@crossmint/client-sdk-auth 1.1.0 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/CrossmintAuthClient.cjs +2 -2
- package/dist/CrossmintAuthClient.d.cts +1 -1
- package/dist/CrossmintAuthClient.d.ts +1 -1
- package/dist/CrossmintAuthClient.js +1 -1
- package/dist/{chunk-5H2QWRZD.js → chunk-5KJPKQDF.js} +10 -8
- package/dist/chunk-5KJPKQDF.js.map +1 -0
- package/dist/{chunk-M4V2KE2Y.cjs → chunk-WQOH66RU.cjs} +10 -8
- package/dist/chunk-WQOH66RU.cjs.map +1 -0
- package/dist/index.cjs +2 -2
- package/dist/index.js +1 -1
- package/package.json +2 -2
- package/src/CrossmintAuthClient.test.ts +18 -9
- package/src/CrossmintAuthClient.ts +10 -7
- package/dist/chunk-5H2QWRZD.js.map +0 -1
- package/dist/chunk-M4V2KE2Y.cjs.map +0 -1
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";Object.defineProperty(exports, "__esModule", {value: true});
|
|
2
2
|
|
|
3
|
-
var
|
|
3
|
+
var _chunkWQOH66RUcjs = require('./chunk-WQOH66RU.cjs');
|
|
4
4
|
require('./chunk-VQ3HTIQ3.cjs');
|
|
5
5
|
require('./chunk-TIUX4OOQ.cjs');
|
|
6
6
|
require('./chunk-BGMXXFQ4.cjs');
|
|
@@ -8,5 +8,5 @@ require('./chunk-QY4RIGNM.cjs');
|
|
|
8
8
|
require('./chunk-F45I5NLI.cjs');
|
|
9
9
|
|
|
10
10
|
|
|
11
|
-
exports.CrossmintAuthClient =
|
|
11
|
+
exports.CrossmintAuthClient = _chunkWQOH66RUcjs.CrossmintAuthClient;
|
|
12
12
|
//# sourceMappingURL=CrossmintAuthClient.cjs.map
|
|
@@ -9,7 +9,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
|
|
|
9
9
|
declare class CrossmintAuthClient extends CrossmintAuth {
|
|
10
10
|
private callbacks;
|
|
11
11
|
private refreshTask;
|
|
12
|
-
private
|
|
12
|
+
private refreshPromise;
|
|
13
13
|
private logoutRoute;
|
|
14
14
|
private constructor();
|
|
15
15
|
static from(crossmint: Crossmint, config?: CrossmintAuthClientConfig): CrossmintAuthClient;
|
|
@@ -9,7 +9,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
|
|
|
9
9
|
declare class CrossmintAuthClient extends CrossmintAuth {
|
|
10
10
|
private callbacks;
|
|
11
11
|
private refreshTask;
|
|
12
|
-
private
|
|
12
|
+
private refreshPromise;
|
|
13
13
|
private logoutRoute;
|
|
14
14
|
private constructor();
|
|
15
15
|
static from(crossmint: Crossmint, config?: CrossmintAuthClientConfig): CrossmintAuthClient;
|
|
@@ -30,7 +30,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
|
|
|
30
30
|
var _a, _b;
|
|
31
31
|
super(crossmint, apiClient, config);
|
|
32
32
|
this.refreshTask = null;
|
|
33
|
-
this.
|
|
33
|
+
this.refreshPromise = null;
|
|
34
34
|
this.callbacks = (_a = config.callbacks) != null ? _a : {};
|
|
35
35
|
this.logoutRoute = (_b = config.logoutRoute) != null ? _b : null;
|
|
36
36
|
}
|
|
@@ -84,12 +84,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
|
|
|
84
84
|
return __async(this, null, function* () {
|
|
85
85
|
var _a, _b;
|
|
86
86
|
const refreshToken = refreshTokenSecret != null ? refreshTokenSecret : getCookie(REFRESH_TOKEN_PREFIX);
|
|
87
|
-
if (refreshToken == null && this.refreshRoute == null
|
|
87
|
+
if (refreshToken == null && this.refreshRoute == null) {
|
|
88
88
|
return;
|
|
89
89
|
}
|
|
90
90
|
try {
|
|
91
|
-
this.
