zudoku 0.3.1-dev.12 → 0.3.1-dev.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (70) hide show
  1. package/dist/lib/authentication/authentication.d.ts +1 -0
  2. package/dist/lib/authentication/components/CallbackHandler.d.ts +3 -0
  3. package/dist/lib/authentication/components/CallbackHandler.js +33 -0
  4. package/dist/lib/authentication/components/CallbackHandler.js.map +1 -0
  5. package/dist/lib/authentication/providers/openid.d.ts +3 -3
  6. package/dist/lib/authentication/providers/openid.js +21 -21
  7. package/dist/lib/authentication/providers/openid.js.map +1 -1
  8. package/dist/lib/components/Header.js +2 -4
  9. package/dist/lib/components/Header.js.map +1 -1
  10. package/dist/lib/components/Layout.js +5 -1
  11. package/dist/lib/components/Layout.js.map +1 -1
  12. package/dist/lib/components/context/ZudokuProvider.js +1 -3
  13. package/dist/lib/components/context/ZudokuProvider.js.map +1 -1
  14. package/dist/lib/core/DevPortalContext.d.ts +1 -4
  15. package/dist/lib/core/DevPortalContext.js +2 -2
  16. package/dist/lib/core/DevPortalContext.js.map +1 -1
  17. package/dist/lib/core/plugins.d.ts +2 -4
  18. package/dist/lib/core/plugins.js.map +1 -1
  19. package/lib/{AuthenticationPlugin-CH5NSVOu.js → AuthenticationPlugin-owbEUimP.js} +3 -3
  20. package/lib/{AuthenticationPlugin-CH5NSVOu.js.map → AuthenticationPlugin-owbEUimP.js.map} +1 -1
  21. package/lib/{CategoryHeading-z15xh7Jb.js → CategoryHeading-DnPprxtD.js} +2 -2
  22. package/lib/{CategoryHeading-z15xh7Jb.js.map → CategoryHeading-DnPprxtD.js.map} +1 -1
  23. package/lib/{Combination-DTfV-c98.js → Combination-DruV0zX_.js} +3 -3
  24. package/lib/{Combination-DTfV-c98.js.map → Combination-DruV0zX_.js.map} +1 -1
  25. package/lib/ErrorPage-PUg985n_.js +18 -0
  26. package/lib/ErrorPage-PUg985n_.js.map +1 -0
  27. package/lib/{Input-CzXNm7xb.js → Input-CBfi9Yjc.js} +4 -4
  28. package/lib/{Input-CzXNm7xb.js.map → Input-CBfi9Yjc.js.map} +1 -1
  29. package/lib/{Markdown-CEccPMI_.js → Markdown-Chb9VIBv.js} +2 -2
  30. package/lib/{Markdown-CEccPMI_.js.map → Markdown-Chb9VIBv.js.map} +1 -1
  31. package/lib/{MdxPage-CnqOoqvp.js → MdxPage-CIBHMwTd.js} +5 -5
  32. package/lib/{MdxPage-CnqOoqvp.js.map → MdxPage-CIBHMwTd.js.map} +1 -1
  33. package/lib/{OperationList-CYyaboNz.js → OperationList-BzC9sQKY.js} +23 -22
  34. package/lib/{OperationList-CYyaboNz.js.map → OperationList-BzC9sQKY.js.map} +1 -1
  35. package/lib/{Route-C3Jb0axy.js → Route-BGRXEhFQ.js} +3 -3
  36. package/lib/{Route-C3Jb0axy.js.map → Route-BGRXEhFQ.js.map} +1 -1
  37. package/lib/{SlotletProvider-ByLSCZQa.js → SlotletProvider-Dq80og6-.js} +4 -4
  38. package/lib/{SlotletProvider-ByLSCZQa.js.map → SlotletProvider-Dq80og6-.js.map} +1 -1
  39. package/lib/{Spinner-BT_AYFrA.js → Spinner-BxpiCVtl.js} +3 -3
  40. package/lib/{Spinner-BT_AYFrA.js.map → Spinner-BxpiCVtl.js.map} +1 -1
  41. package/lib/{ZudokuContext-BIZ8zHbZ.js → ZudokuContext-BQ45UjcB.js} +2 -2
  42. package/lib/{ZudokuContext-BIZ8zHbZ.js.map → ZudokuContext-BQ45UjcB.js.map} +1 -1
  43. package/lib/{index-Dz4LyXZI.js → index-CKQG-w6R.js} +3 -3
  44. package/lib/{index-Dz4LyXZI.js.map → index-CKQG-w6R.js.map} +1 -1
  45. package/lib/{index-B1he6g8N.js → index-DHMNxrEi.js} +453 -464
  46. package/lib/index-DHMNxrEi.js.map +1 -0
  47. package/lib/{index-7kcHaXD6.js → index-Yjb2PyPF.js} +4 -4
  48. package/lib/{index-7kcHaXD6.js.map → index-Yjb2PyPF.js.map} +1 -1
  49. package/lib/{utils-Bh4upQ0e.js → utils-pDHePxa0.js} +3 -3
  50. package/lib/{utils-Bh4upQ0e.js.map → utils-pDHePxa0.js.map} +1 -1
  51. package/lib/zudoku.auth-clerk.js +1 -1
  52. package/lib/zudoku.auth-openid.js +465 -413
  53. package/lib/zudoku.auth-openid.js.map +1 -1
  54. package/lib/zudoku.components.js +442 -452
  55. package/lib/zudoku.components.js.map +1 -1
  56. package/lib/zudoku.plugin-api-keys.js +6 -6
  57. package/lib/zudoku.plugin-custom-page.js +1 -1
  58. package/lib/zudoku.plugin-markdown.js +1 -1
  59. package/lib/zudoku.plugin-openapi.js +7 -6
  60. package/lib/zudoku.plugin-openapi.js.map +1 -1
  61. package/package.json +1 -1
  62. package/src/lib/authentication/authentication.ts +1 -0
  63. package/src/lib/authentication/components/CallbackHandler.tsx +54 -0
  64. package/src/lib/authentication/providers/openid.tsx +21 -25
  65. package/src/lib/components/Header.tsx +3 -10
  66. package/src/lib/components/Layout.tsx +6 -1
  67. package/src/lib/components/context/ZudokuProvider.tsx +1 -4
  68. package/src/lib/core/DevPortalContext.ts +2 -7
  69. package/src/lib/core/plugins.ts +1 -2
  70. package/lib/index-B1he6g8N.js.map +0 -1
@@ -1,25 +1,30 @@
1
- var Ee = Object.defineProperty;
2
- var Re = (t, e, n) => e in t ? Ee(t, e, { enumerable: !0, configurable: !0, writable: !0, value: n }) : t[e] = n;
3
- var g = (t, e, n) => Re(t, typeof e != "symbol" ? e + "" : e, n);
4
- import { j as Pe } from "./jsx-runtime-B6kdoens.js";
5
- import { c as Ue, a as xe } from "./_commonjsHelpers-BVfed4GL.js";
6
- import { A as Le } from "./AuthenticationPlugin-CH5NSVOu.js";
7
- import { u as ne } from "./state-DsXXkBLH.js";
8
- var de = { exports: {} };
1
+ var xe = Object.defineProperty;
2
+ var Le = (t, e, n) => e in t ? xe(t, e, { enumerable: !0, configurable: !0, writable: !0, value: n }) : t[e] = n;
3
+ var m = (t, e, n) => Le(t, typeof e != "symbol" ? e + "" : e, n);
4
+ import { j as R } from "./jsx-runtime-B6kdoens.js";
5
+ import { c as Ce, a as Ie } from "./_commonjsHelpers-BVfed4GL.js";
6
+ import { A as je } from "./AuthenticationPlugin-owbEUimP.js";
7
+ import { useState as ze, useRef as Je, useEffect as Oe } from "react";
8
+ import { D as Ne } from "./DeveloperHint-BQSFXH01.js";
9
+ import { E as De } from "./ErrorPage-PUg985n_.js";
10
+ import { S as Ke } from "./Markdown-Chb9VIBv.js";
11
+ import { e as We } from "./index-Yjb2PyPF.js";
12
+ import { u as ie } from "./state-DsXXkBLH.js";
13
+ var fe = { exports: {} };
9
14
  (function(t) {
10
15
  (function(e, n) {
11
16
  t.exports ? t.exports = n() : e.log = n();
12
- })(Ue, function() {
17
+ })(Ce, function() {
13
18
  var e = function() {
14
- }, n = "undefined", r = typeof window !== n && typeof window.navigator !== n && /Trident\/|MSIE /.test(window.navigator.userAgent), s = [
19
+ }, n = "undefined", o = typeof window !== n && typeof window.navigator !== n && /Trident\/|MSIE /.test(window.navigator.userAgent), s = [
15
20
  "trace",
16
21
  "debug",
17
22
  "info",
18
23
  "warn",
19
24
  "error"
20
- ], o = {}, i = null;
21
- function u(l, p) {
22
- var c = l[p];
25
+ ], r = {}, i = null;
26
+ function u(l, w) {
27
+ var c = l[w];
23
28
  if (typeof c.bind == "function")
24
29
  return c.bind(l);
25
30
  try {
@@ -30,64 +35,64 @@ var de = { exports: {} };
30
35
  };
31
36
  }
32
37
  }
33
- function f() {
38
+ function d() {
34
39
  console.log && (console.log.apply ? console.log.apply(console, arguments) : Function.prototype.apply.apply(console.log, [console, arguments])), console.trace && console.trace();
35
40
  }
36
41
  function y(l) {
37
- return l === "debug" && (l = "log"), typeof console === n ? !1 : l === "trace" && r ? f : console[l] !== void 0 ? u(console, l) : console.log !== void 0 ? u(console, "log") : e;
42
+ return l === "debug" && (l = "log"), typeof console === n ? !1 : l === "trace" && o ? d : console[l] !== void 0 ? u(console, l) : console.log !== void 0 ? u(console, "log") : e;
38
43
  }
39
- function _() {
40
- for (var l = this.getLevel(), p = 0; p < s.length; p++) {
41
- var c = s[p];
42
- this[c] = p < l ? e : this.methodFactory(c, l, this.name);
44
+ function b() {
45
+ for (var l = this.getLevel(), w = 0; w < s.length; w++) {
46
+ var c = s[w];
47
