@crossmint/client-sdk-auth 1.1.0 → 1.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  "use strict";Object.defineProperty(exports, "__esModule", {value: true});
2
2
 
3
- var _chunkM4V2KE2Ycjs = require('./chunk-M4V2KE2Y.cjs');
3
+ var _chunkWQOH66RUcjs = require('./chunk-WQOH66RU.cjs');
4
4
  require('./chunk-VQ3HTIQ3.cjs');
5
5
  require('./chunk-TIUX4OOQ.cjs');
6
6
  require('./chunk-BGMXXFQ4.cjs');
@@ -8,5 +8,5 @@ require('./chunk-QY4RIGNM.cjs');
8
8
  require('./chunk-F45I5NLI.cjs');
9
9
 
10
10
 
11
- exports.CrossmintAuthClient = _chunkM4V2KE2Ycjs.CrossmintAuthClient;
11
+ exports.CrossmintAuthClient = _chunkWQOH66RUcjs.CrossmintAuthClient;
12
12
  //# sourceMappingURL=CrossmintAuthClient.cjs.map
@@ -9,7 +9,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
9
9
  declare class CrossmintAuthClient extends CrossmintAuth {
10
10
  private callbacks;
11
11
  private refreshTask;
12
- private isRefreshing;
12
+ private refreshPromise;
13
13
  private logoutRoute;
14
14
  private constructor();
15
15
  static from(crossmint: Crossmint, config?: CrossmintAuthClientConfig): CrossmintAuthClient;
@@ -9,7 +9,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
9
9
  declare class CrossmintAuthClient extends CrossmintAuth {
10
10
  private callbacks;
11
11
  private refreshTask;
12
- private isRefreshing;
12
+ private refreshPromise;
13
13
  private logoutRoute;
14
14
  private constructor();
15
15
  static from(crossmint: Crossmint, config?: CrossmintAuthClientConfig): CrossmintAuthClient;
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  CrossmintAuthClient
3
- } from "./chunk-5H2QWRZD.js";
3
+ } from "./chunk-5KJPKQDF.js";
4
4
  import "./chunk-TOXKCKTY.js";
5
5
  import "./chunk-BMYZMMVR.js";
6
6
  import "./chunk-5JXPQKM4.js";
@@ -30,7 +30,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
30
30
  var _a, _b;
31
31
  super(crossmint, apiClient, config);
32
32
  this.refreshTask = null;
33
- this.isRefreshing = false;
33
+ this.refreshPromise = null;
34
34
  this.callbacks = (_a = config.callbacks) != null ? _a : {};
35
35
  this.logoutRoute = (_b = config.logoutRoute) != null ? _b : null;
36
36
  }
@@ -84,12 +84,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
84
84
  return __async(this, null, function* () {
85
85
  var _a, _b;
86
86
  const refreshToken = refreshTokenSecret != null ? refreshTokenSecret : getCookie(REFRESH_TOKEN_PREFIX);
87
- if (refreshToken == null && this.refreshRoute == null || this.isRefreshing) {
87
+ if (refreshToken == null && this.refreshRoute == null) {
88
88
  return;
89
89
  }
90
90
  try {
91
- this.isRefreshing = true;
92
- const authMaterial = yield this.refreshAuthMaterial(refreshToken);
91
+ if (this.refreshPromise == null) {
92
+ this.refreshPromise = this.refreshAuthMaterial(refreshToken);
93
+ }
94
+ const authMaterial = yield this.refreshPromise;
93
95
  if (this.refreshRoute == null) {
94
96
  this.storeAuthMaterial(authMaterial);
95
97
  }
@@ -99,7 +101,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
99
101
  console.error(error);
100
102
  this.logout();
101
103
  } finally {
102
- this.isRefreshing = false;
104
+ this.refreshPromise = null;
103
105
  }
104
106
  });
105
107
  }
@@ -169,14 +171,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
169
171
  try {
170
172
  const queryParams = new URLSearchParams({
171
173
  signinAuthenticationMethod: "farcaster",
172
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`
174
+ callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`
173
175
  });
174
176
  const response = yield this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
175
177
  headers: { "Content-Type": "application/json" },
176
178
  body: JSON.stringify(__spreadProps(__spreadValues({}, data), {
177
179
  domain: data.signatureParams.domain,
178
180
  redirect: true,
179
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`
181
+ callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`
180
182
  }))
181
183
  });
182
184
  if (!response.ok) {
@@ -267,4 +269,4 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends CrossmintAuth {
267
269
  export {
268
270
  CrossmintAuthClient
269
271
  };
270
- //# sourceMappingURL=chunk-5H2QWRZD.js.map
272
+ //# sourceMappingURL=chunk-5KJPKQDF.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/CrossmintAuthClient.ts"],"sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private refreshPromise: Promise<AuthMaterialWithUser> | null = null;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if (refreshToken == null && this.refreshRoute == null) {\n return;\n }\n\n try {\n // Create new refresh promise if none exists\n if (this.refreshPromise == null) {\n this.refreshPromise = this.refreshAuthMaterial(refreshToken);\n }\n const authMaterial = await this.refreshPromise;\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.refreshPromise = null;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,iBAAuD;AAK3D,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAI,gBAAgB,QAAQ,KAAK,gBAAgB,MAAM;AACnD;AAAA,MACJ;AAEA,UAAI;AAEA,YAAI,KAAK,kBAAkB,MAAM;AAC7B,eAAK,iBAAiB,KAAK,oBAAoB,YAAY;AAAA,QAC/D;AACA,cAAM,eAAe,MAAM,KAAK;AAGhC,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,iBAAiB;AAAA,MAC1B;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ;","names":[]}
@@ -30,7 +30,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
30
30
  var _a, _b;
31
31
  super(crossmint, apiClient, config);
32
32
  this.refreshTask = null;
33
- this.isRefreshing = false;
33
+ this.refreshPromise = null;
34
34
  this.callbacks = (_a = config.callbacks) != null ? _a : {};
35
35
  this.logoutRoute = (_b = config.logoutRoute) != null ? _b : null;
36
36
  }
@@ -84,12 +84,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
84
84
  return _chunkF45I5NLIcjs.__async.call(void 0, this, null, function* () {
85
85
  var _a, _b;
86
86
  const refreshToken = refreshTokenSecret != null ? refreshTokenSecret : _chunkBGMXXFQ4cjs.getCookie.call(void 0, _commonsdkauth.REFRESH_TOKEN_PREFIX);
87
- if (refreshToken == null && this.refreshRoute == null || this.isRefreshing) {
87
+ if (refreshToken == null && this.refreshRoute == null) {
88
88
  return;
89
89
  }
90
90
  try {
91
- this.isRefreshing = true;
92
- const authMaterial = yield this.refreshAuthMaterial(refreshToken);
91
+ if (this.refreshPromise == null) {
92
+ this.refreshPromise = this.refreshAuthMaterial(refreshToken);
93
+ }
94
+ const authMaterial = yield this.refreshPromise;
93
95
  if (this.refreshRoute == null) {
94
96
  this.storeAuthMaterial(authMaterial);
95
97
  }
@@ -99,7 +101,7 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
99
101
  console.error(error);
100
102
  this.logout();
101
103
  } finally {
102
- this.isRefreshing = false;
104
+ this.refreshPromise = null;
103
105
  }
104
106
  });
105
107
  }
@@ -169,14 +171,14 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
169
171
  try {
170
172
  const queryParams = new URLSearchParams({
171
173
  signinAuthenticationMethod: "farcaster",
172
- callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`
174
+ callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback`
173
175
  });
174
176
  const response = yield this.apiClient.post(`${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
175
177
  headers: { "Content-Type": "application/json" },
176
178
  body: JSON.stringify(_chunkF45I5NLIcjs.__spreadProps.call(void 0, _chunkF45I5NLIcjs.__spreadValues.call(void 0, {}, data), {
177
179
  domain: data.signatureParams.domain,
178
180
  redirect: true,
179
- callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`
181
+ callbackUrl: `${this.apiClient.baseUrl}/${_commonsdkauth.AUTH_SDK_ROOT_ENDPOINT}/callback`
180
182
  }))
181
183
  });
182
184
  if (!response.ok) {
@@ -267,4 +269,4 @@ var CrossmintAuthClient = class _CrossmintAuthClient extends _commonsdkauth.Cros
267
269
 
