zudoku 0.24.0 → 0.25.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/lib/authentication/providers/openid.js +2 -1
- package/dist/lib/authentication/providers/openid.js.map +1 -1
- package/dist/lib/components/Header.js +13 -13
- package/dist/lib/components/Header.js.map +1 -1
- package/dist/lib/components/Layout.js +1 -1
- package/dist/lib/components/Layout.js.map +1 -1
- package/dist/lib/components/TopNavigation.js +2 -2
- package/dist/lib/components/TopNavigation.js.map +1 -1
- package/dist/lib/components/navigation/SidebarWrapper.js +1 -1
- package/dist/lib/components/navigation/SidebarWrapper.js.map +1 -1
- package/dist/lib/plugins/openapi/CollapsibleCode.js +2 -1
- package/dist/lib/plugins/openapi/CollapsibleCode.js.map +1 -1
- package/dist/lib/plugins/openapi/Endpoint.js +1 -1
- package/dist/lib/plugins/openapi/Endpoint.js.map +1 -1
- package/dist/lib/plugins/openapi/Sidecar.js +1 -1
- package/dist/lib/plugins/openapi/SidecarBox.js +4 -4
- package/dist/lib/plugins/openapi/SidecarBox.js.map +1 -1
- package/dist/lib/plugins/openapi/playground/Headers.js +1 -1
- package/dist/lib/plugins/openapi/playground/Headers.js.map +1 -1
- package/dist/lib/plugins/openapi/playground/PlaygroundDialog.js +1 -1
- package/dist/lib/plugins/openapi/playground/PlaygroundDialog.js.map +1 -1
- package/dist/lib/ui/Card.js +1 -1
- package/dist/lib/ui/Card.js.map +1 -1
- package/lib/{OperationList-CqLL5P5l.js → OperationList-c6V_vcgz.js} +787 -802
- package/lib/OperationList-c6V_vcgz.js.map +1 -0
- package/lib/{index-DzRORsY1.js → index-DkwDHnit.js} +4 -3
- package/lib/index-DkwDHnit.js.map +1 -0
- package/lib/ui/Card.js +7 -7
- package/lib/ui/Card.js.map +1 -1
- package/lib/zudoku.auth-openid.js +176 -175
- package/lib/zudoku.auth-openid.js.map +1 -1
- package/lib/zudoku.components.js +140 -140
- package/lib/zudoku.components.js.map +1 -1
- package/lib/zudoku.plugin-openapi.js +1 -1
- package/package.json +1 -1
- package/src/app/main.css +50 -37
- package/src/lib/authentication/providers/openid.tsx +6 -1
- package/src/lib/components/Header.tsx +9 -5
- package/src/lib/components/Layout.tsx +1 -1
- package/src/lib/components/TopNavigation.tsx +2 -2
- package/src/lib/components/navigation/SidebarWrapper.tsx +2 -2
- package/src/lib/plugins/openapi/CollapsibleCode.tsx +10 -7
- package/src/lib/plugins/openapi/Endpoint.tsx +1 -3
- package/src/lib/plugins/openapi/Sidecar.tsx +2 -2
- package/src/lib/plugins/openapi/SidecarBox.tsx +4 -16
- package/src/lib/plugins/openapi/playground/Headers.tsx +1 -0
- package/src/lib/plugins/openapi/playground/PlaygroundDialog.tsx +1 -1
- package/src/lib/ui/Card.tsx +1 -1
- package/lib/OperationList-CqLL5P5l.js.map +0 -1
- package/lib/index-DzRORsY1.js.map +0 -1
|
@@ -1,19 +1,20 @@
|
|
|
1
1
|
var je = Object.defineProperty;
|
|
2
2
|
var Je = (t, e, n) => e in t ? je(t, e, { enumerable: !0, configurable: !0, writable: !0, value: n }) : t[e] = n;
|
|
3
3
|
var _ = (t, e, n) => Je(t, typeof e != "symbol" ? e + "" : e, n);
|
|
4
|
-
import { j as
|
|
4
|
+
import { j as G } from "./jsx-runtime-Dx-03ztt.js";
|
|
5
5
|
import { g as Oe } from "./_commonjsHelpers-BkfeUUK-.js";
|
|
6
|
-
import {
|
|
7
|
-
import {
|
|
8
|
-
import {
|
|
9
|
-
import {
|
|
10
|
-
import {
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
6
|
+
import { C as ze } from "./ClientOnly-E7hGysn1.js";
|
|
7
|
+
import { A as De } from "./AuthenticationPlugin-DVLEc6cm.js";
|
|
8
|
+
import { u as Ne } from "./ZudokuContext-hmLMUdf2.js";
|
|
9
|
+
import { N as Ke } from "./chunk-D52XG6IA-Dl7HLe6j.js";
|
|
10
|
+
import { Z as We } from "./invariant-Caa8-XvF.js";
|
|
11
|
+
import { u as x } from "./state-CFQsUZUP.js";
|
|
12
|
+
var N = { exports: {} }, He = N.exports, ae;
|
|
13
|
+
function $e() {
|
|
14
|
+
return ae || (ae = 1, function(t) {
|
|
14
15
|
(function(e, n) {
|
|
15
16
|
t.exports ? t.exports = n() : e.log = n();
|
|
16
|
-
})(
|
|
17
|
+
})(He, function() {
|
|
17
18
|
var e = function() {
|
|
18
19
|
}, n = "undefined", o = typeof window !== n && typeof window.navigator !== n && /Trident\/|MSIE /.test(window.navigator.userAgent), a = [
|
|
19
20
|
"trace",
|
|
@@ -59,7 +60,7 @@ function He() {
|
|
|
59
60
|
function h(l, m) {
|
|
60
61
|
var u = this, O, M, R, v = "loglevel";
|
|
61
62
|
typeof l == "string" ? v += ":" + l : typeof l == "symbol" && (v = void 0);
|
|
62
|
-
function
|
|
63
|
+
function Ce(d) {
|
|
63
64
|
var g = (a[d] || "silent").toUpperCase();
|
|
64
65
|
if (!(typeof window === n || !v)) {
|
|
65
66
|
try {
|
|
@@ -73,7 +74,7 @@ function He() {
|
|
|
73
74
|
}
|
|
74
75
|
}
|
|
75
76
|
}
|
|
76
|
-
function
|
|
77
|
+
function re() {
|
|
77
78
|
var d;
|
|
78
79
|
if (!(typeof window === n || !v)) {
|
|
79
80
|
try {
|
|
@@ -82,16 +83,16 @@ function He() {
|
|
|
82
83
|
}
|
|
83
84
|
if (typeof d === n)
|
|
84
85
|
try {
|
|
85
|
-
var g = window.document.cookie, z = encodeURIComponent(v),
|
|
86
|
-
|
|
87
|
-
g.slice(
|
|
86
|
+
var g = window.document.cookie, z = encodeURIComponent(v), ie = g.indexOf(z + "=");
|
|
87
|
+
ie !== -1 && (d = /^([^;]+)/.exec(
|
|
88
|
+
g.slice(ie + z.length + 1)
|
|
88
89
|
)[1]);
|
|
89
90
|
} catch {
|
|
90
91
|
}
|
|
91
92
|
return u.levels[d] === void 0 && (d = void 0), d;
|
|
92
93
|
}
|
|
93
94
|
}
|
|
94
|
-
function
|
|
95
|
+
function Le() {
|
|
95
96
|
if (!(typeof window === n || !v)) {
|
|
96
97
|
try {
|
|
97
98
|
window.localStorage.removeItem(v);
|
|
@@ -119,11 +120,11 @@ function He() {
|
|
|
119
120
|
}, u.methodFactory = m || T, u.getLevel = function() {
|
|
120
121
|
return R ?? M ?? O;
|
|
121
122
|
}, u.setLevel = function(d, g) {
|
|
122
|
-
return R = U(d), g !== !1 &&
|
|
123
|
+
return R = U(d), g !== !1 && Ce(R), f.call(u);
|
|
123
124
|
}, u.setDefaultLevel = function(d) {
|
|
124
|
-
M = U(d),
|
|
125
|
+
M = U(d), re() || u.setLevel(d, !1);
|
|
125
126
|
}, u.resetLevel = function() {