|
|
92
|
-
|
|
91
|
+
if (this.refreshPromise == null) {
|
|
92
|
+
this.refreshPromise = this.refreshAuthMaterial(refreshToken);
|
|
93
|
+
}
|
|
94
|
+
const authMaterial = yield this.refreshPromise;
|
|
93
95
|
if (this.refreshRoute == null) {
|
|
94
96
|
this.storeAuthMaterial(authMaterial);
|
|
95
97
|
}
|
|
@@ -99,7 +101,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
|
|
|
99
101
|
console.error(error);
|
|
100
102
|
this.logout();
|
|
101
103
|
} finally {
|
|
102
|
-
this.
|
|
104
|
+
this.refreshPromise = null;
|
|
103
105
|
}
|
|
104
106
|
});
|
|
105
107
|
}
|
|
@@ -169,14 +171,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
|
|
|
169
171
|
try {
|
|
170
172
|
const queryParams = new URLSearchParams({
|
|
171
173
|
signinAuthenticationMethod: "farcaster",
|
|
172
|
-
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback
|
|
174
|
+
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`
|
|
173
175
|
});
|
|
174
176
|
const response = yield this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
|
|
175
177
|
headers: { "Content-Type": "application/json" },
|
|
176
178
|
body: JSON.stringify(__spreadProps(__spreadValues({}, data), {
|
|
177
179
|
domain: data.signatureParams.domain,
|
|
178
180
|
redirect: true,
|
|
179
|
-
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback
|
|
181
|
+
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`
|
|
180
182
|
}))
|
|
181
183
|
});
|
|
182
184
|
if (!response.ok) {
|
|
@@ -267,4 +269,4 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
|
|
|
267
269
|
export {
|
|
268
270
|
CrossmintAuthClient
|
|
269
271
|
};
|
|
270
|
-
//# sourceMappingURL=chunk-
|
|
272
|
+
//# sourceMappingURL=chunk-5KJPKQDF.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/CrossmintAuthClient.ts"],"sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private refreshPromise: Promise<AuthMaterialWithUser> | null = null;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if (refreshToken == null && this.refreshRoute == null) {\n return;\n }\n\n try {\n // Create new refresh promise if none exists\n if (this.refreshPromise == null) {\n this.refreshPromise = this.refreshAuthMaterial(refreshToken);\n }\n const authMaterial = await this.refreshPromise;\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.refreshPromise = null;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,iBAAuD;AAK3D,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAI,gBAAgB,QAAQ,KAAK,gBAAgB,MAAM;AACnD;AAAA,MACJ;AAEA,UAAI;AAEA,YAAI,KAAK,kBAAkB,MAAM;AAC7B,eAAK,iBAAiB,KAAK,oBAAoB,YAAY;AAAA,QAC/D;AACA,cAAM,eAAe,MAAM,KAAK;AAGhC,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,iBAAiB;AAAA,MAC1B;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ;","names":[]}
|
|
@@ -30,7 +30,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
|
|
|
30
30
|
var _a, _b;
|
|
31
31
|
super(crossmint, apiClient, config);
|
|
32
32
|
this.refreshTask = null;
|
|
33
|
-
this.
|
|
33
|
+
this.refreshPromise = null;
|
|
34
34
|
this.callbacks = (_a = config.callbacks) != null ? _a : {};
|
|
35
35
|
this.logoutRoute = (_b = config.logoutRoute) != null ? _b : null;
|
|
36
36
|
}
|
|
@@ -84,12 +84,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
|
|
|
84
84
|
return _chunkF45I5NLIcjs.__async.call(void 0, this, null, function* () {
|
|
85
85
|
var _a, _b;
|
|
86
86
|
const refreshToken = refreshTokenSecret != null ? refreshTokenSecret : _chunkBGMXXFQ4cjs.getCookie.call(void 0, _commonsdkauth.REFRESH_TOKEN_PREFIX);
|
|
87
|
-
if (refreshToken == null && this.refreshRoute == null
|
|
87
|
+
if (refreshToken == null && this.refreshRoute == null) {
|
|
88
88
|
return;
|
|
89
89
|
}
|
|
90
90
|
try {
|
|
91
|
-
this.