268
270
 
269
271
  exports.CrossmintAuthClient = CrossmintAuthClient;
270
- //# sourceMappingURL=chunk-M4V2KE2Y.cjs.map
272
+ //# sourceMappingURL=chunk-WQOH66RU.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../src/CrossmintAuthClient.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,iBAAuD;AAK3D,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAI,gBAAgB,QAAQ,KAAK,gBAAgB,MAAM;AACnD;AAAA,MACJ;AAEA,UAAI;AAEA,YAAI,KAAK,kBAAkB,MAAM;AAC7B,eAAK,iBAAiB,KAAK,oBAAoB,YAAY;AAAA,QAC/D;AACA,cAAM,eAAe,MAAM,KAAK;AAGhC,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,iBAAiB;AAAA,MAC1B;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ","sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private refreshPromise: Promise<AuthMaterialWithUser> | null = null;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if (refreshToken == null && this.refreshRoute == null) {\n return;\n }\n\n try {\n // Create new refresh promise if none exists\n if (this.refreshPromise == null) {\n this.refreshPromise = this.refreshAuthMaterial(refreshToken);\n }\n const authMaterial = await this.refreshPromise;\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.refreshPromise = null;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"]}
package/dist/index.cjs CHANGED
@@ -1,6 +1,6 @@
1
1
  "use strict";Object.defineProperty(exports, "__esModule", {value: true});
2
2
 
