summaryrefslogtreecommitdiff
path: root/frontend-old/node_modules/@firebase/auth/dist/src/core
diff options
context:
space:
mode:
authoraltaf-creator <dev@altafcreator.com>2025-11-09 11:15:19 +0800
committeraltaf-creator <dev@altafcreator.com>2025-11-09 11:15:19 +0800
commit8eff962cab608341a6f2fedc640a0e32d96f26e2 (patch)
tree05534d1a720ddc3691d346c69b4972555820a061 /frontend-old/node_modules/@firebase/auth/dist/src/core
pain
Diffstat (limited to 'frontend-old/node_modules/@firebase/auth/dist/src/core')
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts73
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts34
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts133
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts42
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts35
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts46
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts25
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts59
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts23
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts75
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts60
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts23
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts81
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts52
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts52
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts328
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts230
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts35
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts42
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts45
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts83
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts93
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts64
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts89
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts96
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts151
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts62
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts103
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts44
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts19
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts32
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts64
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts37
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts104
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts139
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts107
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts32
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts36
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts68
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts31
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts48
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts18
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts30
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts34
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts20
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts29
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts50
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts37
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts74
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts27
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts94
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts50
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts31
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts18
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts17
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts25
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts20
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts28
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts19
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts23
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts21
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts23
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts25
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts17
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts18
-rw-r--r--frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts31
66 files changed, 3774 insertions, 0 deletions
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts
new file mode 100644
index 0000000..39f14b6
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts
@@ -0,0 +1,73 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/**
+ * A utility class to parse email action URLs such as password reset, email verification,
+ * email link sign in, etc.
+ *
+ * @public
+ */
+export declare class ActionCodeURL {
+ /**
+ * The API key of the email action link.
+ */
+ readonly apiKey: string;
+ /**
+ * The action code of the email action link.
+ */
+ readonly code: string;
+ /**
+ * The continue URL of the email action link. Null if not provided.
+ */
+ readonly continueUrl: string | null;
+ /**
+ * The language code of the email action link. Null if not provided.
+ */
+ readonly languageCode: string | null;
+ /**
+ * The action performed by the email action link. It returns from one of the types from
+ * {@link ActionCodeInfo}
+ */
+ readonly operation: string;
+ /**
+ * The tenant ID of the email action link. Null if the email action is from the parent project.
+ */
+ readonly tenantId: string | null;
+ /**
+ * @param actionLink - The link from which to extract the URL.
+ * @returns The {@link ActionCodeURL} object, or null if the link is invalid.
+ *
+ * @internal
+ */
+ constructor(actionLink: string);
+ /**
+ * Parses the email action link string and returns an {@link ActionCodeURL} if the link is valid,
+ * otherwise returns null.
+ *
+ * @param link - The email action link string.
+ * @returns The {@link ActionCodeURL} object, or null if the link is invalid.
+ *
+ * @public
+ */
+ static parseLink(link: string): ActionCodeURL | null;
+}
+/**
+ * Parses the email action link string and returns an {@link ActionCodeURL} if
+ * the link is valid, otherwise returns null.
+ *
+ * @public
+ */
+export declare function parseActionCodeURL(link: string): ActionCodeURL | null;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts
new file mode 100644
index 0000000..42edbc6
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts
@@ -0,0 +1,34 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthEvent, AuthEventConsumer, EventManager } from '../../model/popup_redirect';
+import { AuthInternal } from '../../model/auth';
+export declare class AuthEventManager implements EventManager {
+ private readonly auth;
+ private readonly cachedEventUids;
+ private readonly consumers;
+ protected queuedRedirectEvent: AuthEvent | null;
+ protected hasHandledPotentialRedirect: boolean;
+ private lastProcessedEventTime;
+ constructor(auth: AuthInternal);
+ registerConsumer(authEventConsumer: AuthEventConsumer): void;
+ unregisterConsumer(authEventConsumer: AuthEventConsumer): void;
+ onEvent(event: AuthEvent): boolean;
+ private sendToConsumer;
+ private isEventForConsumer;
+ private hasEventBeenHandled;
+ private saveEventToCache;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts
new file mode 100644
index 0000000..87aab60
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts
@@ -0,0 +1,133 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { _FirebaseService, FirebaseApp } from '@firebase/app';
+import { Provider } from '@firebase/component';
+import { AppCheckInternalComponentName } from '@firebase/app-check-interop-types';
+import { Auth, AuthErrorMap, AuthSettings, EmulatorConfig, NextOrObserver, Persistence, PopupRedirectResolver, User, CompleteFn, ErrorFn, Unsubscribe, PasswordValidationStatus } from '../../model/public_types';
+import { ErrorFactory } from '@firebase/util';
+import { AuthInternal, ConfigInternal } from '../../model/auth';
+import { PopupRedirectResolverInternal } from '../../model/popup_redirect';
+import { UserInternal } from '../../model/user';
+import { AuthErrorCode, AuthErrorParams } from '../errors';
+import { PersistenceInternal } from '../persistence';
+import { RecaptchaConfig } from '../../platform_browser/recaptcha/recaptcha';
+import { PasswordPolicyInternal } from '../../model/password_policy';
+export declare const enum DefaultConfig {
+ TOKEN_API_HOST = "securetoken.googleapis.com",
+ API_HOST = "identitytoolkit.googleapis.com",
+ API_SCHEME = "https"
+}
+export declare class AuthImpl implements AuthInternal, _FirebaseService {
+ readonly app: FirebaseApp;
+ private readonly heartbeatServiceProvider;
+ private readonly appCheckServiceProvider;
+ readonly config: ConfigInternal;
+ currentUser: User | null;
+ emulatorConfig: EmulatorConfig | null;
+ private operations;
+ private persistenceManager?;
+ private redirectPersistenceManager?;
+ private authStateSubscription;
+ private idTokenSubscription;
+ private readonly beforeStateQueue;
+ private redirectUser;
+ private isProactiveRefreshEnabled;
+ private readonly EXPECTED_PASSWORD_POLICY_SCHEMA_VERSION;
+ _canInitEmulator: boolean;
+ _isInitialized: boolean;
+ _deleted: boolean;
+ _initializationPromise: Promise<void> | null;
+ _popupRedirectResolver: PopupRedirectResolverInternal | null;
+ _errorFactory: ErrorFactory<AuthErrorCode, AuthErrorParams>;
+ _agentRecaptchaConfig: RecaptchaConfig | null;
+ _tenantRecaptchaConfigs: Record<string, RecaptchaConfig>;
+ _projectPasswordPolicy: PasswordPolicyInternal | null;
+ _tenantPasswordPolicies: Record<string, PasswordPolicyInternal>;
+ _resolvePersistenceManagerAvailable: ((value: void | PromiseLike<void>) => void) | undefined;
+ _persistenceManagerAvailable: Promise<void>;
+ readonly name: string;
+ private lastNotifiedUid;
+ languageCode: string | null;
+ tenantId: string | null;
+ settings: AuthSettings;
+ constructor(app: FirebaseApp, heartbeatServiceProvider: Provider<'heartbeat'>, appCheckServiceProvider: Provider<AppCheckInternalComponentName>, config: ConfigInternal);
+ _initializeWithPersistence(persistenceHierarchy: PersistenceInternal[], popupRedirectResolver?: PopupRedirectResolver): Promise<void>;
+ /**
+ * If the persistence is changed in another window, the user manager will let us know
+ */
+ _onStorageEvent(): Promise<void>;
+ private initializeCurrentUserFromIdToken;
+ private initializeCurrentUser;
+ private tryRedirectSignIn;
+ private reloadAndSetCurrentUserOrClear;
+ useDeviceLanguage(): void;
+ _delete(): Promise<void>;
+ updateCurrentUser(userExtern: User | null): Promise<void>;
+ _updateCurrentUser(user: User | null, skipBeforeStateCallbacks?: boolean): Promise<void>;
+ signOut(): Promise<void>;
+ setPersistence(persistence: Persistence): Promise<void>;
+ _getRecaptchaConfig(): RecaptchaConfig | null;
+ validatePassword(password: string): Promise<PasswordValidationStatus>;
+ _getPasswordPolicyInternal(): PasswordPolicyInternal | null;
+ _updatePasswordPolicy(): Promise<void>;
+ _getPersistenceType(): string;
+ _getPersistence(): PersistenceInternal;
+ _updateErrorMap(errorMap: AuthErrorMap): void;
+ onAuthStateChanged(nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe;
+ beforeAuthStateChanged(callback: (user: User | null) => void | Promise<void>, onAbort?: () => void): Unsubscribe;
+ onIdTokenChanged(nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe;
+ authStateReady(): Promise<void>;
+ /**
+ * Revokes the given access token. Currently only supports Apple OAuth access tokens.
+ */
+ revokeAccessToken(token: string): Promise<void>;
+ toJSON(): object;
+ _setRedirectUser(user: UserInternal | null, popupRedirectResolver?: PopupRedirectResolver): Promise<void>;
+ private getOrInitRedirectPersistenceManager;
+ _redirectUserForId(id: string): Promise<UserInternal | null>;
+ _persistUserIfCurrent(user: UserInternal): Promise<void>;
+ /** Notifies listeners only if the user is current */
+ _notifyListenersIfCurrent(user: UserInternal): void;
+ _key(): string;
+ _startProactiveRefresh(): void;
+ _stopProactiveRefresh(): void;
+ /** Returns the current user cast as the internal type */
+ get _currentUser(): UserInternal;
+ private notifyAuthListeners;
+ private registerStateListener;
+ /**
+ * Unprotected (from race conditions) method to set the current user. This
+ * should only be called from within a queued callback. This is necessary
+ * because the queue shouldn't rely on another queued callback.
+ */
+ private directlySetCurrentUser;
+ private queue;
+ private get assertedPersistence();
+ private frameworks;
+ private clientVersion;
+ _logFramework(framework: string): void;
+ _getFrameworks(): readonly string[];
+ _getAdditionalHeaders(): Promise<Record<string, string>>;
+ _getAppCheckToken(): Promise<string | undefined>;
+}
+/**
+ * Method to be used to cast down to our private implementation of Auth.
+ * It will also handle unwrapping from the compat type if necessary
+ *
+ * @param auth Auth object passed in from developer
+ */
+export declare function _castAuth(auth: Auth): AuthInternal;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts
new file mode 100644
index 0000000..56dd81c
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts
@@ -0,0 +1,42 @@
+/**
+ * @license
+ * Copyright 2021 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Auth } from '../../model/public_types';
+/**
+ * Changes the {@link Auth} instance to communicate with the Firebase Auth Emulator, instead of production
+ * Firebase Auth services.
+ *
+ * @remarks
+ * This must be called synchronously immediately following the first call to
+ * {@link initializeAuth}. Do not use with production credentials as emulator
+ * traffic is not encrypted.
+ *
+ *
+ * @example
+ * ```javascript
+ * connectAuthEmulator(auth, 'http://127.0.0.1:9099', { disableWarnings: true });
+ * ```
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param url - The URL at which the emulator is running (eg, 'http://localhost:9099').
+ * @param options - Optional. `options.disableWarnings` defaults to `false`. Set it to
+ * `true` to disable the warning banner attached to the DOM.
+ *
+ * @public
+ */
+export declare function connectAuthEmulator(auth: Auth, url: string, options?: {
+ disableWarnings: boolean;
+}): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts
new file mode 100644
index 0000000..9a68c98
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts
@@ -0,0 +1,35 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { FirebaseAuthInternal } from '@firebase/auth-interop-types';
+import { AuthInternal } from '../../model/auth';
+interface TokenListener {
+ (tok: string | null): unknown;
+}
+export declare class AuthInterop implements FirebaseAuthInternal {
+ private readonly auth;
+ private readonly internalListeners;
+ constructor(auth: AuthInternal);
+ getUid(): string | null;
+ getToken(forceRefresh?: boolean): Promise<{
+ accessToken: string;
+ } | null>;
+ addAuthTokenListener(listener: TokenListener): void;
+ removeAuthTokenListener(listener: TokenListener): void;
+ private assertAuthConfigured;
+ private updateProactiveRefresh;
+}
+export {};
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts
new file mode 100644
index 0000000..3dd0e1e
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts
@@ -0,0 +1,46 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { FirebaseApp } from '@firebase/app';
+import { Auth, Dependencies } from '../../model/public_types';
+import { AuthImpl } from './auth_impl';
+/**
+ * Initializes an {@link Auth} instance with fine-grained control over
+ * {@link Dependencies}.
+ *
+ * @remarks
+ *
+ * This function allows more control over the {@link Auth} instance than
+ * {@link getAuth}. `getAuth` uses platform-specific defaults to supply
+ * the {@link Dependencies}. In general, `getAuth` is the easiest way to
+ * initialize Auth and works for most use cases. Use `initializeAuth` if you
+ * need control over which persistence layer is used, or to minimize bundle
+ * size if you're not using either `signInWithPopup` or `signInWithRedirect`.
+ *
+ * For example, if your app only uses anonymous accounts and you only want
+ * accounts saved for the current session, initialize `Auth` with:
+ *
+ * ```js
+ * const auth = initializeAuth(app, {
+ * persistence: browserSessionPersistence,
+ * popupRedirectResolver: undefined,
+ * });
+ * ```
+ *
+ * @public
+ */
+export declare function initializeAuth(app: FirebaseApp, deps?: Dependencies): Auth;
+export declare function _initializeAuthInstance(auth: AuthImpl, deps?: Dependencies): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts
new file mode 100644
index 0000000..74c4183
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts
@@ -0,0 +1,25 @@
+/**
+ * @license
+ * Copyright 2022 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+import { Unsubscribe, User } from '../../model/public_types';
+export declare class AuthMiddlewareQueue {
+ private readonly auth;
+ private readonly queue;
+ constructor(auth: AuthInternal);
+ pushCallback(callback: (user: User | null) => void | Promise<void>, onAbort?: () => void): Unsubscribe;
+ runMiddleware(nextUser: User | null): Promise<void>;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts
new file mode 100644
index 0000000..45a8127
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts
@@ -0,0 +1,59 @@
+/**
+ * @license
+ * Copyright 2023 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { GetPasswordPolicyResponse } from '../../api/password_policy/get_password_policy';
+import { PasswordPolicyCustomStrengthOptions, PasswordPolicyInternal } from '../../model/password_policy';
+import { PasswordValidationStatus } from '../../model/public_types';
+/**
+ * Stores password policy requirements and provides password validation against the policy.
