Commit iniziale
This commit is contained in:
20
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.d.ts
generated
vendored
Normal file
20
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.d.ts
generated
vendored
Normal file
@@ -0,0 +1,20 @@
|
||||
/**
|
||||
* This is a helper class that parses supported HTTP response authentication headers to extract and return
|
||||
* header challenge values that can be used outside the basic authorization flows.
|
||||
*/
|
||||
export declare class AuthenticationHeaderParser {
|
||||
private headers;
|
||||
constructor(headers: Record<string, string>);
|
||||
/**
|
||||
* This method parses the SHR nonce value out of either the Authentication-Info or WWW-Authenticate authentication headers.
|
||||
* @returns
|
||||
*/
|
||||
getShrNonce(): string;
|
||||
/**
|
||||
* Parses an HTTP header's challenge set into a key/value map.
|
||||
* @param header
|
||||
* @returns
|
||||
*/
|
||||
private parseChallenges;
|
||||
}
|
||||
//# sourceMappingURL=AuthenticationHeaderParser.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthenticationHeaderParser.d.ts","sourceRoot":"","sources":["../../src/request/AuthenticationHeaderParser.ts"],"names":[],"mappings":"AAmBA;;;GAGG;AACH,qBAAa,0BAA0B;IACnC,OAAO,CAAC,OAAO,CAAyB;gBAE5B,OAAO,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC;IAI3C;;;OAGG;IACH,WAAW,IAAI,MAAM;IAqCrB;;;;OAIG;IACH,OAAO,CAAC,eAAe;CAe1B"}
|
||||
64
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.mjs
generated
vendored
Normal file
64
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.mjs
generated
vendored
Normal file
@@ -0,0 +1,64 @@
|
||||
/*! @azure/msal-common v15.1.1 2025-02-05 */
|
||||
'use strict';
|
||||
import { createClientConfigurationError } from '../error/ClientConfigurationError.mjs';
|
||||
import { Constants, HeaderNames } from '../utils/Constants.mjs';
|
||||
import { invalidAuthenticationHeader, missingNonceAuthenticationHeader } from '../error/ClientConfigurationErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/**
|
||||
* This is a helper class that parses supported HTTP response authentication headers to extract and return
|
||||
* header challenge values that can be used outside the basic authorization flows.
|
||||
*/
|
||||
class AuthenticationHeaderParser {
|
||||
constructor(headers) {
|
||||
this.headers = headers;
|
||||
}
|
||||
/**
|
||||
* This method parses the SHR nonce value out of either the Authentication-Info or WWW-Authenticate authentication headers.
|
||||
* @returns
|
||||
*/
|
||||
getShrNonce() {
|
||||
// Attempt to parse nonce from Authentiacation-Info
|
||||
const authenticationInfo = this.headers[HeaderNames.AuthenticationInfo];
|
||||
if (authenticationInfo) {
|
||||
const authenticationInfoChallenges = this.parseChallenges(authenticationInfo);
|
||||
if (authenticationInfoChallenges.nextnonce) {
|
||||
return authenticationInfoChallenges.nextnonce;
|
||||
}
|
||||
throw createClientConfigurationError(invalidAuthenticationHeader);
|
||||
}
|
||||
// Attempt to parse nonce from WWW-Authenticate
|
||||
const wwwAuthenticate = this.headers[HeaderNames.WWWAuthenticate];
|
||||
if (wwwAuthenticate) {
|
||||
const wwwAuthenticateChallenges = this.parseChallenges(wwwAuthenticate);
|
||||
if (wwwAuthenticateChallenges.nonce) {
|
||||
return wwwAuthenticateChallenges.nonce;
|
||||
}
|
||||
throw createClientConfigurationError(invalidAuthenticationHeader);
|
||||
}
|
||||
// If neither header is present, throw missing headers error
|
||||
throw createClientConfigurationError(missingNonceAuthenticationHeader);
|
||||
}
|
||||
/**
|
||||
* Parses an HTTP header's challenge set into a key/value map.
|
||||
* @param header
|
||||
* @returns
|
||||
*/
|
||||
parseChallenges(header) {
|
||||
const schemeSeparator = header.indexOf(" ");
|
||||
const challenges = header.substr(schemeSeparator + 1).split(",");
|
||||
const challengeMap = {};
|
||||
challenges.forEach((challenge) => {
|
||||
const [key, value] = challenge.split("=");
|
||||
// Remove escaped quotation marks (', ") from challenge string to keep only the challenge value
|
||||
challengeMap[key] = unescape(value.replace(/['"]+/g, Constants.EMPTY_STRING));
|
||||
});
|
||||
return challengeMap;
|
||||
}
|
||||
}
|
||||
|
||||
export { AuthenticationHeaderParser };
|
||||
//# sourceMappingURL=AuthenticationHeaderParser.mjs.map
|
||||
1
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.mjs.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/AuthenticationHeaderParser.mjs.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthenticationHeaderParser.mjs","sources":["../../src/request/AuthenticationHeaderParser.ts"],"sourcesContent":[null],"names":["ClientConfigurationErrorCodes.invalidAuthenticationHeader","ClientConfigurationErrorCodes.missingNonceAuthenticationHeader"],"mappings":";;;;;;AAAA;;;AAGG;AAgBH;;;AAGG;MACU,0BAA0B,CAAA;AAGnC,IAAA,WAAA,CAAY,OAA+B,EAAA;AACvC,QAAA,IAAI,CAAC,OAAO,GAAG,OAAO,CAAC;KAC1B;AAED;;;AAGG;IACH,WAAW,GAAA;;QAEP,MAAM,kBAAkB,GAAG,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,kBAAkB,CAAC,CAAC;AACxE,QAAA,IAAI,kBAAkB,EAAE;YACpB,MAAM,4BAA4B,GAC9B,IAAI,CAAC,eAAe,CAChB,kBAAkB,CACrB,CAAC;YACN,IAAI,4BAA4B,CAAC,SAAS,EAAE;gBACxC,OAAO,4BAA4B,CAAC,SAAS,CAAC;AACjD,aAAA;AACD,YAAA,MAAM,8BAA8B,CAChCA,2BAAyD,CAC5D,CAAC;AACL,SAAA;;QAGD,MAAM,eAAe,GAAG,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,eAAe,CAAC,CAAC;AAClE,QAAA,IAAI,eAAe,EAAE;YACjB,MAAM,yBAAyB,GAC3B,IAAI,CAAC,eAAe,CAChB,eAAe,CAClB,CAAC;YACN,IAAI,yBAAyB,CAAC,KAAK,EAAE;gBACjC,OAAO,yBAAyB,CAAC,KAAK,CAAC;AAC1C,aAAA;AACD,YAAA,MAAM,8BAA8B,CAChCA,2BAAyD,CAC5D,CAAC;AACL,SAAA;;AAGD,QAAA,MAAM,8BAA8B,CAChCC,gCAA8D,CACjE,CAAC;KACL;AAED;;;;AAIG;AACK,IAAA,eAAe,CAAI,MAAc,EAAA;QACrC,MAAM,eAAe,GAAG,MAAM,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC;AAC5C,QAAA,MAAM,UAAU,GAAG,MAAM,CAAC,MAAM,CAAC,eAAe,GAAG,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACjE,MAAM,YAAY,GAAG,EAAO,CAAC;AAE7B,QAAA,UAAU,CAAC,OAAO,CAAC,CAAC,SAAiB,KAAI;AACrC,YAAA,MAAM,CAAC,GAAG,EAAE,KAAK,CAAC,GAAG,SAAS,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;;AAE1C,YAAA,YAAY,CAAC,GAAG,CAAC,GAAG,QAAQ,CACxB,KAAK,CAAC,OAAO,CAAC,QAAQ,EAAE,SAAS,CAAC,YAAY,CAAC,CAClD,CAAC;AACN,SAAC,CAAC,CAAC;AAEH,QAAA,OAAO,YAAY,CAAC;KACvB;AACJ;;;;"}
|
||||
50
node_modules/@azure/msal-common/dist/request/BaseAuthRequest.d.ts
generated
vendored
Normal file
50
node_modules/@azure/msal-common/dist/request/BaseAuthRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,50 @@
|
||||
import { AuthenticationScheme } from "../utils/Constants.js";
|
||||
import { AzureCloudOptions } from "../config/ClientConfiguration.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
import { StoreInCache } from "./StoreInCache.js";
|
||||
import { ShrOptions } from "../crypto/SignedHttpRequest.js";
|
||||
/**
|
||||
* BaseAuthRequest
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. Defaults to https://login.microsoftonline.com/common. If using the same authority for all request, authority should set on client application object and not request, to avoid resolving authority endpoints multiple times.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authenticationScheme - The type of token retrieved. Defaults to "Bearer". Can also be type "pop" or "SSH".
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - shrClaims - A stringified claims object which will be added to a Signed HTTP Request
|
||||
* - shrNonce - A server-generated timestamp that has been encrypted and base64URL encoded, which will be added to a Signed HTTP Request.
|
||||
* - shrOptions - An object containing options for the Signed HTTP Request
|
||||
* - resourceRequestMethod - HTTP Request type used to request data from the resource (i.e. "GET", "POST", etc.). Used for proof-of-possession flows.
|
||||
* - resourceRequestUri - URI that token will be used for. Used for proof-of-possession flows.
|
||||
* - sshJwk - A stringified JSON Web Key representing a public key that can be signed by an SSH certificate.
|
||||
* - sshKid - Key ID that uniquely identifies the SSH public key mentioned above.
|
||||
* - azureCloudOptions - Convenience string enums for users to provide public/sovereign cloud ids
|
||||
* - requestedClaimsHash - SHA 256 hash string of the requested claims string, used as part of an access token cache key so tokens can be filtered by requested claims
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - storeInCache - Object containing boolean values indicating whether to store tokens in the cache or not (default is true)
|
||||
* - scenarioId - Scenario id to track custom user prompts
|
||||
* - popKid - Key ID to identify the public key for PoP token request
|
||||
* - embeddedClientId - Embedded client id. When specified, broker client id (brk_client_id) and redirect uri (brk_redirect_uri) params are set with values from the config, overriding the corresponding extra parameters, if present.
|
||||
*/
|
||||
export type BaseAuthRequest = {
|
||||
authority: string;
|
||||
correlationId: string;
|
||||
scopes: Array<string>;
|
||||
authenticationScheme?: AuthenticationScheme;
|
||||
claims?: string;
|
||||
shrClaims?: string;
|
||||
shrNonce?: string;
|
||||
shrOptions?: ShrOptions;
|
||||
resourceRequestMethod?: string;
|
||||
resourceRequestUri?: string;
|
||||
sshJwk?: string;
|
||||
sshKid?: string;
|
||||
azureCloudOptions?: AzureCloudOptions;
|
||||
requestedClaimsHash?: string;
|
||||
maxAge?: number;
|
||||
tokenQueryParameters?: StringDict;
|
||||
storeInCache?: StoreInCache;
|
||||
scenarioId?: string;
|
||||
popKid?: string;
|
||||
embeddedClientId?: string;
|
||||
};
|
||||
//# sourceMappingURL=BaseAuthRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/BaseAuthRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/BaseAuthRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"BaseAuthRequest.d.ts","sourceRoot":"","sources":["../../src/request/BaseAuthRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,oBAAoB,EAAE,MAAM,uBAAuB,CAAC;AAC7D,OAAO,EAAE,iBAAiB,EAAE,MAAM,kCAAkC,CAAC;AACrE,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,EAAE,YAAY,EAAE,MAAM,mBAAmB,CAAC;AACjD,OAAO,EAAE,UAAU,EAAE,MAAM,gCAAgC,CAAC;AAE5D;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAM,MAAM,eAAe,GAAG;IAC1B,SAAS,EAAE,MAAM,CAAC;IAClB,aAAa,EAAE,MAAM,CAAC;IACtB,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,oBAAoB,CAAC,EAAE,oBAAoB,CAAC;IAC5C,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,UAAU,CAAC,EAAE,UAAU,CAAC;IACxB,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAC/B,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAC5B,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,iBAAiB,CAAC,EAAE,iBAAiB,CAAC;IACtC,mBAAmB,CAAC,EAAE,MAAM,CAAC;IAC7B,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,oBAAoB,CAAC,EAAE,UAAU,CAAC;IAClC,YAAY,CAAC,EAAE,YAAY,CAAC;IAC5B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,gBAAgB,CAAC,EAAE,MAAM,CAAC;CAC7B,CAAC"}
|
||||
28
node_modules/@azure/msal-common/dist/request/CommonAuthorizationCodeRequest.d.ts
generated
vendored
Normal file
28
node_modules/@azure/msal-common/dist/request/CommonAuthorizationCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,28 @@
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
import { CcsCredential } from "../account/CcsCredential.js";
|
||||
/**
|
||||
* Request object passed by user to acquire a token from the server exchanging a valid authorization code (second leg of OAuth2.0 Authorization Code flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority: - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. If authority is set on client application object, this will override that value. Overriding the value will cause for authority validation to happen each time. If the same authority will be used for all request, set on the application object instead of the requests.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI of your app, where the authority will redirect to after the user inputs credentials and consents. It must exactly match one of the redirect URIs you registered in the portal
|
||||
* - code - The authorization_code that the user acquired in the first leg of the flow.