3
- var _chunkM4V2KE2Ycjs = require('./chunk-M4V2KE2Y.cjs');
3
+ var _chunkWQOH66RUcjs = require('./chunk-WQOH66RU.cjs');
4
4
  require('./chunk-VQ3HTIQ3.cjs');
5
5
 
6
6
 
@@ -25,5 +25,5 @@ var _commonsdkbase = require('@crossmint/common-sdk-base');
25
25
 
26
26
 
27
27
 
28
- exports.CrossmintAuth = _chunkM4V2KE2Ycjs.CrossmintAuthClient; exports.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS = _chunkTIUX4OOQcjs.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS; exports.createCrossmint = _commonsdkbase.createCrossmint; exports.deleteCookie = _chunkBGMXXFQ4cjs.deleteCookie; exports.getCookie = _chunkBGMXXFQ4cjs.getCookie; exports.getJWTExpiration = _chunkQY4RIGNMcjs.getJWTExpiration; exports.setCookie = _chunkBGMXXFQ4cjs.setCookie;
28
+ exports.CrossmintAuth = _chunkWQOH66RUcjs.CrossmintAuthClient; exports.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS = _chunkTIUX4OOQcjs.TIME_BEFORE_EXPIRING_JWT_IN_SECONDS; exports.createCrossmint = _commonsdkbase.createCrossmint; exports.deleteCookie = _chunkBGMXXFQ4cjs.deleteCookie; exports.getCookie = _chunkBGMXXFQ4cjs.getCookie; exports.getJWTExpiration = _chunkQY4RIGNMcjs.getJWTExpiration; exports.setCookie = _chunkBGMXXFQ4cjs.setCookie;
29
29
  //# sourceMappingURL=index.cjs.map
package/dist/index.js CHANGED
@@ -1,6 +1,6 @@
1
1
  import {
2
2
  CrossmintAuthClient
3
- } from "./chunk-5H2QWRZD.js";
3
+ } from "./chunk-5KJPKQDF.js";
4
4
  import "./chunk-TOXKCKTY.js";
5
5
  import {
6
6
  TIME_BEFORE_EXPIRING_JWT_IN_SECONDS
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@crossmint/client-sdk-auth",
3
- "version": "1.1.0",
3
+ "version": "1.1.1",
4
4
  "repository": "https://github.com/Crossmint/crossmint-sdk",
5
5
  "license": "Apache-2.0",
6
6
  "author": "Paella Labs Inc",
@@ -28,6 +28,6 @@
28
28
  "scripts": {
29
29
  "build": "tsup",
30
30
  "dev": "tsup --watch",
31
- "test": "vitest run"
31
+ "test:vitest": "vitest run"
32
32
  }
33
33
  }
@@ -53,6 +53,7 @@ describe("CrossmintAuthClient", () => {
53
53
  const mockUserData = { id: "user123", email: "user@example.com" };
54
54
  mockApiClient.get.mockResolvedValue({
55
55
  json: () => Promise.resolve(mockUserData),
56
+ ok: true,
56
57
  });
57
58
 
58
59
  const result = await crossmintAuthClient.getUser();
@@ -145,6 +146,7 @@ describe("CrossmintAuthClient", () => {
145
146
  vi.spyOn(crossmintAuthClient as any, "storeAuthMaterial").mockImplementation(() => {});
146
147
  vi.mocked(getJWTExpiration).mockReturnValue(Date.now() / 1000 + 3600); // 1 hour from now
147
148
  vi.mocked(queueTask).mockReturnValue({ cancel: vi.fn() } as any);
149
+ (crossmintAuthClient as any).refreshPromise = null;
148
150
  });
149
151
 
150
152
  it("should refresh auth material and schedule next refresh", async () => {
@@ -161,11 +163,13 @@ describe("CrossmintAuthClient", () => {
161
163
  expect(queueTask).toHaveBeenCalledWith(expect.any(Function), expect.any(Number));
162
164
  });
163
165
 
164
- it("should not refresh if already refreshing", async () => {
165
- (crossmintAuthClient as any).isRefreshing = true;
166
- await crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
166
+ it("should not refresh when called twice in a row", async () => {
167
+ const promise1 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
168
+ const promise2 = crossmintAuthClient.handleRefreshAuthMaterial(mockRefreshToken);
167
169
 