|
|
92
|
-
|
|
91
|
+
if (this.refreshPromise == null) {
|
|
92
|
+
this.refreshPromise = this.refreshAuthMaterial(refreshToken);
|
|
93
|
+
}
|
|
94
|
+
const authMaterial = yield this.refreshPromise;
|
|
93
95
|
if (this.refreshRoute == null) {
|
|
94
96
|
this.storeAuthMaterial(authMaterial);
|
|
95
97
|
}
|
|
@@ -99,7 +101,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
|
|
|
99
101
|
console.error(error);
|
|
100
102
|
this.logout();
|
|
101
103
|
} finally {
|
|
102
|
-
this.
|
|
104
|
+
this.refreshPromise = null;
|
|
103
105
|
}
|
|
104
106
|
});
|
|
105
107
|
}
|
|
@@ -169,14 +171,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
|
|
|
169
171
|
try {
|
|
170
172
|
const queryParams = new URLSearchParams({
|
|
171
173
|
signinAuthenticationMethod: "farcaster",
|
|
172
|
-
callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback
|
|
174
|
+
callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback`
|
|
173
175
|
});
|
|
174
176
|
const response = yield this.apiClient.post(`${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
|
|
175
177
|
headers: { "Content-Type": "application/json" },
|
|
176
178
|
body: JSON.stringify(_chunkF45I5NLIcjs.__spreadProps.call(void 0, _chunkF45I5NLIcjs.__spreadValues.call(void 0, {}, data), {
|
|
177
179
|
domain: data.signatureParams.domain,
|
|
178
180
|
redirect: true,
|
|
179
|
-
callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback
|
|
181
|
+
callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback`
|
|
180
182
|
}))
|
|
181
183
|
});
|
|
182
184
|
if (!response.ok) {
|
|
@@ -267,4 +269,4 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
|
|
|
267
269
|
|
|
268
270
|
|
|
269
271
|
exports.CrossmintAuthClient = CrossmintAuthClient;
|
|
270
|
-
//# sourceMappingURL=chunk-
|
|
272
|
+
//# sourceMappingURL=chunk-WQOH66RU.cjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../src/CrossmintAuthClient.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,iBAAuD;AAK3D,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAI,gBAAgB,QAAQ,KAAK,gBAAgB,MAAM;AACnD;AAAA,MACJ;AAEA,UAAI;AAEA,YAAI,KAAK,kBAAkB,MAAM;AAC7B,eAAK,iBAAiB,KAAK,oBAAoB,YAAY;AAAA,QAC/D;AACA,cAAM,eAAe,MAAM,KAAK;AAGhC,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,iBAAiB;AAAA,MAC1B;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ","sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private refreshPromise: Promise<AuthMaterialWithUser> | null = null;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if (refreshToken == null && this.refreshRoute == null) {\n return;\n }\n\n try {\n // Create new refresh promise if none exists\n if (this.refreshPromise == null) {\n this.refreshPromise = this.refreshAuthMaterial(refreshToken);\n }\n const authMaterial = await this.refreshPromise;\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.refreshPromise = null;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"]}
|
package/dist/index.cjs
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";Object.defineProperty(exports, "__esModule", {value: true});
|
|
2
2
|
|
|
3
|
-
var
|
|
3
|
+
var _chunkWQOH66RUcjs = require('./chunk-WQOH66RU.cjs');
|
|
4
4
|
require('./chunk-VQ3HTIQ3.cjs');
|
|
5
5
|
|
|
6
6
|
|
|
@@ -25,5 +25,5 @@ var _commonsdkbase = require('@crossmint/common-sdk-base');
|
|
|
25
25
|
|
|
26
26
|
|
|
27
27
|
|
|
28
|
-
exports.CrossmintAuth =
|
|
28
|
+
exports.CrossmintAuth = _chunkWQOH66RUcjs.CrossmintAuthClient; exports.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS = _chunkTIUX4OOQcjs.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS; exports.createCrossmint = _commonsdkbase.createCrossmint; exports.deleteCookie = _chunkBGMXXFQ4cjs.deleteCookie; exports.getCookie = _chunkBGMXXFQ4cjs.getCookie; exports.getJWTExpiration = _chunkQY4RIGNMcjs.getJWTExpiration; exports.setCookie = _chunkBGMXXFQ4cjs.setCookie;
|
|
29
29
|
//# sourceMappingURL=index.cjs.map
|
package/dist/index.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@crossmint/client-sdk-auth",
|
|
3
|
-
"version": "1.1.
