@hemia/auth-sdk 0.0.12 → 0.0.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -143,7 +143,8 @@ let AuthService = class AuthService {
143
143
  state: state,
144
144
  code_challenge: codeChallenge,
145
145
  code_challenge_method: 'S256',
146
- auto: auto
146
+ auto: auto,
147
+ aud: this.config.aud || ''
147
148
  });
148
149
  const loginUrl = `${this.config.ssoBaseUrl}${this.config.ssoAuthUrl}?${params.toString()}`;
149
150
  const tempState = {
@@ -262,7 +263,10 @@ let AuthService = class AuthService {
262
263
  }
263
264
  }
264
265
  try {
265
- const verify = this.jwtManager.verify(session.accessToken);
266
+ const verify = this.jwtManager.verify(session.accessToken, this.config.clientSecret, {
267
+ issuer: this.config.iss,
268
+ audience: this.config.aud
269
+ });
266
270
  if (!verify) {
267
271
  throw new SessionInvalidError();
268
272
  }
@@ -272,23 +276,23 @@ let AuthService = class AuthService {
272
276
  }
273
277
  const claimsId = this.jwtManager.decode(session.idToken, true);
274
278
  return {
275
- aud: claimsAccess.aud,
276
- iss: claimsAccess.iss || '',
277
- exp: claimsAccess.exp || 0,
278
- iat: claimsAccess.iat || 0,
279
- sub: claimsAccess.sub || '',
279
+ aud: claimsAccess.payload.aud,
280
+ iss: claimsAccess.payload.iss || '',
281
+ exp: claimsAccess.payload.exp || 0,
282
+ iat: claimsAccess.payload.iat || 0,
283
+ sub: claimsAccess.payload.sub || '',
280
284
  user: {
281
- id: claimsId?.sub || '',
282
- name: claimsId?.name || '',
283
- email: claimsId?.email || '',
284
- given_name: claimsId?.given_name,
285
- family_name: claimsId?.family_name,
286
- picture: claimsId?.picture
285
+ id: claimsId.payload.sub || '',
286
+ name: claimsId.payload.name || '',
287
+ email: claimsId.payload.email || '',
288
+ given_name: claimsId.payload.given_name,
289
+ family_name: claimsId.payload.family_name,
290
+ picture: claimsId.payload?.picture
287
291
  },
288
- permissions: claimsAccess.permissions,
292
+ permissions: claimsAccess.payload.permissions,
289
293
  context: {
290
- ...claimsAccess['https://hemia.mx/context'],
291
- ...claimsId?.['https://hemia.mx/context']
294
+ ...claimsAccess.payload['https://hemia.mx/context'],
295
+ ...claimsId.payload['https://hemia.mx/context']
292
296
  }
293
297
  };
294
298
  }
@@ -350,7 +354,8 @@ let AuthService = class AuthService {
350
354
  clientId: this.config.clientId,
351
355
  clientSecret: this.config.clientSecret,
352
356
  refreshToken: session.refreshToken,
353
- sessionId: session.sessionId
357
+ sessionId: session.sessionId,
358
+ aud: this.config.aud || ''
354
359
  });
355
360
  if (response.status !== 200) {
356
361
  throw new CustomHttpError('Token refresh failed', response.status, 'token_refresh_failed');
@@ -443,10 +448,6 @@ let AuthSDKController = class AuthSDKController {
443
448
  }
444
449
  async me(req, res) {
445
450
  const sessionId = req.cookies[this.COOKIE_NAME];
446
- console.log(`🔍 [App Cookie Name]: ${this.COOKIE_NAME}`);
447
- console.log('🔍 [App Port]:', req.headers.origin || 'unknown');
448
- console.log('🔍 [SessionId]:', sessionId);
449
- console.log('🔍 [All Cookies]:', req.cookies);
450
451
  if (!sessionId) {
451
452
  return res.status(401).json({
452
453
  success: false,
@@ -145,7 +145,8 @@ exports.AuthService = class AuthService {
145
145
  state: state,
146
146
  code_challenge: codeChallenge,
147
147
  code_challenge_method: 'S256',
148
- auto: auto
148
+ auto: auto,
149
+ aud: this.config.aud || ''
149
150
  });
150
151
  const loginUrl = `${this.config.ssoBaseUrl}${this.config.ssoAuthUrl}?${params.toString()}`;
151
152
  const tempState = {
@@ -264,7 +265,10 @@ exports.AuthService = class AuthService {
264
265
  }
265
266
  }
266
267
  try {
267
- const verify = this.jwtManager.verify(session.accessToken);
268
