@crossmint/client-sdk-auth 1.0.0 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/CrossmintAuthClient.cjs +2 -2
- package/dist/CrossmintAuthClient.d.cts +4 -4
- package/dist/CrossmintAuthClient.d.ts +4 -4
- package/dist/CrossmintAuthClient.js +1 -1
- package/dist/chunk-5KJPKQDF.js +272 -0
- package/dist/chunk-5KJPKQDF.js.map +1 -0
- package/dist/chunk-WQOH66RU.cjs +272 -0
- package/dist/chunk-WQOH66RU.cjs.map +1 -0
- package/dist/index.cjs +2 -2
- package/dist/index.js +1 -1
- package/package.json +3 -3
- package/src/CrossmintAuthClient.test.ts +18 -9
- package/src/CrossmintAuthClient.ts +154 -104
- package/dist/chunk-7YATBCAU.js +0 -229
- package/dist/chunk-7YATBCAU.js.map +0 -1
- package/dist/chunk-ILL57KWX.cjs +0 -229
- package/dist/chunk-ILL57KWX.cjs.map +0 -1
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/CrossmintAuthClient.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,iBAAuD;AAK3D,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAI,gBAAgB,QAAQ,KAAK,gBAAgB,MAAM;AACnD;AAAA,MACJ;AAEA,UAAI;AAEA,YAAI,KAAK,kBAAkB,MAAM;AAC7B,eAAK,iBAAiB,KAAK,oBAAoB,YAAY;AAAA,QAC/D;AACA,cAAM,eAAe,MAAM,KAAK;AAGhC,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,iBAAiB;AAAA,MAC1B;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ","sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private refreshPromise: Promise<AuthMaterialWithUser> | null = null;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if (refreshToken == null && this.refreshRoute == null) {\n return;\n }\n\n try {\n // Create new refresh promise if none exists\n if (this.refreshPromise == null) {\n this.refreshPromise = this.refreshAuthMaterial(refreshToken);\n }\n const authMaterial = await this.refreshPromise;\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.refreshPromise = null;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"]}
|
package/dist/index.cjs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";Object.defineProperty(exports, "__esModule", {value: true});
|
|
2
2
|
|
|
3
|
-
var
|
|
3
|
+
var _chunkWQOH66RUcjs = require('./chunk-WQOH66RU.cjs');
|
|
4
4
|
require('./chunk-VQ3HTIQ3.cjs');
|
|
5
5
|
|
|
6
6
|
|
|
@@ -25,5 +25,5 @@ var _commonsdkbase = require('@crossmint/common-sdk-base');
|
|
|
25
25
|
|
|
26
26
|
|
|
27
27
|
|
|
28
|
-
exports.CrossmintAuth =
|
|
28
|
+
exports.CrossmintAuth = _chunkWQOH66RUcjs.CrossmintAuthClient; exports.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS = _chunkTIUX4OOQcjs.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS; exports.createCrossmint = _commonsdkbase.createCrossmint; exports.deleteCookie = _chunkBGMXXFQ4cjs.deleteCookie; exports.getCookie = _chunkBGMXXFQ4cjs.getCookie; exports.getJWTExpiration = _chunkQY4RIGNMcjs.getJWTExpiration; exports.setCookie = _chunkBGMXXFQ4cjs.setCookie;
|
|
29
29
|
//# sourceMappingURL=index.cjs.map
|
package/dist/index.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@crossmint/client-sdk-auth",
|
|
3
|
-
"version": "1.
|
|
3
|
+
"version": "1.1.1",
|
|
4
4
|
"repository": "https://github.com/Crossmint/crossmint-sdk",
|
|
5
5
|
"license": "Apache-2.0",
|
|
6
6
|
"author": "Paella Labs Inc",
|
|
@@ -22,12 +22,12 @@
|
|
|
22
22
|
"jwt-decode": "4.0.0",
|
|
23
23
|
"@farcaster/auth-kit": "0.6.0",
|
|
24
24
|
"@crossmint/client-sdk-base": "1.3.2",
|
|
25
|
-
"@crossmint/common-sdk-auth": "1.0.