168
- expect(crossmintAuthClient["refreshAuthMaterial"]).not.toHaveBeenCalled();
170
+ await Promise.all([promise1, promise2]);
171
+
172
+ expect(crossmintAuthClient["refreshAuthMaterial"]).toHaveBeenCalledTimes(1);
169
173
  });
170
174
 
171
175
  it("should call onTokenRefresh callback if provided", async () => {
@@ -249,6 +253,7 @@ describe("CrossmintAuthClient", () => {
249
253
  const mockOAuthUrl = "https://oauth.example.com/auth";
250
254
  mockApiClient.get.mockResolvedValue({
251
255
  json: () => Promise.resolve({ oauthUrl: mockOAuthUrl }),
256
+ ok: true,
252
257
  });
253
258
 
254
259
  const result = await crossmintAuthClient.getOAuthUrl(mockProvider);
@@ -267,6 +272,7 @@ describe("CrossmintAuthClient", () => {
267
272
  const mockResponse = { success: true };
268
273
  mockApiClient.post.mockResolvedValue({
269
274
  json: () => Promise.resolve(mockResponse),
275
+ ok: true,
270
276
  });
271
277
 
272
278
  const result = await crossmintAuthClient.sendEmailOtp(mockEmail);
@@ -288,7 +294,8 @@ describe("CrossmintAuthClient", () => {
288
294
  const mockToken = "otp-token-456";
289
295
  const mockOneTimeSecret = "one-time-secret-789";
290
296
  mockApiClient.post.mockResolvedValue({
291
- json: () => Promise.resolve({ callbackUrl: `https://example.com?oneTimeSecret=${mockOneTimeSecret}` }),
297
+ json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
298
+ ok: true,
292
299
  });
293
300
 
294
301
  const result = await crossmintAuthClient.confirmEmailOtp(mockEmail, mockEmailId, mockToken);
@@ -310,13 +317,14 @@ describe("CrossmintAuthClient", () => {
310
317
  };
311
318
  const mockOneTimeSecret = "farcaster-one-time-secret-123";
312
319
  mockApiClient.post.mockResolvedValue({
313
- json: () => Promise.resolve({ callbackUrl: `https://example.com?oneTimeSecret=${mockOneTimeSecret}` }),
320
+ json: () => Promise.resolve({ oneTimeSecret: mockOneTimeSecret }),
321
+ ok: true,
314
322
  });
315
323
 
316
324
  const result = await crossmintAuthClient.signInWithFarcaster(mockFarcasterData as StatusAPIResponse);
317
325
 
318
326
  expect(result).toBe(mockOneTimeSecret);
319
- const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback?isPopup=false`;
327
+ const expectedCallbackUrl = `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/callback`;
320
328
  const queryParams = new URLSearchParams({
321
329
  signinAuthenticationMethod: "farcaster",
322
330
  callbackUrl: expectedCallbackUrl,
@@ -347,6 +355,7 @@ describe("CrossmintAuthClient", () => {
347
355
  };
348
356
  mockApiClient.post.mockResolvedValue({
349
357
  json: () => Promise.resolve(mockResponse),
358
+ ok: true,
350
359
  });
351
360
 
352
361
  const result = await crossmintAuthClient.signInWithSmartWallet(mockAddress);
@@ -356,7 +365,7 @@ describe("CrossmintAuthClient", () => {
356
365
  signinAuthenticationMethod: "evm",
357
366
  });
358
367
  expect(mockApiClient.post).toHaveBeenCalledWith(
359
- `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate/start?${queryParams}`,
368
+ `api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate/start?${queryParams}`,
360
369
  expect.objectContaining({
361
370
  body: JSON.stringify({ walletAddress: mockAddress }),
362
371
  headers: {
@@ -380,6 +389,7 @@ describe("CrossmintAuthClient", () => {
380
389
  };
381
390
  mockApiClient.post.mockResolvedValue({
382
391
  json: () => Promise.resolve(mockResponse),
392
+ ok: true,
383
393
  });
384
394
 
385
395
  const result = await crossmintAuthClient.authenticateSmartWallet(mockAddress, mockSignature);
@@ -387,7 +397,6 @@ describe("CrossmintAuthClient", () => {
387
397
  expect(result).toEqual(mockResponse);
388
398
  const queryParams = new URLSearchParams({
389
399
  signinAuthenticationMethod: "evm",
390
- callbackUrl: `https://api.crossmint.com/api/2024-09-26/session/sdk/auth/we-dont-actually-use-this-anymore`,
391
400
  });
392
401
  expect(mockApiClient.post).toHaveBeenCalledWith(
393
402
  `api/2024-09-26/session/sdk/auth/crypto_wallets/authenticate?${queryParams}`,
@@ -22,7 +22,7 @@ type CrossmintAuthClientConfig = CrossmintAuthOptions & {
22
22
  export class CrossmintAuthClient extends CrossmintAuth {
23
23
  private callbacks: CrossmintAuthClientCallbacks;
24
24
  private refreshTask: CancellableTask | null = null;
25
- private isRefreshing = false;
25
+ private refreshPromise: Promise<AuthMaterialWithUser> | null = null;
26
26
  private logoutRoute: string | null;
27
27
 
