@wix/api-client
Advanced tools
Comparing version 1.1.64 to 1.1.65
@@ -8,3 +8,3 @@ "use strict"; | ||
var _OAuthStrategy = require("../auth/oauth2/OAuthStrategy"); | ||
var _common = require("../common"); | ||
var _types = require("../auth/oauth2/types"); | ||
describe('OAuthStrategy', () => { | ||
@@ -46,3 +46,4 @@ const getClient = () => (0, _wixClient.createClient)({ | ||
refreshToken: { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -78,3 +79,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -93,3 +95,4 @@ }); | ||
const refreshToken = { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.MEMBER | ||
}; | ||
@@ -114,3 +117,4 @@ const tokens = await client.auth.generateVisitorTokens({ | ||
const refreshToken = { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: _types.TokenRole.VISITOR | ||
}; | ||
@@ -142,3 +146,4 @@ const tokens = await client.auth.generateVisitorTokens({ | ||
const tokens = await client.auth.renewToken({ | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: _types.TokenRole.VISITOR | ||
}); | ||
@@ -157,3 +162,4 @@ expect(global.fetch).toHaveBeenCalledWith(expect.any(String), expect.objectContaining({ | ||
refreshToken: { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -187,3 +193,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -203,3 +210,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -221,3 +229,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -233,3 +242,4 @@ } | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -260,3 +270,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -352,3 +363,4 @@ }); | ||
refreshToken: { | ||
value: 'refresh' | ||
value: 'refresh', | ||
role: _types.TokenRole.MEMBER | ||
} | ||
@@ -370,34 +382,2 @@ }); | ||
describe('isLoggedIn', () => { | ||
it('should set when have values', async () => { | ||
const client = getClient(); | ||
const refreshToken = { | ||
value: 'something' | ||
}; | ||
await client.auth.generateVisitorTokens({ | ||
refreshToken, | ||
accessToken: { | ||
value: _constants.VALID_TOKEN, | ||
expiresAt: (0, _tokenHelpers.getCurrentDate)() + 1000 | ||
} | ||
}); | ||
expect(global.fetch).toHaveBeenCalledWith(`https://${_common.API_URL}/members/v1/members/my`, { | ||
headers: { | ||
Authorization: _constants.VALID_TOKEN | ||
} | ||
}); | ||
}); | ||
it('should set when have refresh token', async () => { | ||
const client = getClient(); | ||
const refreshToken = { | ||
value: 'something' | ||
}; | ||
await client.auth.generateVisitorTokens({ | ||
refreshToken | ||
}); | ||
expect(global.fetch).toHaveBeenCalledWith(`https://${_common.API_URL}/members/v1/members/my`, { | ||
headers: { | ||
Authorization: _constants.VALID_TOKEN | ||
} | ||
}); | ||
}); | ||
it('should return true after login', async () => { | ||
@@ -412,3 +392,4 @@ const client = getClient(); | ||
} = client.auth.parseFromUrl(); | ||
await client.auth.getMemberTokens(code, state, oauthState); | ||
const tokens = await client.auth.getMemberTokens(code, state, oauthState); | ||
client.auth.setTokens(tokens); | ||
expect(client.auth.loggedIn()).toBe(true); | ||
@@ -415,0 +396,0 @@ }); |
@@ -8,2 +8,3 @@ "use strict"; | ||
var pkceChallenge = _interopRequireWildcard(require("pkce-challenge")); | ||
var _types = require("../auth/oauth2/types"); | ||
function _getRequireWildcardCache(nodeInterop) { if (typeof WeakMap !== "function") return null; var cacheBabelInterop = new WeakMap(); var cacheNodeInterop = new WeakMap(); return (_getRequireWildcardCache = function (nodeInterop) { return nodeInterop ? cacheNodeInterop : cacheBabelInterop; })(nodeInterop); } | ||