|
||||
* - codeVerifier - The same code_verifier that was used to obtain the authorization_code. Required if PKCE was used in the authorization code grant request.For more information, see the PKCE RFC: https://tools.ietf.org/html/rfc7636
|
||||
* - resourceRequestMethod - HTTP Request type used to request data from the resource (i.e. "GET", "POST", etc.). Used for proof-of-possession flows.
|
||||
* - resourceRequestUri - URI that token will be used for. Used for proof-of-possession flows.
|
||||
* - enableSpaAuthCode - Enables the acqusition of a spa authorization code (confidential clients only)
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
*/
|
||||
export type CommonAuthorizationCodeRequest = BaseAuthRequest & {
|
||||
code: string;
|
||||
redirectUri: string;
|
||||
codeVerifier?: string;
|
||||
tokenBodyParameters?: StringDict;
|
||||
enableSpaAuthorizationCode?: boolean;
|
||||
clientInfo?: string;
|
||||
ccsCredential?: CcsCredential;
|
||||
};
|
||||
//# sourceMappingURL=CommonAuthorizationCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonAuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonAuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonAuthorizationCodeRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonAuthorizationCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAE5D;;;;;;;;;;;;;;GAcG;AACH,MAAM,MAAM,8BAA8B,GAAG,eAAe,GAAG;IAC3D,IAAI,EAAE,MAAM,CAAC;IACb,WAAW,EAAE,MAAM,CAAC;IACpB,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,mBAAmB,CAAC,EAAE,UAAU,CAAC;IACjC,0BAA0B,CAAC,EAAE,OAAO,CAAC;IACrC,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,aAAa,CAAC,EAAE,aAAa,CAAC;CACjC,CAAC"}
|
||||
51
node_modules/@azure/msal-common/dist/request/CommonAuthorizationUrlRequest.d.ts
generated
vendored
Normal file
51
node_modules/@azure/msal-common/dist/request/CommonAuthorizationUrlRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,51 @@
|
||||
import { ResponseMode } from "../utils/Constants.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
import { AccountInfo } from "../account/AccountInfo.js";
|
||||
/**
|
||||
* Request object passed by user to retrieve a Code from the server (first leg of authorization code grant flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal.
|
||||
* - extraScopesToConsent - Scopes for a different resource when the user needs consent upfront.
|
||||
* - responseMode - Specifies the method that should be used to send the authentication result to your app. Can be query, form_post, or fragment. If no value is passed in, it defaults to query.
|
||||
* - codeChallenge - Used to secure authorization code grant via Proof of Key for Code Exchange (PKCE). For more information, see the PKCE RCF:https://tools.ietf.org/html/rfc7636
|
||||
* - codeChallengeMethod - The method used to encode the code verifier for the code challenge parameter. Can be "plain" or "S256". If excluded, code challenge is assumed to be plaintext. For more information, see the PKCE RCF: https://tools.ietf.org/html/rfc7636
|
||||
* - state - A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for preventing cross site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* login: will force the user to enter their credentials on that request, negating single-sign on
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* consent: will the trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app
|
||||
* select_account: will interrupt single sign-=on providing account selection experience listing all the accounts in session or any remembered accounts or an option to choose to use a different account
|
||||
* create: will direct the user to the account creation experience instead of the log in experience
|
||||
* no_session: will not read existing session token when authenticating the user. Upon user being successfully authenticated, EVO won’t create a new session for the user. FOR INTERNAL USE ONLY.
|
||||
* - account - AccountInfo obtained from a getAccount API. Will be used in certain scenarios to generate login_hint if both loginHint and sid params are not provided.
|
||||
* - loginHint - Can be used to pre-fill the username/email address field of the sign-in page for the user, if you know the username/email address ahead of time. Often apps use this parameter during re-authentication, having already extracted the username from a previous sign-in using the preferred_username claim.
|
||||
* - sid - Session ID, unique identifier for the session. Available as an optional claim on ID tokens.
|
||||
* - domainHint - Provides a hint about the tenant or domain that the user should use to sign in. The value of the domain hint is a registered domain for the tenant.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - nonce - A value included in the request that is returned in the id token. A randomly generated unique value is typically used to mitigate replay attacks.
|
||||
* - resourceRequestMethod - HTTP Request type used to request data from the resource (i.e. "GET", "POST", etc.). Used for proof-of-possession flows.
|
||||
* - resourceRequestUri - URI that token will be used for. Used for proof-of-possession flows.
|
||||
*/
|
||||
export type CommonAuthorizationUrlRequest = BaseAuthRequest & {
|
||||
redirectUri: string;
|
||||
responseMode: ResponseMode;
|
||||
account?: AccountInfo;
|
||||
codeChallenge?: string;
|
||||
codeChallengeMethod?: string;
|
||||
domainHint?: string;
|
||||
extraQueryParameters?: StringDict;
|
||||
extraScopesToConsent?: Array<string>;
|
||||
loginHint?: string;
|
||||
nonce?: string;
|
||||
prompt?: string;
|
||||
sid?: string;
|
||||
state?: string;
|
||||
platformBroker?: boolean;
|
||||
};
|
||||
//# sourceMappingURL=CommonAuthorizationUrlRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonAuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonAuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonAuthorizationUrlRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonAuthorizationUrlRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,YAAY,EAAE,MAAM,uBAAuB,CAAC;AACrD,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC;AAExD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,MAAM,6BAA6B,GAAG,eAAe,GAAG;IAC1D,WAAW,EAAE,MAAM,CAAC;IACpB,YAAY,EAAE,YAAY,CAAC;IAC3B,OAAO,CAAC,EAAE,WAAW,CAAC;IACtB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,mBAAmB,CAAC,EAAE,MAAM,CAAC;IAC7B,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,oBAAoB,CAAC,EAAE,UAAU,CAAC;IAClC,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACrC,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,cAAc,CAAC,EAAE,OAAO,CAAC;CAC5B,CAAC"}
|
||||
18
node_modules/@azure/msal-common/dist/request/CommonClientCredentialRequest.d.ts
generated
vendored
Normal file
18
node_modules/@azure/msal-common/dist/request/CommonClientCredentialRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
import { AzureRegion } from "../authority/AzureRegion.js";
|
||||
import { ClientAssertion } from "../account/ClientCredentials.js";
|
||||
/**
|
||||
* CommonClientCredentialRequest
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - skipCache - Skip token cache lookup and force request to authority to get a a new token. Defaults to false.
|
||||
* - preferredAzureRegionOptions - Options of the user's preferred azure region
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
*/
|
||||
export type CommonClientCredentialRequest = BaseAuthRequest & {
|
||||
skipCache?: boolean;
|
||||
azureRegion?: AzureRegion;
|
||||
clientAssertion?: ClientAssertion;
|
||||
};
|
||||
//# sourceMappingURL=CommonClientCredentialRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonClientCredentialRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonClientCredentialRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonClientCredentialRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonClientCredentialRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,WAAW,EAAE,MAAM,6BAA6B,CAAC;AAC1D,OAAO,EAAE,eAAe,EAAE,MAAM,iCAAiC,CAAC;AAElE;;;;;;;;GAQG;AACH,MAAM,MAAM,6BAA6B,GAAG,eAAe,GAAG;IAC1D,SAAS,CAAC,EAAE,OAAO,CAAC;IACpB,WAAW,CAAC,EAAE,WAAW,CAAC;IAC1B,eAAe,CAAC,EAAE,eAAe,CAAC;CACrC,CAAC"}
|
||||
22
node_modules/@azure/msal-common/dist/request/CommonDeviceCodeRequest.d.ts
generated
vendored
Normal file
22
node_modules/@azure/msal-common/dist/request/CommonDeviceCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
import { DeviceCodeResponse } from "../response/DeviceCodeResponse.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
/**
|
||||
* Parameters for Oauth2 device code flow.
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority: - URL of the authority, the security token service (STS) from which MSAL will acquire tokens. If authority is set on client application object, this will override that value. Overriding the value will cause for authority validation to happen each time. If the same authority will be used for all request, set on the application object instead of the requests.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - deviceCodeCallback - Callback containing device code response. Message should be shown to end user. End user can then navigate to the verification_uri, input the user_code, and input credentials.
|
||||
* - cancel - Boolean to cancel polling of device code endpoint. While the user authenticates on a separate device, MSAL polls the the token endpoint of security token service for the interval specified in the device code response (usually 15 minutes). To stop polling and cancel the request, set cancel=true.
|
||||
* - resourceRequestMethod - HTTP Request type used to request data from the resource (i.e. "GET", "POST", etc.). Used for proof-of-possession flows.
|
||||
* - resourceRequestUri - URI that token will be used for. Used for proof-of-possession flows.
|
||||
* - timeout - Timeout period in seconds which the user explicitly configures for the polling of the device code endpoint. At the end of this period; assuming the device code has not expired yet; the device code polling is stopped and the request cancelled. The device code expiration window will always take precedence over this set period.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the query string
|
||||
*/
|
||||
export type CommonDeviceCodeRequest = Omit<BaseAuthRequest, "tokenQueryParameters"> & {
|
||||
deviceCodeCallback: (response: DeviceCodeResponse) => void;
|
||||
cancel?: boolean;
|
||||
timeout?: number;
|
||||
extraQueryParameters?: StringDict;
|
||||
};
|
||||
//# sourceMappingURL=CommonDeviceCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonDeviceCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonDeviceCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonDeviceCodeRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonDeviceCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,kBAAkB,EAAE,MAAM,mCAAmC,CAAC;AACvE,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAEvD;;;;;;;;;;;GAWG;AAEH,MAAM,MAAM,uBAAuB,GAAG,IAAI,CACtC,eAAe,EACf,sBAAsB,CACzB,GAAG;IACA,kBAAkB,EAAE,CAAC,QAAQ,EAAE,kBAAkB,KAAK,IAAI,CAAC;IAC3D,MAAM,CAAC,EAAE,OAAO,CAAC;IACjB,OAAO,CAAC,EAAE,MAAM,CAAC;IACjB,oBAAoB,CAAC,EAAE,UAAU,CAAC;CACrC,CAAC"}
|
||||
22
node_modules/@azure/msal-common/dist/request/CommonEndSessionRequest.d.ts
generated
vendored
Normal file
22
node_modules/@azure/msal-common/dist/request/CommonEndSessionRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,22 @@
|
||||
import { AccountInfo } from "../account/AccountInfo.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
/**
|
||||
* CommonEndSessionRequest
|
||||
* - account - Account object that will be logged out of. All tokens tied to this account will be cleared.
|
||||
* - postLogoutRedirectUri - URI to navigate to after logout page.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - idTokenHint - ID Token used by B2C to validate logout if required by the policy
|
||||
* - state - A value included in the request to the logout endpoint which will be returned in the query string upon post logout redirection
|
||||
* - logoutHint - A string that specifies the account that is being logged out in order to skip the server account picker on logout
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
*/
|
||||
export type CommonEndSessionRequest = {
|
||||
correlationId: string;
|
||||
account?: AccountInfo | null;
|
||||
postLogoutRedirectUri?: string | null;
|
||||
idTokenHint?: string;
|
||||
state?: string;
|
||||
logoutHint?: string;
|
||||
extraQueryParameters?: StringDict;
|
||||
};
|
||||
//# sourceMappingURL=CommonEndSessionRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonEndSessionRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonEndSessionRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonEndSessionRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonEndSessionRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC;AACxD,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAEnD;;;;;;;;;GASG;AACH,MAAM,MAAM,uBAAuB,GAAG;IAClC,aAAa,EAAE,MAAM,CAAC;IACtB,OAAO,CAAC,EAAE,WAAW,GAAG,IAAI,CAAC;IAC7B,qBAAqB,CAAC,EAAE,MAAM,GAAG,IAAI,CAAC;IACtC,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,UAAU,CAAC,EAAE,MAAM,CAAC;IACpB,oBAAoB,CAAC,EAAE,UAAU,CAAC;CACrC,CAAC"}
|
||||
14
node_modules/@azure/msal-common/dist/request/CommonOnBehalfOfRequest.d.ts
generated
vendored
Normal file
14
node_modules/@azure/msal-common/dist/request/CommonOnBehalfOfRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
/**
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - oboAssertion - The access token that was sent to the middle-tier API. This token must have an audience of the app making this OBO request.