|
|
126
|
-
R = null,
|
|
127
|
+
R = null, Le(), f.call(u);
|
|
127
128
|
}, u.enableAll = function(d) {
|
|
128
129
|
u.setLevel(u.levels.TRACE, d);
|
|
129
130
|
}, u.disableAll = function(d) {
|
|
@@ -135,8 +136,8 @@ function He() {
|
|
|
135
136
|
}, O = U(
|
|
136
137
|
i ? i.getLevel() : "WARN"
|
|
137
138
|
);
|
|
138
|
-
var
|
|
139
|
-
|
|
139
|
+
var oe = re();
|
|
140
|
+
oe != null && (R = U(oe)), f.call(u);
|
|
140
141
|
}
|
|
141
142
|
i = new h(), i.getLogger = function(m) {
|
|
142
143
|
if (typeof m != "symbol" && typeof m != "string" || m === "")
|
|
@@ -156,12 +157,12 @@ function He() {
|
|
|
156
157
|
});
|
|
157
158
|
}(N)), N.exports;
|
|
158
159
|
}
|
|
159
|
-
var
|
|
160
|
-
const
|
|
161
|
-
let
|
|
162
|
-
var D,
|
|
163
|
-
(typeof navigator > "u" || !((
|
|
164
|
-
function
|
|
160
|
+
var Fe = $e();
|
|
161
|
+
const se = /* @__PURE__ */ Oe(Fe);
|
|
162
|
+
let Z;
|
|
163
|
+
var D, we;
|
|
164
|
+
(typeof navigator > "u" || !((we = (D = navigator.userAgent) == null ? void 0 : D.startsWith) != null && we.call(D, "Mozilla/5.0 "))) && (Z = "oauth4webapi/v2.17.0");
|
|
165
|
+
function Q(t, e) {
|
|
165
166
|
if (t == null)
|
|
166
167
|
return !1;
|
|
167
168
|
try {
|
|
@@ -170,19 +171,19 @@ function Y(t, e) {
|
|
|
170
171
|
return !1;
|
|
171
172
|
}
|
|
172
173
|
}
|
|
173
|
-
const W = Symbol(),
|
|
174
|
+
const W = Symbol(), Me = Symbol(), X = Symbol(), me = Symbol(), qe = Symbol(), Be = Symbol(), Ve = new TextEncoder(), Ge = new TextDecoder();
|
|
174
175
|
function E(t) {
|
|
175
|
-
return typeof t == "string" ?
|
|
176
|
+
return typeof t == "string" ? Ve.encode(t) : Ge.decode(t);
|
|
176
177
|
}
|
|
177
|
-
const
|
|
178
|
-
function
|
|
178
|
+
const ce = 32768;
|
|
179
|
+
function Ze(t) {
|
|
179
180
|
t instanceof ArrayBuffer && (t = new Uint8Array(t));
|
|
180
181
|
const e = [];
|
|
181
|
-
for (let n = 0; n < t.byteLength; n +=
|
|
182
|
-
e.push(String.fromCharCode.apply(null, t.subarray(n, n +
|
|
182
|
+
for (let n = 0; n < t.byteLength; n += ce)
|
|
183
|
+
e.push(String.fromCharCode.apply(null, t.subarray(n, n + ce)));
|
|
183
184
|
return btoa(e.join("")).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
|
|
184
185
|
}
|
|
185
|
-
function
|
|
186
|
+
function Ye(t) {
|
|
186
187
|
try {
|
|
187
188
|
const e = atob(t.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "")), n = new Uint8Array(e.length);
|
|
188
189
|
for (let o = 0; o < e.length; o++)
|
|
@@ -193,9 +194,9 @@ function Ze(t) {
|
|
|
193
194
|
}
|
|
194
195
|
}
|
|
195
196
|
function A(t) {
|
|
196
|
-
return typeof t == "string" ?
|
|
197
|
+
return typeof t == "string" ? Ye(t) : Ze(t);
|
|
197
198
|
}
|
|
198
|
-
class
|
|
199
|
+
class Qe {
|
|
199
200
|
constructor(e) {
|
|
200
201
|
this.cache = /* @__PURE__ */ new Map(), this._cache = /* @__PURE__ */ new Map(), this.maxSize = e;
|
|
201
202
|
}
|
|
@@ -225,23 +226,23 @@ class S extends Error {
|
|
|
225
226
|
super(e ?? "operation not supported"), this.name = this.constructor.name, (n = Error.captureStackTrace) == null || n.call(Error, this, this.constructor);
|
|
226
227
|
}
|
|
227
228
|
}
|
|
228
|
-
class
|
|
229
|
+
class Xe extends Error {
|
|
229
230
|
constructor(e, n) {
|
|
230
231
|
var o;
|
|
231
232
|
super(e, n), this.name = this.constructor.name, (o = Error.captureStackTrace) == null || o.call(Error, this, this.constructor);
|
|
232
233
|
}
|
|
233
234
|
}
|
|
234
|
-
const s =
|
|
235
|
+
const s = Xe, ge = new Qe(100);
|
|
235
236
|
function ye(t) {
|
|
236
237
|
return t instanceof CryptoKey;
|
|
237
238
|
}
|
|
238
239
|
function _e(t) {
|
|
239
240
|
return ye(t) && t.type === "private";
|
|
240
241
|
}
|
|
241
|
-
function
|
|
242
|
+
function et(t) {
|
|
242
243
|
return ye(t) && t.type === "public";
|
|
243
244
|
}
|
|
244
|
-
function
|
|
245
|
+
function ee(t) {
|
|
245
246
|
try {
|
|
246
247
|
const e = t.headers.get("dpop-nonce");
|
|
247
248
|
e && ge.set(new URL(t.url).origin, e);
|
|
@@ -249,24 +250,24 @@ function X(t) {
|
|
|
249
250
|
}
|
|
250
251
|
return t;
|
|
251
252
|
}
|
|
252
|
-
function
|
|
253
|
+
function C(t) {
|
|
253
254
|
return !(t === null || typeof t != "object" || Array.isArray(t));
|
|
254
255
|
}
|
|
255
256
|
function H(t) {
|
|
256
|
-
|
|
257
|
+
Q(t, Headers) && (t = Object.fromEntries(t.entries()));
|
|
257
258
|
const e = new Headers(t);
|
|
258
|
-
if (
|
|
259
|
+
if (Z && !e.has("user-agent") && e.set("user-agent", Z), e.has("authorization"))
|
|
259
260
|
throw new TypeError('"options.headers" must not include the "authorization" header name');
|
|
260
261
|
if (e.has("dpop"))
|
|
261
262
|
throw new TypeError('"options.headers" must not include the "dpop" header name');
|
|
262
263
|
return e;
|
|
263
264
|
}
|
|
264
|
-
function
|
|
265
|
+
function te(t) {
|
|
265
266
|
if (typeof t == "function" && (t = t()), !(t instanceof AbortSignal))
|
|
266
267
|
throw new TypeError('"options.signal" must return or be an instance of AbortSignal');
|
|
267
268
|
return t;
|
|
268
269
|
}
|
|
269
|
-
async function
|
|
270
|
+
async function tt(t, e) {
|
|
270
271
|
if (!(t instanceof URL))
|
|
271
272
|
throw new TypeError('"issuerIdentifier" must be an instance of URL');
|
|
272
273
|
if (t.protocol !== "https:" && t.protocol !== "http:")
|
|
@@ -284,31 +285,31 @@ async function et(t, e) {
|
|
|
284
285
|
throw new TypeError('"options.algorithm" must be "oidc" (default), or "oauth2"');
|
|
285
286
|
}
|
|
286
287
|
const o = H(e == null ? void 0 : e.headers);
|
|
287
|
-
return o.set("accept", "application/json"), ((e == null ? void 0 : e[
|
|
288
|
+
return o.set("accept", "application/json"), ((e == null ? void 0 : e[X]) || fetch)(n.href, {
|
|
288
289
|
headers: Object.fromEntries(o.entries()),
|
|
289
290
|
method: "GET",
|
|
290
291
|
redirect: "manual",
|
|
291
|
-
signal: e != null && e.signal ?