28
28
  private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {
@@ -85,13 +85,16 @@ export class CrossmintAuthClient extends CrossmintAuth {
85
85
  public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {
86
86
  const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);
87
87
  // If there is a custom refresh route, that endpoint will fetch the cookies itself
88
- if ((refreshToken == null && this.refreshRoute == null) || this.isRefreshing) {
88
+ if (refreshToken == null && this.refreshRoute == null) {
89
89
  return;
90
90
  }
91
91
 
92
92
  try {
93
- this.isRefreshing = true;
94
- const authMaterial = await this.refreshAuthMaterial(refreshToken);
93
+ // Create new refresh promise if none exists
94
+ if (this.refreshPromise == null) {
95
+ this.refreshPromise = this.refreshAuthMaterial(refreshToken);
96
+ }
97
+ const authMaterial = await this.refreshPromise;
95
98
 
96
99
  // If a custom refresh route is set, storing in cookies is handled in the server
97
100
  if (this.refreshRoute == null) {
@@ -105,7 +108,7 @@ export class CrossmintAuthClient extends CrossmintAuth {
105
108
  console.error(error);
106
109
  this.logout();
107
110
  } finally {
108
- this.isRefreshing = false;
111
+ this.refreshPromise = null;
109
112
  }
110
113
  }
111
114
 
@@ -178,7 +181,7 @@ export class CrossmintAuthClient extends CrossmintAuth {
178
181
  try {
179
182
  const queryParams = new URLSearchParams({
180
183
  signinAuthenticationMethod: "farcaster",
181
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,
184
+ callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
182
185
  });
183
186
 
184
187
  const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {
@@ -187,7 +190,7 @@ export class CrossmintAuthClient extends CrossmintAuth {
187
190
  ...data,
188
191
  domain: data.signatureParams.domain,
189
192
  redirect: true,
190
- callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,
193
+ callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback`,
191
194
  }),
192
195
  });
193
196
 