|
||||
* - skipCache - Skip token cache lookup and force request to authority to get a a new token. Defaults to false.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
*/
|
||||
export type CommonOnBehalfOfRequest = BaseAuthRequest & {
|
||||
oboAssertion: string;
|
||||
skipCache?: boolean;
|
||||
};
|
||||
//# sourceMappingURL=CommonOnBehalfOfRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonOnBehalfOfRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonOnBehalfOfRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonOnBehalfOfRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonOnBehalfOfRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAEvD;;;;;;;GAOG;AACH,MAAM,MAAM,uBAAuB,GAAG,eAAe,GAAG;IACpD,YAAY,EAAE,MAAM,CAAC;IACrB,SAAS,CAAC,EAAE,OAAO,CAAC;CACvB,CAAC"}
|
||||
23
node_modules/@azure/msal-common/dist/request/CommonRefreshTokenRequest.d.ts
generated
vendored
Normal file
23
node_modules/@azure/msal-common/dist/request/CommonRefreshTokenRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
import { CcsCredential } from "../account/CcsCredential.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
/**
|
||||
* CommonRefreshTokenRequest
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority - URL of the authority, the security token service (STS) from which MSAL will acquire tokens.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - refreshToken - A refresh token returned from a previous request to the Identity provider.
|
||||
* - resourceRequestMethod - HTTP Request type used to request data from the resource (i.e. "GET", "POST", etc.). Used for proof-of-possession flows.
|
||||
* - resourceRequestUri - URI that token will be used for. Used for proof-of-possession flows.
|
||||
* - forceCache - Force MSAL to cache a refresh token flow response when there is no account in the cache. Used for migration scenarios.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
*/
|
||||
export type CommonRefreshTokenRequest = BaseAuthRequest & {
|
||||
refreshToken: string;
|
||||
ccsCredential?: CcsCredential;
|
||||
forceCache?: boolean;
|
||||
tokenBodyParameters?: StringDict;
|
||||
redirectUri?: string;
|
||||
};
|
||||
//# sourceMappingURL=CommonRefreshTokenRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonRefreshTokenRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonRefreshTokenRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonRefreshTokenRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonRefreshTokenRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AACvD,OAAO,EAAE,aAAa,EAAE,MAAM,6BAA6B,CAAC;AAC5D,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAEnD;;;;;;;;;;;GAWG;AACH,MAAM,MAAM,yBAAyB,GAAG,eAAe,GAAG;IACtD,YAAY,EAAE,MAAM,CAAC;IACrB,aAAa,CAAC,EAAE,aAAa,CAAC;IAC9B,UAAU,CAAC,EAAE,OAAO,CAAC;IACrB,mBAAmB,CAAC,EAAE,UAAU,CAAC;IACjC,WAAW,CAAC,EAAE,MAAM,CAAC;CACxB,CAAC"}
|
||||
28
node_modules/@azure/msal-common/dist/request/CommonSilentFlowRequest.d.ts
generated
vendored
Normal file
28
node_modules/@azure/msal-common/dist/request/CommonSilentFlowRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,28 @@
|
||||
import { AccountInfo } from "../account/AccountInfo.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
/**
|
||||
* SilentFlow parameters passed by the user to retrieve credentials silently
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls. When included on a silent request, cache lookup will be skipped and token will be refreshed.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - account - Account entity to lookup the credentials.
|
||||
* - forceRefresh - Forces silent requests to make network calls if true.
|
||||
* - resourceRequestMethod - HTTP Request type used to request data from the resource (i.e. "GET", "POST", etc.). Used for proof-of-possession flows.
|
||||
* - resourceRequestUri - URI that token will be used for. Used for proof-of-possession flows.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
*/
|
||||
export type CommonSilentFlowRequest = BaseAuthRequest & {
|
||||
/** Account object to lookup the credentials */
|
||||
account: AccountInfo;
|
||||
/** Skip cache lookup and forces network call(s) to get fresh tokens */
|
||||
forceRefresh: boolean;
|
||||
/** RedirectUri registered on the app registration - only required in brokering scenarios */
|
||||
redirectUri?: string;
|
||||
/** Key value pairs to include on the POST body to the /token endpoint */
|
||||
tokenBodyParameters?: StringDict;
|
||||
/** If refresh token will expire within the configured value, consider it already expired. Used to pre-emptively invoke interaction when cached refresh token is close to expiry. */
|
||||
refreshTokenExpirationOffsetSeconds?: number;
|
||||
};
|
||||
//# sourceMappingURL=CommonSilentFlowRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonSilentFlowRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonSilentFlowRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonSilentFlowRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonSilentFlowRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,MAAM,2BAA2B,CAAC;AACxD,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AACnD,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAEvD;;;;;;;;;;;GAWG;AACH,MAAM,MAAM,uBAAuB,GAAG,eAAe,GAAG;IACpD,+CAA+C;IAC/C,OAAO,EAAE,WAAW,CAAC;IACrB,uEAAuE;IACvE,YAAY,EAAE,OAAO,CAAC;IACtB,4FAA4F;IAC5F,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,yEAAyE;IACzE,mBAAmB,CAAC,EAAE,UAAU,CAAC;IACjC,oLAAoL;IACpL,mCAAmC,CAAC,EAAE,MAAM,CAAC;CAChD,CAAC"}
|
||||
18
node_modules/@azure/msal-common/dist/request/CommonUsernamePasswordRequest.d.ts
generated
vendored
Normal file
18
node_modules/@azure/msal-common/dist/request/CommonUsernamePasswordRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,18 @@
|
||||
import { BaseAuthRequest } from "./BaseAuthRequest.js";
|
||||
/**
|
||||
* CommonUsernamePassword parameters passed by the user to retrieve credentials
|
||||
* Note: The latest OAuth 2.0 Security Best Current Practice disallows the password grant entirely. This flow is added for internal testing.
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls. When included on a silent request, cache lookup will be skipped and token will be refreshed.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - username - username of the client
|
||||
* - password - credentials
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
*/
|
||||
export type CommonUsernamePasswordRequest = BaseAuthRequest & {
|
||||
username: string;
|
||||
password: string;
|
||||
};
|
||||
//# sourceMappingURL=CommonUsernamePasswordRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/CommonUsernamePasswordRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/CommonUsernamePasswordRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"CommonUsernamePasswordRequest.d.ts","sourceRoot":"","sources":["../../src/request/CommonUsernamePasswordRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAEvD;;;;;;;;;;;GAWG;AACH,MAAM,MAAM,6BAA6B,GAAG,eAAe,GAAG;IAC1D,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,MAAM,CAAC;CACpB,CAAC"}
|
||||
20
node_modules/@azure/msal-common/dist/request/NativeRequest.d.ts
generated
vendored
Normal file
20
node_modules/@azure/msal-common/dist/request/NativeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,20 @@
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
export type NativeRequest = {
|
||||
clientId: string;
|
||||
authority: string;
|
||||
correlationId: string;
|
||||
redirectUri: string;
|
||||
scopes: Array<string>;
|
||||
claims?: string;
|
||||
authenticationScheme?: string;
|
||||
resourceRequestMethod?: string;
|
||||
resourceRequestUri?: string;
|
||||
shrNonce?: string;
|
||||
accountId?: string;
|
||||
forceRefresh?: boolean;
|
||||
extraParameters?: StringDict;
|
||||
extraScopesToConsent?: Array<string>;
|
||||
loginHint?: string;
|
||||
prompt?: string;
|
||||
};
|
||||
//# sourceMappingURL=NativeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/NativeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/NativeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"NativeRequest.d.ts","sourceRoot":"","sources":["../../src/request/NativeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAEnD,MAAM,MAAM,aAAa,GAAG;IACxB,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,EAAE,MAAM,CAAC;IAClB,aAAa,EAAE,MAAM,CAAC;IACtB,WAAW,EAAE,MAAM,CAAC;IACpB,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,oBAAoB,CAAC,EAAE,MAAM,CAAC;IAC9B,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAC/B,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAC5B,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,eAAe,CAAC,EAAE,UAAU,CAAC;IAC7B,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACrC,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,MAAM,CAAC,EAAE,MAAM,CAAC;CACnB,CAAC"}
|
||||
6
node_modules/@azure/msal-common/dist/request/NativeSignOutRequest.d.ts
generated
vendored
Normal file
6
node_modules/@azure/msal-common/dist/request/NativeSignOutRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
export type NativeSignOutRequest = {
|
||||
clientId: string;
|
||||
accountId: string;
|
||||
correlationId: string;
|
||||
};
|
||||
//# sourceMappingURL=NativeSignOutRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/NativeSignOutRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/NativeSignOutRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"NativeSignOutRequest.d.ts","sourceRoot":"","sources":["../../src/request/NativeSignOutRequest.ts"],"names":[],"mappings":"AAKA,MAAM,MAAM,oBAAoB,GAAG;IAC/B,QAAQ,EAAE,MAAM,CAAC;IACjB,SAAS,EAAE,MAAM,CAAC;IAClB,aAAa,EAAE,MAAM,CAAC;CACzB,CAAC"}
|
||||
225
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.d.ts
generated
vendored
Normal file
225
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.d.ts
generated
vendored
Normal file
@@ -0,0 +1,225 @@
|
||||
import { ResponseMode } from "../utils/Constants.js";
|
||||
import { StringDict } from "../utils/MsalTypes.js";
|
||||
import { ApplicationTelemetry, LibraryInfo } from "../config/ClientConfiguration.js";
|
||||
import { ServerTelemetryManager } from "../telemetry/server/ServerTelemetryManager.js";
|
||||
import { ClientInfo } from "../account/ClientInfo.js";
|
||||
import { IPerformanceClient } from "../telemetry/performance/IPerformanceClient.js";
|
||||
/** @internal */
|
||||
export declare class RequestParameterBuilder {
|
||||
private parameters;
|
||||
private readonly performanceClient?;
|
||||
private readonly correlationId?;
|
||||
constructor(correlationId?: string, performanceClient?: IPerformanceClient);
|
||||
/**
|
||||
* add response_type = code
|
||||
*/
|
||||
addResponseTypeCode(): void;
|
||||
/**
|
||||
* add response_type = token id_token
|
||||
*/
|
||||
addResponseTypeForTokenAndIdToken(): void;
|
||||
/**
|
||||
* add response_mode. defaults to query.
