zudoku 0.53.6 → 0.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/dist/config/config.d.ts +1 -0
  2. package/dist/config/validators/InputNavigationSchema.d.ts +190 -158
  3. package/dist/config/validators/InputNavigationSchema.js +4 -1
  4. package/dist/config/validators/InputNavigationSchema.js.map +1 -1
  5. package/dist/config/validators/ProtectedRoutesSchema.d.ts +12 -0
  6. package/dist/config/validators/ProtectedRoutesSchema.js +19 -0
  7. package/dist/config/validators/ProtectedRoutesSchema.js.map +1 -0
  8. package/dist/config/validators/validate.d.ts +32 -19
  9. package/dist/config/validators/validate.js +6 -2
  10. package/dist/config/validators/validate.js.map +1 -1
  11. package/dist/lib/authentication/components/CallbackHandler.js +11 -9
  12. package/dist/lib/authentication/components/CallbackHandler.js.map +1 -1
  13. package/dist/lib/authentication/components/OAuthErrorPage.d.ts +3 -0
  14. package/dist/lib/authentication/components/OAuthErrorPage.js +99 -0
  15. package/dist/lib/authentication/components/OAuthErrorPage.js.map +1 -0
  16. package/dist/lib/authentication/errors.d.ts +6 -12
  17. package/dist/lib/authentication/errors.js +2 -1
  18. package/dist/lib/authentication/errors.js.map +1 -1
  19. package/dist/lib/authentication/hook.d.ts +1 -0
  20. package/dist/lib/authentication/hook.js.map +1 -1
  21. package/dist/lib/authentication/providers/azureb2c.js +4 -2
  22. package/dist/lib/authentication/providers/azureb2c.js.map +1 -1
  23. package/dist/lib/authentication/providers/clerk.js +4 -2
  24. package/dist/lib/authentication/providers/clerk.js.map +1 -1
  25. package/dist/lib/authentication/providers/openid.js +3 -1
  26. package/dist/lib/authentication/providers/openid.js.map +1 -1
  27. package/dist/lib/components/Heading.js +1 -1
  28. package/dist/lib/components/Heading.js.map +1 -1
  29. package/dist/lib/components/MobileTopNavigation.js +5 -3
  30. package/dist/lib/components/MobileTopNavigation.js.map +1 -1
  31. package/dist/lib/components/TopNavigation.js +4 -3
  32. package/dist/lib/components/TopNavigation.js.map +1 -1
  33. package/dist/lib/components/context/ZudokuContext.js +21 -13
  34. package/dist/lib/components/context/ZudokuContext.js.map +1 -1
  35. package/dist/lib/components/navigation/NavigationItem.d.ts +1 -1
  36. package/dist/lib/components/navigation/NavigationItem.js +8 -1
  37. package/dist/lib/components/navigation/NavigationItem.js.map +1 -1
  38. package/dist/lib/components/navigation/utils.d.ts +3 -1
  39. package/dist/lib/components/navigation/utils.js +6 -3
  40. package/dist/lib/components/navigation/utils.js.map +1 -1
  41. package/dist/lib/core/RouteGuard.js +9 -9
  42. package/dist/lib/core/RouteGuard.js.map +1 -1
  43. package/dist/lib/core/ZudokuContext.d.ts +2 -1
  44. package/dist/lib/core/ZudokuContext.js +13 -1
  45. package/dist/lib/core/ZudokuContext.js.map +1 -1
  46. package/dist/lib/core/plugins.d.ts +2 -1
  47. package/dist/lib/core/plugins.js.map +1 -1
  48. package/dist/lib/plugins/api-keys/CreateApiKey.js +7 -3
  49. package/dist/lib/plugins/api-keys/CreateApiKey.js.map +1 -1
  50. package/dist/lib/plugins/api-keys/SettingsApiKeys.js +3 -1
  51. package/dist/lib/plugins/api-keys/SettingsApiKeys.js.map +1 -1
  52. package/dist/lib/plugins/api-keys/index.d.ts +1 -0
  53. package/dist/lib/plugins/api-keys/index.js +3 -7
  54. package/dist/lib/plugins/api-keys/index.js.map +1 -1
  55. package/dist/lib/plugins/openapi/graphql/gql.d.ts +1 -1
  56. package/dist/lib/plugins/openapi/graphql/gql.js +1 -1
  57. package/dist/lib/plugins/openapi/graphql/gql.js.map +1 -1
  58. package/dist/lib/plugins/openapi/graphql/graphql.d.ts +1 -0
  59. package/dist/lib/plugins/openapi/graphql/graphql.js +1 -0
  60. package/dist/lib/plugins/openapi/graphql/graphql.js.map +1 -1
  61. package/dist/lib/plugins/openapi/index.js +42 -10
  62. package/dist/lib/plugins/openapi/index.js.map +1 -1
  63. package/dist/lib/ui/ActionButton.js +1 -1
  64. package/dist/lib/ui/ActionButton.js.map +1 -1
  65. package/dist/lib/ui/Badge.d.ts +1 -1
  66. package/dist/lib/ui/Button.d.ts +2 -2
  67. package/dist/lib/ui/Command.d.ts +1 -1
  68. package/dist/lib/util/invariant.d.ts +6 -5
  69. package/dist/lib/util/invariant.js +1 -1
  70. package/dist/lib/util/invariant.js.map +1 -1
  71. package/dist/vite/dev-server.js +1 -1
  72. package/dist/vite/dev-server.js.map +1 -1
  73. package/dist/vite/prerender/worker.js +5 -1
  74. package/dist/vite/prerender/worker.js.map +1 -1
  75. package/dist/vite/shadcn-registry.d.ts +8 -8
  76. package/lib/{Command-C9AC5cf-.js → Command-BYukybsa.js} +2 -2
  77. package/lib/{Command-C9AC5cf-.js.map → Command-BYukybsa.js.map} +1 -1
  78. package/lib/{Dialog-DMWw1doX.js → Dialog-u9Uz9sTt.js} +4 -4
  79. package/lib/{Dialog-DMWw1doX.js.map → Dialog-u9Uz9sTt.js.map} +1 -1
  80. package/lib/{MdxPage-DVI4iYgW.js → MdxPage-Bsko6_kb.js} +11 -11
  81. package/lib/{MdxPage-DVI4iYgW.js.map → MdxPage-Bsko6_kb.js.map} +1 -1
  82. package/lib/OAuthErrorPage-DJzGiIBt.js +150 -0
  83. package/lib/OAuthErrorPage-DJzGiIBt.js.map +1 -0
  84. package/lib/{OasProvider-CbwsKPNc.js → OasProvider-DQQRt3oS.js} +3 -3
  85. package/lib/{OasProvider-CbwsKPNc.js.map → OasProvider-DQQRt3oS.js.map} +1 -1
  86. package/lib/{OperationList-Bn9ggxw8.js → OperationList-DpmkHf26.js} +45 -43
  87. package/lib/{OperationList-Bn9ggxw8.js.map → OperationList-DpmkHf26.js.map} +1 -1
  88. package/lib/{Pagination-bavPec-z.js → Pagination-kqFNgtnI.js} +3 -3
  89. package/lib/{Pagination-bavPec-z.js.map → Pagination-kqFNgtnI.js.map} +1 -1
  90. package/lib/{RouteGuard-Vnlz_t51.js → RouteGuard-0wPUKdxJ.js} +166 -165
  91. package/lib/{RouteGuard-Vnlz_t51.js.map → RouteGuard-0wPUKdxJ.js.map} +1 -1
  92. package/lib/{SchemaList-DETyCVqu.js → SchemaList-DS-pMd6B.js} +8 -8
  93. package/lib/{SchemaList-DETyCVqu.js.map → SchemaList-DS-pMd6B.js.map} +1 -1
  94. package/lib/{SchemaView-Dvxo2RNe.js → SchemaView-BnN6WHjw.js} +4 -4
  95. package/lib/{SchemaView-Dvxo2RNe.js.map → SchemaView-BnN6WHjw.js.map} +1 -1
  96. package/lib/Select-BmTTKNPp.js +273 -0
  97. package/lib/Select-BmTTKNPp.js.map +1 -0
  98. package/lib/{SignUp-ClYhZq9H.js → SignUp-BwOSCD-6.js} +9 -9
  99. package/lib/{SignUp-ClYhZq9H.js.map → SignUp-BwOSCD-6.js.map} +1 -1
  100. package/lib/{Slot-B31yZlfB.js → Slot-DAyXieeZ.js} +1352 -1349
  101. package/lib/{Slot-B31yZlfB.js.map → Slot-DAyXieeZ.js.map} +1 -1
  102. package/lib/{SyntaxHighlight-bm761HDo.js → SyntaxHighlight-BMKR4pl6.js} +3 -3
