fix: oauth 2.0 authentication type is breaking (#3531)
This commit is contained in:
@@ -102,7 +102,7 @@
|
|||||||
"workbox-window": "^7.0.0",
|
"workbox-window": "^7.0.0",
|
||||||
"xml-formatter": "^3.5.0",
|
"xml-formatter": "^3.5.0",
|
||||||
"yargs-parser": "^21.1.1",
|
"yargs-parser": "^21.1.1",
|
||||||
"zod": "^3.22.2"
|
"zod": "^3.22.4"
|
||||||
},
|
},
|
||||||
"devDependencies": {
|
"devDependencies": {
|
||||||
"@esbuild-plugins/node-globals-polyfill": "^0.2.3",
|
"@esbuild-plugins/node-globals-polyfill": "^0.2.3",
|
||||||
|
|||||||
@@ -43,6 +43,7 @@ import { useI18n } from "@composables/i18n"
|
|||||||
import { useToast } from "@composables/toast"
|
import { useToast } from "@composables/toast"
|
||||||
import { tokenRequest } from "~/helpers/oauth"
|
import { tokenRequest } from "~/helpers/oauth"
|
||||||
import { getCombinedEnvVariables } from "~/helpers/preRequest"
|
import { getCombinedEnvVariables } from "~/helpers/preRequest"
|
||||||
|
import * as E from "fp-ts/Either"
|
||||||
|
|
||||||
const t = useI18n()
|
const t = useI18n()
|
||||||
const toast = useToast()
|
const toast = useToast()
|
||||||
@@ -98,7 +99,11 @@ const handleAccessTokenRequest = async () => {
|
|||||||
clientSecret: parseTemplateString(clientSecret.value, envVars),
|
clientSecret: parseTemplateString(clientSecret.value, envVars),
|
||||||
scope: parseTemplateString(scope.value, envVars),
|
scope: parseTemplateString(scope.value, envVars),
|
||||||
}
|
}
|
||||||
await tokenRequest(tokenReqParams)
|
const res = await tokenRequest(tokenReqParams)
|
||||||
|
|
||||||
|
if (res && E.isLeft(res)) {
|
||||||
|
toast.error(res.left)
|
||||||
|
}
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
toast.error(`${e}`)
|
toast.error(`${e}`)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,7 +4,10 @@ import {
|
|||||||
removeLocalConfig,
|
removeLocalConfig,
|
||||||
} from "~/newstore/localpersistence"
|
} from "~/newstore/localpersistence"
|
||||||
|
|
||||||
const redirectUri = `${window.location.origin}/`
|
import * as E from "fp-ts/Either"
|
||||||
|
import { z } from "zod"
|
||||||
|
|
||||||
|
const redirectUri = `${window.location.origin}/oauth`
|
||||||
|
|
||||||
// GENERAL HELPER FUNCTIONS
|
// GENERAL HELPER FUNCTIONS
|
||||||
|
|
||||||
@@ -16,7 +19,7 @@ const redirectUri = `${window.location.origin}/`
|
|||||||
* @returns {Object}
|
* @returns {Object}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const sendPostRequest = async (url, params) => {
|
const sendPostRequest = async (url: string, params: Record<string, string>) => {
|
||||||
const body = Object.keys(params)
|
const body = Object.keys(params)
|
||||||
.map((key) => `${key}=${params[key]}`)
|
.map((key) => `${key}=${params[key]}`)
|
||||||
.join("&")
|
.join("&")
|
||||||
@@ -30,9 +33,9 @@ const sendPostRequest = async (url, params) => {
|
|||||||
try {
|
try {
|
||||||
const response = await fetch(url, options)
|
const response = await fetch(url, options)
|
||||||
const data = await response.json()
|
const data = await response.json()
|
||||||
return data
|
return E.right(data)
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
console.error(e)
|