+ const verify = this.jwtManager.verify(session.accessToken, this.config.clientSecret, {
269
+ issuer: this.config.iss,
270
+ audience: this.config.aud
271
+ });
268
272
  if (!verify) {
269
273
  throw new SessionInvalidError();
270
274
  }
@@ -274,23 +278,23 @@ exports.AuthService = class AuthService {
274
278
  }
275
279
  const claimsId = this.jwtManager.decode(session.idToken, true);
276
280
  return {
277
- aud: claimsAccess.aud,
278
- iss: claimsAccess.iss || '',
279
- exp: claimsAccess.exp || 0,
280
- iat: claimsAccess.iat || 0,
281
- sub: claimsAccess.sub || '',
281
+ aud: claimsAccess.payload.aud,
282
+ iss: claimsAccess.payload.iss || '',
283
+ exp: claimsAccess.payload.exp || 0,
284
+ iat: claimsAccess.payload.iat || 0,
285
+ sub: claimsAccess.payload.sub || '',
282
286
  user: {
283
- id: claimsId?.sub || '',
284
- name: claimsId?.name || '',
285
- email: claimsId?.email || '',
286
- given_name: claimsId?.given_name,
287
- family_name: claimsId?.family_name,
288
- picture: claimsId?.picture
287
+ id: claimsId.payload.sub || '',
288
+ name: claimsId.payload.name || '',
289
+ email: claimsId.payload.email || '',
290
+ given_name: claimsId.payload.given_name,
291
+ family_name: claimsId.payload.family_name,
292
+ picture: claimsId.payload?.picture
289
293
  },
290
- permissions: claimsAccess.permissions,
294
+ permissions: claimsAccess.payload.permissions,
291
295
  context: {
292
- ...claimsAccess['https://hemia.mx/context'],
293
- ...claimsId?.['https://hemia.mx/context']
296
+ ...claimsAccess.payload['https://hemia.mx/context'],
297
+ ...claimsId.payload['https://hemia.mx/context']
294
298
  }
295
299
  };
296
300
  }
@@ -352,7 +356,8 @@ exports.AuthService = class AuthService {
352
356
  clientId: this.config.clientId,
353
357
  clientSecret: this.config.clientSecret,
354
358
  refreshToken: session.refreshToken,
355
- sessionId: session.sessionId
359
+ sessionId: session.sessionId,
360
+ aud: this.config.aud || ''
356
361
  });
357
362
  if (response.status !== 200) {
358
363
  throw new common.CustomHttpError('Token refresh failed', response.status, 'token_refresh_failed');
@@ -445,10 +450,6 @@ exports.AuthSDKController = class AuthSDKController {
445
450
  }
446
451
  async me(req, res) {
447
452
  const sessionId = req.cookies[this.COOKIE_NAME];
448
- console.log(`🔍 [App Cookie Name]: ${this.COOKIE_NAME}`);
449
- console.log('🔍 [App Port]:', req.headers.origin || 'unknown');
450
- console.log('🔍 [SessionId]:', sessionId);
451
- console.log('🔍 [All Cookies]:', req.cookies);
452
453
  if (!sessionId) {
453
454
  return res.status(401).json({
454
455
  success: false,
@@ -9,4 +9,6 @@ export interface IAuthConfig {
9
9
  uiBaseUrl?: string;
10
10
  cookieDomain?: string;
11
11
  isProduction: boolean;
12
+ iss?: string;
13
+ aud?: string;
12
14
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@hemia/auth-sdk",
3
- "version": "0.0.12",
3
+ "version": "0.0.14",
4
4
  "description": "Hemia SDK for authentication",
5
5
  "main": "dist/hemia-auth-sdk.js",
6
6
  "module": "dist/hemia-auth-sdk.esm.js",
@@ -16,8 +16,8 @@
16
16
  },
17
17
  "devDependencies": {
18
18
  "@hemia/cache-manager": "^0.0.5",
19
- "@hemia/common": "^0.0.12",
20
- "@hemia/jwt-manager": "^0.0.4",
19
+ "@hemia/common": "^0.0.15",
20
+ "@hemia/jwt-manager": "^0.0.6",
21
21
  "@hemia/network-services": "^0.0.3",
22
22
  "@rollup/plugin-commonjs": "^26.0.1",
23
23
  "@rollup/plugin-json": "^6.1.0",
@@ -44,8 +44,8 @@
44
44
  ],
45
45
  "peerDependencies": {
46
46
  "@hemia/cache-manager": "^0.0.5",
47
- "@hemia/common": "^0.0.12",
48
- "@hemia/jwt-manager": "^0.0.5",
47
+ "@hemia/common": "^0.0.15",
48
+ "@hemia/jwt-manager": "^0.0.6",
49
49
  "@hemia/network-services": "^0.0.3",
50
50
  "inversify": "^7.11.0",
51
51
  "reflect-metadata": "^0.2.2"