|
||||
* @param responseMode
|
||||
*/
|
||||
addResponseMode(responseMode?: ResponseMode): void;
|
||||
/**
|
||||
* Add flag to indicate STS should attempt to use WAM if available
|
||||
*/
|
||||
addNativeBroker(): void;
|
||||
/**
|
||||
* add scopes. set addOidcScopes to false to prevent default scopes in non-user scenarios
|
||||
* @param scopeSet
|
||||
* @param addOidcScopes
|
||||
*/
|
||||
addScopes(scopes: string[], addOidcScopes?: boolean, defaultScopes?: Array<string>): void;
|
||||
/**
|
||||
* add clientId
|
||||
* @param clientId
|
||||
*/
|
||||
addClientId(clientId: string): void;
|
||||
/**
|
||||
* add redirect_uri
|
||||
* @param redirectUri
|
||||
*/
|
||||
addRedirectUri(redirectUri: string): void;
|
||||
/**
|
||||
* add post logout redirectUri
|
||||
* @param redirectUri
|
||||
*/
|
||||
addPostLogoutRedirectUri(redirectUri: string): void;
|
||||
/**
|
||||
* add id_token_hint to logout request
|
||||
* @param idTokenHint
|
||||
*/
|
||||
addIdTokenHint(idTokenHint: string): void;
|
||||
/**
|
||||
* add domain_hint
|
||||
* @param domainHint
|
||||
*/
|
||||
addDomainHint(domainHint: string): void;
|
||||
/**
|
||||
* add login_hint
|
||||
* @param loginHint
|
||||
*/
|
||||
addLoginHint(loginHint: string): void;
|
||||
/**
|
||||
* Adds the CCS (Cache Credential Service) query parameter for login_hint
|
||||
* @param loginHint
|
||||
*/
|
||||
addCcsUpn(loginHint: string): void;
|
||||
/**
|
||||
* Adds the CCS (Cache Credential Service) query parameter for account object
|
||||
* @param loginHint
|
||||
*/
|
||||
addCcsOid(clientInfo: ClientInfo): void;
|
||||
/**
|
||||
* add sid
|
||||
* @param sid
|
||||
*/
|
||||
addSid(sid: string): void;
|
||||
/**
|
||||
* add claims
|
||||
* @param claims
|
||||
*/
|
||||
addClaims(claims?: string, clientCapabilities?: Array<string>): void;
|
||||
/**
|
||||
* add correlationId
|
||||
* @param correlationId
|
||||
*/
|
||||
addCorrelationId(correlationId: string): void;
|
||||
/**
|
||||
* add library info query params
|
||||
* @param libraryInfo
|
||||
*/
|
||||
addLibraryInfo(libraryInfo: LibraryInfo): void;
|
||||
/**
|
||||
* Add client telemetry parameters
|
||||
* @param appTelemetry
|
||||
*/
|
||||
addApplicationTelemetry(appTelemetry: ApplicationTelemetry): void;
|
||||
/**
|
||||
* add prompt
|
||||
* @param prompt
|
||||
*/
|
||||
addPrompt(prompt: string): void;
|
||||
/**
|
||||
* add state
|
||||
* @param state
|
||||
*/
|
||||
addState(state: string): void;
|
||||
/**
|
||||
* add nonce
|
||||
* @param nonce
|
||||
*/
|
||||
addNonce(nonce: string): void;
|
||||
/**
|
||||
* add code_challenge and code_challenge_method
|
||||
* - throw if either of them are not passed
|
||||
* @param codeChallenge
|
||||
* @param codeChallengeMethod
|
||||
*/
|
||||
addCodeChallengeParams(codeChallenge: string, codeChallengeMethod: string): void;
|
||||
/**
|
||||
* add the `authorization_code` passed by the user to exchange for a token
|
||||
* @param code
|
||||
*/
|
||||
addAuthorizationCode(code: string): void;
|
||||
/**
|
||||
* add the `authorization_code` passed by the user to exchange for a token
|
||||
* @param code
|
||||
*/
|
||||
addDeviceCode(code: string): void;
|
||||
/**
|
||||
* add the `refreshToken` passed by the user
|
||||
* @param refreshToken
|
||||
*/
|
||||
addRefreshToken(refreshToken: string): void;
|
||||
/**
|
||||
* add the `code_verifier` passed by the user to exchange for a token
|
||||
* @param codeVerifier
|
||||
*/
|
||||
addCodeVerifier(codeVerifier: string): void;
|
||||
/**
|
||||
* add client_secret
|
||||
* @param clientSecret
|
||||
*/
|
||||
addClientSecret(clientSecret: string): void;
|
||||
/**
|
||||
* add clientAssertion for confidential client flows
|
||||
* @param clientAssertion
|
||||
*/
|
||||
addClientAssertion(clientAssertion: string): void;
|
||||
/**
|
||||
* add clientAssertionType for confidential client flows
|
||||
* @param clientAssertionType
|
||||
*/
|
||||
addClientAssertionType(clientAssertionType: string): void;
|
||||
/**
|
||||
* add OBO assertion for confidential client flows
|
||||
* @param clientAssertion
|
||||
*/
|
||||
addOboAssertion(oboAssertion: string): void;
|
||||
/**
|
||||
* add grant type
|
||||
* @param grantType
|
||||
*/
|
||||
addRequestTokenUse(tokenUse: string): void;
|
||||
/**
|
||||
* add grant type
|
||||
* @param grantType
|
||||
*/
|
||||
addGrantType(grantType: string): void;
|
||||
/**
|
||||
* add client info
|
||||
*
|
||||
*/
|
||||
addClientInfo(): void;
|
||||
/**
|
||||
* add extraQueryParams
|
||||
* @param eQParams
|
||||
*/
|
||||
addExtraQueryParameters(eQParams: StringDict): void;
|
||||
addClientCapabilitiesToClaims(claims?: string, clientCapabilities?: Array<string>): string;
|
||||
/**
|
||||
* adds `username` for Password Grant flow
|
||||
* @param username
|
||||
*/
|
||||
addUsername(username: string): void;
|
||||
/**
|
||||
* adds `password` for Password Grant flow
|
||||
* @param password
|
||||
*/
|
||||
addPassword(password: string): void;
|
||||
/**
|
||||
* add pop_jwk to query params
|
||||
* @param cnfString
|
||||
*/
|
||||
addPopToken(cnfString: string): void;
|
||||
/**
|
||||
* add SSH JWK and key ID to query params
|
||||
*/
|
||||
addSshJwk(sshJwkString: string): void;
|
||||
/**
|
||||
* add server telemetry fields
|
||||
* @param serverTelemetryManager
|
||||
*/
|
||||
addServerTelemetry(serverTelemetryManager: ServerTelemetryManager): void;
|
||||
/**
|
||||
* Adds parameter that indicates to the server that throttling is supported
|
||||
*/
|
||||
addThrottling(): void;
|
||||
/**
|
||||
* Adds logout_hint parameter for "silent" logout which prevent server account picker
|
||||
*/
|
||||
addLogoutHint(logoutHint: string): void;
|
||||
addBrokerParameters(params: {
|
||||
brokerClientId: string;
|
||||
brokerRedirectUri: string;
|
||||
}): void;
|
||||
/**
|
||||
* Utility to create a URL from the params map
|
||||
*/
|
||||
createQueryString(): string;
|
||||
}
|
||||
//# sourceMappingURL=RequestParameterBuilder.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RequestParameterBuilder.d.ts","sourceRoot":"","sources":["../../src/request/RequestParameterBuilder.ts"],"names":[],"mappings":"AAKA,OAAO,EAEH,YAAY,EAQf,MAAM,uBAAuB,CAAC;AAO/B,OAAO,EAAE,UAAU,EAAE,MAAM,uBAAuB,CAAC;AAEnD,OAAO,EACH,oBAAoB,EACpB,WAAW,EACd,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EAAE,sBAAsB,EAAE,MAAM,+CAA+C,CAAC;AACvF,OAAO,EAAE,UAAU,EAAE,MAAM,0BAA0B,CAAC;AACtD,OAAO,EAAE,kBAAkB,EAAE,MAAM,gDAAgD,CAAC;AAyBpF,gBAAgB;AAChB,qBAAa,uBAAuB;IAChC,OAAO,CAAC,UAAU,CAAsB;IACxC,OAAO,CAAC,QAAQ,CAAC,iBAAiB,CAAC,CAAqB;IACxD,OAAO,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAS;gBAGpC,aAAa,CAAC,EAAE,MAAM,EACtB,iBAAiB,CAAC,EAAE,kBAAkB;IAO1C;;OAEG;IACH,mBAAmB,IAAI,IAAI;IAO3B;;OAEG;IACH,iCAAiC,IAAI,IAAI;IASzC;;;OAGG;IACH,eAAe,CAAC,YAAY,CAAC,EAAE,YAAY,GAAG,IAAI;IAOlD;;OAEG;IACH,eAAe,IAAI,IAAI;IAOvB;;;;OAIG;IACH,SAAS,CACL,MAAM,EAAE,MAAM,EAAE,EAChB,aAAa,GAAE,OAAc,EAC7B,aAAa,GAAE,KAAK,CAAC,MAAM,CAAuB,GACnD,IAAI;IAmBP;;;OAGG;IACH,WAAW,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI;IAOnC;;;OAGG;IACH,cAAc,CAAC,WAAW,EAAE,MAAM,GAAG,IAAI;IAQzC;;;OAGG;IACH,wBAAwB,CAAC,WAAW,EAAE,MAAM,GAAG,IAAI;IAQnD;;;OAGG;IACH,cAAc,CAAC,WAAW,EAAE,MAAM,GAAG,IAAI;IAOzC;;;OAGG;IACH,aAAa,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI;IAOvC;;;OAGG;IACH,YAAY,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI;IAOrC;;;OAGG;IACH,SAAS,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI;IAOlC;;;OAGG;IACH,SAAS,CAAC,UAAU,EAAE,UAAU,GAAG,IAAI;IAOvC;;;OAGG;IACH,MAAM,CAAC,GAAG,EAAE,MAAM,GAAG,IAAI;IAIzB;;;OAGG;IACH,SAAS,CAAC,MAAM,CAAC,EAAE,MAAM,EAAE,kBAAkB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,IAAI;IAYpE;;;OAGG;IACH,gBAAgB,CAAC,aAAa,EAAE,MAAM,GAAG,IAAI;IAO7C;;;OAGG;IACH,cAAc,CAAC,WAAW,EAAE,WAAW,GAAG,IAAI;IAkB9C;;;OAGG;IACH,uBAAuB,CAAC,YAAY,EAAE,oBAAoB,GAAG,IAAI;IAgBjE;;;OAGG;IACH,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAQ/B;;;OAGG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAS7B;;;OAGG;IACH,QAAQ,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAO7B;;;;;OAKG;IACH,sBAAsB,CAClB,aAAa,EAAE,MAAM,EACrB,mBAAmB,EAAE,MAAM,GAC5B,IAAI;IAqBP;;;OAGG;IACH,oBAAoB,CAAC,IAAI,EAAE,MAAM,GAAG,IAAI;IAIxC;;;OAGG;IACH,aAAa,CAAC,IAAI,EAAE,MAAM,GAAG,IAAI;IAOjC;;;OAGG;IACH,eAAe,CAAC,YAAY,EAAE,MAAM,GAAG,IAAI;IAO3C;;;OAGG;IACH,eAAe,CAAC,YAAY,EAAE,MAAM,GAAG,IAAI;IAO3C;;;OAGG;IACH,eAAe,CAAC,YAAY,EAAE,MAAM,GAAG,IAAI;IAO3C;;;OAGG;IACH,kBAAkB,CAAC,eAAe,EAAE,MAAM,GAAG,IAAI;IASjD;;;OAGG;IACH,sBAAsB,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI;IASzD;;;OAGG;IACH,eAAe,CAAC,YAAY,EAAE,MAAM,GAAG,IAAI;IAO3C;;;OAGG;IACH,kBAAkB,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI;IAO1C;;;OAGG;IACH,YAAY,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI;IAOrC;;;OAGG;IACH,aAAa,IAAI,IAAI;IAIrB;;;OAGG;IACH,uBAAuB,CAAC,QAAQ,EAAE,UAAU,GAAG,IAAI;IAQnD,6BAA6B,CACzB,MAAM,CAAC,EAAE,MAAM,EACf,kBAAkB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,GACnC,MAAM;IAiCT;;;OAGG;IACH,WAAW,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI;IAOnC;;;OAGG;IACH,WAAW,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI;IAOnC;;;OAGG;IACH,WAAW,CAAC,SAAS,EAAE,MAAM,GAAG,IAAI;IAapC;;OAEG;IACH,SAAS,CAAC,YAAY,EAAE,MAAM,GAAG,IAAI;IAarC;;;OAGG;IACH,kBAAkB,CAAC,sBAAsB,EAAE,sBAAsB,GAAG,IAAI;IAWxE;;OAEG;IACH,aAAa,IAAI,IAAI;IAOrB;;OAEG;IACH,aAAa,CAAC,UAAU,EAAE,MAAM,GAAG,IAAI;IAOvC,mBAAmB,CAAC,MAAM,EAAE;QACxB,cAAc,EAAE,MAAM,CAAC;QACvB,iBAAiB,EAAE,MAAM,CAAC;KAC7B,GAAG,IAAI;IAUR;;OAEG;IACH,iBAAiB,IAAI,MAAM;CAe9B"}
|
||||
417
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.mjs
generated
vendored
Normal file
417
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.mjs
generated
vendored
Normal file
@@ -0,0 +1,417 @@
|
||||
/*! @azure/msal-common v15.1.1 2025-02-05 */
|
||||
'use strict';
|
||||
import { Constants, ResponseMode, OIDC_DEFAULT_SCOPES, HeaderNames, CLIENT_INFO, ClaimsRequestKeys, PasswordGrantConstants, AuthenticationScheme, ThrottlingConstants } from '../utils/Constants.mjs';
|
||||
import { RESPONSE_TYPE, RESPONSE_MODE, NATIVE_BROKER, SCOPE, CLIENT_ID, REDIRECT_URI, POST_LOGOUT_URI, ID_TOKEN_HINT, DOMAIN_HINT, LOGIN_HINT, SID, CLAIMS, CLIENT_REQUEST_ID, X_CLIENT_SKU, X_CLIENT_VER, X_CLIENT_OS, X_CLIENT_CPU, X_APP_NAME, X_APP_VER, PROMPT, STATE, NONCE, CODE_CHALLENGE, CODE_CHALLENGE_METHOD, CODE, DEVICE_CODE, REFRESH_TOKEN, CODE_VERIFIER, CLIENT_SECRET, CLIENT_ASSERTION, CLIENT_ASSERTION_TYPE, OBO_ASSERTION, REQUESTED_TOKEN_USE, GRANT_TYPE, TOKEN_TYPE, REQ_CNF, X_CLIENT_CURR_TELEM, X_CLIENT_LAST_TELEM, X_MS_LIB_CAPABILITY, LOGOUT_HINT, BROKER_CLIENT_ID, BROKER_REDIRECT_URI } from '../constants/AADServerParamKeys.mjs';
|
||||
import { ScopeSet } from './ScopeSet.mjs';
|
||||
import { createClientConfigurationError } from '../error/ClientConfigurationError.mjs';
|
||||
import { RequestValidator } from './RequestValidator.mjs';
|
||||
import { pkceParamsMissing, invalidClaims } from '../error/ClientConfigurationErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
function instrumentBrokerParams(parameters, correlationId, performanceClient) {
|
||||
if (!correlationId) {
|
||||
return;
|
||||
}
|
||||
const clientId = parameters.get(CLIENT_ID);
|
||||
if (clientId && parameters.has(BROKER_CLIENT_ID)) {
|
||||
performanceClient?.addFields({
|
||||
embeddedClientId: clientId,
|
||||
embeddedRedirectUri: parameters.get(REDIRECT_URI),
|
||||
}, correlationId);
|
||||
}
|
||||
}
|
||||
/** @internal */
|
||||
class RequestParameterBuilder {
|
||||
constructor(correlationId, performanceClient) {
|
||||
this.parameters = new Map();
|
||||
this.performanceClient = performanceClient;
|
||||
this.correlationId = correlationId;
|
||||
}
|
||||
/**
|
||||
* add response_type = code
|
||||
*/
|
||||
addResponseTypeCode() {
|
||||
this.parameters.set(RESPONSE_TYPE, encodeURIComponent(Constants.CODE_RESPONSE_TYPE));
|
||||
}
|
||||
/**
|
||||
* add response_type = token id_token
|
||||
*/
|
||||
addResponseTypeForTokenAndIdToken() {
|
||||
this.parameters.set(RESPONSE_TYPE, encodeURIComponent(`${Constants.TOKEN_RESPONSE_TYPE} ${Constants.ID_TOKEN_RESPONSE_TYPE}`));
|
||||
}
|
||||
/**
|
||||
* add response_mode. defaults to query.