return E.left("AUTH_TOKEN_REQUEST_FAILED")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -43,7 +46,7 @@ const sendPostRequest = async (url, params) => {
|
|||||||
* @returns {Object}
|
* @returns {Object}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const parseQueryString = (searchQuery) => {
|
const parseQueryString = (searchQuery: string): Record<string, string> => {
|
||||||
if (searchQuery === "") {
|
if (searchQuery === "") {
|
||||||
return {}
|
return {}
|
||||||
}
|
}
|
||||||
@@ -61,7 +64,7 @@ const parseQueryString = (searchQuery) => {
|
|||||||
* @returns {Object}
|
* @returns {Object}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const getTokenConfiguration = async (endpoint) => {
|
const getTokenConfiguration = async (endpoint: string) => {
|
||||||
const options = {
|
const options = {
|
||||||
method: "GET",
|
method: "GET",
|
||||||
headers: {
|
headers: {
|
||||||
@@ -71,9 +74,9 @@ const getTokenConfiguration = async (endpoint) => {
|
|||||||
try {
|
try {
|
||||||
const response = await fetch(endpoint, options)
|
const response = await fetch(endpoint, options)
|
||||||
const config = await response.json()
|
const config = await response.json()
|
||||||
return config
|
return E.right(config)
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
console.error(e)
|
return E.left("OIDC_DISCOVERY_FAILED")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -97,7 +100,7 @@ const generateRandomString = () => {
|
|||||||
* @returns {Promise<ArrayBuffer>}
|
* @returns {Promise<ArrayBuffer>}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const sha256 = (plain) => {
|
const sha256 = (plain: string) => {
|
||||||
const encoder = new TextEncoder()
|
const encoder = new TextEncoder()
|
||||||
const data = encoder.encode(plain)
|
const data = encoder.encode(plain)
|
||||||
return window.crypto.subtle.digest("SHA-256", data)
|
return window.crypto.subtle.digest("SHA-256", data)
|
||||||
@@ -111,15 +114,18 @@ const sha256 = (plain) => {
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
const base64urlencode = (
|
const base64urlencode = (
|
||||||
str // Converts the ArrayBuffer to string using Uint8 array to convert to what btoa accepts.
|
str: ArrayBuffer // Converts the ArrayBuffer to string using Uint8 array to convert to what btoa accepts.
|
||||||
) =>
|
) => {
|
||||||
|
const hashArray = Array.from(new Uint8Array(str))
|
||||||
|
|
||||||
// btoa accepts chars only within ascii 0-255 and base64 encodes them.
|
// btoa accepts chars only within ascii 0-255 and base64 encodes them.
|
||||||
// Then convert the base64 encoded to base64url encoded
|
// Then convert the base64 encoded to base64url encoded
|
||||||
// (replace + with -, replace / with _, trim trailing =)
|
// (replace + with -, replace / with _, trim trailing =)
|
||||||
btoa(String.fromCharCode.apply(null, new Uint8Array(str)))
|
return btoa(String.fromCharCode.apply(null, hashArray))
|
||||||
.replace(/\+/g, "-")
|
.replace(/\+/g, "-")
|
||||||
.replace(/\//g, "_")
|
.replace(/\//g, "_")
|
||||||
.replace(/=+$/, "")
|
.replace(/=+$/, "")
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Return the base64-urlencoded sha256 hash for the PKCE challenge
|
* Return the base64-urlencoded sha256 hash for the PKCE challenge
|
||||||
