Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@sphereon/ssi-sdk.ms-authenticator

Package Overview
Dependencies
Maintainers
0
Versions
919
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@sphereon/ssi-sdk.ms-authenticator - npm Package Compare versions

Comparing version 0.30.2-feature.siop.fixes.41 to 0.30.2-feature.temp.issuer.branding.error.271

16

dist/authenticators/MsAuthenticator.js

@@ -15,3 +15,10 @@ "use strict";

Object.defineProperty(exports, "__esModule", { value: true });
exports.determineMSAuthId = exports.UsernamePasswordAuthenticator = exports.newMSClientCredentialAuthenticator = exports.getMSClientCredentialAccessToken = exports.assertEntraCredentialManifestUrlInCorrectRegion = exports.getEntraDIDEndpoint = exports.getMSOpenIDClientRegion = exports.MS_DID_ENDPOINT_EU = exports.MS_DID_ENDPOINT_NON_EU = void 0;
exports.MS_DID_ENDPOINT_EU = exports.MS_DID_ENDPOINT_NON_EU = void 0;
exports.getMSOpenIDClientRegion = getMSOpenIDClientRegion;
exports.getEntraDIDEndpoint = getEntraDIDEndpoint;
exports.assertEntraCredentialManifestUrlInCorrectRegion = assertEntraCredentialManifestUrlInCorrectRegion;
exports.getMSClientCredentialAccessToken = getMSClientCredentialAccessToken;
exports.newMSClientCredentialAuthenticator = newMSClientCredentialAuthenticator;
exports.UsernamePasswordAuthenticator = UsernamePasswordAuthenticator;
exports.determineMSAuthId = determineMSAuthId;
const msal_node_1 = require("@azure/msal-node");

@@ -43,3 +50,2 @@ const cross_fetch_1 = require("cross-fetch");

}
exports.getMSOpenIDClientRegion = getMSOpenIDClientRegion;
function getEntraDIDEndpoint(opts) {

@@ -52,3 +58,2 @@ return __awaiter(this, void 0, void 0, function* () {

}
exports.getEntraDIDEndpoint = getEntraDIDEndpoint;
function assertEntraCredentialManifestUrlInCorrectRegion(authenticationArgs) {

@@ -65,3 +70,2 @@ return __awaiter(this, void 0, void 0, function* () {

}
exports.assertEntraCredentialManifestUrlInCorrectRegion = assertEntraCredentialManifestUrlInCorrectRegion;
/**

@@ -109,3 +113,2 @@ * necessary fields are:

}
exports.getMSClientCredentialAccessToken = getMSClientCredentialAccessToken;
function newMSClientCredentialAuthenticator(authenticationArgs) {

@@ -131,3 +134,2 @@ return __awaiter(this, void 0, void 0, function* () {

}
exports.newMSClientCredentialAuthenticator = newMSClientCredentialAuthenticator;
/**

@@ -154,3 +156,2 @@ * Logs in with provided authenticationArgs and returns access token

}
exports.UsernamePasswordAuthenticator = UsernamePasswordAuthenticator;
function authOptions(authenticationArgs) {

@@ -162,3 +163,2 @@ return Object.assign({ clientId: authenticationArgs.azClientId, authority: authenticationArgs.authority ? authenticationArgs.authority : MS_LOGIN_PREFIX + authenticationArgs.azTenantId }, (authenticationArgs && 'azClientSecret' in authenticationArgs && { clientSecret: authenticationArgs.azClientSecret }));

}
exports.determineMSAuthId = determineMSAuthId;
//# sourceMappingURL=MsAuthenticator.js.map
{
"name": "@sphereon/ssi-sdk.ms-authenticator",
"version": "0.30.2-feature.siop.fixes.41+5b4bff06",
"version": "0.30.2-feature.temp.issuer.branding.error.271+b72a1c3b",
"source": "src/index.ts",

@@ -25,3 +25,3 @@ "main": "dist/index.js",

"engines": {
"node": ">= 16.0"
"node": ">= 20.0.0 < 22"
},

@@ -51,3 +51,3 @@ "files": [

"nx": {},
"gitHead": "5b4bff06f6681cff811bc80cc2346794322c352e"
"gitHead": "b72a1c3bdc114799106f290f00c396b8c6054730"
}

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc