@crossmint/client-sdk-auth 1.0.0 → 1.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/CrossmintAuthClient.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,iBAAuD;AAK3D,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAI,gBAAgB,QAAQ,KAAK,gBAAgB,MAAM;AACnD;AAAA,MACJ;AAEA,UAAI;AAEA,YAAI,KAAK,kBAAkB,MAAM;AAC7B,eAAK,iBAAiB,KAAK,oBAAoB,YAAY;AAAA,QAC/D;AACA,cAAM,eAAe,MAAM,KAAK;AAGhC,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,iBAAiB;AAAA,MAC1B;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ","sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private refreshPromise: Promise<AuthMaterialWithUser> | null = null;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if (refreshToken == null && this.refreshRoute == null) {\n return;\n }\n\n try {\n // Create new refresh promise if none exists\n if (this.refreshPromise == null) {\n this.refreshPromise = this.refreshAuthMaterial(refreshToken);\n }\n const authMaterial = await this.refreshPromise;\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.refreshPromise = null;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"]}
package/dist/index.cjs CHANGED
@@ -1,6 +1,6 @@
1
1
  "use strict";Object.defineProperty(exports, "__esModule", {value: true});
2
2
 
3
- var _chunkILL57KWXcjs = require('./chunk-ILL57KWX.cjs');
3
+ var _chunkWQOH66RUcjs = require('./chunk-WQOH66RU.cjs');
4
4
  require('./chunk-VQ3HTIQ3.cjs');
5
5
 
6
6
 
@@ -25,5 +25,5 @@ var _commonsdkbase = require('@crossmint/common-sdk-base');
25
25
 
26
26
 
27
27
 
28
- exports.CrossmintAuth = _chunkILL57KWXcjs.CrossmintAuthClient; exports.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS = _chunkTIUX4OOQcjs.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS; exports.createCrossmint = _commonsdkbase.createCrossmint; exports.deleteCookie = _chunkBGMXXFQ4cjs.deleteCookie; exports.getCookie = _chunkBGMXXFQ4cjs.getCookie; exports.getJWTExpiration = _chunkQY4RIGNMcjs.getJWTExpiration; exports.setCookie = _chunkBGMXXFQ4cjs.setCookie;
28
+ exports.CrossmintAuth = _chunkWQOH66RUcjs.CrossmintAuthClient; exports.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS = _chunkTIUX4OOQcjs.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS; exports.createCrossmint = _commonsdkbase.createCrossmint; exports.deleteCookie = _chunkBGMXXFQ4cjs.deleteCookie; exports.getCookie = _chunkBGMXXFQ4cjs.getCookie; exports.getJWTExpiration = _chunkQY4RIGNMcjs.getJWTExpiration; exports.setCookie = _chunkBGMXXFQ4cjs.setCookie;
29
29
  //# sourceMappingURL=index.cjs.map
package/dist/index.js CHANGED
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  CrossmintAuthClient
3
- } from "./chunk-7YATBCAU.js";
3
+ } from "./chunk-5KJPKQDF.js";
4
4
  import "./chunk-TOXKCKTY.js";
5
5
  import {
6
6
  TIME_BEFORE_EXPIRING_JWT_IN_SECONDS
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@crossmint/client-sdk-auth",
3
- "version": "1.0.0",
3
+ "version": "1.1.1",
4
4
  "repository": "https://github.com/Crossmint/crossmint-sdk",
5
5
  "license": "Apache-2.0",
6
6
  "author": "Paella Labs Inc",
@@ -22,12 +22,12 @@
22
22
  "jwt-decode": "4.0.0",
23
23
  "@farcaster/auth-kit": "0.6.0",
24
24
  "@crossmint/client-sdk-base": "1.3.2",
25
- "@crossmint/common-sdk-auth": "1.0.0",
25
+ "@crossmint/common-sdk-auth": "1.0.1",
26
26
  "@crossmint/common-sdk-base": "0.3.0"
27
27
  },
28
28
  "scripts": {
29
29
  "build": "tsup",
30
30
  "dev": "tsup --watch",
31
- "test": "vitest run"
31
+ "test:vitest": "vitest run"
32
32
  }
33
33
  }
@@ -53,6 +53,7 @@ describe("CrossmintAuthClient", () => {
53
53
  const mockUserData = { id: "user123", email: "user@example.com" };
54
54
  mockApiClient.get.mockResolvedValue({
55
55
  json: () => Promise.resolve(mockUserData),
56
+ ok: true,
56
57
  });
57
58
 