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../src/CrossmintAuthClient.ts"],"sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private isRefreshing = false;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if ((refreshToken == null && this.refreshRoute == null) || this.isRefreshing) {\n return;\n }\n\n try {\n this.isRefreshing = true;\n const authMaterial = await this.refreshAuthMaterial(refreshToken);\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.isRefreshing = false;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,eAAe;AAKnB,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAK,gBAAgB,QAAQ,KAAK,gBAAgB,QAAS,KAAK,cAAc;AAC1E;AAAA,MACJ;AAEA,UAAI;AACA,aAAK,eAAe;AACpB,cAAM,eAAe,MAAM,KAAK,oBAAoB,YAAY;AAGhE,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,eAAe;AAAA,MACxB;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ;","names":[]}
@@ -1 +0,0 @@
1
- {"version":3,"sources":["../src/CrossmintAuthClient.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;AACA;AAAA,EACI;AAAA,EAEA;AAAA,EACA;AAAA,EACA;AAAA,EAGA;AAAA,EACA;AAAA,OACG;AAEP,SAA+B,iBAAiB;AAQzC,IAAM,sBAAN,MAAM,6BAA4B,cAAc;AAAA,EAM3C,YAAY,WAAsB,WAA+B,SAAoC,CAAC,GAAG;AA3BrH;AA4BQ,UAAM,WAAW,WAAW,MAAM;AALtC,SAAQ,cAAsC;AAC9C,SAAQ,eAAe;AAKnB,SAAK,aAAY,YAAO,cAAP,YAAoB,CAAC;AACtC,SAAK,eAAc,YAAO,gBAAP,YAAsB;AAAA,EAC7C;AAAA,EAEA,OAAc,KAAK,WAAsB,SAAoC,CAAC,GAAwB;AAClG,UAAM,aAAa,IAAI,qBAAoB,WAAW,cAAc,iBAAiB,SAAS,GAAG,MAAM;AAEvG,QAAI,OAAO,WAAW,aAAa;AAC/B,iBAAW,0BAA0B;AAAA,IACzC;AACA,WAAO;AAAA,EACX;AAAA,EAEa,UAAU;AAAA;AACnB,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,OAAO,qBAAqB,kBAAkB;AAAA,UACpF,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,yBAAyB,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACrF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEO,kBAAkB,cAAoC;AACzD,cAAU,gBAAgB,aAAa,GAAG;AAC1C,cAAU,sBAAsB,aAAa,aAAa,QAAQ,aAAa,aAAa,SAAS;AAAA,EACzG;AAAA,EAEa,SAAS;AAAA;AAjE1B;AAmEQ,YAAM,kBAAkB,UAAU,oBAAoB;AAGtD,mBAAa,oBAAoB;AACjC,mBAAa,cAAc;AAC3B,uBAAK,WAAU,aAAf;AACA,UAAI;AACA,YAAI,KAAK,eAAe,MAAM;AAC1B,gBAAM,KAAK,sBAAsB;AAAA,QACrC,WAAW,mBAAmB,MAAM;AAChC,gBAAM,KAAK,uBAAuB,eAAe;AAAA,QACrD;AAAA,MACJ,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AAAA,MACvB;AAAA,IACJ;AAAA;AAAA,EAEa,0BAA0B,oBAA4C;AAAA;AApFvF;AAqFQ,YAAM,eAAe,kDAAsB,UAAU,oBAAoB;AAEzE,UAAK,gBAAgB,QAAQ,KAAK,gBAAgB,QAAS,KAAK,cAAc;AAC1E;AAAA,MACJ;AAEA,UAAI;AACA,aAAK,eAAe;AACpB,cAAM,eAAe,MAAM,KAAK,oBAAoB,YAAY;AAGhE,YAAI,KAAK,gBAAgB,MAAM;AAC3B,eAAK,kBAAkB,YAAY;AAAA,QACvC;AAEA,yBAAK,WAAU,mBAAf,4BAAgC;AAEhC,aAAK,oBAAoB,aAAa,GAAG;AAAA,MAC7C,SAAS,OAAO;AACZ,gBAAQ,MAAM,KAAK;AACnB,aAAK,OAAO;AAAA,MAChB,UAAE;AACE,aAAK,eAAe;AAAA,MACxB;AAAA,IACJ;AAAA;AAAA,EAEa,YAAY,UAAyB;AAAA;AAC9C,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,IAAI,GAAG,sBAAsB,WAAW,QAAQ,UAAU;AAAA,UAC5F,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,OAAO,MAAM,SAAS,KAAK;AACjC,eAAO,KAAK;AAAA,MAChB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,QAAQ,KAAK,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjH;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,aAAa,OAAe;AAAA;AACrC,UAAI;AACA,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,cAAc;AAAA,UAC9E,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,EAAE,MAAM,CAAC;AAAA,QAClC,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,6BAA6B,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACzF;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,gBAAgB,OAAe,SAAiB,OAAe;AAAA;AACxE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC;AAAA,UACA,4BAA4B;AAAA,UAC5B;AAAA,UACA,QAAQ;AAAA,UACR,OAAO;AAAA,QACX,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,QAClD,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,gCAAgC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QAC5F;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,oBAAoB,MAAqB;AAAA;AAClD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB;AAAA,UACpC,4BAA4B;AAAA,UAC5B,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,QACpE,CAAC;AAED,cAAM,WAAW,MAAM,KAAK,UAAU,KAAK,GAAG,sBAAsB,iBAAiB,WAAW,IAAI;AAAA,UAChG,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,UAC9C,MAAM,KAAK,UAAU,iCACd,OADc;AAAA,YAEjB,QAAQ,KAAK,gBAAgB;AAAA,YAC7B,UAAU;AAAA,YACV,aAAa,GAAG,KAAK,UAAU,OAAO,IAAI,sBAAsB;AAAA,UACpE,EAAC;AAAA,QACL,CAAC;AAED,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,cAAM,UAAU,MAAM,SAAS,KAAK;AACpC,eAAO,QAAQ;AAAA,MACnB,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,qCAAqC