diff options
| author | altaf-creator <dev@altafcreator.com> | 2025-11-09 11:15:19 +0800 |
|---|---|---|
| committer | altaf-creator <dev@altafcreator.com> | 2025-11-09 11:15:19 +0800 |
| commit | 8eff962cab608341a6f2fedc640a0e32d96f26e2 (patch) | |
| tree | 05534d1a720ddc3691d346c69b4972555820a061 /frontend-old/node_modules/@firebase/auth/dist/src/core | |
pain
Diffstat (limited to 'frontend-old/node_modules/@firebase/auth/dist/src/core')
66 files changed, 3774 insertions, 0 deletions
diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts new file mode 100644 index 0000000..39f14b6 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/action_code_url.d.ts @@ -0,0 +1,73 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/** + * A utility class to parse email action URLs such as password reset, email verification, + * email link sign in, etc. + * + * @public + */ +export declare class ActionCodeURL { + /** + * The API key of the email action link. + */ + readonly apiKey: string; + /** + * The action code of the email action link. + */ + readonly code: string; + /** + * The continue URL of the email action link. Null if not provided. + */ + readonly continueUrl: string | null; + /** + * The language code of the email action link. Null if not provided. + */ + readonly languageCode: string | null; + /** + * The action performed by the email action link. It returns from one of the types from + * {@link ActionCodeInfo} + */ + readonly operation: string; + /** + * The tenant ID of the email action link. Null if the email action is from the parent project. + */ + readonly tenantId: string | null; + /** + * @param actionLink - The link from which to extract the URL. + * @returns The {@link ActionCodeURL} object, or null if the link is invalid. + * + * @internal + */ + constructor(actionLink: string); + /** + * Parses the email action link string and returns an {@link ActionCodeURL} if the link is valid, + * otherwise returns null. + * + * @param link - The email action link string. + * @returns The {@link ActionCodeURL} object, or null if the link is invalid. + * + * @public + */ + static parseLink(link: string): ActionCodeURL | null; +} +/** + * Parses the email action link string and returns an {@link ActionCodeURL} if + * the link is valid, otherwise returns null. + * + * @public + */ +export declare function parseActionCodeURL(link: string): ActionCodeURL | null; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts new file mode 100644 index 0000000..42edbc6 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_event_manager.d.ts @@ -0,0 +1,34 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthEvent, AuthEventConsumer, EventManager } from '../../model/popup_redirect'; +import { AuthInternal } from '../../model/auth'; +export declare class AuthEventManager implements EventManager { + private readonly auth; + private readonly cachedEventUids; + private readonly consumers; + protected queuedRedirectEvent: AuthEvent | null; + protected hasHandledPotentialRedirect: boolean; + private lastProcessedEventTime; + constructor(auth: AuthInternal); + registerConsumer(authEventConsumer: AuthEventConsumer): void; + unregisterConsumer(authEventConsumer: AuthEventConsumer): void; + onEvent(event: AuthEvent): boolean; + private sendToConsumer; + private isEventForConsumer; + private hasEventBeenHandled; + private saveEventToCache; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts new file mode 100644 index 0000000..87aab60 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/auth_impl.d.ts @@ -0,0 +1,133 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { _FirebaseService, FirebaseApp } from '@firebase/app'; +import { Provider } from '@firebase/component'; +import { AppCheckInternalComponentName } from '@firebase/app-check-interop-types'; +import { Auth, AuthErrorMap, AuthSettings, EmulatorConfig, NextOrObserver, Persistence, PopupRedirectResolver, User, CompleteFn, ErrorFn, Unsubscribe, PasswordValidationStatus } from '../../model/public_types'; +import { ErrorFactory } from '@firebase/util'; +import { AuthInternal, ConfigInternal } from '../../model/auth'; +import { PopupRedirectResolverInternal } from '../../model/popup_redirect'; +import { UserInternal } from '../../model/user'; +import { AuthErrorCode, AuthErrorParams } from '../errors'; +import { PersistenceInternal } from '../persistence'; +import { RecaptchaConfig } from '../../platform_browser/recaptcha/recaptcha'; +import { PasswordPolicyInternal } from '../../model/password_policy'; +export declare const enum DefaultConfig { + TOKEN_API_HOST = "securetoken.googleapis.com", + API_HOST = "identitytoolkit.googleapis.com", + API_SCHEME = "https" +} +export declare class AuthImpl implements AuthInternal, _FirebaseService { + readonly app: FirebaseApp; + private readonly heartbeatServiceProvider; + private readonly appCheckServiceProvider; + readonly config: ConfigInternal; + currentUser: User | null; + emulatorConfig: EmulatorConfig | null; + private operations; + private persistenceManager?; + private redirectPersistenceManager?; + private authStateSubscription; + private idTokenSubscription; + private readonly beforeStateQueue; + private redirectUser; + private isProactiveRefreshEnabled; + private readonly EXPECTED_PASSWORD_POLICY_SCHEMA_VERSION; + _canInitEmulator: boolean; + _isInitialized: boolean; + _deleted: boolean; + _initializationPromise: Promise<void> | null; + _popupRedirectResolver: PopupRedirectResolverInternal | null; + _errorFactory: ErrorFactory<AuthErrorCode, AuthErrorParams>; + _agentRecaptchaConfig: RecaptchaConfig | null; + _tenantRecaptchaConfigs: Record<string, RecaptchaConfig>; + _projectPasswordPolicy: PasswordPolicyInternal | null; + _tenantPasswordPolicies: Record<string, PasswordPolicyInternal>; + _resolvePersistenceManagerAvailable: ((value: void | PromiseLike<void>) => void) | undefined; + _persistenceManagerAvailable: Promise<void>; + readonly name: string; + private lastNotifiedUid; + languageCode: string | null; + tenantId: string | null; + settings: AuthSettings; + constructor(app: FirebaseApp, heartbeatServiceProvider: Provider<'heartbeat'>, appCheckServiceProvider: Provider<AppCheckInternalComponentName>, config: ConfigInternal); + _initializeWithPersistence(persistenceHierarchy: PersistenceInternal[], popupRedirectResolver?: PopupRedirectResolver): Promise<void>; + /** + * If the persistence is changed in another window, the user manager will let us know + */ + _onStorageEvent(): Promise<void>; + private initializeCurrentUserFromIdToken; + private initializeCurrentUser; + private tryRedirectSignIn; + private reloadAndSetCurrentUserOrClear; + useDeviceLanguage(): void; + _delete(): Promise<void>; + updateCurrentUser(userExtern: User | null): Promise<void>; + _updateCurrentUser(user: User | null, skipBeforeStateCallbacks?: boolean): Promise<void>; + signOut(): Promise<void>; + setPersistence(persistence: Persistence): Promise<void>; + _getRecaptchaConfig(): RecaptchaConfig | null; + validatePassword(password: string): Promise<PasswordValidationStatus>; + _getPasswordPolicyInternal(): PasswordPolicyInternal | null; + _updatePasswordPolicy(): Promise<void>; + _getPersistenceType(): string; + _getPersistence(): PersistenceInternal; + _updateErrorMap(errorMap: AuthErrorMap): void; + onAuthStateChanged(nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe; + beforeAuthStateChanged(callback: (user: User | null) => void | Promise<void>, onAbort?: () => void): Unsubscribe; + onIdTokenChanged(nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe; + authStateReady(): Promise<void>; + /** + * Revokes the given access token. Currently only supports Apple OAuth access tokens. + */ + revokeAccessToken(token: string): Promise<void>; + toJSON(): object; + _setRedirectUser(user: UserInternal | null, popupRedirectResolver?: PopupRedirectResolver): Promise<void>; + private getOrInitRedirectPersistenceManager; + _redirectUserForId(id: string): Promise<UserInternal | null>; + _persistUserIfCurrent(user: UserInternal): Promise<void>; + /** Notifies listeners only if the user is current */ + _notifyListenersIfCurrent(user: UserInternal): void; + _key(): string; + _startProactiveRefresh(): void; + _stopProactiveRefresh(): void; + /** Returns the current user cast as the internal type */ + get _currentUser(): UserInternal; + private notifyAuthListeners; + private registerStateListener; + /** + * Unprotected (from race conditions) method to set the current user. This + * should only be called from within a queued callback. This is necessary + * because the queue shouldn't rely on another queued callback. + */ + private directlySetCurrentUser; + private queue; + private get assertedPersistence(); + private frameworks; + private clientVersion; + _logFramework(framework: string): void; + _getFrameworks(): readonly string[]; + _getAdditionalHeaders(): Promise<Record<string, string>>; + _getAppCheckToken(): Promise<string | undefined>; +} +/** + * Method to be used to cast down to our private implementation of Auth. + * It will also handle unwrapping from the compat type if necessary + * + * @param auth Auth object passed in from developer + */ +export declare function _castAuth(auth: Auth): AuthInternal; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts new file mode 100644 index 0000000..56dd81c --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/emulator.d.ts @@ -0,0 +1,42 @@ +/** + * @license + * Copyright 2021 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Auth } from '../../model/public_types'; +/** + * Changes the {@link Auth} instance to communicate with the Firebase Auth Emulator, instead of production + * Firebase Auth services. + * + * @remarks + * This must be called synchronously immediately following the first call to + * {@link initializeAuth}. Do not use with production credentials as emulator + * traffic is not encrypted. + * + * + * @example + * ```javascript + * connectAuthEmulator(auth, 'http://127.0.0.1:9099', { disableWarnings: true }); + * ``` + * + * @param auth - The {@link Auth} instance. + * @param url - The URL at which the emulator is running (eg, 'http://localhost:9099'). + * @param options - Optional. `options.disableWarnings` defaults to `false`. Set it to + * `true` to disable the warning banner attached to the DOM. + * + * @public + */ +export declare function connectAuthEmulator(auth: Auth, url: string, options?: { + disableWarnings: boolean; +}): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts new file mode 100644 index 0000000..9a68c98 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/firebase_internal.d.ts @@ -0,0 +1,35 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { FirebaseAuthInternal } from '@firebase/auth-interop-types'; +import { AuthInternal } from '../../model/auth'; +interface TokenListener { + (tok: string | null): unknown; +} +export declare class AuthInterop implements FirebaseAuthInternal { + private readonly auth; + private readonly internalListeners; + constructor(auth: AuthInternal); + getUid(): string | null; + getToken(forceRefresh?: boolean): Promise<{ + accessToken: string; + } | null>; + addAuthTokenListener(listener: TokenListener): void; + removeAuthTokenListener(listener: TokenListener): void; + private assertAuthConfigured; + private updateProactiveRefresh; +} +export {}; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts new file mode 100644 index 0000000..3dd0e1e --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/initialize.d.ts @@ -0,0 +1,46 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { FirebaseApp } from '@firebase/app'; +import { Auth, Dependencies } from '../../model/public_types'; +import { AuthImpl } from './auth_impl'; +/** + * Initializes an {@link Auth} instance with fine-grained control over + * {@link Dependencies}. + * + * @remarks + * + * This function allows more control over the {@link Auth} instance than + * {@link getAuth}. `getAuth` uses platform-specific defaults to supply + * the {@link Dependencies}. In general, `getAuth` is the easiest way to + * initialize Auth and works for most use cases. Use `initializeAuth` if you + * need control over which persistence layer is used, or to minimize bundle + * size if you're not using either `signInWithPopup` or `signInWithRedirect`. + * + * For example, if your app only uses anonymous accounts and you only want + * accounts saved for the current session, initialize `Auth` with: + * + * ```js + * const auth = initializeAuth(app, { + * persistence: browserSessionPersistence, + * popupRedirectResolver: undefined, + * }); + * ``` + * + * @public + */ +export declare function initializeAuth(app: FirebaseApp, deps?: Dependencies): Auth; +export declare function _initializeAuthInstance(auth: AuthImpl, deps?: Dependencies): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts new file mode 100644 index 0000000..74c4183 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/middleware.d.ts @@ -0,0 +1,25 @@ +/** + * @license + * Copyright 2022 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +import { Unsubscribe, User } from '../../model/public_types'; +export declare class AuthMiddlewareQueue { + private readonly auth; + private readonly queue; + constructor(auth: AuthInternal); + pushCallback(callback: (user: User | null) => void | Promise<void>, onAbort?: () => void): Unsubscribe; + runMiddleware(nextUser: User | null): Promise<void>; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts new file mode 100644 index 0000000..45a8127 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/password_policy_impl.d.ts @@ -0,0 +1,59 @@ +/** + * @license + * Copyright 2023 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { GetPasswordPolicyResponse } from '../../api/password_policy/get_password_policy'; +import { PasswordPolicyCustomStrengthOptions, PasswordPolicyInternal } from '../../model/password_policy'; +import { PasswordValidationStatus } from '../../model/public_types'; +/** + * Stores password policy requirements and provides password validation against the policy. + * + * @internal + */ +export declare class PasswordPolicyImpl implements PasswordPolicyInternal { + readonly customStrengthOptions: PasswordPolicyCustomStrengthOptions; + readonly allowedNonAlphanumericCharacters: string; + readonly enforcementState: string; + readonly forceUpgradeOnSignin: boolean; + readonly schemaVersion: number; + constructor(response: GetPasswordPolicyResponse); + validatePassword(password: string): PasswordValidationStatus; + /** + * Validates that the password meets the length options for the policy. + * + * @param password Password to validate. + * @param status Validation status. + */ + private validatePasswordLengthOptions; + /** + * Validates that the password meets the character options for the policy. + * + * @param password Password to validate. + * @param status Validation status. + */ + private validatePasswordCharacterOptions; + /** + * Updates the running validation status with the statuses for the character options. + * Expected to be called each time a character is processed to update each option status + * based on the current character. + * + * @param status Validation status. + * @param containsLowercaseCharacter Whether the character is a lowercase letter. + * @param containsUppercaseCharacter Whether the character is an uppercase letter. + * @param