|
||||
* @param responseMode
|
||||
*/
|
||||
addResponseMode(responseMode) {
|
||||
this.parameters.set(RESPONSE_MODE, encodeURIComponent(responseMode ? responseMode : ResponseMode.QUERY));
|
||||
}
|
||||
/**
|
||||
* Add flag to indicate STS should attempt to use WAM if available
|
||||
*/
|
||||
addNativeBroker() {
|
||||
this.parameters.set(NATIVE_BROKER, encodeURIComponent("1"));
|
||||
}
|
||||
/**
|
||||
* add scopes. set addOidcScopes to false to prevent default scopes in non-user scenarios
|
||||
* @param scopeSet
|
||||
* @param addOidcScopes
|
||||
*/
|
||||
addScopes(scopes, addOidcScopes = true, defaultScopes = OIDC_DEFAULT_SCOPES) {
|
||||
// Always add openid to the scopes when adding OIDC scopes
|
||||
if (addOidcScopes &&
|
||||
!defaultScopes.includes("openid") &&
|
||||
!scopes.includes("openid")) {
|
||||
defaultScopes.push("openid");
|
||||
}
|
||||
const requestScopes = addOidcScopes
|
||||
? [...(scopes || []), ...defaultScopes]
|
||||
: scopes || [];
|
||||
const scopeSet = new ScopeSet(requestScopes);
|
||||
this.parameters.set(SCOPE, encodeURIComponent(scopeSet.printScopes()));
|
||||
}
|
||||
/**
|
||||
* add clientId
|
||||
* @param clientId
|
||||
*/
|
||||
addClientId(clientId) {
|
||||
this.parameters.set(CLIENT_ID, encodeURIComponent(clientId));
|
||||
}
|
||||
/**
|
||||
* add redirect_uri
|
||||
* @param redirectUri
|
||||
*/
|
||||
addRedirectUri(redirectUri) {
|
||||
RequestValidator.validateRedirectUri(redirectUri);
|
||||
this.parameters.set(REDIRECT_URI, encodeURIComponent(redirectUri));
|
||||
}
|
||||
/**
|
||||
* add post logout redirectUri
|
||||
* @param redirectUri
|
||||
*/
|
||||
addPostLogoutRedirectUri(redirectUri) {
|
||||
RequestValidator.validateRedirectUri(redirectUri);
|
||||
this.parameters.set(POST_LOGOUT_URI, encodeURIComponent(redirectUri));
|
||||
}
|
||||
/**
|
||||
* add id_token_hint to logout request
|
||||
* @param idTokenHint
|
||||
*/
|
||||
addIdTokenHint(idTokenHint) {
|
||||
this.parameters.set(ID_TOKEN_HINT, encodeURIComponent(idTokenHint));
|
||||
}
|
||||
/**
|
||||
* add domain_hint
|
||||
* @param domainHint
|
||||
*/
|
||||
addDomainHint(domainHint) {
|
||||
this.parameters.set(DOMAIN_HINT, encodeURIComponent(domainHint));
|
||||
}
|
||||
/**
|
||||
* add login_hint
|
||||
* @param loginHint
|
||||
*/
|
||||
addLoginHint(loginHint) {
|
||||
this.parameters.set(LOGIN_HINT, encodeURIComponent(loginHint));
|
||||
}
|
||||
/**
|
||||
* Adds the CCS (Cache Credential Service) query parameter for login_hint
|
||||
* @param loginHint
|
||||
*/
|
||||
addCcsUpn(loginHint) {
|
||||
this.parameters.set(HeaderNames.CCS_HEADER, encodeURIComponent(`UPN:${loginHint}`));
|
||||
}
|
||||
/**
|
||||
* Adds the CCS (Cache Credential Service) query parameter for account object
|
||||
* @param loginHint
|
||||
*/
|
||||
addCcsOid(clientInfo) {
|
||||
this.parameters.set(HeaderNames.CCS_HEADER, encodeURIComponent(`Oid:${clientInfo.uid}@${clientInfo.utid}`));
|
||||
}
|
||||
/**
|
||||
* add sid
|
||||
* @param sid
|
||||
*/
|
||||
addSid(sid) {
|
||||
this.parameters.set(SID, encodeURIComponent(sid));
|
||||
}
|
||||
/**
|
||||
* add claims
|
||||
* @param claims
|
||||
*/
|
||||
addClaims(claims, clientCapabilities) {
|
||||
const mergedClaims = this.addClientCapabilitiesToClaims(claims, clientCapabilities);
|
||||
RequestValidator.validateClaims(mergedClaims);
|
||||
this.parameters.set(CLAIMS, encodeURIComponent(mergedClaims));
|
||||
}
|
||||
/**
|
||||
* add correlationId
|
||||
* @param correlationId
|
||||
*/
|
||||
addCorrelationId(correlationId) {
|
||||
this.parameters.set(CLIENT_REQUEST_ID, encodeURIComponent(correlationId));
|
||||
}
|
||||
/**
|
||||
* add library info query params
|
||||
* @param libraryInfo
|
||||
*/
|
||||
addLibraryInfo(libraryInfo) {
|
||||
// Telemetry Info
|
||||
this.parameters.set(X_CLIENT_SKU, libraryInfo.sku);
|
||||
this.parameters.set(X_CLIENT_VER, libraryInfo.version);
|
||||
if (libraryInfo.os) {
|
||||
this.parameters.set(X_CLIENT_OS, libraryInfo.os);
|
||||
}
|
||||
if (libraryInfo.cpu) {
|
||||
this.parameters.set(X_CLIENT_CPU, libraryInfo.cpu);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Add client telemetry parameters
|
||||
* @param appTelemetry
|
||||
*/
|
||||
addApplicationTelemetry(appTelemetry) {
|
||||
if (appTelemetry?.appName) {
|
||||
this.parameters.set(X_APP_NAME, appTelemetry.appName);
|
||||
}
|
||||
if (appTelemetry?.appVersion) {
|
||||
this.parameters.set(X_APP_VER, appTelemetry.appVersion);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add prompt
|
||||
* @param prompt
|
||||
*/
|
||||
addPrompt(prompt) {
|
||||
RequestValidator.validatePrompt(prompt);
|
||||
this.parameters.set(`${PROMPT}`, encodeURIComponent(prompt));
|
||||
}
|
||||
/**
|
||||
* add state
|
||||
* @param state
|
||||
*/
|
||||
addState(state) {
|
||||
if (state) {
|
||||
this.parameters.set(STATE, encodeURIComponent(state));
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add nonce
|
||||
* @param nonce
|
||||
*/
|
||||
addNonce(nonce) {
|
||||
this.parameters.set(NONCE, encodeURIComponent(nonce));
|
||||
}
|
||||
/**
|
||||
* add code_challenge and code_challenge_method
|
||||
* - throw if either of them are not passed
|
||||
* @param codeChallenge
|
||||
* @param codeChallengeMethod
|
||||
*/
|
||||
addCodeChallengeParams(codeChallenge, codeChallengeMethod) {
|
||||
RequestValidator.validateCodeChallengeParams(codeChallenge, codeChallengeMethod);
|
||||
if (codeChallenge && codeChallengeMethod) {
|
||||
this.parameters.set(CODE_CHALLENGE, encodeURIComponent(codeChallenge));
|
||||
this.parameters.set(CODE_CHALLENGE_METHOD, encodeURIComponent(codeChallengeMethod));
|
||||
}
|
||||
else {
|
||||
throw createClientConfigurationError(pkceParamsMissing);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add the `authorization_code` passed by the user to exchange for a token
|
||||
* @param code
|
||||
*/
|
||||
addAuthorizationCode(code) {
|
||||
this.parameters.set(CODE, encodeURIComponent(code));
|
||||
}
|
||||
/**
|
||||
* add the `authorization_code` passed by the user to exchange for a token
|
||||
* @param code
|
||||
*/
|
||||
addDeviceCode(code) {
|
||||
this.parameters.set(DEVICE_CODE, encodeURIComponent(code));
|
||||
}
|
||||
/**
|
||||
* add the `refreshToken` passed by the user
|
||||
* @param refreshToken
|
||||
*/
|
||||
addRefreshToken(refreshToken) {
|
||||
this.parameters.set(REFRESH_TOKEN, encodeURIComponent(refreshToken));
|
||||
}
|
||||
/**
|
||||
* add the `code_verifier` passed by the user to exchange for a token
|
||||
* @param codeVerifier
|
||||
*/
|
||||
addCodeVerifier(codeVerifier) {
|
||||
this.parameters.set(CODE_VERIFIER, encodeURIComponent(codeVerifier));
|
||||
}
|
||||
/**
|
||||
* add client_secret
|
||||
* @param clientSecret
|
||||
*/
|
||||
addClientSecret(clientSecret) {
|
||||
this.parameters.set(CLIENT_SECRET, encodeURIComponent(clientSecret));
|
||||
}
|
||||
/**
|
||||
* add clientAssertion for confidential client flows
|
||||
* @param clientAssertion
|
||||
*/
|
||||
addClientAssertion(clientAssertion) {
|
||||
if (clientAssertion) {
|
||||
this.parameters.set(CLIENT_ASSERTION, encodeURIComponent(clientAssertion));
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add clientAssertionType for confidential client flows
|
||||
* @param clientAssertionType
|
||||
*/
|
||||
addClientAssertionType(clientAssertionType) {
|
||||
if (clientAssertionType) {
|
||||
this.parameters.set(CLIENT_ASSERTION_TYPE, encodeURIComponent(clientAssertionType));
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add OBO assertion for confidential client flows
|
||||
* @param clientAssertion
|
||||
*/
|
||||
addOboAssertion(oboAssertion) {
|
||||
this.parameters.set(OBO_ASSERTION, encodeURIComponent(oboAssertion));
|
||||
}
|
||||
/**
|
||||
* add grant type
|
||||
* @param grantType
|
||||
*/
|
||||
addRequestTokenUse(tokenUse) {
|
||||
this.parameters.set(REQUESTED_TOKEN_USE, encodeURIComponent(tokenUse));
|
||||
}
|
||||
/**
|
||||
* add grant type
|
||||
* @param grantType
|
||||
*/
|
||||
addGrantType(grantType) {
|
||||
this.parameters.set(GRANT_TYPE, encodeURIComponent(grantType));
|
||||
}
|
||||
/**
|
||||
* add client info
|
||||
*
|
||||
*/
|
||||
addClientInfo() {
|
||||
this.parameters.set(CLIENT_INFO, "1");
|
||||
}
|
||||
/**
|
||||
* add extraQueryParams
|
||||
* @param eQParams
|
||||
*/
|
||||
addExtraQueryParameters(eQParams) {
|
||||
Object.entries(eQParams).forEach(([key, value]) => {
|
||||
if (!this.parameters.has(key) && value) {
|
||||
this.parameters.set(key, value);
|
||||
}
|
||||
});
|
||||
}
|
||||
addClientCapabilitiesToClaims(claims, clientCapabilities) {
|
||||
let mergedClaims;
|
||||
// Parse provided claims into JSON object or initialize empty object
|
||||
if (!claims) {
|
||||
mergedClaims = {};
|
||||
}
|
||||
else {
|
||||
try {
|
||||
mergedClaims = JSON.parse(claims);
|
||||
}
|
||||
catch (e) {
|
||||
throw createClientConfigurationError(invalidClaims);
|
||||
}
|
||||
}
|
||||
if (clientCapabilities && clientCapabilities.length > 0) {
|
||||
if (!mergedClaims.hasOwnProperty(ClaimsRequestKeys.ACCESS_TOKEN)) {
|
||||
// Add access_token key to claims object
|
||||
mergedClaims[ClaimsRequestKeys.ACCESS_TOKEN] = {};
|
||||
}
|
||||
// Add xms_cc claim with provided clientCapabilities to access_token key
|
||||
mergedClaims[ClaimsRequestKeys.ACCESS_TOKEN][ClaimsRequestKeys.XMS_CC] = {
|
||||
values: clientCapabilities,
|
||||
};
|
||||
}
|
||||
return JSON.stringify(mergedClaims);
|
||||
}
|
||||
/**
|
||||
* adds `username` for Password Grant flow
|
||||
* @param username
|
||||
*/
|
||||
addUsername(username) {
|
||||
this.parameters.set(PasswordGrantConstants.username, encodeURIComponent(username));