  103. package/lib/{SyntaxHighlight-bm761HDo.js.map → SyntaxHighlight-BMKR4pl6.js.map} +1 -1
  104. package/lib/{Toc-D4oBWE8D.js → Toc-BKDRCQzU.js} +2 -2
  105. package/lib/{Toc-D4oBWE8D.js.map → Toc-BKDRCQzU.js.map} +1 -1
  106. package/lib/ZudokuContext-CLl5w57E.js +1278 -0
  107. package/lib/ZudokuContext-CLl5w57E.js.map +1 -0
  108. package/lib/{chunk-DQRVZFIR-DHK7_Ilc.js → chunk-QMGIS6GS-CEOk3lro.js} +3 -3
  109. package/lib/chunk-QMGIS6GS-CEOk3lro.js.map +1 -0
  110. package/lib/{circular-CRbFI6Zl.js → circular-8GWQDvCW.js} +2 -2
  111. package/lib/{circular-CRbFI6Zl.js.map → circular-8GWQDvCW.js.map} +1 -1
  112. package/lib/{createServer-DNyGJJNX.js → createServer-BsezSzvV.js} +5 -5
  113. package/lib/{createServer-DNyGJJNX.js.map → createServer-BsezSzvV.js.map} +1 -1
  114. package/lib/{errors-C1GlNcV3.js → errors-Cs7hKmdL.js} +11 -10
  115. package/lib/errors-Cs7hKmdL.js.map +1 -0
  116. package/lib/hook-DbUCLQNg.js +247 -0
  117. package/lib/hook-DbUCLQNg.js.map +1 -0
  118. package/lib/{index-D09PbNex.js → index-A5Qdwj1B.js} +1521 -1420
  119. package/lib/index-A5Qdwj1B.js.map +1 -0
  120. package/lib/{index-C_PXQ8Bx.js → index-Bg7Js3jB.js} +832 -912
  121. package/lib/index-Bg7Js3jB.js.map +1 -0
  122. package/lib/{index-CZTEgYDd.js → index-BkW9tJ6j.js} +2 -2
  123. package/lib/{index-CZTEgYDd.js.map → index-BkW9tJ6j.js.map} +1 -1
  124. package/lib/index.esm-CdzlRw50.js +1254 -0
  125. package/lib/index.esm-CdzlRw50.js.map +1 -0
  126. package/lib/{invariant-DAFpPywt.js → invariant-Bm-FVUQE.js} +2 -6
  127. package/lib/invariant-Bm-FVUQE.js.map +1 -0
  128. package/lib/ui/ActionButton.js +9 -9
  129. package/lib/ui/ActionButton.js.map +1 -1
  130. package/lib/ui/Command.js +1 -1
  131. package/lib/ui/Form.js +1 -1
  132. package/lib/ui/SyntaxHighlight.js +3 -3
  133. package/lib/{useExposedProps-BIYjecPD.js → useExposedProps-KcgXHKeE.js} +2 -2
  134. package/lib/{useExposedProps-BIYjecPD.js.map → useExposedProps-KcgXHKeE.js.map} +1 -1
  135. package/lib/zudoku.auth-auth0.js +1 -1
  136. package/lib/zudoku.auth-azureb2c.js +25 -17
  137. package/lib/zudoku.auth-azureb2c.js.map +1 -1
  138. package/lib/zudoku.auth-clerk.js +24 -21
  139. package/lib/zudoku.auth-clerk.js.map +1 -1
  140. package/lib/zudoku.auth-openid.js +213 -205
  141. package/lib/zudoku.auth-openid.js.map +1 -1
  142. package/lib/zudoku.auth-supabase.js +2 -2
  143. package/lib/zudoku.components.js +29 -28
  144. package/lib/zudoku.components.js.map +1 -1
  145. package/lib/zudoku.hooks.js +16 -15
  146. package/lib/zudoku.hooks.js.map +1 -1
  147. package/lib/zudoku.plugin-api-catalog.js +26 -25
  148. package/lib/zudoku.plugin-api-catalog.js.map +1 -1
  149. package/lib/zudoku.plugin-api-keys.js +409 -297
  150. package/lib/zudoku.plugin-api-keys.js.map +1 -1
  151. package/lib/zudoku.plugin-custom-pages.js +1 -1
  152. package/lib/zudoku.plugin-markdown.js +1 -1
  153. package/lib/zudoku.plugin-openapi.js +7 -6
  154. package/lib/zudoku.plugin-openapi.js.map +1 -1
  155. package/lib/zudoku.plugin-redirect.js +1 -1
  156. package/lib/zudoku.plugin-search-pagefind.js +28 -27
  157. package/lib/zudoku.plugin-search-pagefind.js.map +1 -1
  158. package/lib/zudoku.plugins.js.map +1 -1
  159. package/package.json +4 -4
  160. package/src/lib/authentication/components/CallbackHandler.tsx +22 -15
  161. package/src/lib/authentication/components/OAuthErrorPage.tsx +171 -0
  162. package/src/lib/authentication/errors.ts +27 -13
  163. package/src/lib/authentication/hook.ts +2 -0
  164. package/src/lib/authentication/providers/azureb2c.tsx +8 -3
  165. package/src/lib/authentication/providers/clerk.tsx +4 -1
  166. package/src/lib/authentication/providers/openid.tsx +7 -1
  167. package/src/lib/components/Heading.tsx +1 -1
  168. package/src/lib/components/MobileTopNavigation.tsx +6 -3
  169. package/src/lib/components/TopNavigation.tsx +4 -4
  170. package/src/lib/components/context/ZudokuContext.ts +25 -18
  171. package/src/lib/components/navigation/NavigationItem.tsx +9 -1
  172. package/src/lib/components/navigation/utils.ts +9 -3
  173. package/src/lib/core/RouteGuard.tsx +13 -13
  174. package/src/lib/core/ZudokuContext.ts +18 -5
  175. package/src/lib/core/plugins.ts +2 -1
  176. package/src/lib/plugins/api-keys/CreateApiKey.tsx +12 -1
  177. package/src/lib/plugins/api-keys/SettingsApiKeys.tsx +24 -4
  178. package/src/lib/plugins/api-keys/index.tsx +7 -8
  179. package/src/lib/plugins/openapi/graphql/gql.ts +3 -3
  180. package/src/lib/plugins/openapi/graphql/graphql.ts +2 -0
  181. package/src/lib/plugins/openapi/index.tsx +66 -16
  182. package/src/lib/ui/ActionButton.tsx +3 -1
  183. package/src/lib/util/invariant.ts +7 -5
  184. package/dist/flat-config.d.ts +0 -323
  185. package/lib/Alert-CWApD0CL.js +0 -161
  186. package/lib/Alert-CWApD0CL.js.map +0 -1
  187. package/lib/CallbackHandler-Dr5Lva9x.js +0 -38
  188. package/lib/CallbackHandler-Dr5Lva9x.js.map +0 -1
  189. package/lib/chunk-DQRVZFIR-DHK7_Ilc.js.map +0 -1
  190. package/lib/errors-C1GlNcV3.js.map +0 -1
  191. package/lib/hook-CZjW2buS.js +0 -1510
  192. package/lib/hook-CZjW2buS.js.map +0 -1
  193. package/lib/index-C_PXQ8Bx.js.map +0 -1
  194. package/lib/index-D09PbNex.js.map +0 -1
  195. package/lib/index.esm-Cp4wkyud.js +0 -1236
  196. package/lib/index.esm-Cp4wkyud.js.map +0 -1
  197. package/lib/invariant-DAFpPywt.js.map +0 -1
@@ -1,11 +1,13 @@
1
- import { j as l } from "./jsx-runtime-C5mzlN2N.js";
1
+ import { j as o } from "./jsx-runtime-C5mzlN2N.js";
2
2
  import { PublicClientApplication as A, EventType as f } from "@azure/msal-browser";
3
- import { C as I } from "./ClientOnly-E7hGysn1.js";
4
- import { j as T, u as h } from "./hook-CZjW2buS.js";
5
- import { C as S } from "./CallbackHandler-Dr5Lva9x.js";
6
- import { C, A as c } from "./errors-C1GlNcV3.js";
3
+ import { E as I } from "./index-A5Qdwj1B.js";
4
+ import { C as T } from "./ClientOnly-E7hGysn1.js";
5
+ import { j as S } from "./ZudokuContext-CLl5w57E.js";
6
+ import { C, A as c } from "./errors-Cs7hKmdL.js";
7
+ import { C as k, O as w } from "./OAuthErrorPage-DJzGiIBt.js";
8
+ import { u as h } from "./hook-DbUCLQNg.js";
7
9
  const u = "/oauth/callback";
8
- class k extends C {
10
+ class y extends C {
9
11
  msalInstance;
10
12
  scopes;
11
13
  redirectToAfterSignUp;
@@ -14,15 +16,15 @@ class k extends C {
14
16
  constructor({
15
17
  clientId: e,
16
18
  tenantName: t,
17
- policyName: o,
18
- scopes: n,
19
+ policyName: n,
20
+ scopes: r,
19
21
  redirectToAfterSignUp: s,