|
|
25
|
+
"@crossmint/common-sdk-auth": "1.0.1",
|
|
26
26
|
"@crossmint/common-sdk-base": "0.3.0"
|
|
27
27
|
},
|
|
28
28
|
"scripts": {
|
|
29
29
|
"build": "tsup",
|
|
30
30
|
"dev": "tsup --watch",
|
|
31
|
-
"test": "vitest run"
|
|
31
|
+
"test:vitest": "vitest run"
|
|
32
32
|
}
|
|
33
33
|
}
|
|
@@ -53,6 +53,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
53
53
|
const mockUserData = { id: "user123", email: "user@example.com" };
|
|
54
54
|
mockApiClient.get.mockResolvedValue({
|
|
55
55
|
json: () => Promise.resolve(mockUserData),
|
|
56
|
+
ok: true,
|
|
56
57
|
});
|
|
57
58
|
|
|
58
59
|
const result = await crossmintAuthClient.getUser();
|
|
@@ -145,6 +146,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
145
146
|
vi.spyOn(crossmintAuthClient as any, "storeAuthMaterial").mockImplementation(() => {});
|
|
146
147
|
vi.mocked(getJWTExpiration).mockReturnValue(Date.now() / 1000 + 3600); // 1 hour from now
|
|
147
148
|
vi.mocked(queueTask).mockReturnValue({ cancel: vi.fn() } as any);
|
|
149
|
+
(crossmintAuthClient as any).refreshPromise = null;
|
|
148
150
|
});
|
|
149
151
|
|
|
150
152
|
it("should refresh auth material and schedule next refresh", async () => {
|
|
@@ -161,11 +163,13 @@ describe("CrossmintAuthClient", () => {
|
|
|
161
163
|
expect(queueTask).toHaveBeenCalledWith(expect.any(Function), expect.any(Number));
|
|
162
164
|
});
|
|
163
165
|
|
|
164
|
-
it("should not refresh
|
|
165
|
-
|
|
166
|
-
|
|
166
|
+
it("should not refresh when called twice in a row", async () => {
|
|
167
|
+
const promise1 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
|
|
168
|
+
const promise2 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
|
|
167
169
|
|
|
168
|
-
|
|
170
|
+
await Promise.all([promise1, promise2]);
|
|
171
|
+
|
|
172
|
+
expect(crossmintAuthClient["refreshAuthMaterial"]).toHaveBeenCalledTimes(1);
|
|
169
173
|
});
|
|
170
174
|
|
|
171
175
|
it("should call onTokenRefresh callback if provided", async () => {
|
|
@@ -249,6 +253,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
249
253
|
const mockOAuthUrl = "https://oauth.example.com/auth";
|
|
250
254
|
mockApiClient.get.mockResolvedValue({
|
|
251
255
|
json: () => Promise.resolve({ oauthUrl: mockOAuthUrl }),
|
|
256
|
+
ok: true,
|
|
252
257
|
});
|
|
253
258
|
|
|
254
259
|
const result = await crossmintAuthClient.getOAuthUrl(mockProvider);
|
|
@@ -267,6 +272,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
267
272
|
const mockResponse = { success: true };
|
|
268
273
|
mockApiClient.post.mockResolvedValue({
|
|
269
274
|
json: () => Promise.resolve(mockResponse),
|
|
275
|
+
ok: true,
|
|
270
276
|
});
|
|
271
277
|
|
|
272
278
|
const result = await crossmintAuthClient.sendEmailOtp(mockEmail);
|
|
@@ -288,7 +294,8 @@ describe("CrossmintAuthClient", () => {
|
|
|
288
294
|
const mockToken = "otp-token-456";
|
|
289
295
|
const mockOneTimeSecret = "one-time-secret-789";
|
|
290
296
|
mockApiClient.post.mockResolvedValue({
|
|
291
|
-
json: () => Promise.resolve({
|
|
297
|
+
json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
|
|
298
|
+
ok: true,
|
|
292
299
|
});
|
|
293
300
|
|
|
294
301
|
const result = await crossmintAuthClient.confirmEmailOtp(mockEmail, mockEmailId, mockToken);
|
|
@@ -310,13 +317,14 @@ describe("CrossmintAuthClient", () => {
|
|
|
310
317
|
};
|
|
311
318
|
const mockOneTimeSecret = "farcaster-one-time-secret-123";
|
|
312
319
|
mockApiClient.post.mockResolvedValue({
|
|
313
|
-
json: () => Promise.resolve({
|
|
320
|
+
json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
|
|
321
|
+
ok: true,
|
|
314
322
|
});
|
|
315
323
|
|
|
316
324
|
const result = await crossmintAuthClient.signInWithFarcaster(mockFarcasterData as StatusAPIResponse);
|
|
317
325
|
|
|
318
326
|
expect(result).toBe(mockOneTimeSecret);
|
|
319
|
-
const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback
|
|
327
|
+
const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback`;
