Commit iniziale
This commit is contained in:
9
node_modules/@azure/msal-browser/dist/request/AuthorizationCodeRequest.d.ts
generated
vendored
Normal file
9
node_modules/@azure/msal-browser/dist/request/AuthorizationCodeRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
import { CommonAuthorizationCodeRequest } from "@azure/msal-common/browser";
|
||||
export type AuthorizationCodeRequest = Partial<Omit<CommonAuthorizationCodeRequest, "code" | "enableSpaAuthorizationCode" | "requestedClaimsHash">> & {
|
||||
code?: string;
|
||||
nativeAccountId?: string;
|
||||
cloudGraphHostName?: string;
|
||||
msGraphHost?: string;
|
||||
cloudInstanceHostName?: string;
|
||||
};
|
||||
//# sourceMappingURL=AuthorizationCodeRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/AuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/AuthorizationCodeRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthorizationCodeRequest.d.ts","sourceRoot":"","sources":["../../src/request/AuthorizationCodeRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,8BAA8B,EAAE,MAAM,4BAA4B,CAAC;AAE5E,MAAM,MAAM,wBAAwB,GAAG,OAAO,CAC1C,IAAI,CACA,8BAA8B,EAC9B,MAAM,GAAG,4BAA4B,GAAG,qBAAqB,CAChE,CACJ,GAAG;IACA,IAAI,CAAC,EAAE,MAAM,CAAC;IACd,eAAe,CAAC,EAAE,MAAM,CAAC;IACzB,kBAAkB,CAAC,EAAE,MAAM,CAAC;IAC5B,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,qBAAqB,CAAC,EAAE,MAAM,CAAC;CAClC,CAAC"}
|
||||
9
node_modules/@azure/msal-browser/dist/request/AuthorizationUrlRequest.d.ts
generated
vendored
Normal file
9
node_modules/@azure/msal-browser/dist/request/AuthorizationUrlRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
import { CommonAuthorizationUrlRequest } from "@azure/msal-common/browser";
|
||||
/**
|
||||
* This type is deprecated and will be removed on the next major version update
|
||||
*/
|
||||
export type AuthorizationUrlRequest = Omit<CommonAuthorizationUrlRequest, "state" | "nonce" | "requestedClaimsHash" | "platformBroker"> & {
|
||||
state: string;
|
||||
nonce: string;
|
||||
};
|
||||
//# sourceMappingURL=AuthorizationUrlRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/AuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/AuthorizationUrlRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"AuthorizationUrlRequest.d.ts","sourceRoot":"","sources":["../../src/request/AuthorizationUrlRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,6BAA6B,EAAE,MAAM,4BAA4B,CAAC;AAE3E;;GAEG;AACH,MAAM,MAAM,uBAAuB,GAAG,IAAI,CACtC,6BAA6B,EAC7B,OAAO,GAAG,OAAO,GAAG,qBAAqB,GAAG,gBAAgB,CAC/D,GAAG;IACA,KAAK,EAAE,MAAM,CAAC;IACd,KAAK,EAAE,MAAM,CAAC;CACjB,CAAC"}
|
||||
11
node_modules/@azure/msal-browser/dist/request/ClearCacheRequest.d.ts
generated
vendored
Normal file
11
node_modules/@azure/msal-browser/dist/request/ClearCacheRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,11 @@
|
||||
import { AccountInfo } from "@azure/msal-common/browser";
|
||||
/**
|
||||
* ClearCacheRequest
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - account - Account object that will be logged out of. All tokens tied to this account will be cleared.
|
||||
*/
|
||||
export type ClearCacheRequest = {
|
||||
correlationId?: string;
|
||||
account?: AccountInfo | null;
|
||||
};
|
||||
//# sourceMappingURL=ClearCacheRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/ClearCacheRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/ClearCacheRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"ClearCacheRequest.d.ts","sourceRoot":"","sources":["../../src/request/ClearCacheRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,WAAW,EAAE,MAAM,4BAA4B,CAAC;AAEzD;;;;GAIG;AACH,MAAM,MAAM,iBAAiB,GAAG;IAC5B,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,OAAO,CAAC,EAAE,WAAW,GAAG,IAAI,CAAC;CAChC,CAAC"}
|
||||
21
node_modules/@azure/msal-browser/dist/request/EndSessionPopupRequest.d.ts
generated
vendored
Normal file
21
node_modules/@azure/msal-browser/dist/request/EndSessionPopupRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,21 @@
|
||||
import { CommonEndSessionRequest } from "@azure/msal-common/browser";
|
||||
import { PopupWindowAttributes } from "./PopupWindowAttributes.js";
|
||||
/**
|
||||
* EndSessionPopupRequest
|
||||
* - account - Account object that will be logged out of. All tokens tied to this account will be cleared.