+ *
+ * @internal
+ */
+export declare class PasswordPolicyImpl implements PasswordPolicyInternal {
+ readonly customStrengthOptions: PasswordPolicyCustomStrengthOptions;
+ readonly allowedNonAlphanumericCharacters: string;
+ readonly enforcementState: string;
+ readonly forceUpgradeOnSignin: boolean;
+ readonly schemaVersion: number;
+ constructor(response: GetPasswordPolicyResponse);
+ validatePassword(password: string): PasswordValidationStatus;
+ /**
+ * Validates that the password meets the length options for the policy.
+ *
+ * @param password Password to validate.
+ * @param status Validation status.
+ */
+ private validatePasswordLengthOptions;
+ /**
+ * Validates that the password meets the character options for the policy.
+ *
+ * @param password Password to validate.
+ * @param status Validation status.
+ */
+ private validatePasswordCharacterOptions;
+ /**
+ * Updates the running validation status with the statuses for the character options.
+ * Expected to be called each time a character is processed to update each option status
+ * based on the current character.
+ *
+ * @param status Validation status.
+ * @param containsLowercaseCharacter Whether the character is a lowercase letter.
+ * @param containsUppercaseCharacter Whether the character is an uppercase letter.
+ * @param containsNumericCharacter Whether the character is a numeric character.
+ * @param containsNonAlphanumericCharacter Whether the character is a non-alphanumeric character.
+ */
+ private updatePasswordCharacterOptionsStatuses;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts
new file mode 100644
index 0000000..260c739
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts
@@ -0,0 +1,23 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ClientPlatform } from '../util/version';
+export declare const enum _ComponentName {
+ AUTH = "auth",
+ AUTH_INTERNAL = "auth-internal"
+}
+/** @internal */
+export declare function registerAuth(clientPlatform: ClientPlatform): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts
new file mode 100644
index 0000000..1287582
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts
@@ -0,0 +1,75 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { PhoneOrOauthTokenResponse } from '../../api/authentication/mfa';
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+/**
+ * Interface that represents the credentials returned by an {@link AuthProvider}.
+ *
+ * @remarks
+ * Implementations specify the details about each auth provider's credential requirements.
+ *
+ * @public
+ */
+export declare class AuthCredential {
+ /**
+ * The authentication provider ID for the credential.
+ *
+ * @remarks
+ * For example, 'facebook.com', or 'google.com'.
+ */
+ readonly providerId: string;
+ /**
+ * The authentication sign in method for the credential.
+ *
+ * @remarks
+ * For example, {@link SignInMethod}.EMAIL_PASSWORD, or
+ * {@link SignInMethod}.EMAIL_LINK. This corresponds to the sign-in method
+ * identifier as returned in {@link fetchSignInMethodsForEmail}.
+ */
+ readonly signInMethod: string;
+ /** @internal */
+ protected constructor(
+ /**
+ * The authentication provider ID for the credential.
+ *
+ * @remarks
+ * For example, 'facebook.com', or 'google.com'.
+ */
+ providerId: string,
+ /**
+ * The authentication sign in method for the credential.
+ *
+ * @remarks
+ * For example, {@link SignInMethod}.EMAIL_PASSWORD, or
+ * {@link SignInMethod}.EMAIL_LINK. This corresponds to the sign-in method
+ * identifier as returned in {@link fetchSignInMethodsForEmail}.
+ */
+ signInMethod: string);
+ /**
+ * Returns a JSON-serializable representation of this object.
+ *
+ * @returns a JSON-serializable representation of this object.
+ */
+ toJSON(): object;
+ /** @internal */
+ _getIdTokenResponse(_auth: AuthInternal): Promise<PhoneOrOauthTokenResponse>;
+ /** @internal */
+ _linkToIdToken(_auth: AuthInternal, _idToken: string): Promise<IdTokenResponse>;
+ /** @internal */
+ _getReauthenticationResolver(_auth: AuthInternal): Promise<IdTokenResponse>;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts
new file mode 100644
index 0000000..0f44811
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts
@@ -0,0 +1,60 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+import { AuthCredential } from './auth_credential';
+/**
+ * Interface that represents the credentials returned by {@link EmailAuthProvider} for
+ * {@link ProviderId}.PASSWORD
+ *
+ * @remarks
+ * Covers both {@link SignInMethod}.EMAIL_PASSWORD and
+ * {@link SignInMethod}.EMAIL_LINK.
+ *
+ * @public
+ */
+export declare class EmailAuthCredential extends AuthCredential {
+ /** @internal */
+ readonly _email: string;
+ /** @internal */
+ readonly _password: string;
+ /** @internal */
+ readonly _tenantId: string | null;
+ /** @internal */
+ private constructor();
+ /** @internal */
+ static _fromEmailAndPassword(email: string, password: string): EmailAuthCredential;
+ /** @internal */
+ static _fromEmailAndCode(email: string, oobCode: string, tenantId?: string | null): EmailAuthCredential;
+ /** {@inheritdoc AuthCredential.toJSON} */
+ toJSON(): object;
+ /**
+ * Static method to deserialize a JSON representation of an object into an {@link AuthCredential}.
+ *
+ * @param json - Either `object` or the stringified representation of the object. When string is
+ * provided, `JSON.parse` would be called first.
+ *
+ * @returns If the JSON input does not represent an {@link AuthCredential}, null is returned.
+ */
+ static fromJSON(json: object | string): EmailAuthCredential | null;
+ /** @internal */
+ _getIdTokenResponse(auth: AuthInternal): Promise<IdTokenResponse>;
+ /** @internal */
+ _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>;
+ /** @internal */
+ _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts
new file mode 100644
index 0000000..475dee6
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts
@@ -0,0 +1,23 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/**
+ * This file is required due to the circular dependency from the parent class to its children
+ */
+export { AuthCredential } from './auth_credential';
+export { EmailAuthCredential } from './email';
+export { OAuthCredential } from './oauth';
+export { PhoneAuthCredential as PhoneAuthCredential } from './phone';
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts
new file mode 100644
index 0000000..96a1928
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts
@@ -0,0 +1,81 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+import { AuthCredential } from './auth_credential';
+export interface OAuthCredentialParams {
+ idToken?: string | null;
+ accessToken?: string | null;
+ oauthToken?: string;
+ secret?: string;
+ oauthTokenSecret?: string;
+ nonce?: string;
+ pendingToken?: string;
+ providerId: string;
+ signInMethod: string;
+}
+/**
+ * Represents the OAuth credentials returned by an {@link OAuthProvider}.
+ *
+ * @remarks
+ * Implementations specify the details about each auth provider's credential requirements.
+ *
+ * @public
+ */
+export declare class OAuthCredential extends AuthCredential {
+ /**
+ * The OAuth ID token associated with the credential if it belongs to an OIDC provider,
+ * such as `google.com`.
+ * @readonly
+ */
+ idToken?: string;
+ /**
+ * The OAuth access token associated with the credential if it belongs to an
+ * {@link OAuthProvider}, such as `facebook.com`, `twitter.com`, etc.
+ * @readonly
+ */
+ accessToken?: string;
+ /**
+ * The OAuth access token secret associated with the credential if it belongs to an OAuth 1.0
+ * provider, such as `twitter.com`.
+ * @readonly
+ */
+ secret?: string;
+ private nonce?;
+ private pendingToken;
+ /** @internal */
+ static _fromParams(params: OAuthCredentialParams): OAuthCredential;
+ /** {@inheritdoc AuthCredential.toJSON} */
+ toJSON(): object;
+ /**
+ * Static method to deserialize a JSON representation of an object into an
+ * {@link AuthCredential}.
+ *
+ * @param json - Input can be either Object or the stringified representation of the object.
+ * When string is provided, JSON.parse would be called first.
+ *
+ * @returns If the JSON input does not represent an {@link AuthCredential}, null is returned.
+ */
+ static fromJSON(json: string | object): OAuthCredential | null;
+ /** @internal */
+ _getIdTokenResponse(auth: AuthInternal): Promise<IdTokenResponse>;
+ /** @internal */
+ _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>;
+ /** @internal */
+ _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>;
+ private buildRequest;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts
new file mode 100644
index 0000000..1924744
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts
@@ -0,0 +1,52 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { PhoneOrOauthTokenResponse } from '../../api/authentication/mfa';
+import { SignInWithPhoneNumberRequest } from '../../api/authentication/sms';
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+import { AuthCredential } from './auth_credential';
+export interface PhoneAuthCredentialParameters {
+ verificationId?: string;
+ verificationCode?: string;
+ phoneNumber?: string;
+ temporaryProof?: string;
+}
+/**
+ * Represents the credentials returned by {@link PhoneAuthProvider}.
+ *
+ * @public
+ */
+export declare class PhoneAuthCredential extends AuthCredential {
+ private readonly params;
+ private constructor();
+ /** @internal */
+ static _fromVerification(verificationId: string, verificationCode: string): PhoneAuthCredential;
+ /** @internal */
+ static _fromTokenResponse(phoneNumber: string, temporaryProof: string): PhoneAuthCredential;
+ /** @internal */
+ _getIdTokenResponse(auth: AuthInternal): Promise<PhoneOrOauthTokenResponse>;
+ /** @internal */
+ _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>;
+ /** @internal */
+ _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>;
+ /** @internal */
+ _makeVerificationRequest(): SignInWithPhoneNumberRequest;
+ /** {@inheritdoc AuthCredential.toJSON} */
+ toJSON(): object;
+ /** Generates a phone credential based on a plain object or a JSON string. */
+ static fromJSON(json: object | string): PhoneAuthCredential | null;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts
new file mode 100644
index 0000000..54fea84
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts
@@ -0,0 +1,52 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+import { AuthCredential } from './auth_credential';
+/**
+ * @public
+ */
+export declare class SAMLAuthCredential extends AuthCredential {
+ private readonly pendingToken;
+ /** @internal */
+ private constructor();
+ /** @internal */
+ _getIdTokenResponse(auth: AuthInternal): Promise<IdTokenResponse>;
+ /** @internal */
+ _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>;
+ /** @internal */
+ _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>;
+ /** {@inheritdoc AuthCredential.toJSON} */
+ toJSON(): object;
+ /**
+ * Static method to deserialize a JSON representation of an object into an
+ * {@link AuthCredential}.
+ *
+ * @param json - Input can be either Object or the stringified representation of the object.
+ * When string is provided, JSON.parse would be called first.
+ *
+ * @returns If the JSON input does not represent an {@link AuthCredential}, null is returned.
+ */
+ static fromJSON(json: string | object): SAMLAuthCredential | null;
+ /**
+ * Helper static method to avoid exposing the constructor to end users.
+ *
+ * @internal
+ */
+ static _create(providerId: string, pendingToken: string): SAMLAuthCredential;
+ private buildRequest;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts
new file mode 100644
index 0000000..3d81b3a
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts
@@ -0,0 +1,328 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthErrorMap, User } from '../model/public_types';
+import { ErrorFactory, ErrorMap } from '@firebase/util';
+import { IdTokenMfaResponse } from '../api/authentication/mfa';
+import { AppName } from '../model/auth';
+import { AuthCredential } from './credentials';
+/**
+ * Enumeration of Firebase Auth error codes.