|
|
320
328
|
const queryParams = new URLSearchParams({
|
|
321
329
|
signinAuthenticationMethod: "farcaster",
|
|
322
330
|
callbackUrl: expectedCallbackUrl,
|
|
@@ -347,6 +355,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
347
355
|
};
|
|
348
356
|
mockApiClient.post.mockResolvedValue({
|
|
349
357
|
json: () => Promise.resolve(mockResponse),
|
|
358
|
+
ok: true,
|
|
350
359
|
});
|
|
351
360
|
|
|
352
361
|
const result = await crossmintAuthClient.signInWithSmartWallet(mockAddress);
|
|
@@ -356,7 +365,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
356
365
|
signinAuthenticationMethod: "evm",
|
|
357
366
|
});
|
|
358
367
|
expect(mockApiClient.post).toHaveBeenCalledWith(
|
|
359
|
-
`
|
|
368
|
+
`api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate/start?${queryParams}`,
|
|
360
369
|
expect.objectContaining({
|
|
361
370
|
body: JSON.stringify({ walletAddress: mockAddress }),
|
|
362
371
|
headers: {
|
|
@@ -380,6 +389,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
380
389
|
};
|
|
381
390
|
mockApiClient.post.mockResolvedValue({
|
|
382
391
|
json: () => Promise.resolve(mockResponse),
|
|
392
|
+
ok: true,
|
|
383
393
|
});
|
|
384
394
|
|
|
385
395
|
const result = await crossmintAuthClient.authenticateSmartWallet(mockAddress, mockSignature);
|
|
@@ -387,7 +397,6 @@ describe("CrossmintAuthClient", () => {
|
|
|
387
397
|
expect(result).toEqual(mockResponse);
|
|
388
398
|
const queryParams = new URLSearchParams({
|
|
389
399
|
signinAuthenticationMethod: "evm",
|
|
390
|
-
callbackUrl: `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/we-dont-actually-use-this-anymore`,
|
|
391
400
|
});
|
|
392
401
|
expect(mockApiClient.post).toHaveBeenCalledWith(
|
|
393
402
|
`api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate?${queryParams}`,
|
|
@@ -4,6 +4,7 @@ import {
|
|
|
4
4
|
type AuthMaterialWithUser,
|
|
5
5
|
CROSSMINT_API_VERSION,
|
|
6
6
|
CrossmintAuth,
|
|
7
|
+
CrossmintAuthenticationError,
|
|
7
8
|
type CrossmintAuthOptions,
|
|
8
9
|
type OAuthProvider,
|
|
9
10
|
REFRESH_TOKEN_PREFIX,
|
|
@@ -21,7 +22,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
|
|
|
21
22
|
export class CrossmintAuthClient extends CrossmintAuth {
|
|
22
23
|
private callbacks: CrossmintAuthClientCallbacks;
|
|
23
24
|
private refreshTask: CancellableTask | null = null;
|
|
24
|
-
private
|
|
25
|
+
private refreshPromise: Promise<AuthMaterialWithUser> | null = null;
|
|
25
26
|
private logoutRoute: string | null;
|
|
26
27
|
|
|
27
28
|
private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {
|
|
@@ -40,14 +41,21 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
40
41
|
}
|
|
41
42
|
|
|
42
43
|
public async getUser() {
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
"Content-Type": "application/json",
|
|
46
|
-
}
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
44
|
+
try {
|
|
45
|
+
const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {
|
|
46
|
+
headers: { "Content-Type": "application/json" },
|
|
47
|
+
});
|
|
48
|
+
|
|
49
|
+
if (!response.ok) {
|
|
50
|
+
throw await response.text();
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
return await response.json();
|
|
54
|
+
} catch (error) {
|
|
55
|
+
throw new CrossmintAuthenticationError(
|
|
56
|
+
`Failed to fetch user: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
57
|
+
);
|
|
58
|
+
}
|
|
51
59
|
}
|
|
52
60
|
|
|
53
61
|
public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {
|
|
@@ -56,32 +64,37 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
56
64
|
}
|
|
57
65
|
|
|
58
66
|
public async logout() {
|
|
59
|
-
//
|
|
67
|
+
// Store the old refresh token to pass it to the logout route before deleting the cookies
|
|
68
|
+
const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);
|
|
69
|
+
|
|
70
|
+
// Even if there's a server error, we want to clear the cookies and we do it first to load faster
|
|
71
|
+