+ this[c] = w < l ? e : this.methodFactory(c, l, this.name);
43
48
  }
44
49
  if (this.log = this.debug, typeof console === n && l < this.levels.SILENT)
45
50
  return "No console available for logging";
46
51
  }
47
- function b(l) {
52
+ function _(l) {
48
53
  return function() {
49
- typeof console !== n && (_.call(this), this[l].apply(this, arguments));
54
+ typeof console !== n && (b.call(this), this[l].apply(this, arguments));
50
55
  };
51
56
  }
52
- function h(l, p, c) {
53
- return y(l) || b.apply(this, arguments);
57
+ function f(l, w, c) {
58
+ return y(l) || _.apply(this, arguments);
54
59
  }
55
- function P(l, p) {
56
- var c = this, I, H, R, v = "loglevel";
60
+ function U(l, w) {
61
+ var c = this, J, M, P, v = "loglevel";
57
62
  typeof l == "string" ? v += ":" + l : typeof l == "symbol" && (v = void 0);
58
- function Te(d) {
59
- var w = (s[d] || "silent").toUpperCase();
63
+ function Re(h) {
64
+ var g = (s[h] || "silent").toUpperCase();
60
65
  if (!(typeof window === n || !v)) {
61
66
  try {
62
- window.localStorage[v] = w;
67
+ window.localStorage[v] = g;
63
68
  return;
64
69
  } catch {
65
70
  }
66
71
  try {
67
- window.document.cookie = encodeURIComponent(v) + "=" + w + ";";
72
+ window.document.cookie = encodeURIComponent(v) + "=" + g + ";";
68
73
  } catch {
69
74
  }
70
75
  }
71
76
  }
72
- function X() {
73
- var d;
77
+ function ne() {
78
+ var h;
74
79
  if (!(typeof window === n || !v)) {
75
80
  try {
76
- d = window.localStorage[v];
81
+ h = window.localStorage[v];
77
82
  } catch {
78
83
  }
79
- if (typeof d === n)
84
+ if (typeof h === n)
80
85
  try {
81
- var w = window.document.cookie, j = encodeURIComponent(v), te = w.indexOf(j + "=");
82
- te !== -1 && (d = /^([^;]+)/.exec(
83
- w.slice(te + j.length + 1)
86
+ var g = window.document.cookie, O = encodeURIComponent(v), oe = g.indexOf(O + "=");
87
+ oe !== -1 && (h = /^([^;]+)/.exec(
88
+ g.slice(oe + O.length + 1)
84
89
  )[1]);
85
90
  } catch {
86
91
  }
87
- return c.levels[d] === void 0 && (d = void 0), d;
92
+ return c.levels[h] === void 0 && (h = void 0), h;
88
93
  }
89
94
  }
90
- function Ae() {
95
+ function Pe() {
91
96
  if (!(typeof window === n || !v)) {
92
97
  try {
93
98
  window.localStorage.removeItem(v);
@@ -99,11 +104,11 @@ var de = { exports: {} };
99
104
  }
100
105
  }
101
106
  }
102
- function U(d) {
103
- var w = d;
104
- if (typeof w == "string" && c.levels[w.toUpperCase()] !== void 0 && (w = c.levels[w.toUpperCase()]), typeof w == "number" && w >= 0 && w <= c.levels.SILENT)
105
- return w;
106
- throw new TypeError("log.setLevel() called with invalid level: " + d);
107
+ function x(h) {
108
+ var g = h;
109
+ if (typeof g == "string" && c.levels[g.toUpperCase()] !== void 0 && (g = c.levels[g.toUpperCase()]), typeof g == "number" && g >= 0 && g <= c.levels.SILENT)
110
+ return g;
111
+ throw new TypeError("log.setLevel() called with invalid level: " + h);
107
112
  }
108
113
  c.name = l, c.levels = {
109
114
  TRACE: 0,
@@ -112,51 +117,51 @@ var de = { exports: {} };
112
117
  WARN: 3,
113
118
  ERROR: 4,
114
119
  SILENT: 5
115
- }, c.methodFactory = p || h, c.getLevel = function() {
116
- return R ?? H ?? I;
117
- }, c.setLevel = function(d, w) {
118
- return R = U(d), w !== !1 && Te(R), _.call(c);
119
- }, c.setDefaultLevel = function(d) {
120
- H = U(d), X() || c.setLevel(d, !1);
120
+ }, c.methodFactory = w || f, c.getLevel = function() {
121
+ return P ?? M ?? J;
122
+ }, c.setLevel = function(h, g) {
123
+ return P = x(h), g !== !1 && Re(P), b.call(c);
124
+ }, c.setDefaultLevel = function(h) {
125
+ M = x(h), ne() || c.setLevel(h, !1);
121
126
  }, c.resetLevel = function() {
122
- R = null, Ae(), _.call(c);
123
- }, c.enableAll = function(d) {
124
- c.setLevel(c.levels.TRACE, d);
125
- }, c.disableAll = function(d) {
126
- c.setLevel(c.levels.SILENT, d);
127
+ P = null, Pe(), b.call(c);
128
+ }, c.enableAll = function(h) {
129
+ c.setLevel(c.levels.TRACE, h);
130
+ }, c.disableAll = function(h) {
131
+ c.setLevel(c.levels.SILENT, h);
127
132
  }, c.rebuild = function() {
128
- if (i !== c && (I = U(i.getLevel())), _.call(c), i === c)
129
- for (var d in o)
130
- o[d].rebuild();
131
- }, I = U(
133
+ if (i !== c && (J = x(i.getLevel())), b.call(c), i === c)
134
+ for (var h in r)
135
+ r[h].rebuild();
136
+ }, J = x(
132
137
  i ? i.getLevel() : "WARN"
133
138
  );
134
- var ee = X();
135
- ee != null && (R = U(ee)), _.call(c);
139
+ var re = ne();
140
+ re != null && (P = x(re)), b.call(c);
136
141
  }
137
- i = new P(), i.getLogger = function(p) {
138
- if (typeof p != "symbol" && typeof p != "string" || p === "")
142
+ i = new U(), i.getLogger = function(w) {
143
+ if (typeof w != "symbol" && typeof w != "string" || w === "")
139
144
  throw new TypeError("You must supply a name when creating a logger.");
140
- var c = o[p];
141
- return c || (c = o[p] = new P(
142
- p,
145
+ var c = r[w];
146
+ return c || (c = r[w] = new U(
147
+ w,
143
148
  i.methodFactory
144
149
  )), c;
145
150
  };
146
- var E = typeof window !== n ? window.log : void 0;
151
+ var A = typeof window !== n ? window.log : void 0;
147
152
  return i.noConflict = function() {
148
- return typeof window !== n && window.log === i && (window.log = E), i;
153
+ return typeof window !== n && window.log === i && (window.log = A), i;
149
154
  }, i.getLoggers = function() {
150
- return o;
155
+ return r;
151
156
  }, i.default = i, i;
152
157
  });
153
- })(de);
154
- var Ce = de.exports;
155
- const re = /* @__PURE__ */ xe(Ce);
156
- let M;
157
- var z, le;
158
- (typeof navigator > "u" || !((le = (z = navigator.userAgent) == null ? void 0 : z.startsWith) != null && le.call(z, "Mozilla/5.0 "))) && (M = "oauth4webapi/v2.11.1");
159
- function G(t, e) {
158
+ })(fe);
159
+ var He = fe.exports;
160
+ const D = /* @__PURE__ */ Ie(He);
161
+ let V;
162
+ var N, de;
163
+ (typeof navigator > "u" || !((de = (N = navigator.userAgent) == null ? void 0 : N.startsWith) != null && de.call(N, "Mozilla/5.0 "))) && (V = "oauth4webapi/v2.11.1");
164
+ function Z(t, e) {
160
165
  if (t == null)
161
166
  return !1;
162
167
  try {
@@ -165,32 +170,32 @@ function G(t, e) {
165
170
  return !1;
166
171
  }
167
172
  }
168
- const N = Symbol(), Ie = Symbol(), q = Symbol(), je = new TextEncoder(), ze = new TextDecoder();
169
- function k(t) {
170
- return typeof t == "string" ? je.encode(t) : ze.decode(t);
173
+ const W = Symbol(), $e = Symbol(), Q = Symbol(), Fe = new TextEncoder(), Me = new TextDecoder();
174
+ function E(t) {
175
+ return typeof t == "string" ? Fe.encode(t) : Me.decode(t);
171
176
  }
172
- const oe = 32768;
173
- function Je(t) {
177
+ const se = 32768;
178
+ function Be(t) {
174
179
  t instanceof ArrayBuffer && (t = new Uint8Array(t));
175
180
  const e = [];
176
- for (let n = 0; n < t.byteLength; n += oe)
177
- e.push(String.fromCharCode.apply(null, t.subarray(n, n + oe)));
181
+ for (let n = 0; n < t.byteLength; n += se)
182
+ e.push(String.fromCharCode.apply(null, t.subarray(n, n + se)));
178
183
  return btoa(e.join("")).replace(/=/g, "").replace(/\+/g, "-").replace(/\//g, "_");
179
184
  }
180
- function Oe(t) {
185
+ function qe(t) {
181
186
  try {
182
187
  const e = atob(t.replace(/-/g, "+").replace(/_/g, "/").replace(/\s/g, "")), n = new Uint8Array(e.length);
183
- for (let r = 0; r < e.length; r++)
184
- n[r] = e.charCodeAt(r);
188
+ for (let o = 0; o < e.length; o++)
189
+ n[o] = e.charCodeAt(o);
185
190
  return n;
186
191
  } catch (e) {
187
192
  throw new a("The input to be decoded is not correctly encoded.", { cause: e });
188
193
  }
189
194
  }
190
- function A(t) {
191
- return typeof t == "string" ? Oe(t) : Je(t);
195
+ function k(t) {