@@ -128,13 +134,23 @@ const base64urlencode = (
|
|||||||
* @returns {String}
|
* @returns {String}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const pkceChallengeFromVerifier = async (v) => {
|
const pkceChallengeFromVerifier = async (v: string) => {
|
||||||
const hashed = await sha256(v)
|
const hashed = await sha256(v)
|
||||||
return base64urlencode(hashed)
|
return base64urlencode(hashed)
|
||||||
}
|
}
|
||||||
|
|
||||||
// OAUTH REQUEST
|
// OAUTH REQUEST
|
||||||
|
|
||||||
|
type TokenRequestParams = {
|
||||||
|
oidcDiscoveryUrl: string
|
||||||
|
grantType: string
|
||||||
|
authUrl: string
|
||||||
|
accessTokenUrl: string
|
||||||
|
clientId: string
|
||||||
|
clientSecret: string
|
||||||
|
scope: string
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Initiates PKCE Auth Code flow when requested
|
* Initiates PKCE Auth Code flow when requested
|
||||||
*
|
*
|
||||||
@@ -150,16 +166,28 @@ const tokenRequest = async ({
|
|||||||
clientId,
|
clientId,
|
||||||
clientSecret,
|
clientSecret,
|
||||||
scope,
|
scope,
|
||||||
}) => {
|
}: TokenRequestParams) => {
|
||||||
// Check oauth configuration
|
// Check oauth configuration
|
||||||
if (oidcDiscoveryUrl !== "") {
|
if (oidcDiscoveryUrl !== "") {
|
||||||
// eslint-disable-next-line camelcase
|
const res = await getTokenConfiguration(oidcDiscoveryUrl)
|
||||||
const { authorization_endpoint, token_endpoint } =
|
|
||||||
await getTokenConfiguration(oidcDiscoveryUrl)
|
const OIDCConfigurationSchema = z.object({
|
||||||
// eslint-disable-next-line camelcase
|
authorization_endpoint: z.string(),
|
||||||
authUrl = authorization_endpoint
|
token_endpoint: z.string(),
|
||||||
// eslint-disable-next-line camelcase
|
})
|
||||||
accessTokenUrl = token_endpoint
|
|
||||||
|
if (E.isLeft(res)) {
|
||||||
|
return E.left("OIDC_DISCOVERY_FAILED" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
const parsedOIDCConfiguration = OIDCConfigurationSchema.safeParse(res.right)
|
||||||
|
|
||||||
|
if (!parsedOIDCConfiguration.success) {
|
||||||
|
return E.left("OIDC_DISCOVERY_FAILED" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
authUrl = parsedOIDCConfiguration.data.authorization_endpoint
|
||||||
|
accessTokenUrl = parsedOIDCConfiguration.data.token_endpoint
|
||||||
}
|
}
|
||||||
// Store oauth information
|
// Store oauth information
|
||||||
setLocalConfig("tokenEndpoint", accessTokenUrl)
|
setLocalConfig("tokenEndpoint", accessTokenUrl)
|
||||||
@@ -190,7 +218,7 @@ const tokenRequest = async ({
|
|||||||
)}&code_challenge_method=S256`
|
)}&code_challenge_method=S256`
|
||||||
|
|
||||||
// Redirect to the authorization server
|
// Redirect to the authorization server
|
||||||
window.location = buildUrl()
|
window.location.assign(buildUrl())
|
||||||
}
|
}
|
||||||
|
|
||||||
// OAUTH REDIRECT HANDLING
|
// OAUTH REDIRECT HANDLING
|
||||||
@@ -202,44 +230,84 @@ const tokenRequest = async ({
|
|||||||
* @returns {Promise<any | void>}
|
* @returns {Promise<any | void>}
|
||||||
*/
|
*/
|
||||||
|
|
||||||
const oauthRedirect = () => {
|
const handleOAuthRedirect = async () => {
|
||||||
let tokenResponse = ""
|
const queryParams = parseQueryString(window.location.search.substring(1))
|
||||||
const q = parseQueryString(window.location.search.substring(1))