deleteCookie(REFRESH_TOKEN_PREFIX);
|
|
72
|
+
deleteCookie(SESSION_PREFIX);
|
|
73
|
+
this.callbacks.onLogout?.();
|
|
60
74
|
try {
|
|
61
75
|
if (this.logoutRoute != null) {
|
|
62
76
|
await this.logoutFromCustomRoute();
|
|
63
|
-
} else {
|
|
64
|
-
await this.logoutFromDefaultRoute(
|
|
77
|
+
} else if (oldRefreshToken != null) {
|
|
78
|
+
await this.logoutFromDefaultRoute(oldRefreshToken);
|
|
65
79
|
}
|
|
66
80
|
} catch (error) {
|
|
67
81
|
console.error(error);
|
|
68
|
-
} finally {
|
|
69
|
-
deleteCookie(REFRESH_TOKEN_PREFIX);
|
|
70
|
-
deleteCookie(SESSION_PREFIX);
|
|
71
|
-
this.callbacks.onLogout?.();
|
|
72
82
|
}
|
|
73
83
|
}
|
|
74
84
|
|
|
75
85
|
public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {
|
|
76
86
|
const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);
|
|
77
87
|
// If there is a custom refresh route, that endpoint will fetch the cookies itself
|
|
78
|
-
if (
|
|
88
|
+
if (refreshToken == null && this.refreshRoute == null) {
|
|
79
89
|
return;
|
|
80
90
|
}
|
|
81
91
|
|
|
82
92
|
try {
|
|
83
|
-
|
|
84
|
-
|
|
93
|
+
// Create new refresh promise if none exists
|
|
94
|
+
if (this.refreshPromise == null) {
|
|
95
|
+
this.refreshPromise = this.refreshAuthMaterial(refreshToken);
|
|
96
|
+
}
|
|
97
|
+
const authMaterial = await this.refreshPromise;
|
|
85
98
|
|
|
86
99
|
// If a custom refresh route is set, storing in cookies is handled in the server
|
|
87
100
|
if (this.refreshRoute == null) {
|
|
@@ -95,112 +108,149 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
95
108
|
console.error(error);
|
|
96
109
|
this.logout();
|
|
97
110
|
} finally {
|
|
98
|
-
this.
|
|
111
|
+
this.refreshPromise = null;
|
|
99
112
|
}
|
|
100
113
|
}
|
|
101
114
|
|
|
102
115
|
public async getOAuthUrl(provider: OAuthProvider) {
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
"Content-Type": "application/json",
|
|
106
|
-
}
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
116
|
+
try {
|
|
117
|
+
const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {
|
|
118
|
+
headers: { "Content-Type": "application/json" },
|
|
119
|
+
});
|
|
120
|
+
|
|
121
|
+
if (!response.ok) {
|
|
122
|
+
throw await response.text();
|
|
123
|
+
}
|
|
124
|
+
|
|
125
|
+
const data = await response.json();
|
|
126
|
+
return data.oauthUrl;
|
|
127
|
+
} catch (error) {
|
|
128
|
+
throw new CrossmintAuthenticationError(
|
|
129
|
+
`Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
130
|
+
);
|
|
131
|
+
}
|
|
111
132
|
}
|
|
112
133
|
|
|
113
134
|
public async sendEmailOtp(email: string) {
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
"Content-Type": "application/json",
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
135
|
+
try {
|
|
136
|
+
const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {
|
|
137
|
+
headers: { "Content-Type": "application/json" },
|
|
138
|
+
body: JSON.stringify({ email }),
|
|
139
|
+
});
|
|
140
|
+
|
|
141
|
+
if (!response.ok) {
|
|
142
|
+
throw await response.text();
|
|
143
|
+
}
|
|
144
|
+
|
|
145
|
+
return await response.json();
|
|
146
|
+
} catch (error) {
|
|
147
|
+
throw new CrossmintAuthenticationError(
|
|
148
|
+
`Failed to send email OTP: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
149
|
+
);
|
|
150
|
+
}
|
|
122
151
|
}
|
|
123
152
|
|
|
124
153
|
public async confirmEmailOtp(email: string, emailId: string, token: string) {
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
"Content-Type": "application/json",
|
|
136
|
-
}
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
154
|
+
try {
|
|
155
|
+
const queryParams = new URLSearchParams({
|
|
156
|
+
email,
|
|
157
|
+
signinAuthenticationMethod: "email",
|
|
158
|
+
token,
|
|
159
|
+
locale: "en",
|
|
160
|
+
state: emailId,
|
|
161
|
+
});
|
|
162
|
+
|
|
163
|
+
const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
|
|
164
|
+
headers: { "Content-Type": "application/json" },
|
|
165
|
+
});
|
|
166