196
+ return typeof t == "string" ? qe(t) : Be(t);
192
197
  }
193
- class Ne {
198
+ class Ge {
194
199
  constructor(e) {
195
200
  this.cache = /* @__PURE__ */ new Map(), this._cache = /* @__PURE__ */ new Map(), this.maxSize = e;
196
201
  }
@@ -220,48 +225,48 @@ class S extends Error {
220
225
  super(e ?? "operation not supported"), this.name = this.constructor.name, (n = Error.captureStackTrace) == null || n.call(Error, this, this.constructor);
221
226
  }
222
227
  }
223
- class Ke extends Error {
228
+ class Ve extends Error {
224
229
  constructor(e, n) {
225
- var r;
226
- super(e, n), this.name = this.constructor.name, (r = Error.captureStackTrace) == null || r.call(Error, this, this.constructor);
230
+ var o;
231
+ super(e, n), this.name = this.constructor.name, (o = Error.captureStackTrace) == null || o.call(Error, this, this.constructor);
227
232
  }
228
233
  }
229
- const a = Ke, he = new Ne(100);
230
- function fe(t) {
234
+ const a = Ve, pe = new Ge(100);
235
+ function we(t) {
231
236
  return t instanceof CryptoKey;
232
237
  }
233
- function pe(t) {
234
- return fe(t) && t.type === "private";
238
+ function ge(t) {
239
+ return we(t) && t.type === "private";
235
240
  }
236
- function We(t) {
237
- return fe(t) && t.type === "public";
241
+ function Ye(t) {
242
+ return we(t) && t.type === "public";
238
243
  }
239
- function V(t) {
244
+ function X(t) {
240
245
  try {
241
246
  const e = t.headers.get("dpop-nonce");
242
- e && he.set(new URL(t.url).origin, e);
247
+ e && pe.set(new URL(t.url).origin, e);
243
248
  } catch {
244
249
  }
245
250
  return t;
246
251
  }
247
- function x(t) {
252
+ function C(t) {
248
253
  return !(t === null || typeof t != "object" || Array.isArray(t));
249
254
  }
250
- function K(t) {
251
- G(t, Headers) && (t = Object.fromEntries(t.entries()));
255
+ function H(t) {
256
+ Z(t, Headers) && (t = Object.fromEntries(t.entries()));
252
257
  const e = new Headers(t);
253
- if (M && !e.has("user-agent") && e.set("user-agent", M), e.has("authorization"))
258
+ if (V && !e.has("user-agent") && e.set("user-agent", V), e.has("authorization"))
254
259
  throw new TypeError('"options.headers" must not include the "authorization" header name');
255
260
  if (e.has("dpop"))
256
261
  throw new TypeError('"options.headers" must not include the "dpop" header name');
257
262
  return e;
258
263
  }
259
- function Y(t) {
264
+ function ee(t) {
260
265
  if (typeof t == "function" && (t = t()), !(t instanceof AbortSignal))
261
266
  throw new TypeError('"options.signal" must return or be an instance of AbortSignal');
262
267
  return t;
263
268
  }
264
- async function De(t, e) {
269
+ async function Ze(t, e) {
265
270
  if (!(t instanceof URL))
266
271
  throw new TypeError('"issuerIdentifier" must be an instance of URL');
267
272
  if (t.protocol !== "https:" && t.protocol !== "http:")
@@ -278,70 +283,70 @@ async function De(t, e) {
278
283
  default:
279
284
  throw new TypeError('"options.algorithm" must be "oidc" (default), or "oauth2"');
280
285
  }
281
- const r = K(e == null ? void 0 : e.headers);
282
- return r.set("accept", "application/json"), ((e == null ? void 0 : e[q]) || fetch)(n.href, {
283
- headers: Object.fromEntries(r.entries()),
286
+ const o = H(e == null ? void 0 : e.headers);
287
+ return o.set("accept", "application/json"), ((e == null ? void 0 : e[Q]) || fetch)(n.href, {
288
+ headers: Object.fromEntries(o.entries()),
284
289
  method: "GET",
285
290
  redirect: "manual",
286
- signal: e != null && e.signal ? Y(e.signal) : null
287
- }).then(V);
291
+ signal: e != null && e.signal ? ee(e.signal) : null
292
+ }).then(X);
288
293
  }
289
- function m(t) {
294
+ function p(t) {
290
295
  return typeof t == "string" && t.length !== 0;
291
296
  }
292
- async function He(t, e) {
297
+ async function Qe(t, e) {
293
298
  if (!(t instanceof URL))
294
299
  throw new TypeError('"expectedIssuer" must be an instance of URL');
295
- if (!G(e, Response))
300
+ if (!Z(e, Response))
296
301
  throw new TypeError('"response" must be an instance of Response');
297
302
  if (e.status !== 200)
298
303
  throw new a('"response" is not a conform Authorization Server Metadata response');
299
- Q(e);
304
+ te(e);
300
305
  let n;
301
306
  try {
302
307
  n = await e.json();
303
- } catch (r) {
304
- throw new a('failed to parse "response" body as JSON', { cause: r });
308
+ } catch (o) {
309
+ throw new a('failed to parse "response" body as JSON', { cause: o });
305
310
  }
306
- if (!x(n))
311
+ if (!C(n))
307
312
  throw new a('"response" body must be a top level object');
308
- if (!m(n.issuer))
313
+ if (!p(n.issuer))
309
314
  throw new a('"response" body "issuer" property must be a non-empty string');
310
315
  if (new URL(n.issuer).href !== t.href)
311
316
  throw new a('"response" body "issuer" does not match "expectedIssuer"');
312
317
  return n;
313
318
  }
314
- function W() {
315
- return A(crypto.getRandomValues(new Uint8Array(32)));
319
+ function $() {
320
+ return k(crypto.getRandomValues(new Uint8Array(32)));
316
321
  }
317
- function $e() {
318
- return W();
322
+ function Xe() {
323
+ return $();
319
324
  }
320
- function Fe() {
321
- return W();
325
+ function et() {
326
+ return $();
322
327
  }
323
- async function Me(t) {
324
- if (!m(t))
328
+ async function tt(t) {
329
+ if (!p(t))
325
330
  throw new TypeError('"codeVerifier" must be a non-empty string');
326
- return A(await crypto.subtle.digest("SHA-256", k(t)));
331
+ return k(await crypto.subtle.digest("SHA-256", E(t)));
327
332
  }
328
- function Be(t) {
333
+ function nt(t) {
329
334
  if (t instanceof CryptoKey)
330
335
  return { key: t };
331
336
  if (!((t == null ? void 0 : t.key) instanceof CryptoKey))
332
337
  return {};
333
- if (t.kid !== void 0 && !m(t.kid))
338
+ if (t.kid !== void 0 && !p(t.kid))
334
339
  throw new TypeError('"kid" must be a non-empty string');
335
340
  return { key: t.key, kid: t.kid };
336
341
  }
337
- function ie(t) {
342
+ function ae(t) {
338
343
  return encodeURIComponent(t).replace(/%20/g, "+");
339
344
  }
340
- function Ge(t, e) {
341
- const n = ie(t), r = ie(e);
342
- return `Basic ${btoa(`${n}:${r}`)}`;
345
+ function rt(t, e) {
346
+ const n = ae(t), o = ae(e);
347
+ return `Basic ${btoa(`${n}:${o}`)}`;
343
348
  }
344
- function qe(t) {
349
+ function ot(t) {
345
350
  switch (t.algorithm.hash.name) {
346
351
  case "SHA-256":
347
352
  return "PS256";
@@ -353,7 +358,7 @@ function qe(t) {
353
358
  throw new S("unsupported RsaHashedKeyAlgorithm hash name");
354
359
  }
355
360
  }
356
- function Ve(t) {
361
+ function it(t) {
357
362
  switch (t.algorithm.hash.name) {
358
363
  case "SHA-256":
359
364
  return "RS256";
@@ -365,7 +370,7 @@ function Ve(t) {
365
370
  throw new S("unsupported RsaHashedKeyAlgorithm hash name");
366
371
  }
367
372
  }
368
- function Ye(t) {
373
+ function st(t) {
369
374
  switch (t.algorithm.namedCurve) {
370
375
  case "P-256":
371
376
  return "ES256";
@@ -377,14 +382,14 @@ function Ye(t) {
377
382
  throw new S("unsupported EcKeyAlgorithm namedCurve");
378
383
  }
379
384
  }
380
- function we(t) {
385
+ function me(t) {
381
386
  switch (t.algorithm.name) {
382
387
  case "RSA-PSS":
383
- return qe(t);
388
+ return ot(t);
384
389
  case "RSASSA-PKCS1-v1_5":
385
- return Ve(t);
390
+ return it(t);
386
391
  case "ECDSA":
387
- return Ye(t);
392
+ return st(t);
388
393
  case "Ed25519":
389
394
  case "Ed448":
390
395
  return "EdDSA";
@@ -392,21 +397,21 @@ function we(t) {
392
397
  throw new S("unsupported CryptoKey algorithm name");
393
398
  }
394
399
  }
395
- function D(t) {
396
- const e = t == null ? void 0 : t[N];
400