|
|
3
|
+
"version": "1.1.1",
|
|
4
4
|
"repository": "https://github.com/Crossmint/crossmint-sdk",
|
|
5
5
|
"license": "Apache-2.0",
|
|
6
6
|
"author": "Paella Labs Inc",
|
|
@@ -28,6 +28,6 @@
|
|
|
28
28
|
"scripts": {
|
|
29
29
|
"build": "tsup",
|
|
30
30
|
"dev": "tsup --watch",
|
|
31
|
-
"test": "vitest run"
|
|
31
|
+
"test:vitest": "vitest run"
|
|
32
32
|
}
|
|
33
33
|
}
|
|
@@ -53,6 +53,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
53
53
|
const mockUserData = { id: "user123", email: "user@example.com" };
|
|
54
54
|
mockApiClient.get.mockResolvedValue({
|
|
55
55
|
json: () => Promise.resolve(mockUserData),
|
|
56
|
+
ok: true,
|
|
56
57
|
});
|
|
57
58
|
|
|
58
59
|
const result = await crossmintAuthClient.getUser();
|
|
@@ -145,6 +146,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
145
146
|
vi.spyOn(crossmintAuthClient as any, "storeAuthMaterial").mockImplementation(() => {});
|
|
146
147
|
vi.mocked(getJWTExpiration).mockReturnValue(Date.now() / 1000 + 3600); // 1 hour from now
|
|
147
148
|
vi.mocked(queueTask).mockReturnValue({ cancel: vi.fn() } as any);
|
|
149
|
+
(crossmintAuthClient as any).refreshPromise = null;
|
|
148
150
|
});
|
|
149
151
|
|
|
150
152
|
it("should refresh auth material and schedule next refresh", async () => {
|
|
@@ -161,11 +163,13 @@ describe("CrossmintAuthClient", () => {
|
|
|
161
163
|
expect(queueTask).toHaveBeenCalledWith(expect.any(Function), expect.any(Number));
|
|
162
164
|
});
|
|
163
165
|
|
|
164
|
-
it("should not refresh
|
|
165
|
-
|
|
166
|
-
|
|
166
|
+
it("should not refresh when called twice in a row", async () => {
|
|
167
|
+
const promise1 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
|
|
168
|
+
const promise2 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
|
|
167
169
|
|
|
168
|
-
|
|
170
|
+
await Promise.all([promise1, promise2]);
|
|
171
|
+
|
|
172
|
+
expect(crossmintAuthClient["refreshAuthMaterial"]).toHaveBeenCalledTimes(1);
|
|
169
173
|
});
|
|
170
174
|
|
|
171
175
|
it("should call onTokenRefresh callback if provided", async () => {
|
|
@@ -249,6 +253,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
249
253
|
const mockOAuthUrl = "https://oauth.example.com/auth";
|
|
250
254
|
mockApiClient.get.mockResolvedValue({
|
|
251
255
|
json: () => Promise.resolve({ oauthUrl: mockOAuthUrl }),
|
|
256
|
+
ok: true,
|
|
252
257
|
});
|
|
253
258
|
|
|
254
259
|
const result = await crossmintAuthClient.getOAuthUrl(mockProvider);
|
|
@@ -267,6 +272,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
267
272
|
const mockResponse = { success: true };
|
|
268
273
|
mockApiClient.post.mockResolvedValue({
|
|
269
274
|
json: () => Promise.resolve(mockResponse),
|
|
275
|
+
ok: true,
|
|
270
276
|
});
|
|
271
277
|
|
|
272
278
|
const result = await crossmintAuthClient.sendEmailOtp(mockEmail);
|
|
@@ -288,7 +294,8 @@ describe("CrossmintAuthClient", () => {
|
|
|
288
294
|
const mockToken = "otp-token-456";
|
|
289
295
|
const mockOneTimeSecret = "one-time-secret-789";
|
|
290
296
|
mockApiClient.post.mockResolvedValue({
|
|
291
|
-
json: () => Promise.resolve({
|
|
297
|
+
json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
|
|
298
|
+
ok: true,
|
|
292
299
|
});
|
|
293
300
|
|
|
294
301
|
const result = await crossmintAuthClient.confirmEmailOtp(mockEmail, mockEmailId, mockToken);
|
|