20
22
  redirectToAfterSignIn: a,
21
23
  redirectToAfterSignOut: d = "/",
22
24
  basePath: m = ""
23
25
  }) {
24
- super(), this.scopes = n ?? ["openid", "profile", "email"], this.redirectToAfterSignUp = s, this.redirectToAfterSignIn = a, this.redirectToAfterSignOut = d;
25
- const p = `https://${t}.b2clogin.com/${t}.onmicrosoft.com/${o}`, g = T(m, u);
26
+ super(), this.scopes = r ?? ["openid", "profile", "email"], this.redirectToAfterSignUp = s, this.redirectToAfterSignIn = a, this.redirectToAfterSignOut = d;
27
+ const p = `https://${t}.b2clogin.com/${t}.onmicrosoft.com/${n}`, g = S(m, u);
26
28
  this.msalInstance = new A({
27
29
  auth: {
28
30
  clientId: e,
@@ -43,15 +45,15 @@ class k extends C {
43
45
  });
44
46
  }
45
47
  handleAuthResponse(e) {
46
- const { accessToken: t, idToken: o, scopes: n, account: s } = e;
48
+ const { accessToken: t, idToken: n, scopes: r, account: s } = e;
47
49
  if (!s)
48
50
  throw new c("No account information in response");
49
51
  const a = [s.idTokenClaims?.given_name, s.idTokenClaims?.family_name].filter(Boolean).join(" ") || s.username;
50
52
  h.getState().setLoggedIn({
51
53
  providerData: {
52
54
  accessToken: t,
53
- idToken: o,
54
- scopes: n,
55
+ idToken: n,
56
+ scopes: r,
55
57
  account: s
56
58
  },
57
59
  profile: {
@@ -116,14 +118,20 @@ class k extends C {
116
118
  ...super.getRoutes(),
117
119
  {
118
120
  path: u,
119
- element: /* @__PURE__ */ l.jsx(I, { children: /* @__PURE__ */ l.jsx(S, { handleCallback: this.handleCallback }) })
121
+ element: /* @__PURE__ */ o.jsx(T, { children: /* @__PURE__ */ o.jsx(
122
+ I,
123
+ {
124
+ fallbackRender: ({ error: e }) => /* @__PURE__ */ o.jsx(w, { error: e }),
125
+ children: /* @__PURE__ */ o.jsx(k, { handleCallback: this.handleCallback })
126
+ }
127
+ ) })
120
128
  }
121
129
  ];
122
130
  }
123
131
  }
124
- const j = (r) => new k(r);
132
+ const B = (l) => new y(l);
125
133
  export {
126
- k as AzureB2CAuthPlugin,
127
- j as default
134
+ y as AzureB2CAuthPlugin,
135
+ B as default
128
136
  };
129
137
  //# sourceMappingURL=zudoku.auth-azureb2c.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"zudoku.auth-azureb2c.js","sources":["../src/lib/authentication/providers/azureb2c.tsx"],"sourcesContent":["import type { AuthenticationResult, EventMessage } from \"@azure/msal-browser\";\nimport { EventType, PublicClientApplication } from \"@azure/msal-browser\";\nimport { type AzureB2CAuthenticationConfig } from \"../../../config/config.js\";\nimport { ClientOnly } from \"../../components/ClientOnly.js\";\nimport { joinUrl } from \"../../util/joinUrl.js\";\nimport {\n type AuthenticationPlugin,\n type AuthenticationProviderInitializer,\n} from \"../authentication.js\";\nimport { CallbackHandler } from \"../components/CallbackHandler.js\";\nimport { AuthorizationError } from \"../errors.js\";\nimport { useAuthState } from \"../state.js\";\n\nimport { CoreAuthenticationPlugin } from \"../AuthenticationPlugin.js\";\n\nconst AZUREB2C_CALLBACK_PATH = \"/oauth/callback\";\n\nexport class AzureB2CAuthPlugin\n extends CoreAuthenticationPlugin\n implements AuthenticationPlugin\n{\n private msalInstance: PublicClientApplication;\n private readonly scopes: string[];\n private readonly redirectToAfterSignUp?: string;\n private readonly redirectToAfterSignIn?: string;\n private readonly redirectToAfterSignOut: string;\n\n constructor({\n clientId,\n tenantName,\n policyName,\n scopes,\n redirectToAfterSignUp,\n redirectToAfterSignIn,\n redirectToAfterSignOut = \"/\",\n basePath = \"\",\n }: AzureB2CAuthenticationConfig) {\n super();\n this.scopes = scopes ?? [\"openid\", \"profile\", \"email\"];\n this.redirectToAfterSignUp = redirectToAfterSignUp;\n this.redirectToAfterSignIn = redirectToAfterSignIn;\n this.redirectToAfterSignOut = redirectToAfterSignOut;\n\n const authority = `https://${tenantName}.b2clogin.com/${tenantName}.onmicrosoft.com/${policyName}`;\n const redirectUri = joinUrl(basePath, AZUREB2C_CALLBACK_PATH);\n\n this.msalInstance = new PublicClientApplication({\n auth: {\n clientId,\n authority,\n redirectUri,\n knownAuthorities: [`${tenantName}.b2clogin.com`],\n },\n cache: {\n cacheLocation: \"sessionStorage\",\n storeAuthStateInCookie: false,\n },\n });\n\n void this.msalInstance.initialize().then(async () => {\n void this.msalInstance\n .handleRedirectPromise()\n .then((response: AuthenticationResult | null) => {\n if (response) {\n this.handleAuthResponse(response);\n }\n });\n\n // Add event callback\n void this.msalInstance.addEventCallback((event: EventMessage) => {\n if (event.eventType === EventType.LOGIN_SUCCESS) {\n this.handleAuthResponse(event.payload as AuthenticationResult);\n }\n });\n });\n }\n\n private handleAuthResponse(response: AuthenticationResult) {\n const { accessToken, idToken, scopes, account } = response;\n\n if (!account) {\n throw new AuthorizationError(\"No account information in response\");\n }\n\n // Get the user's name from Azure B2C claims\n const name =\n [account.idTokenClaims?.given_name, account.idTokenClaims?.family_name]\n .filter(Boolean)\n .join(\" \") || account.username;\n\n useAuthState.getState().setLoggedIn({\n providerData: {\n accessToken,\n idToken,\n scopes,\n account,\n },\n profile: {\n sub: account.localAccountId,\n email: account.username,\n name,\n emailVerified: true, // Azure B2C emails are verified\n pictureUrl: undefined, // Azure B2C doesn't provide profile pictures by default\n },\n });\n }\n\n async signUp({ redirectTo }: { redirectTo?: string } = {}) {\n const redirectUri = this.redirectToAfterSignUp ?? redirectTo ?? \"/\";\n sessionStorage.setItem(\"redirect-to\", redirectUri);\n\n await this.msalInstance.loginRedirect({\n scopes: this.scopes,\n prompt: \"select_account\",\n });\n }\n\n async signIn({ redirectTo }: { redirectTo?: string } = {}) {\n const redirectUri = this.redirectToAfterSignIn ?? redirectTo ?? \"/\";\n sessionStorage.setItem(\"redirect-to\", redirectUri);\n\n await this.msalInstance.loginRedirect({\n scopes: this.scopes,\n });\n }\n\n async getAccessToken(): Promise<string> {\n const account = this.msalInstance.getAllAccounts()[0];\n if (!account) {\n throw new AuthorizationError(\"No active account\");\n }\n\n try {\n const response = await this.msalInstance.acquireTokenSilent({\n scopes: this.scopes,\n account,\n });\n return response.accessToken;\n } catch {\n // If silent token acquisition fails, try interactive\n await this.msalInstance.acquireTokenRedirect({\n scopes: this.scopes,\n account,\n });\n\n throw new AuthorizationError(\n \"Token acquisition failed after interactive attempt\",\n );\n }\n }\n\n signRequest = async (request: Request): Promise<Request> => {\n const accessToken = await this.getAccessToken();\n request.headers.set(\"Authorization\", `Bearer ${accessToken}`);\n return request;\n };\n\n signOut = async () => {\n const account = this.msalInstance.getAllAccounts()[0];\n if (account) {\n await this.msalInstance.logoutRedirect({\n account,\n postLogoutRedirectUri:\n window.location.origin + this.redirectToAfterSignOut,\n });\n }\n\n useAuthState.getState().setLoggedOut();\n };\n\n handleCallback = async () => {\n const redirectTo = sessionStorage.getItem(\"redirect-to\") ?? \"/\";\n sessionStorage.removeItem(\"redirect-to\");\n return redirectTo;\n };\n\n getRoutes() {\n return [\n ...super.getRoutes(),\n {\n path: AZUREB2C_CALLBACK_PATH,\n element: (\n <ClientOnly>\n <CallbackHandler handleCallback={this.handleCallback} />\n </ClientOnly>\n ),\n },\n ];\n }\n}\n\nconst azureB2CAuth: AuthenticationProviderInitializer<\n AzureB2CAuthenticationConfig\n> = (options) => new AzureB2CAuthPlugin(options);\n\nexport default azureB2CAuth;\n"],"names":["AZUREB2C_CALLBACK_PATH","AzureB2CAuthPlugin","CoreAuthenticationPlugin","clientId","tenantName","policyName","scopes","redirectToAfterSignUp","redirectToAfterSignIn","redirectToAfterSignOut","basePath","authority","redirectUri","joinUrl","PublicClientApplication","response","event","EventType","accessToken","idToken","account","AuthorizationError","name","useAuthState","redirectTo","request","ClientOnly","jsx","CallbackHandler","azureB2CAuth","options"],"mappings":";;;;;;AAeA,MAAMA,IAAyB;AAExB,MAAMC,UACHC,EAEV;AAAA,EACU;AAAA,EACS;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EAEjB,YAAY;AAAA,IACV,UAAAC;AAAA,IACA,YAAAC;AAAA,IACA,YAAAC;AAAA,IACA,QAAAC;AAAA,IACA,uBAAAC;AAAA,IACA,uBAAAC;AAAA,IACA,wBAAAC,IAAyB;AAAA,IACzB,UAAAC,IAAW;AAAA,EAAA,GACoB;AAC/B,UAAA,GACA,KAAK,SAASJ,KAAU,CAAC,UAAU,WAAW,OAAO,GACrD,KAAK,wBAAwBC,GAC7B,KAAK,wBAAwBC,GAC7B,KAAK,yBAAyBC;AAE9B,UAAME,IAAY,WAAWP,CAAU,iBAAiBA,CAAU,oBAAoBC,CAAU,IAC1FO,IAAcC,EAAQH,GAAUV,CAAsB;AAE5D,SAAK,eAAe,IAAIc,EAAwB;AAAA,MAC9C,MAAM;AAAA,QACJ,UAAAX;AAAA,QACA,WAAAQ;AAAA,QACA,aAAAC;AAAA,QACA,kBAAkB,CAAC,GAAGR,CAAU,eAAe;AAAA,MAAA;AAAA,MAEjD,OAAO;AAAA,QACL,eAAe;AAAA,QACf,wBAAwB;AAAA,MAAA;AAAA,IAC1B,CACD,GAEI,KAAK,aAAa,WAAA,EAAa,KAAK,YAAY;AACnD,MAAK,KAAK,aACP,sBAAA,EACA,KAAK,CAACW,MAA0C;AAC/C,QAAIA,KACF,KAAK,mBAAmBA,CAAQ;AAAA,MAEpC,CAAC,GAGE,KAAK,aAAa,iBAAiB,CAACC,MAAwB;AAC/D,QAAIA,EAAM,cAAcC,EAAU,iBAChC,KAAK,mBAAmBD,EAAM,OAA+B;AAAA,MAEjE,CAAC;AAAA,IACH,CAAC;AAAA,EACH;AAAA,EAEQ,mBAAmBD,GAAgC;AACzD,UAAM,EAAE,aAAAG,GAAa,SAAAC,GAAS,QAAAb,GAAQ,SAAAc,MAAYL;AAElD,QAAI,CAACK;AACH,YAAM,IAAIC,EAAmB,oCAAoC;AAInE,UAAMC,IACJ,CAACF,EAAQ,eAAe,YAAYA,EAAQ,eAAe,WAAW,EACnE,OAAO,OAAO,EACd,KAAK,GAAG,KAAKA,EAAQ;AAE1B,IAAAG,EAAa,SAAA,EAAW,YAAY;AAAA,MAClC,cAAc;AAAA,QACZ,aAAAL;AAAA,QACA,SAAAC;AAAA,QACA,QAAAb;AAAA,QACA,SAAAc;AAAA,MAAA;AAAA,MAEF,SAAS;AAAA,QACP,KAAKA,EAAQ;AAAA,QACb,OAAOA,EAAQ;AAAA,QACf,MAAAE;AAAA,QACA,eAAe;AAAA;AAAA,QACf,YAAY;AAAA;AAAA,MAAA;AAAA,IACd,CACD;AAAA,EACH;AAAA,EAEA,MAAM,OAAO,EAAE,YAAAE,EAAA,IAAwC,IAAI;AACzD,UAAMZ,IAAc,KAAK,yBAAyBY,KAAc;AAChE,mBAAe,QAAQ,eAAeZ,CAAW,GAEjD,MAAM,KAAK,aAAa,cAAc;AAAA,MACpC,QAAQ,KAAK;AAAA,MACb,QAAQ;AAAA,IAAA,CACT;AAAA,EACH;AAAA,EAEA,MAAM,OAAO,EAAE,YAAAY,EAAA,IAAwC,IAAI;AACzD,UAAMZ,IAAc,KAAK,yBAAyBY,KAAc;AAChE,mBAAe,QAAQ,eAAeZ,CAAW,GAEjD,MAAM,KAAK,aAAa,cAAc;AAAA,MACpC,QAAQ,KAAK;AAAA,IAAA,CACd;AAAA,EACH;AAAA,EAEA,MAAM,iBAAkC;AACtC,UAAMQ,IAAU,KAAK,aAAa,eAAA,EAAiB,CAAC;AACpD,QAAI,CAACA;AACH,YAAM,IAAIC,EAAmB,mBAAmB;AAGlD,QAAI;AAKF,cAJiB,MAAM,KAAK,aAAa,mBAAmB;AAAA,QAC1D,QAAQ,KAAK;AAAA,QACb,SAAAD;AAAA,MAAA,CACD,GACe;AAAA,IAClB,QAAQ;AAEN,kBAAM,KAAK,aAAa,qBAAqB;AAAA,QAC3C,QAAQ,KAAK;AAAA,QACb,SAAAA;AAAA,MAAA,CACD,GAEK,IAAIC;AAAA,QACR;AAAA,MAAA;AAAA,IAEJ;AAAA,EACF;AAAA,EAEA,cAAc,OAAOI,MAAuC;AAC1D,UAAMP,IAAc,MAAM,KAAK,eAAA;AAC/B,WAAAO,EAAQ,QAAQ,IAAI,iBAAiB,UAAUP,CAAW,EAAE,GACrDO;AAAA,EACT;AAAA,EAEA,UAAU,YAAY;AACpB,UAAML,IAAU,KAAK,aAAa,eAAA,EAAiB,CAAC;AACpD,IAAIA,KACF,MAAM,KAAK,aAAa,eAAe;AAAA,MACrC,SAAAA;AAAA,MACA,uBACE,OAAO,SAAS,SAAS,KAAK;AAAA,IAAA,CACjC,GAGHG,EAAa,SAAA,EAAW,aAAA;AAAA,EAC1B;AAAA,EAEA,iBAAiB,YAAY;AAC3B,UAAMC,IAAa,eAAe,QAAQ,aAAa,KAAK;AAC5D,0BAAe,WAAW,aAAa,GAChCA;AAAA,EACT;AAAA,EAEA,YAAY;AACV,WAAO;AAAA,MACL,GAAG,MAAM,UAAA;AAAA,MACT;AAAA,QACE,MAAMxB;AAAA,QACN,+BACG0B,GAAA,EACC,UAAAC,gBAAAA,EAAAA,IAACC,KAAgB,gBAAgB,KAAK,gBAAgB,EAAA,CACxD;AAAA,MAAA;AAAA,IAEJ;AAAA,EAEJ;AACF;AAEA,MAAMC,IAEF,CAACC,MAAY,IAAI7B,EAAmB6B,CAAO;"}
1
+ {"version":3,"file":"zudoku.auth-azureb2c.js","sources":["../src/lib/authentication/providers/azureb2c.tsx"],"sourcesContent":["import type { AuthenticationResult, EventMessage } from \"@azure/msal-browser\";\nimport { EventType, PublicClientApplication } from \"@azure/msal-browser\";\nimport { ErrorBoundary } from \"react-error-boundary\";\nimport { type AzureB2CAuthenticationConfig } from \"../../../config/config.js\";\nimport { ClientOnly } from \"../../components/ClientOnly.js\";\nimport { joinUrl } from \"../../util/joinUrl.js\";\nimport {\n type AuthenticationPlugin,\n type AuthenticationProviderInitializer,\n} from \"../authentication.js\";\nimport { CoreAuthenticationPlugin } from \"../AuthenticationPlugin.js\";\nimport { CallbackHandler } from \"../components/CallbackHandler.js\";\nimport { OAuthErrorPage } from \"../components/OAuthErrorPage.js\";\nimport { AuthorizationError } from \"../errors.js\";\nimport { useAuthState } from \"../state.js\";\n\nconst AZUREB2C_CALLBACK_PATH = \"/oauth/callback\";\n\nexport class AzureB2CAuthPlugin\n extends CoreAuthenticationPlugin\n implements AuthenticationPlugin\n{\n private msalInstance: PublicClientApplication;\n private readonly scopes: string[];\n private readonly redirectToAfterSignUp?: string;\n private readonly redirectToAfterSignIn?: string;\n private readonly redirectToAfterSignOut: string;\n\n constructor({\n clientId,\n tenantName,\n policyName,\n scopes,\n redirectToAfterSignUp,\n redirectToAfterSignIn,\n redirectToAfterSignOut = \"/\",\n basePath = \"\",\n }: AzureB2CAuthenticationConfig) {\n super();\n this.scopes = scopes ?? [\"openid\", \"profile\", \"email\"];\n this.redirectToAfterSignUp = redirectToAfterSignUp;\n this.redirectToAfterSignIn = redirectToAfterSignIn;\n this.redirectToAfterSignOut = redirectToAfterSignOut;\n\n const authority = `https://${tenantName}.b2clogin.com/${tenantName}.onmicrosoft.com/${policyName}`;\n const redirectUri = joinUrl(basePath, AZUREB2C_CALLBACK_PATH);\n\n this.msalInstance = new PublicClientApplication({\n auth: {\n clientId,\n authority,\n redirectUri,\n knownAuthorities: [`${tenantName}.b2clogin.com`],\n },\n cache: {\n cacheLocation: \"sessionStorage\",\n storeAuthStateInCookie: false,\n },\n });\n\n void this.msalInstance.initialize().then(async () => {\n void this.msalInstance\n .handleRedirectPromise()\n .then((response: AuthenticationResult | null) => {\n if (response) {\n this.handleAuthResponse(response);\n }\n });\n\n // Add event callback\n void this.msalInstance.addEventCallback((event: EventMessage) => {\n if (event.eventType === EventType.LOGIN_SUCCESS) {\n this.handleAuthResponse(event.payload as AuthenticationResult);\n }\n });\n });\n }\n\n private handleAuthResponse(response: AuthenticationResult) {\n const { accessToken, idToken, scopes, account } = response;\n\n if (!account) {\n throw new AuthorizationError(\"No account information in response\");\n }\n\n // Get the user's name from Azure B2C claims\n const name =\n [account.idTokenClaims?.given_name, account.idTokenClaims?.family_name]\n .filter(Boolean)\n .join(\" \") || account.username;\n\n useAuthState.getState().setLoggedIn({\n providerData: {\n accessToken,\n idToken,\n scopes,\n account,\n },\n profile: {\n sub: account.localAccountId,\n email: account.username,\n name,\n emailVerified: true, // Azure B2C emails are verified\n pictureUrl: undefined, // Azure B2C doesn't provide profile pictures by default\n },\n });\n }\n\n async signUp({ redirectTo }: { redirectTo?: string } = {}) {\n const redirectUri = this.redirectToAfterSignUp ?? redirectTo ?? \"/\";\n sessionStorage.setItem(\"redirect-to\", redirectUri);\n\n await this.msalInstance.loginRedirect({\n scopes: this.scopes,\n prompt: \"select_account\",\n });\n }\n\n async signIn({ redirectTo }: { redirectTo?: string } = {}) {\n const redirectUri = this.redirectToAfterSignIn ?? redirectTo ?? \"/\";\n sessionStorage.setItem(\"redirect-to\", redirectUri);\n\n await this.msalInstance.loginRedirect({\n scopes: this.scopes,\n });\n }\n\n async getAccessToken(): Promise<string> {\n const account = this.msalInstance.getAllAccounts()[0];\n if (!account) {\n throw new AuthorizationError(\"No active account\");\n }\n\n try {\n const response = await this.msalInstance.acquireTokenSilent({\n scopes: this.scopes,\n account,\n });\n return response.accessToken;\n } catch {\n // If silent token acquisition fails, try interactive\n await this.msalInstance.acquireTokenRedirect({\n scopes: this.scopes,\n account,\n });\n\n throw new AuthorizationError(\n \"Token acquisition failed after interactive attempt\",\n );\n }\n }\n\n signRequest = async (request: Request): Promise<Request> => {\n const accessToken = await this.getAccessToken();\n request.headers.set(\"Authorization\", `Bearer ${accessToken}`);\n return request;\n };\n\n signOut = async () => {\n const account = this.msalInstance.getAllAccounts()[0];\n if (account) {\n await this.msalInstance.logoutRedirect({\n account,\n postLogoutRedirectUri:\n window.location.origin + this.redirectToAfterSignOut,\n });\n }\n\n useAuthState.getState().setLoggedOut();\n };\n\n handleCallback = async () => {\n const redirectTo = sessionStorage.getItem(\"redirect-to\") ?? \"/\";\n sessionStorage.removeItem(\"redirect-to\");\n return redirectTo;\n };\n\n getRoutes() {\n return [\n ...super.getRoutes(),\n {\n path: AZUREB2C_CALLBACK_PATH,\n element: (\n <ClientOnly>\n <ErrorBoundary\n fallbackRender={({ error }) => <OAuthErrorPage error={error} />}\n >\n <CallbackHandler handleCallback={this.handleCallback} />\n </ErrorBoundary>\n </ClientOnly>\n ),\n },\n ];\n }\n}\n\nconst azureB2CAuth: AuthenticationProviderInitializer<\n AzureB2CAuthenticationConfig\n> = (options) => new AzureB2CAuthPlugin(options);\n\nexport default azureB2CAuth;\n"],"names":["AZUREB2C_CALLBACK_PATH","AzureB2CAuthPlugin","CoreAuthenticationPlugin","clientId","tenantName","policyName","scopes","redirectToAfterSignUp","redirectToAfterSignIn","redirectToAfterSignOut","basePath","authority","redirectUri","joinUrl","PublicClientApplication","response","event","EventType","accessToken","idToken","account","AuthorizationError","name","useAuthState","redirectTo","request","ClientOnly","jsx","ErrorBoundary","error","OAuthErrorPage","CallbackHandler","azureB2CAuth","options"],"mappings":";;;;;;;;AAgBA,MAAMA,IAAyB;AAExB,MAAMC,UACHC,EAEV;AAAA,EACU;AAAA,EACS;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EAEjB,YAAY;AAAA,IACV,UAAAC;AAAA,IACA,YAAAC;AAAA,IACA,YAAAC;AAAA,IACA,QAAAC;AAAA,IACA,uBAAAC;AAAA,IACA,uBAAAC;AAAA,IACA,wBAAAC,IAAyB;AAAA,IACzB,UAAAC,IAAW;AAAA,EAAA,GACoB;AAC/B,UAAA,GACA,KAAK,SAASJ,KAAU,CAAC,UAAU,WAAW,OAAO,GACrD,KAAK,wBAAwBC,GAC7B,KAAK,wBAAwBC,GAC7B,KAAK,yBAAyBC;AAE9B,UAAME,IAAY,WAAWP,CAAU,iBAAiBA,CAAU,oBAAoBC,CAAU,IAC1FO,IAAcC,EAAQH,GAAUV,CAAsB;AAE5D,SAAK,eAAe,IAAIc,EAAwB;AAAA,MAC9C,MAAM;AAAA,QACJ,UAAAX;AAAA,QACA,WAAAQ;AAAA,QACA,aAAAC;AAAA,QACA,kBAAkB,CAAC,GAAGR,CAAU,eAAe;AAAA,MAAA;AAAA,MAEjD,OAAO;AAAA,QACL,eAAe;AAAA,QACf,wBAAwB;AAAA,MAAA;AAAA,IAC1B,CACD,GAEI,KAAK,aAAa,WAAA,EAAa,KAAK,YAAY;AACnD,MAAK,KAAK,aACP,sBAAA,EACA,KAAK,CAACW,MAA0C;AAC/C,QAAIA,KACF,KAAK,mBAAmBA,CAAQ;AAAA,MAEpC,CAAC,GAGE,KAAK,aAAa,iBAAiB,CAACC,MAAwB;AAC/D,QAAIA,EAAM,cAAcC,EAAU,iBAChC,KAAK,mBAAmBD,EAAM,OAA+B;AAAA,MAEjE,CAAC;AAAA,IACH,CAAC;AAAA,EACH;AAAA,EAEQ,mBAAmBD,GAAgC;AACzD,UAAM,EAAE,aAAAG,GAAa,SAAAC,GAAS,QAAAb,GAAQ,SAAAc,MAAYL;AAElD,QAAI,CAACK;AACH,YAAM,IAAIC,EAAmB,oCAAoC;AAInE,UAAMC,IACJ,CAACF,EAAQ,eAAe,YAAYA,EAAQ,eAAe,WAAW,EACnE,OAAO,OAAO,EACd,KAAK,GAAG,KAAKA,EAAQ;AAE1B,IAAAG,EAAa,SAAA,EAAW,YAAY;AAAA,MAClC,cAAc;AAAA,QACZ,aAAAL;AAAA,QACA,SAAAC;AAAA,QACA,QAAAb;AAAA,QACA,SAAAc;AAAA,MAAA;AAAA,MAEF,SAAS;AAAA,QACP,KAAKA,EAAQ;AAAA,QACb,OAAOA,EAAQ;AAAA,QACf,MAAAE;AAAA,QACA,eAAe;AAAA;AAAA,QACf,YAAY;AAAA;AAAA,MAAA;AAAA,IACd,CACD;AAAA,EACH;AAAA,EAEA,MAAM,OAAO,EAAE,YAAAE,EAAA,IAAwC,IAAI;AACzD,UAAMZ,IAAc,KAAK,yBAAyBY,KAAc;AAChE,mBAAe,QAAQ,eAAeZ,CAAW,GAEjD,MAAM,KAAK,aAAa,cAAc;AAAA,MACpC,QAAQ,KAAK;AAAA,MACb,QAAQ;AAAA,IAAA,CACT;AAAA,EACH;AAAA,EAEA,MAAM,OAAO,EAAE,YAAAY,EAAA,IAAwC,IAAI;AACzD,UAAMZ,IAAc,KAAK,yBAAyBY,KAAc;AAChE,mBAAe,QAAQ,eAAeZ,CAAW,GAEjD,MAAM,KAAK,aAAa,cAAc;AAAA,MACpC,QAAQ,KAAK;AAAA,IAAA,CACd;AAAA,EACH;AAAA,EAEA,MAAM,iBAAkC;AACtC,UAAMQ,IAAU,KAAK,aAAa,eAAA,EAAiB,CAAC;AACpD,QAAI,CAACA;AACH,YAAM,IAAIC,EAAmB,mBAAmB;AAGlD,QAAI;AAKF,cAJiB,MAAM,KAAK,aAAa,mBAAmB;AAAA,QAC1D,QAAQ,KAAK;AAAA,QACb,SAAAD;AAAA,MAAA,CACD,GACe;AAAA,IAClB,QAAQ;AAEN,kBAAM,KAAK,aAAa,qBAAqB;AAAA,QAC3C,QAAQ,KAAK;AAAA,QACb,SAAAA;AAAA,MAAA,CACD,GAEK,IAAIC;AAAA,QACR;AAAA,MAAA;AAAA,IAEJ;AAAA,EACF;AAAA,EAEA,cAAc,OAAOI,MAAuC;AAC1D,UAAMP,IAAc,MAAM,KAAK,eAAA;AAC/B,WAAAO,EAAQ,QAAQ,IAAI,iBAAiB,UAAUP,CAAW,EAAE,GACrDO;AAAA,EACT;AAAA,EAEA,UAAU,YAAY;AACpB,UAAML,IAAU,KAAK,aAAa,eAAA,EAAiB,CAAC;AACpD,IAAIA,KACF,MAAM,KAAK,aAAa,eAAe;AAAA,MACrC,SAAAA;AAAA,MACA,uBACE,OAAO,SAAS,SAAS,KAAK;AAAA,IAAA,CACjC,GAGHG,EAAa,SAAA,EAAW,aAAA;AAAA,EAC1B;AAAA,EAEA,iBAAiB,YAAY;AAC3B,UAAMC,IAAa,eAAe,QAAQ,aAAa,KAAK;AAC5D,0BAAe,WAAW,aAAa,GAChCA;AAAA,EACT;AAAA,EAEA,YAAY;AACV,WAAO;AAAA,MACL,GAAG,MAAM,UAAA;AAAA,MACT;AAAA,QACE,MAAMxB;AAAA,QACN,+BACG0B,GAAA,EACC,UAAAC,gBAAAA,EAAAA;AAAAA,UAACC;AAAA,UAAA;AAAA,YACC,gBAAgB,CAAC,EAAE,OAAAC,QAAYF,gBAAAA,EAAAA,IAACG,KAAe,OAAAD,GAAc;AAAA,YAE7D,UAAAF,gBAAAA,EAAAA,IAACI,GAAA,EAAgB,gBAAgB,KAAK,eAAA,CAAgB;AAAA,UAAA;AAAA,QAAA,EACxD,CACF;AAAA,MAAA;AAAA,IAEJ;AAAA,EAEJ;AACF;AAEA,MAAMC,IAEF,CAACC,MAAY,IAAIhC,EAAmBgC,CAAO;"}
