@insforge/nextjs 1.0.2-dev.1 → 1.0.2-dev.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,63 +1,43 @@
1
1
  import { NextResponse } from "next/server";
2
2
  import { createClient } from "@insforge/sdk";
3
+ import {
4
+ COOKIE_NAMES,
5
+ COOKIE_DEFAULTS,
6
+ getBaseCookieOptions,
7
+ getClearCookieOptions,
8
+ serializeUserCookie
9
+ } from "../lib/cookies";
3
10
  function createAuthRouteHandlers(config) {
4
- const {
5
- baseUrl,
6
- cookieMaxAge = 7 * 24 * 60 * 60
7
- // 7 days
8
- } = config;
9
- const sessionCookieName = "insforge-session";
10
- const userCookieName = "insforge-user";
11
+ const { baseUrl, cookieMaxAge = COOKIE_DEFAULTS.MAX_AGE } = config;
11
12
  const insforge = createClient({ baseUrl });
12
13
  function setAuthCookies(response, token, user) {
13
- const isProduction = process.env.NODE_ENV === "production";
14
- const secure = config.secure ?? isProduction;
15
- response.cookies.set({
16
- name: sessionCookieName,
17
- value: token,
18
- httpOnly: true,
19
- // Cannot be accessed by JavaScript
20
- secure,
21
- // Only sent over HTTPS in production
22
- sameSite: "lax",
14
+ const cookieOptions = getBaseCookieOptions({
23
15
  maxAge: cookieMaxAge,
24
- path: "/"
16
+ secure: config.secure
25
17
  });
26
- const userInfo = JSON.stringify({
27
- id: user.id,
28
- email: user.email,
29
- name: user.name || ""
18
+ response.cookies.set({
19
+ name: COOKIE_NAMES.SESSION,
20
+ value: token,
21
+ ...cookieOptions
30
22
  });
31
23
  response.cookies.set({
32
- name: userCookieName,
33
- value: userInfo,
34
- httpOnly: true,
35
- secure,
36
- sameSite: "lax",
37
- maxAge: cookieMaxAge,
38
- path: "/"
24
+ name: COOKIE_NAMES.USER,
25
+ value: serializeUserCookie(user),
26
+ ...cookieOptions
39
27
  });
40
28
  return response;
41
29
  }
42
30
  function clearAuthCookies(response) {
43
- const secure = config.secure ?? process.env.NODE_ENV === "production";
31
+ const clearOptions = getClearCookieOptions({ secure: config.secure });
44
32
  response.cookies.set({
45
- name: sessionCookieName,
33
+ name: COOKIE_NAMES.SESSION,
46
34
  value: "",
47
- httpOnly: true,
48
- secure,
49
- sameSite: "lax",
50
- maxAge: 0,
51
- path: "/"
35
+ ...clearOptions
52
36
  });
53
37
  response.cookies.set({
54
- name: userCookieName,
38
+ name: COOKIE_NAMES.USER,
55
39
  value: "",
56
- httpOnly: true,
57
- secure,
58
- sameSite: "lax",
59
- maxAge: 0,
60
- path: "/"
40
+ ...clearOptions
61
41
  });
62
42
  return response;
63
43
  }
@@ -182,7 +162,7 @@ function createAuthRouteHandlers(config) {
182
162
  }
183
163
  async function GET(request) {
184
164
  try {
185
- const token = request.cookies.get(sessionCookieName)?.value;
165
+ const token = request.cookies.get(COOKIE_NAMES.SESSION)?.value;
186
166
  if (!token) {
187
167
  return NextResponse.json({ user: null, session: null });
188
168
  }
@@ -214,7 +194,7 @@ function createAuthRouteHandlers(config) {
214
194
  }
215
195
  async function DELETE(request) {
216
196
  try {
217
- const token = request.cookies.get(sessionCookieName)?.value;
197
+ const token = request.cookies.get(COOKIE_NAMES.SESSION)?.value;
218
198
  if (token) {
219
199
  try {
220
200
  await fetch(`${baseUrl}/auth/sessions/current`, {
