@abtnode/auth 1.16.44-beta-20250520-104453-912ed737 → 1.16.44-beta-20250524-065731-c62fd374

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/lib/passkey.js +15 -4
  2. package/package.json +9 -9
package/lib/passkey.js CHANGED
@@ -330,7 +330,7 @@ function createPasskeyHandlers(node, mode, createToken) {
330
330
  }),
331
331
  },
332
332
  });
333
- logger.info('passkey.register.connected', { user: updated });
333
+ logger.info('passkey.register.connected', { teamDid, user: updated });
334
334
  return res.send({ verified, userDid: updated.did, credentialId: credential.id });
335
335
  }
336
336
 
@@ -384,7 +384,7 @@ function createPasskeyHandlers(node, mode, createToken) {
384
384
  }),
385
385
  },
386
386
  });
387
- logger.info('passkey.register.registered', { user: added });
387
+ logger.info('passkey.register.registered', { teamDid, user: added });
388
388
  await node.createAuditLog(
389
389
  {
390
390
  action: 'addUser',
@@ -469,6 +469,9 @@ function createPasskeyHandlers(node, mode, createToken) {
469
469
 
470
470
  // if credentialId is specified, we will use the specified passkey
471
471
  const teamDid = mode === 'server' ? info.did : req.getBlockletDid();
472
+
473
+ logger.info('passkey.auth.session', { teamDid });
474
+
472
475
  if (req.query.credentialId) {
473
476
  const exist = await node.getConnectedAccount({ teamDid, id: req.query.credentialId });
474
477
  if (!exist) {
@@ -504,6 +507,8 @@ function createPasskeyHandlers(node, mode, createToken) {
504
507
  allowCredentials: allowedCredentials,
505
508
  });
506
509
 
510
+ logger.info('passkey.auth.options', { teamDid, options });
511
+
507
512
  return res.send(options);
508
513
  };
509
514
 
@@ -522,7 +527,7 @@ function createPasskeyHandlers(node, mode, createToken) {
522
527
  }
523
528
 
524
529
  const user = await node.getUser({ teamDid, user: { did: passkey.userDid } });
525
- logger.info('passkey.auth.response', { body: JSON.parse(JSON.stringify(body)), user, passkeySession });
530
+ logger.info('passkey.auth.response', { teamDid, body: JSON.parse(JSON.stringify(body)), user, passkeySession });
526
531
  if (!user) {
527
532
  return res.status(400).send({
528
533
  error:
@@ -552,7 +557,7 @@ function createPasskeyHandlers(node, mode, createToken) {
552
557
  if (!verified) {
553
558
  return res.status(400).send({ error: 'We could not verify your passkey. Please try again.' });
554
559
  }
555
- logger.info('passkey.auth.verified', { verified, authenticationInfo });
560
+ logger.info('passkey.auth.verified', { teamDid, verified, authenticationInfo });
556
561
 
557
562
  const createUserSession = async ({ targetAppPid } = {}) => {
558
563
  const ua = req.get('user-agent');
@@ -586,6 +591,7 @@ function createPasskeyHandlers(node, mode, createToken) {
586
591
  },
587
592
  });
588
593
  }
594
+ logger.info('passkey.auth.createUserSession', { teamDid });
589
595
  return userSessionDoc;
590
596
  };
591
597
 
@@ -615,6 +621,7 @@ function createPasskeyHandlers(node, mode, createToken) {
615
621
  result.visitorId = session.visitorId;
616
622
  }
617
623
 
624
+ logger.info('passkey.auth.createTokens', { teamDid });
618
625
  return result;
619
626
  };
620
627
 
@@ -630,12 +637,14 @@ function createPasskeyHandlers(node, mode, createToken) {
630
637
  },
631
638
  },
632
639
  });
640
+ logger.info('passkey.auth.loginUser', { teamDid, userDid: user.did });
633
641
  return _result;
634
642
  };
635
643
 