@@ -1,15 +1,16 @@
1
1
  import { j as l } from "./jsx-runtime-C5mzlN2N.js";
2
- import { LogOutIcon as g } from "lucide-react";
3
- import { S as f, a as w, b as p } from "./SignUp-ClYhZq9H.js";
4
- import { u as n } from "./hook-CZjW2buS.js";
5
- const y = ({
2
+ import { LogOutIcon as f } from "lucide-react";
3
+ import { S as w, a as p, b as v } from "./SignUp-BwOSCD-6.js";
4
+ import { u as n } from "./hook-DbUCLQNg.js";
5
+ const b = ({
6
6
  clerkPubKey: d,
7
+ jwtTemplateName: m,
7
8
  redirectToAfterSignOut: c = "/",
8
- redirectToAfterSignUp: t,
9
+ redirectToAfterSignUp: a,
9
10
  redirectToAfterSignIn: r
10
11
  }) => {
11
12
  let s;
12
- const a = (async () => {
13
+ const t = (async () => {
13
14
  if (typeof window > "u") return;
14
15
  const { Clerk: e } = await import("@clerk/clerk-js");
15
16
  if (s = new e(d), await s.load(), s.user) {
@@ -38,14 +39,16 @@ const y = ({
38
39
  return s;
39
40
  })();
40
41
  async function u() {
41
- if (await a, !s?.session)
42
+ if (await t, !s?.session)
42
43
  throw new Error("No session available");
43
- const e = await s.session.getToken();
44
+ const e = await s.session.getToken({
45
+ template: m
46
+ });
44
47
  if (!e)
45
48
  throw new Error("Could not get access token from Clerk");
46
49
  return e;
47
50
  }
48
- async function m(e) {
51
+ async function g(e) {
49
52
  const i = await u();
50
53
  return e.headers.set("Authorization", `Bearer ${i}`), e;
51
54
  }
@@ -53,15 +56,15 @@ const y = ({
53
56
  getRoutes: () => [
54
57
  {
55
58
  path: "/signout",
56
- element: /* @__PURE__ */ l.jsx(f, {})
59
+ element: /* @__PURE__ */ l.jsx(w, {})
57
60
  },
58
61
  {
59
62
  path: "/signin",
60
- element: /* @__PURE__ */ l.jsx(w, {})
63
+ element: /* @__PURE__ */ l.jsx(p, {})
61
64
  },
62
65
  {
63
66
  path: "/signup",
64
- element: /* @__PURE__ */ l.jsx(p, {})
67
+ element: /* @__PURE__ */ l.jsx(v, {})
65
68
  }
66
69
  ],
67
70
  getProfileMenuItems() {
@@ -70,12 +73,12 @@ const y = ({
70
73
  label: "Logout",
71
74
  path: "/signout",
72
75
  category: "bottom",
73
- icon: g
76
+ icon: f
74
77
  }
75
78
  ];
76
79
  },
77
80
  initialize: async () => {
78
- const e = await a;
81
+ const e = await t;
79
82
  if (e)
80
83
  if (e.session) {
81
84
  const i = e.session.user.emailAddresses.find(
@@ -101,27 +104,27 @@ const y = ({
101
104
  });
102
105
  },
103
106
  getAccessToken: u,
104
- signRequest: m,
107
+ signRequest: g,
105
108
  signOut: async () => {
106
- await a, await s?.signOut({
109
+ await t, await s?.signOut({
107
110
  redirectUrl: window.location.origin + c
108
111
  }), n.getState().setLoggedOut();
109
112
  },
110
113
  signIn: async ({ redirectTo: e } = {}) => {
111
- await a, await s?.redirectToSignIn({
114
+ await t, await s?.redirectToSignIn({
112
115
  signInForceRedirectUrl: r ? window.location.origin + r : e,
113
- signUpForceRedirectUrl: t ? window.location.origin + t : e
116
+ signUpForceRedirectUrl: a ? window.location.origin + a : e
114
117
  });
115
118
  },
116
119
  signUp: async ({ redirectTo: e } = {}) => {
117
- await a, await s?.redirectToSignUp({
120
+ await t, await s?.redirectToSignUp({
118
121
  signInForceRedirectUrl: r ? window.location.origin + r : e,
119
- signUpForceRedirectUrl: t ? window.location.origin + t : e
122
+ signUpForceRedirectUrl: a ? window.location.origin + a : e
120
123
  });
121
124
  }
122
125
  };
123
126
  };
124
127
  export {
125
- y as default
128
+ b as default
126
129
  };
127
130
  //# sourceMappingURL=zudoku.auth-clerk.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"zudoku.auth-clerk.js","sources":["../src/lib/authentication/providers/clerk.tsx"],"sourcesContent":["import type { Clerk } from \"@clerk/clerk-js\";\nimport { LogOutIcon } from \"lucide-react\";\nimport { type ZudokuPlugin } from \"zudoku/plugins\";\nimport { type ClerkAuthenticationConfig } from \"../../../config/config.js\";\nimport {\n type AuthenticationPlugin,\n type AuthenticationProviderInitializer,\n} from \"../authentication.js\";\nimport { SignIn } from \"../components/SignIn.js\";\nimport { SignOut } from \"../components/SignOut.js\";\nimport { SignUp } from \"../components/SignUp.js\";\nimport { useAuthState } from \"../state.js\";\n\nconst clerkAuth: AuthenticationProviderInitializer<\n ClerkAuthenticationConfig\n> = ({\n clerkPubKey,\n redirectToAfterSignOut = \"/\",\n redirectToAfterSignUp,\n redirectToAfterSignIn,\n}): AuthenticationPlugin & ZudokuPlugin => {\n let clerkApi: Clerk | undefined;\n const ensureLoaded = (async () => {\n if (typeof window === \"undefined\") return;\n const { Clerk } = await import(\"@clerk/clerk-js\");\n clerkApi = new Clerk(clerkPubKey);\n\n await clerkApi.load();\n\n if (clerkApi.user) {\n const verifiedEmail = clerkApi.user.emailAddresses.find(\n (email) => email.verification.status === \"verified\",\n );\n useAuthState.getState().setLoggedIn({\n profile: {\n sub: clerkApi.user.id,\n name: clerkApi.user.fullName ?? undefined,\n email:\n verifiedEmail?.emailAddress ??\n clerkApi.user.emailAddresses[0]?.emailAddress,\n emailVerified: verifiedEmail !