containsNumericCharacter Whether the character is a numeric character. + * @param containsNonAlphanumericCharacter Whether the character is a non-alphanumeric character. + */ + private updatePasswordCharacterOptionsStatuses; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts new file mode 100644 index 0000000..260c739 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/auth/register.d.ts @@ -0,0 +1,23 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ClientPlatform } from '../util/version'; +export declare const enum _ComponentName { + AUTH = "auth", + AUTH_INTERNAL = "auth-internal" +} +/** @internal */ +export declare function registerAuth(clientPlatform: ClientPlatform): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts new file mode 100644 index 0000000..1287582 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/auth_credential.d.ts @@ -0,0 +1,75 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { PhoneOrOauthTokenResponse } from '../../api/authentication/mfa'; +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +/** + * Interface that represents the credentials returned by an {@link AuthProvider}. + * + * @remarks + * Implementations specify the details about each auth provider's credential requirements. + * + * @public + */ +export declare class AuthCredential { + /** + * The authentication provider ID for the credential. + * + * @remarks + * For example, 'facebook.com', or 'google.com'. + */ + readonly providerId: string; + /** + * The authentication sign in method for the credential. + * + * @remarks + * For example, {@link SignInMethod}.EMAIL_PASSWORD, or + * {@link SignInMethod}.EMAIL_LINK. This corresponds to the sign-in method + * identifier as returned in {@link fetchSignInMethodsForEmail}. + */ + readonly signInMethod: string; + /** @internal */ + protected constructor( + /** + * The authentication provider ID for the credential. + * + * @remarks + * For example, 'facebook.com', or 'google.com'. + */ + providerId: string, + /** + * The authentication sign in method for the credential. + * + * @remarks + * For example, {@link SignInMethod}.EMAIL_PASSWORD, or + * {@link SignInMethod}.EMAIL_LINK. This corresponds to the sign-in method + * identifier as returned in {@link fetchSignInMethodsForEmail}. + */ + signInMethod: string); + /** + * Returns a JSON-serializable representation of this object. + * + * @returns a JSON-serializable representation of this object. + */ + toJSON(): object; + /** @internal */ + _getIdTokenResponse(_auth: AuthInternal): Promise<PhoneOrOauthTokenResponse>; + /** @internal */ + _linkToIdToken(_auth: AuthInternal, _idToken: string): Promise<IdTokenResponse>; + /** @internal */ + _getReauthenticationResolver(_auth: AuthInternal): Promise<IdTokenResponse>; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts new file mode 100644 index 0000000..0f44811 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/email.d.ts @@ -0,0 +1,60 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +import { AuthCredential } from './auth_credential'; +/** + * Interface that represents the credentials returned by {@link EmailAuthProvider} for + * {@link ProviderId}.PASSWORD + * + * @remarks + * Covers both {@link SignInMethod}.EMAIL_PASSWORD and + * {@link SignInMethod}.EMAIL_LINK. + * + * @public + */ +export declare class EmailAuthCredential extends AuthCredential { + /** @internal */ + readonly _email: string; + /** @internal */ + readonly _password: string; + /** @internal */ + readonly _tenantId: string | null; + /** @internal */ + private constructor(); + /** @internal */ + static _fromEmailAndPassword(email: string, password: string): EmailAuthCredential; + /** @internal */ + static _fromEmailAndCode(email: string, oobCode: string, tenantId?: string | null): EmailAuthCredential; + /** {@inheritdoc AuthCredential.toJSON} */ + toJSON(): object; + /** + * Static method to deserialize a JSON representation of an object into an {@link AuthCredential}. + * + * @param json - Either `object` or the stringified representation of the object. When string is + * provided, `JSON.parse` would be called first. + * + * @returns If the JSON input does not represent an {@link AuthCredential}, null is returned. + */ + static fromJSON(json: object | string): EmailAuthCredential | null; + /** @internal */ + _getIdTokenResponse(auth: AuthInternal): Promise<IdTokenResponse>; + /** @internal */ + _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>; + /** @internal */ + _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts new file mode 100644 index 0000000..475dee6 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/index.d.ts @@ -0,0 +1,23 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/** + * This file is required due to the circular dependency from the parent class to its children + */ +export { AuthCredential } from './auth_credential'; +export { EmailAuthCredential } from './email'; +export { OAuthCredential } from './oauth'; +export { PhoneAuthCredential as PhoneAuthCredential } from './phone'; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts new file mode 100644 index 0000000..96a1928 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/oauth.d.ts @@ -0,0 +1,81 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +import { AuthCredential } from './auth_credential'; +export interface OAuthCredentialParams { + idToken?: string | null; + accessToken?: string | null; + oauthToken?: string; + secret?: string; + oauthTokenSecret?: string; + nonce?: string; + pendingToken?: string; + providerId: string; + signInMethod: string; +} +/** + * Represents the OAuth credentials returned by an {@link OAuthProvider}. + * + * @remarks + * Implementations specify the details about each auth provider's credential requirements. + * + * @public + */ +export declare class OAuthCredential extends AuthCredential { + /** + * The OAuth ID token associated with the credential if it belongs to an OIDC provider, + * such as `google.com`. + * @readonly + */ + idToken?: string; + /** + * The OAuth access token associated with the credential if it belongs to an + * {@link OAuthProvider}, such as `facebook.com`, `twitter.com`, etc. + * @readonly + */ + accessToken?: string; + /** + * The OAuth access token secret associated with the credential if it belongs to an OAuth 1.0 + * provider, such as `twitter.com`. + * @readonly + */ + secret?: string; + private nonce?; + private pendingToken; + /** @internal */ + static _fromParams(params: OAuthCredentialParams): OAuthCredential; + /** {@inheritdoc AuthCredential.toJSON} */ + toJSON(): object; + /** + * Static method to deserialize a JSON representation of an object into an + * {@link AuthCredential}. + * + * @param json - Input can be either Object or the stringified representation of the object. + * When string is provided, JSON.parse would be called first. + * + * @returns If the JSON input does not represent an {@link AuthCredential}, null is returned. + */ + static fromJSON(json: string | object): OAuthCredential | null; + /** @internal */ + _getIdTokenResponse(auth: AuthInternal): Promise<IdTokenResponse>; + /** @internal */ + _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>; + /** @internal */ + _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>; + private buildRequest; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts new file mode 100644 index 0000000..1924744 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/phone.d.ts @@ -0,0 +1,52 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { PhoneOrOauthTokenResponse } from '../../api/authentication/mfa'; +import { SignInWithPhoneNumberRequest } from '../../api/authentication/sms'; +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +import { AuthCredential } from './auth_credential'; +export interface PhoneAuthCredentialParameters { + verificationId?: string; + verificationCode?: string; + phoneNumber?: string; + temporaryProof?: string; +} +/** + * Represents the credentials returned by {@link PhoneAuthProvider}. + * + * @public + */ +export declare class PhoneAuthCredential extends AuthCredential { + private readonly params; + private constructor(); + /** @internal */ + static _fromVerification(verificationId: string, verificationCode: string): PhoneAuthCredential; + /** @internal */ + static _fromTokenResponse(phoneNumber: string, temporaryProof: string): PhoneAuthCredential; + /** @internal */ + _getIdTokenResponse(auth: AuthInternal): Promise<PhoneOrOauthTokenResponse>; + /** @internal */ + _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>; + /** @internal */ + _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>; + /** @internal */ + _makeVerificationRequest(): SignInWithPhoneNumberRequest; + /** {@inheritdoc AuthCredential.toJSON} */ + toJSON(): object; + /** Generates a phone credential based on a plain object or a JSON string. */ + static fromJSON(json: object | string): PhoneAuthCredential | null; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts new file mode 100644 index 0000000..54fea84 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/credentials/saml.d.ts @@ -0,0 +1,52 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +import { AuthCredential } from './auth_credential'; +/** + * @public + */ +export declare class SAMLAuthCredential extends AuthCredential { + private readonly pendingToken; + /** @internal */ + private constructor(); + /** @internal */ + _getIdTokenResponse(auth: AuthInternal): Promise<IdTokenResponse>; + /** @internal */ + _linkToIdToken(auth: AuthInternal, idToken: string): Promise<IdTokenResponse>; + /** @internal */ + _getReauthenticationResolver(auth: AuthInternal): Promise<IdTokenResponse>; + /** {@inheritdoc AuthCredential.toJSON} */ + toJSON(): object; + /** + * Static method to deserialize a JSON representation of an object into an + * {@link AuthCredential}. + * + * @param json - Input can be either Object or the stringified representation of the object. + * When string is provided, JSON.parse would be called first. + * + * @returns If the JSON input does not represent an {@link AuthCredential}, null is returned. + */ + static fromJSON(json: string | object): SAMLAuthCredential | null; + /** + * Helper static method to avoid exposing the constructor to end users. + * + * @internal + */ + static _create(providerId: string, pendingToken: string): SAMLAuthCredential; + private buildRequest; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts new file mode 100644 index 0000000..3d81b3a --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/errors.d.ts @@ -0,0 +1,328 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthErrorMap, User } from '../model/public_types'; +import { ErrorFactory, ErrorMap } from '@firebase/util'; +import { IdTokenMfaResponse } from '../api/authentication/mfa'; +import { AppName } from '../model/auth'; +import { AuthCredential } from './credentials'; +/** + * Enumeration of Firebase Auth error codes. + * + * @internal + */ +export declare const enum AuthErrorCode { + ADMIN_ONLY_OPERATION = "admin-restricted-operation", + ARGUMENT_ERROR = "argument-error", + APP_NOT_AUTHORIZED = "app-not-authorized", + APP_NOT_INSTALLED = "app-not-installed", + CAPTCHA_CHECK_FAILED = "captcha-check-failed", + CODE_EXPIRED = "code-expired", + CORDOVA_NOT_READY = "cordova-not-ready", + CORS_UNSUPPORTED = "cors-unsupported", + CREDENTIAL_ALREADY_IN_USE = "credential-already-in-use", + CREDENTIAL_MISMATCH = "custom-token-mismatch", + CREDENTIAL_TOO_OLD_LOGIN_AGAIN = "requires-recent-login", + DEPENDENT_SDK_INIT_BEFORE_AUTH = "dependent-sdk-initialized-before-auth", + DYNAMIC_LINK_NOT_ACTIVATED = "dynamic-link-not-activated", + EMAIL_CHANGE_NEEDS_VERIFICATION = "email-change-needs-verification", + EMAIL_EXISTS = "email-already-in-use", + EMULATOR_CONFIG_FAILED = "emulator-config-failed", + EXPIRED_OOB_CODE = "expired-action-code", + EXPIRED_POPUP_REQUEST = "cancelled-popup-request", + INTERNAL_ERROR = "internal-error", + INVALID_API_KEY = "invalid-api-key", + INVALID_APP_CREDENTIAL = "invalid-app-credential", + INVALID_APP_ID = "invalid-app-id", + INVALID_AUTH = "invalid-user-token", + INVALID_AUTH_EVENT = "invalid-auth-event", + INVALID_CERT_HASH = "invalid-cert-hash", + INVALID_CODE = "invalid-verification-code", + INVALID_CONTINUE_URI = "invalid-continue-uri", + INVALID_CORDOVA_CONFIGURATION = "invalid-cordova-configuration", + INVALID_CUSTOM_TOKEN = "invalid-custom-token", + INVALID_DYNAMIC_LINK_DOMAIN = "invalid-dynamic-link-domain", + INVALID_EMAIL = "invalid-email", + INVALID_EMULATOR_SCHEME = "invalid-emulator-scheme", + INVALID_CREDENTIAL = "invalid-credential", + INVALID_MESSAGE_PAYLOAD = "invalid-message-payload", + INVALID_MFA_SESSION = "invalid-multi-factor-session", + INVALID_OAUTH_CLIENT_ID = "invalid-oauth-client-id", + INVALID_OAUTH_PROVIDER = "invalid-oauth-provider", + INVALID_OOB_CODE = "invalid-action-code", + INVALID_ORIGIN = "unauthorized-domain", + INVALID_PASSWORD = "wrong-password", + INVALID_PERSISTENCE = "invalid-persistence-type", + INVALID_PHONE_NUMBER = "invalid-phone-number", + INVALID_PROVIDER_ID = "invalid-provider-id", + INVALID_RECIPIENT_EMAIL = "invalid-recipient-email", + INVALID_SENDER = "invalid-sender", + INVALID_SESSION_INFO = "invalid-verification-id", + INVALID_TENANT_ID = "invalid-tenant-id", + LOGIN_BLOCKED = "login-blocked", + MFA_INFO_NOT_FOUND = "multi-factor-info-not-found", + MFA_REQUIRED = "multi-factor-auth-required", + MISSING_ANDROID_PACKAGE_NAME = "missing-android-pkg-name", + MISSING_APP_CREDENTIAL = "missing-app-credential", + MISSING_AUTH_DOMAIN = "auth-domain-config-required", + MISSING_CODE = "missing-verification-code", + MISSING_CONTINUE_URI = "missing-continue-uri", + MISSING_IFRAME_START = "missing-iframe-start", + MISSING_IOS_BUNDLE_ID = "missing-ios-bundle-id", + MISSING_OR_INVALID_NONCE = "missing-or-invalid-nonce", + MISSING_MFA_INFO = "missing-multi-factor-info", + MISSING_MFA_SESSION = "missing-multi-factor-session", + MISSING_PHONE_NUMBER = "missing-phone-number", + MISSING_PASSWORD = "missing-password", + MISSING_SESSION_INFO = "missing-verification-id", + MODULE_DESTROYED = "app-deleted", + NEED_CONFIRMATION = "account-exists-with-different-credential", + NETWORK_REQUEST_FAILED = "network-request-failed", + NULL_USER = "null-user", + NO_AUTH_EVENT = "no-auth-event", + NO_SUCH_PROVIDER = "no-such-provider", + OPERATION_NOT_ALLOWED = "operation-not-allowed", + OPERATION_NOT_SUPPORTED = "operation-not-supported-in-this-environment", + POPUP_BLOCKED = "popup-blocked", + POPUP_CLOSED_BY_USER = "popup-closed-by-user", + PROVIDER_ALREADY_LINKED = "provider-already-linked", + QUOTA_EXCEEDED = "quota-exceeded", + REDIRECT_CANCELLED_BY_USER = "redirect-cancelled-by-user", + REDIRECT_OPERATION_PENDING = "redirect-operation-pending", + REJECTED_CREDENTIAL = "rejected-credential", + SECOND_FACTOR_ALREADY_ENROLLED = "second-factor-already-in-use", + SECOND_FACTOR_LIMIT_EXCEEDED = "maximum-second-factor-count-exceeded", + TENANT_ID_MISMATCH = "tenant-id-mismatch", + TIMEOUT = "timeout", + TOKEN_EXPIRED = "user-token-expired", + TOO_MANY_ATTEMPTS_TRY_LATER = "too-many-requests", + UNAUTHORIZED_DOMAIN = "unauthorized-continue-uri", + UNSUPPORTED_FIRST_FACTOR = "unsupported-first-factor", + UNSUPPORTED_PERSISTENCE = "unsupported-persistence-type", + UNSUPPORTED_TENANT_OPERATION = "unsupported-tenant-operation", + UNVERIFIED_EMAIL = "unverified-email", + USER_CANCELLED = "user-cancelled", + USER_DELETED = "user-not-found", + USER_DISABLED = "user-disabled", + USER_MISMATCH = "user-mismatch", + USER_SIGNED_OUT = "user-signed-out", + WEAK_PASSWORD = "weak-password", + WEB_STORAGE_UNSUPPORTED = "web-storage-unsupported", + ALREADY_INITIALIZED = "already-initialized", + RECAPTCHA_NOT_ENABLED = "recaptcha-not-enabled", + MISSING_RECAPTCHA_TOKEN = "missing-recaptcha-token", + INVALID_RECAPTCHA_TOKEN = "invalid-recaptcha-token", + INVALID_RECAPTCHA_ACTION = "invalid-recaptcha-action", + MISSING_CLIENT_TYPE = "missing-client-type", + MISSING_RECAPTCHA_VERSION = "missing-recaptcha-version", + INVALID_RECAPTCHA_VERSION = "invalid-recaptcha-version", + INVALID_REQ_TYPE = "invalid-req-type", + UNSUPPORTED_PASSWORD_POLICY_SCHEMA_VERSION = "unsupported-password-policy-schema-version", + PASSWORD_DOES_NOT_MEET_REQUIREMENTS = "password-does-not-meet-requirements", + INVALID_HOSTING_LINK_DOMAIN = "invalid-hosting-link-domain" +} +export interface ErrorMapRetriever extends AuthErrorMap { + (): ErrorMap<AuthErrorCode>; +} +/** + * A verbose error map with detailed descriptions for most error codes. + * + * See discussion at {@link AuthErrorMap} + * + * @public + */ +export declare const debugErrorMap: AuthErrorMap; +/** + * A minimal error map with all verbose error messages stripped. + * + * See discussion at {@link AuthErrorMap} + * + * @public + */ +export declare const prodErrorMap: AuthErrorMap; +export interface NamedErrorParams { + appName: AppName; + credential?: AuthCredential; + email?: string; + phoneNumber?: string; + tenantId?: string; + user?: User; + _serverResponse?: object; +} +/** + * @internal + */ +type GenericAuthErrorParams = { + [key in Exclude<AuthErrorCode, AuthErrorCode.ARGUMENT_ERROR | AuthErrorCode.DEPENDENT_SDK_INIT_BEFORE_AUTH | AuthErrorCode.INTERNAL_ERROR | AuthErrorCode.MFA_REQUIRED | AuthErrorCode.NO_AUTH_EVENT | AuthErrorCode.OPERATION_NOT_SUPPORTED>]: { + appName?: AppName; + email?: string; + phoneNumber?: string; + message?: string; + }; +}; +/** + * @internal + */ +export interface AuthErrorParams extends GenericAuthErrorParams { + [AuthErrorCode.ARGUMENT_ERROR]: { + appName?: AppName; + }; + [AuthErrorCode.DEPENDENT_SDK_INIT_BEFORE_AUTH]: { + appName?: AppName; + }; + [AuthErrorCode.INTERNAL_ERROR]: { + appName?: AppName; + }; + [AuthErrorCode.LOGIN_BLOCKED]: { + appName?: AppName; + originalMessage?: string; + }; + [AuthErrorCode.OPERATION_NOT_SUPPORTED]: { + appName?: AppName; + }; + [AuthErrorCode.NO_AUTH_EVENT]: { + appName?: AppName; + }; + [AuthErrorCode.MFA_REQUIRED]: { + appName: AppName; + _serverResponse: IdTokenMfaResponse; + }; + [AuthErrorCode.INVALID_CORDOVA_CONFIGURATION]: { + appName: AppName; + missingPlugin?: string; + }; +} +export declare const _DEFAULT_AUTH_ERROR_FACTORY: ErrorFactory<AuthErrorCode, AuthErrorParams>; +/** + * A map of potential `Auth` error codes, for easier comparison with errors + * thrown by the SDK. + * + * @remarks + * Note that you can't tree-shake individual keys + * in the map, so by using the map you might substantially increase your + * bundle size. + * + * @public + */ +export declare const AUTH_ERROR_CODES_MAP_DO_NOT_USE_INTERNALLY: { + readonly ADMIN_ONLY_OPERATION: "auth/admin-restricted-operation"; + readonly ARGUMENT_ERROR: "auth/argument-error"; + readonly APP_NOT_AUTHORIZED: "auth/app-not-authorized"; + readonly APP_NOT_INSTALLED: "auth/app-not-installed"; + readonly CAPTCHA_CHECK_FAILED: "auth/captcha-check-failed"; + readonly CODE_EXPIRED: "auth/code-expired"; + readonly CORDOVA_NOT_READY: "auth/cordova-not-ready"; + readonly CORS_UNSUPPORTED: "auth/cors-unsupported"; + readonly CREDENTIAL_ALREADY_IN_USE: "auth/credential-already-in-use"; + readonly CREDENTIAL_MISMATCH: "auth/custom-token-mismatch"; + readonly CREDENTIAL_TOO_OLD_LOGIN_AGAIN: "auth/requires-recent-login"; + readonly DEPENDENT_SDK_INIT_BEFORE_AUTH: "auth/dependent-sdk-initialized-before-auth"; + readonly DYNAMIC_LINK_NOT_ACTIVATED: "auth/dynamic-link-not-activated"; + readonly EMAIL_CHANGE_NEEDS_VERIFICATION: "auth/email-change-needs-verification"; + readonly EMAIL_EXISTS: "auth/email-already-in-use"; + readonly EMULATOR_CONFIG_FAILED: "auth/emulator-config-failed"; + readonly EXPIRED_OOB_CODE: "auth/expired-action-code"; + readonly EXPIRED_POPUP_REQUEST: "auth/cancelled-popup-request"; + readonly INTERNAL_ERROR: "auth/internal-error"; + readonly INVALID_API_KEY: "auth/invalid-api-key"; + readonly INVALID_APP_CREDENTIAL: "auth/invalid-app-credential"; + readonly INVALID_APP_ID: "auth/invalid-app-id"; + readonly INVALID_AUTH: "auth/invalid-user-token"; + readonly INVALID_AUTH_EVENT: "auth/invalid-auth-event"; + readonly INVALID_CERT_HASH: "auth/invalid-cert-hash"; + readonly INVALID_CODE: "auth/invalid-verification-code"; + readonly INVALID_CONTINUE_URI: "auth/invalid-continue-uri"; + readonly INVALID_CORDOVA_CONFIGURATION: "auth/invalid-cordova-configuration"; + readonly INVALID_CUSTOM_TOKEN: "auth/invalid-custom-token"; + readonly INVALID_DYNAMIC_LINK_DOMAIN: "auth/invalid-dynamic-link-domain"; + readonly INVALID_EMAIL: "auth/invalid-email"; + readonly INVALID_EMULATOR_SCHEME: "auth/invalid-emulator-scheme"; + readonly INVALID_IDP_RESPONSE: "auth/invalid-credential"; + readonly INVALID_LOGIN_CREDENTIALS: "auth/invalid-credential"; + readonly INVALID_MESSAGE_PAYLOAD: "auth/invalid-message-payload"; + readonly INVALID_MFA_SESSION: "auth/invalid-multi-factor-session"; + readonly INVALID_OAUTH_CLIENT_ID: "auth/invalid-oauth-client-id"; + readonly INVALID_OAUTH_PROVIDER: "auth/invalid-oauth-provider"; + readonly INVALID_OOB_CODE: "auth/invalid-action-code"; + readonly INVALID_ORIGIN: "auth/unauthorized-domain"; + readonly INVALID_PASSWORD: "auth/wrong-password"; + readonly INVALID_PERSISTENCE: "auth/invalid-persistence-type"; + readonly INVALID_PHONE_NUMBER: "auth/invalid-phone-number"; + readonly INVALID_PROVIDER_ID: "auth/invalid-provider-id"; + readonly INVALID_RECIPIENT_EMAIL: "auth/invalid-recipient-email"; + readonly INVALID_SENDER: "auth/invalid-sender"; + readonly INVALID_SESSION_INFO: "auth/invalid-verification-id"; + readonly INVALID_TENANT_ID: "auth/invalid-tenant-id"; + readonly MFA_INFO_NOT_FOUND: "auth/multi-factor-info-not-found"; + readonly MFA_REQUIRED: "auth/multi-factor-auth-required"; + readonly MISSING_ANDROID_PACKAGE_NAME: "auth/missing-android-pkg-name"; + readonly MISSING_APP_CREDENTIAL: "auth/missing-app-credential"; + readonly MISSING_AUTH_DOMAIN: "auth/auth-domain-config-required"; + readonly MISSING_CODE: "auth/missing-verification-code"; + readonly MISSING_CONTINUE_URI: "auth/missing-continue-uri"; + readonly MISSING_IFRAME_START: "auth/missing-iframe-start"; + readonly MISSING_IOS_BUNDLE_ID: "auth/missing-ios-bundle-id"; + readonly MISSING_OR_INVALID_NONCE: "auth/missing-or-invalid-nonce"; + readonly MISSING_MFA_INFO: "auth/missing-multi-factor-info"; + readonly MISSING_MFA_SESSION: "auth/missing-multi-factor-session"; + readonly MISSING_PHONE_NUMBER: "auth/missing-phone-number"; + readonly MISSING_PASSWORD: "auth/missing-password"; + readonly MISSING_SESSION_INFO: "auth/missing-verification-id"; + readonly MODULE_DESTROYED: "auth/app-deleted"; + readonly NEED_CONFIRMATION: "auth/account-exists-with-different-credential"; + readonly NETWORK_REQUEST_FAILED: "auth/network-request-failed"; + readonly NULL_USER: "auth/null-user"; + readonly NO_AUTH_EVENT: "auth/no-auth-event"; + readonly NO_SUCH_PROVIDER: "auth/no-such-provider"; + readonly OPERATION_NOT_ALLOWED: "auth/operation-not-allowed"; + readonly OPERATION_NOT_SUPPORTED: "auth/operation-not-supported-in-this-environment"; + readonly POPUP_BLOCKED: "auth/popup-blocked"; + readonly POPUP_CLOSED_BY_USER: "auth/popup-closed-by-user"; + readonly PROVIDER_ALREADY_LINKED: "auth/provider-already-linked"; + readonly QUOTA_EXCEEDED: "auth/quota-exceeded"; + readonly REDIRECT_CANCELLED_BY_USER: "auth/redirect-cancelled-by-user"; + readonly REDIRECT_OPERATION_PENDING: "auth/redirect-operation-pending"; + readonly REJECTED_CREDENTIAL: "auth/rejected-credential"; + readonly SECOND_FACTOR_ALREADY_ENROLLED: "auth/second-factor-already-in-use"; + readonly SECOND_FACTOR_LIMIT_EXCEEDED: "auth/maximum-second-factor-count-exceeded"; + readonly TENANT_ID_MISMATCH: "auth/tenant-id-mismatch"; + readonly TIMEOUT: "auth/timeout"; + readonly TOKEN_EXPIRED: "auth/user-token-expired"; + readonly TOO_MANY_ATTEMPTS_TRY_LATER: "auth/too-many-requests"; + readonly UNAUTHORIZED_DOMAIN: "auth/unauthorized-continue-uri"; + readonly UNSUPPORTED_FIRST_FACTOR: "auth/unsupported-first-factor"; + readonly UNSUPPORTED_PERSISTENCE: "auth/unsupported-persistence-type"; + readonly UNSUPPORTED_TENANT_OPERATION: "auth/unsupported-tenant-operation"; + readonly UNVERIFIED_EMAIL: "auth/unverified-email"; + readonly USER_CANCELLED: "auth/user-cancelled"; + readonly USER_DELETED: "auth/user-not-found"; + readonly USER_DISABLED: "auth/user-disabled"; + readonly USER_MISMATCH: "auth/user-mismatch"; + readonly USER_SIGNED_OUT: "auth/user-signed-out"; + readonly WEAK_PASSWORD: "auth/weak-password"; + readonly WEB_STORAGE_UNSUPPORTED: "auth/web-storage-unsupported"; + readonly ALREADY_INITIALIZED: "auth/already-initialized"; + readonly RECAPTCHA_NOT_ENABLED: "auth/recaptcha-not-enabled"; + readonly MISSING_RECAPTCHA_TOKEN: "auth/missing-recaptcha-token"; + readonly INVALID_RECAPTCHA_TOKEN: "auth/invalid-recaptcha-token"; + readonly INVALID_RECAPTCHA_ACTION: "auth/invalid-recaptcha-action"; + readonly MISSING_CLIENT_TYPE: "auth/missing-client-type"; + readonly MISSING_RECAPTCHA_VERSION: "auth/missing-recaptcha-version"; + readonly INVALID_RECAPTCHA_VERSION: "auth/invalid-recaptcha-version"; + readonly INVALID_REQ_TYPE: "auth/invalid-req-type"; + readonly INVALID_HOSTING_LINK_DOMAIN: "auth/invalid-hosting-link-domain"; +}; +export {}; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts new file mode 100644 index 0000000..8829292 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/index.d.ts @@ -0,0 +1,230 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Auth, NextOrObserver, Persistence, User, CompleteFn, ErrorFn, Unsubscribe, PasswordValidationStatus } from '../model/public_types'; +export { debugErrorMap, prodErrorMap, AUTH_ERROR_CODES_MAP_DO_NOT_USE_INTERNALLY as AuthErrorCodes } from './errors'; +/** + * Changes the type of persistence on the {@link Auth} instance for the currently saved + * `Auth` session and applies this type of persistence for future sign-in requests, including + * sign-in with redirect requests. + * + * @remarks + * This makes it easy for a user signing in to specify whether their session should be + * remembered or not. It also makes it easier to never persist the `Auth` state for applications + * that are shared by other users or have sensitive data. + * + * This method does not work in a Node.js environment or with {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * @example + * ```javascript + * setPersistence(auth, browserSessionPersistence); + * ``` + * + * @param auth - The {@link Auth} instance. + * @param persistence - The {@link Persistence} to use. + * @returns A `Promise` that resolves once the persistence change has completed + * + * @public + */ +export declare function setPersistence(auth: Auth, persistence: Persistence): Promise<void>; +/** + * Loads the reCAPTCHA configuration into the `Auth` instance. + * + * @remarks + * This will load the reCAPTCHA config, which indicates whether the reCAPTCHA + * verification flow should be triggered for each auth provider, into the + * current Auth session. + * + * If initializeRecaptchaConfig() is not invoked, the auth flow will always start + * without reCAPTCHA verification. If the provider is configured to require reCAPTCHA + * verification, the SDK will transparently load the reCAPTCHA config and restart the + * auth flows. + * + * Thus, by calling this optional method, you will reduce the latency of future auth flows. + * Loading the reCAPTCHA config early will also enhance the signal collected by reCAPTCHA. + * + * This method does not work in a Node.js environment. + * + * @example + * ```javascript + * initializeRecaptchaConfig(auth); + * ``` + * + * @param auth - The {@link Auth} instance. + * + * @public + */ +export declare function initializeRecaptchaConfig(auth: Auth): Promise<void>; +/** + * Validates the password against the password policy configured for the project or tenant. + * + * @remarks + * If no tenant ID is set on the `Auth` instance, then this method will use the password + * policy configured for the project. Otherwise, this method will use the policy configured + * for the tenant. If a password policy has not been configured, then the default policy + * configured for all projects will be used. + * + * If an auth flow fails because a submitted password does not meet the password policy + * requirements and this method has previously been called, then this method will use the + * most recent policy available when called again. + * + * @example + * ```javascript + * validatePassword(auth, 'some-password'); + * ``` + * + * @param auth The {@link Auth} instance. + * @param password The password to validate. + * + * @public + */ +export declare function validatePassword(auth: Auth, password: string): Promise<PasswordValidationStatus>; +/** + * Adds an observer for changes to the signed-in user's ID token. + * + * @remarks + * This includes sign-in, sign-out, and token refresh events. + * This will not be triggered automatically upon ID token expiration. Use {@link User.getIdToken} to refresh the ID token. + * + * @param auth - The {@link Auth} instance. + * @param nextOrObserver - callback triggered on change. + * @param error - Deprecated. This callback is never triggered. Errors + * on signing in/out can be caught in promises returned from + * sign-in/sign-out functions. + * @param completed - Deprecated. This callback is never triggered. + * + * @public + */ +export declare function onIdTokenChanged(auth: Auth, nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe; +/** + * Adds a blocking callback that runs before an auth state change + * sets a new user. + * + * @param auth - The {@link Auth} instance. + * @param callback - callback triggered before new user value is set. + * If this throws, it blocks the user from being set. + * @param onAbort - callback triggered if a later `beforeAuthStateChanged()` + * callback throws, allowing you to undo any side effects. + */ +export declare function beforeAuthStateChanged(auth: Auth, callback: (user: User | null) => void | Promise<void>, onAbort?: () => void): Unsubscribe; +/** + * Adds an observer for changes to the user's sign-in state. + * + * @remarks + * To keep the old behavior, see {@link onIdTokenChanged}. + * + * @param auth - The {@link Auth} instance. + * @param nextOrObserver - callback triggered on change. + * @param error - Deprecated. This callback is never triggered. Errors + * on signing in/out can be caught in promises returned from + * sign-in/sign-out functions. + * @param completed - Deprecated. This callback is never triggered. + * + * @public + */ +export declare function onAuthStateChanged(auth: Auth, nextOrObserver: NextOrObserver<User>, error?: ErrorFn, completed?: CompleteFn): Unsubscribe; +/** + * Sets the current language to the default device/browser preference. + * + * @param auth - The {@link Auth} instance. + * + * @public + */ +export declare function useDeviceLanguage(auth: Auth): void; +/** + * Asynchronously sets the provided user as {@link Auth.currentUser} on the + * {@link Auth} instance. + * + * @remarks + * A new instance copy of the user provided will be made and set as currentUser. + * + * This will trigger {@link onAuthStateChanged} and {@link onIdTokenChanged} listeners + * like other sign in methods. + * + * The operation fails with an error if the user to be updated belongs to a different Firebase + * project. + * + * This method is not supported by {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * @param auth - The {@link Auth} instance. + * @param user - The new {@link User}. + * + * @public + */ +export declare function updateCurrentUser(auth: Auth, user: User | null): Promise<void>; +/** + * Signs out the current user. + * + * @remarks + * This method is not supported by {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * @param auth - The {@link Auth} instance. + * + * @public + */ +export declare function signOut(auth: Auth): Promise<void>; +/** + * Revokes the given access token. Currently only supports Apple OAuth access tokens. + * + * @param auth - The {@link Auth} instance. + * @param token - The Apple OAuth access token. + * + * @public + */ +export declare function revokeAccessToken(auth: Auth, token: string): Promise<void>; +export { initializeAuth } from './auth/initialize'; +export { connectAuthEmulator } from './auth/emulator'; +export { AuthCredential } from './credentials'; +export { EmailAuthCredential } from './credentials/email'; +export { OAuthCredential } from './credentials/oauth'; +export { PhoneAuthCredential } from './credentials/phone'; +export { inMemoryPersistence } from './persistence/in_memory'; +export { EmailAuthProvider } from './providers/email'; +export { FacebookAuthProvider } from './providers/facebook'; +export { CustomParameters } from './providers/federated'; +export { GoogleAuthProvider } from './providers/google'; +export { GithubAuthProvider } from './providers/github'; +export { OAuthProvider, OAuthCredentialOptions } from './providers/oauth'; +export { SAMLAuthProvider } from './providers/saml'; +export { TwitterAuthProvider } from './providers/twitter'; +export { signInAnonymously } from './strategies/anonymous'; +export { signInWithCredential, linkWithCredential, reauthenticateWithCredential } from './strategies/credential'; +export { signInWithCustomToken } from './strategies/custom_token'; +export { sendPasswordResetEmail, confirmPasswordReset, applyActionCode, checkActionCode, verifyPasswordResetCode, createUserWithEmailAndPassword, signInWithEmailAndPassword } from './strategies/email_and_password'; +export { sendSignInLinkToEmail, isSignInWithEmailLink, signInWithEmailLink } from './strategies/email_link'; +export { fetchSignInMethodsForEmail, sendEmailVerification, verifyBeforeUpdateEmail } from './strategies/email'; +export { ActionCodeURL, parseActionCodeURL } from './action_code_url'; +export { updateProfile, updateEmail, updatePassword } from './user/account_info'; +export { getIdToken, getIdTokenResult } from './user/id_token_result'; +export { unlink } from './user/link_unlink'; +export { getAdditionalUserInfo } from './user/additional_user_info'; +export { reload } from './user/reload'; +/** + * Deletes and signs out the user. + * + * @remarks + * Important: this is a security-sensitive operation that requires the user to have recently + * signed in. If this requirement isn't met, ask the user to authenticate again and then call + * {@link reauthenticateWithCredential}. + * + * @param user - The user. + * + * @public + */ +export declare function deleteUser(user: User): Promise<void>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts new file mode 100644 index 0000000..60278cd --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/in_memory.d.ts @@ -0,0 +1,35 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Persistence } from '../../model/public_types'; +import { PersistenceInternal, PersistenceType, PersistenceValue, StorageEventListener } from '../persistence'; +export declare class InMemoryPersistence implements PersistenceInternal { + static type: 'NONE'; + readonly type = PersistenceType.NONE; + storage: Record<string, PersistenceValue>; + _isAvailable(): Promise<boolean>; + _set(key: string, value: PersistenceValue): Promise<void>; + _get<T extends PersistenceValue>(key: string): Promise<T | null>; + _remove(key: string): Promise<void>; + _addListener(_key: string, _listener: StorageEventListener): void; + _removeListener(_key: string, _listener: StorageEventListener): void; +} +/** + * An implementation of {@link Persistence} of type 'NONE'. + * + * @public + */ +export declare const inMemoryPersistence: Persistence; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts new file mode 100644 index 0000000..4460f02 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/index.d.ts @@ -0,0 +1,42 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Persistence } from '../../model/public_types'; +export declare const enum PersistenceType { + SESSION = "SESSION", + LOCAL = "LOCAL", + NONE = "NONE", + COOKIE = "COOKIE" +} +export type PersistedBlob = Record<string, unknown>; +export interface Instantiator<T> { + (blob: PersistedBlob): T; +} +export type PersistenceValue = PersistedBlob | string; +export declare const STORAGE_AVAILABLE_KEY = "__sak"; +export interface StorageEventListener { + (value: PersistenceValue | null): void; +} +export interface PersistenceInternal extends Persistence { + type: PersistenceType; + _isAvailable(): Promise<boolean>; + _set(key: string, value: PersistenceValue): Promise<void>; + _get<T extends PersistenceValue>(key: string): Promise<T | null>; + _remove(key: string): Promise<void>; + _addListener(key: string, listener: StorageEventListener): void; + _removeListener(key: string, listener: StorageEventListener): void; + _shouldAllowMigration?: boolean; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts new file mode 100644 index 0000000..7aca0d8 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/persistence/persistence_user_manager.d.ts @@ -0,0 +1,45 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ApiKey, AppName, AuthInternal } from '../../model/auth'; +import { UserInternal } from '../../model/user'; +import { PersistenceInternal } from '../persistence'; +export declare const enum KeyName { + AUTH_USER = "authUser", + AUTH_EVENT = "authEvent", + REDIRECT_USER = "redirectUser", + PERSISTENCE_USER = "persistence" +} +export declare const enum Namespace { + PERSISTENCE = "firebase" +} +export declare function _persistenceKeyName(key: string, apiKey: ApiKey, appName: AppName): string; +export declare class PersistenceUserManager { + persistence: PersistenceInternal; + private readonly auth; + private readonly userKey; + private readonly fullUserKey; + private readonly fullPersistenceKey; + private readonly boundEventHandler; + private constructor(); + setCurrentUser(user: UserInternal): Promise<void>; + getCurrentUser(): Promise<UserInternal | null>; + removeCurrentUser(): Promise<void>; + savePersistenceForRedirect(): Promise<void>; + setPersistence(newPersistence: PersistenceInternal): Promise<void>; + delete(): void; + static create(auth: AuthInternal, persistenceHierarchy: PersistenceInternal[], userKey?: KeyName): Promise<PersistenceUserManager>; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts new file mode 100644 index 0000000..be276ad --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/email.d.ts @@ -0,0 +1,83 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthProvider } from '../../model/public_types'; +import { EmailAuthCredential } from '../credentials/email'; +/** + * Provider for generating {@link EmailAuthCredential}. + * + * @public + */ +export declare class EmailAuthProvider implements AuthProvider { + /** + * Always set to {@link ProviderId}.PASSWORD, even for email link. + */ + static readonly PROVIDER_ID: 'password'; + /** + * Always set to {@link SignInMethod}.EMAIL_PASSWORD. + */ + static readonly EMAIL_PASSWORD_SIGN_IN_METHOD: 'password'; + /** + * Always set to {@link SignInMethod}.EMAIL_LINK. + */ + static readonly EMAIL_LINK_SIGN_IN_METHOD: 'emailLink'; + /** + * Always set to {@link ProviderId}.PASSWORD, even for email link. + */ + readonly providerId: "password"; + /** + * Initialize an {@link AuthCredential} using an email and password. + * + * @example + * ```javascript + * const authCredential = EmailAuthProvider.credential(email, password); + * const userCredential = await signInWithCredential(auth, authCredential); + * ``` + * + * @example + * ```javascript + * const userCredential = await signInWithEmailAndPassword(auth, email, password); + * ``` + * + * @param email - Email address. + * @param password - User account password. + * @returns The auth provider credential. + */ + static credential(email: string, password: string): EmailAuthCredential; + /** + * Initialize an {@link AuthCredential} using an email and an email link after a sign in with + * email link operation. + * + * @example + * ```javascript + * const authCredential = EmailAuthProvider.credentialWithLink(auth, email, emailLink); + * const userCredential = await signInWithCredential(auth, authCredential); + * ``` + * + * @example + * ```javascript + * await sendSignInLinkToEmail(auth, email); + * // Obtain emailLink from user. + * const userCredential = await signInWithEmailLink(auth, email, emailLink); + * ``` + * + * @param auth - The {@link Auth} instance used to verify the link. + * @param email - Email address. + * @param emailLink - Sign-in email link. + * @returns - The auth provider credential. + */ + static credentialWithLink(email: string, emailLink: string): EmailAuthCredential; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts new file mode 100644 index 0000000..cd8feca --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/facebook.d.ts @@ -0,0 +1,93 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserCredential } from '../../model/public_types'; +import { FirebaseError } from '@firebase/util'; +import { OAuthCredential } from '../credentials/oauth'; +import { BaseOAuthProvider } from './oauth'; +/** + * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.FACEBOOK. + * + * @example + * ```javascript + * // Sign in using a redirect. + * const provider = new FacebookAuthProvider(); + * // Start a sign in process for an unauthenticated user. + * provider.addScope('user_birthday'); + * await signInWithRedirect(auth, provider); + * // This will trigger a full page redirect away from your app + * + * // After returning from the redirect when your app initializes you can obtain the result + * const result = await getRedirectResult(auth); + * if (result) { + * // This is the signed-in user + * const user = result.user; + * // This gives you a Facebook Access Token. + * const credential = FacebookAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * } + * ``` + * + * @example + * ```javascript + * // Sign in using a popup. + * const provider = new FacebookAuthProvider(); + * provider.addScope('user_birthday'); + * const result = await signInWithPopup(auth, provider); + * + * // The signed-in user info. + * const user = result.user; + * // This gives you a Facebook Access Token. + * const credential = FacebookAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * ``` + * + * @public + */ +export declare class FacebookAuthProvider extends BaseOAuthProvider { + /** Always set to {@link SignInMethod}.FACEBOOK. */ + static readonly FACEBOOK_SIGN_IN_METHOD: 'facebook.com'; + /** Always set to {@link ProviderId}.FACEBOOK. */ + static readonly PROVIDER_ID: 'facebook.com'; + constructor(); + /** + * Creates a credential for Facebook. + * + * @example + * ```javascript + * // `event` from the Facebook auth.authResponseChange callback. + * const credential = FacebookAuthProvider.credential(event.authResponse.accessToken); + * const result = await signInWithCredential(credential); + * ``` + * + * @param accessToken - Facebook access token. + */ + static credential(accessToken: string): OAuthCredential; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}. + * + * @param userCredential - The user credential. + */ + static credentialFromResult(userCredential: UserCredential): OAuthCredential | null; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was + * thrown during a sign-in, link, or reauthenticate operation. + * + * @param userCredential - The user credential. + */ + static credentialFromError(error: FirebaseError): OAuthCredential | null; + private static credentialFromTaggedObject; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts new file mode 100644 index 0000000..91d38b1 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/federated.d.ts @@ -0,0 +1,64 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthProvider } from '../../model/public_types'; +/** + * Map of OAuth Custom Parameters. + * + * @public + */ +export type CustomParameters = Record<string, string>; +/** + * The base class for all Federated providers (OAuth (including OIDC), SAML). + * + * This class is not meant to be instantiated directly. + * + * @public + */ +export declare abstract class FederatedAuthProvider implements AuthProvider { + readonly providerId: string; + /** @internal */ + defaultLanguageCode: string | null; + /** @internal */ + private customParameters; + /** + * Constructor for generic OAuth providers. + * + * @param providerId - Provider for which credentials should be generated. + */ + constructor(providerId: string); + /** + * Set the language gode. + * + * @param languageCode - language code + */ + setDefaultLanguage(languageCode: string | null): void; + /** + * Sets the OAuth custom parameters to pass in an OAuth request for popup and redirect sign-in + * operations. + * + * @remarks + * For a detailed list, check the reserved required OAuth 2.0 parameters such as `client_id`, + * `redirect_uri`, `scope`, `response_type`, and `state` are not allowed and will be ignored. + * + * @param customOAuthParameters - The custom OAuth parameters to pass in the OAuth request. + */ + setCustomParameters(customOAuthParameters: CustomParameters): AuthProvider; + /** + * Retrieve the current list of {@link CustomParameters}. + */ + getCustomParameters(): CustomParameters; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts new file mode 100644 index 0000000..b8b3ee9 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/github.d.ts @@ -0,0 +1,89 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserCredential } from '../../model/public_types'; +import { FirebaseError } from '@firebase/util'; +import { OAuthCredential } from '../credentials/oauth'; +import { BaseOAuthProvider } from './oauth'; +/** + * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.GITHUB. + * + * @remarks + * GitHub requires an OAuth 2.0 redirect, so you can either handle the redirect directly, or use + * the {@link signInWithPopup} handler: + * + * @example + * ```javascript + * // Sign in using a redirect. + * const provider = new GithubAuthProvider(); + * // Start a sign in process for an unauthenticated user. + * provider.addScope('repo'); + * await signInWithRedirect(auth, provider); + * // This will trigger a full page redirect away from your