@abtnode/auth 1.16.52-beta-20251005-235515-42ad5caf → 1.16.52-beta-20251008-091027-c46c73e3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/auth.js +7 -0
- package/lib/lost-passport.js +3 -0
- package/lib/oauth.js +4 -1
- package/lib/passkey.js +6 -2
- package/package.json +9 -9
package/lib/auth.js
CHANGED
|
@@ -329,6 +329,7 @@ const createAuthToken = ({
|
|
|
329
329
|
kyc = 0,
|
|
330
330
|
elevated = false,
|
|
331
331
|
oauth = null,
|
|
332
|
+
org = '',
|
|
332
333
|
} = {}) => {
|
|
333
334
|
const payload = {
|
|
334
335
|
type: 'user',
|
|
@@ -361,6 +362,10 @@ const createAuthToken = ({
|
|
|
361
362
|
payload.oauth = oauth;
|
|
362
363
|
}
|
|
363
364
|
|
|
365
|
+
if (org) {
|
|
366
|
+
payload.org = org;
|
|
367
|
+
}
|
|
368
|
+
|
|
364
369
|
const token = jwt.sign(payload, secret, { expiresIn });
|
|
365
370
|
return token;
|
|
366
371
|
};
|
|
@@ -1208,6 +1213,7 @@ const setUserInfoHeaders = (req) => {
|
|
|
1208
1213
|
req.headers['x-connected-did'] = req.user.did;
|
|
1209
1214
|
req.headers['x-user-wallet-os'] = req.user.walletOS || '';
|
|
1210
1215
|
req.headers['x-user-kyc'] = req.user.kyc || 0;
|
|
1216
|
+
req.headers['x-user-org'] = req.user.org || '';
|
|
1211
1217
|
} else {
|
|
1212
1218
|
delete req.headers['x-user-did'];
|
|
1213
1219
|
delete req.headers['x-user-fullname'];
|
|
@@ -1215,6 +1221,7 @@ const setUserInfoHeaders = (req) => {
|
|
|
1215
1221
|
delete req.headers['x-user-provider'];
|
|
1216
1222
|
delete req.headers['x-user-wallet-os'];
|
|
1217
1223
|
delete req.headers['x-user-kyc'];
|
|
1224
|
+
delete req.headers['x-user-org'];
|
|
1218
1225
|
|
|
1219
1226
|
if (req.cookies && req.cookies.connected_did) {
|
|
1220
1227
|
req.headers['x-connected-did'] = req.cookies.connected_did;
|
package/lib/lost-passport.js
CHANGED
|
@@ -472,6 +472,8 @@ const createLostPassportIssueRoute = ({ node, type, authServicePrefix, createTok
|
|
|
472
472
|
},
|
|
473
473
|
});
|
|
474
474
|
}
|
|
475
|
+
|
|
476
|
+
const org = await request?.getUserOrg?.();
|
|
475
477
|
const { sessionToken, refreshToken } = await createToken(
|
|
476
478
|
userPid,
|
|
477
479
|
{
|
|
@@ -485,6 +487,7 @@ const createLostPassportIssueRoute = ({ node, type, authServicePrefix, createTok
|
|
|
485
487
|
elevated: canSessionBeElevated(role, blocklet?.settings),
|
|
486
488
|
emailVerified: !!updatedUser.emailVerified,
|
|
487
489
|
phoneVerified: !!updatedUser.phoneVerified,
|
|
490
|
+
org,
|
|
488
491
|
},
|
|
489
492
|
{ ...sessionConfig, didConnectVersion: getDidConnectVersion(req) }
|
|
490
493
|
);
|
package/lib/oauth.js
CHANGED
|
@@ -117,17 +117,20 @@ function createPassportSwitcher(node, createToken, mode = 'server') {
|
|
|
117
117
|
node
|
|
118
118
|
);
|
|
119
119
|
|
|
120
|
+
const role = passport.scope === 'passport' ? passport.role : ROLES.GUEST;
|
|
121
|
+
const org = await req.getUserOrg(role);
|
|
120
122
|
const { sessionToken, refreshToken } = await createToken(
|
|
121
123
|
userDid,
|
|
122
124
|
{
|
|
123
125
|
secret,
|
|
124
126
|
passport,
|
|
125
|
-
role
|
|
127
|
+
role,
|
|
126
128
|
fullName: user?.fullName,
|
|
127
129
|
provider: passport.provider || LOGIN_PROVIDER.WALLET,
|
|
128
130
|
walletOS: 'web',
|
|
129
131
|
emailVerified: !!user?.emailVerified,
|
|
130
132
|
phoneVerified: !!user?.phoneVerified,
|
|
133
|
+
org,
|
|
131
134
|
},
|
|
132
135
|
{ ...(await getSessionConfig(req)) }
|
|
133
136
|
);
|
package/lib/passkey.js
CHANGED
|
@@ -620,7 +620,7 @@ function createPasskeyHandlers(node, mode, createToken) {
|
|
|
620
620
|
|
|
621
621
|
const createTokens = async (updated, passport, role, profile, result) => {
|
|
622
622
|
const { secret } = await getApplicationInfo({ node, nodeInfo: info, teamDid });
|
|
623
|
-
|
|
623
|
+
const org = await req.getUserOrg(role);
|
|
624
624
|