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACjG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,sBAAsB,SAAiB;AAAA;AAChD,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,sCAAsC,WAAW;AAAA,UAC1E;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,QAAQ,CAAC;AAAA,UACnD;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,4CAA4C,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACxG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEa,wBAAwB,SAAiB,WAAmB;AAAA;AACrE,UAAI;AACA,cAAM,cAAc,IAAI,gBAAgB,EAAE,4BAA4B,MAAM,CAAC;AAC7E,cAAM,WAAW,MAAM,KAAK,UAAU;AAAA,UAClC,GAAG,sBAAsB,gCAAgC,WAAW;AAAA,UACpE;AAAA,YACI,SAAS,EAAE,gBAAgB,mBAAmB;AAAA,YAC9C,MAAM,KAAK,UAAU,EAAE,eAAe,SAAS,UAAU,CAAC;AAAA,UAC9D;AAAA,QACJ;AAEA,YAAI,CAAC,SAAS,IAAI;AACd,gBAAM,MAAM,SAAS,KAAK;AAAA,QAC9B;AAEA,eAAO,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,OAAO;AACZ,cAAM,IAAI;AAAA,UACN,wCAAwC,iBAAiB,QAAQ,MAAM,UAAU,eAAe;AAAA,QACpG;AAAA,MACJ;AAAA,IACJ;AAAA;AAAA,EAEc,wBAA2C;AAAA;AACrD,UAAI,CAAC,KAAK,aAAa;AACnB,cAAM,IAAI,MAAM,gCAAgC;AAAA,MACpD;AAEA,aAAO,MAAM,MAAM,KAAK,aAAa,EAAE,QAAQ,OAAO,CAAC;AAAA,IAC3D;AAAA;AAAA,EAEQ,oBAAoB,KAAmB;AAC3C,UAAM,gBAAgB,iBAAiB,GAAG;AAC1C,QAAI,CAAC,eAAe;AAChB,YAAM,IAAI,MAAM,aAAa;AAAA,IACjC;AAEA,UAAM,cAAc,KAAK,IAAI,IAAI;AACjC,UAAM,eAAe,gBAAgB,cAAc;AAEnD,QAAI,eAAe,GAAG;AAClB,YAAM,UAAU,KAAK,IAAI,IAAI,eAAe;AAC5C,WAAK,uBAAuB;AAC5B,WAAK,cAAc,UAAU,MAAM,KAAK,0BAA0B,GAAG,OAAO;AAAA,IAChF;AAAA,EACJ;AAAA,EAEQ,yBAA+B;AACnC,QAAI,KAAK,aAAa;AAClB,WAAK,YAAY,OAAO;AACxB,WAAK,cAAc;AAAA,IACvB;AAAA,EACJ;AACJ","sourcesContent":["import type { UseSignInData } from \"@farcaster/auth-kit\";\nimport {\n AUTH_SDK_ROOT_ENDPOINT,\n type AuthMaterialWithUser,\n CROSSMINT_API_VERSION,\n CrossmintAuth,\n CrossmintAuthenticationError,\n type CrossmintAuthOptions,\n type OAuthProvider,\n REFRESH_TOKEN_PREFIX,\n SESSION_PREFIX,\n} from \"@crossmint/common-sdk-auth\";\nimport type { Crossmint, CrossmintApiClient } from \"@crossmint/common-sdk-base\";\nimport { type CancellableTask, queueTask } from \"@crossmint/client-sdk-base\";\nimport { deleteCookie, getCookie, getJWTExpiration, setCookie, TIME_BEFORE_EXPIRING_JWT_IN_SECONDS } from \"./utils\";\n\ntype CrossmintAuthClientConfig = CrossmintAuthOptions & {\n callbacks?: CrossmintAuthClientCallbacks;\n logoutRoute?: string;\n};\n\nexport class CrossmintAuthClient extends CrossmintAuth {\n private callbacks: CrossmintAuthClientCallbacks;\n private refreshTask: CancellableTask | null = null;\n private isRefreshing = false;\n private logoutRoute: string | null;\n\n private constructor(crossmint: Crossmint, apiClient: CrossmintApiClient, config: CrossmintAuthClientConfig = {}) {\n super(crossmint, apiClient, config);\n this.callbacks = config.callbacks ?? {};\n this.logoutRoute = config.logoutRoute ?? null;\n }\n\n public static from(crossmint: Crossmint, config: CrossmintAuthClientConfig = {}): CrossmintAuthClient {\n const authClient = new CrossmintAuthClient(crossmint, CrossmintAuth.defaultApiClient(crossmint), config);\n // In case an instance is created on the server, we can't refresh as this stores cookies\n if (typeof window !== \"undefined\") {\n authClient.handleRefreshAuthMaterial();\n }\n return authClient;\n }\n\n public async getUser() {\n try {\n const response = await this.apiClient.get(`api/${CROSSMINT_API_VERSION}/sdk/auth/user`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to fetch user: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public storeAuthMaterial(authMaterial: AuthMaterialWithUser) {\n setCookie(SESSION_PREFIX, authMaterial.jwt);\n setCookie(REFRESH_TOKEN_PREFIX, authMaterial.refreshToken.secret, authMaterial.refreshToken.expiresAt);\n }\n\n public async logout() {\n // Store the old refresh token to pass it to the logout route before deleting the cookies\n const oldRefreshToken = getCookie(REFRESH_TOKEN_PREFIX);\n\n // Even if there's a server error, we want to clear the cookies and we do it first to load faster\n deleteCookie(REFRESH_TOKEN_PREFIX);\n deleteCookie(SESSION_PREFIX);\n this.callbacks.onLogout?.