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../src/api/route-handlers.ts"],"sourcesContent":["import { NextRequest, NextResponse } from 'next/server';\nimport { createClient } from '@insforge/sdk';\n\ninterface SignInRequestBody {\n action: 'sign-in';\n email: string;\n password: string;\n}\n\ninterface SignUpRequestBody {\n action: 'sign-up';\n email: string;\n password: string;\n}\n\ninterface SyncTokenRequestBody {\n action: 'sync-token';\n}\n\ntype AuthRequestBody = SignInRequestBody | SignUpRequestBody | SyncTokenRequestBody;\n\ninterface UserWithOptionalName {\n id: string;\n email: string;\n name?: string;\n [key: string]: unknown;\n}\n\ninterface SessionResponse {\n user: UserWithOptionalName;\n [key: string]: unknown;\n}\n\nexport interface AuthRouteConfig {\n /**\n * Base URL of your Insforge backend\n */\n baseUrl: string;\n\n /**\n * Cookie max age in seconds (default: 7 days)\n * @default 604800\n */\n cookieMaxAge?: number;\n\n /**\n * Whether to use secure cookies (HTTPS only)\n * Auto-detected based on environment\n */\n secure?: boolean;\n}\n\n/**\n * Creates authentication route handlers for Next.js App Router\n * These handlers set HTTP-only cookies that can be read by middleware\n *\n * @example\n * ```ts\n * // app/api/auth/[...auth]/route.ts\n * import { createAuthRouteHandlers } from '@insforge/nextjs/api';\n *\n * const handlers = createAuthRouteHandlers({\n * baseUrl: process.env.NEXT_PUBLIC_INSFORGE_BASE_URL!,\n * });\n *\n * export const POST = handlers.POST;\n * export const GET = handlers.GET;\n * export const DELETE = handlers.DELETE;\n * ```\n */\nexport function createAuthRouteHandlers(config: AuthRouteConfig) {\n const {\n baseUrl,\n cookieMaxAge = 7 * 24 * 60 * 60, // 7 days\n } = config;\n\n // Fixed cookie names - not configurable\n const sessionCookieName = 'insforge-session';\n const userCookieName = 'insforge-user';\n\n const insforge = createClient({ baseUrl });\n\n /**\n * Helper to set auth cookies (session token + user identity)\n */\n function setAuthCookies(\n response: NextResponse,\n token: string,\n user: { id: string; email: string; name?: string }\n ) {\n // NODE_ENV is automatically set by Next.js runtime ('development' | 'production' | 'test')\n // In production, cookies are sent over HTTPS only (secure flag)\n const isProduction = process.env.NODE_ENV === 'production';\n const secure = config.secure ?? isProduction;\n\n // Set session cookie (access token)\n response.cookies.set({\n name: sessionCookieName,\n value: token,\n httpOnly: true, // Cannot be accessed by JavaScript\n secure, // Only sent over HTTPS in production\n sameSite: 'lax',\n maxAge: cookieMaxAge,\n path: '/',\n });\n\n // Set user identity cookie (basic info for SSR)\n const userInfo = JSON.stringify({\n id: user.id,\n email: user.email,\n name: user.name || '',\n });\n\n response.cookies.set({\n name: userCookieName,\n value: userInfo,\n httpOnly: true,\n secure,\n sameSite: 'lax',\n maxAge: cookieMaxAge,\n path: '/',\n });\n\n return response;\n }\n\n /**\n * Helper to clear auth cookies\n */\n function clearAuthCookies(response: NextResponse) {\n const secure = config.secure ?? process.env.NODE_ENV === 'production';\n\n // Clear session cookie\n response.cookies.set({\n name: sessionCookieName,\n value: '',\n httpOnly: true,\n secure,\n sameSite: 'lax',\n maxAge: 0,\n path: '/',\n });\n\n // Clear user cookie\n response.cookies.set({\n name: userCookieName,\n value: '',\n httpOnly: true,\n secure,\n sameSite: 'lax',\n maxAge: 0,\n path: '/',\n });\n\n return response;\n }\n\n /**\n * POST handler for authentication actions\n * Supports: sign-in, sign-up\n */\n async function POST(request: NextRequest) {\n try {\n const body = (await request.json()) as AuthRequestBody;\n const { action } = body;\n\n if (!action) {\n return NextResponse.json({ error: 'Action is required' }, { status: 400 });\n }\n\n switch (action) {\n case 'sign-in': {\n const { email, password } = body;\n if (!email || !password) {\n return NextResponse.json({ error: 'Email and password are required' }, { status: 400 });\n }\n\n const result = await insforge.auth.signInWithPassword({\n email,\n password,\n });\n\n if (result.error) {\n return NextResponse.json({ error: result.error.message }, { status: 401 });\n }\n\n if (!result.data || !result.data.user) {\n return NextResponse.json({ error: 'Authentication failed' }, { status: 401 });\n }\n\n const response = NextResponse.json({\n user: result.data.user,\n session: {\n userId: result.data.user.id,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n\n setAuthCookies(response, result.data.accessToken || '', {\n id: result.data.user.id,\n email: result.data.user.email,\n name: result.data.user.name,\n });\n\n return response;\n }\n\n case 'sign-up': {\n const { email, password } = body;\n if (!email || !password) {\n return NextResponse.json({ error: 'Email and password are required' }, { status: 400 });\n }\n\n const result = await insforge.auth.signUp({ email, password });\n\n if (result.error) {\n return NextResponse.json({ error: result.error.message }, { status: 400 });\n }\n\n if (!result.data || !result.data.user) {\n return NextResponse.json({ error: 'Sign up failed' }, { status: 400 });\n }\n\n const response = NextResponse.json({\n user: result.data.user,\n session: {\n userId: result.data.user.id,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n\n setAuthCookies(response, result.data.accessToken || '', {\n id: result.data.user.id,\n email: result.data.user.email,\n name: result.data.user.name,\n });\n\n return response;\n }\n\n case 'sync-token': {\n // Syncs access token to HTTP-only cookie for server-side usage\n // Token is passed via Authorization header (preferred)\n const authHeader = request.headers.get('Authorization');\n const tokenFromHeader = authHeader?.startsWith('Bearer ')\n ? authHeader.slice(7)\n : null;\n const token = tokenFromHeader;\n\n if (!token) {\n console.error('[Auth Route] No token provided in header');\n return NextResponse.json({ error: 'Token is required' }, { status: 400 });\n }\n\n // Verify the token is valid by checking with backend\n try {\n const response = await fetch(`${baseUrl}/api/auth/sessions/current`, {\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n });\n\n if (!response.ok) {\n const errorText = await response.text();\n console.error('[Auth API] Token validation failed:', errorText);\n return NextResponse.json(\n { error: 'Invalid token', details: errorText },\n { status: 401 }\n );\n }\n\n const session = (await response.json()) as SessionResponse;\n\n const nextResponse = NextResponse.json({\n user: session.user,\n session: {\n userId: session.user.id,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n\n setAuthCookies(nextResponse, token, {\n id: session.user.id,\n email: session.user.email,\n name: session.user.name,\n });\n\n return nextResponse;\n } catch (error) {\n console.error('[Auth API] Token validation error:', error);\n return NextResponse.json(\n { error: 'Token validation failed', details: String(error) },\n { status: 401 }\n );\n }\n }\n\n default:\n return NextResponse.json({ error: 'Invalid action' }, { status: 400 });\n }\n } catch (error) {\n console.error('[Auth API Error]:', error);\n return NextResponse.json({ error: 'Internal server error' }, { status: 500 });\n }\n }\n\n /**\n * GET handler to check current session\n */\n async function GET(request: NextRequest) {\n try {\n const token = request.cookies.get(sessionCookieName)?.value;\n\n if (!token) {\n return NextResponse.json({ user: null, session: null });\n }\n\n // Verify token with backend\n const response = await fetch(`${baseUrl}/api/auth/sessions/current`, {\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n });\n\n if (!response.ok) {\n const nextResponse = NextResponse.json({ user: null, session: null });\n clearAuthCookies(nextResponse);\n return nextResponse;\n }\n\n const session = (await response.json()) as SessionResponse;\n\n return NextResponse.json({\n user: session.user,\n session: {\n userId: session.user.id,\n token,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n } catch (error) {\n console.error('[Auth API Error]:', error);\n return NextResponse.json({ user: null, session: null });\n }\n }\n\n /**\n * DELETE handler for sign out\n */\n async function DELETE(request: NextRequest) {\n try {\n const token = request.cookies.get(sessionCookieName)?.value;\n\n if (token) {\n // Call backend sign out\n try {\n await fetch(`${baseUrl}/auth/sessions/current`, {\n method: 'DELETE',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n });\n } catch (error) {\n // Ignore backend errors during sign out\n console.error('[Auth API] Sign out error:', error);\n }\n }\n\n const response = NextResponse.json({ success: true });\n clearAuthCookies(response);\n\n return response;\n } catch (error) {\n console.error('[Auth API Error]:', error);\n return NextResponse.json({ error: 'Internal server error' }, { status: 500 });\n }\n }\n\n return {\n POST,\n GET,\n DELETE,\n };\n}\n"],"mappings":"AAAA,SAAsB,oBAAoB;AAC1C,SAAS,oBAAoB;AAqEtB,SAAS,wBAAwB,QAAyB;AAC/D,QAAM;AAAA,IACJ;AAAA,IACA,eAAe,IAAI,KAAK,KAAK;AAAA;AAAA,EAC/B,IAAI;AAGJ,QAAM,oBAAoB;AAC1B,QAAM,iBAAiB;AAEvB,QAAM,WAAW,aAAa,EAAE,QAAQ,CAAC;AAKzC,WAAS,eACP,UACA,OACA,MACA;AAGA,UAAM,eAAe,QAAQ,IAAI,aAAa;AAC9C,UAAM,SAAS,OAAO,UAAU;AAGhC,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM;AAAA,MACN,OAAO;AAAA,MACP,UAAU;AAAA;AAAA,MACV;AAAA;AAAA,MACA,UAAU;AAAA,MACV,QAAQ;AAAA,MACR,MAAM;AAAA,IACR,CAAC;AAGD,UAAM,WAAW,KAAK,UAAU;AAAA,MAC9B,IAAI,KAAK;AAAA,MACT,OAAO,KAAK;AAAA,MACZ,MAAM,KAAK,QAAQ;AAAA,IACrB,CAAC;AAED,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM;AAAA,MACN,OAAO;AAAA,MACP,UAAU;AAAA,MACV;AAAA,MACA,UAAU;AAAA,MACV,QAAQ;AAAA,MACR,MAAM;AAAA,IACR,CAAC;AAED,WAAO;AAAA,EACT;AAKA,WAAS,iBAAiB,UAAwB;AAChD,UAAM,SAAS,OAAO,UAAU,QAAQ,IAAI,aAAa;AAGzD,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM;AAAA,MACN,OAAO;AAAA,MACP,UAAU;AAAA,MACV;AAAA,MACA,UAAU;AAAA,MACV,QAAQ;AAAA,MACR,MAAM;AAAA,IACR,CAAC;AAGD,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM;AAAA,MACN,OAAO;AAAA,MACP,UAAU;AAAA,MACV;AAAA,MACA,UAAU;AAAA,MACV,QAAQ;AAAA,MACR,MAAM;AAAA,IACR,CAAC;AAED,WAAO;AAAA,EACT;AAMA,iBAAe,KAAK,SAAsB;AACxC,QAAI;AACF,YAAM,OAAQ,MAAM,QAAQ,KAAK;AACjC,YAAM,EAAE,OAAO,IAAI;AAEnB,UAAI,CAAC,QAAQ;AACX,eAAO,aAAa,KAAK,EAAE,OAAO,qBAAqB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,MAC3E;AAEA,cAAQ,QAAQ;AAAA,QACd,KAAK,WAAW;AACd,gBAAM,EAAE,OAAO,SAAS,IAAI;AAC5B,cAAI,CAAC,SAAS,CAAC,UAAU;AACvB,mBAAO,aAAa,KAAK,EAAE,OAAO,kCAAkC,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UACxF;AAEA,gBAAM,SAAS,MAAM,SAAS,KAAK,mBAAmB;AAAA,YACpD;AAAA,YACA;AAAA,UACF,CAAC;AAED,cAAI,OAAO,OAAO;AAChB,mBAAO,aAAa,KAAK,EAAE,OAAO,OAAO,MAAM,QAAQ,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC3E;AAEA,cAAI,CAAC,OAAO,QAAQ,CAAC,OAAO,KAAK,MAAM;AACrC,mBAAO,aAAa,KAAK,EAAE,OAAO,wBAAwB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC9E;AAEA,gBAAM,WAAW,aAAa,KAAK;AAAA,YACjC,MAAM,OAAO,KAAK;AAAA,YAClB,SAAS;AAAA,cACP,QAAQ,OAAO,KAAK,KAAK;AAAA,cACzB,WAAW;AAAA,cACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