+ function I(t) {
401
+ const e = t == null ? void 0 : t[W];
397
402
  return typeof e == "number" && Number.isFinite(e) ? e : 0;
398
403
  }
399
- function Ze(t) {
400
- const e = t == null ? void 0 : t[Ie];
404
+ function ye(t) {
405
+ const e = t == null ? void 0 : t[$e];
401
406
  return typeof e == "number" && Number.isFinite(e) && Math.sign(e) !== -1 ? e : 30;
402
407
  }
403
- function Z() {
408
+ function F() {
404
409
  return Math.floor(Date.now() / 1e3);
405
410
  }
406
- function Qe(t, e) {
407
- const n = Z() + D(e);
411
+ function at(t, e) {
412
+ const n = F() + I(e);
408
413
  return {
409
- jti: W(),
414
+ jti: $(),
410
415
  aud: [t.issuer, t.token_endpoint],
411
416
  exp: n + 60,
412
417
  iat: n,
@@ -415,210 +420,218 @@ function Qe(t, e) {
415
420
  sub: e.client_id
416
421
  };
417
422
  }
418
- async function Xe(t, e, n, r) {
419
- return ge({
420
- alg: we(n),
421
- kid: r
422
- }, Qe(t, e), n);
423
+ async function ct(t, e, n, o) {
424
+ return be({
425
+ alg: me(n),
426
+ kid: o
427
+ }, at(t, e), n);
423
428
  }
424
- function L(t) {
429
+ function j(t) {
425
430
  if (typeof t != "object" || t === null)
426
431
  throw new TypeError('"as" must be an object');
427
- if (!m(t.issuer))
432
+ if (!p(t.issuer))
428
433
  throw new TypeError('"as.issuer" property must be a non-empty string');
429
434
  return !0;
430
435
  }
431
- function C(t) {
436
+ function z(t) {
432
437
  if (typeof t != "object" || t === null)
433
438
  throw new TypeError('"client" must be an object');
434
- if (!m(t.client_id))
439
+ if (!p(t.client_id))
435
440
  throw new TypeError('"client.client_id" property must be a non-empty string');
436
441
  return !0;
437
442
  }
438
- function se(t) {
439
- if (!m(t))
443
+ function ce(t) {
444
+ if (!p(t))
440
445
  throw new TypeError('"client.client_secret" property must be a non-empty string');
441
446
  return t;
442
447
  }
443
- function $(t, e) {
448
+ function B(t, e) {
444
449
  if (e !== void 0)
445
450
  throw new TypeError(`"options.clientPrivateKey" property must not be provided when ${t} client authentication method is used.`);
446
451
  }
447
- function ae(t, e) {
452
+ function ue(t, e) {
448
453
  if (e !== void 0)
449
454
  throw new TypeError(`"client.client_secret" property must not be provided when ${t} client authentication method is used.`);
450
455
  }
451
- async function et(t, e, n, r, s) {
456
+ async function ut(t, e, n, o, s) {
452
457
  switch (n.delete("client_secret"), n.delete("client_assertion_type"), n.delete("client_assertion"), e.token_endpoint_auth_method) {
453
458
  case void 0:
454
459
  case "client_secret_basic": {
455
- $("client_secret_basic", s), r.set("authorization", Ge(e.client_id, se(e.client_secret)));
460
+ B("client_secret_basic", s), o.set("authorization", rt(e.client_id, ce(e.client_secret)));
456
461
  break;
457
462
  }
458
463
  case "client_secret_post": {
459
- $("client_secret_post", s), n.set("client_id", e.client_id), n.set("client_secret", se(e.client_secret));
464
+ B("client_secret_post", s), n.set("client_id", e.client_id), n.set("client_secret", ce(e.client_secret));
460
465
  break;
461
466
  }
462
467
  case "private_key_jwt": {
463
- if (ae("private_key_jwt", e.client_secret), s === void 0)
468
+ if (ue("private_key_jwt", e.client_secret), s === void 0)
464
469
  throw new TypeError('"options.clientPrivateKey" must be provided when "client.token_endpoint_auth_method" is "private_key_jwt"');
465
- const { key: o, kid: i } = Be(s);
466
- if (!pe(o))
470
+ const { key: r, kid: i } = nt(s);
471
+ if (!ge(r))
467
472
  throw new TypeError('"options.clientPrivateKey.key" must be a private CryptoKey');
468
- n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await Xe(t, e, o, i));
473
+ n.set("client_id", e.client_id), n.set("client_assertion_type", "urn:ietf:params:oauth:client-assertion-type:jwt-bearer"), n.set("client_assertion", await ct(t, e, r, i));
469
474
  break;
470
475
  }
471
476
  case "tls_client_auth":
472
477
  case "self_signed_tls_client_auth":
473
478
  case "none": {
474
- ae(e.token_endpoint_auth_method, e.client_secret), $(e.token_endpoint_auth_method, s), n.set("client_id", e.client_id);
479
+ ue(e.token_endpoint_auth_method, e.client_secret), B(e.token_endpoint_auth_method, s), n.set("client_id", e.client_id);
475
480
  break;
476
481
  }
477
482
  default:
478
483
  throw new S("unsupported client token_endpoint_auth_method");
479
484
  }
480
485
  }
481
- async function ge(t, e, n) {
486
+ async function be(t, e, n) {
482
487
  if (!n.usages.includes("sign"))
483
488
  throw new TypeError('CryptoKey instances used for signing assertions must include "sign" in their "usages"');
484
- const r = `${A(k(JSON.stringify(t)))}.${A(k(JSON.stringify(e)))}`, s = A(await crypto.subtle.sign(ve(n), n, k(r)));
485
- return `${r}.${s}`;
489
+ const o = `${k(E(JSON.stringify(t)))}.${k(E(JSON.stringify(e)))}`, s = k(await crypto.subtle.sign(Ee(n), n, E(o)));
490
+ return `${o}.${s}`;
486
491
  }
487
- async function tt(t, e, n, r, s, o) {
488
- const { privateKey: i, publicKey: u, nonce: f = he.get(n.origin) } = e;
489
- if (!pe(i))
492
+ async function lt(t, e, n, o, s, r) {
493
+ const { privateKey: i, publicKey: u, nonce: d = pe.get(n.origin) } = e;
494
+ if (!ge(i))
490
495
  throw new TypeError('"DPoP.privateKey" must be a private CryptoKey');
491
- if (!We(u))
496
+ if (!Ye(u))
492
497
  throw new TypeError('"DPoP.publicKey" must be a public CryptoKey');
493
- if (f !== void 0 && !m(f))
498
+ if (d !== void 0 && !p(d))
494
499
  throw new TypeError('"DPoP.nonce" must be a non-empty string or undefined');
495
500
  if (!u.extractable)
496
501
  throw new TypeError('"DPoP.publicKey.extractable" must be true');
497
- const y = Z() + s, _ = await ge({
498
- alg: we(i),
502
+ const y = F() + s, b = await be({
503
+ alg: me(i),
499
504
  typ: "dpop+jwt",
500
- jwk: await rt(u)
505
+ jwk: await dt(u)
501
506
  }, {
502
507
  iat: y,
503
- jti: W(),
504
- htm: r,
505
- nonce: f,
508
+ jti: $(),
509
+ htm: o,
510
+ nonce: d,
506
511
  htu: `${n.origin}${n.pathname}`,
507
- ath: o ? A(await crypto.subtle.digest("SHA-256", k(o))) : void 0
512
+ ath: r ? k(await crypto.subtle.digest("SHA-256", E(r))) : void 0
508
513
  }, i);
509
- t.set("dpop", _);
514
+ t.set("dpop", b);
510
515
  }
511
- let J;
512
- async function nt(t) {
513
- const { kty: e, e: n, n: r, x: s, y: o, crv: i } = await crypto.subtle.exportKey("jwk", t), u = { kty: e, e: n, n: r, x: s, y: o, crv: i };
514
- return J.set(t, u), u;
516
+ let K;
517
+ async function ht(t) {
518
+ const { kty: e, e: n, n: o, x: s, y: r, crv: i } = await crypto.subtle.exportKey("jwk", t), u = { kty: e, e: n, n: o, x: s, y: r, crv: i };
519
+ return K.set(t, u), u;
515
520
  }
516
- async function rt(t) {
517
- return J || (J = /* @__PURE__ */ new WeakMap()), J.get(t) || nt(t);
521
+ async function dt(t) {
522
+ return K || (K = /* @__PURE__ */ new WeakMap()), K.get(t) || ht(t);
518
523
  }
519
- function ot(t, e, n) {
524
+ function ft(t, e, n) {
520
525
  if (typeof t != "string")
521
526
  throw new TypeError(`"as.${e}" must be a string`);
522
527
  return new URL(t);
523
528
  }
524
- function me(t, e, n) {
525
- return ot(t[e], e);
529
+ function _e(t, e, n) {
530
+ return ft(t[e], e);
526
531
  }
527
- function B(t) {
532
+ function Y(t) {
528
533
  const e = t;
529
534
  return typeof e != "object" || Array.isArray(e) || e === null ? !1 : e.error !== void 0;
530
535
  }
531
- async function it(t, e, n, r, s, o) {
532
- if (!m(t))
536
+ async function pt(t, e, n, o, s, r) {
537
+ if (!p(t))
533
538
  throw new TypeError('"accessToken" must be a non-empty string');
534
539