|
||||
* - postLogoutRedirectUri - URI to navigate to after logout page inside the popup. Required to ensure popup can be closed.
|
||||
* - authority - Authority to send logout request to.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - idTokenHint - ID Token used by B2C to validate logout if required by the policy
|
||||
* - mainWindowRedirectUri - URI to navigate the main window to after logout is complete
|
||||
* - popupWindowAttributes - Optional popup window attributes. popupSize with height and width, and popupPosition with top and left can be set.
|
||||
* - logoutHint - A string that specifies the account that is being logged out in order to skip the server account picker on logout
|
||||
* - popupWindowParent - Optional window object to use as the parent when opening popup windows. Uses global `window` if not given.
|
||||
*/
|
||||
export type EndSessionPopupRequest = Partial<Omit<CommonEndSessionRequest, "tokenQueryParameters">> & {
|
||||
authority?: string;
|
||||
mainWindowRedirectUri?: string;
|
||||
popupWindowAttributes?: PopupWindowAttributes;
|
||||
popupWindowParent?: Window;
|
||||
};
|
||||
//# sourceMappingURL=EndSessionPopupRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/EndSessionPopupRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/EndSessionPopupRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"EndSessionPopupRequest.d.ts","sourceRoot":"","sources":["../../src/request/EndSessionPopupRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,uBAAuB,EAAE,MAAM,4BAA4B,CAAC;AACrE,OAAO,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAEnE;;;;;;;;;;;GAWG;AACH,MAAM,MAAM,sBAAsB,GAAG,OAAO,CACxC,IAAI,CAAC,uBAAuB,EAAE,sBAAsB,CAAC,CACxD,GAAG;IACA,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,qBAAqB,CAAC,EAAE,MAAM,CAAC;IAC/B,qBAAqB,CAAC,EAAE,qBAAqB,CAAC;IAC9C,iBAAiB,CAAC,EAAE,MAAM,CAAC;CAC9B,CAAC"}
|
||||
16
node_modules/@azure/msal-browser/dist/request/EndSessionRequest.d.ts
generated
vendored
Normal file
16
node_modules/@azure/msal-browser/dist/request/EndSessionRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
import { CommonEndSessionRequest } from "@azure/msal-common/browser";
|
||||
/**
|
||||
* EndSessionRequest
|
||||
* - account - Account object that will be logged out of. All tokens tied to this account will be cleared.
|
||||
* - postLogoutRedirectUri - URI to navigate to after logout page.
|
||||
* - authority - Authority to send logout request to.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - idTokenHint - ID Token used by B2C to validate logout if required by the policy
|
||||
* - onRedirectNavigate - Callback that will be passed the url that MSAL will navigate to. Returning false in the callback will stop navigation.
|
||||
* - logoutHint - A string that specifies the account that is being logged out in order to skip the server account picker on logout
|
||||
*/
|
||||
export type EndSessionRequest = Partial<Omit<CommonEndSessionRequest, "tokenQueryParameters">> & {
|
||||
authority?: string;
|
||||
onRedirectNavigate?: (url: string) => boolean | void;
|
||||
};
|
||||
//# sourceMappingURL=EndSessionRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/EndSessionRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/EndSessionRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"EndSessionRequest.d.ts","sourceRoot":"","sources":["../../src/request/EndSessionRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,uBAAuB,EAAE,MAAM,4BAA4B,CAAC;AAErE;;;;;;;;;GASG;AACH,MAAM,MAAM,iBAAiB,GAAG,OAAO,CACnC,IAAI,CAAC,uBAAuB,EAAE,sBAAsB,CAAC,CACxD,GAAG;IACA,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,kBAAkB,CAAC,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,GAAG,IAAI,CAAC;CACxD,CAAC"}
|
||||
9
node_modules/@azure/msal-browser/dist/request/InitializeApplicationRequest.d.ts
generated
vendored
Normal file
9
node_modules/@azure/msal-browser/dist/request/InitializeApplicationRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,9 @@
|
||||
/**
|
||||
* InitializeApplicationRequest: Request object passed by user to initialize application
|
||||
*
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
*/
|
||||
export type InitializeApplicationRequest = {
|
||||
correlationId?: string;
|
||||
};
|
||||
//# sourceMappingURL=InitializeApplicationRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/InitializeApplicationRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/InitializeApplicationRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"InitializeApplicationRequest.d.ts","sourceRoot":"","sources":["../../src/request/InitializeApplicationRequest.ts"],"names":[],"mappings":"AAKA;;;;GAIG;AACH,MAAM,MAAM,4BAA4B,GAAG;IACvC,aAAa,CAAC,EAAE,MAAM,CAAC;CAC1B,CAAC"}
|
||||
37
node_modules/@azure/msal-browser/dist/request/PopupRequest.d.ts
generated
vendored
Normal file
37
node_modules/@azure/msal-browser/dist/request/PopupRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,37 @@
|
||||
import { CommonAuthorizationUrlRequest, StringDict } from "@azure/msal-common/browser";
|
||||
import { PopupWindowAttributes } from "./PopupWindowAttributes.js";
|
||||
/**
|
||||
* PopupRequest: Request object passed by user to retrieve a Code from the
|
||||
* server (first leg of authorization code grant flow) with a popup window.