,YACpC;AAAA,UACF,CAAC;AAED,yBAAe,UAAU,OAAO,KAAK,eAAe,IAAI;AAAA,YACtD,IAAI,OAAO,KAAK,KAAK;AAAA,YACrB,OAAO,OAAO,KAAK,KAAK;AAAA,YACxB,MAAM,OAAO,KAAK,KAAK;AAAA,UACzB,CAAC;AAED,iBAAO;AAAA,QACT;AAAA,QAEA,KAAK,WAAW;AACd,gBAAM,EAAE,OAAO,SAAS,IAAI;AAC5B,cAAI,CAAC,SAAS,CAAC,UAAU;AACvB,mBAAO,aAAa,KAAK,EAAE,OAAO,kCAAkC,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UACxF;AAEA,gBAAM,SAAS,MAAM,SAAS,KAAK,OAAO,EAAE,OAAO,SAAS,CAAC;AAE7D,cAAI,OAAO,OAAO;AAChB,mBAAO,aAAa,KAAK,EAAE,OAAO,OAAO,MAAM,QAAQ,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC3E;AAEA,cAAI,CAAC,OAAO,QAAQ,CAAC,OAAO,KAAK,MAAM;AACrC,mBAAO,aAAa,KAAK,EAAE,OAAO,iBAAiB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UACvE;AAEA,gBAAM,WAAW,aAAa,KAAK;AAAA,YACjC,MAAM,OAAO,KAAK;AAAA,YAClB,SAAS;AAAA,cACP,QAAQ,OAAO,KAAK,KAAK;AAAA,cACzB,WAAW;AAAA,cACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,YACpC;AAAA,UACF,CAAC;AAED,yBAAe,UAAU,OAAO,KAAK,eAAe,IAAI;AAAA,YACtD,IAAI,OAAO,KAAK,KAAK;AAAA,YACrB,OAAO,OAAO,KAAK,KAAK;AAAA,YACxB,MAAM,OAAO,KAAK,KAAK;AAAA,UACzB,CAAC;AAED,iBAAO;AAAA,QACT;AAAA,QAEA,KAAK,cAAc;AAGjB,gBAAM,aAAa,QAAQ,QAAQ,IAAI,eAAe;AACtD,gBAAM,kBAAkB,YAAY,WAAW,SAAS,IACpD,WAAW,MAAM,CAAC,IAClB;AACJ,gBAAM,QAAQ;AAEd,cAAI,CAAC,OAAO;AACV,oBAAQ,MAAM,0CAA0C;AACxD,mBAAO,aAAa,KAAK,EAAE,OAAO,oBAAoB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC1E;AAGA,cAAI;AACF,kBAAM,WAAW,MAAM,MAAM,GAAG,OAAO,8BAA8B;AAAA,cACnE,SAAS;AAAA,gBACP,eAAe,UAAU,KAAK;AAAA,gBAC9B,gBAAgB;AAAA,cAClB;AAAA,YACF,CAAC;AAED,gBAAI,CAAC,SAAS,IAAI;AAChB,oBAAM,YAAY,MAAM,SAAS,KAAK;AACtC,sBAAQ,MAAM,uCAAuC,SAAS;AAC9D,qBAAO,aAAa;AAAA,gBAClB,EAAE,OAAO,iBAAiB,SAAS,UAAU;AAAA,gBAC7C,EAAE,QAAQ,IAAI;AAAA,cAChB;AAAA,YACF;AAEA,kBAAM,UAAW,MAAM,SAAS,KAAK;AAErC,kBAAM,eAAe,aAAa,KAAK;AAAA,cACrC,MAAM,QAAQ;AAAA,cACd,SAAS;AAAA,gBACP,QAAQ,QAAQ,KAAK;AAAA,gBACrB,WAAW;AAAA,gBACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,cACpC;AAAA,YACF,CAAC;AAED,2BAAe,cAAc,OAAO;AAAA,cAClC,IAAI,QAAQ,KAAK;AAAA,cACjB,OAAO,QAAQ,KAAK;AAAA,cACpB,MAAM,QAAQ,KAAK;AAAA,YACrB,CAAC;AAED,mBAAO;AAAA,UACT,SAAS,OAAO;AACd,oBAAQ,MAAM,sCAAsC,KAAK;AACzD,mBAAO,aAAa;AAAA,cAClB,EAAE,OAAO,2BAA2B,SAAS,OAAO,KAAK,EAAE;AAAA,cAC3D,EAAE,QAAQ,IAAI;AAAA,YAChB;AAAA,UACF;AAAA,QACF;AAAA,QAEA;AACE,iBAAO,aAAa,KAAK,EAAE,OAAO,iBAAiB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,MACzE;AAAA,IACF,SAAS,OAAO;AACd,cAAQ,MAAM,qBAAqB,KAAK;AACxC,aAAO,aAAa,KAAK,EAAE,OAAO,wBAAwB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,IAC9E;AAAA,EACF;AAKA,iBAAe,IAAI,SAAsB;AACvC,QAAI;AACF,YAAM,QAAQ,QAAQ,QAAQ,IAAI,iBAAiB,GAAG;AAEtD,UAAI,CAAC,OAAO;AACV,eAAO,aAAa,KAAK,EAAE,MAAM,MAAM,SAAS,KAAK,CAAC;AAAA,MACxD;AAGA,YAAM,WAAW,MAAM,MAAM,GAAG,OAAO,8BAA8B;AAAA,QACnE,SAAS;AAAA,UACP,eAAe,UAAU,KAAK;AAAA,UAC9B,gBAAgB;AAAA,QAClB;AAAA,MACF,CAAC;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,cAAM,eAAe,aAAa,KAAK,EAAE,MAAM,MAAM,SAAS,KAAK,CAAC;AACpE,yBAAiB,YAAY;AAC7B,eAAO;AAAA,MACT;AAEA,YAAM,UAAW,MAAM,SAAS,KAAK;AAErC,aAAO,aAAa,KAAK;AAAA,QACvB,MAAM,QAAQ;AAAA,QACd,SAAS;AAAA,UACP,QAAQ,QAAQ,KAAK;AAAA,UACrB;AAAA,UACA,WAAW;AAAA,UACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,QACpC;AAAA,MACF,CAAC;AAAA,IACH,SAAS,OAAO;AACd,cAAQ,MAAM,qBAAqB,KAAK;AACxC,aAAO,aAAa,KAAK,EAAE,MAAM,MAAM,SAAS,KAAK,CAAC;AAAA,IACxD;AAAA,EACF;AAKA,iBAAe,OAAO,SAAsB;AAC1C,QAAI;AACF,YAAM,QAAQ,QAAQ,QAAQ,IAAI,iBAAiB,GAAG;AAEtD,UAAI,OAAO;AAET,YAAI;AACF,gBAAM,MAAM,GAAG,OAAO,0BAA0B;AAAA,YAC9C,QAAQ;AAAA,YACR,SAAS;AAAA,cACP,eAAe,UAAU,KAAK;AAAA,cAC9B,gBAAgB;AAAA,YAClB;AAAA,UACF,CAAC;AAAA,QACH,SAAS,OAAO;AAEd,kBAAQ,MAAM,8BAA8B,KAAK;AAAA,QACnD;AAAA,MACF;AAEA,YAAM,WAAW,aAAa,KAAK,EAAE,SAAS,KAAK,CAAC;AACpD,uBAAiB,QAAQ;AAEzB,aAAO;AAAA,IACT,SAAS,OAAO;AACd,cAAQ,MAAM,qBAAqB,KAAK;AACxC,aAAO,aAAa,KAAK,EAAE,OAAO,wBAAwB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,IAC9E;AAAA,EACF;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;","names":[]}