|
||||
}
|
||||
/**
|
||||
* adds `password` for Password Grant flow
|
||||
* @param password
|
||||
*/
|
||||
addPassword(password) {
|
||||
this.parameters.set(PasswordGrantConstants.password, encodeURIComponent(password));
|
||||
}
|
||||
/**
|
||||
* add pop_jwk to query params
|
||||
* @param cnfString
|
||||
*/
|
||||
addPopToken(cnfString) {
|
||||
if (cnfString) {
|
||||
this.parameters.set(TOKEN_TYPE, AuthenticationScheme.POP);
|
||||
this.parameters.set(REQ_CNF, encodeURIComponent(cnfString));
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add SSH JWK and key ID to query params
|
||||
*/
|
||||
addSshJwk(sshJwkString) {
|
||||
if (sshJwkString) {
|
||||
this.parameters.set(TOKEN_TYPE, AuthenticationScheme.SSH);
|
||||
this.parameters.set(REQ_CNF, encodeURIComponent(sshJwkString));
|
||||
}
|
||||
}
|
||||
/**
|
||||
* add server telemetry fields
|
||||
* @param serverTelemetryManager
|
||||
*/
|
||||
addServerTelemetry(serverTelemetryManager) {
|
||||
this.parameters.set(X_CLIENT_CURR_TELEM, serverTelemetryManager.generateCurrentRequestHeaderValue());
|
||||
this.parameters.set(X_CLIENT_LAST_TELEM, serverTelemetryManager.generateLastRequestHeaderValue());
|
||||
}
|
||||
/**
|
||||
* Adds parameter that indicates to the server that throttling is supported
|
||||
*/
|
||||
addThrottling() {
|
||||
this.parameters.set(X_MS_LIB_CAPABILITY, ThrottlingConstants.X_MS_LIB_CAPABILITY_VALUE);
|
||||
}
|
||||
/**
|
||||
* Adds logout_hint parameter for "silent" logout which prevent server account picker
|
||||
*/
|
||||
addLogoutHint(logoutHint) {
|
||||
this.parameters.set(LOGOUT_HINT, encodeURIComponent(logoutHint));
|
||||
}
|
||||
addBrokerParameters(params) {
|
||||
const brokerParams = {};
|
||||
brokerParams[BROKER_CLIENT_ID] =
|
||||
params.brokerClientId;
|
||||
brokerParams[BROKER_REDIRECT_URI] =
|
||||
params.brokerRedirectUri;
|
||||
this.addExtraQueryParameters(brokerParams);
|
||||
}
|
||||
/**
|
||||
* Utility to create a URL from the params map
|
||||
*/
|
||||
createQueryString() {
|
||||
const queryParameterArray = new Array();
|
||||
this.parameters.forEach((value, key) => {
|
||||
queryParameterArray.push(`${key}=${value}`);
|
||||
});
|
||||
instrumentBrokerParams(this.parameters, this.correlationId, this.performanceClient);
|
||||
return queryParameterArray.join("&");
|
||||
}
|
||||
}
|
||||
|
||||
export { RequestParameterBuilder };
|
||||
//# sourceMappingURL=RequestParameterBuilder.mjs.map
|
||||
1
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.mjs.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/RequestParameterBuilder.mjs.map
generated
vendored
Normal file
File diff suppressed because one or more lines are too long
28
node_modules/@azure/msal-common/dist/request/RequestValidator.d.ts
generated
vendored
Normal file
28
node_modules/@azure/msal-common/dist/request/RequestValidator.d.ts
generated
vendored
Normal file
@@ -0,0 +1,28 @@
|
||||
/**
|
||||
* Validates server consumable params from the "request" objects
|
||||
*/
|
||||
export declare class RequestValidator {
|
||||
/**
|
||||
* Utility to check if the `redirectUri` in the request is a non-null value
|
||||
* @param redirectUri
|
||||
*/
|
||||
static validateRedirectUri(redirectUri: string): void;
|
||||
/**
|
||||
* Utility to validate prompt sent by the user in the request
|
||||
* @param prompt
|
||||
*/
|
||||
static validatePrompt(prompt: string): void;
|
||||
static validateClaims(claims: string): void;
|
||||
/**
|
||||
* Utility to validate code_challenge and code_challenge_method
|
||||
* @param codeChallenge
|
||||
* @param codeChallengeMethod
|
||||
*/
|
||||
static validateCodeChallengeParams(codeChallenge: string, codeChallengeMethod: string): void;
|
||||
/**
|
||||
* Utility to validate code_challenge_method
|
||||
* @param codeChallengeMethod
|
||||
*/
|
||||
static validateCodeChallengeMethod(codeChallengeMethod: string): void;
|
||||
}
|
||||
//# sourceMappingURL=RequestValidator.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/RequestValidator.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/RequestValidator.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RequestValidator.d.ts","sourceRoot":"","sources":["../../src/request/RequestValidator.ts"],"names":[],"mappings":"AAWA;;GAEG;AACH,qBAAa,gBAAgB;IACzB;;;OAGG;IACH,MAAM,CAAC,mBAAmB,CAAC,WAAW,EAAE,MAAM,GAAG,IAAI;IAQrD;;;OAGG;IACH,MAAM,CAAC,cAAc,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAc3C,MAAM,CAAC,cAAc,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAU3C;;;;OAIG;IACH,MAAM,CAAC,2BAA2B,CAC9B,aAAa,EAAE,MAAM,EACrB,mBAAmB,EAAE,MAAM,GAC5B,IAAI;IAUP;;;OAGG;IACH,MAAM,CAAC,2BAA2B,CAAC,mBAAmB,EAAE,MAAM,GAAG,IAAI;CAYxE"}
|
||||
73
node_modules/@azure/msal-common/dist/request/RequestValidator.mjs
generated
vendored
Normal file
73
node_modules/@azure/msal-common/dist/request/RequestValidator.mjs
generated
vendored
Normal file
@@ -0,0 +1,73 @@
|
||||
/*! @azure/msal-common v15.1.1 2025-02-05 */
|
||||
'use strict';
|
||||
import { createClientConfigurationError } from '../error/ClientConfigurationError.mjs';
|
||||
import { CodeChallengeMethodValues, PromptValue } from '../utils/Constants.mjs';
|
||||
import { redirectUriEmpty, invalidPromptValue, invalidClaims, pkceParamsMissing, invalidCodeChallengeMethod } from '../error/ClientConfigurationErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/**
|
||||
* Validates server consumable params from the "request" objects
|
||||
*/
|
||||
class RequestValidator {
|
||||
/**
|
||||
* Utility to check if the `redirectUri` in the request is a non-null value
|
||||
* @param redirectUri
|
||||
*/
|
||||
static validateRedirectUri(redirectUri) {
|
||||
if (!redirectUri) {
|
||||
throw createClientConfigurationError(redirectUriEmpty);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Utility to validate prompt sent by the user in the request
|
||||
* @param prompt
|
||||
*/
|
||||
static validatePrompt(prompt) {
|
||||
const promptValues = [];
|
||||
for (const value in PromptValue) {
|
||||
promptValues.push(PromptValue[value]);
|
||||
}
|
||||
if (promptValues.indexOf(prompt) < 0) {
|
||||
throw createClientConfigurationError(invalidPromptValue);
|
||||
}
|
||||
}
|
||||
static validateClaims(claims) {
|
||||
try {
|
||||
JSON.parse(claims);
|
||||
}
|
||||
catch (e) {
|
||||
throw createClientConfigurationError(invalidClaims);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Utility to validate code_challenge and code_challenge_method
|
||||
* @param codeChallenge
|
||||
* @param codeChallengeMethod
|
||||
*/
|
||||
static validateCodeChallengeParams(codeChallenge, codeChallengeMethod) {
|
||||
if (!codeChallenge || !codeChallengeMethod) {
|
||||
throw createClientConfigurationError(pkceParamsMissing);
|
||||
}
|
||||
else {
|
||||
this.validateCodeChallengeMethod(codeChallengeMethod);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Utility to validate code_challenge_method
|
||||
* @param codeChallengeMethod
|
||||
*/
|
||||
static validateCodeChallengeMethod(codeChallengeMethod) {
|
||||
if ([
|
||||
CodeChallengeMethodValues.PLAIN,
|
||||
CodeChallengeMethodValues.S256,
|
||||
].indexOf(codeChallengeMethod) < 0) {
|
||||
throw createClientConfigurationError(invalidCodeChallengeMethod);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
export { RequestValidator };
|
||||
//# sourceMappingURL=RequestValidator.mjs.map
|
||||
1
node_modules/@azure/msal-common/dist/request/RequestValidator.mjs.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/RequestValidator.mjs.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RequestValidator.mjs","sources":["../../src/request/RequestValidator.ts"],"sourcesContent":[null],"names":["ClientConfigurationErrorCodes.redirectUriEmpty","ClientConfigurationErrorCodes.invalidPromptValue","ClientConfigurationErrorCodes.invalidClaims","ClientConfigurationErrorCodes.pkceParamsMissing","ClientConfigurationErrorCodes.invalidCodeChallengeMethod"],"mappings":";;;;;;AAAA;;;AAGG;AAQH;;AAEG;MACU,gBAAgB,CAAA;AACzB;;;AAGG;IACH,OAAO,mBAAmB,CAAC,WAAmB,EAAA;QAC1C,IAAI,CAAC,WAAW,EAAE;AACd,YAAA,MAAM,8BAA8B,CAChCA,gBAA8C,CACjD,CAAC;AACL,SAAA;KACJ;AAED;;;AAGG;IACH,OAAO,cAAc,CAAC,MAAc,EAAA;QAChC,MAAM,YAAY,GAAG,EAAE,CAAC;AAExB,QAAA,KAAK,MAAM,KAAK,IAAI,WAAW,EAAE;YAC7B,YAAY,CAAC,IAAI,CAAC,WAAW,CAAC,KAAK,CAAC,CAAC,CAAC;AACzC,SAAA;QAED,IAAI,YAAY,CAAC,OAAO,CAAC,MAAM,CAAC,GAAG,CAAC,EAAE;AAClC,YAAA,MAAM,8BAA8B,CAChCC,kBAAgD,CACnD,CAAC;AACL,SAAA;KACJ;IAED,OAAO,cAAc,CAAC,MAAc,EAAA;QAChC,IAAI;AACA,YAAA,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC;AACtB,SAAA;AAAC,QAAA,OAAO,CAAC,EAAE;AACR,YAAA,MAAM,8BAA8B,CAChCC,aAA2C,CAC9C,CAAC;AACL,SAAA;KACJ;AAED;;;;AAIG;AACH,IAAA,OAAO,2BAA2B,CAC9B,aAAqB,EACrB,mBAA2B,EAAA;AAE3B,QAAA,IAAI,CAAC,aAAa,IAAI,CAAC,mBAAmB,EAAE;AACxC,YAAA,MAAM,8BAA8B,CAChCC,iBAA+C,CAClD,CAAC;AACL,SAAA;AAAM,aAAA;AACH,YAAA,IAAI,CAAC,2BAA2B,CAAC,mBAAmB,CAAC,CAAC;AACzD,SAAA;KACJ;AAED;;;AAGG;IACH,OAAO,2BAA2B,CAAC,mBAA2B,EAAA;QAC1D,IACI;AACI,YAAA,yBAAyB,CAAC,KAAK;AAC/B,YAAA,yBAAyB,CAAC,IAAI;AACjC,SAAA,CAAC,OAAO,CAAC,mBAAmB,CAAC,GAAG,CAAC,EACpC;AACE,YAAA,MAAM,8BAA8B,CAChCC,0BAAwD,CAC3D,CAAC;AACL,SAAA;KACJ;AACJ;;;;"}
|
||||
83
node_modules/@azure/msal-common/dist/request/ScopeSet.d.ts
generated
vendored
Normal file
83
node_modules/@azure/msal-common/dist/request/ScopeSet.d.ts
generated
vendored
Normal file
@@ -0,0 +1,83 @@
|
||||
/**
|
||||
* The ScopeSet class creates a set of scopes. Scopes are case-insensitive, unique values, so the Set object in JS makes
|
||||
* the most sense to implement for this class. All scopes are trimmed and converted to lower case strings in intersection and union functions
|
||||
* to ensure uniqueness of strings.
