@@ -24,15 +24,13 @@ import {
2424 toUniformCredentialOfferRequest ,
2525 UniformCredentialOfferPayload ,
2626} from '@sphereon/oid4vci-common'
27- import { ObjectUtils } from '@sphereon/ssi-types'
28- import pkg from 'debug'
29- const { debug : Debug } = pkg
27+ import { Loggers , ObjectUtils } from '@sphereon/ssi-types'
3028
3129import { MetadataClientV1_0_13 } from './MetadataClientV1_0_13'
3230import { createJwtBearerClientAssertion } from './functions'
3331import { shouldRetryTokenRequestWithDPoPNonce } from './functions/dpopUtil'
3432
35- const debug = Debug ( 'sphereon:oid4vci:token' )
33+ const logger = Loggers . DEFAULT . get ( 'sphereon:oid4vci:token' )
3634
3735export class AccessTokenClientV1_0_11 {
3836 public async acquireAccessToken ( opts : AccessTokenRequestOpts ) : Promise < OpenIDResponse < AccessTokenResponse , DPoPResponseParams > > {
@@ -185,39 +183,39 @@ export class AccessTokenClientV1_0_11 {
185183 if ( requestPayload . grants ?. [ PRE_AUTH_GRANT_LITERAL ] ) {
186184 isPinRequired = requestPayload . grants [ PRE_AUTH_GRANT_LITERAL ] ?. user_pin_required ?? false
187185 }
188- debug ( `Pin required for issuer ${ issuer } : ${ isPinRequired } ` )
186+ logger . debug ( `Pin required for issuer ${ issuer } : ${ isPinRequired } ` )
189187 return isPinRequired
190188 }
191189
192190 private assertNumericPin ( isPinRequired ?: boolean , pin ?: string ) : void {
193191 if ( isPinRequired ) {
194192 if ( ! pin || ! / ^ \d { 1 , 8 } $ / . test ( pin ) ) {
195- debug ( `Pin is not 1 to 8 digits long` )
193+ logger . debug ( `Pin is not 1 to 8 digits long` )
196194 throw new Error ( 'A valid pin consisting of maximal 8 numeric characters must be present.' )
197195 }
198196 } else if ( pin ) {
199- debug ( `Pin set, whilst not required` )
197+ logger . debug ( `Pin set, whilst not required` )
200198 throw new Error ( 'Cannot set a pin, when the pin is not required.' )
201199 }
202200 }
203201
204202 private assertNonEmptyPreAuthorizedCode ( accessTokenRequest : AccessTokenRequest ) : void {
205203 if ( ! accessTokenRequest [ PRE_AUTH_CODE_LITERAL ] ) {
206- debug ( `No pre-authorized code present, whilst it is required` )
204+ logger . debug ( `No pre-authorized code present, whilst it is required` )
207205 throw new Error ( 'Pre-authorization must be proven by presenting the pre-authorized code. Code must be present.' )
208206 }
209207 }
210208
211209 private assertNonEmptyCodeVerifier ( accessTokenRequest : AccessTokenRequest ) : void {
212210 if ( ! accessTokenRequest . code_verifier ) {
213- debug ( 'No code_verifier present, whilst it is required' )
211+ logger . debug ( 'No code_verifier present, whilst it is required' )
214212 throw new Error ( 'Authorization flow requires the code_verifier to be present' )
215213 }
216214 }
217215
218216 private assertNonEmptyCode ( accessTokenRequest : AccessTokenRequest ) : void {
219217 if ( ! accessTokenRequest . code ) {
220- debug ( 'No code present, whilst it is required' )
218+ logger . debug ( 'No code present, whilst it is required' )
221219 throw new Error ( 'Authorization flow requires the code to be present' )
222220 }
223221 }
@@ -273,7 +271,7 @@ export class AccessTokenClientV1_0_11 {
273271 if ( ! url || ! ObjectUtils . isString ( url ) ) {
274272 throw new Error ( 'No authorization server token URL present. Cannot acquire access token' )
275273 }
276- debug ( `Token endpoint determined to be ${ url } ` )
274+ logger . debug ( `Token endpoint determined to be ${ url } ` )
277275 return url
278276 }
279277
@@ -290,7 +288,7 @@ export class AccessTokenClientV1_0_11 {
290288 }
291289
292290 private throwNotSupportedFlow ( ) : void {
293- debug ( `Only pre-authorized or authorization code flows supported.` )
291+ logger . debug ( `Only pre-authorized or authorization code flows supported.` )
294292 throw new Error ( 'Only pre-authorized-code or authorization code flows are supported' )
295293 }
296294}
0 commit comments