|
|
||||||
// Check if the server returned an error string
|
// Check if the server returned an error string
|
||||||
if (q.error) {
|
if (queryParams.error) {
|
||||||
alert(`Error returned from authorization server: ${q.error}`)
|
return E.left("AUTH_SERVER_RETURNED_ERROR" as const)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!queryParams.code) {
|
||||||
|
return E.left("NO_AUTH_CODE" as const)
|
||||||
|
}
|
||||||
|
|
||||||
// If the server returned an authorization code, attempt to exchange it for an access token
|
// If the server returned an authorization code, attempt to exchange it for an access token
|
||||||
if (q.code) {
|
|
||||||
// Verify state matches what we set at the beginning
|
// Verify state matches what we set at the beginning
|
||||||
if (getLocalConfig("pkce_state") !== q.state) {
|
if (getLocalConfig("pkce_state") !== queryParams.state) {
|
||||||
alert("Invalid state")
|
return E.left("INVALID_STATE" as const)
|
||||||
Promise.reject(tokenResponse)
|
}
|
||||||
} else {
|
|
||||||
try {
|
const tokenEndpoint = getLocalConfig("tokenEndpoint")
|
||||||
|
const clientID = getLocalConfig("client_id")
|
||||||
|
const clientSecret = getLocalConfig("client_secret")
|
||||||
|
const codeVerifier = getLocalConfig("pkce_codeVerifier")
|
||||||
|
|
||||||
|
if (!tokenEndpoint) {
|
||||||
|
return E.left("NO_TOKEN_ENDPOINT" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!clientID) {
|
||||||
|
return E.left("NO_CLIENT_ID" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!clientSecret) {
|
||||||
|
return E.left("NO_CLIENT_SECRET" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!codeVerifier) {
|
||||||
|
return E.left("NO_CODE_VERIFIER" as const)
|
||||||
|
}
|
||||||
|
|
||||||
// Exchange the authorization code for an access token
|
// Exchange the authorization code for an access token
|
||||||
tokenResponse = sendPostRequest(getLocalConfig("tokenEndpoint"), {
|
const tokenResponse: E.Either<string, any> = await sendPostRequest(
|
||||||
|
tokenEndpoint,
|
||||||
|
{
|
||||||
grant_type: "authorization_code",
|
grant_type: "authorization_code",
|
||||||
code: q.code,
|
code: queryParams.code,
|
||||||
client_id: getLocalConfig("client_id"),
|
client_id: clientID,
|
||||||
client_secret: getLocalConfig("client_secret"),
|
client_secret: clientSecret,
|
||||||
redirect_uri: redirectUri,
|
redirect_uri: redirectUri,
|
||||||
code_verifier: getLocalConfig("pkce_codeVerifier"),
|
code_verifier: codeVerifier,
|
||||||
})
|
|
||||||
} catch (e) {
|
|
||||||
console.error(e)
|
|
||||||
return Promise.reject(tokenResponse)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
)
|
||||||
|
|
||||||
// Clean these up since we don't need them anymore
|
// Clean these up since we don't need them anymore
|
||||||
|
clearPKCEState()
|
||||||
|
|
||||||
|
if (E.isLeft(tokenResponse)) {
|
||||||
|
return E.left("AUTH_TOKEN_REQUEST_FAILED" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
const withAccessTokenSchema = z.object({
|
||||||
|
access_token: z.string(),
|
||||||
|
})
|
||||||
|
|
||||||
|
const parsedTokenResponse = withAccessTokenSchema.safeParse(
|
||||||
|
tokenResponse.right
|
||||||
|
)
|
||||||
|
|
||||||
|