@@ -310,13 +317,14 @@ describe("CrossmintAuthClient", () => {
|
|
|
310
317
|
};
|
|
311
318
|
const mockOneTimeSecret = "farcaster-one-time-secret-123";
|
|
312
319
|
mockApiClient.post.mockResolvedValue({
|
|
313
|
-
json: () => Promise.resolve({
|
|
320
|
+
json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
|
|
321
|
+
ok: true,
|
|
314
322
|
});
|
|
315
323
|
|
|
316
324
|
const result = await crossmintAuthClient.signInWithFarcaster(mockFarcasterData as StatusAPIResponse);
|
|
317
325
|
|
|
318
326
|
expect(result).toBe(mockOneTimeSecret);
|
|
319
|
-
const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback
|
|
327
|
+
const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback`;
|
|
320
328
|
const queryParams = new URLSearchParams({
|
|
321
329
|
signinAuthenticationMethod: "farcaster",
|
|
322
330
|
callbackUrl: expectedCallbackUrl,
|
|
@@ -347,6 +355,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
347
355
|
};
|
|
348
356
|
mockApiClient.post.mockResolvedValue({
|
|
349
357
|
json: () => Promise.resolve(mockResponse),
|
|
358
|
+
ok: true,
|
|
350
359
|
});
|
|
351
360
|
|
|
352
361
|
const result = await crossmintAuthClient.signInWithSmartWallet(mockAddress);
|
|
@@ -356,7 +365,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
356
365
|
signinAuthenticationMethod: "evm",
|
|
357
366
|
});
|
|
358
367
|
expect(mockApiClient.post).toHaveBeenCalledWith(
|
|
359
|
-
`
|
|
368
|
+
`api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate/start?${queryParams}`,
|
|
360
369
|
expect.objectContaining({
|
|
361
370
|
body: JSON.stringify({ walletAddress: mockAddress }),
|
|
362
371
|
headers: {
|
|
@@ -380,6 +389,7 @@ describe("CrossmintAuthClient", () => {
|
|
|
380
389
|
};
|
|
381
390
|
mockApiClient.post.mockResolvedValue({
|
|
382
391
|
json: () => Promise.resolve(mockResponse),
|
|
392
|
+
ok: true,
|
|
383
393
|
});
|
|
384
394
|
|
|
385
395
|
const result = await crossmintAuthClient.authenticateSmartWallet(mockAddress, mockSignature);
|
|
@@ -387,7 +397,6 @@ describe("CrossmintAuthClient", () => {
|
|
|
387
397
|
expect(result).toEqual(mockResponse);
|
|
388
398
|
const queryParams = new URLSearchParams({
|
|
389
399
|
signinAuthenticationMethod: "evm",
|
|
390
|
-
callbackUrl: `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/we-dont-actually-use-this-anymore`,
|
|
391
400
|
});
|
|
392
401
|
expect(mockApiClient.post).toHaveBeenCalledWith(
|
|
393
402
|
`api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate?${queryParams}`,
|
|
@@ -22,7 +22,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
|
|
|
22
22
|
export class CrossmintAuthClient extends CrossmintAuth {
|
|
23
23
|
private callbacks: CrossmintAuthClientCallbacks;
|
|
24
24
|
private refreshTask: CancellableTask | null = null;
|
|
25
|
-
private
|
|
25
|
+
private refreshPromise: Promise<AuthMaterialWithUser> | null = null;
|
|
26
26
|
private logoutRoute: string | null;
|
|
27
27
|
|
|
28
28
|
private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {
|
|
@@ -85,13 +85,16 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
85
85
|
public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {
|
|
86
86
|
const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);
|
|
87
87
|
// If there is a custom refresh route, that endpoint will fetch the cookies itself
|
|
88
|
-
if (
|
|
88
|
+
if (refreshToken == null && this.refreshRoute == null) {