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal.
|
||||
* - extraScopesToConsent - Scopes for a different resource when the user needs consent upfront.
|
||||
* - state - A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for preventing cross site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* login: will force the user to enter their credentials on that request, negating single-sign on
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* consent: will the trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app
|
||||
* select_account: will interrupt single sign-=on providing account selection experience listing all the accounts in session or any remembered accounts or an option to choose to use a different account
|
||||
* create: will direct the user to the account creation experience instead of the log in experience
|
||||
* no_session: will not read existing session token when authenticating the user. Upon user being successfully authenticated, EVO won’t create a new session for the user. FOR INTERNAL USE ONLY.
|
||||
* - loginHint - Can be used to pre-fill the username/email address field of the sign-in page for the user, if you know the username/email address ahead of time. Often apps use this parameter during re-authentication, having already extracted the username from a previous sign-in using the login_hint or preferred_username claim.
|
||||
* - sid - Session ID, unique identifier for the session. Available as an optional claim on ID tokens.
|
||||
* - domainHint - Provides a hint about the tenant or domain that the user should use to sign in. The value of the domain hint is a registered domain for the tenant.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
* - tokenBodyParameters - String to string map of custom token request body parameters added to the /token call. Only used when renewing access tokens.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - claims - In cases where Azure AD tenant admin has enabled conditional access policies, and the policy has not been met, exceptions will contain claims that need to be consented to.
|
||||
* - nonce - A value included in the request that is returned in the id token. A randomly generated unique value is typically used to mitigate replay attacks.
|
||||
* - popupWindowAttributes - Optional popup window attributes. popupSize with height and width, and popupPosition with top and left can be set.
|
||||
* - popupWindowParent - Optional window object to use as the parent when opening popup windows. Uses global `window` if not given.
|
||||
*/
|
||||
export type PopupRequest = Partial<Omit<CommonAuthorizationUrlRequest, "responseMode" | "scopes" | "codeChallenge" | "codeChallengeMethod" | "requestedClaimsHash" | "platformBroker">> & {
|
||||
scopes: Array<string>;
|
||||
popupWindowAttributes?: PopupWindowAttributes;
|
||||
tokenBodyParameters?: StringDict;
|
||||
popupWindowParent?: Window;
|
||||
};
|
||||
//# sourceMappingURL=PopupRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/PopupRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/PopupRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"PopupRequest.d.ts","sourceRoot":"","sources":["../../src/request/PopupRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,6BAA6B,EAC7B,UAAU,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,qBAAqB,EAAE,MAAM,4BAA4B,CAAC;AAEnE;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AAEH,MAAM,MAAM,YAAY,GAAG,OAAO,CAC9B,IAAI,CACA,6BAA6B,EAC3B,cAAc,GACd,QAAQ,GACR,eAAe,GACf,qBAAqB,GACrB,qBAAqB,GACrB,gBAAgB,CACrB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,qBAAqB,CAAC,EAAE,qBAAqB,CAAC;IAC9C,mBAAmB,CAAC,EAAE,UAAU,CAAC;IACjC,iBAAiB,CAAC,EAAE,MAAM,CAAC;CAC9B,CAAC"}
|
||||
16
node_modules/@azure/msal-browser/dist/request/PopupWindowAttributes.d.ts
generated
vendored
Normal file
16
node_modules/@azure/msal-browser/dist/request/PopupWindowAttributes.d.ts
generated
vendored
Normal file
@@ -0,0 +1,16 @@
|
||||
/**
|
||||
* Popup configurations for setting dimensions and position of popup window
|
||||
*/
|
||||
export type PopupWindowAttributes = {
|
||||
popupSize?: PopupSize;
|
||||
popupPosition?: PopupPosition;
|
||||
};
|
||||
export type PopupSize = {
|
||||
height: number;
|
||||
width: number;
|
||||
};
|
||||
export type PopupPosition = {
|
||||
top: number;
|
||||
left: number;
|
||||
};
|
||||