|
|
292
|
-
}).then(
|
|
292
|
+
signal: e != null && e.signal ? te(e.signal) : null
|
|
293
|
+
}).then(ee);
|
|
293
294
|
}
|
|
294
295
|
function w(t) {
|
|
295
296
|
return typeof t == "string" && t.length !== 0;
|
|
296
297
|
}
|
|
297
|
-
async function
|
|
298
|
+
async function nt(t, e) {
|
|
298
299
|
if (!(t instanceof URL))
|
|
299
300
|
throw new TypeError('"expectedIssuer" must be an instance of URL');
|
|
300
|
-
if (!
|
|
301
|
+
if (!Q(e, Response))
|
|
301
302
|
throw new TypeError('"response" must be an instance of Response');
|
|
302
303
|
if (e.status !== 200)
|
|
303
304
|
throw new s('"response" is not a conform Authorization Server Metadata response');
|
|
304
|
-
|
|
305
|
+
ne(e);
|
|
305
306
|
let n;
|
|
306
307
|
try {
|
|
307
308
|
n = await e.json();
|
|
308
309
|
} catch (o) {
|
|
309
310
|
throw new s('failed to parse "response" body as JSON', { cause: o });
|
|
310
311
|
}
|
|
311
|
-
if (!
|
|
312
|
+
if (!C(n))
|
|
312
313
|
throw new s('"response" body must be a top level object');
|
|
313
314
|
if (!w(n.issuer))
|
|
314
315
|
throw new s('"response" body "issuer" property must be a non-empty string');
|
|
@@ -319,18 +320,18 @@ async function tt(t, e) {
|
|
|
319
320
|
function $() {
|
|
320
321
|
return A(crypto.getRandomValues(new Uint8Array(32)));
|
|
321
322
|
}
|
|
322
|
-
function
|
|
323
|
+
function rt() {
|
|
323
324
|
return $();
|
|
324
325
|
}
|
|
325
|
-
function
|
|
326
|
+
function ot() {
|
|
326
327
|
return $();
|
|
327
328
|
}
|
|
328
|
-
async function
|
|
329
|
+
async function it(t) {
|
|
329
330
|
if (!w(t))
|
|
330
331
|
throw new TypeError('"codeVerifier" must be a non-empty string');
|
|
331
332
|
return A(await crypto.subtle.digest("SHA-256", E(t)));
|
|
332
333
|
}
|
|
333
|
-
function
|
|
334
|
+
function at(t) {
|
|
334
335
|
if (t instanceof CryptoKey)
|
|
335
336
|
return { key: t };
|
|
336
337
|
if (!((t == null ? void 0 : t.key) instanceof CryptoKey))
|
|
@@ -343,14 +344,14 @@ function it(t) {
|
|
|
343
344
|
modifyAssertion: t[me]
|
|
344
345
|
};
|
|
345
346
|
}
|
|
346
|
-
function
|
|
347
|
+
function ue(t) {
|
|
347
348
|
return encodeURIComponent(t).replace(/%20/g, "+");
|
|
348
349
|
}
|
|
349
|
-
function
|
|
350
|
-
const n =
|
|
350
|
+
function st(t, e) {
|
|
351
|
+
const n = ue(t), o = ue(e);
|
|
351
352
|
return `Basic ${btoa(`${n}:${o}`)}`;
|
|
352
353
|
}
|
|
353
|
-
function
|
|
354
|
+
function ct(t) {
|
|
354
355
|
switch (t.algorithm.hash.name) {
|
|
355
356
|
case "SHA-256":
|
|
356
357
|
return "PS256";
|
|
@@ -362,7 +363,7 @@ function st(t) {
|
|
|
362
363
|
throw new S("unsupported RsaHashedKeyAlgorithm hash name");
|
|
363
364
|
}
|
|
364
365
|
}
|
|
365
|
-
function
|
|
366
|
+
function ut(t) {
|
|
366
367
|
switch (t.algorithm.hash.name) {
|
|
367
368
|
case "SHA-256":
|
|
368
369
|
return "RS256";
|
|
@@ -374,7 +375,7 @@ function ct(t) {
|
|
|
374
375
|
throw new S("unsupported RsaHashedKeyAlgorithm hash name");
|
|
375
376
|
}
|
|
376
377
|
}
|
|
377
|
-
function
|
|
378
|
+
function lt(t) {
|
|
378
379
|
switch (t.algorithm.namedCurve) {
|
|
379
380
|
case "P-256":
|
|
380
381
|
return "ES256";
|
|
@@ -389,11 +390,11 @@ function ut(t) {
|
|
|
389
390
|
function be(t) {
|
|
390
391
|
switch (t.algorithm.name) {
|
|
391
392
|
case "RSA-PSS":
|
|
392
|
-
return st(t);
|
|
393
|
-
case "RSASSA-PKCS1-v1_5":
|
|
394
393
|
return ct(t);
|
|
395
|
-
case "
|
|
394
|
+
case "RSASSA-PKCS1-v1_5":
|
|
396
395
|
return ut(t);
|
|
396
|
+
case "ECDSA":
|
|
397
|
+
return lt(t);
|
|
397
398
|
case "Ed25519":
|
|
398
399
|
case "Ed448":
|
|
399
400
|
return "EdDSA";
|
|
@@ -401,19 +402,19 @@ function be(t) {
|
|
|
401
402
|
throw new S("unsupported CryptoKey algorithm name");
|
|
402
403
|
}
|
|
403
404
|
}
|
|
404
|
-
function
|
|
405
|
+
function L(t) {
|
|
405
406
|
const e = t == null ? void 0 : t[W];
|
|
406
407
|
return typeof e == "number" && Number.isFinite(e) ? e : 0;
|
|
407
408
|
}
|
|
408
409
|
function ve(t) {
|
|
409
|
-
const e = t == null ? void 0 : t[
|
|
410
|
+
const e = t == null ? void 0 : t[Me];
|
|
410
411
|
return typeof e == "number" && Number.isFinite(e) && Math.sign(e) !== -1 ? e : 30;
|
|
411
412
|
}
|
|
412
413
|
function F() {
|
|
413
414
|
return Math.floor(Date.now() / 1e3);
|
|
414
415
|
}
|
|
415
|
-
function
|
|
416
|
-
const n = F() +
|
|
416
|
+
function dt(t, e) {
|
|
417
|
+
const n = F() + L(e);
|
|
417
418
|
return {
|
|
418
419
|
jti: $(),
|
|
419
420
|
aud: [t.issuer, t.token_endpoint],
|
|
@@ -424,8 +425,8 @@ function lt(t, e) {
|
|
|
424
425
|
sub: e.client_id
|
|
425
426
|
};
|
|
426
427
|
}
|
|
427
|
-
async function
|
|
428
|
-
const r = { alg: be(n), kid: o }, i =
|
|
428
|
+
async function ht(t, e, n, o, a) {
|
|
429
|
+
const r = { alg: be(n), kid: o }, i = dt(t, e);
|
|
429
430
|
return a == null || a(r, i), Se(r, i, n);
|
|
430
431
|
}
|
|
431
