
997
998
  const i = new URL(e);
998
999
  i.pathname = this.redirectToAfterSignIn, i.search = "";
999
- const c = await At(
1000
+ const c = await Et(
1000
1001
  a,
1001
1002
  this.client,
1002
1003
  r,
1003
1004
  i.toString(),
1004
1005
  o
1005
- ), p = await Ut(
1006
+ ), p = await xt(
1006
1007
  a,
1007
1008
  this.client,
1008
1009
  c
1009
1010
  );
1010
1011
  this.setTokensFromResponse(p);
1011
- const b = await this.getAccessToken(), y = await (await gt(
1012
+ const b = await this.getAccessToken(), y = await (await yt(
1012
1013
  a,
1013
1014
  this.client,
1014
1015
  b
@@ -1019,7 +1020,7 @@ class Kt {
1019
1020
  emailVerified: y.email_verified ?? !1,
1020
1021
  pictureUrl: y.picture
1021
1022
  };
1022
- L.setState({
1023
+ x.setState({
1023
1024
  isAuthenticated: !0,
1024
1025
  isPending: !1,
1025
1026
  profile: T
@@ -1034,8 +1035,8 @@ class Kt {
1034
1035
  }
1035
1036
  async getAuthServer() {
1036
1037
  if (!this.authorizationServer) {
1037
- const e = new URL(this.issuer), n = await et(e);
1038
- this.authorizationServer = await tt(
1038
+ const e = new URL(this.issuer), n = await tt(e);
1039
+ this.authorizationServer = await nt(
1039
1040
  e,
1040
1041
  n
1041
1042
  );
@@ -1047,8 +1048,8 @@ class Kt {
1047
1048
  * @param response
1048
1049
  */
1049
1050
  setTokensFromResponse(e) {
1050
- if (Z(e))
1051
- throw ae.error("Bad Token Response", e), new fe("Bad Token Response", e);
1051
+ if (Y(e))
1052
+ throw se.error("Bad Token Response", e), new pe("Bad Token Response", e);
1052
1053
  if (!e.expires_in)
1053
1054
  throw new P("No expires_in in response");
1054
1055
  const n = {
@@ -1058,7 +1059,7 @@ class Kt {
1058
1059
  expiresOn: new Date(Date.now() + e.expires_in * 1e3),
1059
1060
  tokenType: e.token_type
1060
1061
  };
1061
- L.setState({
1062
+ x.setState({
1062
1063
  providerData: n
1063
1064
  });
1064
1065
  }
@@ -1081,7 +1082,7 @@ class Kt {
1081
1082
  const o = "S256", a = await this.getAuthServer();
1082
1083
  if (!a.authorization_endpoint)
1083
1084
  throw new P("No authorization endpoint");
1084
- const r = nt(), i = await ot(r);
1085
+ const r = rt(), i = await it(r);
1085
1086
  sessionStorage.setItem(V, r);
1086
1087
  const c = new URL(
1087
1088
  a.authorization_endpoint
@@ -1095,29 +1096,29 @@ class Kt {
1095
1096
  isSignIn: !n,
1096
1097
  isSignUp: n
1097
1098
  }), ((f = a.code_challenge_methods_supported) == null ? void 0 : f.includes("S256")) !== !0) {
1098
- const y = rt();
1099
+ const y = ot();
1099
1100
  c.searchParams.set("state", y);
1100
1101
  }
1101
1102
  location.href = c.href;
1102
1103
  }
1103
1104
  async getAccessToken() {
1104
- const e = await this.getAuthServer(), { providerData: n } = L.getState();
1105
+ const e = await this.getAuthServer(), { providerData: n } = x.getState();
1105
1106
  if (!n)
1106
1107
  throw new P("User is not authenticated");
1107
1108
  const o = n;
1108
1109
  if (new Date(o.expiresOn) < /* @__PURE__ */ new Date()) {
1109
1110
  if (!o.refreshToken)
1110
- return L.setState({
1111
+ return x.setState({
1111
1112
  isAuthenticated: !1,
1112
1113
  isPending: !1,
1113
1114
  profile: null,
1114
1115
  providerData: null
1115
1116
  }), "";
1116
- const a = await _t(
1117
+ const a = await bt(
1117
1118
  e,
1118
1119
  this.client,
1119
1120
  o.refreshToken
1120
- ), r = await vt(
1121
+ ), r = await St(
1121
1122
  e,
1122
1123
  this.client,
1123
1124
  a
@@ -1129,12 +1130,12 @@ class Kt {
1129
1130
  return o.accessToken;
1130
1131
  }
1131
1132
  getAuthenticationPlugin() {
1132
- return new Nt(this.callbackUrlPath, this.handleCallback);
1133
+ return new Kt(this.callbackUrlPath, this.handleCallback);
1133
1134
  }
1134
1135
  }
1135
- const Gt = (t) => new Kt(t);
1136
+ const Yt = (t) => new Wt(t);
1136
1137
  export {
1137
- Kt as OpenIDAuthenticationProvider,
1138
- Gt as default
1138
+ Wt as OpenIDAuthenticationProvider,
1139
+ Yt as default
1139
1140
  };
1140
1141
  //# sourceMappingURL=zudoku.auth-openid.js.map