app + * + * // After returning from the redirect when your app initializes you can obtain the result + * const result = await getRedirectResult(auth); + * if (result) { + * // This is the signed-in user + * const user = result.user; + * // This gives you a GitHub Access Token. + * const credential = GithubAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * } + * ``` + * + * @example + * ```javascript + * // Sign in using a popup. + * const provider = new GithubAuthProvider(); + * provider.addScope('repo'); + * const result = await signInWithPopup(auth, provider); + * + * // The signed-in user info. + * const user = result.user; + * // This gives you a GitHub Access Token. + * const credential = GithubAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * ``` + * @public + */ +export declare class GithubAuthProvider extends BaseOAuthProvider { + /** Always set to {@link SignInMethod}.GITHUB. */ + static readonly GITHUB_SIGN_IN_METHOD: 'github.com'; + /** Always set to {@link ProviderId}.GITHUB. */ + static readonly PROVIDER_ID: 'github.com'; + constructor(); + /** + * Creates a credential for GitHub. + * + * @param accessToken - GitHub access token. + */ + static credential(accessToken: string): OAuthCredential; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}. + * + * @param userCredential - The user credential. + */ + static credentialFromResult(userCredential: UserCredential): OAuthCredential | null; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was + * thrown during a sign-in, link, or reauthenticate operation. + * + * @param userCredential - The user credential. + */ + static credentialFromError(error: FirebaseError): OAuthCredential | null; + private static credentialFromTaggedObject; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts new file mode 100644 index 0000000..25d74c8 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/google.d.ts @@ -0,0 +1,96 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserCredential } from '../../model/public_types'; +import { FirebaseError } from '@firebase/util'; +import { OAuthCredential } from '../credentials/oauth'; +import { BaseOAuthProvider } from './oauth'; +/** + * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.GOOGLE. + * + * @example + * ```javascript + * // Sign in using a redirect. + * const provider = new GoogleAuthProvider(); + * // Start a sign in process for an unauthenticated user. + * provider.addScope('profile'); + * provider.addScope('email'); + * await signInWithRedirect(auth, provider); + * // This will trigger a full page redirect away from your app + * + * // After returning from the redirect when your app initializes you can obtain the result + * const result = await getRedirectResult(auth); + * if (result) { + * // This is the signed-in user + * const user = result.user; + * // This gives you a Google Access Token. + * const credential = GoogleAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * } + * ``` + * + * @example + * ```javascript + * // Sign in using a popup. + * const provider = new GoogleAuthProvider(); + * provider.addScope('profile'); + * provider.addScope('email'); + * const result = await signInWithPopup(auth, provider); + * + * // The signed-in user info. + * const user = result.user; + * // This gives you a Google Access Token. + * const credential = GoogleAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * ``` + * + * @public + */ +export declare class GoogleAuthProvider extends BaseOAuthProvider { + /** Always set to {@link SignInMethod}.GOOGLE. */ + static readonly GOOGLE_SIGN_IN_METHOD: 'google.com'; + /** Always set to {@link ProviderId}.GOOGLE. */ + static readonly PROVIDER_ID: 'google.com'; + constructor(); + /** + * Creates a credential for Google. At least one of ID token and access token is required. + * + * @example + * ```javascript + * // \`googleUser\` from the onsuccess Google Sign In callback. + * const credential = GoogleAuthProvider.credential(googleUser.getAuthResponse().id_token); + * const result = await signInWithCredential(credential); + * ``` + * + * @param idToken - Google ID token. + * @param accessToken - Google access token. + */ + static credential(idToken?: string | null, accessToken?: string | null): OAuthCredential; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}. + * + * @param userCredential - The user credential. + */ + static credentialFromResult(userCredential: UserCredential): OAuthCredential | null; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was + * thrown during a sign-in, link, or reauthenticate operation. + * + * @param userCredential - The user credential. + */ + static credentialFromError(error: FirebaseError): OAuthCredential | null; + private static credentialFromTaggedObject; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts new file mode 100644 index 0000000..3e8e664 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/oauth.d.ts @@ -0,0 +1,151 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthProvider, UserCredential } from '../../model/public_types'; +import { OAuthCredential } from '../credentials/oauth'; +import { FirebaseError } from '@firebase/util'; +import { FederatedAuthProvider } from './federated'; +/** + * Defines the options for initializing an {@link OAuthCredential}. + * + * @remarks + * For ID tokens with nonce claim, the raw nonce has to also be provided. + * + * @public + */ +export interface OAuthCredentialOptions { + /** + * The OAuth ID token used to initialize the {@link OAuthCredential}. + */ + idToken?: string; + /** + * The OAuth access token used to initialize the {@link OAuthCredential}. + */ + accessToken?: string; + /** + * The raw nonce associated with the ID token. + * + * @remarks + * It is required when an ID token with a nonce field is provided. The SHA-256 hash of the + * raw nonce must match the nonce field in the ID token. + */ + rawNonce?: string; +} +/** + * Common code to all OAuth providers. This is separate from the + * {@link OAuthProvider} so that child providers (like + * {@link GoogleAuthProvider}) don't inherit the `credential` instance method. + * Instead, they rely on a static `credential` method. + */ +export declare abstract class BaseOAuthProvider extends FederatedAuthProvider implements AuthProvider { + /** @internal */ + private scopes; + /** + * Add an OAuth scope to the credential. + * + * @param scope - Provider OAuth scope to add. + */ + addScope(scope: string): AuthProvider; + /** + * Retrieve the current list of OAuth scopes. + */ + getScopes(): string[]; +} +/** + * Provider for generating generic {@link OAuthCredential}. + * + * @example + * ```javascript + * // Sign in using a redirect. + * const provider = new OAuthProvider('google.com'); + * // Start a sign in process for an unauthenticated user. + * provider.addScope('profile'); + * provider.addScope('email'); + * await signInWithRedirect(auth, provider); + * // This will trigger a full page redirect away from your app + * + * // After returning from the redirect when your app initializes you can obtain the result + * const result = await getRedirectResult(auth); + * if (result) { + * // This is the signed-in user + * const user = result.user; + * // This gives you a OAuth Access Token for the provider. + * const credential = provider.credentialFromResult(auth, result); + * const token = credential.accessToken; + * } + * ``` + * + * @example + * ```javascript + * // Sign in using a popup. + * const provider = new OAuthProvider('google.com'); + * provider.addScope('profile'); + * provider.addScope('email'); + * const result = await signInWithPopup(auth, provider); + * + * // The signed-in user info. + * const user = result.user; + * // This gives you a OAuth Access Token for the provider. + * const credential = provider.credentialFromResult(auth, result); + * const token = credential.accessToken; + * ``` + * @public + */ +export declare class OAuthProvider extends BaseOAuthProvider { + /** + * Creates an {@link OAuthCredential} from a JSON string or a plain object. + * @param json - A plain object or a JSON string + */ + static credentialFromJSON(json: object | string): OAuthCredential; + /** + * Creates a {@link OAuthCredential} from a generic OAuth provider's access token or ID token. + * + * @remarks + * The raw nonce is required when an ID token with a nonce field is provided. The SHA-256 hash of + * the raw nonce must match the nonce field in the ID token. + * + * @example + * ```javascript + * // `googleUser` from the onsuccess Google Sign In callback. + * // Initialize a generate OAuth provider with a `google.com` providerId. + * const provider = new OAuthProvider('google.com'); + * const credential = provider.credential({ + * idToken: googleUser.getAuthResponse().id_token, + * }); + * const result = await signInWithCredential(credential); + * ``` + * + * @param params - Either the options object containing the ID token, access token and raw nonce + * or the ID token string. + */ + credential(params: OAuthCredentialOptions): OAuthCredential; + /** An internal credential method that accepts more permissive options */ + private _credential; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}. + * + * @param userCredential - The user credential. + */ + static credentialFromResult(userCredential: UserCredential): OAuthCredential | null; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was + * thrown during a sign-in, link, or reauthenticate operation. + * + * @param userCredential - The user credential. + */ + static credentialFromError(error: FirebaseError): OAuthCredential | null; + private static oauthCredentialFromTaggedObject; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts new file mode 100644 index 0000000..6017bfe --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/saml.d.ts @@ -0,0 +1,62 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { FirebaseError } from '@firebase/util'; +import { UserCredential } from '../../model/public_types'; +import { AuthCredential } from '../credentials'; +import { FederatedAuthProvider } from './federated'; +/** + * An {@link AuthProvider} for SAML. + * + * @public + */ +export declare class SAMLAuthProvider extends FederatedAuthProvider { + /** + * Constructor. The providerId must start with "saml." + * @param providerId - SAML provider ID. + */ + constructor(providerId: string); + /** + * Generates an {@link AuthCredential} from a {@link UserCredential} after a + * successful SAML flow completes. + * + * @remarks + * + * For example, to get an {@link AuthCredential}, you could write the + * following code: + * + * ```js + * const userCredential = await signInWithPopup(auth, samlProvider); + * const credential = SAMLAuthProvider.credentialFromResult(userCredential); + * ``` + * + * @param userCredential - The user credential. + */ + static credentialFromResult(userCredential: UserCredential): AuthCredential | null; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was + * thrown during a sign-in, link, or reauthenticate operation. + * + * @param userCredential - The user credential. + */ + static credentialFromError(error: FirebaseError): AuthCredential | null; + /** + * Creates an {@link AuthCredential} from a JSON string or a plain object. + * @param json - A plain object or a JSON string + */ + static credentialFromJSON(json: string | object): AuthCredential; + private static samlCredentialFromTaggedObject; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts new file mode 100644 index 0000000..612913d --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/providers/twitter.d.ts @@ -0,0 +1,103 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/** + * @license + * Copyright 2020 Twitter LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserCredential } from '../../model/public_types'; +import { FirebaseError } from '@firebase/util'; +import { OAuthCredential } from '../credentials/oauth'; +import { BaseOAuthProvider } from './oauth'; +/** + * Provider for generating an {@link OAuthCredential} for {@link ProviderId}.TWITTER. + * + * @example + * ```javascript + * // Sign in using a redirect. + * const provider = new TwitterAuthProvider(); + * // Start a sign in process for an unauthenticated user. + * await signInWithRedirect(auth, provider); + * // This will trigger a full page redirect away from your app + * + * // After returning from the redirect when your app initializes you can obtain the result + * const result = await getRedirectResult(auth); + * if (result) { + * // This is the signed-in user + * const user = result.user; + * // This gives you a Twitter Access Token and Secret. + * const credential = TwitterAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * const secret = credential.secret; + * } + * ``` + * + * @example + * ```javascript + * // Sign in using a popup. + * const provider = new TwitterAuthProvider(); + * const result = await signInWithPopup(auth, provider); + * + * // The signed-in user info. + * const user = result.user; + * // This gives you a Twitter Access Token and Secret. + * const credential = TwitterAuthProvider.credentialFromResult(result); + * const token = credential.accessToken; + * const secret = credential.secret; + * ``` + * + * @public + */ +export declare class TwitterAuthProvider extends BaseOAuthProvider { + /** Always set to {@link SignInMethod}.TWITTER. */ + static readonly TWITTER_SIGN_IN_METHOD: 'twitter.com'; + /** Always set to {@link ProviderId}.TWITTER. */ + static readonly PROVIDER_ID: 'twitter.com'; + constructor(); + /** + * Creates a credential for Twitter. + * + * @param token - Twitter access token. + * @param secret - Twitter secret. + */ + static credential(token: string, secret: string): OAuthCredential; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link UserCredential}. + * + * @param userCredential - The user credential. + */ + static credentialFromResult(userCredential: UserCredential): OAuthCredential | null; + /** + * Used to extract the underlying {@link OAuthCredential} from a {@link AuthError} which was + * thrown during a sign-in, link, or reauthenticate operation. + * + * @param userCredential - The user credential. + */ + static credentialFromError(error: FirebaseError): OAuthCredential | null; + private static credentialFromTaggedObject; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts new file mode 100644 index 0000000..6f5e076 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/abstract_popup_redirect_operation.d.ts @@ -0,0 +1,44 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { FirebaseError } from '@firebase/util'; +import { AuthEvent, AuthEventConsumer, AuthEventType, PopupRedirectResolverInternal } from '../../model/popup_redirect'; +import { UserInternal, UserCredentialInternal } from '../../model/user'; +import { AuthInternal } from '../../model/auth'; +/** + * Popup event manager. Handles the popup's entire lifecycle; listens to auth + * events + */ +export declare abstract class AbstractPopupRedirectOperation implements AuthEventConsumer { + protected readonly auth: AuthInternal; + protected readonly resolver: PopupRedirectResolverInternal; + protected user?: UserInternal | undefined; + protected readonly bypassAuthState: boolean; + private pendingPromise; + private eventManager; + readonly filter: AuthEventType[]; + abstract eventId: string | null; + constructor(auth: AuthInternal, filter: AuthEventType | AuthEventType[], resolver: PopupRedirectResolverInternal, user?: UserInternal | undefined, bypassAuthState?: boolean); + abstract onExecution(): Promise<void>; + execute(): Promise<UserCredentialInternal | null>; + onAuthEvent(event: AuthEvent): Promise<void>; + onError(error: FirebaseError): void; + private getIdpTask; + protected resolve(cred: UserCredentialInternal | null): void; + protected reject(error: Error): void; + private unregisterAndCleanUp; + abstract cleanUp(): void; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts new file mode 100644 index 0000000..23fa039 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/action_code_settings.d.ts @@ -0,0 +1,19 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ActionCodeSettings, Auth } from '../../model/public_types'; +import { GetOobCodeRequest } from '../../api/authentication/email_and_password'; +export declare function _setActionCodeSettingsOnRequest(auth: Auth, request: GetOobCodeRequest, actionCodeSettings: ActionCodeSettings): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts new file mode 100644 index 0000000..687a797 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/anonymous.d.ts @@ -0,0 +1,32 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Auth, UserCredential } from '../../model/public_types'; +/** + * Asynchronously signs in as an anonymous user. + * + * @remarks + * If there is already an anonymous user signed in, that user will be returned; otherwise, a + * new anonymous user identity will be created and returned. + * + * This method is not supported by {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * @param auth - The {@link Auth} instance. + * + * @public + */ +export declare function signInAnonymously(auth: Auth): Promise<UserCredential>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts new file mode 100644 index 0000000..392d663 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/credential.d.ts @@ -0,0 +1,64 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserCredential, Auth, User } from '../../model/public_types'; +import { AuthInternal } from '../../model/auth'; +import { AuthCredential } from '../credentials'; +export declare function _signInWithCredential(auth: AuthInternal, credential: AuthCredential, bypassAuthState?: boolean): Promise<UserCredential>; +/** + * Asynchronously signs in with the given credentials. + * + * @remarks + * An {@link AuthProvider} can be used to generate the credential. + * + * This method is not supported by {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * @param auth - The {@link Auth} instance. + * @param credential - The auth credential. + * + * @public + */ +export declare function signInWithCredential(auth: Auth, credential: AuthCredential): Promise<UserCredential>; +/** + * Links the user account with the given credentials. + * + * @remarks + * An {@link AuthProvider} can be used to generate the credential. + * + * @param user - The user. + * @param credential - The auth credential. + * + * @public + */ +export declare function linkWithCredential(user: User, credential: AuthCredential): Promise<UserCredential>; +/** + * Re-authenticates a user using a fresh credential. + * + * @remarks + * Use before operations such as {@link updatePassword} that require tokens from recent sign-in + * attempts. This method can be used to recover from a `CREDENTIAL_TOO_OLD_LOGIN_AGAIN` error + * or a `TOKEN_EXPIRED` error. + * + * This method is not supported on any {@link User} signed in by {@link Auth} instances + * created with a {@link @firebase/app#FirebaseServerApp}. + * + * @param user - The user. + * @param credential - The auth credential. + * + * @public + */ +export declare function reauthenticateWithCredential(user: User, credential: AuthCredential): Promise<UserCredential>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts new file mode 100644 index 0000000..e95cc38 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/custom_token.d.ts @@ -0,0 +1,37 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Auth, UserCredential } from '../../model/public_types'; +/** + * Asynchronously signs in using a custom token. + * + * @remarks + * Custom tokens are used to integrate Firebase Auth with existing auth systems, and must + * be generated by an auth backend using the + * {@link https://firebase.google.com/docs/reference/admin/node/admin.auth.Auth#createcustomtoken | createCustomToken} + * method in the {@link https://firebase.google.com/docs/auth/admin | Admin SDK} . + * + * Fails with an error if the token is invalid, expired, or not accepted by the Firebase Auth service. + * + * This method is not supported by {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * @param auth - The {@link Auth} instance. + * @param customToken - The custom token to sign in with. + * + * @public + */ +export declare function signInWithCustomToken(auth: Auth, customToken: string): Promise<UserCredential>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts new file mode 100644 index 0000000..3505c34 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email.d.ts @@ -0,0 +1,104 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ActionCodeSettings, Auth, User } from '../../model/public_types'; +/** + * Gets the list of possible sign in methods for the given email address. This method returns an + * empty list when + * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection} + * is enabled, irrespective of the number of authentication methods available for the given email. + * + * @remarks + * This is useful to differentiate methods of sign-in for the same provider, eg. + * {@link EmailAuthProvider} which has 2 methods of sign-in, + * {@link SignInMethod}.EMAIL_PASSWORD and + * {@link SignInMethod}.EMAIL_LINK. + * + * @param auth - The {@link Auth} instance. + * @param email - The user's email address. + * + * Deprecated. Migrating off of this method is recommended as a security best-practice. + * Learn more in the Identity Platform documentation for + * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection}. + * @public + */ +export declare function fetchSignInMethodsForEmail(auth: Auth, email: string): Promise<string[]>; +/** + * Sends a verification email to a user. + * + * @remarks + * The verification process is completed by calling {@link applyActionCode}. + * + * @example + * ```javascript + * const actionCodeSettings = { + * url: 'https://www.example.com/?email=user@example.com', + * iOS: { + * bundleId: 'com.example.ios' + * }, + * android: { + * packageName: 'com.example.android', + * installApp: true, + * minimumVersion: '12' + * }, + * handleCodeInApp: true + * }; + * await sendEmailVerification(user, actionCodeSettings); + * // Obtain code from the user. + * await applyActionCode(auth, code); + * ``` + * + * @param user - The user. + * @param actionCodeSettings - The {@link ActionCodeSettings}. + * + * @public + */ +export declare function sendEmailVerification(user: User, actionCodeSettings?: ActionCodeSettings | null): Promise<void>; +/** + * Sends a verification email to a new email address. + * + * @remarks + * The user's email will be updated to the new one after being verified. + * + * If you have a custom email action handler, you can complete the verification process by calling + * {@link applyActionCode}. + * + * @example + * ```javascript + * const actionCodeSettings = { + * url: 'https://www.example.com/?email=user@example.com', + * iOS: { + * bundleId: 'com.example.ios' + * }, + * android: { + * packageName: 'com.example.android', + * installApp: true, + * minimumVersion: '12' + * }, + * handleCodeInApp: true + * }; + * await verifyBeforeUpdateEmail(user, 'newemail@example.com', actionCodeSettings); + * // Obtain code from the user. + * await applyActionCode(auth, code); + * ``` + * + * @param user - The user. + * @param newEmail - The new email address to be verified before update. + * @param actionCodeSettings - The {@link ActionCodeSettings}. + * + * @public + */ +export declare function verifyBeforeUpdateEmail(user: User, newEmail: string, actionCodeSettings?: ActionCodeSettings | null): Promise<void>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts new file mode 100644 index 0000000..205f33a --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_and_password.d.ts @@ -0,0 +1,139 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ActionCodeInfo, ActionCodeSettings, Auth, UserCredential } from '../../model/public_types'; +/** + * Sends a password reset email to the given email address. This method does not throw an error when + * there's no user account with the given email address and + * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection} + * is enabled. + * + * @remarks + * To complete the password reset, call {@link confirmPasswordReset} with the code supplied in + * the email sent to the user, along with the new password specified by the user. + * + * @example + * ```javascript + * const actionCodeSettings = { + * url: 'https://www.example.com/?email=user@example.com', + * iOS: { + * bundleId: 'com.example.ios' + * }, + * android: { + * packageName: 'com.example.android', + * installApp: true, + * minimumVersion: '12' + * }, + * handleCodeInApp: true + * }; + * await sendPasswordResetEmail(auth, 'user@example.com', actionCodeSettings); + * // Obtain code from user. + * await confirmPasswordReset('user@example.com', code); + * ``` + * + * @param auth - The {@link Auth} instance. + * @param email - The user's email address. + * @param actionCodeSettings - The {@link ActionCodeSettings}. + * + * @public + */ +export declare function sendPasswordResetEmail(auth: Auth, email: string, actionCodeSettings?: ActionCodeSettings): Promise<void>; +/** + * Completes the password reset process, given a confirmation code and new password. + * + * @param auth - The {@link Auth} instance. + * @param oobCode - A confirmation code sent to the user. + * @param newPassword - The new password. + * + * @public + */ +export declare function confirmPasswordReset(auth: Auth, oobCode: string, newPassword: string): Promise<void>; +/** + * Applies a verification code sent to the user by email or other out-of-band mechanism. + * + * @param auth - The {@link Auth} instance. + * @param oobCode - A verification code sent to the user. + * + * @public + */ +export declare function applyActionCode(auth: Auth, oobCode: string): Promise<void>; +/** + * Checks a verification code sent to the user by email or other out-of-band mechanism. + * + * @returns metadata about the code. + * + * @param auth - The {@link Auth} instance. + * @param oobCode - A verification code sent to the user. + * + * @public + */ +export declare function checkActionCode(auth: Auth, oobCode: string): Promise<ActionCodeInfo>; +/** + * Checks a password reset code sent to the user by email or other out-of-band mechanism. + * + * @returns the user's email address if valid. + * + * @param auth - The {@link Auth} instance. + * @param code - A verification code sent to the user. + * + * @public + */ +export declare function verifyPasswordResetCode(auth: Auth, code: string): Promise<string>; +/** + * Creates a new user account associated with the specified email address and password. + * + * @remarks + * On successful creation of the user account, this user will also be signed in to your application. + * + * User account creation can fail if the account already exists or the password is invalid. + * + * This method is not supported on {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * Note: The email address acts as a unique identifier for the user and enables an email-based + * password reset. This function will create a new user account and set the initial user password. + * + * @param auth - The {@link Auth} instance. + * @param email - The user's email address. + * @param password - The user's chosen password. + * + * @public + */ +export declare function createUserWithEmailAndPassword(auth: Auth, email: string, password: string): Promise<UserCredential>; +/** + * Asynchronously signs in using an email and password. + * + * @remarks + * Fails with an error if the email address and password do not match. When + * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection} + * is enabled, this method fails with "auth/invalid-credential" in case of an invalid + * email/password. + * + * This method is not supported on {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * Note: The user's password is NOT the password used to access the user's email account. The + * email address serves as a unique identifier for the user, and the password is used to access + * the user's account in your Firebase project. See also: {@link createUserWithEmailAndPassword}. + * + * + * @param auth - The {@link Auth} instance. + * @param email - The users email address. + * @param password - The users password. + * + * @public + */ +export declare function signInWithEmailAndPassword(auth: Auth, email: string, password: string): Promise<UserCredential>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts new file mode 100644 index 0000000..8d01e8a --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/email_link.d.ts @@ -0,0 +1,107 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ActionCodeSettings, Auth, UserCredential } from '../../model/public_types'; +/** + * Sends a sign-in email link to the user with the specified email. + * + * @remarks + * The sign-in operation has to always be completed in the app unlike other out of band email + * actions (password reset and email verifications). This is because, at the end of the flow, + * the user is expected to be signed in and their Auth state persisted within the app. + * + * To complete sign in with the email link, call {@link signInWithEmailLink} with the email + * address and the email link supplied in the email sent to the user. + * + * @example + * ```javascript + * const actionCodeSettings = { + * url: 'https://www.example.com/?email=user@example.com', + * iOS: { + * bundleId: 'com.example.ios' + * }, + * android: { + * packageName: 'com.example.android', + * installApp: true, + * minimumVersion: '12' + * }, + * handleCodeInApp: true + * }; + * await sendSignInLinkToEmail(auth, 'user@example.com', actionCodeSettings); + * // Obtain emailLink from the user. + * if(isSignInWithEmailLink(auth, emailLink)) { + * await signInWithEmailLink(auth, 'user@example.com', emailLink); + * } + * ``` + * + * @param authInternal - The {@link Auth} instance. + * @param email - The user's email address. + * @param actionCodeSettings - The {@link ActionCodeSettings}. + * + * @public + */ +export declare function sendSignInLinkToEmail(auth: Auth, email: string, actionCodeSettings: ActionCodeSettings): Promise<void>; +/** + * Checks if an incoming link is a sign-in with email link suitable for {@link signInWithEmailLink}. + * + * @param auth - The {@link Auth} instance. + * @param emailLink - The link sent to the user's email address. + * + * @public + */ +export declare function isSignInWithEmailLink(auth: Auth, emailLink: string): boolean; +/** + * Asynchronously signs in using an email and sign-in email link. + * + * @remarks + * If no link is passed, the link is inferred from the current URL. + * + * Fails with an error if the email address is invalid or OTP in email link expires. + * + * This method is not supported by {@link Auth} instances created with