58
59
  const result = await crossmintAuthClient.getUser();
@@ -145,6 +146,7 @@ describe("CrossmintAuthClient", () => {
145
146
  vi.spyOn(crossmintAuthClient as any, "storeAuthMaterial").mockImplementation(() => {});
146
147
  vi.mocked(getJWTExpiration).mockReturnValue(Date.now() / 1000 + 3600); // 1 hour from now
147
148
  vi.mocked(queueTask).mockReturnValue({ cancel: vi.fn() } as any);
149
+ (crossmintAuthClient as any).refreshPromise = null;
148
150
  });
149
151
 
150
152
  it("should refresh auth material and schedule next refresh", async () => {
@@ -161,11 +163,13 @@ describe("CrossmintAuthClient", () => {
161
163
  expect(queueTask).toHaveBeenCalledWith(expect.any(Function), expect.any(Number));
162
164
  });
163
165
 
164
- it("should not refresh if already refreshing", async () => {
165
- (crossmintAuthClient as any).isRefreshing = true;
166
- await crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
166
+ it("should not refresh when called twice in a row", async () => {
167
+ const promise1 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
168
+ const promise2 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
167
169
 
168
- expect(crossmintAuthClient["refreshAuthMaterial"]).not.toHaveBeenCalled();
170
+ await Promise.all([promise1, promise2]);
171
+
172
+ expect(crossmintAuthClient["refreshAuthMaterial"]).toHaveBeenCalledTimes(1);
169
173
  });
170
174
 
171
175
  it("should call onTokenRefresh callback if provided", async () => {
@@ -249,6 +253,7 @@ describe("CrossmintAuthClient", () => {
249
253
  const mockOAuthUrl = "https://oauth.example.com/auth";
250
254
  mockApiClient.get.mockResolvedValue({
251
255
  json: () => Promise.resolve({ oauthUrl: mockOAuthUrl }),
256
+ ok: true,
252
257
  });
253
258
 
254
259
  const result = await crossmintAuthClient.getOAuthUrl(mockProvider);
@@ -267,6 +272,7 @@ describe("CrossmintAuthClient", () => {
267
272
  const mockResponse = { success: true };
268
273
  mockApiClient.post.mockResolvedValue({
269
274
  json: () => Promise.resolve(mockResponse),
275
+ ok: true,
270
276
  });
271
277
 
272
278
  const result = await crossmintAuthClient.sendEmailOtp(mockEmail);
@@ -288,7 +294,8 @@ describe("CrossmintAuthClient", () => {
288
294
  const mockToken = "otp-token-456";
289
295
  const mockOneTimeSecret = "one-time-secret-789";
290
296
  mockApiClient.post.mockResolvedValue({
291
- json: () => Promise.resolve({ callbackUrl: `https://example.com?oneTimeSecret=${mockOneTimeSecret}` }),
297
+ json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
298
+ ok: true,
292
299
  });
293
300
 
294
301
  const result = await crossmintAuthClient.confirmEmailOtp(mockEmail, mockEmailId, mockToken);
@@ -310,13 +317,14 @@ describe("CrossmintAuthClient", () => {
310
317
  };
311
318
  const mockOneTimeSecret = "farcaster-one-time-secret-123";
312
319
  mockApiClient.post.mockResolvedValue({
313
- json: () => Promise.resolve({ callbackUrl: `https://example.com?oneTimeSecret=${mockOneTimeSecret}` }),
320
+ json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
321
+ ok: true,
314
322
  });
315
323
 
316
324
  const result = await crossmintAuthClient.signInWithFarcaster(mockFarcasterData as StatusAPIResponse);
317
325
 
318
326
  expect(result).toBe(mockOneTimeSecret);
319
- const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback?isPopup=false`;
327
+ const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback`;
320
328
  const queryParams = new URLSearchParams({
321
329
  signinAuthenticationMethod: "farcaster",
322
330
  callbackUrl: expectedCallbackUrl,
@@ -347,6 +355,7 @@ describe("CrossmintAuthClient", () => {
347
355
  };
348
356
  mockApiClient.post.mockResolvedValue({
349
357
  json: () => Promise.resolve(mockResponse),
358
+ ok: true,
350
359
  });
351
360
 