+ *
+ * @internal
+ */
+export declare const enum AuthErrorCode {
+ ADMIN_ONLY_OPERATION = "admin-restricted-operation",
+ ARGUMENT_ERROR = "argument-error",
+ APP_NOT_AUTHORIZED = "app-not-authorized",
+ APP_NOT_INSTALLED = "app-not-installed",
+ CAPTCHA_CHECK_FAILED = "captcha-check-failed",
+ CODE_EXPIRED = "code-expired",
+ CORDOVA_NOT_READY = "cordova-not-ready",
+ CORS_UNSUPPORTED = "cors-unsupported",
+ CREDENTIAL_ALREADY_IN_USE = "credential-already-in-use",
+ CREDENTIAL_MISMATCH = "custom-token-mismatch",
+ CREDENTIAL_TOO_OLD_LOGIN_AGAIN = "requires-recent-login",
+ DEPENDENT_SDK_INIT_BEFORE_AUTH = "dependent-sdk-initialized-before-auth",
+ DYNAMIC_LINK_NOT_ACTIVATED = "dynamic-link-not-activated",
+ EMAIL_CHANGE_NEEDS_VERIFICATION = "email-change-needs-verification",
+ EMAIL_EXISTS = "email-already-in-use",
+ EMULATOR_CONFIG_FAILED = "emulator-config-failed",
+ EXPIRED_OOB_CODE = "expired-action-code",
+ EXPIRED_POPUP_REQUEST = "cancelled-popup-request",
+ INTERNAL_ERROR = "internal-error",
+ INVALID_API_KEY = "invalid-api-key",
+ INVALID_APP_CREDENTIAL = "invalid-app-credential",
+ INVALID_APP_ID = "invalid-app-id",
+ INVALID_AUTH = "invalid-user-token",
+ INVALID_AUTH_EVENT = "invalid-auth-event",
+ INVALID_CERT_HASH = "invalid-cert-hash",
+ INVALID_CODE = "invalid-verification-code",
+ INVALID_CONTINUE_URI = "invalid-continue-uri",
+ INVALID_CORDOVA_CONFIGURATION = "invalid-cordova-configuration",
+ INVALID_CUSTOM_TOKEN = "invalid-custom-token",
+ INVALID_DYNAMIC_LINK_DOMAIN = "invalid-dynamic-link-domain",
+ INVALID_EMAIL = "invalid-email",
+ INVALID_EMULATOR_SCHEME = "invalid-emulator-scheme",
+ INVALID_CREDENTIAL = "invalid-credential",
+ INVALID_MESSAGE_PAYLOAD = "invalid-message-payload",
+ INVALID_MFA_SESSION = "invalid-multi-factor-session",
+ INVALID_OAUTH_CLIENT_ID = "invalid-oauth-client-id",
+ INVALID_OAUTH_PROVIDER = "invalid-oauth-provider",
+ INVALID_OOB_CODE = "invalid-action-code",
+ INVALID_ORIGIN = "unauthorized-domain",
+ INVALID_PASSWORD = "wrong-password",
+ INVALID_PERSISTENCE = "invalid-persistence-type",
+ INVALID_PHONE_NUMBER = "invalid-phone-number",
+ INVALID_PROVIDER_ID = "invalid-provider-id",
+ INVALID_RECIPIENT_EMAIL = "invalid-recipient-email",
+ INVALID_SENDER = "invalid-sender",
+ INVALID_SESSION_INFO = "invalid-verification-id",
+ INVALID_TENANT_ID = "invalid-tenant-id",
+ LOGIN_BLOCKED = "login-blocked",
+ MFA_INFO_NOT_FOUND = "multi-factor-info-not-found",
+ MFA_REQUIRED = "multi-factor-auth-required",
+ MISSING_ANDROID_PACKAGE_NAME = "missing-android-pkg-name",
+ MISSING_APP_CREDENTIAL = "missing-app-credential",
+ MISSING_AUTH_DOMAIN = "auth-domain-config-required",
+ MISSING_CODE = "missing-verification-code",
+ MISSING_CONTINUE_URI = "missing-continue-uri",
+ MISSING_IFRAME_START = "missing-iframe-start",
+ MISSING_IOS_BUNDLE_ID = "missing-ios-bundle-id",
+ MISSING_OR_INVALID_NONCE = "missing-or-invalid-nonce",
+ MISSING_MFA_INFO = "missing-multi-factor-info",
+ MISSING_MFA_SESSION = "missing-multi-factor-session",
+ MISSING_PHONE_NUMBER = "missing-phone-number",
+ MISSING_PASSWORD = "missing-password",
+ MISSING_SESSION_INFO = "missing-verification-id",
+ MODULE_DESTROYED = "app-deleted",
+ NEED_CONFIRMATION = "account-exists-with-different-credential",
+ NETWORK_REQUEST_FAILED = "network-request-failed",
+ NULL_USER = "null-user",
+ NO_AUTH_EVENT = "no-auth-event",
+ NO_SUCH_PROVIDER = "no-such-provider",
+ OPERATION_NOT_ALLOWED = "operation-not-allowed",
+ OPERATION_NOT_SUPPORTED = "operation-not-supported-in-this-environment",
+ POPUP_BLOCKED = "popup-blocked",
+ POPUP_CLOSED_BY_USER = "popup-closed-by-user",
+ PROVIDER_ALREADY_LINKED = "provider-already-linked",
+ QUOTA_EXCEEDED = "quota-exceeded",
+ REDIRECT_CANCELLED_BY_USER = "redirect-cancelled-by-user",
+ REDIRECT_OPERATION_PENDING = "redirect-operation-pending",
+ REJECTED_CREDENTIAL = "rejected-credential",
+ SECOND_FACTOR_ALREADY_ENROLLED = "second-factor-already-in-use",
+ SECOND_FACTOR_LIMIT_EXCEEDED = "maximum-second-factor-count-exceeded",
+ TENANT_ID_MISMATCH = "tenant-id-mismatch",
+ TIMEOUT = "timeout",
+ TOKEN_EXPIRED = "user-token-expired",
+ TOO_MANY_ATTEMPTS_TRY_LATER = "too-many-requests",
+ UNAUTHORIZED_DOMAIN = "unauthorized-continue-uri",
+ UNSUPPORTED_FIRST_FACTOR = "unsupported-first-factor",
+ UNSUPPORTED_PERSISTENCE = "unsupported-persistence-type",
+ UNSUPPORTED_TENANT_OPERATION = "unsupported-tenant-operation",
+ UNVERIFIED_EMAIL = "unverified-email",
+ USER_CANCELLED = "user-cancelled",
+ USER_DELETED = "user-not-found",
+ USER_DISABLED = "user-disabled",
+ USER_MISMATCH = "user-mismatch",
+ USER_SIGNED_OUT = "user-signed-out",
+ WEAK_PASSWORD = "weak-password",
+ WEB_STORAGE_UNSUPPORTED = "web-storage-unsupported",
+ ALREADY_INITIALIZED = "already-initialized",
+ RECAPTCHA_NOT_ENABLED = "recaptcha-not-enabled",
+ MISSING_RECAPTCHA_TOKEN = "missing-recaptcha-token",
+ INVALID_RECAPTCHA_TOKEN = "invalid-recaptcha-token",
+ INVALID_RECAPTCHA_ACTION = "invalid-recaptcha-action",
+ MISSING_CLIENT_TYPE = "missing-client-type",
+ MISSING_RECAPTCHA_VERSION = "missing-recaptcha-version",
+ INVALID_RECAPTCHA_VERSION = "invalid-recaptcha-version",
+ INVALID_REQ_TYPE = "invalid-req-type",
+ UNSUPPORTED_PASSWORD_POLICY_SCHEMA_VERSION = "unsupported-password-policy-schema-version",
+ PASSWORD_DOES_NOT_MEET_REQUIREMENTS = "password-does-not-meet-requirements",
+ INVALID_HOSTING_LINK_DOMAIN = "invalid-hosting-link-domain"
+}
+export interface ErrorMapRetriever extends AuthErrorMap {
+ (): ErrorMap<AuthErrorCode>;
+}
+/**
+ * A verbose error map with detailed descriptions for most error codes.
+ *
+ * See discussion at {@link AuthErrorMap}
+ *
+ * @public
+ */
+export declare const debugErrorMap: AuthErrorMap;
+/**
+ * A minimal error map with all verbose error messages stripped.
+ *
+ * See discussion at {@link AuthErrorMap}
+ *
+ * @public
+ */
+export declare const prodErrorMap: AuthErrorMap;
+export interface NamedErrorParams {
+ appName: AppName;
+ credential?: AuthCredential;
+ email?: string;
+ phoneNumber?: string;
+ tenantId?: string;
+ user?: User;
+ _serverResponse?: object;
+}
+/**
+ * @internal
+ */
+type GenericAuthErrorParams = {
+ [key in Exclude<AuthErrorCode, AuthErrorCode.ARGUMENT_ERROR | AuthErrorCode.DEPENDENT_SDK_INIT_BEFORE_AUTH | AuthErrorCode.INTERNAL_ERROR | AuthErrorCode.MFA_REQUIRED | AuthErrorCode.NO_AUTH_EVENT | AuthErrorCode.OPERATION_NOT_SUPPORTED>]: {
+ appName?: AppName;
+ email?: string;
+ phoneNumber?: string;
+ message?: string;
+ };
+};
+/**
+ * @internal
+ */
+export interface AuthErrorParams extends GenericAuthErrorParams {
+ [AuthErrorCode.ARGUMENT_ERROR]: {
+ appName?: AppName;
+ };
+ [AuthErrorCode.DEPENDENT_SDK_INIT_BEFORE_AUTH]: {
+ appName?: AppName;
+ };
+ [AuthErrorCode.INTERNAL_ERROR]: {
+ appName?: AppName;
+ };
+ [AuthErrorCode.LOGIN_BLOCKED]: {
+ appName?: AppName;
+ originalMessage?: string;
+ };
+ [AuthErrorCode.OPERATION_NOT_SUPPORTED]: {
+ appName?: AppName;
+ };
+ [AuthErrorCode.NO_AUTH_EVENT]: {
+ appName?: AppName;
+ };
+ [AuthErrorCode.MFA_REQUIRED]: {
+ appName: AppName;
+ _serverResponse: IdTokenMfaResponse;
+ };
+ [AuthErrorCode.INVALID_CORDOVA_CONFIGURATION]: {
+ appName: AppName;
+ missingPlugin?: string;
+ };
+}
+export declare const _DEFAULT_AUTH_ERROR_FACTORY: ErrorFactory<AuthErrorCode, AuthErrorParams>;
+/**
+ * A map of potential `Auth` error codes, for easier comparison with errors
+ * thrown by the SDK.
+ *
+ * @remarks
+ * Note that you can't tree-shake individual keys
+ * in the map, so by using the map you might substantially increase your
+ * bundle size.
+ *
+ * @public
+ */
+export declare const AUTH_ERROR_CODES_MAP_DO_NOT_USE_INTERNALLY: {
+ readonly ADMIN_ONLY_OPERATION: "auth/admin-restricted-operation";
+ readonly ARGUMENT_ERROR: "auth/argument-error";
+ readonly APP_NOT_AUTHORIZED: "auth/app-not-authorized";
+ readonly APP_NOT_INSTALLED: "auth/app-not-installed";
+ readonly CAPTCHA_CHECK_FAILED: "auth/captcha-check-failed";
+ readonly CODE_EXPIRED: "auth/code-expired";
+ readonly CORDOVA_NOT_READY: "auth/cordova-not-ready";
+ readonly CORS_UNSUPPORTED: "auth/cors-unsupported";
+ readonly CREDENTIAL_ALREADY_IN_USE: "auth/credential-already-in-use";
+ readonly CREDENTIAL_MISMATCH: "auth/custom-token-mismatch";
+ readonly CREDENTIAL_TOO_OLD_LOGIN_AGAIN: "auth/requires-recent-login";
+ readonly DEPENDENT_SDK_INIT_BEFORE_AUTH: "auth/dependent-sdk-initialized-before-auth";
+ readonly DYNAMIC_LINK_NOT_ACTIVATED: "auth/dynamic-link-not-activated";
+ readonly EMAIL_CHANGE_NEEDS_VERIFICATION: "auth/email-change-needs-verification";
+ readonly EMAIL_EXISTS: "auth/email-already-in-use";
+ readonly EMULATOR_CONFIG_FAILED: "auth/emulator-config-failed";
+ readonly EXPIRED_OOB_CODE: "auth/expired-action-code";
+ readonly EXPIRED_POPUP_REQUEST: "auth/cancelled-popup-request";
+ readonly INTERNAL_ERROR: "auth/internal-error";
+ readonly INVALID_API_KEY: "auth/invalid-api-key";
+ readonly INVALID_APP_CREDENTIAL: "auth/invalid-app-credential";
+ readonly INVALID_APP_ID: "auth/invalid-app-id";
+ readonly INVALID_AUTH: "auth/invalid-user-token";
+ readonly INVALID_AUTH_EVENT: "auth/invalid-auth-event";
+ readonly INVALID_CERT_HASH: "auth/invalid-cert-hash";
+ readonly INVALID_CODE: "auth/invalid-verification-code";
+ readonly INVALID_CONTINUE_URI: "auth/invalid-continue-uri";
+ readonly INVALID_CORDOVA_CONFIGURATION: "auth/invalid-cordova-configuration";
+ readonly INVALID_CUSTOM_TOKEN: "auth/invalid-custom-token";
+ readonly INVALID_DYNAMIC_LINK_DOMAIN: "auth/invalid-dynamic-link-domain";
+ readonly INVALID_EMAIL: "auth/invalid-email";
+ readonly INVALID_EMULATOR_SCHEME: "auth/invalid-emulator-scheme";
+ readonly INVALID_IDP_RESPONSE: "auth/invalid-credential";
+ readonly INVALID_LOGIN_CREDENTIALS: "auth/invalid-credential";
+ readonly INVALID_MESSAGE_PAYLOAD: "auth/invalid-message-payload";
+ readonly INVALID_MFA_SESSION: "auth/invalid-multi-factor-session";
+ readonly INVALID_OAUTH_CLIENT_ID: "auth/invalid-oauth-client-id";
+ readonly INVALID_OAUTH_PROVIDER: "auth/invalid-oauth-provider";
+ readonly INVALID_OOB_CODE: "auth/invalid-action-code";
+ readonly INVALID_ORIGIN: "auth/unauthorized-domain";
+ readonly INVALID_PASSWORD: "auth/wrong-password";
+ readonly INVALID_PERSISTENCE: "auth/invalid-persistence-type";
+ readonly INVALID_PHONE_NUMBER: "auth/invalid-phone-number";
+ readonly INVALID_PROVIDER_ID: "auth/invalid-provider-id";
+ readonly INVALID_RECIPIENT_EMAIL: "auth/invalid-recipient-email";
+ readonly INVALID_SENDER: "auth/invalid-sender";
+ readonly INVALID_SESSION_INFO: "auth/invalid-verification-id";
+ readonly INVALID_TENANT_ID: "auth/invalid-tenant-id";
+ readonly MFA_INFO_NOT_FOUND: "auth/multi-factor-info-not-found";
+ readonly MFA_REQUIRED: "auth/multi-factor-auth-required";
+ readonly MISSING_ANDROID_PACKAGE_NAME: "auth/missing-android-pkg-name";
+ readonly MISSING_APP_CREDENTIAL: "auth/missing-app-credential";
+ readonly MISSING_AUTH_DOMAIN: "auth/auth-domain-config-required";
+ readonly MISSING_CODE: "auth/missing-verification-code";
+ readonly MISSING_CONTINUE_URI: "auth/missing-continue-uri";
+ readonly MISSING_IFRAME_START: "auth/missing-iframe-start";
+ readonly MISSING_IOS_BUNDLE_ID: "auth/missing-ios-bundle-id";
+ readonly MISSING_OR_INVALID_NONCE: "auth/missing-or-invalid-nonce";
+ readonly MISSING_MFA_INFO: "auth/missing-multi-factor-info";
+ readonly MISSING_MFA_SESSION: "auth/missing-multi-factor-session";
+ readonly MISSING_PHONE_NUMBER: "auth/missing-phone-number";
+ readonly MISSING_PASSWORD: "auth/missing-password";
+ readonly MISSING_SESSION_INFO: "auth/missing-verification-id";
+ readonly MODULE_DESTROYED: "auth/app-deleted";
+ readonly NEED_CONFIRMATION: "auth/account-exists-with-different-credential";
+ readonly NETWORK_REQUEST_FAILED: "auth/network-request-failed";
+ readonly NULL_USER: "auth/null-user";
+ readonly NO_AUTH_EVENT: "auth/no-auth-event";
+ readonly NO_SUCH_PROVIDER: "auth/no-such-provider";
+ readonly OPERATION_NOT_ALLOWED: "auth/operation-not-allowed";
+ readonly OPERATION_NOT_SUPPORTED: "auth/operation-not-supported-in-this-environment";
+ readonly POPUP_BLOCKED: "auth/popup-blocked";
+ readonly POPUP_CLOSED_BY_USER: "auth/popup-closed-by-user";
+ readonly PROVIDER_ALREADY_LINKED: "auth/provider-already-linked";
+ readonly QUOTA_EXCEEDED: "auth/quota-exceeded";
+ readonly REDIRECT_CANCELLED_BY_USER: "auth/redirect-cancelled-by-user";
+ readonly REDIRECT_OPERATION_PENDING: "auth/redirect-operation-pending";
+ readonly REJECTED_CREDENTIAL: "auth/rejected-credential";
+ readonly SECOND_FACTOR_ALREADY_ENROLLED: "auth/second-factor-already-in-use";
+ readonly SECOND_FACTOR_LIMIT_EXCEEDED: "auth/maximum-second-factor-count-exceeded";
+ readonly TENANT_ID_MISMATCH: "auth/tenant-id-mismatch";
+ readonly TIMEOUT: "auth/timeout";
+ readonly TOKEN_EXPIRED: "auth/user-token-expired";
+ readonly TOO_MANY_ATTEMPTS_TRY_LATER: "auth/too-many-requests";
+ readonly UNAUTHORIZED_DOMAIN: "auth/unauthorized-continue-uri";
+ readonly UNSUPPORTED_FIRST_FACTOR: "auth/unsupported-first-factor";
+ readonly UNSUPPORTED_PERSISTENCE: "auth/unsupported-persistence-type";
+ readonly UNSUPPORTED_TENANT_OPERATION: "auth/unsupported-tenant-operation";
+ readonly UNVERIFIED_EMAIL: "auth/unverified-email";
+ readonly USER_CANCELLED: "auth/user-cancelled";
+ readonly USER_DELETED: "auth/user-not-found";
+ readonly USER_DISABLED: "auth/user-disabled";
+ readonly USER_MISMATCH: "auth/user-mismatch";
+ readonly USER_SIGNED_OUT: "auth/user-signed-out";
+ readonly WEAK_PASSWORD: "auth/weak-password";
+ readonly WEB_STORAGE_UNSUPPORTED: "auth/web-storage-unsupported";
+ readonly ALREADY_INITIALIZED: "auth/already-initialized";
+ readonly RECAPTCHA_NOT_ENABLED: "auth/recaptcha-not-enabled";
+ readonly MISSING_RECAPTCHA_TOKEN: "auth/missing-recaptcha-token";
+ readonly INVALID_RECAPTCHA_TOKEN: "auth/invalid-recaptcha-token";
+ readonly INVALID_RECAPTCHA_ACTION: "auth/invalid-recaptcha-action";
+ readonly MISSING_CLIENT_TYPE: "auth/missing-client-type";
+ readonly MISSING_RECAPTCHA_VERSION: "auth/missing-recaptcha-version";
+ readonly INVALID_RECAPTCHA_VERSION: "auth/invalid-recaptcha-version";
+ readonly INVALID_REQ_TYPE: "auth/invalid-req-type";
+ readonly INVALID_HOSTING_LINK_DOMAIN: "auth/invalid-hosting-link-domain";
+};
+export {};
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts
new file mode 100644
index 0000000..8829292
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts
@@ -0,0 +1,230 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Auth, NextOrObserver, Persistence, User, CompleteFn, ErrorFn, Unsubscribe, PasswordValidationStatus } from '../model/public_types';
+export { debugErrorMap, prodErrorMap, AUTH_ERROR_CODES_MAP_DO_NOT_USE_INTERNALLY as AuthErrorCodes } from './errors';
+/**
+ * Changes the type of persistence on the {@link Auth} instance for the currently saved
+ * `Auth` session and applies this type of persistence for future sign-in requests, including
+ * sign-in with redirect requests.