432
|
function I(t) {
|
|
@@ -442,7 +443,7 @@ function j(t) {
|
|
|
442
443
|
throw new TypeError('"client.client_id" property must be a non-empty string');
|
|
443
444
|
return !0;
|
|
444
445
|
}
|
|
445
|
-
function
|
|
446
|
+
function le(t) {
|
|
446
447
|
if (!w(t))
|
|
447
448
|
throw new TypeError('"client.client_secret" property must be a non-empty string');
|
|
448
449
|
return t;
|
|
@@ -451,34 +452,34 @@ function q(t, e) {
|
|
|
451
452
|
if (e !== void 0)
|
|
452
453
|
throw new TypeError(`"options.clientPrivateKey" property must not be provided when ${t} client authentication method is used.`);
|
|
453
454
|
}
|
|
454
|
-
function
|
|
455
|
+
function de(t, e) {
|
|
455
456
|
if (e !== void 0)
|
|
456
457
|
throw new TypeError(`"client.client_secret" property must not be provided when ${t} client authentication method is used.`);
|
|
457
458
|
}
|
|
458
|
-
async function
|
|
459
|
+
async function ft(t, e, n, o, a) {
|
|
459
460
|
switch (n.delete("client_secret"), n.delete("client_assertion_type"), n.delete("client_assertion"), e.token_endpoint_auth_method) {
|
|
460
461
|
case void 0:
|
|
461
462
|
case "client_secret_basic": {
|
|
462
|
-
q("client_secret_basic", a), o.set("authorization",
|
|
463
|
+
q("client_secret_basic", a), o.set("authorization", st(e.client_id, le(e.client_secret)));
|
|
463
464
|
break;
|
|
464
465
|
}
|
|
465
466
|
case "client_secret_post": {
|
|
466
|
-
q("client_secret_post", a), n.set("client_id", e.client_id), n.set("client_secret",
|
|
467
|
+
q("client_secret_post", a), n.set("client_id", e.client_id), n.set("client_secret", le(e.client_secret));
|
|
467
468
|
break;
|
|
468
469
|
}
|
|
469
470
|
case "private_key_jwt": {
|
|
470
|
-
if (
|
|
471
|
+
if (de("private_key_jwt", e.client_secret), a === void 0)
|
|
471
472
|
throw new TypeError('"options.clientPrivateKey" must be provided when "client.token_endpoint_auth_method" is "private_key_jwt"');
|
|
472
|
-
const { key: r, kid: i, modifyAssertion: c } =
|
|
473
|
+
const { key: r, kid: i, modifyAssertion: c } = at(a);
|
|
473
474
|
if (!_e(r))
|
|
474
475
|
throw new TypeError('"options.clientPrivateKey.key" must be a private CryptoKey');
|
|
475
|
-
n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await
|
|
476
|
+
n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await ht(t, e, r, i, c));
|
|
476
477
|
break;
|
|
477
478
|
}
|
|
478
479
|
case "tls_client_auth":
|
|
479
480
|
case "self_signed_tls_client_auth":
|
|
480
481
|
case "none": {
|
|
481
|
-
|
|
482
|
+
de(e.token_endpoint_auth_method, e.client_secret), q(e.token_endpoint_auth_method, a), n.set("client_id", e.client_id);
|
|
482
483
|
break;
|
|
483
484
|
}
|
|
484
485
|
default:
|
|
@@ -491,12 +492,12 @@ async function Se(t, e, n) {
|
|
|
491
492
|
const o = `${A(E(JSON.stringify(t)))}.${A(E(JSON.stringify(e)))}`, a = A(await crypto.subtle.sign(Ue(n), n, E(o)));
|
|
492
493
|
return `${o}.${a}`;
|
|
493
494
|
}
|
|
494
|
-
async function
|
|
495
|
+
async function pt(t, e, n, o, a, r) {
|
|
495
496
|
var T;
|
|
496
497
|
const { privateKey: i, publicKey: c, nonce: p = ge.get(n.origin) } = e;
|
|
497
498
|
if (!_e(i))
|
|
498
499
|
throw new TypeError('"DPoP.privateKey" must be a private CryptoKey');
|
|
499
|
-
if (!
|
|
500
|
+
if (!et(c))
|
|
500
501
|
throw new TypeError('"DPoP.publicKey" must be a public CryptoKey');
|
|
501
502
|
if (p !== void 0 && !w(p))
|
|
502
503
|
throw new TypeError('"DPoP.nonce" must be a non-empty string or undefined');
|
|
@@ -505,7 +506,7 @@ async function ft(t, e, n, o, a, r) {
|
|
|
505
506
|
const b = F() + a, f = {
|
|
506
507
|
alg: be(i),
|
|
507
508
|
typ: "dpop+jwt",
|
|
508
|
-
jwk: await
|
|
509
|
+
jwk: await mt(c)
|
|
509
510
|
}, y = {
|
|
510
511
|
iat: b,
|
|
511
512
|
jti: $(),
|
|
@@ -517,72 +518,72 @@ async function ft(t, e, n, o, a, r) {
|
|
|
517
518
|
(T = e[me]) == null || T.call(e, f, y), t.set("dpop", await Se(f, y, i));
|
|
518
519
|
}
|
|
519
520
|
let K;
|
|
520
|
-
async function
|
|
521
|
+
async function wt(t) {
|
|
521
522
|
const { kty: e, e: n, n: o, x: a, y: r, crv: i } = await crypto.subtle.exportKey("jwk", t), c = { kty: e, e: n, n: o, x: a, y: r, crv: i };
|
|
522
523
|
return K.set(t, c), c;
|
|
523
524
|
}
|
|
524
|
-
async function
|
|
525
|
-
return K || (K = /* @__PURE__ */ new WeakMap()), K.get(t) ||
|
|
525
|
+
async function mt(t) {
|
|
526
|
+
return K || (K = /* @__PURE__ */ new WeakMap()), K.get(t) || wt(t);
|
|
526
527
|
}
|
|
527
|
-
function
|
|
528
|
+
function he(t, e, n) {
|
|
528
529
|
if (typeof t != "string")
|
|
529
530
|
throw n ? new TypeError(`"as.mtls_endpoint_aliases.${e}" must be a string`) : new TypeError(`"as.${e}" must be a string`);
|
|
530
531
|
return new URL(t);
|
|
531
532
|
}
|
|
532
533
|
function Te(t, e, n = !1) {
|
|
533
|
-
return n && t.mtls_endpoint_aliases && e in t.mtls_endpoint_aliases ?