//# sourceMappingURL=PopupWindowAttributes.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/PopupWindowAttributes.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/PopupWindowAttributes.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"PopupWindowAttributes.d.ts","sourceRoot":"","sources":["../../src/request/PopupWindowAttributes.ts"],"names":[],"mappings":"AAKA;;GAEG;AACH,MAAM,MAAM,qBAAqB,GAAG;IAChC,SAAS,CAAC,EAAE,SAAS,CAAC;IACtB,aAAa,CAAC,EAAE,aAAa,CAAC;CACjC,CAAC;AAEF,MAAM,MAAM,SAAS,GAAG;IACpB,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF,MAAM,MAAM,aAAa,GAAG;IACxB,GAAG,EAAE,MAAM,CAAC;IACZ,IAAI,EAAE,MAAM,CAAC;CAChB,CAAC"}
|
||||
41
node_modules/@azure/msal-browser/dist/request/RedirectRequest.d.ts
generated
vendored
Normal file
41
node_modules/@azure/msal-browser/dist/request/RedirectRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,41 @@
|
||||
import { CommonAuthorizationUrlRequest, StringDict } from "@azure/msal-common/browser";
|
||||
/**
|
||||
* RedirectRequest: Request object passed by user to retrieve a Code from the
|
||||
* server (first leg of authorization code grant flow) with a full page redirect.
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal.
|
||||
* - extraScopesToConsent - Scopes for a different resource when the user needs consent upfront.
|
||||
* - state - A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for preventing cross site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* login: will force the user to enter their credentials on that request, negating single-sign on
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* consent: will the trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app
|
||||
* select_account: will interrupt single sign-=on providing account selection experience listing all the accounts in session or any remembered accounts or an option to choose to use a different account
|
||||
* create: will direct the user to the account creation experience instead of the log in experience
|
||||
* no_session: will not read existing session token when authenticating the user. Upon user being successfully authenticated, EVO won’t create a new session for the user. FOR INTERNAL USE ONLY.
|
||||
* - loginHint - Can be used to pre-fill the username/email address field of the sign-in page for the user, if you know the username/email address ahead of time. Often apps use this parameter during re-authentication, having already extracted the username from a previous sign-in using the login_hint or preferred_username claim.
|
||||
* - sid - Session ID, unique identifier for the session. Available as an optional claim on ID tokens.
|
||||
* - domainHint - Provides a hint about the tenant or domain that the user should use to sign in. The value of the domain hint is a registered domain for the tenant.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
* - tokenBodyParameters - String to string map of custom token request body parameters added to the /token call. Only used when renewing access tokens.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - claims - In cases where Azure AD tenant admin has enabled conditional access policies, and the policy has not been met, exceptions will contain claims that need to be consented to.
|
||||
* - nonce - A value included in the request that is returned in the id token. A randomly generated unique value is typically used to mitigate replay attacks.
|
||||
* - redirectStartPage - The page that should be returned to after loginRedirect or acquireTokenRedirect. This should only be used if this is different from the redirectUri and will default to the page that initiates the request. When the navigateToLoginRequestUrl config option is set to false this parameter will be ignored.
|
||||
* - onRedirectNavigate - Callback that will be passed the url that MSAL will navigate to. Returning false in the callback will stop navigation.
|
||||
*/
|
||||
export type RedirectRequest = Partial<Omit<CommonAuthorizationUrlRequest, "responseMode" | "scopes" | "codeChallenge" | "codeChallengeMethod" | "requestedClaimsHash" | "platformBroker">> & {
|
||||
scopes: Array<string>;
|
||||
redirectStartPage?: string;
|
||||
/**
|
||||
* @deprecated
|
||||
* onRedirectNavigate is deprecated and will be removed in the next major version.
|
||||
* Set onRedirectNavigate in Configuration instead.