return parsedTokenResponse.success
|
||||||
|
? E.right(parsedTokenResponse.data)
|
||||||
|
: E.left("AUTH_TOKEN_REQUEST_INVALID_RESPONSE" as const)
|
||||||
|
}
|
||||||
|
|
||||||
|
const clearPKCEState = () => {
|
||||||
removeLocalConfig("pkce_state")
|
removeLocalConfig("pkce_state")
|
||||||
removeLocalConfig("pkce_codeVerifier")
|
removeLocalConfig("pkce_codeVerifier")
|
||||||
removeLocalConfig("tokenEndpoint")
|
removeLocalConfig("tokenEndpoint")
|
||||||
removeLocalConfig("client_id")
|
removeLocalConfig("client_id")
|
||||||
removeLocalConfig("client_secret")
|
removeLocalConfig("client_secret")
|
||||||
return tokenResponse
|
|
||||||
}
|
|
||||||
return Promise.reject(tokenResponse)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
export { tokenRequest, oauthRedirect }
|
export { tokenRequest, handleOAuthRedirect }
|
||||||
@@ -94,7 +94,7 @@
|
|||||||
</template>
|
</template>
|
||||||
|
|
||||||
<script lang="ts" setup>
|
<script lang="ts" setup>
|
||||||
import { ref, onMounted, onBeforeUnmount, onBeforeMount } from "vue"
|
import { ref, onMounted, onBeforeUnmount } from "vue"
|
||||||
import { safelyExtractRESTRequest } from "@hoppscotch/data"
|
import { safelyExtractRESTRequest } from "@hoppscotch/data"
|
||||||
import { translateExtURLParams } from "~/helpers/RESTExtURLParams"
|
import { translateExtURLParams } from "~/helpers/RESTExtURLParams"
|
||||||
import { useRoute } from "vue-router"
|
import { useRoute } from "vue-router"
|
||||||
@@ -114,7 +114,6 @@ import {
|
|||||||
} from "rxjs"
|
} from "rxjs"
|
||||||
import { useToast } from "~/composables/toast"
|
import { useToast } from "~/composables/toast"
|
||||||
import { watchDebounced } from "@vueuse/core"
|
import { watchDebounced } from "@vueuse/core"
|
||||||
import { oauthRedirect } from "~/helpers/oauth"
|
|
||||||
import { useReadonlyStream } from "~/composables/stream"
|
import { useReadonlyStream } from "~/composables/stream"
|
||||||
import {
|
import {
|
||||||
changeCurrentSyncStatus,
|
changeCurrentSyncStatus,
|
||||||
@@ -414,28 +413,6 @@ function setupTabStateSync() {
|
|||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
function oAuthURL() {
|
|
||||||
onBeforeMount(async () => {
|
|
||||||
try {
|
|
||||||
const tokenInfo = await oauthRedirect()
|
|
||||||
if (
|
|
||||||
typeof tokenInfo === "object" &&
|
|
||||||
tokenInfo.hasOwnProperty("access_token")
|
|
||||||
) {
|
|
||||||
if (
|
|
||||||
tabs.currentActiveTab.value.document.request.auth.authType ===
|
|
||||||
"oauth-2"
|
|
||||||
) {
|
|
||||||
tabs.currentActiveTab.value.document.request.auth.token =
|
|
||||||
tokenInfo.access_token
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// eslint-disable-next-line no-empty
|
|
||||||
} catch (_) {}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
defineActionHandler("contextmenu.open", ({ position, text }) => {
|
defineActionHandler("contextmenu.open", ({ position, text }) => {
|
||||||
if (text) {
|
if (text) {
|
||||||
contextMenu.value = {
|
contextMenu.value = {
|
||||||
@@ -454,7 +431,6 @@ defineActionHandler("contextmenu.open", ({ position, text }) => {
|
|||||||
|
|
||||||
setupTabStateSync()
|
setupTabStateSync()
|
||||||
bindRequestToURLParams()
|
bindRequestToURLParams()