|
+
|
|
167
|
+
if (!response.ok) {
|
|
168
|
+
throw await response.text();
|
|
169
|
+
}
|
|
170
|
+
|
|
171
|
+
const resData = await response.json();
|
|
172
|
+
return resData.oneTimeSecret;
|
|
173
|
+
} catch (error) {
|
|
174
|
+
throw new CrossmintAuthenticationError(
|
|
175
|
+
`Failed to confirm email OTP: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
176
|
+
);
|
|
177
|
+
}
|
|
144
178
|
}
|
|
145
179
|
|
|
146
180
|
public async signInWithFarcaster(data: UseSignInData) {
|
|
147
|
-
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
"Content-Type": "application/json",
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
})
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
181
|
+
try {
|
|
182
|
+
const queryParams = new URLSearchParams({
|
|
183
|
+
signinAuthenticationMethod: "farcaster",
|
|
184
|
+
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
|
|
185
|
+
});
|
|
186
|
+
|
|
187
|
+
const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
|
|
188
|
+
headers: { "Content-Type": "application/json" },
|
|
189
|
+
body: JSON.stringify({
|
|
190
|
+
...data,
|
|
191
|
+
domain: data.signatureParams.domain,
|
|
192
|
+
redirect: true,
|
|
193
|
+
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
|
|
194
|
+
}),
|
|
195
|
+
});
|
|
196
|
+
|
|
197
|
+
if (!response.ok) {
|
|
198
|
+
throw await response.text();
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
const resData = await response.json();
|
|
202
|
+
return resData.oneTimeSecret;
|
|
203
|
+
} catch (error) {
|
|
204
|
+
throw new CrossmintAuthenticationError(
|
|
205
|
+
`Failed to sign in with Farcaster: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
206
|
+
);
|
|
207
|
+
}
|
|
169
208
|
}
|
|
170
209
|
|
|
171
210
|
public async signInWithSmartWallet(address: string) {
|
|
172
|
-
|
|
173
|
-
signinAuthenticationMethod: "evm"
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
|
|
177
|
-
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
211
|
+
try {
|
|
212
|
+
const queryParams = new URLSearchParams({ signinAuthenticationMethod: "evm" });
|
|
213
|
+
const response = await this.apiClient.post(
|
|
214
|
+
`${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,
|
|
215
|
+
{
|
|
216
|
+
headers: { "Content-Type": "application/json" },
|
|
217
|
+
body: JSON.stringify({ walletAddress: address }),
|
|
218
|
+
}
|
|
219
|
+
);
|
|
220
|
+
|
|
221
|
+
if (!response.ok) {
|
|
222
|
+
throw await response.text();
|
|
183
223
|
}
|
|
184
|
-
|
|
185
|
-
|
|
224
|
+
|
|
225
|
+
return await response.json();
|
|
226
|
+
} catch (error) {
|
|
227
|
+
throw new CrossmintAuthenticationError(
|
|
228
|
+
`Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
229
|
+
);
|
|
230
|
+
}
|
|
186
231
|
}
|
|
187
232
|
|
|
188
233
|
public async authenticateSmartWallet(address: string, signature: string) {
|
|
189
|
-
|
|
190
|
-
signinAuthenticationMethod: "evm"
|
|
191
|
-
|
|
192
|
-
|
|
193
|
-
|
|
194
|
-
|
|
195
|
-
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
200
|
-
|
|
234
|
+
try {
|
|
235
|
+
const queryParams = new URLSearchParams({ signinAuthenticationMethod: "evm" });
|
|
236
|
+
const response = await this.apiClient.post(
|
|
237
|
+
`${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,
|
|
238
|
+
{
|
|
239
|
+
headers: { "Content-Type": "application/json" },
|
|
240
|
+
body: JSON.stringify({ walletAddress: address, signature }),
|
|
241
|
+
}
|
|
242
|
+
);
|
|
243
|
+
|
|
244
|
+
if (!response.ok) {
|
|
245
|
+
throw await response.text();
|
|
201
246
|
}
|
|
202
|
-
|
|
203
|
-
|
|
247
|
+
|
|
248
|
+
return await response.json();
|
|
249
|
+
} catch (error) {
|
|
250
|
+
throw new CrossmintAuthenticationError(
|
|
251
|
+
`Failed to authenticate smart wallet: ${error instanceof Error ? error.message : "Unknown error"}`
|
|
252
|
+
);
|
|
253
|
+
}
|
|
204
254
|
}
|
|
205
255
|
|
|
206
256
|
private async logoutFromCustomRoute(): Promise<Response> {
|