a + * {@link @firebase/app#FirebaseServerApp}. + * + * Note: Confirm the link is a sign-in email link before calling this method firebase.auth.Auth.isSignInWithEmailLink. + * + * @example + * ```javascript + * const actionCodeSettings = { + * url: 'https://www.example.com/?email=user@example.com', + * iOS: { + * bundleId: 'com.example.ios' + * }, + * android: { + * packageName: 'com.example.android', + * installApp: true, + * minimumVersion: '12' + * }, + * handleCodeInApp: true + * }; + * await sendSignInLinkToEmail(auth, 'user@example.com', actionCodeSettings); + * // Obtain emailLink from the user. + * if(isSignInWithEmailLink(auth, emailLink)) { + * await signInWithEmailLink(auth, 'user@example.com', emailLink); + * } + * ``` + * + * + * @param auth - The {@link Auth} instance. + * @param email - The user's email address. + * @param emailLink - The link sent to the user's email address. + * + * @public + */ +export declare function signInWithEmailLink(auth: Auth, email: string, emailLink?: string): Promise<UserCredential>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts new file mode 100644 index 0000000..179d4f7 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/idp.d.ts @@ -0,0 +1,32 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +import { UserInternal, UserCredentialInternal } from '../../model/user'; +export interface IdpTaskParams { + auth: AuthInternal; + requestUri: string; + sessionId?: string; + tenantId?: string; + postBody?: string; + pendingToken?: string; + user?: UserInternal; + bypassAuthState?: boolean; +} +export type IdpTask = (params: IdpTaskParams) => Promise<UserCredentialInternal>; +export declare function _signIn(params: IdpTaskParams): Promise<UserCredentialInternal>; +export declare function _reauth(params: IdpTaskParams): Promise<UserCredentialInternal>; +export declare function _link(params: IdpTaskParams): Promise<UserCredentialInternal>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts new file mode 100644 index 0000000..10178ef --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/strategies/redirect.d.ts @@ -0,0 +1,36 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +import { AuthEvent, PopupRedirectResolverInternal } from '../../model/popup_redirect'; +import { UserCredentialInternal } from '../../model/user'; +import { AbstractPopupRedirectOperation } from './abstract_popup_redirect_operation'; +export declare class RedirectAction extends AbstractPopupRedirectOperation { + eventId: null; + constructor(auth: AuthInternal, resolver: PopupRedirectResolverInternal, bypassAuthState?: boolean); + /** + * Override the execute function; if we already have a redirect result, then + * just return it. + */ + execute(): Promise<UserCredentialInternal | null>; + onAuthEvent(event: AuthEvent): Promise<void>; + onExecution(): Promise<void>; + cleanUp(): void; +} +export declare function _getAndClearPendingRedirectStatus(resolver: PopupRedirectResolverInternal, auth: AuthInternal): Promise<boolean>; +export declare function _setPendingRedirectStatus(resolver: PopupRedirectResolverInternal, auth: AuthInternal): Promise<void>; +export declare function _clearRedirectOutcomes(): void; +export declare function _overrideRedirectResult(auth: AuthInternal, result: () => Promise<UserCredentialInternal | null>): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts new file mode 100644 index 0000000..312e23c --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/account_info.d.ts @@ -0,0 +1,68 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { User } from '../../model/public_types'; +/** + * Updates a user's profile data. + * + * @param user - The user. + * @param profile - The profile's `displayName` and `photoURL` to update. + * + * @public + */ +export declare function updateProfile(user: User, { displayName, photoURL: photoUrl }: { + displayName?: string | null; + photoURL?: string | null; +}): Promise<void>; +/** + * Updates the user's email address. + * + * @remarks + * An email will be sent to the original email address (if it was set) that allows to revoke the + * email address change, in order to protect them from account hijacking. + * + * This method is not supported on any {@link User} signed in by {@link Auth} instances + * created with a {@link @firebase/app#FirebaseServerApp}. + * + * Important: this is a security sensitive operation that requires the user to have recently signed + * in. If this requirement isn't met, ask the user to authenticate again and then call + * {@link reauthenticateWithCredential}. + * + * @param user - The user. + * @param newEmail - The new email address. + * + * Throws "auth/operation-not-allowed" error when + * {@link https://cloud.google.com/identity-platform/docs/admin/email-enumeration-protection | Email Enumeration Protection} + * is enabled. + * Deprecated - Use {@link verifyBeforeUpdateEmail} instead. + * + * @public + */ +export declare function updateEmail(user: User, newEmail: string): Promise<void>; +/** + * Updates the user's password. + * + * @remarks + * Important: this is a security sensitive operation that requires the user to have recently signed + * in. If this requirement isn't met, ask the user to authenticate again and then call + * {@link reauthenticateWithCredential}. + * + * @param user - The user. + * @param newPassword - The new password. + * + * @public + */ +export declare function updatePassword(user: User, newPassword: string): Promise<void>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts new file mode 100644 index 0000000..d5fd65b --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/additional_user_info.d.ts @@ -0,0 +1,31 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AdditionalUserInfo, UserCredential } from '../../model/public_types'; +import { IdTokenResponse } from '../../model/id_token'; +/** + * Parse the `AdditionalUserInfo` from the ID token response. + * + */ +export declare function _fromIdTokenResponse(idTokenResponse?: IdTokenResponse): AdditionalUserInfo | null; +/** + * Extracts provider specific {@link AdditionalUserInfo} for the given credential. + * + * @param userCredential - The user credential. + * + * @public + */ +export declare function getAdditionalUserInfo(userCredential: UserCredential): AdditionalUserInfo | null; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts new file mode 100644 index 0000000..c1b2032 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/id_token_result.d.ts @@ -0,0 +1,48 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { IdTokenResult, ParsedToken, User } from '../../model/public_types'; +/** + * Returns a JSON Web Token (JWT) used to identify the user to a Firebase service. + * + * @remarks + * Returns the current token if it has not expired or if it will not expire in the next five + * minutes. Otherwise, this will refresh the token and return a new one. + * + * @param user - The user. + * @param forceRefresh - Force refresh regardless of token expiration. + * + * @public + */ +export declare function getIdToken(user: User, forceRefresh?: boolean): Promise<string>; +/** + * Returns a deserialized JSON Web Token (JWT) used to identify the user to a Firebase service. + * + * @remarks + * Returns the current token if it has not expired or if it will not expire in the next five + * minutes. Otherwise, this will refresh the token and return a new one. + * + * @param user - The user. + * @param forceRefresh - Force refresh regardless of token expiration. + * + * @public + */ +export declare function getIdTokenResult(user: User, forceRefresh?: boolean): Promise<IdTokenResult>; +export declare function _parseToken(token: string): ParsedToken | null; +/** + * Extract expiresIn TTL from a token by subtracting the expiration from the issuance. + */ +export declare function _tokenExpiresIn(token: string): number; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts new file mode 100644 index 0000000..81446ea --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/invalidation.d.ts @@ -0,0 +1,18 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserInternal } from '../../model/user'; +export declare function _logoutIfInvalidated<T>(user: UserInternal, promise: Promise<T>, bypassAuthState?: boolean): Promise<T>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts new file mode 100644 index 0000000..9408524 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/link_unlink.d.ts @@ -0,0 +1,30 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { User } from '../../model/public_types'; +import { UserInternal, UserCredentialInternal } from '../../model/user'; +import { AuthCredential } from '../credentials'; +/** + * Unlinks a provider from a user account. + * + * @param user - The user. + * @param providerId - The provider to unlink. + * + * @public + */ +export declare function unlink(user: User, providerId: string): Promise<User>; +export declare function _link(user: UserInternal, credential: AuthCredential, bypassAuthState?: boolean): Promise<UserCredentialInternal>; +export declare function _assertLinkedStatus(expected: boolean, user: UserInternal, provider: string): Promise<void>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts new file mode 100644 index 0000000..ff52286 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/proactive_refresh.d.ts @@ -0,0 +1,34 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserInternal } from '../../model/user'; +export declare const enum Duration { + OFFSET = 300000, + RETRY_BACKOFF_MIN = 30000, + RETRY_BACKOFF_MAX = 960000 +} +export declare class ProactiveRefresh { + private readonly user; + private isRunning; + private timerId; + private errorBackoff; + constructor(user: UserInternal); + _start(): void; + _stop(): void; + private getInterval; + private schedule; + private iteration; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts new file mode 100644 index 0000000..1855132 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reauthenticate.d.ts @@ -0,0 +1,20 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserInternal } from '../../model/user'; +import { AuthCredential } from '../credentials'; +import { UserCredentialImpl } from './user_credential_impl'; +export declare function _reauthenticate(user: UserInternal, credential: AuthCredential, bypassAuthState?: boolean): Promise<UserCredentialImpl>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts new file mode 100644 index 0000000..f2690fa --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/reload.d.ts @@ -0,0 +1,29 @@ +/** + * @license + * Copyright 2019 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { User, UserInfo } from '../../model/public_types'; +import { ProviderUserInfo } from '../../api/account_management/account'; +import { UserInternal } from '../../model/user'; +export declare function _reloadWithoutSaving(user: UserInternal): Promise<void>; +/** + * Reloads user account data, if signed in. + * + * @param user - The user. + * + * @public + */ +export declare function reload(user: User): Promise<void>; +export declare function extractProviderData(providers: ProviderUserInfo[]): UserInfo[]; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts new file mode 100644 index 0000000..790e283 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/token_manager.d.ts @@ -0,0 +1,50 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { FinalizeMfaResponse } from '../../api/authentication/mfa'; +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +import { PersistedBlob } from '../persistence'; +/** + * The number of milliseconds before the official expiration time of a token + * to refresh that token, to provide a buffer for RPCs to complete. + */ +export declare const enum Buffer { + TOKEN_REFRESH = 30000 +} +/** + * We need to mark this class as internal explicitly to exclude it in the public typings, because + * it references AuthInternal which has a circular dependency with UserInternal. + * + * @internal + */ +export declare class StsTokenManager { + refreshToken: string | null; + accessToken: string | null; + expirationTime: number | null; + get isExpired(): boolean; + updateFromServerResponse(response: IdTokenResponse | FinalizeMfaResponse): void; + updateFromIdToken(idToken: string): void; + getToken(auth: AuthInternal, forceRefresh?: boolean): Promise<string | null>; + clearRefreshToken(): void; + private refresh; + private updateTokensAndExpiration; + static fromJSON(appName: string, object: PersistedBlob): StsTokenManager; + toJSON(): object; + _assign(stsTokenManager: StsTokenManager): void; + _clone(): StsTokenManager; + _performRefresh(): never; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts new file mode 100644 index 0000000..44ece34 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_credential_impl.d.ts @@ -0,0 +1,37 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { PhoneOrOauthTokenResponse } from '../../api/authentication/mfa'; +import { IdTokenResponse } from '../../model/id_token'; +import { UserInternal, UserCredentialInternal } from '../../model/user'; +import { AuthInternal } from '../../model/auth'; +import { OperationType, ProviderId } from '../../model/enums'; +interface UserCredentialParams { + readonly user: UserInternal; + readonly providerId: ProviderId | string | null; + readonly _tokenResponse?: PhoneOrOauthTokenResponse; + readonly operationType: OperationType; +} +export declare class UserCredentialImpl implements UserCredentialInternal, UserCredentialParams { + readonly user: UserInternal; + readonly providerId: ProviderId | string | null; + readonly _tokenResponse: PhoneOrOauthTokenResponse | undefined; + readonly operationType: OperationType; + constructor(params: UserCredentialParams); + static _fromIdTokenResponse(auth: AuthInternal, operationType: OperationType, idTokenResponse: IdTokenResponse, isAnonymous?: boolean): Promise<UserCredentialInternal>; + static _forOperation(user: UserInternal, operationType: OperationType, response: PhoneOrOauthTokenResponse): Promise<UserCredentialImpl>; +} +export {}; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts new file mode 100644 index 0000000..f795111 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_impl.d.ts @@ -0,0 +1,74 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { IdTokenResult } from '../../model/public_types'; +import { NextFn } from '@firebase/util'; +import { APIUserInfo, GetAccountInfoResponse } from '../../api/account_management/account'; +import { FinalizeMfaResponse } from '../../api/authentication/mfa'; +import { AuthInternal } from '../../model/auth'; +import { IdTokenResponse } from '../../model/id_token'; +import { MutableUserInfo, UserInternal, UserParameters } from '../../model/user'; +import { PersistedBlob } from '../persistence'; +import { StsTokenManager } from './token_manager'; +import { UserMetadata } from './user_metadata'; +import { ProviderId } from '../../model/enums'; +export declare class UserImpl implements UserInternal { + readonly providerId = ProviderId.FIREBASE; + stsTokenManager: StsTokenManager; + private accessToken; + uid: string; + auth: AuthInternal; + emailVerified: boolean; + isAnonymous: boolean; + tenantId: string | null; + readonly metadata: UserMetadata; + providerData: MutableUserInfo[]; + displayName: string | null; + email: string | null; + phoneNumber: string | null; + photoURL: string | null; + _redirectEventId?: string; + private readonly proactiveRefresh; + constructor({ uid, auth, stsTokenManager, ...opt }: UserParameters); + getIdToken(forceRefresh?: boolean): Promise<string>; + getIdTokenResult(forceRefresh?: boolean): Promise<IdTokenResult>; + reload(): Promise<void>; + private reloadUserInfo; + private reloadListener; + _assign(user: UserInternal): void; + _clone(auth: AuthInternal): UserInternal; + _onReload(callback: NextFn<APIUserInfo>): void; + _notifyReloadListener(userInfo: APIUserInfo): void; + _startProactiveRefresh(): void; + _stopProactiveRefresh(): void; + _updateTokensIfNecessary(response: IdTokenResponse | FinalizeMfaResponse, reload?: boolean): Promise<void>; + delete(): Promise<void>; + toJSON(): PersistedBlob; + get refreshToken(): string; + static _fromJSON(auth: AuthInternal, object: PersistedBlob): UserInternal; + /** + * Initialize a User from an idToken server response + * @param auth + * @param idTokenResponse + */ + static _fromIdTokenResponse(auth: AuthInternal, idTokenResponse: IdTokenResponse, isAnonymous?: boolean): Promise<UserInternal>; + /** + * Initialize a User from an idToken server response + * @param auth + * @param idTokenResponse + */ + static _fromGetAccountInfoResponse(auth: AuthInternal, response: GetAccountInfoResponse, idToken: string): Promise<UserInternal>; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts new file mode 100644 index 0000000..c732ce3 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/user/user_metadata.d.ts @@ -0,0 +1,27 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { UserMetadata as UserMetadataType } from '../../model/public_types'; +export declare class UserMetadata implements UserMetadataType { + private createdAt?; + private lastLoginAt?; + creationTime?: string; + lastSignInTime?: string; + constructor(createdAt?: (string | number) | undefined, lastLoginAt?: (string | number) | undefined); + private _initializeTime; + _copy(metadata: UserMetadata): void; + toJSON(): object; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts new file mode 100644 index 0000000..b877b42 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/assert.d.ts @@ -0,0 +1,94 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { Auth } from '../../model/public_types'; +import { FirebaseError } from '@firebase/util'; +import { AuthErrorCode, AuthErrorParams } from '../errors'; +type LessAppName<K extends AuthErrorCode> = Omit<AuthErrorParams[K], 'appName'>; +/** + * Unconditionally fails, throwing a developer facing INTERNAL_ERROR + * + * @example + * ```javascript + * fail(auth, AuthErrorCode.MFA_REQUIRED); // Error: the MFA_REQUIRED error needs more params than appName + * fail(auth, AuthErrorCode.MFA_REQUIRED, {serverResponse}); // Compiles + * fail(AuthErrorCode.INTERNAL_ERROR); // Compiles; internal error does not need appName + * fail(AuthErrorCode.USER_DELETED); // Error: USER_DELETED requires app name + * fail(auth, AuthErrorCode.USER_DELETED); // Compiles; USER_DELETED _only_ needs app name + * ``` + * + * @param appName App name for tagging the error + * @throws FirebaseError + */ +export declare function _fail<K extends AuthErrorCode>(code: K, ...data: {} extends AuthErrorParams[K] ? [AuthErrorParams[K]?] : [AuthErrorParams[K]]): never; +export declare function _fail<K extends AuthErrorCode>(auth: Auth, code: K, ...data: {} extends LessAppName<K> ? [LessAppName<K>?] : [LessAppName<K>]): never; +export declare function _createError<K extends AuthErrorCode>(code: K, ...data: {} extends AuthErrorParams[K] ? [AuthErrorParams[K]?] : [AuthErrorParams[K]]): FirebaseError; +export declare function _createError<K extends AuthErrorCode>(auth: Auth, code: K, ...data: {} extends LessAppName<K> ? [LessAppName<K>?] : [LessAppName<K>]): FirebaseError; +export declare function _errorWithCustomMessage(auth: Auth, code: AuthErrorCode, message: string): FirebaseError; +export declare function _serverAppCurrentUserOperationNotSupportedError(auth: Auth): FirebaseError; +export declare function _assertInstanceOf(auth: Auth, object: object, instance: unknown): void; +export declare function _assert<K extends AuthErrorCode>(assertion: unknown, code: K, ...data: {} extends AuthErrorParams[K] ? [AuthErrorParams[K]?] : [AuthErrorParams[K]]): asserts assertion; +export declare function _assert<K extends AuthErrorCode>(assertion: unknown, auth: Auth, code: K, ...data: {} extends LessAppName<K> ? [LessAppName<K>?] : [LessAppName<K>]): asserts assertion; +type TypeExpectation = Function | string | MapType; +interface MapType extends Record<string, TypeExpectation | Optional> { +} +declare class Optional { + readonly type: TypeExpectation; + constructor(type: TypeExpectation); +} +export declare function opt(type: TypeExpectation): Optional; +/** + * Asserts the runtime types of arguments. The 'expected' field can be one of + * a class, a string (representing a "typeof" call), or a record map of name + * to type. Furthermore, the opt() function can be used to mark a field as + * optional. For example: + * + * function foo(auth: Auth, profile: {displayName?: string}, update = false) { + * assertTypes(arguments, [AuthImpl, {displayName: opt('string')}, opt('boolean')]); + * } + * + * opt() can be used for any type: + * function foo(auth?: Auth) { + * assertTypes(arguments, [opt(AuthImpl)]); + * } + * + * The string types can be or'd together, and you can use "null" as well (note + * that typeof null === 'object'; this is an edge case). For example: + * + * function foo(profile: {displayName?: string | null}) { + * assertTypes(arguments, [{displayName: opt('string|null')}]); + * } + * + * @param args + * @param expected + */ +export declare function assertTypes(args: Omit<IArguments, 'callee'>, ...expected: Array<TypeExpectation | Optional>): void; +/** + * Unconditionally fails, throwing an internal error with the given message. + * + * @param failure type of failure encountered + * @throws Error + */ +export declare function debugFail(failure: string): never; +/** + * Fails if the given assertion condition is false, throwing an Error with the + * given message if it did. + * + * @param assertion + * @param message + */ +export declare function debugAssert(assertion: unknown, message: string): asserts assertion; +export {}; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts new file mode 100644 index 0000000..f2abeb6 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/browser.d.ts @@ -0,0 +1,50 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/** + * Enums for Browser name. + */ +export declare const enum BrowserName { + ANDROID = "Android", + BLACKBERRY = "Blackberry", + EDGE = "Edge", + FIREFOX = "Firefox", + IE = "IE", + IEMOBILE = "IEMobile", + OPERA = "Opera", + OTHER = "Other", + CHROME = "Chrome", + SAFARI = "Safari", + SILK = "Silk", + WEBOS = "Webos" +} +/** + * Determine the browser for the purposes of reporting usage to the API + */ +export declare function _getBrowserName(userAgent: string): BrowserName | string; +export declare function _isFirefox(ua?: string): boolean; +export declare function _isSafari(userAgent?: string): boolean; +export declare function _isChromeIOS(ua?: string): boolean; +export declare function _isIEMobile(ua?: string): boolean; +export declare function _isAndroid(ua?: string): boolean; +export declare function _isBlackBerry(ua?: string): boolean; +export declare function _isWebOS(ua?: string): boolean; +export declare function _isIOS(ua?: string): boolean; +export declare function _isIOS7Or8(ua?: string): boolean; +export declare function _isIOSStandalone(ua?: string): boolean; +export declare function _isIE10(): boolean; +export declare function _isMobileBrowser(ua?: string): boolean; +export declare function _isIframe(): boolean; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts new file mode 100644 index 0000000..6358c7e --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/delay.d.ts @@ -0,0 +1,31 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export declare const enum DelayMin { + OFFLINE = 5000 +} +/** + * A structure to help pick between a range of long and short delay durations + * depending on the current environment. In general, the long delay is used for + * mobile environments whereas short delays are used for desktop environments. + */ +export declare class Delay { + private readonly shortDelay; + private readonly longDelay; + private readonly isMobile; + constructor(shortDelay: number, longDelay: number); + get(): number; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts new file mode 100644 index 0000000..068c50a --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/emulator.d.ts @@ -0,0 +1,18 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { ConfigInternal } from '../../model/auth'; +export declare function _emulatorUrl(config: ConfigInternal, path?: string): string; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts new file mode 100644 index 0000000..a235857 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/event_id.d.ts @@ -0,0 +1,17 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export declare function _generateEventId(prefix?: string, digits?: number): string; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts new file mode 100644 index 0000000..b30fc05 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/fetch_provider.d.ts @@ -0,0 +1,25 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export declare class FetchProvider { + private static fetchImpl; + private static headersImpl; + private static responseImpl; + static initialize(fetchImpl: typeof fetch, headersImpl?: typeof Headers, responseImpl?: typeof Response): void; + static fetch(): typeof fetch; + static headers(): typeof Headers; + static response(): typeof Response; +} diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts new file mode 100644 index 0000000..d5ff063 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/handler.d.ts @@ -0,0 +1,20 @@ +/** + * @license + * Copyright 2021 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthProvider } from '../../model/public_types'; +import { AuthInternal } from '../../model/auth'; +import { AuthEventType } from '../../model/popup_redirect'; +export declare function _getRedirectUrl(auth: AuthInternal, provider: AuthProvider, authType: AuthEventType, redirectUrl?: string, eventId?: string, additionalParams?: Record<string, string>): Promise<string>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts new file mode 100644 index 0000000..33e7c95 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/instantiator.d.ts @@ -0,0 +1,28 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/** + * Our API has a lot of one-off constants that are used to do things. + * Unfortunately we can't export these as classes instantiated directly since + * the constructor may side effect and therefore can't be proven to be safely + * culled. Instead, we export these classes themselves as a lowerCamelCase + * constant, and instantiate them under the hood. + */ +export interface SingletonInstantiator<T> { + new (): T; +} +export declare function _getInstance<T>(cls: unknown): T; +export declare function _clearInstanceMap(): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts new file mode 100644 index 0000000..c79ac38 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/location.d.ts @@ -0,0 +1,19 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export declare function _getCurrentUrl(): string; +export declare function _isHttpOrHttps(): boolean; +export declare function _getCurrentScheme(): string | null; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts new file mode 100644 index 0000000..b65ea5c --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/log.d.ts @@ -0,0 +1,23 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { LogLevel } from '@firebase/logger'; +export { LogLevel }; +export declare function _getLogLevel(): LogLevel; +export declare function _setLogLevel(newLevel: LogLevel): void; +export declare function _logDebug(msg: string, ...args: string[]): void; +export declare function _logWarn(msg: string, ...args: string[]): void; +export declare function _logError(msg: string, ...args: string[]): void; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts new file mode 100644 index 0000000..ac91633 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/navigator.d.ts @@ -0,0 +1,21 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +/** + * Determine whether the browser is working online + */ +export declare function _isOnline(): boolean; +export declare function _getUserLanguage(): string | null; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts new file mode 100644 index 0000000..c2ffdb3 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/providers.d.ts @@ -0,0 +1,23 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export interface ProviderAssociatedObject { + providerId?: string; +} +/** + * Takes a set of UserInfo provider data and converts it to a set of names + */ +export declare function providerDataAsNames<T extends ProviderAssociatedObject>(providerData: T[]): Set<string>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts new file mode 100644 index 0000000..e7c2c7c --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/resolver.d.ts @@ -0,0 +1,25 @@ +/** + * @license + * Copyright 2021 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { PopupRedirectResolver } from '../../model/public_types'; +import { AuthInternal } from '../../model/auth'; +import { PopupRedirectResolverInternal } from '../../model/popup_redirect'; +/** + * Chooses a popup/redirect resolver to use. This prefers the override (which + * is directly passed in), and falls back to the property set on the auth + * object. If neither are available, this function errors w/ an argument error. + */ +export declare function _withDefaultResolver(auth: AuthInternal, resolverOverride: PopupRedirectResolver | undefined): PopupRedirectResolverInternal; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts new file mode 100644 index 0000000..d82976e --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/time.d.ts @@ -0,0 +1,17 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export declare function utcTimestampToDateString(utcTimestamp?: string | number): string | undefined; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts new file mode 100644 index 0000000..dde89b0 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/validate_origin.d.ts @@ -0,0 +1,18 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +import { AuthInternal } from '../../model/auth'; +export declare function _validateOrigin(auth: AuthInternal): Promise<void>; diff --git a/frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts new file mode 100644 index 0000000..342ceb5 --- /dev/null +++ b/frontend-old/node_modules/@firebase/auth/dist/src/core/util/version.d.ts @@ -0,0 +1,31 @@ +/** + * @license + * Copyright 2020 Google LLC + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ +export declare const enum ClientImplementation { + CORE = "JsCore" +} +/** + * @internal + */ +export declare const enum ClientPlatform { + BROWSER = "Browser", + NODE = "Node", + REACT_NATIVE = "ReactNative", + CORDOVA = "Cordova", + WORKER = "Worker", + WEB_EXTENSION = "WebExtension" +} +export declare function _getClientVersion(clientPlatform: ClientPlatform, frameworks?: readonly string[]): string; |