|
||||
*/
|
||||
onRedirectNavigate?: (url: string) => boolean | void;
|
||||
tokenBodyParameters?: StringDict;
|
||||
};
|
||||
//# sourceMappingURL=RedirectRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/RedirectRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/RedirectRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RedirectRequest.d.ts","sourceRoot":"","sources":["../../src/request/RedirectRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,6BAA6B,EAC7B,UAAU,EACb,MAAM,4BAA4B,CAAC;AAEpC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAM,MAAM,eAAe,GAAG,OAAO,CACjC,IAAI,CACA,6BAA6B,EAC3B,cAAc,GACd,QAAQ,GACR,eAAe,GACf,qBAAqB,GACrB,qBAAqB,GACrB,gBAAgB,CACrB,CACJ,GAAG;IACA,MAAM,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;IACtB,iBAAiB,CAAC,EAAE,MAAM,CAAC;IAC3B;;;;OAIG;IACH,kBAAkB,CAAC,EAAE,CAAC,GAAG,EAAE,MAAM,KAAK,OAAO,GAAG,IAAI,CAAC;IACrD,mBAAmB,CAAC,EAAE,UAAU,CAAC;CACpC,CAAC"}
|
||||
14
node_modules/@azure/msal-browser/dist/request/RequestHelpers.d.ts
generated
vendored
Normal file
14
node_modules/@azure/msal-browser/dist/request/RequestHelpers.d.ts
generated
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
import { AccountInfo, BaseAuthRequest, CommonSilentFlowRequest, IPerformanceClient, Logger } from "@azure/msal-common/browser";
|
||||
import { BrowserConfiguration } from "../config/Configuration.js";
|
||||
import { SilentRequest } from "./SilentRequest.js";
|
||||
/**
|
||||
* Initializer function for all request APIs
|
||||
* @param request
|
||||
*/
|
||||
export declare function initializeBaseRequest(request: Partial<BaseAuthRequest> & {
|
||||
correlationId: string;
|
||||
}, config: BrowserConfiguration, performanceClient: IPerformanceClient, logger: Logger): Promise<BaseAuthRequest>;
|
||||
export declare function initializeSilentRequest(request: SilentRequest & {
|
||||
correlationId: string;
|
||||
}, account: AccountInfo, config: BrowserConfiguration, performanceClient: IPerformanceClient, logger: Logger): Promise<CommonSilentFlowRequest>;
|
||||
//# sourceMappingURL=RequestHelpers.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/RequestHelpers.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/RequestHelpers.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RequestHelpers.d.ts","sourceRoot":"","sources":["../../src/request/RequestHelpers.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,WAAW,EAEX,eAAe,EAEf,uBAAuB,EACvB,kBAAkB,EAClB,MAAM,EAKT,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,oBAAoB,EAAE,MAAM,4BAA4B,CAAC;AAClE,OAAO,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAGnD;;;GAGG;AACH,wBAAsB,qBAAqB,CACvC,OAAO,EAAE,OAAO,CAAC,eAAe,CAAC,GAAG;IAAE,aAAa,EAAE,MAAM,CAAA;CAAE,EAC7D,MAAM,EAAE,oBAAoB,EAC5B,iBAAiB,EAAE,kBAAkB,EACrC,MAAM,EAAE,MAAM,GACf,OAAO,CAAC,eAAe,CAAC,CAqD1B;AAED,wBAAsB,uBAAuB,CACzC,OAAO,EAAE,aAAa,GAAG;IAAE,aAAa,EAAE,MAAM,CAAA;CAAE,EAClD,OAAO,EAAE,WAAW,EACpB,MAAM,EAAE,oBAAoB,EAC5B,iBAAiB,EAAE,kBAAkB,EACrC,MAAM,EAAE,MAAM,GACf,OAAO,CAAC,uBAAuB,CAAC,CAmBlC"}
|
||||
61
node_modules/@azure/msal-browser/dist/request/RequestHelpers.mjs
generated
vendored
Normal file
61
node_modules/@azure/msal-browser/dist/request/RequestHelpers.mjs
generated
vendored
Normal file
@@ -0,0 +1,61 @@
|
||||
/*! @azure/msal-browser v4.2.1 2025-02-11 */
|
||||
'use strict';
|
||||
import { PerformanceEvents, invokeAsync, AuthenticationScheme, createClientConfigurationError, ClientConfigurationErrorCodes, StringUtils } from '@azure/msal-common/browser';
|
||||
import { hashString } from '../crypto/BrowserCrypto.mjs';
|
||||
|
||||
/*
|
||||
* Copyright (c) Microsoft Corporation. All rights reserved.
|
||||
* Licensed under the MIT License.