636
644
  const result = { verified, userDid: user.did };
637
645
 
638
646
  // Generate new session token that client can save to localStorage
647
+ logger.info('passkey.auth.generateNewSessionToken', { teamDid, action: passkeySession.data.action });
639
648
  if (
640
649
  [
641
650
  PASSKEY_ACTIONS.login,
@@ -794,6 +803,7 @@ function createPasskeyHandlers(node, mode, createToken) {
794
803
 
795
804
  // update the server owner
796
805
  await node.updateNodeOwner({ nodeOwner: { did: user.did, pk: passkey.pk } });
806
+ logger.info('passkey.auth.updateNodeOwner', { teamDid, userDid: user.did });
797
807
  await node.issuePassportToUser({
798
808
  teamDid: info.did,
799
809
  userDid: user.did,
@@ -801,6 +811,7 @@ function createPasskeyHandlers(node, mode, createToken) {
801
811
  notify: false,
802
812
  action: passkeySession.data.action,
803
813
  });
814
+ logger.info('passkey.auth.issuePassportToUser', { teamDid, userDid: user.did });
804
815
 
805
816
  const { sessionToken, refreshToken } = await createToken(user.did, {
806
817
  secret: await node.getSessionSecret(),
package/package.json CHANGED
@@ -3,7 +3,7 @@
3
3
  "publishConfig": {
4
4
  "access": "public"
5
5
  },
6
- "version": "1.16.44-beta-20250520-104453-912ed737",
6
+ "version": "1.16.44-beta-20250524-065731-c62fd374",
7
7
  "description": "Simple lib to manage auth in ABT Node",
8
8
  "main": "lib/index.js",
9
9
  "files": [
@@ -20,19 +20,19 @@
20
20
  "author": "linchen <linchen1987@foxmail.com> (http://github.com/linchen1987)",
21
21
  "license": "Apache-2.0",
22
22
  "dependencies": {
23
- "@abtnode/constant": "1.16.44-beta-20250520-104453-912ed737",
24
- "@abtnode/logger": "1.16.44-beta-20250520-104453-912ed737",
25
- "@abtnode/util": "1.16.44-beta-20250520-104453-912ed737",
23
+ "@abtnode/constant": "1.16.44-beta-20250524-065731-c62fd374",
24
+ "@abtnode/logger": "1.16.44-beta-20250524-065731-c62fd374",
25
+ "@abtnode/util": "1.16.44-beta-20250524-065731-c62fd374",
26
26
  "@arcblock/did": "1.20.11",
27
27
  "@arcblock/did-auth": "1.20.11",
28
28
  "@arcblock/jwt": "1.20.11",
29
- "@arcblock/nft-display": "^2.13.41",
29
+ "@arcblock/nft-display": "^2.13.47",
30
30
  "@arcblock/validator": "1.20.11",
31
31
  "@arcblock/vc": "1.20.11",
32
- "@blocklet/constant": "1.16.44-beta-20250520-104453-912ed737",
32
+ "@blocklet/constant": "1.16.44-beta-20250524-065731-c62fd374",
33
33
  "@blocklet/error": "^0.2.4",
34
- "@blocklet/meta": "1.16.44-beta-20250520-104453-912ed737",
35
- "@blocklet/sdk": "1.16.44-beta-20250520-104453-912ed737",
34
+ "@blocklet/meta": "1.16.44-beta-20250524-065731-c62fd374",
35
+ "@blocklet/sdk": "1.16.44-beta-20250524-065731-c62fd374",
36
36
  "@ocap/client": "1.20.11",
37
37
  "@ocap/mcrypto": "1.20.11",
38
38
  "@ocap/util": "1.20.11",
@@ -53,5 +53,5 @@
53
53
  "devDependencies": {
54
54
  "jest": "^29.7.0"
55
55
  },
56
- "gitHead": "b2f2e6a8fe20634cf4d034a26c4c388d687a7f55"
56
+ "gitHead": "812c62f29aefa6760946a0c3e8c3e3181b6d2f3f"
57
57
  }