@@ -174,3 +175,4 @@ function _interopRequireWildcard(obj, nodeInterop) { if (!nodeInterop && obj && obj.__esModule) { return obj; } if (obj === null || typeof obj !== "object" && typeof obj !== "function") { return { default: obj }; } var cache = _getRequireWildcardCache(nodeInterop); if (cache && cache.has(obj)) { return cache.get(obj); } var newObj = {}; var hasPropertyDescriptor = Object.defineProperty && Object.getOwnPropertyDescriptor; for (var key in obj) { if (key !== "default" && Object.prototype.hasOwnProperty.call(obj, key)) { var desc = hasPropertyDescriptor ? Object.getOwnPropertyDescriptor(obj, key) : null; if (desc && (desc.get || desc.set)) { Object.defineProperty(newObj, key, desc); } else { newObj[key] = obj[key]; } } } newObj.default = obj; if (cache) { cache.set(obj, newObj); } return newObj; } | ||
refreshToken: { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: _types.TokenRole.MEMBER | ||
} | ||
@@ -177,0 +179,0 @@ }); |
@@ -12,2 +12,3 @@ "use strict"; | ||
var _common = require("../../common"); | ||
var _types = require("./types"); | ||
var _iframeUtils = require("../../iframeUtils"); | ||
@@ -28,3 +29,4 @@ const moduleWithTokens = { | ||
refreshToken: { | ||
value: '' | ||
value: '', | ||
role: _types.TokenRole.NONE | ||
} | ||
@@ -36,6 +38,5 @@ }; | ||
}; | ||
let state = { | ||
let _state = { | ||
stateKind: 'initial' | ||
}; | ||
let isLoggedInFlag = false; | ||
const getAuthHeaders = async () => { | ||
@@ -64,7 +65,10 @@ var _tokens$accessToken; | ||
if (tokens != null && (_tokens$accessToken2 = tokens.accessToken) != null && _tokens$accessToken2.value && tokens != null && (_tokens$refreshToken = tokens.refreshToken) != null && _tokens$refreshToken.value && !(0, _tokenHelpers.isTokenExpired)(tokens.accessToken)) { | ||
await fetchIsLoggedIn(tokens.accessToken); | ||
return Promise.resolve(tokens); | ||
return tokens; | ||
} | ||
if (tokens != null && (_tokens$refreshToken2 = tokens.refreshToken) != null && _tokens$refreshToken2.value) { | ||
return renewToken(tokens.refreshToken); | ||
try { | ||
return renewToken(tokens.refreshToken); | ||
} catch (e) { | ||
// just continue and create a visitor one | ||
} | ||
} | ||
@@ -78,3 +82,4 @@ const tokensResponse = await fetchTokens({ | ||
refreshToken: { | ||
value: tokensResponse.refreshToken | ||
value: tokensResponse.refreshToken, | ||
role: _types.TokenRole.VISITOR | ||
} | ||
@@ -89,5 +94,4 @@ }; | ||
const accessToken = (0, _tokenHelpers.createAccessToken)(tokensResponse.accessToken, tokensResponse.expiresIn); | ||
await fetchIsLoggedIn(accessToken); | ||
return { | ||
accessToken: (0, _tokenHelpers.createAccessToken)(tokensResponse.accessToken, tokensResponse.expiresIn), | ||
accessToken, | ||
refreshToken | ||
@@ -158,5 +162,5 @@ }; | ||
if (!code || !state) { | ||
throw new Error('Missing code or state'); | ||
throw new Error('Missing code or _state'); | ||
} else if (state !== oauthData.state) { | ||
throw new Error('Invalid state'); | ||
throw new Error('Invalid _state'); | ||
} | ||
@@ -172,10 +176,9 @@ const tokensResponse = await fetchTokens({ | ||
}); | ||
const tokens = { | ||
return { | ||
accessToken: (0, _tokenHelpers.createAccessToken)(tokensResponse.accessToken, tokensResponse.expiresIn), | ||
refreshToken: { | ||
value: tokensResponse.refreshToken | ||
value: tokensResponse.refreshToken, | ||
role: _types.TokenRole.MEMBER | ||
} | ||
}; | ||
isLoggedInFlag = true; | ||
return tokens; | ||
}; | ||
@@ -198,5 +201,5 @@ const logout = async originalUrl => { | ||
_tokens.refreshToken = { | ||
value: '' | ||
value: '', | ||
role: _types.TokenRole.NONE | ||
}; | ||
isLoggedInFlag = false; | ||
return { | ||
@@ -219,3 +222,3 @@ logoutUrl: redirectSession.fullUrl | ||
} else if (response.state === _identity.authentication.StateType.REQUIRE_EMAIL_VERIFICATION) { | ||
state = { | ||
_state = { | ||
stateKind: 'emailVerificationRequired', | ||