|
||||
*/
|
||||
export declare class ScopeSet {
|
||||
private scopes;
|
||||
constructor(inputScopes: Array<string>);
|
||||
/**
|
||||
* Factory method to create ScopeSet from space-delimited string
|
||||
* @param inputScopeString
|
||||
* @param appClientId
|
||||
* @param scopesRequired
|
||||
*/
|
||||
static fromString(inputScopeString: string): ScopeSet;
|
||||
/**
|
||||
* Creates the set of scopes to search for in cache lookups
|
||||
* @param inputScopeString
|
||||
* @returns
|
||||
*/
|
||||
static createSearchScopes(inputScopeString: Array<string>): ScopeSet;
|
||||
/**
|
||||
* Check if a given scope is present in this set of scopes.
|
||||
* @param scope
|
||||
*/
|
||||
containsScope(scope: string): boolean;
|
||||
/**
|
||||
* Check if a set of scopes is present in this set of scopes.
|
||||
* @param scopeSet
|
||||
*/
|
||||
containsScopeSet(scopeSet: ScopeSet): boolean;
|
||||
/**
|
||||
* Check if set of scopes contains only the defaults
|
||||
*/
|
||||
containsOnlyOIDCScopes(): boolean;
|
||||
/**
|
||||
* Appends single scope if passed
|
||||
* @param newScope
|
||||
*/
|
||||
appendScope(newScope: string): void;
|
||||
/**
|
||||
* Appends multiple scopes if passed
|
||||
* @param newScopes
|
||||
*/
|
||||
appendScopes(newScopes: Array<string>): void;
|
||||
/**
|
||||
* Removes element from set of scopes.
|
||||
* @param scope
|
||||
*/
|
||||
removeScope(scope: string): void;
|
||||
/**
|
||||
* Removes default scopes from set of scopes
|
||||
* Primarily used to prevent cache misses if the default scopes are not returned from the server
|
||||
*/
|
||||
removeOIDCScopes(): void;
|
||||
/**
|
||||
* Combines an array of scopes with the current set of scopes.
|
||||
* @param otherScopes
|
||||
*/
|
||||
unionScopeSets(otherScopes: ScopeSet): Set<string>;
|
||||
/**
|
||||
* Check if scopes intersect between this set and another.
|
||||
* @param otherScopes
|
||||
*/
|
||||
intersectingScopeSets(otherScopes: ScopeSet): boolean;
|
||||
/**
|
||||
* Returns size of set of scopes.
|
||||
*/
|
||||
getScopeCount(): number;
|
||||
/**
|
||||
* Returns the scopes as an array of string values
|
||||
*/
|
||||
asArray(): Array<string>;
|
||||
/**
|
||||
* Prints scopes into a space-delimited string
|
||||
*/
|
||||
printScopes(): string;
|
||||
/**
|
||||
* Prints scopes into a space-delimited lower-case string (used for caching)
|
||||
*/
|
||||
printScopesLowerCase(): string;
|
||||
}
|
||||
//# sourceMappingURL=ScopeSet.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/ScopeSet.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/ScopeSet.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ScopeSet.d.ts","sourceRoot":"","sources":["../../src/request/ScopeSet.ts"],"names":[],"mappings":"AAgBA;;;;GAIG;AACH,qBAAa,QAAQ;IAEjB,OAAO,CAAC,MAAM,CAAc;gBAEhB,WAAW,EAAE,KAAK,CAAC,MAAM,CAAC;IAoBtC;;;;;OAKG;IACH,MAAM,CAAC,UAAU,CAAC,gBAAgB,EAAE,MAAM,GAAG,QAAQ;IAMrD;;;;OAIG;IACH,MAAM,CAAC,kBAAkB,CAAC,gBAAgB,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,QAAQ;IAWpE;;;OAGG;IACH,aAAa,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO;IASrC;;;OAGG;IACH,gBAAgB,CAAC,QAAQ,EAAE,QAAQ,GAAG,OAAO;IAW7C;;OAEG;IACH,sBAAsB,IAAI,OAAO;IAWjC;;;OAGG;IACH,WAAW,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI;IAMnC;;;OAGG;IACH,YAAY,CAAC,SAAS,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,IAAI;IAU5C;;;OAGG;IACH,WAAW,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI;IAShC;;;OAGG;IACH,gBAAgB,IAAI,IAAI;IAMxB;;;OAGG;IACH,cAAc,CAAC,WAAW,EAAE,QAAQ,GAAG,GAAG,CAAC,MAAM,CAAC;IAclD;;;OAGG;IACH,qBAAqB,CAAC,WAAW,EAAE,QAAQ,GAAG,OAAO;IAkBrD;;OAEG;IACH,aAAa,IAAI,MAAM;IAIvB;;OAEG;IACH,OAAO,IAAI,KAAK,CAAC,MAAM,CAAC;IAMxB;;OAEG;IACH,WAAW,IAAI,MAAM;IAQrB;;OAEG;IACH,oBAAoB,IAAI,MAAM;CAGjC"}
|
||||
200
node_modules/@azure/msal-common/dist/request/ScopeSet.mjs
generated
vendored
Normal file
200
node_modules/@azure/msal-common/dist/request/ScopeSet.mjs
generated
vendored
Normal file
@@ -0,0 +1,200 @@
|
||||
/*! @azure/msal-common v15.1.1 2025-02-05 */
|
||||
'use strict';
|
||||
import { createClientConfigurationError } from '../error/ClientConfigurationError.mjs';
|
||||
import { StringUtils } from '../utils/StringUtils.mjs';
|
||||
import { createClientAuthError } from '../error/ClientAuthError.mjs';
|
||||
import { Constants, OIDC_SCOPES } from '../utils/Constants.mjs';
|
||||
import { emptyInputScopesError } from '../error/ClientConfigurationErrorCodes.mjs';
|
||||
import { cannotAppendScopeSet, cannotRemoveEmptyScope, emptyInputScopeSet } from '../error/ClientAuthErrorCodes.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/**
|
||||
* The ScopeSet class creates a set of scopes. Scopes are case-insensitive, unique values, so the Set object in JS makes
|
||||
* the most sense to implement for this class. All scopes are trimmed and converted to lower case strings in intersection and union functions
|
||||
* to ensure uniqueness of strings.
|
||||
*/
|
||||
class ScopeSet {
|
||||
constructor(inputScopes) {
|
||||
// Filter empty string and null/undefined array items
|
||||
const scopeArr = inputScopes
|
||||
? StringUtils.trimArrayEntries([...inputScopes])
|
||||
: [];
|
||||
const filteredInput = scopeArr
|
||||
? StringUtils.removeEmptyStringsFromArray(scopeArr)
|
||||
: [];
|
||||
// Check if scopes array has at least one member
|
||||
if (!filteredInput || !filteredInput.length) {
|
||||
throw createClientConfigurationError(emptyInputScopesError);
|
||||
}
|
||||
this.scopes = new Set(); // Iterator in constructor not supported by IE11
|
||||
filteredInput.forEach((scope) => this.scopes.add(scope));
|
||||
}
|
||||
/**
|
||||
* Factory method to create ScopeSet from space-delimited string
|
||||
* @param inputScopeString
|
||||
* @param appClientId
|
||||
* @param scopesRequired
|
||||
*/
|
||||
static fromString(inputScopeString) {
|
||||
const scopeString = inputScopeString || Constants.EMPTY_STRING;
|
||||
const inputScopes = scopeString.split(" ");
|
||||
return new ScopeSet(inputScopes);
|
||||
}
|
||||
/**
|
||||
* Creates the set of scopes to search for in cache lookups
|
||||
* @param inputScopeString
|
||||
* @returns
|
||||
*/
|
||||
static createSearchScopes(inputScopeString) {
|
||||
const scopeSet = new ScopeSet(inputScopeString);
|
||||
if (!scopeSet.containsOnlyOIDCScopes()) {
|
||||
scopeSet.removeOIDCScopes();
|
||||
}
|
||||
else {
|
||||
scopeSet.removeScope(Constants.OFFLINE_ACCESS_SCOPE);
|
||||
}
|
||||
return scopeSet;
|
||||
}
|
||||
/**
|
||||
* Check if a given scope is present in this set of scopes.
|
||||
* @param scope
|
||||
*/
|
||||
containsScope(scope) {
|
||||
const lowerCaseScopes = this.printScopesLowerCase().split(" ");
|
||||
const lowerCaseScopesSet = new ScopeSet(lowerCaseScopes);
|
||||
// compare lowercase scopes
|
||||
return scope
|
||||
? lowerCaseScopesSet.scopes.has(scope.toLowerCase())
|
||||
: false;
|
||||
}
|
||||
/**
|
||||
* Check if a set of scopes is present in this set of scopes.
|
||||
* @param scopeSet
|
||||
*/
|
||||
containsScopeSet(scopeSet) {
|
||||
if (!scopeSet || scopeSet.scopes.size <= 0) {
|
||||
return false;
|
||||
}
|
||||
return (this.scopes.size >= scopeSet.scopes.size &&
|
||||
scopeSet.asArray().every((scope) => this.containsScope(scope)));
|
||||
}
|
||||
/**
|
||||
* Check if set of scopes contains only the defaults
|
||||
*/
|
||||
containsOnlyOIDCScopes() {
|
||||
let defaultScopeCount = 0;
|
||||
OIDC_SCOPES.forEach((defaultScope) => {
|
||||
if (this.containsScope(defaultScope)) {
|
||||
defaultScopeCount += 1;
|
||||
}
|
||||
});
|
||||
return this.scopes.size === defaultScopeCount;
|
||||
}
|
||||
/**
|
||||
* Appends single scope if passed
|
||||
* @param newScope
|
||||
*/
|
||||
appendScope(newScope) {
|
||||
if (newScope) {
|
||||
this.scopes.add(newScope.trim());
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Appends multiple scopes if passed
|
||||
* @param newScopes
|
||||
*/
|
||||
appendScopes(newScopes) {
|
||||
try {
|
||||
newScopes.forEach((newScope) => this.appendScope(newScope));
|
||||
}
|
||||
catch (e) {
|
||||
throw createClientAuthError(cannotAppendScopeSet);
|
||||
}
|
||||
}
|
||||
/**
|
||||
* Removes element from set of scopes.
|
||||
* @param scope
|
||||
*/
|
||||
removeScope(scope) {
|
||||
if (!scope) {
|
||||
throw createClientAuthError(cannotRemoveEmptyScope);
|
||||
}
|
||||
this.scopes.delete(scope.trim());
|
||||
}
|
||||
/**
|
||||
* Removes default scopes from set of scopes
|
||||
* Primarily used to prevent cache misses if the default scopes are not returned from the server
|
||||
*/
|
||||
removeOIDCScopes() {
|
||||
OIDC_SCOPES.forEach((defaultScope) => {
|
||||
this.scopes.delete(defaultScope);
|
||||
});
|
||||
}
|
||||
/**
|
||||
* Combines an array of scopes with the current set of scopes.