+ *
+ * @remarks
+ * This makes it easy for a user signing in to specify whether their session should be
+ * remembered or not. It also makes it easier to never persist the `Auth` state for applications
+ * that are shared by other users or have sensitive data.
+ *
+ * This method does not work in a Node.js environment or with {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @example
+ * ```javascript
+ * setPersistence(auth, browserSessionPersistence);
+ * ```
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param persistence - The {@link Persistence} to use.
+ * @returns A `Promise` that resolves once the persistence change has completed
+ *
+ * @public
+ */
+export declare function setPersistence(auth: Auth, persistence: Persistence): Promise<void>;
+/**
+ * Loads the reCAPTCHA configuration into the `Auth` instance.
+ *
+ * @remarks
+ * This will load the reCAPTCHA config, which indicates whether the reCAPTCHA
+ * verification flow should be triggered for each auth provider, into the
+ * current Auth session.
+ *
+ * If initializeRecaptchaConfig() is not invoked, the auth flow will always start
+ * without reCAPTCHA verification. If the provider is configured to require reCAPTCHA
+ * verification, the SDK will transparently load the reCAPTCHA config and restart the
+ * auth flows.
+ *
+ * Thus, by calling this optional method, you will reduce the latency of future auth flows.
+ * Loading the reCAPTCHA config early will also enhance the signal collected by reCAPTCHA.
+ *
+ * This method does not work in a Node.js environment.
+ *
+ * @example
+ * ```javascript
+ * initializeRecaptchaConfig(auth);
+ * ```
+ *
+ * @param auth - The {@link Auth} instance.
+ *
+ * @public
+ */
+export declare function initializeRecaptchaConfig(auth: Auth): Promise<void>;
+/**
+ * Validates the password against the password policy configured for the project or tenant.
+ *
+ * @remarks
+ * If no tenant ID is set on the `Auth` instance, then this method will use the password
+ * policy configured for the project. Otherwise, this method will use the policy configured
+ * for the tenant. If a password policy has not been configured, then the default policy
+ * configured for all projects will be used.
+ *
+ * If an auth flow fails because a submitted password does not meet the password policy
+ * requirements and this method has previously been called, then this method will use the
+ * most recent policy available when called again.
+ *
+ * @example
+ * ```javascript
+ * validatePassword(auth, 'some-password');
+ * ```
+ *
+ * @param auth The {@link Auth} instance.
+ * @param password The password to validate.
+ *
+ * @public
+ */
+export declare function validatePassword(auth: Auth, password: string): Promise<PasswordValidationStatus>;
+/**
+ * Adds an observer for changes to the signed-in user's ID token.
+ *
+ * @remarks
+ * This includes sign-in, sign-out, and token refresh events.
+ * This will not be triggered automatically upon ID token expiration. Use {@link User.getIdToken} to refresh the ID token.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param nextOrObserver - callback triggered on change.
+ * @param error - Deprecated. This callback is never triggered. Errors
+ * on signing in/out can be caught in promises returned from
+ * sign-in/sign-out functions.
+ * @param completed - Deprecated. This callback is never triggered.
+ *
+ * @public
+ */
+export declare function onIdTokenChanged(auth: Auth, nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe;
+/**
+ * Adds a blocking callback that runs before an auth state change
+ * sets a new user.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param callback - callback triggered before new user value is set.
+ * If this throws, it blocks the user from being set.
+ * @param onAbort - callback triggered if a later `beforeAuthStateChanged()`
+ * callback throws, allowing you to undo any side effects.
+ */
+export declare function beforeAuthStateChanged(auth: Auth, callback: (user: User | null) => void | Promise<void>, onAbort?: () => void): Unsubscribe;
+/**
+ * Adds an observer for changes to the user's sign-in state.
+ *
+ * @remarks
+ * To keep the old behavior, see {@link onIdTokenChanged}.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param nextOrObserver - callback triggered on change.
+ * @param error - Deprecated. This callback is never triggered. Errors
+ * on signing in/out can be caught in promises returned from
+ * sign-in/sign-out functions.
+ * @param completed - Deprecated. This callback is never triggered.
+ *
+ * @public
+ */
+export declare function onAuthStateChanged(auth: Auth, nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe;
+/**
+ * Sets the current language to the default device/browser preference.
+ *
+ * @param auth - The {@link Auth} instance.
+ *
+ * @public
+ */
+export declare function useDeviceLanguage(auth: Auth): void;
+/**
+ * Asynchronously sets the provided user as {@link Auth.currentUser} on the
+ * {@link Auth} instance.
+ *
+ * @remarks
+ * A new instance copy of the user provided will be made and set as currentUser.
+ *
+ * This will trigger {@link onAuthStateChanged} and {@link onIdTokenChanged} listeners
+ * like other sign in methods.
+ *
+ * The operation fails with an error if the user to be updated belongs to a different Firebase
+ * project.
+ *
+ * This method is not supported by {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param user - The new {@link User}.
+ *
+ * @public
+ */
+export declare function updateCurrentUser(auth: Auth, user: User | null): Promise<void>;
+/**
+ * Signs out the current user.
+ *
+ * @remarks
+ * This method is not supported by {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @param auth - The {@link Auth} instance.
+ *
+ * @public
+ */
+export declare function signOut(auth: Auth): Promise<void>;
+/**
+ * Revokes the given access token. Currently only supports Apple OAuth access tokens.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param token - The Apple OAuth access token.
+ *
+ * @public
+ */
+export declare function revokeAccessToken(auth: Auth, token: string): Promise<void>;
+export { initializeAuth } from './auth/initialize';
+export { connectAuthEmulator } from './auth/emulator';
+export { AuthCredential } from './credentials';
+export { EmailAuthCredential } from './credentials/email';
+export { OAuthCredential } from './credentials/oauth';
+export { PhoneAuthCredential } from './credentials/phone';
+export { inMemoryPersistence } from './persistence/in_memory';
+export { EmailAuthProvider } from './providers/email';
+export { FacebookAuthProvider } from './providers/facebook';
+export { CustomParameters } from './providers/federated';
+export { GoogleAuthProvider } from './providers/google';
+export { GithubAuthProvider } from './providers/github';
+export { OAuthProvider, OAuthCredentialOptions } from './providers/oauth';
+export { SAMLAuthProvider } from './providers/saml';
+export { TwitterAuthProvider } from './providers/twitter';
+export { signInAnonymously } from './strategies/anonymous';
+export { signInWithCredential, linkWithCredential, reauthenticateWithCredential } from './strategies/credential';
+export { signInWithCustomToken } from './strategies/custom_token';
+export { sendPasswordResetEmail, confirmPasswordReset, applyActionCode, checkActionCode, verifyPasswordResetCode, createUserWithEmailAndPassword, signInWithEmailAndPassword } from './strategies/email_and_password';
+export { sendSignInLinkToEmail, isSignInWithEmailLink, signInWithEmailLink } from './strategies/email_link';
+export { fetchSignInMethodsForEmail, sendEmailVerification, verifyBeforeUpdateEmail } from './strategies/email';
+export { ActionCodeURL, parseActionCodeURL } from './action_code_url';
+export { updateProfile, updateEmail, updatePassword } from './user/account_info';
+export { getIdToken, getIdTokenResult } from './user/id_token_result';
+export { unlink } from './user/link_unlink';
+export { getAdditionalUserInfo } from './user/additional_user_info';
+export { reload } from './user/reload';
+/**
+ * Deletes and signs out the user.
+ *
+ * @remarks
+ * Important: this is a security-sensitive operation that requires the user to have recently
+ * signed in. If this requirement isn't met, ask the user to authenticate again and then call
+ * {@link reauthenticateWithCredential}.
+ *
+ * @param user - The user.
+ *
+ * @public
+ */
+export declare function deleteUser(user: User): Promise<void>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts
new file mode 100644
index 0000000..60278cd
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts
@@ -0,0 +1,35 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Persistence } from '../../model/public_types';
+import { PersistenceInternal, PersistenceType, PersistenceValue, StorageEventListener } from '../persistence';
+export declare class InMemoryPersistence implements PersistenceInternal {
+ static type: 'NONE';
+ readonly type = PersistenceType.NONE;
+ storage: Record<string, PersistenceValue>;
+ _isAvailable(): Promise<boolean>;
+ _set(key: string, value: PersistenceValue): Promise<void>;
+ _get<T extends PersistenceValue>(key: string): Promise<T | null>;
+ _remove(key: string): Promise<void>;
+ _addListener(_key: string, _listener: StorageEventListener): void;
+ _removeListener(_key: string, _listener: StorageEventListener): void;
+}
+/**
+ * An implementation of {@link Persistence} of type 'NONE'.
+ *
+ * @public
+ */
+export declare const inMemoryPersistence: Persistence;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts
new file mode 100644
index 0000000..4460f02
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts
@@ -0,0 +1,42 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Persistence } from '../../model/public_types';
+export declare const enum PersistenceType {
+ SESSION = "SESSION",
+ LOCAL = "LOCAL",
+ NONE = "NONE",
+ COOKIE = "COOKIE"
+}
+export type PersistedBlob = Record<string, unknown>;
+export interface Instantiator<T> {
+ (blob: PersistedBlob): T;
+}
+export type PersistenceValue = PersistedBlob | string;
+export declare const STORAGE_AVAILABLE_KEY = "__sak";
+export interface StorageEventListener {
+ (value: PersistenceValue | null): void;
+}
+export interface PersistenceInternal extends Persistence {
+ type: PersistenceType;
+ _isAvailable(): Promise<boolean>;
+ _set(key: string, value: PersistenceValue): Promise<void>;
+ _get<T extends PersistenceValue>(key: string): Promise<T | null>;
+ _remove(key: string): Promise<void>;
+ _addListener(key: string, listener: StorageEventListener): void;
+ _removeListener(key: string, listener: StorageEventListener): void;
+ _shouldAllowMigration?: boolean;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts
new file mode 100644
index 0000000..7aca0d8
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts
@@ -0,0 +1,45 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ApiKey, AppName, AuthInternal } from '../../model/auth';
+import { UserInternal } from '../../model/user';
+import { PersistenceInternal } from '../persistence';
+export declare const enum KeyName {
+ AUTH_USER = "authUser",
+ AUTH_EVENT = "authEvent",
+ REDIRECT_USER = "redirectUser",
+ PERSISTENCE_USER = "persistence"
+}
+export declare const enum Namespace {
+ PERSISTENCE = "firebase"
+}
+export declare function _persistenceKeyName(key: string, apiKey: ApiKey, appName: AppName): string;
+export declare class PersistenceUserManager {
+ persistence: PersistenceInternal;
+ private readonly auth;
+ private readonly userKey;
+ private readonly fullUserKey;
+ private readonly fullPersistenceKey;
+ private readonly boundEventHandler;
+ private constructor();
+ setCurrentUser(user: UserInternal): Promise<void>;
+ getCurrentUser(): Promise<UserInternal | null>;
+ removeCurrentUser(): Promise<void>;
+ savePersistenceForRedirect(): Promise<void>;
+ setPersistence(newPersistence: PersistenceInternal): Promise<void>;
+ delete(): void;
+ static create(auth: AuthInternal, persistenceHierarchy: PersistenceInternal[], userKey?: KeyName): Promise<PersistenceUserManager>;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts
new file mode 100644
index 0000000..be276ad
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts
@@ -0,0 +1,83 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthProvider } from '../../model/public_types';
+import { EmailAuthCredential } from '../credentials/email';
+/**
+ * Provider for generating {@link EmailAuthCredential}.
+ *
+ * @public
+ */
+export declare class EmailAuthProvider implements AuthProvider {
+ /**
+ * Always set to {@link ProviderId}.PASSWORD, even for email link.
+ */
+ static readonly PROVIDER_ID: 'password';
+ /**
+ * Always set to {@link SignInMethod}.EMAIL_PASSWORD.
+ */
+ static readonly EMAIL_PASSWORD_SIGN_IN_METHOD: 'password';
+ /**
+ * Always set to {@link SignInMethod}.EMAIL_LINK.
+ */
+ static readonly EMAIL_LINK_SIGN_IN_METHOD: 'emailLink';
+ /**
+ * Always set to {@link ProviderId}.PASSWORD, even for email link.
+ */
+ readonly providerId: "password";
+ /**
+ * Initialize an {@link AuthCredential} using an email and password.
+ *
+ * @example
+ * ```javascript
+ * const authCredential = EmailAuthProvider.credential(email, password);
+ * const userCredential = await signInWithCredential(auth, authCredential);
+ * ```
+ *
+ * @example
+ * ```javascript
+ * const userCredential = await signInWithEmailAndPassword(auth, email, password);
+ * ```
+ *
+ * @param email - Email address.
+ * @param password - User account password.
+ * @returns The auth provider credential.