@@ -226,7 +229,7 @@ data: { | ||
}; | ||
return state; | ||
return _state; | ||
} | ||
return { | ||
stateKind: 'failure', | ||
error: 'Unknown state' | ||
error: 'Unknown _state' | ||
}; | ||
@@ -304,5 +307,5 @@ }; | ||
const proceed = async nextInputs => { | ||
if (state.stateKind === 'emailVerificationRequired') { | ||
if (_state.stateKind === 'emailVerificationRequired') { | ||
const res = await wixClientWithTokens.verification.verifyDuringAuthentication(nextInputs.code, { | ||
stateToken: state.data.stateToken | ||
stateToken: _state.data.stateToken | ||
}); | ||
@@ -313,3 +316,3 @@ return handleState(res); | ||
stateKind: 'failure', | ||
error: 'Unknown state' | ||
error: 'Unknown _state' | ||
}; | ||
@@ -351,17 +354,4 @@ }; | ||
}; | ||
const fetchIsLoggedIn = async accessToken => { | ||
try { | ||
const res = await fetch(`https://${_common.API_URL}/members/v1/members/my`, { | ||
headers: { | ||
Authorization: accessToken.value | ||
} | ||
}); | ||
await res.json(); | ||
isLoggedInFlag = true; | ||
} catch (e) { | ||
isLoggedInFlag = false; | ||
} | ||
}; | ||
const loggedIn = () => { | ||
return isLoggedInFlag; | ||
return _tokens.refreshToken.role === _types.TokenRole.MEMBER; | ||
}; | ||
@@ -368,0 +358,0 @@ return { |
"use strict"; | ||
exports.__esModule = true; | ||
exports.TokenRole = void 0; | ||
let TokenRole; | ||
exports.TokenRole = TokenRole; | ||
(function (TokenRole) { | ||
TokenRole["NONE"] = "none"; | ||
TokenRole["VISITOR"] = "visitor"; | ||
TokenRole["MEMBER"] = "member"; | ||
})(TokenRole || (exports.TokenRole = TokenRole = {})); | ||
//# sourceMappingURL=types.js.map |
@@ -6,3 +6,3 @@ import { cart } from '@wix/ecom'; | ||
import { OAuthStrategy } from '../auth/oauth2/OAuthStrategy'; | ||
import { API_URL } from '../common'; | ||
import { TokenRole } from '../auth/oauth2/types'; | ||
describe('OAuthStrategy', () => { | ||
@@ -44,3 +44,4 @@ const getClient = () => createClient({ | ||
refreshToken: { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -76,3 +77,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -91,3 +93,4 @@ }); | ||
const refreshToken = { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.MEMBER | ||
}; | ||
@@ -112,3 +115,4 @@ const tokens = await client.auth.generateVisitorTokens({ | ||
const refreshToken = { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: TokenRole.VISITOR | ||
}; | ||
@@ -140,3 +144,4 @@ const tokens = await client.auth.generateVisitorTokens({ | ||
const tokens = await client.auth.renewToken({ | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: TokenRole.VISITOR | ||
}); | ||
@@ -155,3 +160,4 @@ expect(global.fetch).toHaveBeenCalledWith(expect.any(String), expect.objectContaining({ | ||
refreshToken: { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -185,3 +191,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -201,3 +208,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -219,3 +227,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -231,3 +240,4 @@ } | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -258,3 +268,4 @@ }); | ||
refreshToken: { | ||
value: 'something' | ||
value: 'something', | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -350,3 +361,4 @@ }); | ||
refreshToken: { | ||
value: 'refresh' | ||
value: 'refresh', | ||
role: TokenRole.MEMBER | ||
} | ||
@@ -368,34 +380,2 @@ }); | ||
describe('isLoggedIn', () => { | ||
it('should set when have values', async () => { | ||
const client = getClient(); | ||
const refreshToken = { | ||
value: 'something' | ||
}; | ||
await client.auth.generateVisitorTokens({ | ||
refreshToken, | ||
accessToken: { | ||
value: VALID_TOKEN, | ||
expiresAt: getCurrentDate() + 1000 | ||
} | ||
}); | ||