|
||||||
oAuthURL()
|
|
||||||
|
|
||||||
defineActionHandler("rest.request.open", ({ doc }) => {
|
defineActionHandler("rest.request.open", ({ doc }) => {
|
||||||
tabs.createNewTab(doc)
|
tabs.createNewTab(doc)
|
||||||
|
|||||||
43
packages/hoppscotch-common/src/pages/oauth.vue
Normal file
43
packages/hoppscotch-common/src/pages/oauth.vue
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
<template>
|
||||||
|
<div class="flex justify-center items-center">
|
||||||
|
<HoppSmartSpinner />
|
||||||
|
</div>
|
||||||
|
</template>
|
||||||
|
|
||||||
|
<script setup lang="ts">
|
||||||
|
import { handleOAuthRedirect } from "~/helpers/oauth"
|
||||||
|
import { useToast } from "~/composables/toast"
|
||||||
|
|
||||||
|
import * as E from "fp-ts/Either"
|
||||||
|
import { useService } from "dioc/vue"
|
||||||
|
import { RESTTabService } from "~/services/tab/rest"
|
||||||
|
import { onMounted } from "vue"
|
||||||
|
|
||||||
|
import { useRouter } from "vue-router"
|
||||||
|
|
||||||
|
const router = useRouter()
|
||||||
|
|
||||||
|
const toast = useToast()
|
||||||
|
|
||||||
|
const tabs = useService(RESTTabService)
|
||||||
|
|
||||||
|
onMounted(async () => {
|
||||||
|
const tokenInfo = await handleOAuthRedirect()
|
||||||
|
|
||||||
|
if (E.isLeft(tokenInfo)) {
|
||||||
|
toast.error(tokenInfo.left)
|
||||||
|
router.push("/")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if (
|
||||||
|
tabs.currentActiveTab.value.document.request.auth.authType === "oauth-2"
|
||||||
|
) {
|
||||||
|
tabs.currentActiveTab.value.document.request.auth.token =
|
||||||
|
tokenInfo.right.access_token
|
||||||
|
|
||||||
|
router.push("/")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
})
|
||||||
|
</script>
|
||||||
22
pnpm-lock.yaml
generated
22
pnpm-lock.yaml
generated
@@ -611,8 +611,8 @@ importers:
|
|||||||
specifier: ^21.1.1
|
specifier: ^21.1.1
|
||||||
version: 21.1.1
|
version: 21.1.1
|
||||||
zod:
|
zod:
|
||||||
specifier: ^3.22.2
|
specifier: ^3.22.4
|
||||||
version: 3.22.2
|
version: 3.22.4
|
||||||
devDependencies:
|
devDependencies:
|
||||||
'@esbuild-plugins/node-globals-polyfill':
|
'@esbuild-plugins/node-globals-polyfill':
|
||||||
specifier: ^0.2.3
|
specifier: ^0.2.3
|
||||||
@@ -5531,9 +5531,9 @@ packages:
|
|||||||
'@parcel/watcher':
|
'@parcel/watcher':
|
||||||
optional: true
|
optional: true
|
||||||
dependencies:
|
dependencies:
|
||||||
'@babel/generator': 7.22.10
|
'@babel/generator': 7.23.0
|
||||||
'@babel/template': 7.22.5
|
'@babel/template': 7.22.15
|
||||||
'@babel/types': 7.22.10
|
'@babel/types': 7.23.0
|
||||||
'@graphql-codegen/core': 4.0.0(graphql@16.8.0)
|
'@graphql-codegen/core': 4.0.0(graphql@16.8.0)
|
||||||
'@graphql-codegen/plugin-helpers': 5.0.1(graphql@16.8.0)
|
'@graphql-codegen/plugin-helpers': 5.0.1(graphql@16.8.0)
|
||||||
'@graphql-tools/apollo-engine-loader': 8.0.0(graphql@16.8.0)
|
'@graphql-tools/apollo-engine-loader': 8.0.0(graphql@16.8.0)
|
||||||
@@ -5545,7 +5545,7 @@ packages:
|
|||||||
'@graphql-tools/load': 8.0.0(graphql@16.8.0)
|
'@graphql-tools/load': 8.0.0(graphql@16.8.0)
|
||||||
'@graphql-tools/prisma-loader': 8.0.1(@types/node@17.0.27)(graphql@16.8.0)
|
'@graphql-tools/prisma-loader': 8.0.1(@types/node@17.0.27)(graphql@16.8.0)