();\n try {\n if (this.logoutRoute != null) {\n await this.logoutFromCustomRoute();\n } else if (oldRefreshToken != null) {\n await this.logoutFromDefaultRoute(oldRefreshToken);\n }\n } catch (error) {\n console.error(error);\n }\n }\n\n public async handleRefreshAuthMaterial(refreshTokenSecret?: string): Promise<void> {\n const refreshToken = refreshTokenSecret ?? getCookie(REFRESH_TOKEN_PREFIX);\n // If there is a custom refresh route, that endpoint will fetch the cookies itself\n if ((refreshToken == null && this.refreshRoute == null) || this.isRefreshing) {\n return;\n }\n\n try {\n this.isRefreshing = true;\n const authMaterial = await this.refreshAuthMaterial(refreshToken);\n\n // If a custom refresh route is set, storing in cookies is handled in the server\n if (this.refreshRoute == null) {\n this.storeAuthMaterial(authMaterial);\n }\n\n this.callbacks.onTokenRefresh?.(authMaterial);\n\n this.scheduleNextRefresh(authMaterial.jwt);\n } catch (error) {\n console.error(error);\n this.logout();\n } finally {\n this.isRefreshing = false;\n }\n }\n\n public async getOAuthUrl(provider: OAuthProvider) {\n try {\n const response = await this.apiClient.get(`${AUTH_SDK_ROOT_ENDPOINT}/social/${provider}/start`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const data = await response.json();\n return data.oauthUrl;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to get OAuth URL for provider ${provider}: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async sendEmailOtp(email: string) {\n try {\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/otps/send`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ email }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to send email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async confirmEmailOtp(email: string, emailId: string, token: string) {\n try {\n const queryParams = new URLSearchParams({\n email,\n signinAuthenticationMethod: \"email\",\n token,\n locale: \"en\",\n state: emailId,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to confirm email OTP: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithFarcaster(data: UseSignInData) {\n try {\n const queryParams = new URLSearchParams({\n signinAuthenticationMethod: \"farcaster\",\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n });\n\n const response = await this.apiClient.post(`${AUTH_SDK_ROOT_ENDPOINT}/authenticate?${queryParams}`, {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({\n ...data,\n domain: data.signatureParams.domain,\n redirect: true,\n callbackUrl: `${this.apiClient.baseUrl}/${AUTH_SDK_ROOT_ENDPOINT}/callback?isPopup=false`,\n }),\n });\n\n if (!response.ok) {\n throw await response.text();\n }\n\n const resData = await response.json();\n return resData.oneTimeSecret;\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to sign in with Farcaster: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async signInWithSmartWallet(address: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate/start?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to initiate smart wallet sign in: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n public async authenticateSmartWallet(address: string, signature: string) {\n try {\n const queryParams = new URLSearchParams({ signinAuthenticationMethod: \"evm\" });\n const response = await this.apiClient.post(\n `${AUTH_SDK_ROOT_ENDPOINT}/crypto_wallets/authenticate?${queryParams}`,\n {\n headers: { \"Content-Type\": \"application/json\" },\n body: JSON.stringify({ walletAddress: address, signature }),\n }\n );\n\n if (!response.ok) {\n throw await response.text();\n }\n\n return await response.json();\n } catch (error) {\n throw new CrossmintAuthenticationError(\n `Failed to authenticate smart wallet: ${error instanceof Error ? error.message : \"Unknown error\"}`\n );\n }\n }\n\n private async logoutFromCustomRoute(): Promise<Response> {\n if (!this.logoutRoute) {\n throw new Error(\"Custom logout route is not set\");\n }\n\n return await fetch(this.logoutRoute, { method: \"POST\" });\n }\n\n private scheduleNextRefresh(jwt: string): void {\n const jwtExpiration = getJWTExpiration(jwt);\n if (!jwtExpiration) {\n throw new Error(\"Invalid JWT\");\n }\n\n const currentTime = Date.now() / 1000;\n const timeToExpire = jwtExpiration - currentTime - TIME_BEFORE_EXPIRING_JWT_IN_SECONDS;\n\n if (timeToExpire > 0) {\n const endTime = Date.now() + timeToExpire * 1000;\n this.cancelScheduledRefresh();\n this.refreshTask = queueTask(() => this.handleRefreshAuthMaterial(), endTime);\n }\n }\n\n private cancelScheduledRefresh(): void {\n if (this.refreshTask) {\n this.refreshTask.cancel();\n this.refreshTask = null;\n }\n }\n}\n\ntype CrossmintAuthClientCallbacks = {\n onTokenRefresh?: (authMaterial: AuthMaterialWithUser) => void;\n onLogout?: () => void;\n};\n"]}