expect(global.fetch).toHaveBeenCalledWith("https://" + API_URL + "/members/v1/members/my", { | ||
headers: { | ||
Authorization: VALID_TOKEN | ||
} | ||
}); | ||
}); | ||
it('should set when have refresh token', async () => { | ||
const client = getClient(); | ||
const refreshToken = { | ||
value: 'something' | ||
}; | ||
await client.auth.generateVisitorTokens({ | ||
refreshToken | ||
}); | ||
expect(global.fetch).toHaveBeenCalledWith("https://" + API_URL + "/members/v1/members/my", { | ||
headers: { | ||
Authorization: VALID_TOKEN | ||
} | ||
}); | ||
}); | ||
it('should return true after login', async () => { | ||
@@ -410,3 +390,4 @@ const client = getClient(); | ||
} = client.auth.parseFromUrl(); | ||
await client.auth.getMemberTokens(code, state, oauthState); | ||
const tokens = await client.auth.getMemberTokens(code, state, oauthState); | ||
client.auth.setTokens(tokens); | ||
expect(client.auth.loggedIn()).toBe(true); | ||
@@ -413,0 +394,0 @@ }); |
@@ -6,2 +6,3 @@ import { createClient } from '../wixClient'; | ||
import * as pkceChallenge from 'pkce-challenge'; | ||
import { TokenRole } from '../auth/oauth2/types'; | ||
describe('direct login', () => { | ||
@@ -170,3 +171,4 @@ const getClient = () => createClient({ | ||
refreshToken: { | ||
value: 'some-refreshToken' | ||
value: 'some-refreshToken', | ||
role: TokenRole.MEMBER | ||
} | ||
@@ -173,0 +175,0 @@ }); |
@@ -7,2 +7,3 @@ import { createClient } from '../../wixClient'; | ||
import { API_URL } from '../../common'; | ||
import { TokenRole } from './types'; | ||
import { addPostMessageListener, loadFrame } from '../../iframeUtils'; | ||
@@ -23,3 +24,4 @@ const moduleWithTokens = { | ||
refreshToken: { | ||
value: '' | ||
value: '', | ||
role: TokenRole.NONE | ||
} | ||
@@ -31,6 +33,5 @@ }; | ||
}; | ||
let state = { | ||
let _state = { | ||
stateKind: 'initial' | ||
}; | ||
let isLoggedInFlag = false; | ||
const getAuthHeaders = async () => { | ||
@@ -59,7 +60,10 @@ var _tokens$accessToken; | ||
if (tokens != null && (_tokens$accessToken2 = tokens.accessToken) != null && _tokens$accessToken2.value && tokens != null && (_tokens$refreshToken = tokens.refreshToken) != null && _tokens$refreshToken.value && !isTokenExpired(tokens.accessToken)) { | ||
await fetchIsLoggedIn(tokens.accessToken); | ||
return Promise.resolve(tokens); | ||
return tokens; | ||
} | ||
if (tokens != null && (_tokens$refreshToken2 = tokens.refreshToken) != null && _tokens$refreshToken2.value) { | ||
return renewToken(tokens.refreshToken); | ||
try { | ||
return renewToken(tokens.refreshToken); | ||
} catch (e) { | ||
// just continue and create a visitor one | ||
} | ||
} | ||
@@ -73,3 +77,4 @@ const tokensResponse = await fetchTokens({ | ||
refreshToken: { | ||
value: tokensResponse.refreshToken | ||
value: tokensResponse.refreshToken, | ||
role: TokenRole.VISITOR | ||
} | ||
@@ -84,5 +89,4 @@ }; | ||
const accessToken = createAccessToken(tokensResponse.accessToken, tokensResponse.expiresIn); | ||
await fetchIsLoggedIn(accessToken); | ||
return { | ||
accessToken: createAccessToken(tokensResponse.accessToken, tokensResponse.expiresIn), | ||
accessToken, | ||
refreshToken | ||
@@ -153,5 +157,5 @@ }; | ||
if (!code || !state) { | ||
throw new Error('Missing code or state'); | ||
throw new Error('Missing code or _state'); | ||
} else if (state !== oauthData.state) { | ||
throw new Error('Invalid state'); | ||
throw new Error('Invalid _state'); | ||
} | ||
@@ -167,10 +171,9 @@ const tokensResponse = await fetchTokens({ | ||
}); | ||
const tokens = { | ||
return { | ||
accessToken: createAccessToken(tokensResponse.accessToken, tokensResponse.expiresIn), | ||
refreshToken: { | ||
value: tokensResponse.refreshToken | ||
value: tokensResponse.refreshToken, | ||