+ */
+ static credential(email: string, password: string): EmailAuthCredential;
+ /**
+ * Initialize an {@link AuthCredential} using an email and an email link after a sign in with
+ * email link operation.
+ *
+ * @example
+ * ```javascript
+ * const authCredential = EmailAuthProvider.credentialWithLink(auth, email, emailLink);
+ * const userCredential = await signInWithCredential(auth, authCredential);
+ * ```
+ *
+ * @example
+ * ```javascript
+ * await sendSignInLinkToEmail(auth, email);
+ * // Obtain emailLink from user.
+ * const userCredential = await signInWithEmailLink(auth, email, emailLink);
+ * ```
+ *
+ * @param auth - The {@link Auth} instance used to verify the link.
+ * @param email - Email address.
+ * @param emailLink - Sign-in email link.
+ * @returns - The auth provider credential.
+ */
+ static credentialWithLink(email: string, emailLink: string): EmailAuthCredential;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts
new file mode 100644
index 0000000..cd8feca
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts
@@ -0,0 +1,93 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserCredential } from '../../model/public_types';
+import { FirebaseError } from '@firebase/util';
+import { OAuthCredential } from '../credentials/oauth';
+import { BaseOAuthProvider } from './oauth';
+/**
+ * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.FACEBOOK.
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a redirect.
+ * const provider = new FacebookAuthProvider();
+ * // Start a sign in process for an unauthenticated user.
+ * provider.addScope('user_birthday');
+ * await signInWithRedirect(auth, provider);
+ * // This will trigger a full page redirect away from your app
+ *
+ * // After returning from the redirect when your app initializes you can obtain the result
+ * const result = await getRedirectResult(auth);
+ * if (result) {
+ * // This is the signed-in user
+ * const user = result.user;
+ * // This gives you a Facebook Access Token.
+ * const credential = FacebookAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * }
+ * ```
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a popup.
+ * const provider = new FacebookAuthProvider();
+ * provider.addScope('user_birthday');
+ * const result = await signInWithPopup(auth, provider);
+ *
+ * // The signed-in user info.
+ * const user = result.user;
+ * // This gives you a Facebook Access Token.
+ * const credential = FacebookAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * ```
+ *
+ * @public
+ */
+export declare class FacebookAuthProvider extends BaseOAuthProvider {
+ /** Always set to {@link SignInMethod}.FACEBOOK. */
+ static readonly FACEBOOK_SIGN_IN_METHOD: 'facebook.com';
+ /** Always set to {@link ProviderId}.FACEBOOK. */
+ static readonly PROVIDER_ID: 'facebook.com';
+ constructor();
+ /**
+ * Creates a credential for Facebook.
+ *
+ * @example
+ * ```javascript
+ * // `event` from the Facebook auth.authResponseChange callback.
+ * const credential = FacebookAuthProvider.credential(event.authResponse.accessToken);
+ * const result = await signInWithCredential(credential);
+ * ```
+ *
+ * @param accessToken - Facebook access token.
+ */
+ static credential(accessToken: string): OAuthCredential;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromResult(userCredential: UserCredential): OAuthCredential | null;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was
+ * thrown during a sign-in, link, or reauthenticate operation.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromError(error: FirebaseError): OAuthCredential | null;
+ private static credentialFromTaggedObject;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts
new file mode 100644
index 0000000..91d38b1
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts
@@ -0,0 +1,64 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthProvider } from '../../model/public_types';
+/**
+ * Map of OAuth Custom Parameters.
+ *
+ * @public
+ */
+export type CustomParameters = Record<string, string>;
+/**
+ * The base class for all Federated providers (OAuth (including OIDC), SAML).
+ *
+ * This class is not meant to be instantiated directly.
+ *
+ * @public
+ */
+export declare abstract class FederatedAuthProvider implements AuthProvider {
+ readonly providerId: string;
+ /** @internal */
+ defaultLanguageCode: string | null;
+ /** @internal */
+ private customParameters;
+ /**
+ * Constructor for generic OAuth providers.
+ *
+ * @param providerId - Provider for which credentials should be generated.
+ */
+ constructor(providerId: string);
+ /**
+ * Set the language gode.
+ *
+ * @param languageCode - language code
+ */
+ setDefaultLanguage(languageCode: string | null): void;
+ /**
+ * Sets the OAuth custom parameters to pass in an OAuth request for popup and redirect sign-in
+ * operations.
+ *
+ * @remarks
+ * For a detailed list, check the reserved required OAuth 2.0 parameters such as `client_id`,
+ * `redirect_uri`, `scope`, `response_type`, and `state` are not allowed and will be ignored.
+ *
+ * @param customOAuthParameters - The custom OAuth parameters to pass in the OAuth request.
+ */
+ setCustomParameters(customOAuthParameters: CustomParameters): AuthProvider;
+ /**
+ * Retrieve the current list of {@link CustomParameters}.
+ */
+ getCustomParameters(): CustomParameters;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts
new file mode 100644
index 0000000..b8b3ee9
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts
@@ -0,0 +1,89 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserCredential } from '../../model/public_types';
+import { FirebaseError } from '@firebase/util';
+import { OAuthCredential } from '../credentials/oauth';
+import { BaseOAuthProvider } from './oauth';
+/**
+ * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.GITHUB.
+ *
+ * @remarks
+ * GitHub requires an OAuth 2.0 redirect, so you can either handle the redirect directly, or use
+ * the {@link signInWithPopup} handler:
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a redirect.
+ * const provider = new GithubAuthProvider();
+ * // Start a sign in process for an unauthenticated user.
+ * provider.addScope('repo');
+ * await signInWithRedirect(auth, provider);
+ * // This will trigger a full page redirect away from your app
+ *
+ * // After returning from the redirect when your app initializes you can obtain the result
+ * const result = await getRedirectResult(auth);
+ * if (result) {
+ * // This is the signed-in user
+ * const user = result.user;
+ * // This gives you a GitHub Access Token.
+ * const credential = GithubAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * }
+ * ```
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a popup.
+ * const provider = new GithubAuthProvider();
+ * provider.addScope('repo');
+ * const result = await signInWithPopup(auth, provider);
+ *
+ * // The signed-in user info.
+ * const user = result.user;
+ * // This gives you a GitHub Access Token.
+ * const credential = GithubAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * ```
+ * @public
+ */
+export declare class GithubAuthProvider extends BaseOAuthProvider {
+ /** Always set to {@link SignInMethod}.GITHUB. */
+ static readonly GITHUB_SIGN_IN_METHOD: 'github.com';
+ /** Always set to {@link ProviderId}.GITHUB. */
+ static readonly PROVIDER_ID: 'github.com';
+ constructor();
+ /**
+ * Creates a credential for GitHub.
+ *
+ * @param accessToken - GitHub access token.
+ */
+ static credential(accessToken: string): OAuthCredential;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromResult(userCredential: UserCredential): OAuthCredential | null;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was
+ * thrown during a sign-in, link, or reauthenticate operation.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromError(error: FirebaseError): OAuthCredential | null;
+ private static credentialFromTaggedObject;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts
new file mode 100644
index 0000000..25d74c8
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts
@@ -0,0 +1,96 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserCredential } from '../../model/public_types';
+import { FirebaseError } from '@firebase/util';
+import { OAuthCredential } from '../credentials/oauth';
+import { BaseOAuthProvider } from './oauth';
+/**
+ * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.GOOGLE.
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a redirect.
+ * const provider = new GoogleAuthProvider();
+ * // Start a sign in process for an unauthenticated user.
+ * provider.addScope('profile');
+ * provider.addScope('email');
+ * await signInWithRedirect(auth, provider);
+ * // This will trigger a full page redirect away from your app
+ *
+ * // After returning from the redirect when your app initializes you can obtain the result
+ * const result = await getRedirectResult(auth);
+ * if (result) {
+ * // This is the signed-in user
+ * const user = result.user;
+ * // This gives you a Google Access Token.
+ * const credential = GoogleAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * }
+ * ```
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a popup.
+ * const provider = new GoogleAuthProvider();
+ * provider.addScope('profile');
+ * provider.addScope('email');
+ * const result = await signInWithPopup(auth, provider);
+ *
+ * // The signed-in user info.
+ * const user = result.user;
+ * // This gives you a Google Access Token.
+ * const credential = GoogleAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * ```
+ *
+ * @public
+ */
+export declare class GoogleAuthProvider extends BaseOAuthProvider {
+ /** Always set to {@link SignInMethod}.GOOGLE. */
+ static readonly GOOGLE_SIGN_IN_METHOD: 'google.com';
+ /** Always set to {@link ProviderId}.GOOGLE. */
+ static readonly PROVIDER_ID: 'google.com';
+ constructor();
+ /**
+ * Creates a credential for Google. At least one of ID token and access token is required.
+ *
+ * @example
+ * ```javascript
+ * // \`googleUser\` from the onsuccess Google Sign In callback.
+ * const credential = GoogleAuthProvider.credential(googleUser.getAuthResponse().id_token);
+ * const result = await signInWithCredential(credential);
+ * ```
+ *
+ * @param idToken - Google ID token.
+ * @param accessToken - Google access token.
+ */
+ static credential(idToken?: string | null, accessToken?: string | null): OAuthCredential;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromResult(userCredential: UserCredential): OAuthCredential | null;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was
+ * thrown during a sign-in, link, or reauthenticate operation.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromError(error: FirebaseError): OAuthCredential | null;
+ private static credentialFromTaggedObject;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts
new file mode 100644
index 0000000..3e8e664
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts
@@ -0,0 +1,151 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthProvider, UserCredential } from '../../model/public_types';
+import { OAuthCredential } from '../credentials/oauth';
+import { FirebaseError } from '@firebase/util';
+import { FederatedAuthProvider } from './federated';
+/**
+ * Defines the options for initializing an {@link OAuthCredential}.
+ *
+ * @remarks
+ * For ID tokens with nonce claim, the raw nonce has to also be provided.
+ *
+ * @public
+ */
+export interface OAuthCredentialOptions {
+ /**
+ * The OAuth ID token used to initialize the {@link OAuthCredential}.
+ */
+ idToken?: string;
+ /**
+ * The OAuth access token used to initialize the {@link OAuthCredential}.
+ */
+ accessToken?: string;
+ /**
+ * The raw nonce associated with the ID token.
+ *
+ * @remarks
+ * It is required when an ID token with a nonce field is provided. The SHA-256 hash of the
+ * raw nonce must match the nonce field in the ID token.
+ */
+ rawNonce?: string;
+}
+/**
+ * Common code to all OAuth providers. This is separate from the
+ * {@link OAuthProvider} so that child providers (like
+ * {@link GoogleAuthProvider}) don't inherit the `credential` instance method.
+ * Instead, they rely on a static `credential` method.
+ */
+export declare abstract class BaseOAuthProvider extends FederatedAuthProvider implements AuthProvider {
+ /** @internal */
+ private scopes;
+ /**
+ * Add an OAuth scope to the credential.
+ *
+ * @param scope - Provider OAuth scope to add.
+ */
+ addScope(scope: string): AuthProvider;
+ /**
+ * Retrieve the current list of OAuth scopes.
+ */
+ getScopes(): string[];
+}
+/**
+ * Provider for generating generic {@link OAuthCredential}.
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a redirect.
+ * const provider = new OAuthProvider('google.com');
+ * // Start a sign in process for an unauthenticated user.
+ * provider.addScope('profile');
+ * provider.addScope('email');
+ * await signInWithRedirect(auth, provider);
+ * // This will trigger a full page redirect away from your app
+ *
+ * // After returning from the redirect when your app initializes you can obtain the result
+ * const result = await getRedirectResult(auth);
+ * if (result) {
+ * // This is the signed-in user
+ * const user = result.user;
+ * // This gives you a OAuth Access Token for the provider.
+ * const credential = provider.credentialFromResult(auth, result);
+ * const token = credential.accessToken;
+ * }
+ * ```
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a popup.
+ * const provider = new OAuthProvider('google.com');
+ * provider.addScope('profile');
+ * provider.addScope('email');
+ * const result = await signInWithPopup(auth, provider);
+ *
+ * // The signed-in user info.
+ * const user = result.user;
+ * // This gives you a OAuth Access Token for the provider.
+ * const credential = provider.credentialFromResult(auth, result);
+ * const token = credential.accessToken;
+ * ```
+ * @public
+ */
+export declare class OAuthProvider extends BaseOAuthProvider {
+ /**
+ * Creates an {@link OAuthCredential} from a JSON string or a plain object.
+ * @param json - A plain object or a JSON string
+ */
+ static credentialFromJSON(json: object | string): OAuthCredential;
+ /**
+ * Creates a {@link OAuthCredential} from a generic OAuth provider's access token or ID token.
+ *
+ * @remarks
+ * The raw nonce is required when an ID token with a nonce field is provided. The SHA-256 hash of
+ * the raw nonce must match the nonce field in the ID token.
+ *
+ * @example
+ * ```javascript
+ * // `googleUser` from the onsuccess Google Sign In callback.
+ * // Initialize a generate OAuth provider with a `google.com` providerId.
+ * const provider = new OAuthProvider('google.com');
+ * const credential = provider.credential({
+ * idToken: googleUser.getAuthResponse().id_token,
+ * });
+ * const result = await signInWithCredential(credential);
+ * ```
+ *
+ * @param params - Either the options object containing the ID token, access token and raw nonce
+ * or the ID token string.
+ */
+ credential(params: OAuthCredentialOptions): OAuthCredential;
+ /** An internal credential method that accepts more permissive options */
+ private _credential;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromResult(userCredential: UserCredential): OAuthCredential | null;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was
+ * thrown during a sign-in, link, or reauthenticate operation.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromError(error: FirebaseError): OAuthCredential | null;
+ private static oauthCredentialFromTaggedObject;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts
new file mode 100644
index 0000000..6017bfe
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts
@@ -0,0 +1,62 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { FirebaseError } from '@firebase/util';
+import { UserCredential } from '../../model/public_types';
+import { AuthCredential } from '../credentials';
+import { FederatedAuthProvider } from './federated';
+/**
+ * An {@link AuthProvider} for SAML.
+ *
+ * @public
+ */
+export declare class SAMLAuthProvider extends FederatedAuthProvider {
+ /**
+ * Constructor. The providerId must start with "saml."
+ * @param providerId - SAML provider ID.
+ */
+ constructor(providerId: string);
+ /**
+ * Generates an {@link AuthCredential} from a {@link UserCredential} after a
+ * successful SAML flow completes.
+ *
+ * @remarks
+ *
+ * For example, to get an {@link AuthCredential}, you could write the
+ * following code:
+ *
+ * ```js
+ * const userCredential = await signInWithPopup(auth, samlProvider);
+ * const credential = SAMLAuthProvider.credentialFromResult(userCredential);
+ * ```
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromResult(userCredential: UserCredential): AuthCredential | null;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was
+ * thrown during a sign-in, link, or reauthenticate operation.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromError(error: FirebaseError): AuthCredential | null;
+ /**
+ * Creates an {@link AuthCredential} from a JSON string or a plain object.