  if (!(n instanceof URL))
535
540
  throw new TypeError('"url" must be an instance of URL');
536
- return r = K(r), (o == null ? void 0 : o.DPoP) === void 0 ? r.set("authorization", `Bearer ${t}`) : (await tt(r, o.DPoP, n, "GET", D({ [N]: o == null ? void 0 : o[N] }), t), r.set("authorization", `DPoP ${t}`)), ((o == null ? void 0 : o[q]) || fetch)(n.href, {
541
+ return o = H(o), (r == null ? void 0 : r.DPoP) === void 0 ? o.set("authorization", `Bearer ${t}`) : (await lt(o, r.DPoP, n, "GET", I({ [W]: r == null ? void 0 : r[W] }), t), o.set("authorization", `DPoP ${t}`)), ((r == null ? void 0 : r[Q]) || fetch)(n.href, {
537
542
  body: s,
538
- headers: Object.fromEntries(r.entries()),
543
+ headers: Object.fromEntries(o.entries()),
539
544
  method: e,
540
545
  redirect: "manual",
541
- signal: o != null && o.signal ? Y(o.signal) : null
542
- }).then(V);
543
- }
544
- async function st(t, e, n, r) {
545
- L(t), C(e);
546
- const s = me(t, "userinfo_endpoint"), o = K(r == null ? void 0 : r.headers);
547
- return e.userinfo_signed_response_alg ? o.set("accept", "application/jwt") : (o.set("accept", "application/json"), o.append("accept", "application/jwt")), it(n, "GET", s, o, null, {
548
- ...r,
549
- [N]: D(e)
546
+ signal: r != null && r.signal ? ee(r.signal) : null
547
+ }).then(X);
548
+ }
549
+ async function wt(t, e, n, o) {
550
+ j(t), z(e);
551
+ const s = _e(t, "userinfo_endpoint"), r = H(o == null ? void 0 : o.headers);
552
+ return e.userinfo_signed_response_alg ? r.set("accept", "application/jwt") : (r.set("accept", "application/json"), r.append("accept", "application/jwt")), pt(n, "GET", s, r, null, {
553
+ ...o,
554
+ [W]: I(e)
550
555
  });
551
556
  }
552
- async function at(t, e, n, r, s, o, i) {
553
- return await et(t, e, s, o, i == null ? void 0 : i.clientPrivateKey), o.set("content-type", "application/x-www-form-urlencoded;charset=UTF-8"), ((i == null ? void 0 : i[q]) || fetch)(r.href, {
557
+ async function gt(t, e, n, o, s, r, i) {
558
+ return await ut(t, e, s, r, i == null ? void 0 : i.clientPrivateKey), r.set("content-type", "application/x-www-form-urlencoded;charset=UTF-8"), ((i == null ? void 0 : i[Q]) || fetch)(o.href, {
554
559
  body: s,
555
- headers: Object.fromEntries(o.entries()),
560
+ headers: Object.fromEntries(r.entries()),
556
561
  method: n,
557
562
  redirect: "manual",
558
- signal: i != null && i.signal ? Y(i.signal) : null
559
- }).then(V);
563
+ signal: i != null && i.signal ? ee(i.signal) : null
564
+ }).then(X);
560
565
  }
561
- async function ye(t, e, n, r, s) {
562
- const o = me(t, "token_endpoint");
563
- r.set("grant_type", n);
564
- const i = K(s == null ? void 0 : s.headers);
565
- return i.set("accept", "application/json"), at(t, e, "POST", o, r, i, s);
566
+ async function ve(t, e, n, o, s) {
567
+ const r = _e(t, "token_endpoint");
568
+ o.set("grant_type", n);
569
+ const i = H(s == null ? void 0 : s.headers);
570
+ return i.set("accept", "application/json"), gt(t, e, "POST", r, o, i, s);
566
571
  }
567
- async function ct(t, e, n, r) {
568
- if (L(t), C(e), !m(n))
572
+ async function mt(t, e, n, o) {
573
+ if (j(t), z(e), !p(n))
569
574
  throw new TypeError('"refreshToken" must be a non-empty string');
570
- const s = new URLSearchParams(r == null ? void 0 : r.additionalParameters);
571
- return s.set("refresh_token", n), ye(t, e, "refresh_token", s, r);
575
+ const s = new URLSearchParams(o == null ? void 0 : o.additionalParameters);
576
+ return s.set("refresh_token", n), ve(t, e, "refresh_token", s, o);
572
577
  }
573
- const ut = /* @__PURE__ */ new WeakMap();
574
- async function _e(t, e, n, r = !1, s = !1) {
575
- if (L(t), C(e), !G(n, Response))
578
+ const Se = /* @__PURE__ */ new WeakMap();
579
+ function yt(t) {
580
+ if (!t.id_token)
581
+ return;
582
+ const e = Se.get(t);
583
+ if (!e)
584
+ throw new TypeError('"ref" was already garbage collected or did not resolve from the proper sources');
585
+ return e;
586
+ }
587
+ async function Te(t, e, n, o = !1, s = !1) {
588
+ if (j(t), z(e), !Z(n, Response))
576
589
  throw new TypeError('"response" must be an instance of Response');
577
590
  if (n.status !== 200) {
578
591
  let i;
579
- if (i = await yt(n))
592
+ if (i = await Pt(n))
580
593
  return i;
581
594
  throw new a('"response" is not a conform Token Endpoint response');
582
595
  }
583
- Q(n);
584
- let o;
596
+ te(n);
597
+ let r;
585
598
  try {
586
- o = await n.json();
599
+ r = await n.json();
587
600
  } catch (i) {
588
601
  throw new a('failed to parse "response" body as JSON', { cause: i });
589
602
  }
590
- if (!x(o))
603
+ if (!C(r))
591
604
  throw new a('"response" body must be a top level object');
592
- if (!m(o.access_token))
605
+ if (!p(r.access_token))
593
606
  throw new a('"response" body "access_token" property must be a non-empty string');
594
- if (!m(o.token_type))
607
+ if (!p(r.token_type))
595
608
  throw new a('"response" body "token_type" property must be a non-empty string');
596
- if (o.token_type = o.token_type.toLowerCase(), o.token_type !== "dpop" && o.token_type !== "bearer")
609
+ if (r.token_type = r.token_type.toLowerCase(), r.token_type !== "dpop" && r.token_type !== "bearer")
597
610
  throw new S("unsupported `token_type` value");
598
- if (o.expires_in !== void 0 && (typeof o.expires_in != "number" || o.expires_in <= 0))
611
+ if (r.expires_in !== void 0 && (typeof r.expires_in != "number" || r.expires_in <= 0))
599
612
  throw new a('"response" body "expires_in" property must be a positive number');
600
- if (!s && o.refresh_token !== void 0 && !m(o.refresh_token))
613
+ if (!s && r.refresh_token !== void 0 && !p(r.refresh_token))
601
614
  throw new a('"response" body "refresh_token" property must be a non-empty string');
602
- if (o.scope !== void 0 && typeof o.scope != "string")
615
+ if (r.scope !== void 0 && typeof r.scope != "string")
603
616
  throw new a('"response" body "scope" property must be a string');
604
- if (!r) {
605
- if (o.id_token !== void 0 && !m(o.id_token))
617
+ if (!o) {
618
+ if (r.id_token !== void 0 && !p(r.id_token))
606
619
  throw new a('"response" body "id_token" property must be a non-empty string');
607
- if (o.id_token) {
608
- const { claims: i } = await bt(o.id_token, vt.bind(void 0, e.id_token_signed_response_alg, t.id_token_signing_alg_values_supported), Se, D(e), Ze(e)).then(gt.bind(void 0, ["aud", "exp", "iat", "iss", "sub"])).then(ht.bind(void 0, t.issuer)).then(dt.bind(void 0, e.client_id));
620
+ if (r.id_token) {
621
+ const { claims: i } = await xt(r.id_token, Lt.bind(void 0, e.id_token_signed_response_alg, t.id_token_signing_alg_values_supported), Ae, I(e), ye(e)).then(Et.bind(void 0, ["aud", "exp", "iat", "iss", "sub"])).then(vt.bind(void 0, t.issuer)).then(_t.bind(void 0, e.client_id));
609
622
  if (Array.isArray(i.aud) && i.aud.length !== 1 && i.azp !== e.client_id)
610
623
  throw new a('unexpected ID Token "azp" (authorized party) claim value');
611
624
  if (i.auth_time !== void 0 && (!Number.isFinite(i.auth_time) || Math.sign(i.auth_time) !== 1))
612
625
  throw new a('ID Token "auth_time" (authentication time) must be a positive number');
613
- ut.set(o, i);
626
+ Se.set(r, i);
614
627
  }
615
628
  }
616
- return o;
629
+ return r;
617
630
  }
618
- async function lt(t, e, n) {
619
- return _e(t, e, n);
631
+ async function bt(t, e, n) {
632
+ return Te(t, e, n);
620
633
  }
621
- function dt(t, e) {
634
+ function _t(t, e) {
622
635
  if (Array.isArray(e.claims.aud)) {
623
636
  if (!e.claims.aud.includes(t))
624
637
  throw new a('unexpected JWT "aud" (audience) claim value');
@@ -626,29 +639,29 @@ function dt(t, e) {
626
639
  throw new a('unexpected JWT "aud" (audience) claim value');