role: TokenRole.MEMBER | ||
} | ||
}; | ||
isLoggedInFlag = true; | ||
return tokens; | ||
}; | ||
@@ -193,5 +196,5 @@ const logout = async originalUrl => { | ||
_tokens.refreshToken = { | ||
value: '' | ||
value: '', | ||
role: TokenRole.NONE | ||
}; | ||
isLoggedInFlag = false; | ||
return { | ||
@@ -214,3 +217,3 @@ logoutUrl: redirectSession.fullUrl | ||
} else if (response.state === authentication.StateType.REQUIRE_EMAIL_VERIFICATION) { | ||
state = { | ||
_state = { | ||
stateKind: 'emailVerificationRequired', | ||
@@ -221,7 +224,7 @@ data: { | ||
}; | ||
return state; | ||
return _state; | ||
} | ||
return { | ||
stateKind: 'failure', | ||
error: 'Unknown state' | ||
error: 'Unknown _state' | ||
}; | ||
@@ -299,5 +302,5 @@ }; | ||
const proceed = async nextInputs => { | ||
if (state.stateKind === 'emailVerificationRequired') { | ||
if (_state.stateKind === 'emailVerificationRequired') { | ||
const res = await wixClientWithTokens.verification.verifyDuringAuthentication(nextInputs.code, { | ||
stateToken: state.data.stateToken | ||
stateToken: _state.data.stateToken | ||
}); | ||
@@ -308,3 +311,3 @@ return handleState(res); | ||
stateKind: 'failure', | ||
error: 'Unknown state' | ||
error: 'Unknown _state' | ||
}; | ||
@@ -346,17 +349,4 @@ }; | ||
}; | ||
const fetchIsLoggedIn = async accessToken => { | ||
try { | ||
const res = await fetch("https://" + API_URL + "/members/v1/members/my", { | ||
headers: { | ||
Authorization: accessToken.value | ||
} | ||
}); | ||
await res.json(); | ||
isLoggedInFlag = true; | ||
} catch (e) { | ||
isLoggedInFlag = false; | ||
} | ||
}; | ||
const loggedIn = () => { | ||
return isLoggedInFlag; | ||
return _tokens.refreshToken.role === TokenRole.MEMBER; | ||
}; | ||
@@ -363,0 +353,0 @@ return { |
@@ -1,2 +0,7 @@ | ||
export {}; | ||
export let TokenRole; | ||
(function (TokenRole) { | ||
TokenRole["NONE"] = "none"; | ||
TokenRole["VISITOR"] = "visitor"; | ||
TokenRole["MEMBER"] = "member"; | ||
})(TokenRole || (TokenRole = {})); | ||
//# sourceMappingURL=types.js.map |
@@ -14,2 +14,3 @@ import { authentication } from '@wix/identity'; | ||
export interface RefreshToken extends Token { | ||
role: TokenRole; | ||
} | ||
@@ -100,2 +101,7 @@ export interface OauthData extends OauthPKCE { | ||
}; | ||
export declare enum TokenRole { | ||
NONE = "none", | ||
VISITOR = "visitor", | ||
MEMBER = "member" | ||
} | ||
export type StateMachine = InitialState | SuccessState | ErrorState | EmailVerificationRequiredState | OwnerApprovalRequiredState | SilentCaptchaRequiredState | UserCaptchaRequiredState; | ||
@@ -102,0 +108,0 @@ export type CalculateNextState<T> = T extends EmailVerificationRequiredState ? { |
{ | ||
"name": "@wix/api-client", | ||
"version": "1.1.64", | ||
"version": "1.1.65", | ||
"license": "UNLICENSED", | ||
@@ -32,6 +32,6 @@ "author": { | ||
"@types/grecaptcha": "^3.0.4", | ||
"@wix/identity": "^1.0.31", | ||
"@wix/identity": "^1.0.33", | ||
"@wix/image-kit": "^1.31.0", | ||
"@wix/redirects": "^1.0.13", | ||
"@wix/sdk-types": "1.1.64", | ||
"@wix/sdk-types": "1.1.65", | ||
"pkce-challenge": "^3.1.0", | ||
@@ -44,3 +44,3 @@ "querystring": "^0.2.1", | ||
"@types/node": "^16.18.25", | ||
"@wix/ecom": "^1.0.165", | ||
"@wix/ecom": "^1.0.166", | ||
"@wix/events": "^1.0.80", | ||
@@ -76,3 +76,3 @@ "@wix/jest-yoshi-preset": "^6.54.2", | ||
}, | ||
"falconPackageHash": "7a1b5d1896277446233ae5518652d0ea1af4c4702582a627945f7f49" | ||
"falconPackageHash": "48c53a4297cfd1d4e9c30858e85436221912a8f2f4810ada86675d3c" | ||
} |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
4
458664
3556
+ Added@wix/sdk-types@1.1.65(transitive)
- Removed@wix/sdk-types@1.1.64(transitive)
Updated@wix/identity@^1.0.33
Updated@wix/sdk-types@1.1.65