|
|
534
|
+
return n && t.mtls_endpoint_aliases && e in t.mtls_endpoint_aliases ? he(t.mtls_endpoint_aliases[e], e, n) : he(t[e], e, n);
|
|
534
535
|
}
|
|
535
536
|
function ke(t, e) {
|
|
536
|
-
return !!(t.use_mtls_endpoint_aliases || e != null && e[
|
|
537
|
+
return !!(t.use_mtls_endpoint_aliases || e != null && e[Be]);
|
|
537
538
|
}
|
|
538
|
-
function
|
|
539
|
+
function Y(t) {
|
|
539
540
|
const e = t;
|
|
540
541
|
return typeof e != "object" || Array.isArray(e) || e === null ? !1 : e.error !== void 0;
|
|
541
542
|
}
|
|
542
|
-
async function
|
|
543
|
+
async function gt(t, e, n, o, a, r) {
|
|
543
544
|
if (!w(t))
|
|
544
545
|
throw new TypeError('"accessToken" must be a non-empty string');
|
|
545
546
|
if (!(n instanceof URL))
|
|
546
547
|
throw new TypeError('"url" must be an instance of URL');
|
|
547
|
-
return o = H(o), (r == null ? void 0 : r.DPoP) === void 0 ? o.set("authorization", `Bearer ${t}`) : (await
|
|
548
|
+
return o = H(o), (r == null ? void 0 : r.DPoP) === void 0 ? o.set("authorization", `Bearer ${t}`) : (await pt(o, r.DPoP, n, e.toUpperCase(), L({ [W]: r == null ? void 0 : r[W] }), t), o.set("authorization", `DPoP ${t}`)), ((r == null ? void 0 : r[X]) || fetch)(n.href, {
|
|
548
549
|
body: a,
|
|
549
550
|
headers: Object.fromEntries(o.entries()),
|
|
550
551
|
method: e,
|
|
551
552
|
redirect: "manual",
|
|
552
|
-
signal: r != null && r.signal ?
|
|
553
|
-
}).then(
|
|
553
|
+
signal: r != null && r.signal ? te(r.signal) : null
|
|
554
|
+
}).then(ee);
|
|
554
555
|
}
|
|
555
|
-
async function
|
|
556
|
+
async function yt(t, e, n, o) {
|
|
556
557
|
I(t), j(e);
|
|
557
558
|
const a = Te(t, "userinfo_endpoint", ke(e, o)), r = H(o == null ? void 0 : o.headers);
|
|
558
|
-
return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")),
|
|
559
|
+
return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")), gt(n, "GET", a, r, null, {
|
|
559
560
|
...o,
|
|
560
|
-
[W]:
|
|
561
|
+
[W]: L(e)
|
|
561
562
|
});
|
|
562
563
|
}
|
|
563
|
-
async function
|
|
564
|
-
return await
|
|
564
|
+
async function _t(t, e, n, o, a, r, i) {
|
|
565
|
+
return await ft(t, e, a, r, i == null ? void 0 : i.clientPrivateKey), r.set("content-type", "application/x-www-form-urlencoded;charset=UTF-8"), ((i == null ? void 0 : i[X]) || fetch)(o.href, {
|
|
565
566
|
body: a,
|
|
566
567
|
headers: Object.fromEntries(r.entries()),
|
|
567
568
|
method: n,
|
|
568
569
|
redirect: "manual",
|
|
569
|
-
signal: i != null && i.signal ?
|
|
570
|
-
}).then(
|
|
570
|
+
signal: i != null && i.signal ? te(i.signal) : null
|
|
571
|
+
}).then(ee);
|
|
571
572
|
}
|
|
572
573
|
async function Ae(t, e, n, o, a) {
|
|
573
574
|
const r = Te(t, "token_endpoint", ke(e, a));
|
|
574
575
|
o.set("grant_type", n);
|
|
575
576
|
const i = H(a == null ? void 0 : a.headers);
|
|
576
|
-
return i.set("accept", "application/json"),
|
|
577
|
+
return i.set("accept", "application/json"), _t(t, e, "POST", r, o, i, a);
|
|
577
578
|
}
|
|
578
|
-
async function
|
|
579
|
+
async function bt(t, e, n, o) {
|
|
579
580
|
if (I(t), j(e), !w(n))
|
|
580
581
|
throw new TypeError('"refreshToken" must be a non-empty string');
|
|
581
582
|
const a = new URLSearchParams(o == null ? void 0 : o.additionalParameters);
|
|
582
583
|
return a.set("refresh_token", n), Ae(t, e, "refresh_token", a, o);
|
|
583
584
|
}
|
|
584
585
|
const Ee = /* @__PURE__ */ new WeakMap();
|
|
585
|
-
function
|
|
586
|
+
function vt(t) {
|
|
586
587
|
if (!t.id_token)
|
|
587
588
|
return;
|
|
588
589
|
const e = Ee.get(t);
|
|
@@ -591,22 +592,22 @@ function bt(t) {
|
|
|
591
592
|
return e[0];
|
|
592
593
|
}
|
|
593
594
|
async function Re(t, e, n, o = !1, a = !1) {
|
|
594
|
-
if (I(t), j(e), !
|
|
595
|
+
if (I(t), j(e), !Q(n, Response))
|
|
595
596
|
throw new TypeError('"response" must be an instance of Response');
|
|
596
597
|
if (n.status !== 200) {
|
|
597
598
|
let i;
|
|
598
|
-
if (i = await
|
|
599
|
+
if (i = await Ct(n))
|
|
599
600
|
return i;
|
|
600
601
|
throw new s('"response" is not a conform Token Endpoint response');
|
|
601
602
|
}
|
|
602
|
-
|
|
603
|
+
ne(n);
|
|
603
604
|
let r;
|
|
604
605
|
try {
|
|
605
606
|
r = await n.json();
|
|
606
607
|
} catch (i) {
|
|
607
608
|
throw new s('failed to parse "response" body as JSON', { cause: i });
|
|
608
609
|
}
|
|
609
|
-
if (!