1
+ {"version":3,"sources":["../../../src/api/route-handlers.ts"],"sourcesContent":["import { NextRequest, NextResponse } from 'next/server';\nimport { createClient } from '@insforge/sdk';\nimport {\n COOKIE_NAMES,\n COOKIE_DEFAULTS,\n getBaseCookieOptions,\n getClearCookieOptions,\n serializeUserCookie,\n} from '../lib/cookies';\n\ninterface SignInRequestBody {\n action: 'sign-in';\n email: string;\n password: string;\n}\n\ninterface SignUpRequestBody {\n action: 'sign-up';\n email: string;\n password: string;\n}\n\ninterface SyncTokenRequestBody {\n action: 'sync-token';\n}\n\ntype AuthRequestBody = SignInRequestBody | SignUpRequestBody | SyncTokenRequestBody;\n\ninterface UserWithOptionalName {\n id: string;\n email: string;\n name?: string;\n [key: string]: unknown;\n}\n\ninterface SessionResponse {\n user: UserWithOptionalName;\n [key: string]: unknown;\n}\n\nexport interface AuthRouteConfig {\n /**\n * Base URL of your Insforge backend\n */\n baseUrl: string;\n\n /**\n * Cookie max age in seconds (default: 7 days)\n * @default 604800\n */\n cookieMaxAge?: number;\n\n /**\n * Whether to use secure cookies (HTTPS only)\n * Auto-detected based on environment\n */\n secure?: boolean;\n}\n\n/**\n * Creates authentication route handlers for Next.js App Router\n * These handlers set HTTP-only cookies that can be read by middleware\n *\n * @example\n * ```ts\n * // app/api/auth/[...auth]/route.ts\n * import { createAuthRouteHandlers } from '@insforge/nextjs/api';\n *\n * const handlers = createAuthRouteHandlers({\n * baseUrl: process.env.NEXT_PUBLIC_INSFORGE_BASE_URL!,\n * });\n *\n * export const POST = handlers.POST;\n * export const GET = handlers.GET;\n * export const DELETE = handlers.DELETE;\n * ```\n */\nexport function createAuthRouteHandlers(config: AuthRouteConfig) {\n const { baseUrl, cookieMaxAge = COOKIE_DEFAULTS.MAX_AGE } = config;\n\n const insforge = createClient({ baseUrl });\n\n /**\n * Helper to set auth cookies (session token + user identity)\n */\n function setAuthCookies(\n response: NextResponse,\n token: string,\n user: { id: string; email: string; name?: string }\n ) {\n const cookieOptions = getBaseCookieOptions({\n maxAge: cookieMaxAge,\n secure: config.secure,\n });\n\n // Set session cookie (access token)\n response.cookies.set({\n name: COOKIE_NAMES.SESSION,\n value: token,\n ...cookieOptions,\n });\n\n // Set user identity cookie (basic info for SSR)\n response.cookies.set({\n name: COOKIE_NAMES.USER,\n value: serializeUserCookie(user),\n ...cookieOptions,\n });\n\n return response;\n }\n\n /**\n * Helper to clear auth cookies\n */\n function clearAuthCookies(response: NextResponse) {\n const clearOptions = getClearCookieOptions({ secure: config.secure });\n\n // Clear session cookie\n response.cookies.set({\n name: COOKIE_NAMES.SESSION,\n value: '',\n ...clearOptions,\n });\n\n // Clear user cookie\n response.cookies.set({\n name: COOKIE_NAMES.USER,\n value: '',\n ...clearOptions,\n });\n\n return response;\n }\n\n /**\n * POST handler for authentication actions\n * Supports: sign-in, sign-up\n */\n async function POST(request: NextRequest) {\n try {\n const body = (await request.json()) as AuthRequestBody;\n const { action } = body;\n\n if (!action) {\n return NextResponse.json({ error: 'Action is required' }, { status: 400 });\n }\n\n switch (action) {\n