|
||||
*/
|
||||
/**
|
||||
* Initializer function for all request APIs
|
||||
* @param request
|
||||
*/
|
||||
async function initializeBaseRequest(request, config, performanceClient, logger) {
|
||||
performanceClient.addQueueMeasurement(PerformanceEvents.InitializeBaseRequest, request.correlationId);
|
||||
const authority = request.authority || config.auth.authority;
|
||||
const scopes = [...((request && request.scopes) || [])];
|
||||
const validatedRequest = {
|
||||
...request,
|
||||
correlationId: request.correlationId,
|
||||
authority,
|
||||
scopes,
|
||||
};
|
||||
// Set authenticationScheme to BEARER if not explicitly set in the request
|
||||
if (!validatedRequest.authenticationScheme) {
|
||||
validatedRequest.authenticationScheme = AuthenticationScheme.BEARER;
|
||||
logger.verbose('Authentication Scheme wasn\'t explicitly set in request, defaulting to "Bearer" request');
|
||||
}
|
||||
else {
|
||||
if (validatedRequest.authenticationScheme === AuthenticationScheme.SSH) {
|
||||
if (!request.sshJwk) {
|
||||
throw createClientConfigurationError(ClientConfigurationErrorCodes.missingSshJwk);
|
||||
}
|
||||
if (!request.sshKid) {
|
||||
throw createClientConfigurationError(ClientConfigurationErrorCodes.missingSshKid);
|
||||
}
|
||||
}
|
||||
logger.verbose(`Authentication Scheme set to "${validatedRequest.authenticationScheme}" as configured in Auth request`);
|
||||
}
|
||||
// Set requested claims hash if claims-based caching is enabled and claims were requested
|
||||
if (config.cache.claimsBasedCachingEnabled &&
|
||||
request.claims &&
|
||||
// Checks for empty stringified object "{}" which doesn't qualify as requested claims
|
||||
!StringUtils.isEmptyObj(request.claims)) {
|
||||
validatedRequest.requestedClaimsHash = await hashString(request.claims);
|
||||
}
|
||||
return validatedRequest;
|
||||
}
|
||||
async function initializeSilentRequest(request, account, config, performanceClient, logger) {
|
||||
performanceClient.addQueueMeasurement(PerformanceEvents.InitializeSilentRequest, request.correlationId);
|
||||
const baseRequest = await invokeAsync(initializeBaseRequest, PerformanceEvents.InitializeBaseRequest, logger, performanceClient, request.correlationId)(request, config, performanceClient, logger);
|
||||
return {
|
||||
...request,
|
||||
...baseRequest,
|
||||
account: account,
|
||||
forceRefresh: request.forceRefresh || false,
|
||||
};
|
||||
}
|
||||
|
||||
export { initializeBaseRequest, initializeSilentRequest };
|
||||
//# sourceMappingURL=RequestHelpers.mjs.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/RequestHelpers.mjs.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/RequestHelpers.mjs.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"RequestHelpers.mjs","sources":["../../src/request/RequestHelpers.ts"],"sourcesContent":[null],"names":[],"mappings":";;;;;AAAA;;;AAGG;AAmBH;;;AAGG;AACI,eAAe,qBAAqB,CACvC,OAA6D,EAC7D,MAA4B,EAC5B,iBAAqC,EACrC,MAAc,EAAA;IAEd,iBAAiB,CAAC,mBAAmB,CACjC,iBAAiB,CAAC,qBAAqB,EACvC,OAAO,CAAC,aAAa,CACxB,CAAC;IACF,MAAM,SAAS,GAAG,OAAO,CAAC,SAAS,IAAI,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC;AAE7D,IAAA,MAAM,MAAM,GAAG,CAAC,IAAI,CAAC,OAAO,IAAI,OAAO,CAAC,MAAM,KAAK,EAAE,CAAC,CAAC,CAAC;AAExD,IAAA,MAAM,gBAAgB,GAAoB;AACtC,QAAA,GAAG,OAAO;QACV,aAAa,EAAE,OAAO,CAAC,aAAa;QACpC,SAAS;QACT,MAAM;KACT,CAAC;;AAGF,IAAA,IAAI,CAAC,gBAAgB,CAAC,oBAAoB,EAAE;AACxC,QAAA,gBAAgB,CAAC,oBAAoB,GAAG,oBAAoB,CAAC,MAAM,CAAC;AACpE,QAAA,MAAM,CAAC,OAAO,CACV,yFAAyF,CAC5F,CAAC;AACL,KAAA;AAAM,SAAA;AACH,QAAA,IACI,gBAAgB,CAAC,oBAAoB,KAAK,oBAAoB,CAAC,GAAG,EACpE;AACE,YAAA,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE;AACjB,gBAAA,MAAM,8BAA8B,CAChC,6BAA6B,CAAC,aAAa,CAC9C,CAAC;AACL,aAAA;AACD,YAAA,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE;AACjB,gBAAA,MAAM,8BAA8B,CAChC,6BAA6B,CAAC,aAAa,CAC9C,CAAC;AACL,aAAA;AACJ,SAAA;QACD,MAAM,CAAC,OAAO,CACV,CAAA,8BAAA,EAAiC,gBAAgB,CAAC,oBAAoB,CAAiC,+BAAA,CAAA,CAC1G,CAAC;AACL,KAAA;;AAGD,IAAA,IACI,MAAM,CAAC,KAAK,CAAC,yBAAyB;AACtC,QAAA,OAAO,CAAC,MAAM;;QAEd,CAAC,WAAW,CAAC,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,EACzC;QACE,gBAAgB,CAAC,mBAAmB,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;AAC3E,KAAA;AAED,IAAA,OAAO,gBAAgB,CAAC;AAC5B,CAAC;AAEM,eAAe,uBAAuB,CACzC,OAAkD,EAClD,OAAoB,EACpB,MAA4B,EAC5B,iBAAqC,EACrC,MAAc,EAAA;IAEd,iBAAiB,CAAC,mBAAmB,CACjC,iBAAiB,CAAC,uBAAuB,EACzC,OAAO,CAAC,aAAa,CACxB,CAAC;AAEF,IAAA,MAAM,WAAW,GAAG,MAAM,WAAW,CACjC,qBAAqB,EACrB,iBAAiB,CAAC,qBAAqB,EACvC,MAAM,EACN,iBAAiB,EACjB,OAAO,CAAC,aAAa,CACxB,CAAC,OAAO,EAAE,MAAM,EAAE,iBAAiB,EAAE,MAAM,CAAC,CAAC;IAC9C,OAAO;AACH,QAAA,GAAG,OAAO;AACV,QAAA,GAAG,WAAW;AACd,QAAA,OAAO,EAAE,OAAO;AAChB,QAAA,YAAY,EAAE,OAAO,CAAC,YAAY,IAAI,KAAK;KAC9C,CAAC;AACN;;;;"}