|
||||||
'@graphql-tools/url-loader': 8.0.0(@types/node@17.0.27)(graphql@16.8.0)
|
'@graphql-tools/url-loader': 8.0.0(@types/node@17.0.27)(graphql@16.8.0)
|
||||||
'@graphql-tools/utils': 10.0.5(graphql@16.8.0)
|
'@graphql-tools/utils': 10.0.6(graphql@16.8.0)
|
||||||
'@whatwg-node/fetch': 0.8.8
|
'@whatwg-node/fetch': 0.8.8
|
||||||
chalk: 4.1.2
|
chalk: 4.1.2
|
||||||
cosmiconfig: 8.2.0
|
cosmiconfig: 8.2.0
|
||||||
@@ -7390,7 +7390,7 @@ packages:
|
|||||||
graphql: ^14.0.0 || ^15.0.0 || ^16.0.0 || ^17.0.0
|
graphql: ^14.0.0 || ^15.0.0 || ^16.0.0 || ^17.0.0
|
||||||
dependencies:
|
dependencies:
|
||||||
'@graphql-tools/url-loader': 8.0.0(@types/node@17.0.27)(graphql@16.8.0)
|
'@graphql-tools/url-loader': 8.0.0(@types/node@17.0.27)(graphql@16.8.0)
|
||||||
'@graphql-tools/utils': 10.0.5(graphql@16.8.0)
|
'@graphql-tools/utils': 10.0.6(graphql@16.8.0)
|
||||||
'@types/js-yaml': 4.0.5
|
'@types/js-yaml': 4.0.5
|
||||||
'@types/json-stable-stringify': 1.0.34
|
'@types/json-stable-stringify': 1.0.34
|
||||||
'@whatwg-node/fetch': 0.9.9
|
'@whatwg-node/fetch': 0.9.9
|
||||||
@@ -7672,10 +7672,10 @@ packages:
|
|||||||
'@types/ws': 8.5.5
|
'@types/ws': 8.5.5
|
||||||
'@whatwg-node/fetch': 0.8.8
|
'@whatwg-node/fetch': 0.8.8
|
||||||
graphql: 16.6.0
|
graphql: 16.6.0
|
||||||
isomorphic-ws: 5.0.0(ws@8.13.0)
|
isomorphic-ws: 5.0.0(ws@8.14.2)
|
||||||
tslib: 2.6.2
|
tslib: 2.6.2
|
||||||
value-or-promise: 1.0.12
|
value-or-promise: 1.0.12
|
||||||
ws: 8.13.0
|
ws: 8.14.2
|
||||||
transitivePeerDependencies:
|
transitivePeerDependencies:
|
||||||
- '@types/node'
|
- '@types/node'
|
||||||
- bufferutil
|
- bufferutil
|
||||||
@@ -23744,7 +23744,7 @@ packages:
|
|||||||
graphql: 16.8.1
|
graphql: 16.8.1
|
||||||
iterall: 1.3.0
|
iterall: 1.3.0
|
||||||
symbol-observable: 1.2.0
|
symbol-observable: 1.2.0
|
||||||
ws: 7.4.6
|
ws: 7.5.9
|
||||||
transitivePeerDependencies:
|
transitivePeerDependencies:
|
||||||
- bufferutil
|
- bufferutil
|
||||||
- utf-8-validate
|
- utf-8-validate
|
||||||
@@ -27760,7 +27760,6 @@ packages:
|
|||||||
optional: true
|
optional: true
|
||||||
utf-8-validate:
|
utf-8-validate:
|
||||||
optional: true
|
optional: true
|
||||||
dev: true
|
|
||||||
|
|
||||||
/ws@8.12.1:
|
/ws@8.12.1:
|
||||||
resolution: {integrity: sha512-1qo+M9Ba+xNhPB+YTWUlK6M17brTut5EXbcBaMRN5pH5dFrXz7lzz1ChFSUq3bOUl8yEvSenhHmYUNJxFzdJew==}
|
resolution: {integrity: sha512-1qo+M9Ba+xNhPB+YTWUlK6M17brTut5EXbcBaMRN5pH5dFrXz7lzz1ChFSUq3bOUl8yEvSenhHmYUNJxFzdJew==}
|
||||||
@@ -28069,6 +28068,7 @@ packages:
|
|||||||
|
|
||||||
/zod@3.22.2:
|
/zod@3.22.2:
|
||||||
resolution: {integrity: sha512-wvWkphh5WQsJbVk1tbx1l1Ly4yg+XecD+Mq280uBGt9wa5BKSWf4Mhp6GmrkPixhMxmabYY7RbzlwVP32pbGCg==}
|
resolution: {integrity: sha512-wvWkphh5WQsJbVk1tbx1l1Ly4yg+XecD+Mq280uBGt9wa5BKSWf4Mhp6GmrkPixhMxmabYY7RbzlwVP32pbGCg==}
|
||||||
|
dev: true
|
||||||
|
|
||||||
/zod@3.22.4:
|
/zod@3.22.4:
|
||||||
resolution: {integrity: sha512-iC+8Io04lddc+mVqQ9AZ7OQ2MrUKGN+oIQyq1vemgt46jwCwLfhq7/pwnBnNXXXZb8VTVLKwp9EDkx+ryxIWmg==}
|
resolution: {integrity: sha512-iC+8Io04lddc+mVqQ9AZ7OQ2MrUKGN+oIQyq1vemgt46jwCwLfhq7/pwnBnNXXXZb8VTVLKwp9EDkx+ryxIWmg==}
|
||||||
|
|||||||
Reference in New Issue
Block a user