case 'sign-in': {\n const { email, password } = body;\n if (!email || !password) {\n return NextResponse.json({ error: 'Email and password are required' }, { status: 400 });\n }\n\n const result = await insforge.auth.signInWithPassword({\n email,\n password,\n });\n\n if (result.error) {\n return NextResponse.json({ error: result.error.message }, { status: 401 });\n }\n\n if (!result.data || !result.data.user) {\n return NextResponse.json({ error: 'Authentication failed' }, { status: 401 });\n }\n\n const response = NextResponse.json({\n user: result.data.user,\n session: {\n userId: result.data.user.id,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n\n setAuthCookies(response, result.data.accessToken || '', {\n id: result.data.user.id,\n email: result.data.user.email,\n name: result.data.user.name,\n });\n\n return response;\n }\n\n case 'sign-up': {\n const { email, password } = body;\n if (!email || !password) {\n return NextResponse.json({ error: 'Email and password are required' }, { status: 400 });\n }\n\n const result = await insforge.auth.signUp({ email, password });\n\n if (result.error) {\n return NextResponse.json({ error: result.error.message }, { status: 400 });\n }\n\n if (!result.data || !result.data.user) {\n return NextResponse.json({ error: 'Sign up failed' }, { status: 400 });\n }\n\n const response = NextResponse.json({\n user: result.data.user,\n session: {\n userId: result.data.user.id,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n\n setAuthCookies(response, result.data.accessToken || '', {\n id: result.data.user.id,\n email: result.data.user.email,\n name: result.data.user.name,\n });\n\n return response;\n }\n\n case 'sync-token': {\n // Syncs access token to HTTP-only cookie for server-side usage\n // Token is passed via Authorization header (preferred)\n const authHeader = request.headers.get('Authorization');\n const tokenFromHeader = authHeader?.startsWith('Bearer ') ? authHeader.slice(7) : null;\n const token = tokenFromHeader;\n\n if (!token) {\n console.error('[Auth Route] No token provided in header');\n return NextResponse.json({ error: 'Token is required' }, { status: 400 });\n }\n\n // Verify the token is valid by checking with backend\n try {\n const response = await fetch(`${baseUrl}/api/auth/sessions/current`, {\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n });\n\n if (!response.ok) {\n const errorText = await response.text();\n console.error('[Auth API] Token validation failed:', errorText);\n return NextResponse.json(\n { error: 'Invalid token', details: errorText },\n { status: 401 }\n );\n }\n\n const session = (await response.json()) as SessionResponse;\n\n const nextResponse = NextResponse.json({\n user: session.user,\n session: {\n userId: session.user.id,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n\n setAuthCookies(nextResponse, token, {\n id: session.user.id,\n email: session.user.email,\n name: session.user.name,\n });\n\n return nextResponse;\n } catch (error) {\n console.error('[Auth API] Token validation error:', error);\n return NextResponse.json(\n { error: 'Token validation failed', details: String(error) },\n { status: 401 }\n );\n }\n }\n\n default:\n return NextResponse.json({ error: 'Invalid action' }, { status: 400 });\n }\n } catch (error) {\n console.error('[Auth API Error]:', error);\n return NextResponse.json({ error: 'Internal server error' }, { status: 500 });\n }\n }\n\n /**\n * GET handler to check current session\n */\n async function GET(request: NextRequest) {\n try {\n const token = request.cookies.get(COOKIE_NAMES.SESSION)?.value;\n\n