|
||||
34
node_modules/@azure/msal-browser/dist/request/SilentRequest.d.ts
generated
vendored
Normal file
34
node_modules/@azure/msal-browser/dist/request/SilentRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,34 @@
|
||||
import { AccountInfo, CommonSilentFlowRequest, StringDict } from "@azure/msal-common/browser";
|
||||
import { CacheLookupPolicy } from "../utils/BrowserConstants.js";
|
||||
/**
|
||||
* SilentRequest: Request object passed by user to retrieve tokens from the
|
||||
* cache, renew an expired token with a refresh token, or retrieve a code (first leg of authorization code grant flow)
|
||||
* in a hidden iframe.
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to.
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - account - Account entity to lookup the credentials.
|
||||
* - forceRefresh - Forces silent requests to make network calls if true.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call. Only used when renewing the refresh token.
|
||||
* - tokenBodyParameters - String to string map of custom token request body parameters added to the /token call. Only used when renewing access tokens.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call. Only used when renewing access tokens.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal. Only used for cases where refresh token is expired.
|
||||
* - cacheLookupPolicy - Enum of different ways the silent token can be retrieved.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* no_session: will not read existing session token when authenticating the user. Upon user being successfully authenticated, EVO won’t create a new session for the user. FOR INTERNAL USE ONLY.
|
||||
*/
|
||||
export type SilentRequest = Omit<CommonSilentFlowRequest, "authority" | "correlationId" | "forceRefresh" | "account" | "requestedClaimsHash"> & {
|
||||
redirectUri?: string;
|
||||
extraQueryParameters?: StringDict;
|
||||
authority?: string;
|
||||
account?: AccountInfo;
|
||||
correlationId?: string;
|
||||
forceRefresh?: boolean;
|
||||
cacheLookupPolicy?: CacheLookupPolicy;
|
||||
prompt?: string;
|
||||
state?: string;
|
||||
tokenBodyParameters?: StringDict;
|
||||
};
|
||||
//# sourceMappingURL=SilentRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/SilentRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/SilentRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"SilentRequest.d.ts","sourceRoot":"","sources":["../../src/request/SilentRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,WAAW,EACX,uBAAuB,EACvB,UAAU,EACb,MAAM,4BAA4B,CAAC;AACpC,OAAO,EAAE,iBAAiB,EAAE,MAAM,8BAA8B,CAAC;AAEjE;;;;;;;;;;;;;;;;;;GAkBG;AACH,MAAM,MAAM,aAAa,GAAG,IAAI,CAC5B,uBAAuB,EACrB,WAAW,GACX,eAAe,GACf,cAAc,GACd,SAAS,GACT,qBAAqB,CAC1B,GAAG;IACA,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,oBAAoB,CAAC,EAAE,UAAU,CAAC;IAClC,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,OAAO,CAAC,EAAE,WAAW,CAAC;IACtB,aAAa,CAAC,EAAE,MAAM,CAAC;IACvB,YAAY,CAAC,EAAE,OAAO,CAAC;IACvB,iBAAiB,CAAC,EAAE,iBAAiB,CAAC;IACtC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,mBAAmB,CAAC,EAAE,UAAU,CAAC;CACpC,CAAC"}
|
||||
30
node_modules/@azure/msal-browser/dist/request/SsoSilentRequest.d.ts
generated
vendored
Normal file
30
node_modules/@azure/msal-browser/dist/request/SsoSilentRequest.d.ts
generated
vendored
Normal file
@@ -0,0 +1,30 @@
|
||||
import { CommonAuthorizationUrlRequest, StringDict } from "@azure/msal-common/browser";
|
||||
/**
|
||||
* Request object passed by user to ssoSilent to retrieve a Code from the server (first leg of authorization code grant flow)
|
||||
*
|
||||
* - scopes - Array of scopes the application is requesting access to (optional for ssoSilent calls)
|
||||
* - claims - A stringified claims request which will be added to all /authorize and /token calls
|
||||
* - authority - Url of the authority which the application acquires tokens from.