627
640
  return e;
628
641
  }
629
- function ht(t, e) {
642
+ function vt(t, e) {
630
643
  if (e.claims.iss !== t)
631
644
  throw new a('unexpected JWT "iss" (issuer) claim value');
632
645
  return e;
633
646
  }
634
- const be = /* @__PURE__ */ new WeakSet();
635
- function ft(t) {
636
- return be.add(t), t;
647
+ const ke = /* @__PURE__ */ new WeakSet();
648
+ function St(t) {
649
+ return ke.add(t), t;
637
650
  }
638
- async function pt(t, e, n, r, s, o) {
639
- if (L(t), C(e), !be.has(n))
651
+ async function Tt(t, e, n, o, s, r) {
652
+ if (j(t), z(e), !ke.has(n))
640
653
  throw new TypeError('"callbackParameters" must be an instance of URLSearchParams obtained from "validateAuthResponse()", or "validateJwtAuthResponse()');
641
- if (!m(r))
654
+ if (!p(o))
642
655
  throw new TypeError('"redirectUri" must be a non-empty string');
643
- if (!m(s))
656
+ if (!p(s))
644
657
  throw new TypeError('"codeVerifier" must be a non-empty string');
645
658
  const i = T(n, "code");
646
659
  if (!i)
647
660
  throw new a('no authorization code in "callbackParameters"');
648
- const u = new URLSearchParams(o == null ? void 0 : o.additionalParameters);
649
- return u.set("redirect_uri", r), u.set("code_verifier", s), u.set("code", i), ye(t, e, "authorization_code", u, o);
661
+ const u = new URLSearchParams(r == null ? void 0 : r.additionalParameters);
662
+ return u.set("redirect_uri", o), u.set("code_verifier", s), u.set("code", i), ve(t, e, "authorization_code", u, r);
650
663
  }
651
- const wt = {
664
+ const kt = {
652
665
  aud: "audience",
653
666
  c_hash: "code hash",
654
667
  client_id: "client id",
@@ -664,43 +677,66 @@ const wt = {
664
677
  htu: "http uri",
665
678
  cnf: "confirmation"
666
679
  };
667
- function gt(t, e) {
680
+ function Et(t, e) {
668
681
  for (const n of t)
669
682
  if (e.claims[n] === void 0)
670
- throw new a(`JWT "${n}" (${wt[n]}) claim missing`);
683
+ throw new a(`JWT "${n}" (${kt[n]}) claim missing`);
671
684
  return e;
672
685
  }
673
- async function mt(t, e, n) {
674
- const r = await _e(t, e, n, !0);
675
- if (B(r))
686
+ const At = Symbol(), q = Symbol();
687
+ async function Rt(t, e, n, o, s) {
688
+ const r = await Te(t, e, n);
689
+ if (Y(r))
676
690
  return r;
677
- if (r.id_token !== void 0) {
678
- if (typeof r.id_token == "string" && r.id_token.length)
679
- throw new a("Unexpected ID Token returned, use processAuthorizationCodeOpenIDResponse() for OpenID Connect callback processing");
680
- delete r.id_token;
691
+ if (!p(r.id_token))
692
+ throw new a('"response" body "id_token" property must be a non-empty string');
693
+ s ?? (s = e.default_max_age ?? q);
694
+ const i = yt(r);
695
+ if ((e.require_auth_time || s !== q) && i.auth_time === void 0)
696
+ throw new a('ID Token "auth_time" (authentication time) claim missing');
697
+ if (s !== q) {
698
+ if (typeof s != "number" || s < 0)
699
+ throw new TypeError('"maxAge" must be a non-negative number');
700
+ const u = F() + I(e), d = ye(e);
701
+ if (i.auth_time + s < u - d)
702
+ throw new a("too much time has elapsed since the last End-User authentication");
703
+ }
704
+ switch (o) {
705
+ case void 0:
706
+ case At:
707
+ if (i.nonce !== void 0)
708
+ throw new a('unexpected ID Token "nonce" claim value');
709
+ break;
710
+ default:
711
+ if (!p(o))
712
+ throw new TypeError('"expectedNonce" must be a non-empty string');
713
+ if (i.nonce === void 0)
714
+ throw new a('ID Token "nonce" claim missing');
715
+ if (i.nonce !== o)
716
+ throw new a('unexpected ID Token "nonce" claim value');
681
717
  }
682
718
  return r;
683
719
  }
684
- function Q(t) {
720
+ function te(t) {
685
721
  if (t.bodyUsed)
686
722
  throw new TypeError('"response" body has been used already');
687
723
  }
688
- async function yt(t) {
724
+ async function Pt(t) {
689
725
  if (t.status > 399 && t.status < 500) {
690
- Q(t);
726
+ te(t);
691
727
  try {
692
728
  const e = await t.json();
693
- if (x(e) && typeof e.error == "string" && e.error.length)
729
+ if (C(e) && typeof e.error == "string" && e.error.length)
694
730
  return e.error_description !== void 0 && typeof e.error_description != "string" && delete e.error_description, e.error_uri !== void 0 && typeof e.error_uri != "string" && delete e.error_uri, e.algs !== void 0 && typeof e.algs != "string" && delete e.algs, e.scope !== void 0 && typeof e.scope != "string" && delete e.scope, e;
695
731
  } catch {
696
732
  }
697
733
  }
698
734
  }
699
- function ce(t) {
735
+ function le(t) {
700
736
  if (typeof t.modulusLength != "number" || t.modulusLength < 2048)
701
737
  throw new a(`${t.name} modulusLength must be at least 2048 bits`);
702
738
  }
703
- function _t(t) {
739
+ function Ut(t) {
704
740
  switch (t) {
705
741
  case "P-256":
706
742
  return "SHA-256";
@@ -712,15 +748,15 @@ function _t(t) {
712
748
  throw new S();
713
749
  }
714
750
  }
715
- function ve(t) {
751
+ function Ee(t) {
716
752
  switch (t.algorithm.name) {
717
753
  case "ECDSA":
718
754
  return {
719
755
  name: t.algorithm.name,
720
- hash: _t(t.algorithm.namedCurve)
756
+ hash: Ut(t.algorithm.namedCurve)
721
757
  };
722
758
  case "RSA-PSS":
723
- switch (ce(t.algorithm), t.algorithm.hash.name) {
759
+ switch (le(t.algorithm), t.algorithm.hash.name) {
724
760
  case "SHA-256":
725
761
  case "SHA-384":
726
762
  case "SHA-512":
@@ -732,68 +768,68 @@ function ve(t) {
732
768
  throw new S();
733
769
  }
734
770
  case "RSASSA-PKCS1-v1_5":
735
- return ce(t.algorithm), t.algorithm.name;
771
+ return le(t.algorithm), t.algorithm.name;
736
772
  case "Ed448":
737
773
  case "Ed25519":
738
774
  return t.algorithm.name;
739
775
  }
740
776
  throw new S();
741
777
  }
742
- const Se = Symbol();
743
- async function bt(t, e, n, r, s) {
744
- const { 0: o, 1: i, 2: u, length: f } = t.split(".");
745
- if (f === 5)
778
+ const Ae = Symbol();
779
+ async function xt(t, e, n, o, s) {
780
+ const { 0: r, 1: i, 2: u, length: d } = t.split(".");
781
+ if (d === 5)
746
782
  throw new S("JWE structure JWTs are not supported");
747
- if (f !== 3)
783
+ if (d !== 3)
748
784
  throw new a("Invalid JWT");
749
785
  let y;
750
786
  try {
751
- y = JSON.parse(k(A(o)));
752
- } catch (E) {
753
- throw new a("failed to parse JWT Header body as base64url encoded JSON", { cause: E });
787
+ y = JSON.parse(E(k(r)));
788
+ } catch (A) {
789
+ throw new a("failed to parse JWT Header body as base64url encoded JSON", { cause: A });
754
790
  }
755
- if (!x(y))
791
+ if (!C(y))
756
792
  throw new a("JWT Header must be a top level object");
757
793
  if (e(y), y.crit !== void 0)
758
794
  throw new a('unexpected JWT "crit" header parameter');
759
- const _ = A(u);
760
- let b;
761
- if (n !== Se) {
762
- b = await n(y);
763
- const E = `${o}.${i}`;
764
- if (!await crypto.subtle.verify(ve(b), b, _, k(E)))
795
+ const b = k(u);
796
+ let _;
797
+ if (n !== Ae) {
798
+ _ = await n(y);
799
+ const A = `${r}.${i}`;
800
+ if (!await crypto.subtle.verify(Ee(_), _, b, E(A)))
765
801
  throw new a("JWT signature verification failed");
766
802
  }
767
- let h;
803
+ let f;
768
804
  try {
769
- h = JSON.parse(k(A(i)));
770
- } catch (E) {
771
- throw new a("failed to parse JWT Payload body as base64url encoded JSON", { cause: E });
805
+ f = JSON.parse(E(k(i)));
806
+ } catch (A) {
807
+ throw new a("failed to parse JWT Payload body as base64url encoded JSON", { cause: A });
772
808
  }
773
- if (!x(h))
809
+ if (!C(f))
774
810
  throw new a("JWT Payload must be a top level object");
775
- const P = Z() + r;
776
- if (h.exp !== void 0) {
777
- if (typeof h.exp != "number")
811
+ const U = F() + o;
812
+ if (f.exp !== void 0) {