352
361
  const result = await crossmintAuthClient.signInWithSmartWallet(mockAddress);
@@ -356,7 +365,7 @@ describe("CrossmintAuthClient", () => {
356
365
  signinAuthenticationMethod: "evm",
357
366
  });
358
367
  expect(mockApiClient.post).toHaveBeenCalledWith(
359
- `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate/start?${queryParams}`,
368
+ `api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate/start?${queryParams}`,
360
369
  expect.objectContaining({
361
370
  body: JSON.stringify({ walletAddress: mockAddress }),
362
371
  headers: {
@@ -380,6 +389,7 @@ describe("CrossmintAuthClient", () => {
380
389
  };
381
390
  mockApiClient.post.mockResolvedValue({
382
391
  json: () => Promise.resolve(mockResponse),
392
+ ok: true,
383
393
  });
384
394
 
385
395
  const result = await crossmintAuthClient.authenticateSmartWallet(mockAddress, mockSignature);
@@ -387,7 +397,6 @@ describe("CrossmintAuthClient", () => {
387
397
  expect(result).toEqual(mockResponse);
388
398
  const queryParams = new URLSearchParams({
389
399
  signinAuthenticationMethod: "evm",
390
- callbackUrl: `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/we-dont-actually-use-this-anymore`,
391
400
  });
392
401
  expect(mockApiClient.post).toHaveBeenCalledWith(
393
402
  `api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate?${queryParams}`,
@@ -4,6 +4,7 @@ import {
4
4
  type AuthMaterialWithUser,
5
5
  CROSSMINT_API_VERSION,
6
6
  CrossmintAuth,
7
+ CrossmintAuthenticationError,
7
8
  type CrossmintAuthOptions,
8
9
  type OAuthProvider,
9
10
  REFRESH_TOKEN_PREFIX,
@@ -21,7 +22,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
21
22
  export class CrossmintAuthClient extends CrossmintAuth {
22
23
  private callbacks: CrossmintAuthClientCallbacks;
23
24
  private refreshTask: CancellableTask | null = null;
24
- private isRefreshing = false;
25
+ private refreshPromise: Promise<AuthMaterialWithUser> | null = null;
25
26
  private logoutRoute: string | null;
26
27
 
27
28
  private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {
@@ -40,14 +41,21 @@ export class CrossmintAuthClient extends CrossmintAuth {
40
41
  }
41
42
 
42
43
  public async getUser() {
43
- const result = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {
44
- headers: {
45
- "Content-Type": "application/json",
46
- },
47
- });
48
-
49
- const user = await result.json();
50
- return user;
44
+ try {
45
+ const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {
46
+ headers: { "Content-Type": "application/json" },
47
+ });
48
+
49
+ if (!response.ok) {
50
+ throw await response.text();
51
+ }
52
+
53
+ return await response.json();
54
+ } catch (error) {
55
+ throw new CrossmintAuthenticationError(
56
+ `Failed to fetch user: ${error instanceof Error ? error.message : "Unknown error"}`
57
+ );
58
+ }
51
59
  }
52
60
 
53
61
  public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {
@@ -56,32 +64,37 @@ export class CrossmintAuthClient extends CrossmintAuth {
56
64
  }
57
65
 
58
66
  public async logout() {
59
- // Even if there's a server error, we want to clear the cookies
67
+ // Store the old refresh token to pass it to the logout route before deleting the cookies
68
+ const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);
69
+
70
+ // Even if there's a server error, we want to clear the cookies and we do it first to load faster
71
+ deleteCookie(REFRESH_TOKEN_PREFIX);
72
+ deleteCookie(SESSION_PREFIX);
73
+ this.callbacks.onLogout?.();
60
74
  try {
61
75
  if (this.logoutRoute != null) {
62
76
  await this.logoutFromCustomRoute();
63
- } else {
64
- await this.logoutFromDefaultRoute(getCookie(REFRESH_TOKEN_PREFIX));
77
+ } else if (oldRefreshToken != null) {
78
+ await this.logoutFromDefaultRoute(oldRefreshToken);
65
79
  }
66
80
  } catch (error) {
67
81
  console.error(error);
68
- } finally {
69
- deleteCookie(REFRESH_TOKEN_PREFIX);
70
- deleteCookie(SESSION_PREFIX);
71
- this.callbacks.onLogout?.();
72
82
  }
73
83
  }
74
84
 