const { sessionToken, refreshToken } = await createToken(
|
|
625
625
|
updated.did,
|
|
626
626
|
{
|
|
@@ -636,6 +636,7 @@ function createPasskeyHandlers(node, mode, createToken) {
|
|
|
636
636
|
role,
|
|
637
637
|
mode === 'service' ? (await node.getBlocklet({ did: teamDid }))?.settings : info
|
|
638
638
|
),
|
|
639
|
+
org,
|
|
639
640
|
},
|
|
640
641
|
{ ...(await getSessionConfig(req)) }
|
|
641
642
|
);
|
|
@@ -787,6 +788,7 @@ function createPasskeyHandlers(node, mode, createToken) {
|
|
|
787
788
|
result.refreshToken = refreshToken;
|
|
788
789
|
} else {
|
|
789
790
|
const { secret } = await getApplicationInfo({ node, nodeInfo: info, teamDid });
|
|
791
|
+
const org = await req.getUserOrg();
|
|
790
792
|
const { sessionToken, refreshToken } = await createToken(
|
|
791
793
|
user.did,
|
|
792
794
|
{
|
|
@@ -799,6 +801,7 @@ function createPasskeyHandlers(node, mode, createToken) {
|
|
|
799
801
|
emailVerified: user.emailVerified,
|
|
800
802
|
phoneVerified: user.phoneVerified,
|
|
801
803
|
elevated,
|
|
804
|
+
org,
|
|
802
805
|
},
|
|
803
806
|
{ ...(await getSessionConfig(req)) }
|
|
804
807
|
);
|
|
@@ -843,13 +846,14 @@ function createPasskeyHandlers(node, mode, createToken) {
|
|
|
843
846
|
action: passkeySession.data.action,
|
|
844
847
|
});
|
|
845
848
|
logger.info('passkey.auth.issuePassportToUser', { teamDid, userDid: user.did });
|
|
846
|
-
|
|
849
|
+
const org = await req.getUserOrg();
|
|
847
850
|
const { sessionToken, refreshToken } = await createToken(user.did, {
|
|
848
851
|
secret: await node.getSessionSecret(),
|
|
849
852
|
passport: null,
|
|
850
853
|
role: ROLES.OWNER,
|
|
851
854
|
fullName: user.fullName,
|
|
852
855
|
elevated: true,
|
|
856
|
+
org,
|
|
853
857
|
});
|
|
854
858
|
|
|
855
859
|
result.sessionToken = sessionToken;
|
package/package.json
CHANGED
|
@@ -3,7 +3,7 @@
|
|
|
3
3
|
"publishConfig": {
|
|
4
4
|
"access": "public"
|
|
5
5
|
},
|
|
6
|
-
"version": "1.16.52-beta-
|
|
6
|
+
"version": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
7
7
|
"description": "Simple lib to manage auth in ABT Node",
|
|
8
8
|
"main": "lib/index.js",
|
|
9
9
|
"files": [
|
|
@@ -20,21 +20,21 @@
|
|
|
20
20
|
"author": "linchen <linchen1987@foxmail.com> (http://github.com/linchen1987)",
|
|
21
21
|
"license": "Apache-2.0",
|
|
22
22
|
"dependencies": {
|
|
23
|
-
"@abtnode/constant": "1.16.52-beta-
|
|
24
|
-
"@abtnode/logger": "1.16.52-beta-
|
|
25
|
-
"@abtnode/util": "1.16.52-beta-
|
|
23
|
+
"@abtnode/constant": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
24
|
+
"@abtnode/logger": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
25
|
+
"@abtnode/util": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
26
26
|
"@arcblock/did": "1.25.6",
|
|
27
27
|
"@arcblock/did-connect-js": "1.25.6",
|
|
28
28
|
"@arcblock/did-ext": "1.25.6",
|
|
29
29
|
"@arcblock/did-util": "1.25.6",
|
|
30
30
|
"@arcblock/jwt": "1.25.6",
|
|
31
|
-
"@arcblock/nft-display": "^3.1.
|
|
31
|
+
"@arcblock/nft-display": "^3.1.45",
|
|
32
32
|
"@arcblock/validator": "1.25.6",
|
|
33
33
|
"@arcblock/vc": "1.25.6",
|
|
34
|
-
"@blocklet/constant": "1.16.52-beta-
|
|
34
|
+
"@blocklet/constant": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
35
35
|
"@blocklet/error": "^0.2.5",
|
|
36
|
-
"@blocklet/meta": "1.16.52-beta-
|
|
37
|
-
"@blocklet/sdk": "1.16.52-beta-
|
|
36
|
+
"@blocklet/meta": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
37
|
+
"@blocklet/sdk": "1.16.52-beta-20251008-091027-c46c73e3",
|
|
38
38
|
"@ocap/client": "1.25.6",
|
|
39
39
|
"@ocap/mcrypto": "1.25.6",
|
|
40
40
|
"@ocap/util": "1.25.6",
|
|
@@ -56,5 +56,5 @@
|
|
|
56
56
|
"devDependencies": {
|
|
57
57
|
"jest": "^29.7.0"
|
|
58
58
|
},
|
|
59
|
-
"gitHead": "
|
|
59
|
+
"gitHead": "2a8d239f019aece938d909a495ff1c54ad0e87a9"
|
|
60
60
|
}
|