|
|
89
89
|
return;
|
|
90
90
|
}
|
|
91
91
|
|
|
92
92
|
try {
|
|
93
|
-
|
|
94
|
-
|
|
93
|
+
// Create new refresh promise if none exists
|
|
94
|
+
if (this.refreshPromise == null) {
|
|
95
|
+
this.refreshPromise = this.refreshAuthMaterial(refreshToken);
|
|
96
|
+
}
|
|
97
|
+
const authMaterial = await this.refreshPromise;
|
|
95
98
|
|
|
96
99
|
// If a custom refresh route is set, storing in cookies is handled in the server
|
|
97
100
|
if (this.refreshRoute == null) {
|
|
@@ -105,7 +108,7 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
105
108
|
console.error(error);
|
|
106
109
|
this.logout();
|
|
107
110
|
} finally {
|
|
108
|
-
this.
|
|
111
|
+
this.refreshPromise = null;
|
|
109
112
|
}
|
|
110
113
|
}
|
|
111
114
|
|
|
@@ -178,7 +181,7 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
178
181
|
try {
|
|
179
182
|
const queryParams = new URLSearchParams({
|
|
180
183
|
signinAuthenticationMethod: "farcaster",
|
|
181
|
-
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback
|
|
184
|
+
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
|
|
182
185
|
});
|
|
183
186
|
|
|
184
187
|
const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
|
|
@@ -187,7 +190,7 @@ export class CrossmintAuthClient extends CrossmintAuth {
|
|
|
187
190
|
...data,
|
|
188
191
|
domain: data.signatureParams.domain,
|
|
189
192
|
redirect: true,
|
|
190
|
-
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback
|
|
193
|
+
callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
|
|
191
194
|
}),
|
|
192
195
|
});
|
|
193
196
|
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/CrossmintAuthClient.ts"],"sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private isRefreshing = false;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if ((refreshToken == null && this.refreshRoute == null) || this.isRefreshing) {\n return;\n }\n\n try {\n this.isRefreshing = true;\n const authMaterial = await this.refreshAuthMaterial(refreshToken);\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.isRefreshing = false;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,eAAe;AAKnB,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAK,gBAAgB,QAAQ,KAAK,gBAAgB,QAAS,KAAK,cAAc;AAC1E;AAAA,MACJ;AAEA,UAAI;AACA,aAAK,eAAe;AACpB,cAAM,eAAe,MAAM,KAAK,oBAAoB,YAAY;AAGhE,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,eAAe;AAAA,MACxB;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ;","names":[]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/CrossmintAuthClient.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,eAAe;AAKnB,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAK,gBAAgB,QAAQ,KAAK,gBAAgB,QAAS,KAAK,cAAc;AAC1E;AAAA,MACJ;AAEA,UAAI;AACA,aAAK,eAAe;AACpB,cAAM,eAAe,MAAM,KAAK,oBAAoB,YAAY;AAGhE,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,eAAe;AAAA,MACxB;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ","sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private isRefreshing = false;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if ((refreshToken == null && this.refreshRoute == null) || this.isRefreshing) {\n return;\n }\n\n try {\n this.isRefreshing = true;\n const authMaterial = await this.refreshAuthMaterial(refreshToken);\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.isRefreshing = false;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"]}
|