== undefined,\n pictureUrl: clerkApi.user.imageUrl,\n },\n providerData: {\n user: {\n publicMetadata: clerkApi.user.publicMetadata,\n id: clerkApi.user.id,\n emailAddresses: clerkApi.user.emailAddresses,\n imageUrl: clerkApi.user.imageUrl,\n fullName: clerkApi.user.fullName,\n },\n },\n });\n }\n\n return clerkApi;\n })();\n\n async function getAccessToken() {\n await ensureLoaded;\n if (!clerkApi?.session) {\n throw new Error(\"No session available\");\n }\n const response = await clerkApi.session.getToken();\n if (!response) {\n throw new Error(\"Could not get access token from Clerk\");\n }\n return response;\n }\n\n async function signRequest(request: Request): Promise<Request> {\n const response = await getAccessToken();\n request.headers.set(\"Authorization\", `Bearer ${response}`);\n return request;\n }\n\n return {\n getRoutes: () => {\n return [\n {\n path: \"/signout\",\n element: <SignOut />,\n },\n {\n path: \"/signin\",\n element: <SignIn />,\n },\n {\n path: \"/signup\",\n element: <SignUp />,\n },\n ];\n },\n\n getProfileMenuItems() {\n return [\n {\n label: \"Logout\",\n path: \"/signout\",\n category: \"bottom\",\n icon: LogOutIcon,\n } as const,\n ];\n },\n initialize: async () => {\n const clerk = await ensureLoaded;\n\n if (!clerk) {\n return;\n }\n\n if (clerk.session) {\n const verifiedEmail = clerk.session.user.emailAddresses.find(\n (email) => email.verification.status === \"verified\",\n );\n useAuthState.getState().setLoggedIn({\n profile: {\n sub: clerk.session.user.id,\n name: clerk.session.user.fullName ?? undefined,\n email:\n verifiedEmail?.emailAddress ??\n clerk.session.user.emailAddresses[0]?.emailAddress,\n emailVerified: verifiedEmail !== undefined,\n pictureUrl: clerk.session.user.imageUrl,\n },\n providerData: {\n user: clerk.session.user,\n },\n });\n } else {\n useAuthState.setState({\n isAuthenticated: false,\n isPending: false,\n profile: undefined,\n });\n }\n },\n getAccessToken,\n signRequest,\n signOut: async () => {\n await ensureLoaded;\n await clerkApi?.signOut({\n redirectUrl: window.location.origin + redirectToAfterSignOut,\n });\n useAuthState.getState().setLoggedOut();\n },\n signIn: async ({ redirectTo }: { redirectTo?: string } = {}) => {\n await ensureLoaded;\n await clerkApi?.redirectToSignIn({\n signInForceRedirectUrl: redirectToAfterSignIn\n ? window.location.origin + redirectToAfterSignIn\n : redirectTo,\n signUpForceRedirectUrl: redirectToAfterSignUp\n ? window.location.origin + redirectToAfterSignUp\n : redirectTo,\n });\n },\n signUp: async ({ redirectTo }: { redirectTo?: string } = {}) => {\n await ensureLoaded;\n await clerkApi?.redirectToSignUp({\n signInForceRedirectUrl: redirectToAfterSignIn\n ? window.location.origin + redirectToAfterSignIn\n : redirectTo,\n signUpForceRedirectUrl: redirectToAfterSignUp\n ? window.location.origin + redirectToAfterSignUp\n : redirectTo,\n });\n },\n };\n};\n\nexport default clerkAuth;\n"],"names":["clerkAuth","clerkPubKey","redirectToAfterSignOut","redirectToAfterSignUp","redirectToAfterSignIn","clerkApi","ensureLoaded","Clerk","verifiedEmail","email","useAuthState","getAccessToken","response","signRequest","request","SignOut","SignIn","SignUp","LogOutIcon","clerk","redirectTo"],"mappings":";;;;AAaA,MAAMA,IAEF,CAAC;AAAA,EACH,aAAAC;AAAA,EACA,wBAAAC,IAAyB;AAAA,EACzB,uBAAAC;AAAA,EACA,uBAAAC;AACF,MAA2C;AACzC,MAAIC;AACJ,QAAMC,KAAgB,YAAY;AAChC,QAAI,OAAO,SAAW,IAAa;AACnC,UAAM,EAAE,OAAAC,EAAA,IAAU,MAAM,OAAO,iBAAiB;AAKhD,QAJAF,IAAW,IAAIE,EAAMN,CAAW,GAEhC,MAAMI,EAAS,KAAA,GAEXA,EAAS,MAAM;AACjB,YAAMG,IAAgBH,EAAS,KAAK,eAAe;AAAA,QACjD,CAACI,MAAUA,EAAM,aAAa,WAAW;AAAA,MAAA;AAE3C,MAAAC,EAAa,SAAA,EAAW,YAAY;AAAA,QAClC,SAAS;AAAA,UACP,KAAKL,EAAS,KAAK;AAAA,UACnB,MAAMA,EAAS,KAAK,YAAY;AAAA,UAChC,OACEG,GAAe,gBACfH,EAAS,KAAK,eAAe,CAAC,GAAG;AAAA,UACnC,eAAeG,MAAkB;AAAA,UACjC,YAAYH,EAAS,KAAK;AAAA,QAAA;AAAA,QAE5B,cAAc;AAAA,UACZ,MAAM;AAAA,YACJ,gBAAgBA,EAAS,KAAK;AAAA,YAC9B,IAAIA,EAAS,KAAK;AAAA,YAClB,gBAAgBA,EAAS,KAAK;AAAA,YAC9B,UAAUA,EAAS,KAAK;AAAA,YACxB,UAAUA,EAAS,KAAK;AAAA,UAAA;AAAA,QAC1B;AAAA,MACF,CACD;AAAA,IACH;AAEA,WAAOA;AAAA,EACT,GAAA;AAEA,iBAAeM,IAAiB;AAE9B,QADA,MAAML,GACF,CAACD,GAAU;AACb,YAAM,IAAI,MAAM,sBAAsB;AAExC,UAAMO,IAAW,MAAMP,EAAS,QAAQ,SAAA;AACxC,QAAI,CAACO;AACH,YAAM,IAAI,MAAM,uCAAuC;AAEzD,WAAOA;AAAA,EACT;AAEA,iBAAeC,EAAYC,GAAoC;AAC7D,UAAMF,IAAW,MAAMD,EAAA;AACvB,WAAAG,EAAQ,QAAQ,IAAI,iBAAiB,UAAUF,CAAQ,EAAE,GAClDE;AAAA,EACT;AAEA,SAAO;AAAA,IACL,WAAW,MACF;AAAA,MACL;AAAA,QACE,MAAM;AAAA,QACN,+BAAUC,GAAA,CAAA,CAAQ;AAAA,MAAA;AAAA,MAEpB;AAAA,QACE,MAAM;AAAA,QACN,+BAAUC,GAAA,CAAA,CAAO;AAAA,MAAA;AAAA,MAEnB;AAAA,QACE,MAAM;AAAA,QACN,+BAAUC,GAAA,CAAA,CAAO;AAAA,MAAA;AAAA,IACnB;AAAA,IAIJ,sBAAsB;AACpB,aAAO;AAAA,QACL;AAAA,UACE,OAAO;AAAA,UACP,MAAM;AAAA,UACN,UAAU;AAAA,UACV,MAAMC;AAAA,QAAA;AAAA,MACR;AAAA,IAEJ;AAAA,IACA,YAAY,YAAY;AACtB,YAAMC,IAAQ,MAAMb;AAEpB,UAAKa;AAIL,YAAIA,EAAM,SAAS;AACjB,gBAAMX,IAAgBW,EAAM,QAAQ,KAAK,eAAe;AAAA,YACtD,CAACV,MAAUA,EAAM,aAAa,WAAW;AAAA,UAAA;AAE3C,UAAAC,EAAa,SAAA,EAAW,YAAY;AAAA,YAClC,SAAS;AAAA,cACP,KAAKS,EAAM,QAAQ,KAAK;AAAA,cACxB,MAAMA,EAAM,QAAQ,KAAK,YAAY;AAAA,cACrC,OACEX,GAAe,gBACfW,EAAM,QAAQ,KAAK,eAAe,CAAC,GAAG;AAAA,cACxC,eAAeX,MAAkB;AAAA,cACjC,YAAYW,EAAM,QAAQ,KAAK;AAAA,YAAA;AAAA,YAEjC,cAAc;AAAA,cACZ,MAAMA,EAAM,QAAQ;AAAA,YAAA;AAAA,UACtB,CACD;AAAA,QACH;AACE,UAAAT,EAAa,SAAS;AAAA,YACpB,iBAAiB;AAAA,YACjB,WAAW;AAAA,YACX,SAAS;AAAA,UAAA,CACV;AAAA,IAEL;AAAA,IACA,gBAAAC;AAAA,IACA,aAAAE;AAAA,IACA,SAAS,YAAY;AACnB,YAAMP,GACN,MAAMD,GAAU,QAAQ;AAAA,QACtB,aAAa,OAAO,SAAS,SAASH;AAAA,MAAA,CACvC,GACDQ,EAAa,SAAA,EAAW,aAAA;AAAA,IAC1B;AAAA,IACA,QAAQ,OAAO,EAAE,YAAAU,EAAA,IAAwC,OAAO;AAC9D,YAAMd,GACN,MAAMD,GAAU,iBAAiB;AAAA,QAC/B,wBAAwBD,IACpB,OAAO,SAAS,SAASA,IACzBgB;AAAA,QACJ,wBAAwBjB,IACpB,OAAO,SAAS,SAASA,IACzBiB;AAAA,MAAA,CACL;AAAA,IACH;AAAA,IACA,QAAQ,OAAO,EAAE,YAAAA,EAAA,IAAwC,OAAO;AAC9D,YAAMd,GACN,MAAMD,GAAU,iBAAiB;AAAA,QAC/B,wBAAwBD,IACpB,OAAO,SAAS,SAASA,IACzBgB;AAAA,QACJ,wBAAwBjB,IACpB,OAAO,SAAS,SAASA,IACzBiB;AAAA,MAAA,CACL;AAAA,IACH;AAAA,EAAA;AAEJ;"}
1
+ {"version":3,"file":"zudoku.auth-clerk.js","sources":["../src/lib/authentication/providers/clerk.tsx"],"sourcesContent":["import type { Clerk } from \"@clerk/clerk-js\";\nimport { LogOutIcon } from \"lucide-react\";\nimport { type ZudokuPlugin } from \"zudoku/plugins\";\nimport { type ClerkAuthenticationConfig } from \"../../../config/config.js\";\nimport {\n type AuthenticationPlugin,\n type AuthenticationProviderInitializer,\n} from \"../authentication.js\";\nimport { SignIn } from \"../components/SignIn.js\";\nimport { SignOut } from \"../components/SignOut.js\";\nimport { SignUp } from \"../components/SignUp.js\";\nimport { useAuthState } from \"../state.js\";\n\nconst clerkAuth: AuthenticationProviderInitializer<\n ClerkAuthenticationConfig\n> = ({\n clerkPubKey,\n jwtTemplateName,\n redirectToAfterSignOut = \"/\",\n redirectToAfterSignUp,\n redirectToAfterSignIn,\n}): AuthenticationPlugin & ZudokuPlugin => {\n let clerkApi: Clerk | undefined;\n const ensureLoaded = (async () => {\n if (typeof window === \"undefined\") return;\n const { Clerk } = await import(\"@clerk/clerk-js\");\n clerkApi = new Clerk(clerkPubKey);\n\n await clerkApi.load();\n\n if (clerkApi.user) {\n const verifiedEmail = clerkApi.user.emailAddresses.find(\n (email) => email.verification.status === \"verified\",\n );\n useAuthState.getState().setLoggedIn({\n profile: {\n sub: clerkApi.user.id,\n name: clerkApi.user.fullName ?? undefined,\n email:\n verifiedEmail?.emailAddress ??