+ * @param json - A plain object or a JSON string
+ */
+ static credentialFromJSON(json: string | object): AuthCredential;
+ private static samlCredentialFromTaggedObject;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts
new file mode 100644
index 0000000..612913d
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts
@@ -0,0 +1,103 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/**
+ * @license
+ * Copyright 2020 Twitter LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserCredential } from '../../model/public_types';
+import { FirebaseError } from '@firebase/util';
+import { OAuthCredential } from '../credentials/oauth';
+import { BaseOAuthProvider } from './oauth';
+/**
+ * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.TWITTER.
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a redirect.
+ * const provider = new TwitterAuthProvider();
+ * // Start a sign in process for an unauthenticated user.
+ * await signInWithRedirect(auth, provider);
+ * // This will trigger a full page redirect away from your app
+ *
+ * // After returning from the redirect when your app initializes you can obtain the result
+ * const result = await getRedirectResult(auth);
+ * if (result) {
+ * // This is the signed-in user
+ * const user = result.user;
+ * // This gives you a Twitter Access Token and Secret.
+ * const credential = TwitterAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * const secret = credential.secret;
+ * }
+ * ```
+ *
+ * @example
+ * ```javascript
+ * // Sign in using a popup.
+ * const provider = new TwitterAuthProvider();
+ * const result = await signInWithPopup(auth, provider);
+ *
+ * // The signed-in user info.
+ * const user = result.user;
+ * // This gives you a Twitter Access Token and Secret.
+ * const credential = TwitterAuthProvider.credentialFromResult(result);
+ * const token = credential.accessToken;
+ * const secret = credential.secret;
+ * ```
+ *
+ * @public
+ */
+export declare class TwitterAuthProvider extends BaseOAuthProvider {
+ /** Always set to {@link SignInMethod}.TWITTER. */
+ static readonly TWITTER_SIGN_IN_METHOD: 'twitter.com';
+ /** Always set to {@link ProviderId}.TWITTER. */
+ static readonly PROVIDER_ID: 'twitter.com';
+ constructor();
+ /**
+ * Creates a credential for Twitter.
+ *
+ * @param token - Twitter access token.
+ * @param secret - Twitter secret.
+ */
+ static credential(token: string, secret: string): OAuthCredential;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromResult(userCredential: UserCredential): OAuthCredential | null;
+ /**
+ * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was
+ * thrown during a sign-in, link, or reauthenticate operation.
+ *
+ * @param userCredential - The user credential.
+ */
+ static credentialFromError(error: FirebaseError): OAuthCredential | null;
+ private static credentialFromTaggedObject;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts
new file mode 100644
index 0000000..6f5e076
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts
@@ -0,0 +1,44 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { FirebaseError } from '@firebase/util';
+import { AuthEvent, AuthEventConsumer, AuthEventType, PopupRedirectResolverInternal } from '../../model/popup_redirect';
+import { UserInternal, UserCredentialInternal } from '../../model/user';
+import { AuthInternal } from '../../model/auth';
+/**
+ * Popup event manager. Handles the popup's entire lifecycle; listens to auth
+ * events
+ */
+export declare abstract class AbstractPopupRedirectOperation implements AuthEventConsumer {
+ protected readonly auth: AuthInternal;
+ protected readonly resolver: PopupRedirectResolverInternal;
+ protected user?: UserInternal | undefined;
+ protected readonly bypassAuthState: boolean;
+ private pendingPromise;
+ private eventManager;
+ readonly filter: AuthEventType[];
+ abstract eventId: string | null;
+ constructor(auth: AuthInternal, filter: AuthEventType | AuthEventType[], resolver: PopupRedirectResolverInternal, user?: UserInternal | undefined, bypassAuthState?: boolean);
+ abstract onExecution(): Promise<void>;
+ execute(): Promise<UserCredentialInternal | null>;
+ onAuthEvent(event: AuthEvent): Promise<void>;
+ onError(error: FirebaseError): void;
+ private getIdpTask;
+ protected resolve(cred: UserCredentialInternal | null): void;
+ protected reject(error: Error): void;
+ private unregisterAndCleanUp;
+ abstract cleanUp(): void;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts
new file mode 100644
index 0000000..23fa039
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts
@@ -0,0 +1,19 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ActionCodeSettings, Auth } from '../../model/public_types';
+import { GetOobCodeRequest } from '../../api/authentication/email_and_password';
+export declare function _setActionCodeSettingsOnRequest(auth: Auth, request: GetOobCodeRequest, actionCodeSettings: ActionCodeSettings): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts
new file mode 100644
index 0000000..687a797
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts
@@ -0,0 +1,32 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Auth, UserCredential } from '../../model/public_types';
+/**
+ * Asynchronously signs in as an anonymous user.
+ *
+ * @remarks
+ * If there is already an anonymous user signed in, that user will be returned; otherwise, a
+ * new anonymous user identity will be created and returned.
+ *
+ * This method is not supported by {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @param auth - The {@link Auth} instance.
+ *
+ * @public
+ */
+export declare function signInAnonymously(auth: Auth): Promise<UserCredential>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts
new file mode 100644
index 0000000..392d663
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts
@@ -0,0 +1,64 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserCredential, Auth, User } from '../../model/public_types';
+import { AuthInternal } from '../../model/auth';
+import { AuthCredential } from '../credentials';
+export declare function _signInWithCredential(auth: AuthInternal, credential: AuthCredential, bypassAuthState?: boolean): Promise<UserCredential>;
+/**
+ * Asynchronously signs in with the given credentials.
+ *
+ * @remarks
+ * An {@link AuthProvider} can be used to generate the credential.
+ *
+ * This method is not supported by {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param credential - The auth credential.
+ *
+ * @public
+ */
+export declare function signInWithCredential(auth: Auth, credential: AuthCredential): Promise<UserCredential>;
+/**
+ * Links the user account with the given credentials.
+ *
+ * @remarks
+ * An {@link AuthProvider} can be used to generate the credential.
+ *
+ * @param user - The user.
+ * @param credential - The auth credential.
+ *
+ * @public
+ */
+export declare function linkWithCredential(user: User, credential: AuthCredential): Promise<UserCredential>;
+/**
+ * Re-authenticates a user using a fresh credential.
+ *
+ * @remarks
+ * Use before operations such as {@link updatePassword} that require tokens from recent sign-in
+ * attempts. This method can be used to recover from a `CREDENTIAL_TOO_OLD_LOGIN_AGAIN` error
+ * or a `TOKEN_EXPIRED` error.
+ *
+ * This method is not supported on any {@link User} signed in by {@link Auth} instances
+ * created with a {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @param user - The user.
+ * @param credential - The auth credential.
+ *
+ * @public
+ */
+export declare function reauthenticateWithCredential(user: User, credential: AuthCredential): Promise<UserCredential>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts
new file mode 100644
index 0000000..e95cc38
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts
@@ -0,0 +1,37 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Auth, UserCredential } from '../../model/public_types';
+/**
+ * Asynchronously signs in using a custom token.
+ *
+ * @remarks
+ * Custom tokens are used to integrate Firebase Auth with existing auth systems, and must
+ * be generated by an auth backend using the
+ * {@link https://firebase.google.com/docs/reference/admin/node/admin.auth.Auth#createcustomtoken | createCustomToken}
+ * method in the {@link https://firebase.google.com/docs/auth/admin | Admin SDK} .
+ *
+ * Fails with an error if the token is invalid, expired, or not accepted by the Firebase Auth service.
+ *
+ * This method is not supported by {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param customToken - The custom token to sign in with.
+ *
+ * @public
+ */
+export declare function signInWithCustomToken(auth: Auth, customToken: string): Promise<UserCredential>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts
new file mode 100644
index 0000000..3505c34
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts
@@ -0,0 +1,104 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ActionCodeSettings, Auth, User } from '../../model/public_types';
+/**
+ * Gets the list of possible sign in methods for the given email address. This method returns an
+ * empty list when
+ * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
+ * is enabled, irrespective of the number of authentication methods available for the given email.
+ *
+ * @remarks
+ * This is useful to differentiate methods of sign-in for the same provider, eg.
+ * {@link EmailAuthProvider} which has 2 methods of sign-in,
+ * {@link SignInMethod}.EMAIL_PASSWORD and
+ * {@link SignInMethod}.EMAIL_LINK.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param email - The user's email address.
+ *
+ * Deprecated. Migrating off of this method is recommended as a security best-practice.
+ * Learn more in the Identity Platform documentation for
+ * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}.
+ * @public
+ */
+export declare function fetchSignInMethodsForEmail(auth: Auth, email: string): Promise<string[]>;
+/**
+ * Sends a verification email to a user.
+ *
+ * @remarks
+ * The verification process is completed by calling {@link applyActionCode}.
+ *
+ * @example
+ * ```javascript
+ * const actionCodeSettings = {
+ * url: 'https://www.example.com/?email=user@example.com',
+ * iOS: {
+ * bundleId: 'com.example.ios'
+ * },
+ * android: {
+ * packageName: 'com.example.android',
+ * installApp: true,
+ * minimumVersion: '12'
+ * },
+ * handleCodeInApp: true
+ * };
+ * await sendEmailVerification(user, actionCodeSettings);
+ * // Obtain code from the user.
+ * await applyActionCode(auth, code);
+ * ```
+ *
+ * @param user - The user.
+ * @param actionCodeSettings - The {@link ActionCodeSettings}.
+ *
+ * @public
+ */
+export declare function sendEmailVerification(user: User, actionCodeSettings?: ActionCodeSettings | null): Promise<void>;
+/**
+ * Sends a verification email to a new email address.
+ *
+ * @remarks
+ * The user's email will be updated to the new one after being verified.
+ *
+ * If you have a custom email action handler, you can complete the verification process by calling
+ * {@link applyActionCode}.
+ *
+ * @example
+ * ```javascript
+ * const actionCodeSettings = {
+ * url: 'https://www.example.com/?email=user@example.com',
+ * iOS: {
+ * bundleId: 'com.example.ios'
+ * },
+ * android: {
+ * packageName: 'com.example.android',
+ * installApp: true,
+ * minimumVersion: '12'
+ * },
+ * handleCodeInApp: true
+ * };
+ * await verifyBeforeUpdateEmail(user, 'newemail@example.com', actionCodeSettings);
+ * // Obtain code from the user.
+ * await applyActionCode(auth, code);
+ * ```
+ *
+ * @param user - The user.
+ * @param newEmail - The new email address to be verified before update.
+ * @param actionCodeSettings - The {@link ActionCodeSettings}.
+ *
+ * @public
+ */
+export declare function verifyBeforeUpdateEmail(user: User, newEmail: string, actionCodeSettings?: ActionCodeSettings | null): Promise<void>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts
new file mode 100644
index 0000000..205f33a
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts
@@ -0,0 +1,139 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ActionCodeInfo, ActionCodeSettings, Auth, UserCredential } from '../../model/public_types';
+/**
+ * Sends a password reset email to the given email address. This method does not throw an error when
+ * there's no user account with the given email address and
+ * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
+ * is enabled.
+ *
+ * @remarks
+ * To complete the password reset, call {@link confirmPasswordReset} with the code supplied in
+ * the email sent to the user, along with the new password specified by the user.
+ *
+ * @example
+ * ```javascript
+ * const actionCodeSettings = {
+ * url: 'https://www.example.com/?email=user@example.com',
+ * iOS: {
+ * bundleId: 'com.example.ios'
+ * },
+ * android: {
+ * packageName: 'com.example.android',
+ * installApp: true,
+ * minimumVersion: '12'
+ * },
+ * handleCodeInApp: true
+ * };
+ * await sendPasswordResetEmail(auth, 'user@example.com', actionCodeSettings);
+ * // Obtain code from user.
+ * await confirmPasswordReset('user@example.com', code);
+ * ```
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param email - The user's email address.
+ * @param actionCodeSettings - The {@link ActionCodeSettings}.
+ *
+ * @public
+ */
+export declare function sendPasswordResetEmail(auth: Auth, email: string, actionCodeSettings?: ActionCodeSettings): Promise<void>;
+/**
+ * Completes the password reset process, given a confirmation code and new password.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param oobCode - A confirmation code sent to the user.
+ * @param newPassword - The new password.
+ *
+ * @public
+ */
+export declare function confirmPasswordReset(auth: Auth, oobCode: string, newPassword: string): Promise<void>;
+/**
+ * Applies a verification code sent to the user by email or other out-of-band mechanism.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param oobCode - A verification code sent to the user.
+ *
+ * @public
+ */
+export declare function applyActionCode(auth: Auth, oobCode: string): Promise<void>;
+/**
+ * Checks a verification code sent to the user by email or other out-of-band mechanism.
+ *
+ * @returns metadata about the code.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param oobCode - A verification code sent to the user.
+ *
+ * @public
+ */
+export declare function checkActionCode(auth: Auth, oobCode: string): Promise<ActionCodeInfo>;
+/**
+ * Checks a password reset code sent to the user by email or other out-of-band mechanism.
+ *
+ * @returns the user's email address if valid.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param code - A verification code sent to the user.
+ *
+ * @public
+ */
+export declare function verifyPasswordResetCode(auth: Auth, code: string): Promise<string>;
+/**
+ * Creates a new user account associated with the specified email address and password.
+ *
+ * @remarks
+ * On successful creation of the user account, this user will also be signed in to your application.
+ *
+ * User account creation can fail if the account already exists or the password is invalid.
+ *
+ * This method is not supported on {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * Note: The email address acts as a unique identifier for the user and enables an email-based
+ * password reset. This function will create a new user account and set the initial user password.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param email - The user's email address.
+ * @param password - The user's chosen password.
+ *
+ * @public
+ */
+export declare function createUserWithEmailAndPassword(auth: Auth, email: string, password: string): Promise<UserCredential>;
+/**
+ * Asynchronously signs in using an email and password.
+ *
+ * @remarks
+ * Fails with an error if the email address and password do not match. When
+ * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
+ * is enabled, this method fails with "auth/invalid-credential" in case of an invalid
+ * email/password.
+ *
+ * This method is not supported on {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * Note: The user's password is NOT the password used to access the user's email account. The
+ * email address serves as a unique identifier for the user, and the password is used to access
+ * the user's account in your Firebase project. See also: {@link createUserWithEmailAndPassword}.
+ *
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param email - The users email address.
+ * @param password - The users password.
+ *
+ * @public
+ */
+export declare function signInWithEmailAndPassword(auth: Auth, email: string, password: string): Promise<UserCredential>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts
new file mode 100644
index 0000000..8d01e8a
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts
@@ -0,0 +1,107 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ActionCodeSettings, Auth, UserCredential } from '../../model/public_types';
+/**
+ * Sends a sign-in email link to the user with the specified email.