75
85
  public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {
76
86
  const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);
77
87
  // If there is a custom refresh route, that endpoint will fetch the cookies itself
78
- if ((refreshToken == null && this.refreshRoute == null) || this.isRefreshing) {
88
+ if (refreshToken == null && this.refreshRoute == null) {
79
89
  return;
80
90
  }
81
91
 
82
92
  try {
83
- this.isRefreshing = true;
84
- const authMaterial = await this.refreshAuthMaterial(refreshToken);
93
+ // Create new refresh promise if none exists
94
+ if (this.refreshPromise == null) {
95
+ this.refreshPromise = this.refreshAuthMaterial(refreshToken);
96
+ }
97
+ const authMaterial = await this.refreshPromise;
85
98
 
86
99
  // If a custom refresh route is set, storing in cookies is handled in the server
87
100
  if (this.refreshRoute == null) {
@@ -95,112 +108,149 @@ export class CrossmintAuthClient extends CrossmintAuth {
95
108
  console.error(error);
96
109
  this.logout();
97
110
  } finally {
98
- this.isRefreshing = false;
111
+ this.refreshPromise = null;
99
112
  }
100
113
  }
101
114
 
102
115
  public async getOAuthUrl(provider: OAuthProvider) {
103
- const result = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {
104
- headers: {
105
- "Content-Type": "application/json",
106
- },
107
- });
108
-
109
- const data = (await result.json()) as { oauthUrl: string };
110
- return data.oauthUrl;
116
+ try {
117
+ const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {
118
+ headers: { "Content-Type": "application/json" },
119
+ });
120
+
121
+ if (!response.ok) {
122
+ throw await response.text();
123
+ }
124
+
125
+ const data = await response.json();
126
+ return data.oauthUrl;
127
+ } catch (error) {
128
+ throw new CrossmintAuthenticationError(
129
+ `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : "Unknown error"}`
130
+ );
131
+ }
111
132
  }
112
133
 
113
134
  public async sendEmailOtp(email: string) {
114
- const result = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {
115
- headers: {
116
- "Content-Type": "application/json",
117
- },
118
- body: JSON.stringify({ email }),
119
- });
120
-
121
- return await result.json();
135
+ try {
136
+ const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {
137
+ headers: { "Content-Type": "application/json" },
138
+ body: JSON.stringify({ email }),
139
+ });
140
+
141
+ if (!response.ok) {
142
+ throw await response.text();
143
+ }
144
+
145
+ return await response.json();
146
+ } catch (error) {
147
+ throw new CrossmintAuthenticationError(
148
+ `Failed to send email OTP: ${error instanceof Error ? error.message : "Unknown error"}`
149
+ );
150
+ }
122
151
  }
123
152
 
124
153
  public async confirmEmailOtp(email: string, emailId: string, token: string) {
125
- const queryParams = new URLSearchParams({
126
- email,
127
- signinAuthenticationMethod: "email",
128
- token,
129
- locale: "en",
130
- state: emailId,
131
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/we-dont-actually-use-this-anymore`,
132
- });
133
- const result = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
134
- headers: {
135
- "Content-Type": "application/json",
136
- },
137
- });
138
-
139
- const resData = await result.json();
140
- const callbackUrl = new URL(resData.callbackUrl);
141
-
142
- // parse the oneTimeSecret from the callbackUrl response
143
- return callbackUrl.searchParams.get("oneTimeSecret");
154
+ try {
155
+ const queryParams = new URLSearchParams({
156
+ email,
157
+ signinAuthenticationMethod: "email",
158
+ token,
159
+ locale: "en",
160
+ state: emailId,
161
+ });
162
+
163
+ const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
164
+ headers: { "Content-Type": "application/json" },
165
+ });
166
+
167
+ if (!response.ok) {
168
+ throw await response.text();
169
+ }
170
+
171
+ const resData = await response.json();
172
+ return resData.oneTimeSecret;
173
+ } catch (error) {
174
+ throw new CrossmintAuthenticationError(
175
+ `Failed to confirm email OTP: ${error instanceof Error ? error.message : "Unknown error"}`
176
+ );
177
+ }
144
178
  }
145
179
 