\n clerkApi.user.emailAddresses[0]?.emailAddress,\n emailVerified: verifiedEmail !== undefined,\n pictureUrl: clerkApi.user.imageUrl,\n },\n providerData: {\n user: {\n publicMetadata: clerkApi.user.publicMetadata,\n id: clerkApi.user.id,\n emailAddresses: clerkApi.user.emailAddresses,\n imageUrl: clerkApi.user.imageUrl,\n fullName: clerkApi.user.fullName,\n },\n },\n });\n }\n\n return clerkApi;\n })();\n\n async function getAccessToken() {\n await ensureLoaded;\n if (!clerkApi?.session) {\n throw new Error(\"No session available\");\n }\n const response = await clerkApi.session.getToken({\n template: jwtTemplateName,\n });\n if (!response) {\n throw new Error(\"Could not get access token from Clerk\");\n }\n return response;\n }\n\n async function signRequest(request: Request): Promise<Request> {\n const response = await getAccessToken();\n request.headers.set(\"Authorization\", `Bearer ${response}`);\n return request;\n }\n\n return {\n getRoutes: () => {\n return [\n {\n path: \"/signout\",\n element: <SignOut />,\n },\n {\n path: \"/signin\",\n element: <SignIn />,\n },\n {\n path: \"/signup\",\n element: <SignUp />,\n },\n ];\n },\n\n getProfileMenuItems() {\n return [\n {\n label: \"Logout\",\n path: \"/signout\",\n category: \"bottom\",\n icon: LogOutIcon,\n } as const,\n ];\n },\n initialize: async () => {\n const clerk = await ensureLoaded;\n\n if (!clerk) {\n return;\n }\n\n if (clerk.session) {\n const verifiedEmail = clerk.session.user.emailAddresses.find(\n (email) => email.verification.status === \"verified\",\n );\n useAuthState.getState().setLoggedIn({\n profile: {\n sub: clerk.session.user.id,\n name: clerk.session.user.fullName ?? undefined,\n email:\n verifiedEmail?.emailAddress ??\n clerk.session.user.emailAddresses[0]?.emailAddress,\n emailVerified: verifiedEmail !== undefined,\n pictureUrl: clerk.session.user.imageUrl,\n },\n providerData: {\n user: clerk.session.user,\n },\n });\n } else {\n useAuthState.setState({\n isAuthenticated: false,\n isPending: false,\n profile: undefined,\n });\n }\n },\n getAccessToken,\n signRequest,\n signOut: async () => {\n await ensureLoaded;\n await clerkApi?.signOut({\n redirectUrl: window.location.origin + redirectToAfterSignOut,\n });\n useAuthState.getState().setLoggedOut();\n },\n signIn: async ({ redirectTo }: { redirectTo?: string } = {}) => {\n await ensureLoaded;\n await clerkApi?.redirectToSignIn({\n signInForceRedirectUrl: redirectToAfterSignIn\n ? window.location.origin + redirectToAfterSignIn\n : redirectTo,\n signUpForceRedirectUrl: redirectToAfterSignUp\n ? window.location.origin + redirectToAfterSignUp\n : redirectTo,\n });\n },\n signUp: async ({ redirectTo }: { redirectTo?: string } = {}) => {\n await ensureLoaded;\n await clerkApi?.redirectToSignUp({\n signInForceRedirectUrl: redirectToAfterSignIn\n ? window.location.origin + redirectToAfterSignIn\n : redirectTo,\n signUpForceRedirectUrl: redirectToAfterSignUp\n ? window.location.origin + redirectToAfterSignUp\n : redirectTo,\n });\n },\n };\n};\n\nexport default clerkAuth;\n"],"names":["clerkAuth","clerkPubKey","jwtTemplateName","redirectToAfterSignOut","redirectToAfterSignUp","redirectToAfterSignIn","clerkApi","ensureLoaded","Clerk","verifiedEmail","email","useAuthState","getAccessToken","response","signRequest","request","SignOut","SignIn","SignUp","LogOutIcon","clerk","redirectTo"],"mappings":";;;;AAaA,MAAMA,IAEF,CAAC;AAAA,EACH,aAAAC;AAAA,EACA,iBAAAC;AAAA,EACA,wBAAAC,IAAyB;AAAA,EACzB,uBAAAC;AAAA,EACA,uBAAAC;AACF,MAA2C;AACzC,MAAIC;AACJ,QAAMC,KAAgB,YAAY;AAChC,QAAI,OAAO,SAAW,IAAa;AACnC,UAAM,EAAE,OAAAC,EAAA,IAAU,MAAM,OAAO,iBAAiB;AAKhD,QAJAF,IAAW,IAAIE,EAAMP,CAAW,GAEhC,MAAMK,EAAS,KAAA,GAEXA,EAAS,MAAM;AACjB,YAAMG,IAAgBH,EAAS,KAAK,eAAe;AAAA,QACjD,CAACI,MAAUA,EAAM,aAAa,WAAW;AAAA,MAAA;AAE3C,MAAAC,EAAa,SAAA,EAAW,YAAY;AAAA,QAClC,SAAS;AAAA,UACP,KAAKL,EAAS,KAAK;AAAA,UACnB,MAAMA,EAAS,KAAK,YAAY;AAAA,UAChC,OACEG,GAAe,gBACfH,EAAS,KAAK,eAAe,CAAC,GAAG;AAAA,UACnC,eAAeG,MAAkB;AAAA,UACjC,YAAYH,EAAS,KAAK;AAAA,QAAA;AAAA,QAE5B,cAAc;AAAA,UACZ,MAAM;AAAA,YACJ,gBAAgBA,EAAS,KAAK;AAAA,YAC9B,IAAIA,EAAS,KAAK;AAAA,YAClB,gBAAgBA,EAAS,KAAK;AAAA,YAC9B,UAAUA,EAAS,KAAK;AAAA,YACxB,UAAUA,EAAS,KAAK;AAAA,UAAA;AAAA,QAC1B;AAAA,MACF,CACD;AAAA,IACH;AAEA,WAAOA;AAAA,EACT,GAAA;AAEA,iBAAeM,IAAiB;AAE9B,QADA,MAAML,GACF,CAACD,GAAU;AACb,YAAM,IAAI,MAAM,sBAAsB;AAExC,UAAMO,IAAW,MAAMP,EAAS,QAAQ,SAAS;AAAA,MAC/C,UAAUJ;AAAA,IAAA,CACX;AACD,QAAI,CAACW;AACH,YAAM,IAAI,MAAM,uCAAuC;AAEzD,WAAOA;AAAA,EACT;AAEA,iBAAeC,EAAYC,GAAoC;AAC7D,UAAMF,IAAW,MAAMD,EAAA;AACvB,WAAAG,EAAQ,QAAQ,IAAI,iBAAiB,UAAUF,CAAQ,EAAE,GAClDE;AAAA,EACT;AAEA,SAAO;AAAA,IACL,WAAW,MACF;AAAA,MACL;AAAA,QACE,MAAM;AAAA,QACN,+BAAUC,GAAA,CAAA,CAAQ;AAAA,MAAA;AAAA,MAEpB;AAAA,QACE,MAAM;AAAA,QACN,+BAAUC,GAAA,CAAA,CAAO;AAAA,MAAA;AAAA,MAEnB;AAAA,QACE,MAAM;AAAA,QACN,+BAAUC,GAAA,CAAA,CAAO;AAAA,MAAA;AAAA,IACnB;AAAA,IAIJ,sBAAsB;AACpB,aAAO;AAAA,QACL;AAAA,UACE,OAAO;AAAA,UACP,MAAM;AAAA,UACN,UAAU;AAAA,UACV,MAAMC;AAAA,QAAA;AAAA,MACR;AAAA,IAEJ;AAAA,IACA,YAAY,YAAY;AACtB,YAAMC,IAAQ,MAAMb;AAEpB,UAAKa;AAIL,YAAIA,EAAM,SAAS;AACjB,gBAAMX,IAAgBW,EAAM,QAAQ,KAAK,eAAe;AAAA,YACtD,CAACV,MAAUA,EAAM,aAAa,WAAW;AAAA,UAAA;AAE3C,UAAAC,EAAa,SAAA,EAAW,YAAY;AAAA,YAClC,SAAS;AAAA,cACP,KAAKS,EAAM,QAAQ,KAAK;AAAA,cACxB,MAAMA,EAAM,QAAQ,KAAK,YAAY;AAAA,cACrC,OACEX,GAAe,gBACfW,EAAM,QAAQ,KAAK,eAAe,CAAC,GAAG;AAAA,cACxC,eAAeX,MAAkB;AAAA,cACjC,YAAYW,EAAM,QAAQ,KAAK;AAAA,YAAA;AAAA,YAEjC,cAAc;AAAA,cACZ,MAAMA,EAAM,QAAQ;AAAA,YAAA;AAAA,UACtB,CACD;AAAA,QACH;AACE,UAAAT,EAAa,SAAS;AAAA,YACpB,iBAAiB;AAAA,YACjB,WAAW;AAAA,YACX,SAAS;AAAA,UAAA,CACV;AAAA,IAEL;AAAA,IACA,gBAAAC;AAAA,IACA,aAAAE;AAAA,IACA,SAAS,YAAY;AACnB,YAAMP,GACN,MAAMD,GAAU,QAAQ;AAAA,QACtB,aAAa,OAAO,SAAS,SAASH;AAAA,MAAA,CACvC,GACDQ,EAAa,SAAA,EAAW,aAAA;AAAA,IAC1B;AAAA,IACA,QAAQ,OAAO,EAAE,YAAAU,EAAA,IAAwC,OAAO;AAC9D,YAAMd,GACN,MAAMD,GAAU,iBAAiB;AAAA,QAC/B,wBAAwBD,IACpB,OAAO,SAAS,SAASA,IACzBgB;AAAA,QACJ,wBAAwBjB,IACpB,OAAO,SAAS,SAASA,IACzBiB;AAAA,MAAA,CACL;AAAA,IACH;AAAA,IACA,QAAQ,OAAO,EAAE,YAAAA,EAAA,IAAwC,OAAO;AAC9D,YAAMd,GACN,MAAMD,GAAU,iBAAiB;AAAA,QAC/B,wBAAwBD,IACpB,OAAO,SAAS,SAASA,IACzBgB;AAAA,QACJ,wBAAwBjB,IACpB,OAAO,SAAS,SAASA,IACzBiB;AAAA,MAAA,CACL;AAAA,IACH;AAAA,EAAA;AAEJ;"}