+ *
+ * @remarks
+ * The sign-in operation has to always be completed in the app unlike other out of band email
+ * actions (password reset and email verifications). This is because, at the end of the flow,
+ * the user is expected to be signed in and their Auth state persisted within the app.
+ *
+ * To complete sign in with the email link, call {@link signInWithEmailLink} with the email
+ * address and the email link supplied in the email sent to the user.
+ *
+ * @example
+ * ```javascript
+ * const actionCodeSettings = {
+ * url: 'https://www.example.com/?email=user@example.com',
+ * iOS: {
+ * bundleId: 'com.example.ios'
+ * },
+ * android: {
+ * packageName: 'com.example.android',
+ * installApp: true,
+ * minimumVersion: '12'
+ * },
+ * handleCodeInApp: true
+ * };
+ * await sendSignInLinkToEmail(auth, 'user@example.com', actionCodeSettings);
+ * // Obtain emailLink from the user.
+ * if(isSignInWithEmailLink(auth, emailLink)) {
+ * await signInWithEmailLink(auth, 'user@example.com', emailLink);
+ * }
+ * ```
+ *
+ * @param authInternal - The {@link Auth} instance.
+ * @param email - The user's email address.
+ * @param actionCodeSettings - The {@link ActionCodeSettings}.
+ *
+ * @public
+ */
+export declare function sendSignInLinkToEmail(auth: Auth, email: string, actionCodeSettings: ActionCodeSettings): Promise<void>;
+/**
+ * Checks if an incoming link is a sign-in with email link suitable for {@link signInWithEmailLink}.
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param emailLink - The link sent to the user's email address.
+ *
+ * @public
+ */
+export declare function isSignInWithEmailLink(auth: Auth, emailLink: string): boolean;
+/**
+ * Asynchronously signs in using an email and sign-in email link.
+ *
+ * @remarks
+ * If no link is passed, the link is inferred from the current URL.
+ *
+ * Fails with an error if the email address is invalid or OTP in email link expires.
+ *
+ * This method is not supported by {@link Auth} instances created with a
+ * {@link @firebase/app#FirebaseServerApp}.
+ *
+ * Note: Confirm the link is a sign-in email link before calling this method firebase.auth.Auth.isSignInWithEmailLink.
+ *
+ * @example
+ * ```javascript
+ * const actionCodeSettings = {
+ * url: 'https://www.example.com/?email=user@example.com',
+ * iOS: {
+ * bundleId: 'com.example.ios'
+ * },
+ * android: {
+ * packageName: 'com.example.android',
+ * installApp: true,
+ * minimumVersion: '12'
+ * },
+ * handleCodeInApp: true
+ * };
+ * await sendSignInLinkToEmail(auth, 'user@example.com', actionCodeSettings);
+ * // Obtain emailLink from the user.
+ * if(isSignInWithEmailLink(auth, emailLink)) {
+ * await signInWithEmailLink(auth, 'user@example.com', emailLink);
+ * }
+ * ```
+ *
+ *
+ * @param auth - The {@link Auth} instance.
+ * @param email - The user's email address.
+ * @param emailLink - The link sent to the user's email address.
+ *
+ * @public
+ */
+export declare function signInWithEmailLink(auth: Auth, email: string, emailLink?: string): Promise<UserCredential>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts
new file mode 100644
index 0000000..179d4f7
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts
@@ -0,0 +1,32 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+import { UserInternal, UserCredentialInternal } from '../../model/user';
+export interface IdpTaskParams {
+ auth: AuthInternal;
+ requestUri: string;
+ sessionId?: string;
+ tenantId?: string;
+ postBody?: string;
+ pendingToken?: string;
+ user?: UserInternal;
+ bypassAuthState?: boolean;
+}
+export type IdpTask = (params: IdpTaskParams) => Promise<UserCredentialInternal>;
+export declare function _signIn(params: IdpTaskParams): Promise<UserCredentialInternal>;
+export declare function _reauth(params: IdpTaskParams): Promise<UserCredentialInternal>;
+export declare function _link(params: IdpTaskParams): Promise<UserCredentialInternal>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts
new file mode 100644
index 0000000..10178ef
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts
@@ -0,0 +1,36 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+import { AuthEvent, PopupRedirectResolverInternal } from '../../model/popup_redirect';
+import { UserCredentialInternal } from '../../model/user';
+import { AbstractPopupRedirectOperation } from './abstract_popup_redirect_operation';
+export declare class RedirectAction extends AbstractPopupRedirectOperation {
+ eventId: null;
+ constructor(auth: AuthInternal, resolver: PopupRedirectResolverInternal, bypassAuthState?: boolean);
+ /**
+ * Override the execute function; if we already have a redirect result, then
+ * just return it.
+ */
+ execute(): Promise<UserCredentialInternal | null>;
+ onAuthEvent(event: AuthEvent): Promise<void>;
+ onExecution(): Promise<void>;
+ cleanUp(): void;
+}
+export declare function _getAndClearPendingRedirectStatus(resolver: PopupRedirectResolverInternal, auth: AuthInternal): Promise<boolean>;
+export declare function _setPendingRedirectStatus(resolver: PopupRedirectResolverInternal, auth: AuthInternal): Promise<void>;
+export declare function _clearRedirectOutcomes(): void;
+export declare function _overrideRedirectResult(auth: AuthInternal, result: () => Promise<UserCredentialInternal | null>): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts
new file mode 100644
index 0000000..312e23c
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts
@@ -0,0 +1,68 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { User } from '../../model/public_types';
+/**
+ * Updates a user's profile data.
+ *
+ * @param user - The user.
+ * @param profile - The profile's `displayName` and `photoURL` to update.
+ *
+ * @public
+ */
+export declare function updateProfile(user: User, { displayName, photoURL: photoUrl }: {
+ displayName?: string | null;
+ photoURL?: string | null;
+}): Promise<void>;
+/**
+ * Updates the user's email address.
+ *
+ * @remarks
+ * An email will be sent to the original email address (if it was set) that allows to revoke the
+ * email address change, in order to protect them from account hijacking.
+ *
+ * This method is not supported on any {@link User} signed in by {@link Auth} instances
+ * created with a {@link @firebase/app#FirebaseServerApp}.
+ *
+ * Important: this is a security sensitive operation that requires the user to have recently signed
+ * in. If this requirement isn't met, ask the user to authenticate again and then call
+ * {@link reauthenticateWithCredential}.
+ *
+ * @param user - The user.
+ * @param newEmail - The new email address.
+ *
+ * Throws "auth/operation-not-allowed" error when
+ * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}
+ * is enabled.
+ * Deprecated - Use {@link verifyBeforeUpdateEmail} instead.
+ *
+ * @public
+ */
+export declare function updateEmail(user: User, newEmail: string): Promise<void>;
+/**
+ * Updates the user's password.
+ *
+ * @remarks
+ * Important: this is a security sensitive operation that requires the user to have recently signed
+ * in. If this requirement isn't met, ask the user to authenticate again and then call
+ * {@link reauthenticateWithCredential}.
+ *
+ * @param user - The user.
+ * @param newPassword - The new password.
+ *
+ * @public
+ */
+export declare function updatePassword(user: User, newPassword: string): Promise<void>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts
new file mode 100644
index 0000000..d5fd65b
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts
@@ -0,0 +1,31 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AdditionalUserInfo, UserCredential } from '../../model/public_types';
+import { IdTokenResponse } from '../../model/id_token';
+/**
+ * Parse the `AdditionalUserInfo` from the ID token response.
+ *
+ */
+export declare function _fromIdTokenResponse(idTokenResponse?: IdTokenResponse): AdditionalUserInfo | null;
+/**
+ * Extracts provider specific {@link AdditionalUserInfo} for the given credential.
+ *
+ * @param userCredential - The user credential.
+ *
+ * @public
+ */
+export declare function getAdditionalUserInfo(userCredential: UserCredential): AdditionalUserInfo | null;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts
new file mode 100644
index 0000000..c1b2032
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts
@@ -0,0 +1,48 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { IdTokenResult, ParsedToken, User } from '../../model/public_types';
+/**
+ * Returns a JSON Web Token (JWT) used to identify the user to a Firebase service.
+ *
+ * @remarks
+ * Returns the current token if it has not expired or if it will not expire in the next five
+ * minutes. Otherwise, this will refresh the token and return a new one.
+ *
+ * @param user - The user.
+ * @param forceRefresh - Force refresh regardless of token expiration.
+ *
+ * @public
+ */
+export declare function getIdToken(user: User, forceRefresh?: boolean): Promise<string>;
+/**
+ * Returns a deserialized JSON Web Token (JWT) used to identify the user to a Firebase service.
+ *
+ * @remarks
+ * Returns the current token if it has not expired or if it will not expire in the next five
+ * minutes. Otherwise, this will refresh the token and return a new one.
+ *
+ * @param user - The user.
+ * @param forceRefresh - Force refresh regardless of token expiration.
+ *
+ * @public
+ */
+export declare function getIdTokenResult(user: User, forceRefresh?: boolean): Promise<IdTokenResult>;
+export declare function _parseToken(token: string): ParsedToken | null;
+/**
+ * Extract expiresIn TTL from a token by subtracting the expiration from the issuance.
+ */
+export declare function _tokenExpiresIn(token: string): number;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts
new file mode 100644
index 0000000..81446ea
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts
@@ -0,0 +1,18 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserInternal } from '../../model/user';
+export declare function _logoutIfInvalidated<T>(user: UserInternal, promise: Promise<T>, bypassAuthState?: boolean): Promise<T>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts
new file mode 100644
index 0000000..9408524
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts
@@ -0,0 +1,30 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { User } from '../../model/public_types';
+import { UserInternal, UserCredentialInternal } from '../../model/user';
+import { AuthCredential } from '../credentials';
+/**
+ * Unlinks a provider from a user account.
+ *
+ * @param user - The user.
+ * @param providerId - The provider to unlink.
+ *
+ * @public
+ */
+export declare function unlink(user: User, providerId: string): Promise<User>;
+export declare function _link(user: UserInternal, credential: AuthCredential, bypassAuthState?: boolean): Promise<UserCredentialInternal>;
+export declare function _assertLinkedStatus(expected: boolean, user: UserInternal, provider: string): Promise<void>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts
new file mode 100644
index 0000000..ff52286
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts
@@ -0,0 +1,34 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserInternal } from '../../model/user';
+export declare const enum Duration {
+ OFFSET = 300000,
+ RETRY_BACKOFF_MIN = 30000,
+ RETRY_BACKOFF_MAX = 960000
+}
+export declare class ProactiveRefresh {
+ private readonly user;
+ private isRunning;
+ private timerId;
+ private errorBackoff;
+ constructor(user: UserInternal);
+ _start(): void;
+ _stop(): void;
+ private getInterval;
+ private schedule;
+ private iteration;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts
new file mode 100644
index 0000000..1855132
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts
@@ -0,0 +1,20 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserInternal } from '../../model/user';
+import { AuthCredential } from '../credentials';
+import { UserCredentialImpl } from './user_credential_impl';
+export declare function _reauthenticate(user: UserInternal, credential: AuthCredential, bypassAuthState?: boolean): Promise<UserCredentialImpl>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts
new file mode 100644
index 0000000..f2690fa
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts
@@ -0,0 +1,29 @@
+/**
+ * @license
+ * Copyright 2019 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { User, UserInfo } from '../../model/public_types';
+import { ProviderUserInfo } from '../../api/account_management/account';
+import { UserInternal } from '../../model/user';
+export declare function _reloadWithoutSaving(user: UserInternal): Promise<void>;
+/**
+ * Reloads user account data, if signed in.
+ *
+ * @param user - The user.
+ *
+ * @public
+ */
+export declare function reload(user: User): Promise<void>;
+export declare function extractProviderData(providers: ProviderUserInfo[]): UserInfo[];
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts
new file mode 100644
index 0000000..790e283
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts
@@ -0,0 +1,50 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { FinalizeMfaResponse } from '../../api/authentication/mfa';
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+import { PersistedBlob } from '../persistence';
+/**
+ * The number of milliseconds before the official expiration time of a token
+ * to refresh that token, to provide a buffer for RPCs to complete.
+ */
+export declare const enum Buffer {
+ TOKEN_REFRESH = 30000
+}
+/**
+ * We need to mark this class as internal explicitly to exclude it in the public typings, because
+ * it references AuthInternal which has a circular dependency with UserInternal.