|
||||
* - correlationId - Unique GUID set per request to trace a request end-to-end for telemetry purposes.
|
||||
* - redirectUri - The redirect URI where authentication responses can be received by your application. It must exactly match one of the redirect URIs registered in the Azure portal.
|
||||
* - extraScopesToConsent - Scopes for a different resource when the user needs consent upfront.
|
||||
* - state - A value included in the request that is also returned in the token response. A randomly generated unique value is typically used for preventing cross site request forgery attacks. The state is also used to encode information about the user's state in the app before the authentication request occurred.
|
||||
* - prompt - Indicates the type of user interaction that is required.
|
||||
* login: will force the user to enter their credentials on that request, negating single-sign on
|
||||
* none: will ensure that the user isn't presented with any interactive prompt. if request can't be completed via single-sign on, the endpoint will return an interaction_required error
|
||||
* consent: will trigger the OAuth consent dialog after the user signs in, asking the user to grant permissions to the app
|
||||
* select_account: will interrupt single sign-=on providing account selection experience listing all the accounts in session or any remembered accounts or an option to choose to use a different account
|
||||
* create: will direct the user to the account creation experience instead of the log in experience
|
||||
* no_session: will not read existing session token when authenticating the user. Upon user being successfully authenticated, EVO won’t create a new session for the user. FOR INTERNAL USE ONLY.
|
||||
* - loginHint - Can be used to pre-fill the username/email address field of the sign-in page for the user, if you know the username/email address ahead of time. Often apps use this parameter during re-authentication, having already extracted the username from a previous sign-in using the login_hint or preferred_username claim.
|
||||
* - sid - Session ID, unique identifier for the session. Available as an optional claim on ID tokens.
|
||||
* - domainHint - Provides a hint about the tenant or domain that the user should use to sign in. The value of the domain hint is a registered domain for the tenant.
|
||||
* - extraQueryParameters - String to string map of custom query parameters added to the /authorize call
|
||||
* - tokenBodyParameters - String to string map of custom token request body parameters added to the /token call. Only used when renewing access tokens.
|
||||
* - tokenQueryParameters - String to string map of custom query parameters added to the /token call
|
||||
* - nonce - A value included in the request that is returned in the id token. A randomly generated unique value is typically used to mitigate replay attacks.
|
||||
*/
|
||||
export type SsoSilentRequest = Partial<Omit<CommonAuthorizationUrlRequest, "responseMode" | "codeChallenge" | "codeChallengeMethod" | "requestedClaimsHash" | "platformBroker">> & {
|
||||
tokenBodyParameters?: StringDict;
|
||||
};
|
||||
//# sourceMappingURL=SsoSilentRequest.d.ts.map
|
||||
1
node_modules/@azure/msal-browser/dist/request/SsoSilentRequest.d.ts.map
generated
vendored
Normal file
1
node_modules/@azure/msal-browser/dist/request/SsoSilentRequest.d.ts.map
generated
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"version":3,"file":"SsoSilentRequest.d.ts","sourceRoot":"","sources":["../../src/request/SsoSilentRequest.ts"],"names":[],"mappings":"AAKA,OAAO,EACH,6BAA6B,EAC7B,UAAU,EACb,MAAM,4BAA4B,CAAC;AAEpC;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAM,MAAM,gBAAgB,GAAG,OAAO,CAClC,IAAI,CACA,6BAA6B,EAC3B,cAAc,GACd,eAAe,GACf,qBAAqB,GACrB,qBAAqB,GACrB,gBAAgB,CACrB,CACJ,GAAG;IACA,mBAAmB,CAAC,EAAE,UAAU,CAAC;CACpC,CAAC"}
|
||||
Reference in New Issue
Block a user