|
|
610
|
+
if (!C(r))
|
|
610
611
|
throw new s('"response" body must be a top level object');
|
|
611
612
|
if (!w(r.access_token))
|
|
612
613
|
throw new s('"response" body "access_token" property must be a non-empty string');
|
|
@@ -624,7 +625,7 @@ async function Re(t, e, n, o = !1, a = !1) {
|
|
|
624
625
|
if (r.id_token !== void 0 && !w(r.id_token))
|
|
625
626
|
throw new s('"response" body "id_token" property must be a non-empty string');
|
|
626
627
|
if (r.id_token) {
|
|
627
|
-
const { claims: i, jwt: c } = await
|
|
628
|
+
const { claims: i, jwt: c } = await jt(r.id_token, Jt.bind(void 0, e.id_token_signed_response_alg, t.id_token_signing_alg_values_supported), xe, L(e), ve(e), e[qe]).then(Pt.bind(void 0, ["aud", "exp", "iat", "iss", "sub"])).then(kt.bind(void 0, t.issuer)).then(Tt.bind(void 0, e.client_id));
|
|
628
629
|
if (Array.isArray(i.aud) && i.aud.length !== 1) {
|
|
629
630
|
if (i.azp === void 0)
|
|
630
631
|
throw new s('ID Token "aud" (audience) claim includes additional untrusted audiences');
|
|
@@ -638,10 +639,10 @@ async function Re(t, e, n, o = !1, a = !1) {
|
|
|
638
639
|
}
|
|
639
640
|
return r;
|
|
640
641
|
}
|
|
641
|
-
async function
|
|
642
|
+
async function St(t, e, n) {
|
|
642
643
|
return Re(t, e, n);
|
|
643
644
|
}
|
|
644
|
-
function
|
|
645
|
+
function Tt(t, e) {
|
|
645
646
|
if (Array.isArray(e.claims.aud)) {
|
|
646
647
|
if (!e.claims.aud.includes(t))
|
|
647
648
|
throw new s('unexpected JWT "aud" (audience) claim value');
|
|
@@ -649,16 +650,16 @@ function St(t, e) {
|
|
|
649
650
|
throw new s('unexpected JWT "aud" (audience) claim value');
|
|
650
651
|
return e;
|
|
651
652
|
}
|
|
652
|
-
function
|
|
653
|
+
function kt(t, e) {
|
|
653
654
|
if (e.claims.iss !== t)
|
|
654
655
|
throw new s('unexpected JWT "iss" (issuer) claim value');
|
|
655
656
|
return e;
|
|
656
657
|
}
|
|
657
658
|
const Pe = /* @__PURE__ */ new WeakSet();
|
|
658
|
-
function
|
|
659
|
+
function At(t) {
|
|
659
660
|
return Pe.add(t), t;
|
|
660
661
|
}
|
|
661
|
-
async function
|
|
662
|
+
async function Et(t, e, n, o, a, r) {
|
|
662
663
|
if (I(t), j(e), !Pe.has(n))
|
|
663
664
|
throw new TypeError('"callbackParameters" must be an instance of URLSearchParams obtained from "validateAuthResponse()", or "validateJwtAuthResponse()');
|
|
664
665
|
if (!w(o))
|
|
@@ -671,7 +672,7 @@ async function At(t, e, n, o, a, r) {
|
|
|
671
672
|
const c = new URLSearchParams(r == null ? void 0 : r.additionalParameters);
|
|
672
673
|
return c.set("redirect_uri", o), c.set("code_verifier", a), c.set("code", i), Ae(t, e, "authorization_code", c, r);
|
|
673
674
|
}
|
|
674
|
-
const
|
|
675
|
+
const Rt = {
|
|
675
676
|
aud: "audience",
|
|
676
677
|
c_hash: "code hash",
|
|
677
678
|
client_id: "client id",
|
|
@@ -687,33 +688,33 @@ const Et = {
|
|
|
687
688
|
htu: "http uri",
|
|
688
689
|
cnf: "confirmation"
|
|
689
690
|
};
|
|
690
|
-
function
|
|
691
|
+
function Pt(t, e) {
|
|
691
692
|
for (const n of t)
|
|
692
693
|
if (e.claims[n] === void 0)
|
|
693
|
-
throw new s(`JWT "${n}" (${
|
|
694
|
+
throw new s(`JWT "${n}" (${Rt[n]}) claim missing`);
|
|
694
695
|
return e;
|
|
695
696
|
}
|
|
696
|
-
const
|
|
697
|
-
async function
|
|
697
|
+
const Ut = Symbol(), B = Symbol();
|
|
698
|
+
async function xt(t, e, n, o, a) {
|
|
698
699
|
const r = await Re(t, e, n);
|
|
699
|
-
if (
|
|
700
|
+
if (Y(r))
|
|
700
701
|
return r;
|
|
701
702
|
if (!w(r.id_token))
|
|
702
703
|
throw new s('"response" body "id_token" property must be a non-empty string');
|
|
703
704
|
a ?? (a = e.default_max_age ?? B);
|
|
704
|
-
const i =
|
|
705
|
+
const i = vt(r);
|
|
705
706
|
if ((e.require_auth_time || a !== B) && i.auth_time === void 0)
|
|
706
707
|
throw new s('ID Token "auth_time" (authentication time) claim missing');
|
|
707
708
|
if (a !== B) {
|
|
708
709
|
if (typeof a != "number" || a < 0)
|
|
709
710
|
throw new TypeError('"maxAge" must be a non-negative number');
|
|
710
|
-
const c = F() +
|
|
711
|
+
const c = F() + L(e), p = ve(e);
|
|
711
712
|
if (i.auth_time + a < c - p)
|
|
712
713
|
throw new s("too much time has elapsed since the last End-User authentication");
|
|
713
714
|
}
|
|
714
715
|
switch (o) {
|
|
715
716
|
case void 0:
|
|
716
|
-
case
|
|
717
|
+
case Ut:
|
|
717
718
|
if (i.nonce !== void 0)
|
|
718
719
|
throw new s('unexpected ID Token "nonce" claim value');
|
|
719
720
|
break;
|
|
@@ -727,26 +728,26 @@ async function Ut(t, e, n, o, a) {
|
|
|
727
728
|
}
|
|
728
729
|
return r;
|
|
729
730
|
}
|
|
730
|
-
function
|
|
731
|
+
function ne(t) {
|
|
731
732
|
if (t.bodyUsed)
|
|
732
733
|
throw new TypeError('"response" body has been used already');
|
|
733
734
|
}
|
|
734
|
-
async function
|
|
735
|
+
async function Ct(t) {
|
|
735
736
|
if (t.status > 399 && t.status < 500) {
|
|
736
|
-
|
|
737
|
+
ne(t);
|
|
737
738
|
try {
|
|
738
739
|
const e = await t.json();
|
|
739
|
-
if (
|
|
740
|
+
if (C(e) && typeof e.error == "string" && e.error.length)
|
|
740
741
|
return e.error_description !== void 0 && typeof e.error_description != "string" && delete e.error_description, e.error_uri !== void 0 && typeof e.error_uri != "string" && delete e.error_uri, e.algs !== void 0 && typeof e.algs != "string" && delete e.algs, e.scope !== void 0 && typeof e.scope != "string" && delete e.scope, e;
|
|
741
742
|
} catch {
|
|
742
743
|
}
|
|
743
744
|
}
|
|
744
745
|
}
|
|
745
|
-
function
|
|
746
|
+
function fe(t) {
|
|
746
747
|
if (typeof t.modulusLength != "number" || t.modulusLength < 2048)
|
|
747
748
|
throw new s(`${t.name} modulusLength must be at least 2048 bits`);
|
|
748
749
|
}
|
|
749
|
-
function
|
|
750
|
+
function Lt(t) {
|
|
750
751
|
switch (t) {
|
|
751
752
|
case "P-256":
|
|
752
753
|
return "SHA-256";
|
|
@@ -763,10 +764,10 @@ function Ue(t) {
|
|
|
763
764
|
case "ECDSA":
|
|
764
765
|
return {
|
|
765
766
|
name: t.algorithm.name,
|
|
766
|
-
hash:
|
|
767
|
+
hash: Lt(t.algorithm.namedCurve)
|
|
767
768
|
};
|
|
768
769
|
case "RSA-PSS":
|
|
769
|
-
switch (
|
|
770
|
+
switch (fe(t.algorithm), t.algorithm.hash.name) {
|
|
770
771
|
case "SHA-256":
|
|
771
772
|
case "SHA-384":
|
|
772
773
|
case "SHA-512":
|
|
@@ -778,20 +779,20 @@ function Ue(t) {
|
|
|
778
779
|
throw new S();
|
|
779
780
|
}
|
|
780
781
|
case "RSASSA-PKCS1-v1_5":
|
|
781
|
-
return
|
|
782
|
+
return fe(t.algorithm), t.algorithm.name;
|
|
782
783
|
case "Ed448":
|
|
783
784
|
case "Ed25519":
|
|
784
785
|
return t.algorithm.name;
|
|
785
786
|
}
|
|
786
787
|
throw new S();
|
|
787
788
|
}
|
|
788
|
-
const
|
|
789
|
-
async function
|
|
789
|
+
const xe = Symbol();
|
|
790
|
+
async function It(t, e, n, o) {
|
|
790
791
|
const a = `${t}.${e}`;
|
|
791
792
|
if (!await crypto.subtle.verify(Ue(n), n, o, E(a)))
|
|
792
793
|
throw new s("JWT signature verification failed");
|
|
793
794
|
}
|
|
794
|
-
async function
|
|
795
|
+
async function jt(t, e, n, o, a, r) {
|
|
795
796
|
let { 0: i, 1: c, 2: p, length: b } = t.split(".");
|
|
796
797
|
if (b === 5)
|
|
797
798
|
if (r !== void 0)
|
|
@@ -806,20 +807,20 @@ async function It(t, e, n, o, a, r) {
|
|
|
806
807
|
} catch (l) {
|
|
807
808
|
throw new s("failed to parse JWT Header body as base64url encoded JSON", { cause: l });
|
|
808
809
|
}
|
|
809
|
-
if (!