+ *
+ * @internal
+ */
+export declare class StsTokenManager {
+ refreshToken: string | null;
+ accessToken: string | null;
+ expirationTime: number | null;
+ get isExpired(): boolean;
+ updateFromServerResponse(response: IdTokenResponse | FinalizeMfaResponse): void;
+ updateFromIdToken(idToken: string): void;
+ getToken(auth: AuthInternal, forceRefresh?: boolean): Promise<string | null>;
+ clearRefreshToken(): void;
+ private refresh;
+ private updateTokensAndExpiration;
+ static fromJSON(appName: string, object: PersistedBlob): StsTokenManager;
+ toJSON(): object;
+ _assign(stsTokenManager: StsTokenManager): void;
+ _clone(): StsTokenManager;
+ _performRefresh(): never;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts
new file mode 100644
index 0000000..44ece34
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts
@@ -0,0 +1,37 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { PhoneOrOauthTokenResponse } from '../../api/authentication/mfa';
+import { IdTokenResponse } from '../../model/id_token';
+import { UserInternal, UserCredentialInternal } from '../../model/user';
+import { AuthInternal } from '../../model/auth';
+import { OperationType, ProviderId } from '../../model/enums';
+interface UserCredentialParams {
+ readonly user: UserInternal;
+ readonly providerId: ProviderId | string | null;
+ readonly _tokenResponse?: PhoneOrOauthTokenResponse;
+ readonly operationType: OperationType;
+}
+export declare class UserCredentialImpl implements UserCredentialInternal, UserCredentialParams {
+ readonly user: UserInternal;
+ readonly providerId: ProviderId | string | null;
+ readonly _tokenResponse: PhoneOrOauthTokenResponse | undefined;
+ readonly operationType: OperationType;
+ constructor(params: UserCredentialParams);
+ static _fromIdTokenResponse(auth: AuthInternal, operationType: OperationType, idTokenResponse: IdTokenResponse, isAnonymous?: boolean): Promise<UserCredentialInternal>;
+ static _forOperation(user: UserInternal, operationType: OperationType, response: PhoneOrOauthTokenResponse): Promise<UserCredentialImpl>;
+}
+export {};
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts
new file mode 100644
index 0000000..f795111
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts
@@ -0,0 +1,74 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { IdTokenResult } from '../../model/public_types';
+import { NextFn } from '@firebase/util';
+import { APIUserInfo, GetAccountInfoResponse } from '../../api/account_management/account';
+import { FinalizeMfaResponse } from '../../api/authentication/mfa';
+import { AuthInternal } from '../../model/auth';
+import { IdTokenResponse } from '../../model/id_token';
+import { MutableUserInfo, UserInternal, UserParameters } from '../../model/user';
+import { PersistedBlob } from '../persistence';
+import { StsTokenManager } from './token_manager';
+import { UserMetadata } from './user_metadata';
+import { ProviderId } from '../../model/enums';
+export declare class UserImpl implements UserInternal {
+ readonly providerId = ProviderId.FIREBASE;
+ stsTokenManager: StsTokenManager;
+ private accessToken;
+ uid: string;
+ auth: AuthInternal;
+ emailVerified: boolean;
+ isAnonymous: boolean;
+ tenantId: string | null;
+ readonly metadata: UserMetadata;
+ providerData: MutableUserInfo[];
+ displayName: string | null;
+ email: string | null;
+ phoneNumber: string | null;
+ photoURL: string | null;
+ _redirectEventId?: string;
+ private readonly proactiveRefresh;
+ constructor({ uid, auth, stsTokenManager, ...opt }: UserParameters);
+ getIdToken(forceRefresh?: boolean): Promise<string>;
+ getIdTokenResult(forceRefresh?: boolean): Promise<IdTokenResult>;
+ reload(): Promise<void>;
+ private reloadUserInfo;
+ private reloadListener;
+ _assign(user: UserInternal): void;
+ _clone(auth: AuthInternal): UserInternal;
+ _onReload(callback: NextFn<APIUserInfo>): void;
+ _notifyReloadListener(userInfo: APIUserInfo): void;
+ _startProactiveRefresh(): void;
+ _stopProactiveRefresh(): void;
+ _updateTokensIfNecessary(response: IdTokenResponse | FinalizeMfaResponse, reload?: boolean): Promise<void>;
+ delete(): Promise<void>;
+ toJSON(): PersistedBlob;
+ get refreshToken(): string;
+ static _fromJSON(auth: AuthInternal, object: PersistedBlob): UserInternal;
+ /**
+ * Initialize a User from an idToken server response
+ * @param auth
+ * @param idTokenResponse
+ */
+ static _fromIdTokenResponse(auth: AuthInternal, idTokenResponse: IdTokenResponse, isAnonymous?: boolean): Promise<UserInternal>;
+ /**
+ * Initialize a User from an idToken server response
+ * @param auth
+ * @param idTokenResponse
+ */
+ static _fromGetAccountInfoResponse(auth: AuthInternal, response: GetAccountInfoResponse, idToken: string): Promise<UserInternal>;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts
new file mode 100644
index 0000000..c732ce3
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts
@@ -0,0 +1,27 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { UserMetadata as UserMetadataType } from '../../model/public_types';
+export declare class UserMetadata implements UserMetadataType {
+ private createdAt?;
+ private lastLoginAt?;
+ creationTime?: string;
+ lastSignInTime?: string;
+ constructor(createdAt?: (string | number) | undefined, lastLoginAt?: (string | number) | undefined);
+ private _initializeTime;
+ _copy(metadata: UserMetadata): void;
+ toJSON(): object;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts
new file mode 100644
index 0000000..b877b42
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts
@@ -0,0 +1,94 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { Auth } from '../../model/public_types';
+import { FirebaseError } from '@firebase/util';
+import { AuthErrorCode, AuthErrorParams } from '../errors';
+type LessAppName<K extends AuthErrorCode> = Omit<AuthErrorParams[K], 'appName'>;
+/**
+ * Unconditionally fails, throwing a developer facing INTERNAL_ERROR
+ *
+ * @example
+ * ```javascript
+ * fail(auth, AuthErrorCode.MFA_REQUIRED); // Error: the MFA_REQUIRED error needs more params than appName
+ * fail(auth, AuthErrorCode.MFA_REQUIRED, {serverResponse}); // Compiles
+ * fail(AuthErrorCode.INTERNAL_ERROR); // Compiles; internal error does not need appName
+ * fail(AuthErrorCode.USER_DELETED); // Error: USER_DELETED requires app name
+ * fail(auth, AuthErrorCode.USER_DELETED); // Compiles; USER_DELETED _only_ needs app name
+ * ```
+ *
+ * @param appName App name for tagging the error
+ * @throws FirebaseError
+ */
+export declare function _fail<K extends AuthErrorCode>(code: K, ...data: {} extends AuthErrorParams[K] ? [AuthErrorParams[K]?] : [AuthErrorParams[K]]): never;
+export declare function _fail<K extends AuthErrorCode>(auth: Auth, code: K, ...data: {} extends LessAppName<K> ? [LessAppName<K>?] : [LessAppName<K>]): never;
+export declare function _createError<K extends AuthErrorCode>(code: K, ...data: {} extends AuthErrorParams[K] ? [AuthErrorParams[K]?] : [AuthErrorParams[K]]): FirebaseError;
+export declare function _createError<K extends AuthErrorCode>(auth: Auth, code: K, ...data: {} extends LessAppName<K> ? [LessAppName<K>?] : [LessAppName<K>]): FirebaseError;
+export declare function _errorWithCustomMessage(auth: Auth, code: AuthErrorCode, message: string): FirebaseError;
+export declare function _serverAppCurrentUserOperationNotSupportedError(auth: Auth): FirebaseError;
+export declare function _assertInstanceOf(auth: Auth, object: object, instance: unknown): void;
+export declare function _assert<K extends AuthErrorCode>(assertion: unknown, code: K, ...data: {} extends AuthErrorParams[K] ? [AuthErrorParams[K]?] : [AuthErrorParams[K]]): asserts assertion;
+export declare function _assert<K extends AuthErrorCode>(assertion: unknown, auth: Auth, code: K, ...data: {} extends LessAppName<K> ? [LessAppName<K>?] : [LessAppName<K>]): asserts assertion;
+type TypeExpectation = Function | string | MapType;
+interface MapType extends Record<string, TypeExpectation | Optional> {
+}
+declare class Optional {
+ readonly type: TypeExpectation;
+ constructor(type: TypeExpectation);
+}
+export declare function opt(type: TypeExpectation): Optional;
+/**
+ * Asserts the runtime types of arguments. The 'expected' field can be one of
+ * a class, a string (representing a "typeof" call), or a record map of name
+ * to type. Furthermore, the opt() function can be used to mark a field as
+ * optional. For example:
+ *
+ * function foo(auth: Auth, profile: {displayName?: string}, update = false) {
+ * assertTypes(arguments, [AuthImpl, {displayName: opt('string')}, opt('boolean')]);
+ * }
+ *
+ * opt() can be used for any type:
+ * function foo(auth?: Auth) {
+ * assertTypes(arguments, [opt(AuthImpl)]);
+ * }
+ *
+ * The string types can be or'd together, and you can use "null" as well (note
+ * that typeof null === 'object'; this is an edge case). For example:
+ *
+ * function foo(profile: {displayName?: string | null}) {
+ * assertTypes(arguments, [{displayName: opt('string|null')}]);
+ * }
+ *
+ * @param args
+ * @param expected
+ */
+export declare function assertTypes(args: Omit<IArguments, 'callee'>, ...expected: Array<TypeExpectation | Optional>): void;
+/**
+ * Unconditionally fails, throwing an internal error with the given message.
+ *
+ * @param failure type of failure encountered
+ * @throws Error
+ */
+export declare function debugFail(failure: string): never;
+/**
+ * Fails if the given assertion condition is false, throwing an Error with the
+ * given message if it did.
+ *
+ * @param assertion
+ * @param message
+ */
+export declare function debugAssert(assertion: unknown, message: string): asserts assertion;
+export {};
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts
new file mode 100644
index 0000000..f2abeb6
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts
@@ -0,0 +1,50 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/**
+ * Enums for Browser name.
+ */
+export declare const enum BrowserName {
+ ANDROID = "Android",
+ BLACKBERRY = "Blackberry",
+ EDGE = "Edge",
+ FIREFOX = "Firefox",
+ IE = "IE",
+ IEMOBILE = "IEMobile",
+ OPERA = "Opera",
+ OTHER = "Other",
+ CHROME = "Chrome",
+ SAFARI = "Safari",
+ SILK = "Silk",
+ WEBOS = "Webos"
+}
+/**
+ * Determine the browser for the purposes of reporting usage to the API
+ */
+export declare function _getBrowserName(userAgent: string): BrowserName | string;
+export declare function _isFirefox(ua?: string): boolean;
+export declare function _isSafari(userAgent?: string): boolean;
+export declare function _isChromeIOS(ua?: string): boolean;
+export declare function _isIEMobile(ua?: string): boolean;
+export declare function _isAndroid(ua?: string): boolean;
+export declare function _isBlackBerry(ua?: string): boolean;
+export declare function _isWebOS(ua?: string): boolean;
+export declare function _isIOS(ua?: string): boolean;
+export declare function _isIOS7Or8(ua?: string): boolean;
+export declare function _isIOSStandalone(ua?: string): boolean;
+export declare function _isIE10(): boolean;
+export declare function _isMobileBrowser(ua?: string): boolean;
+export declare function _isIframe(): boolean;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts
new file mode 100644
index 0000000..6358c7e
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts
@@ -0,0 +1,31 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export declare const enum DelayMin {
+ OFFLINE = 5000
+}
+/**
+ * A structure to help pick between a range of long and short delay durations
+ * depending on the current environment. In general, the long delay is used for
+ * mobile environments whereas short delays are used for desktop environments.
+ */
+export declare class Delay {
+ private readonly shortDelay;
+ private readonly longDelay;
+ private readonly isMobile;
+ constructor(shortDelay: number, longDelay: number);
+ get(): number;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts
new file mode 100644
index 0000000..068c50a
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts
@@ -0,0 +1,18 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { ConfigInternal } from '../../model/auth';
+export declare function _emulatorUrl(config: ConfigInternal, path?: string): string;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts
new file mode 100644
index 0000000..a235857
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts
@@ -0,0 +1,17 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export declare function _generateEventId(prefix?: string, digits?: number): string;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts
new file mode 100644
index 0000000..b30fc05
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts
@@ -0,0 +1,25 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export declare class FetchProvider {
+ private static fetchImpl;
+ private static headersImpl;
+ private static responseImpl;
+ static initialize(fetchImpl: typeof fetch, headersImpl?: typeof Headers, responseImpl?: typeof Response): void;
+ static fetch(): typeof fetch;
+ static headers(): typeof Headers;
+ static response(): typeof Response;
+}
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts
new file mode 100644
index 0000000..d5ff063
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts
@@ -0,0 +1,20 @@
+/**
+ * @license
+ * Copyright 2021 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthProvider } from '../../model/public_types';
+import { AuthInternal } from '../../model/auth';
+import { AuthEventType } from '../../model/popup_redirect';
+export declare function _getRedirectUrl(auth: AuthInternal, provider: AuthProvider, authType: AuthEventType, redirectUrl?: string, eventId?: string, additionalParams?: Record<string, string>): Promise<string>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts
new file mode 100644
index 0000000..33e7c95
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts
@@ -0,0 +1,28 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/**
+ * Our API has a lot of one-off constants that are used to do things.
+ * Unfortunately we can't export these as classes instantiated directly since
+ * the constructor may side effect and therefore can't be proven to be safely
+ * culled. Instead, we export these classes themselves as a lowerCamelCase
+ * constant, and instantiate them under the hood.
+ */
+export interface SingletonInstantiator<T> {
+ new (): T;
+}
+export declare function _getInstance<T>(cls: unknown): T;
+export declare function _clearInstanceMap(): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts
new file mode 100644
index 0000000..c79ac38
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts
@@ -0,0 +1,19 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export declare function _getCurrentUrl(): string;
+export declare function _isHttpOrHttps(): boolean;
+export declare function _getCurrentScheme(): string | null;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts
new file mode 100644
index 0000000..b65ea5c
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts
@@ -0,0 +1,23 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { LogLevel } from '@firebase/logger';
+export { LogLevel };
+export declare function _getLogLevel(): LogLevel;
+export declare function _setLogLevel(newLevel: LogLevel): void;
+export declare function _logDebug(msg: string, ...args: string[]): void;
+export declare function _logWarn(msg: string, ...args: string[]): void;
+export declare function _logError(msg: string, ...args: string[]): void;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts
new file mode 100644
index 0000000..ac91633
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts
@@ -0,0 +1,21 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+/**
+ * Determine whether the browser is working online
+ */
+export declare function _isOnline(): boolean;
+export declare function _getUserLanguage(): string | null;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts
new file mode 100644
index 0000000..c2ffdb3
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts
@@ -0,0 +1,23 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export interface ProviderAssociatedObject {
+ providerId?: string;
+}
+/**
+ * Takes a set of UserInfo provider data and converts it to a set of names
+ */
+export declare function providerDataAsNames<T extends ProviderAssociatedObject>(providerData: T[]): Set<string>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts
new file mode 100644
index 0000000..e7c2c7c
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts
@@ -0,0 +1,25 @@
+/**
+ * @license
+ * Copyright 2021 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { PopupRedirectResolver } from '../../model/public_types';
+import { AuthInternal } from '../../model/auth';
+import { PopupRedirectResolverInternal } from '../../model/popup_redirect';
+/**
+ * Chooses a popup/redirect resolver to use. This prefers the override (which
+ * is directly passed in), and falls back to the property set on the auth
+ * object. If neither are available, this function errors w/ an argument error.
+ */
+export declare function _withDefaultResolver(auth: AuthInternal, resolverOverride: PopupRedirectResolver | undefined): PopupRedirectResolverInternal;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts
new file mode 100644
index 0000000..d82976e
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts
@@ -0,0 +1,17 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export declare function utcTimestampToDateString(utcTimestamp?: string | number): string | undefined;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts
new file mode 100644
index 0000000..dde89b0
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts
@@ -0,0 +1,18 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+import { AuthInternal } from '../../model/auth';
+export declare function _validateOrigin(auth: AuthInternal): Promise<void>;
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts
new file mode 100644
index 0000000..342ceb5
--- /dev/null
+++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts
@@ -0,0 +1,31 @@
+/**
+ * @license
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+export declare const enum ClientImplementation {
+ CORE = "JsCore"
+}
+/**
+ * @internal
+ */
+export declare const enum ClientPlatform {
+ BROWSER = "Browser",
+ NODE = "Node",
+ REACT_NATIVE = "ReactNative",
+ CORDOVA = "Cordova",
+ WORKER = "Worker",
+ WEB_EXTENSION = "WebExtension"
+}
+export declare function _getClientVersion(clientPlatform: ClientPlatform, frameworks?: readonly string[]): string;