|
||||
* @param otherScopes
|
||||
*/
|
||||
unionScopeSets(otherScopes) {
|
||||
if (!otherScopes) {
|
||||
throw createClientAuthError(emptyInputScopeSet);
|
||||
}
|
||||
const unionScopes = new Set(); // Iterator in constructor not supported in IE11
|
||||
otherScopes.scopes.forEach((scope) => unionScopes.add(scope.toLowerCase()));
|
||||
this.scopes.forEach((scope) => unionScopes.add(scope.toLowerCase()));
|
||||
return unionScopes;
|
||||
}
|
||||
/**
|
||||
* Check if scopes intersect between this set and another.
|
||||
* @param otherScopes
|
||||
*/
|
||||
intersectingScopeSets(otherScopes) {
|
||||
if (!otherScopes) {
|
||||
throw createClientAuthError(emptyInputScopeSet);
|
||||
}
|
||||
// Do not allow OIDC scopes to be the only intersecting scopes
|
||||
if (!otherScopes.containsOnlyOIDCScopes()) {
|
||||
otherScopes.removeOIDCScopes();
|
||||
}
|
||||
const unionScopes = this.unionScopeSets(otherScopes);
|
||||
const sizeOtherScopes = otherScopes.getScopeCount();
|
||||
const sizeThisScopes = this.getScopeCount();
|
||||
const sizeUnionScopes = unionScopes.size;
|
||||
return sizeUnionScopes < sizeThisScopes + sizeOtherScopes;
|
||||
}
|
||||
/**
|
||||
* Returns size of set of scopes.
|
||||
*/
|
||||
getScopeCount() {
|
||||
return this.scopes.size;
|
||||
}
|
||||
/**
|
||||
* Returns the scopes as an array of string values
|
||||
*/
|
||||
asArray() {
|
||||
const array = [];
|
||||
this.scopes.forEach((val) => array.push(val));
|
||||
return array;
|
||||
}
|
||||
/**
|
||||
* Prints scopes into a space-delimited string
|
||||
*/
|
||||
printScopes() {
|
||||
if (this.scopes) {
|
||||
const scopeArr = this.asArray();
|
||||
return scopeArr.join(" ");
|
||||
}
|
||||
return Constants.EMPTY_STRING;
|
||||
}
|
||||
/**
|
||||
* Prints scopes into a space-delimited lower-case string (used for caching)
|
||||
*/
|
||||
printScopesLowerCase() {
|
||||
return this.printScopes().toLowerCase();
|
||||
}
|
||||
}
|
||||
|
||||
export { ScopeSet };
|
||||
//# sourceMappingURL=ScopeSet.mjs.map
|
||||
1
node_modules/@azure/msal-common/dist/request/ScopeSet.mjs.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/ScopeSet.mjs.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ScopeSet.mjs","sources":["../../src/request/ScopeSet.ts"],"sourcesContent":[null],"names":["ClientConfigurationErrorCodes.emptyInputScopesError","ClientAuthErrorCodes.cannotAppendScopeSet","ClientAuthErrorCodes.cannotRemoveEmptyScope","ClientAuthErrorCodes.emptyInputScopeSet"],"mappings":";;;;;;;;;AAAA;;;AAGG;AAaH;;;;AAIG;MACU,QAAQ,CAAA;AAIjB,IAAA,WAAA,CAAY,WAA0B,EAAA;;QAElC,MAAM,QAAQ,GAAG,WAAW;cACtB,WAAW,CAAC,gBAAgB,CAAC,CAAC,GAAG,WAAW,CAAC,CAAC;cAC9C,EAAE,CAAC;QACT,MAAM,aAAa,GAAG,QAAQ;AAC1B,cAAE,WAAW,CAAC,2BAA2B,CAAC,QAAQ,CAAC;cACjD,EAAE,CAAC;;AAGT,QAAA,IAAI,CAAC,aAAa,IAAI,CAAC,aAAa,CAAC,MAAM,EAAE;AACzC,YAAA,MAAM,8BAA8B,CAChCA,qBAAmD,CACtD,CAAC;AACL,SAAA;QAED,IAAI,CAAC,MAAM,GAAG,IAAI,GAAG,EAAU,CAAC;AAChC,QAAA,aAAa,CAAC,OAAO,CAAC,CAAC,KAAK,KAAK,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC,CAAC;KAC5D;AAED;;;;;AAKG;IACH,OAAO,UAAU,CAAC,gBAAwB,EAAA;AACtC,QAAA,MAAM,WAAW,GAAG,gBAAgB,IAAI,SAAS,CAAC,YAAY,CAAC;QAC/D,MAAM,WAAW,GAAkB,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;AAC1D,QAAA,OAAO,IAAI,QAAQ,CAAC,WAAW,CAAC,CAAC;KACpC;AAED;;;;AAIG;IACH,OAAO,kBAAkB,CAAC,gBAA+B,EAAA;AACrD,QAAA,MAAM,QAAQ,GAAG,IAAI,QAAQ,CAAC,gBAAgB,CAAC,CAAC;AAChD,QAAA,IAAI,CAAC,QAAQ,CAAC,sBAAsB,EAAE,EAAE;YACpC,QAAQ,CAAC,gBAAgB,EAAE,CAAC;AAC/B,SAAA;AAAM,aAAA;AACH,YAAA,QAAQ,CAAC,WAAW,CAAC,SAAS,CAAC,oBAAoB,CAAC,CAAC;AACxD,SAAA;AAED,QAAA,OAAO,QAAQ,CAAC;KACnB;AAED;;;AAGG;AACH,IAAA,aAAa,CAAC,KAAa,EAAA;QACvB,MAAM,eAAe,GAAG,IAAI,CAAC,oBAAoB,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;AAC/D,QAAA,MAAM,kBAAkB,GAAG,IAAI,QAAQ,CAAC,eAAe,CAAC,CAAC;;AAEzD,QAAA,OAAO,KAAK;cACN,kBAAkB,CAAC,MAAM,CAAC,GAAG,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC;cAClD,KAAK,CAAC;KACf;AAED;;;AAGG;AACH,IAAA,gBAAgB,CAAC,QAAkB,EAAA;QAC/B,IAAI,CAAC,QAAQ,IAAI,QAAQ,CAAC,MAAM,CAAC,IAAI,IAAI,CAAC,EAAE;AACxC,YAAA,OAAO,KAAK,CAAC;AAChB,SAAA;QAED,QACI,IAAI,CAAC,MAAM,CAAC,IAAI,IAAI,QAAQ,CAAC,MAAM,CAAC,IAAI;AACxC,YAAA,QAAQ,CAAC,OAAO,EAAE,CAAC,KAAK,CAAC,CAAC,KAAK,KAAK,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,EAChE;KACL;AAED;;AAEG;IACH,sBAAsB,GAAA;QAClB,IAAI,iBAAiB,GAAG,CAAC,CAAC;AAC1B,QAAA,WAAW,CAAC,OAAO,CAAC,CAAC,YAAoB,KAAI;AACzC,YAAA,IAAI,IAAI,CAAC,aAAa,CAAC,YAAY,CAAC,EAAE;gBAClC,iBAAiB,IAAI,CAAC,CAAC;AAC1B,aAAA;AACL,SAAC,CAAC,CAAC;AAEH,QAAA,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,iBAAiB,CAAC;KACjD;AAED;;;AAGG;AACH,IAAA,WAAW,CAAC,QAAgB,EAAA;AACxB,QAAA,IAAI,QAAQ,EAAE;YACV,IAAI,CAAC,MAAM,CAAC,GAAG,CAAC,QAAQ,CAAC,IAAI,EAAE,CAAC,CAAC;AACpC,SAAA;KACJ;AAED;;;AAGG;AACH,IAAA,YAAY,CAAC,SAAwB,EAAA;QACjC,IAAI;AACA,YAAA,SAAS,CAAC,OAAO,CAAC,CAAC,QAAQ,KAAK,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC,CAAC;AAC/D,SAAA;AAAC,QAAA,OAAO,CAAC,EAAE;AACR,YAAA,MAAM,qBAAqB,CACvBC,oBAAyC,CAC5C,CAAC;AACL,SAAA;KACJ;AAED;;;AAGG;AACH,IAAA,WAAW,CAAC,KAAa,EAAA;QACrB,IAAI,CAAC,KAAK,EAAE;AACR,YAAA,MAAM,qBAAqB,CACvBC,sBAA2C,CAC9C,CAAC;AACL,SAAA;QACD,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,CAAC;KACpC;AAED;;;AAGG;IACH,gBAAgB,GAAA;AACZ,QAAA,WAAW,CAAC,OAAO,CAAC,CAAC,YAAoB,KAAI;AACzC,YAAA,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC;AACrC,SAAC,CAAC,CAAC;KACN;AAED;;;AAGG;AACH,IAAA,cAAc,CAAC,WAAqB,EAAA;QAChC,IAAI,CAAC,WAAW,EAAE;AACd,YAAA,MAAM,qBAAqB,CACvBC,kBAAuC,CAC1C,CAAC;AACL,SAAA;AACD,QAAA,MAAM,WAAW,GAAG,IAAI,GAAG,EAAU,CAAC;QACtC,WAAW,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,KAC7B,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CACvC,CAAC;QACF,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,KAAK,KAAK,WAAW,CAAC,GAAG,CAAC,KAAK,CAAC,WAAW,EAAE,CAAC,CAAC,CAAC;AACrE,QAAA,OAAO,WAAW,CAAC;KACtB;AAED;;;AAGG;AACH,IAAA,qBAAqB,CAAC,WAAqB,EAAA;QACvC,IAAI,CAAC,WAAW,EAAE;AACd,YAAA,MAAM,qBAAqB,CACvBA,kBAAuC,CAC1C,CAAC;AACL,SAAA;;AAGD,QAAA,IAAI,CAAC,WAAW,CAAC,sBAAsB,EAAE,EAAE;YACvC,WAAW,CAAC,gBAAgB,EAAE,CAAC;AAClC,SAAA;QACD,MAAM,WAAW,GAAG,IAAI,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;AACrD,QAAA,MAAM,eAAe,GAAG,WAAW,CAAC,aAAa,EAAE,CAAC;AACpD,QAAA,MAAM,cAAc,GAAG,IAAI,CAAC,aAAa,EAAE,CAAC;AAC5C,QAAA,MAAM,eAAe,GAAG,WAAW,CAAC,IAAI,CAAC;AACzC,QAAA,OAAO,eAAe,GAAG,cAAc,GAAG,eAAe,CAAC;KAC7D;AAED;;AAEG;IACH,aAAa,GAAA;AACT,QAAA,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC;KAC3B;AAED;;AAEG;IACH,OAAO,GAAA;QACH,MAAM,KAAK,GAAkB,EAAE,CAAC;AAChC,QAAA,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC,GAAG,KAAK,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;AAC9C,QAAA,OAAO,KAAK,CAAC;KAChB;AAED;;AAEG;IACH,WAAW,GAAA;QACP,IAAI,IAAI,CAAC,MAAM,EAAE;AACb,YAAA,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,EAAE,CAAC;AAChC,YAAA,OAAO,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;AAC7B,SAAA;QACD,OAAO,SAAS,CAAC,YAAY,CAAC;KACjC;AAED;;AAEG;IACH,oBAAoB,GAAA;AAChB,QAAA,OAAO,IAAI,CAAC,WAAW,EAAE,CAAC,WAAW,EAAE,CAAC;KAC3C;AACJ;;;;"}
|
||||
9
node_modules/@azure/msal-common/dist/request/StoreInCache.d.ts
generated
vendored
Normal file
9
node_modules/@azure/msal-common/dist/request/StoreInCache.d.ts
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
/**
|
||||
* Controls whether tokens should be stored in the cache or not. If set to false, tokens may still be acquired and returned but will not be cached for later retrieval.
|
||||
*/
|
||||
export type StoreInCache = {
|
||||
accessToken?: boolean;
|
||||
idToken?: boolean;
|
||||
refreshToken?: boolean;
|
||||
};
|
||||
//# sourceMappingURL=StoreInCache.d.ts.map
|
||||
1
node_modules/@azure/msal-common/dist/request/StoreInCache.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-common/dist/request/StoreInCache.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"StoreInCache.d.ts","sourceRoot":"","sources":["../../src/request/StoreInCache.ts"],"names":[],"mappings":"AAKA;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG;IAEvB,WAAW,CAAC,EAAE,OAAO,CAAC;IAEtB,OAAO,CAAC,EAAE,OAAO,CAAC;IAElB,YAAY,CAAC,EAAE,OAAO,CAAC;CAC1B,CAAC"}
|
||||
Reference in New Issue
Block a user