813
+ if (typeof f.exp != "number")
778
814
  throw new a('unexpected JWT "exp" (expiration time) claim type');
779
- if (h.exp <= P - s)
815
+ if (f.exp <= U - s)
780
816
  throw new a('unexpected JWT "exp" (expiration time) claim value, timestamp is <= now()');
781
817
  }
782
- if (h.iat !== void 0 && typeof h.iat != "number")
818
+ if (f.iat !== void 0 && typeof f.iat != "number")
783
819
  throw new a('unexpected JWT "iat" (issued at) claim type');
784
- if (h.iss !== void 0 && typeof h.iss != "string")
820
+ if (f.iss !== void 0 && typeof f.iss != "string")
785
821
  throw new a('unexpected JWT "iss" (issuer) claim type');
786
- if (h.nbf !== void 0) {
787
- if (typeof h.nbf != "number")
822
+ if (f.nbf !== void 0) {
823
+ if (typeof f.nbf != "number")
788
824
  throw new a('unexpected JWT "nbf" (not before) claim type');
789
- if (h.nbf > P + s)
825
+ if (f.nbf > U + s)
790
826
  throw new a('unexpected JWT "nbf" (not before) claim value, timestamp is > now()');
791
827
  }
792
- if (h.aud !== void 0 && typeof h.aud != "string" && !Array.isArray(h.aud))
828
+ if (f.aud !== void 0 && typeof f.aud != "string" && !Array.isArray(f.aud))
793
829
  throw new a('unexpected JWT "aud" (audience) claim type');
794
- return { header: y, claims: h, signature: _, key: b };
830
+ return { header: y, claims: f, signature: b, key: _ };
795
831
  }
796
- function vt(t, e, n) {
832
+ function Lt(t, e, n) {
797
833
  if (t !== void 0) {
798
834
  if (n.alg !== t)
799
835
  throw new a('unexpected JWT "alg" header parameter');
@@ -808,36 +844,36 @@ function vt(t, e, n) {
808
844
  throw new a('unexpected JWT "alg" header parameter');
809
845
  }
810
846
  function T(t, e) {
811
- const { 0: n, length: r } = t.getAll(e);
812
- if (r > 1)
847
+ const { 0: n, length: o } = t.getAll(e);
848
+ if (o > 1)
813
849
  throw new a(`"${e}" parameter must be provided only once`);
814
850
  return n;
815
851
  }
816
- const St = Symbol(), Tt = Symbol();
817
- function At(t, e, n, r) {
818
- if (L(t), C(e), n instanceof URL && (n = n.searchParams), !(n instanceof URLSearchParams))
852
+ const Ct = Symbol(), It = Symbol();
853
+ function jt(t, e, n, o) {
854
+ if (j(t), z(e), n instanceof URL && (n = n.searchParams), !(n instanceof URLSearchParams))
819
855
  throw new TypeError('"parameters" must be an instance of URLSearchParams, or URL');
820
856
  if (T(n, "response"))
821
857
  throw new a('"parameters" contains a JARM response, use validateJwtAuthResponse() instead of validateAuthResponse()');
822
- const s = T(n, "iss"), o = T(n, "state");
858
+ const s = T(n, "iss"), r = T(n, "state");
823
859
  if (!s && t.authorization_response_iss_parameter_supported)
824
860
  throw new a('response parameter "iss" (issuer) missing');
825
861
  if (s && s !== t.issuer)
826
862
  throw new a('unexpected "iss" (issuer) response parameter value');
827
- switch (r) {
863
+ switch (o) {
828
864
  case void 0:
829
- case Tt:
830
- if (o !== void 0)
865
+ case It:
866
+ if (r !== void 0)
831
867
  throw new a('unexpected "state" response parameter encountered');
832
868
  break;
833
- case St:
869
+ case Ct:
834
870
  break;
835
871
  default:
836
- if (!m(r))
872
+ if (!p(o))
837
873
  throw new a('"expectedState" must be a non-empty string');
838
- if (o === void 0)
874
+ if (r === void 0)
839
875
  throw new a('response parameter "state" missing');
840
- if (o !== r)
876
+ if (r !== o)
841
877
  throw new a('unexpected "state" response parameter value');
842
878
  }
843
879
  const i = T(n, "error");
@@ -847,59 +883,82 @@ function At(t, e, n, r) {
847
883
  error_description: T(n, "error_description"),
848
884
  error_uri: T(n, "error_uri")
849
885
  };
850
- const u = T(n, "id_token"), f = T(n, "token");
851
- if (u !== void 0 || f !== void 0)
886
+ const u = T(n, "id_token"), d = T(n, "token");
887
+ if (u !== void 0 || d !== void 0)
852
888
  throw new S("implicit and hybrid flows are not supported");
853
- return ft(new URLSearchParams(n));
889
+ return St(new URLSearchParams(n));
890
+ }
891
+ function zt({
892
+ handleCallback: t
893
+ }) {
894
+ const [e, n] = ze(null), o = We(), s = Je(!1);
895
+ return Oe(() => {
896
+ s.current || (s.current = !0, t().then((r) => {
897
+ o(r);
898
+ }).catch((r) => {
899
+ D.error(r), n(r);
900
+ }));
901
+ }, [o, t]), e ? /* @__PURE__ */ R.jsx(
902
+ De,
903
+ {
904
+ category: "Error",
905
+ title: "Authentication Error",
906
+ message: /* @__PURE__ */ R.jsxs(R.Fragment, { children: [
907
+ /* @__PURE__ */ R.jsx(Ne, { className: "mb-4", children: "Check the configuration of your authorization provider and ensure all settings such as the callback URL are configured correctly." }),
908
+ "An error occurred while authorizing the user.",
909
+ /* @__PURE__ */ R.jsx(Ke, { code: e.toString(), language: "plain" })
910
+ ] })
911
+ }
912
+ ) : /* @__PURE__ */ R.jsx("p", { children: "Loading..." });
854
913
  }
855
- class O extends Error {
914
+ class L extends Error {
856
915
  }
857
- class ue extends O {
858
- constructor(e, n, r) {
859
- super(e, r), this.error = n;
916
+ class he extends L {
917
+ constructor(e, n, o) {
918
+ super(e, o), this.error = n;
860
919
  }
861
920
  }
862
- const F = "code-verifier";
863
- class kt extends Le {
921
+ const G = "code-verifier";
922
+ class Jt extends je {
864
923
  constructor(e, n) {
865
- super(), this.callbackUrlPath = e, this.initialize = n;
924
+ super(), this.callbackUrlPath = e, this.handleCallback = n;
866
925
  }
867
926
  getRoutes() {
868
927
  return [
869
928
  ...super.getRoutes(),
870
929
  {
871
930
  path: this.callbackUrlPath,
872
- element: /* @__PURE__ */ Pe.jsx("div", {})
931
+ element: /* @__PURE__ */ R.jsx(zt, { handleCallback: this.handleCallback })
873
932
  }
874
933
  ];
875
934
  }
876
935
  }
877
- class Et {
936
+ class Ot {
878
937
  constructor({
879
938
  issuer: e,
880
939
  audience: n,
881
- authorizationEndpoint: r,
940
+ authorizationEndpoint: o,
882
941
  tokenEndpoint: s,
883
- clientId: o,
942
+ clientId: r,
884
943
  redirectToAfterSignUp: i,
885
944
  redirectToAfterSignIn: u,
886
- redirectToAfterSignOut: f
945
+ redirectToAfterSignOut: d
887
946
  }) {
888
- g(this, "client");
889
- g(this, "issuer");
890
- g(this, "authorizationEndpoint");
891
- g(this, "tokenEndpoint");
892
- g(this, "authorizationServer");
893
- g(this, "tokens");
894
- g(this, "callbackUrlPath", "/oauth/callback");
895
- g(this, "logoutRedirectUrlPath", "/");
896
- g(this, "onAuthorizationUrl");
897
- g(this, "redirectToAfterSignUp");
898
- g(this, "redirectToAfterSignIn");
899
- g(this, "redirectToAfterSignOut");
900
- g(this, "audience");
901
- g(this, "signOut", async () => {
902
- ne.setState({
947
+ m(this, "client");
948
+ m(this, "issuer");
949
+ m(this, "authorizationEndpoint");
950
+ m(this, "tokenEndpoint");
951
+ m(this, "authorizationServer");
952
+ m(this, "tokens");
953
+ m(this, "callbackUrlPath", "/oauth/callback");
954
+ m(this, "logoutRedirectUrlPath", "/");
955
+ m(this, "onAuthorizationUrl");
956
+ m(this, "redirectToAfterSignUp");
957
+ m(this, "redirectToAfterSignIn");
958
+ m(this, "redirectToAfterSignOut");
959
+ m(this, "audience");
960
+ m(this, "signOut", async () => {
961
+ ie.setState({
903
962
  isAuthenticated: !1,
904
963
  isPending: !1,
905
964
  profile: void 0
@@ -908,62 +967,62 @@ class Et {
908
967
  window.location.origin + this.redirectToAfterSignOut
909
968
  );
910
969
  n.pathname = this.logoutRedirectUrlPath;
911
- let r;
912
- e.end_session_endpoint ? (r = new URL(e.end_session_endpoint), r.searchParams.set(
970
+ let o;
971
+ e.end_session_endpoint ? (o = new URL(e.end_session_endpoint), o.searchParams.set(
913
972