|
|
810
|
+
if (!C(f))
|
|
810
811
|
throw new s("JWT Header must be a top level object");
|
|
811
812
|
if (e(f), f.crit !== void 0)
|
|
812
813
|
throw new s('unexpected JWT "crit" header parameter');
|
|
813
814
|
const y = A(p);
|
|
814
815
|
let T;
|
|
815
|
-
n !==
|
|
816
|
+
n !== xe && (T = await n(f), await It(i, c, T, y));
|
|
816
817
|
let h;
|
|
817
818
|
try {
|
|
818
819
|
h = JSON.parse(E(A(c)));
|
|
819
820
|
} catch (l) {
|
|
820
821
|
throw new s("failed to parse JWT Payload body as base64url encoded JSON", { cause: l });
|
|
821
822
|
}
|
|
822
|
-
if (!
|
|
823
|
+
if (!C(h))
|
|
823
824
|
throw new s("JWT Payload must be a top level object");
|
|
824
825
|
const J = F() + o;
|
|
825
826
|
if (h.exp !== void 0) {
|
|
@@ -842,7 +843,7 @@ async function It(t, e, n, o, a, r) {
|
|
|
842
843
|
throw new s('unexpected JWT "aud" (audience) claim type');
|
|
843
844
|
return { header: f, claims: h, signature: y, key: T, jwt: t };
|
|
844
845
|
}
|
|
845
|
-
function
|
|
846
|
+
function Jt(t, e, n) {
|
|
846
847
|
if (t !== void 0) {
|
|
847
848
|
if (n.alg !== t)
|
|
848
849
|
throw new s('unexpected JWT "alg" header parameter');
|
|
@@ -862,8 +863,8 @@ function k(t, e) {
|
|
|
862
863
|
throw new s(`"${e}" parameter must be provided only once`);
|
|
863
864
|
return n;
|
|
864
865
|
}
|
|
865
|
-
const
|
|
866
|
-
function
|
|
866
|
+
const Ot = Symbol(), zt = Symbol();
|
|
867
|
+
function Dt(t, e, n, o) {
|
|
867
868
|
if (I(t), j(e), n instanceof URL && (n = n.searchParams), !(n instanceof URLSearchParams))
|
|
868
869
|
throw new TypeError('"parameters" must be an instance of URLSearchParams, or URL');
|
|
869
870
|
if (k(n, "response"))
|
|
@@ -875,11 +876,11 @@ function zt(t, e, n, o) {
|
|
|
875
876
|
throw new s('unexpected "iss" (issuer) response parameter value');
|
|
876
877
|
switch (o) {
|
|
877
878
|
case void 0:
|
|
878
|
-
case
|
|
879
|
+
case zt:
|
|
879
880
|
if (r !== void 0)
|
|
880
881
|
throw new s('unexpected "state" response parameter encountered');
|
|
881
882
|
break;
|
|
882
|
-
case
|
|
883
|
+
case Ot:
|
|
883
884
|
break;
|
|
884
885
|
default:
|
|
885
886
|
if (!w(o))
|
|
@@ -899,19 +900,19 @@ function zt(t, e, n, o) {
|
|
|
899
900
|
const c = k(n, "id_token"), p = k(n, "token");
|
|
900
901
|
if (c !== void 0 || p !== void 0)
|
|
901
902
|
throw new S("implicit and hybrid flows are not supported");
|
|
902
|
-
return
|
|
903
|
+
return At(new URLSearchParams(n));
|
|
903
904
|
}
|
|
904
|
-
function
|
|
905
|
+
function Nt({
|
|
905
906
|
handleCallback: t
|
|
906
907
|
}) {
|
|
907
|
-
const e =
|
|
908
|
+
const e = Ne({
|
|
908
909
|
retry: !1,
|
|
909
910
|
queryKey: ["oauth-callback"],
|
|
910
911
|
queryFn: async () => {
|
|
911
912
|
try {
|
|
912
913
|
return await t();
|
|
913
914
|
} catch (n) {
|
|
914
|
-
throw new
|
|
915
|
+
throw new We("Could not validate user", {
|
|
915
916
|
cause: n,
|
|
916
917
|
title: "Authentication Error",
|
|
917
918
|
developerHint: "Check the configuration of your authorization provider and ensure all settings such as the callback URL are configured correctly."