146
180
  public async signInWithFarcaster(data: UseSignInData) {
147
- const queryParams = new URLSearchParams({
148
- signinAuthenticationMethod: "farcaster",
149
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,
150
- });
151
-
152
- const result = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
153
- headers: {
154
- "Content-Type": "application/json",
155
- },
156
- body: JSON.stringify({
157
- ...data,
158
- domain: data.signatureParams.domain,
159
- redirect: true,
160
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,
161
- }),
162
- });
163
-
164
- const resData = await result.json();
165
- const callbackUrl = new URL(resData.callbackUrl);
166
-
167
- // parse the oneTimeSecret from the callbackUrl response
168
- return callbackUrl.searchParams.get("oneTimeSecret");
181
+ try {
182
+ const queryParams = new URLSearchParams({
183
+ signinAuthenticationMethod: "farcaster",
184
+ callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
185
+ });
186
+
187
+ const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
188
+ headers: { "Content-Type": "application/json" },
189
+ body: JSON.stringify({
190
+ ...data,
191
+ domain: data.signatureParams.domain,
192
+ redirect: true,
193
+ callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
194
+ }),
195
+ });
196
+
197
+ if (!response.ok) {
198
+ throw await response.text();
199
+ }
200
+
201
+ const resData = await response.json();
202
+ return resData.oneTimeSecret;
203
+ } catch (error) {
204
+ throw new CrossmintAuthenticationError(
205
+ `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : "Unknown error"}`
206
+ );
207
+ }
169
208
  }
170
209
 
171
210
  public async signInWithSmartWallet(address: string) {
172
- const queryParams = new URLSearchParams({
173
- signinAuthenticationMethod: "evm",
174
- });
175
-
176
- const result = await this.apiClient.post(
177
- `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,
178
- {
179
- headers: {
180
- "Content-Type": "application/json",
181
- },
182
- body: JSON.stringify({ walletAddress: address }),
211
+ try {
212
+ const queryParams = new URLSearchParams({ signinAuthenticationMethod: "evm" });
213
+ const response = await this.apiClient.post(
214
+ `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,
215
+ {
216
+ headers: { "Content-Type": "application/json" },
217
+ body: JSON.stringify({ walletAddress: address }),
218
+ }
219
+ );
220
+
221
+ if (!response.ok) {
222
+ throw await response.text();
183
223
  }
184
- );
185
- return await result.json();
224
+
225
+ return await response.json();
226
+ } catch (error) {
227
+ throw new CrossmintAuthenticationError(
228
+ `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : "Unknown error"}`
229
+ );
230
+ }
186
231
  }
187
232
 
188
233
  public async authenticateSmartWallet(address: string, signature: string) {
189
- const queryParams = new URLSearchParams({
190
- signinAuthenticationMethod: "evm",
191
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/we-dont-actually-use-this-anymore`,
192
- });
193
-
194
- const result = await this.apiClient.post(
195
- `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,
196
- {
197
- headers: {
198
- "Content-Type": "application/json",
199
- },
200
- body: JSON.stringify({ walletAddress: address, signature }),
234
+ try {
235
+ const queryParams = new URLSearchParams({ signinAuthenticationMethod: "evm" });
236
+ const response = await this.apiClient.post(
237
+ `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,
238
+ {
239
+ headers: { "Content-Type": "application/json" },
240
+ body: JSON.stringify({ walletAddress: address, signature }),
241
+ }
242
+ );
243
+
244
+ if (!response.ok) {
245
+ throw await response.text();
201
246
  }
202
- );
203
- return await result.json();
247
+
248
+ return await response.json();
249
+ } catch (error) {
250
+ throw new CrossmintAuthenticationError(
251
+ `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : "Unknown error"}`
252
+ );
253
+ }
204
254
  }
205
255
 
206
256
  private async logoutFromCustomRoute(): Promise<Response> {