  "post_logout_redirect_uri",
914
973
  n.toString()
915
- )) : r = n;
974
+ )) : o = n;
916
975
  });
917
- g(this, "handleCallback", async () => {
918
- const e = new URL(window.location.href), n = e.searchParams.get("state"), r = sessionStorage.getItem(F);
919
- if (sessionStorage.removeItem(F), !r)
920
- return "/";
921
- const s = await this.getAuthServer(), o = At(
976
+ m(this, "handleCallback", async () => {
977
+ const e = new URL(window.location.href), n = e.searchParams.get("state"), o = sessionStorage.getItem(G);
978
+ if (sessionStorage.removeItem(G), !o)
979
+ throw new L("No code verifier found in state.");
980
+ const s = await this.getAuthServer(), r = jt(
922
981
  s,
923
982
  this.client,
924
983
  e.searchParams,
925
984
  n ?? void 0
926
985
  );
927
- if (B(o))
928
- throw re.error("Error validating OAuth response", o), new ue(
986
+ if (Y(r))
987
+ throw D.error("Error validating OAuth response", r), new he(
929
988
  "Error validating OAuth response",
930
- o
989
+ r
931
990
  );
932
991
  const i = new URL(e);
933
992
  i.pathname = this.redirectToAfterSignIn, i.search = "";
934
- const u = await pt(
993
+ const u = await Tt(
935
994
  s,
936
995
  this.client,
937
- o,
996
+ r,
938
997
  i.toString(),
939
- r
940
- ), f = await mt(
998
+ o
999
+ ), d = await Rt(
941
1000
  s,
942
1001
  this.client,
943
1002
  u
944
1003
  );
945
- this.setTokensFromResponse(f);
946
- const y = await this.getAccessToken(), b = await (await st(
1004
+ this.setTokensFromResponse(d);
1005
+ const y = await this.getAccessToken(), _ = await (await wt(
947
1006
  s,
948
1007
  this.client,
949
1008
  y
950
- )).json(), h = {
951
- sub: b.sub,
952
- email: b.email,
953
- name: b.name,
954
- emailVerified: b.email_verified ?? !1,
955
- pictureUrl: b.picture
1009
+ )).json(), f = {
1010
+ sub: _.sub,
1011
+ email: _.email,
1012
+ name: _.name,
1013
+ emailVerified: _.email_verified ?? !1,
1014
+ pictureUrl: _.picture
956
1015
  };
957
- return ne.setState({
1016
+ return ie.setState({
958
1017
  isAuthenticated: !0,
959
1018
  isPending: !1,
960
- profile: h
1019
+ profile: f
961
1020
  }), localStorage.setItem("auto-login", "1"), sessionStorage.getItem("redirect-to") ?? "/";
962
1021
  });
963
1022
  this.client = {
964
- client_id: o,
1023
+ client_id: r,
965
1024
  token_endpoint_auth_method: "none"
966
- }, this.audience = n, this.issuer = e, this.authorizationEndpoint = r, this.tokenEndpoint = s, this.redirectToAfterSignUp = i ?? "/", this.redirectToAfterSignIn = u ?? "/", this.redirectToAfterSignOut = f ?? "/";
1025
+ }, this.audience = n, this.issuer = e, this.authorizationEndpoint = o, this.tokenEndpoint = s, this.redirectToAfterSignUp = i ?? "/", this.redirectToAfterSignIn = u ?? "/", this.redirectToAfterSignOut = d ?? "/";
967
1026
  }
968
1027
  async getAuthServer() {
969
1028
  if (!this.authorizationServer)
@@ -975,8 +1034,8 @@ class Et {
975
1034
  code_challenge_methods_supported: []
976
1035
  };
977
1036
  else {
978
- const e = new URL(this.issuer), n = await De(e);
979
- this.authorizationServer = await He(
1037
+ const e = new URL(this.issuer), n = await Ze(e);
1038
+ this.authorizationServer = await Qe(
980
1039
  e,
981
1040
  n
982
1041
  );
@@ -988,10 +1047,10 @@ class Et {
988
1047
  * @param response
989
1048
  */
990
1049
  setTokensFromResponse(e) {
991
- if (B(e))
992
- throw re.error("Bad Token Response", e), new ue("Bad Token Response", e);
1050
+ if (Y(e))
1051
+ throw D.error("Bad Token Response", e), new he("Bad Token Response", e);
993
1052
  if (!e.expires_in)
994
- throw new O("No expires_in in response");
1053
+ throw new L("No expires_in in response");
995
1054
  this.tokens = {
996
1055
  accessToken: e.access_token,
997
1056
  refreshToken: e.refresh_token,
@@ -1014,68 +1073,61 @@ class Et {
1014
1073
  redirectTo: e,
1015
1074
  isSignUp: n = !1
1016
1075
  }) {
1017
- var y, _;
1018
- const r = "S256", s = await this.getAuthServer();
1076
+ var y, b;
1077
+ const o = "S256", s = await this.getAuthServer();
1019
1078
  if (!s.authorization_endpoint)
1020
- throw new O("No authorization endpoint");
1021
- const o = $e(), i = await Me(o);
1022
- sessionStorage.setItem(F, o);
1079
+ throw new L("No authorization endpoint");
1080
+ const r = Xe(), i = await tt(r);
1081
+ sessionStorage.setItem(G, r);
1023
1082
  const u = new URL(
1024
1083
  s.authorization_endpoint
1025
1084
  );
1026
1085
  sessionStorage.setItem("redirect-to", e);
1027
- const f = new URL(window.location.origin);
1028
- if (f.pathname = this.callbackUrlPath, f.search = "", u.searchParams.set("client_id", this.client.client_id), u.searchParams.set("redirect_uri", f.toString()), u.searchParams.set("response_type", "code"), u.searchParams.set("scope", "openid profile"), u.searchParams.set("code_challenge", i), u.searchParams.set(
1086
+ const d = new URL(window.location.origin);
1087
+ if (d.pathname = this.callbackUrlPath, d.search = "", u.searchParams.set("client_id", this.client.client_id), u.searchParams.set("redirect_uri", d.toString()), u.searchParams.set("response_type", "code"), u.searchParams.set("scope", "openid profile email"), u.searchParams.set("code_challenge", i), u.searchParams.set(
1029
1088
  "code_challenge_method",
1030
- r
1089
+ o
1031
1090
  ), this.audience && u.searchParams.set("audience", this.audience), (y = this.onAuthorizationUrl) == null || y.call(this, u, {
1032
1091
  isSignIn: !n,
1033
1092
  isSignUp: n
1034
- }), ((_ = s.code_challenge_methods_supported) == null ? void 0 : _.includes("S256")) !== !0) {
1035
- const b = Fe();
1036
- u.searchParams.set("state", b);
1093
+ }), ((b = s.code_challenge_methods_supported) == null ? void 0 : b.includes("S256")) !== !0) {
1094
+ const _ = et();
1095
+ u.searchParams.set("state", _);
1037
1096
  }
1038
1097
  location.href = u.href;
1039
1098
  }
1040
1099
  async getAccessToken() {
1041
1100
  const e = await this.getAuthServer();
1042
1101
  if (!this.tokens)
1043
- throw new O("User is not authenticated");
1102
+ throw new L("User is not authenticated");
1044
1103
  if (this.tokens.expiresOn < /* @__PURE__ */ new Date()) {
1045
1104
  if (!this.tokens.refreshToken)
1046
1105
  return await this.signIn(), "";
1047
- const n = await ct(
1106
+ const n = await mt(
1048
1107
  e,
1049
1108
  this.client,
1050
1109
  this.tokens.refreshToken
1051
- ), r = await lt(
1110
+ ), o = await bt(
1052
1111
  e,
1053
1112
  this.client,
1054
1113
  n
1055
1114
  );
1056
- this.setTokensFromResponse(r);
1115
+ this.setTokensFromResponse(o);
1057
1116
  }
1058
1117
  return this.tokens.accessToken;
1059
1118
  }
1119
+ pageLoad() {
1120
+ localStorage.getItem("auto-login") && (localStorage.removeItem("auto-login"), this.authorize({ redirectTo: window.location.pathname }).catch((e) => {
1121
+ D.error(e);
1122
+ }));
1123
+ }
1060
1124
  getAuthenticationPlugin() {
1061
- return new kt(
1062
- this.callbackUrlPath,
1063
- async (e, n) => {
1064
- if (!(typeof window > "u")) {
1065
- if (localStorage.getItem("auto-login"))
1066
- localStorage.removeItem("auto-login"), await this.authorize({ redirectTo: window.location.pathname });
1067
- else if (window.location.pathname === "/oauth/callback") {
1068
- const r = await this.handleCallback();
1069
- r && n.navigate(r);
1070
- }
1071
- }
1072
- }
1073
- );
1125
+ return new Jt(this.callbackUrlPath, this.handleCallback);
1074
1126
  }
1075
1127
  }
1076
- const Ct = (t) => new Et(t);
1128
+ const Gt = (t) => new Ot(t);
1077
1129
  export {
1078
- Et as OpenIDAuthenticationProvider,
1079
- Ct as default
1130
+ Ot as OpenIDAuthenticationProvider,
1131
+ Gt as default
1080
1132
  };
1081
1133
  //# sourceMappingURL=zudoku.auth-openid.js.map