|
|
@@ -919,17 +920,17 @@ function Dt({
|
|
|
919
920
|
}
|
|
920
921
|
}
|
|
921
922
|
});
|
|
922
|
-
return /* @__PURE__ */
|
|
923
|
+
return /* @__PURE__ */ G.jsx(Ke, { to: e.data });
|
|
923
924
|
}
|
|
924
925
|
class P extends Error {
|
|
925
926
|
}
|
|
926
|
-
class
|
|
927
|
+
class pe extends P {
|
|
927
928
|
constructor(e, n, o) {
|
|
928
929
|
super(e, o), this.error = n;
|
|
929
930
|
}
|
|
930
931
|
}
|
|
931
932
|
const V = "code-verifier";
|
|
932
|
-
class
|
|
933
|
+
class Kt extends De {
|
|
933
934
|
constructor(e, n) {
|
|
934
935
|
super(), this.callbackUrlPath = e, this.handleCallback = n;
|
|
935
936
|
}
|
|
@@ -938,12 +939,12 @@ class Nt extends ze {
|
|
|
938
939
|
...super.getRoutes(),
|
|
939
940
|
{
|
|
940
941
|
path: this.callbackUrlPath,
|
|
941
|
-
element: /* @__PURE__ */
|
|
942
|
+
element: /* @__PURE__ */ G.jsx(ze, { children: /* @__PURE__ */ G.jsx(Nt, { handleCallback: this.handleCallback }) })
|
|
942
943
|
}
|
|
943
944
|
];
|
|
944
945
|
}
|
|
945
946
|
}
|
|
946
|
-
class
|
|
947
|
+
class Wt {
|
|
947
948
|
constructor({
|
|
948
949
|
issuer: e,
|
|
949
950
|
audience: n,
|
|
@@ -963,7 +964,7 @@ class Kt {
|
|
|
963
964
|
_(this, "redirectToAfterSignOut");
|
|
964
965
|
_(this, "audience");
|
|
965
966
|
_(this, "signOut", async () => {
|
|
966
|
-
|
|
967
|
+
x.setState({
|
|
967
968
|
isAuthenticated: !1,
|
|
968
969
|
isPending: !1,
|
|
969
970
|
profile: void 0,
|
|
@@ -983,32 +984,32 @@ class Kt {
|
|
|
983
984
|
const e = new URL(window.location.href), n = e.searchParams.get("state"), o = sessionStorage.getItem(V);
|
|
984
985
|
if (sessionStorage.removeItem(V), !o)
|
|
985
986
|
throw new P("No code verifier found in state.");
|
|
986
|
-
const a = await this.getAuthServer(), r =
|
|
987
|
+
const a = await this.getAuthServer(), r = Dt(
|
|
987
988
|
a,
|
|
988
989
|
this.client,
|
|
989
990
|
e.searchParams,
|
|
990
991
|
n ?? void 0
|
|
991
992
|
);
|
|
992
|
-
if (
|
|
993
|
-
throw
|
|
993
|
+
if (Y(r))
|
|
994
|
+
throw se.error("Error validating OAuth response", r), new pe(
|
|
994
995
|
"Error validating OAuth response",
|
|
995
996
|
r
|
|
996
997
|
);
|
|
997
998
|
const i = new URL(e);
|
|
998
999
|
i.pathname = this.redirectToAfterSignIn, i.search = "";
|
|
999
|
-
const c = await
|
|
1000
|
+
const c = await Et(
|
|
1000
1001
|
a,
|
|
1001
1002
|
this.client,
|
|
1002
1003
|
r,
|
|
1003
1004
|
i.toString(),
|
|
1004
1005
|
o
|
|
1005
|
-
), p = await
|
|
1006
|
+
), p = await xt(
|
|
1006
1007
|
a,
|
|
1007
1008
|
this.client,
|
|
1008
1009
|
c
|
|
1009
1010
|
);
|
|
1010
1011
|
this.setTokensFromResponse(p);
|
|
1011
|
-
const b = await this.getAccessToken(), y = await (await
|
|
1012
|
+
const b = await this.getAccessToken(), y = await (await yt(
|
|
1012
1013
|
a,
|
|
1013
1014
|
this.client,
|
|
1014
1015
|
b
|
|
@@ -1019,7 +1020,7 @@ class Kt {
|
|
|
1019
1020
|
emailVerified: y.email_verified ?? !1,
|
|
1020
1021
|
pictureUrl: y.picture
|
|
1021
1022
|
};
|
|
1022
|
-
|
|
1023
|
+
x.setState({
|
|
1023
1024
|
isAuthenticated: !0,
|
|
1024
1025
|
isPending: !1,
|
|
1025
1026
|
profile: T
|
|
@@ -1034,8 +1035,8 @@ class Kt {
|
|
|
1034
1035
|
}
|
|
1035
1036
|
async getAuthServer() {
|
|
1036
1037
|
if (!this.authorizationServer) {
|
|
1037
|
-
const e = new URL(this.issuer), n = await
|
|
1038
|
-
this.authorizationServer = await
|
|
1038
|
+
const e = new URL(this.issuer), n = await tt(e);
|
|
1039
|
+
this.authorizationServer = await nt(
|
|
1039
1040
|
e,
|
|
1040
1041
|
n
|
|
1041
1042
|
);
|
|
@@ -1047,8 +1048,8 @@ class Kt {
|
|
|
1047
1048
|
* @param response
|
|
1048
1049
|
*/
|
|
1049
1050
|
setTokensFromResponse(e) {
|
|
1050
|
-
if (
|
|
1051
|
-
throw
|
|
1051
|
+
if (Y(e))
|
|
1052
|
+
throw se.error("Bad Token Response", e), new pe("Bad Token Response", e);
|
|
1052
1053
|
if (!e.expires_in)
|
|
1053
1054
|
throw new P("No expires_in in response");
|
|
1054
1055
|
const n = {
|
|
@@ -1058,7 +1059,7 @@ class Kt {
|
|
|
1058
1059
|
expiresOn: new Date(Date.now() + e.expires_in * 1e3),
|
|
1059
1060
|
tokenType: e.token_type
|
|
1060
1061
|
};
|
|
1061
|
-
|
|
1062
|
+
x.setState({
|
|
1062
1063
|
providerData: n
|
|
1063
1064
|
});
|
|
1064
1065
|
}
|
|
@@ -1081,7 +1082,7 @@ class Kt {
|
|
|
1081
1082
|
const o = "S256", a = await this.getAuthServer();
|
|
1082
1083
|
if (!a.authorization_endpoint)
|
|
1083
1084
|
throw new P("No authorization endpoint");
|
|
1084
|
-
const r =
|
|
1085
|
+
const r = rt(), i = await it(r);
|
|
1085
1086
|
sessionStorage.setItem(V, r);
|
|
1086
1087
|
const c = new URL(
|
|
1087
1088
|
a.authorization_endpoint
|
|
@@ -1095,29 +1096,29 @@ class Kt {
|
|
|
1095
1096
|
isSignIn: !n,
|
|
1096
1097
|
isSignUp: n
|
|
1097
1098
|
}), ((f = a.code_challenge_methods_supported) == null ? void 0 : f.includes("S256")) !== !0) {
|
|
1098
|
-
const y =
|
|
1099
|
+
const y = ot();
|
|
1099
1100
|
c.searchParams.set("state", y);
|
|
1100
1101
|
}
|
|
1101
1102
|
location.href = c.href;
|
|
1102
1103
|
}
|
|
1103
1104
|
async getAccessToken() {
|
|
1104
|
-
const e = await this.getAuthServer(), { providerData: n } =
|
|
1105
|
+
const e = await this.getAuthServer(), { providerData: n } = x.getState();
|
|
1105
1106
|
if (!n)
|
|
1106
1107
|
throw new P("User is not authenticated");
|
|
1107
1108
|
const o = n;
|
|
1108
1109
|
if (new Date(o.expiresOn) < /* @__PURE__ */ new Date()) {
|
|
1109
1110
|
if (!o.refreshToken)
|
|
1110
|
-
return
|
|
1111
|
+
return x.setState({
|
|
1111
1112
|
isAuthenticated: !1,
|
|
1112
1113
|
isPending: !1,
|
|
1113
1114
|
profile: null,
|
|
1114
1115
|
providerData: null
|
|
1115
1116
|
}), "";
|
|
1116
|
-
const a = await
|
|
1117
|
+
const a = await bt(
|
|
1117
1118
|
e,
|
|
1118
1119
|
this.client,
|
|
1119
1120
|
o.refreshToken
|
|
1120
|
-
), r = await
|
|
1121
|
+
), r = await St(
|
|
1121
1122
|
e,
|
|
1122
1123
|
this.client,
|
|
1123
1124
|
a
|
|
@@ -1129,12 +1130,12 @@ class Kt {
|
|
|
1129
1130
|
return o.accessToken;
|
|
1130
1131
|
}
|
|
1131
1132
|
getAuthenticationPlugin() {
|
|
1132
|
-
return new
|
|
1133
|
+
return new Kt(this.callbackUrlPath, this.handleCallback);
|
|
1133
1134
|
}
|
|
1134
1135
|
}
|
|
1135
|
-
const
|
|
1136
|
+
const Yt = (t) => new Wt(t);
|
|
1136
1137
|
export {
|
|
1137
|
-
|
|
1138
|
-
|
|
1138
|
+
Wt as OpenIDAuthenticationProvider,
|
|
1139
|
+
Yt as default
|
|
1139
1140
|
};
|
|
1140
1141
|
//# sourceMappingURL=zudoku.auth-openid.js.map
|