if (!token) {\n return NextResponse.json({ user: null, session: null });\n }\n\n // Verify token with backend\n const response = await fetch(`${baseUrl}/api/auth/sessions/current`, {\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n });\n\n if (!response.ok) {\n const nextResponse = NextResponse.json({ user: null, session: null });\n clearAuthCookies(nextResponse);\n return nextResponse;\n }\n\n const session = (await response.json()) as SessionResponse;\n\n return NextResponse.json({\n user: session.user,\n session: {\n userId: session.user.id,\n token,\n expiresAt: '',\n createdAt: new Date().toISOString(),\n },\n });\n } catch (error) {\n console.error('[Auth API Error]:', error);\n return NextResponse.json({ user: null, session: null });\n }\n }\n\n /**\n * DELETE handler for sign out\n */\n async function DELETE(request: NextRequest) {\n try {\n const token = request.cookies.get(COOKIE_NAMES.SESSION)?.value;\n\n if (token) {\n // Call backend sign out\n try {\n await fetch(`${baseUrl}/auth/sessions/current`, {\n method: 'DELETE',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n });\n } catch (error) {\n // Ignore backend errors during sign out\n console.error('[Auth API] Sign out error:', error);\n }\n }\n\n const response = NextResponse.json({ success: true });\n clearAuthCookies(response);\n\n return response;\n } catch (error) {\n console.error('[Auth API Error]:', error);\n return NextResponse.json({ error: 'Internal server error' }, { status: 500 });\n }\n }\n\n return {\n POST,\n GET,\n DELETE,\n };\n}\n"],"mappings":"AAAA,SAAsB,oBAAoB;AAC1C,SAAS,oBAAoB;AAC7B;AAAA,EACE;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,EACA;AAAA,OACK;AAqEA,SAAS,wBAAwB,QAAyB;AAC/D,QAAM,EAAE,SAAS,eAAe,gBAAgB,QAAQ,IAAI;AAE5D,QAAM,WAAW,aAAa,EAAE,QAAQ,CAAC;AAKzC,WAAS,eACP,UACA,OACA,MACA;AACA,UAAM,gBAAgB,qBAAqB;AAAA,MACzC,QAAQ;AAAA,MACR,QAAQ,OAAO;AAAA,IACjB,CAAC;AAGD,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM,aAAa;AAAA,MACnB,OAAO;AAAA,MACP,GAAG;AAAA,IACL,CAAC;AAGD,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM,aAAa;AAAA,MACnB,OAAO,oBAAoB,IAAI;AAAA,MAC/B,GAAG;AAAA,IACL,CAAC;AAED,WAAO;AAAA,EACT;AAKA,WAAS,iBAAiB,UAAwB;AAChD,UAAM,eAAe,sBAAsB,EAAE,QAAQ,OAAO,OAAO,CAAC;AAGpE,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM,aAAa;AAAA,MACnB,OAAO;AAAA,MACP,GAAG;AAAA,IACL,CAAC;AAGD,aAAS,QAAQ,IAAI;AAAA,MACnB,MAAM,aAAa;AAAA,MACnB,OAAO;AAAA,MACP,GAAG;AAAA,IACL,CAAC;AAED,WAAO;AAAA,EACT;AAMA,iBAAe,KAAK,SAAsB;AACxC,QAAI;AACF,YAAM,OAAQ,MAAM,QAAQ,KAAK;AACjC,YAAM,EAAE,OAAO,IAAI;AAEnB,UAAI,CAAC,QAAQ;AACX,eAAO,aAAa,KAAK,EAAE,OAAO,qBAAqB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,MAC3E;AAEA,cAAQ,QAAQ;AAAA,QACd,KAAK,WAAW;AACd,gBAAM,EAAE,OAAO,SAAS,IAAI;AAC5B,cAAI,CAAC,SAAS,CAAC,UAAU;AACvB,mBAAO,aAAa,KAAK,EAAE,OAAO,kCAAkC,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UACxF;AAEA,gBAAM,SAAS,MAAM,SAAS,KAAK,mBAAmB;AAAA,YACpD;AAAA,YACA;AAAA,UACF,CAAC;AAED,cAAI,OAAO,OAAO;AAChB,mBAAO,aAAa,KAAK,EAAE,OAAO,OAAO,MAAM,QAAQ,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC3E;AAEA,cAAI,CAAC,OAAO,QAAQ,CAAC,OAAO,KAAK,MAAM;AACrC,mBAAO,aAAa,KAAK,EAAE,OAAO,wBAAwB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC9E;AAEA,gBAAM,WAAW,aAAa,KAAK;AAAA,YACjC,MAAM,OAAO,KAAK;AAAA,YAClB,SAAS;AAAA,cACP,QAAQ,OAAO,KAAK,KAAK;AAAA,cACzB,WAAW;AAAA,cACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,YACpC;AAAA,UACF,CAAC;AAED,yBAAe,UAAU,OAAO,KAAK,eAAe,IAAI;AAAA,YACtD,IAAI,OAAO,KAAK,KAAK;AAAA,YACrB,OAAO,OAAO,KAAK,KAAK;AAAA,YACxB,MAAM,OAAO,KAAK,KAAK;AAAA,UACzB,CAAC;AAED,iBAAO;AAAA,QACT;AAAA,QAEA,KAAK,WAAW;AACd,gBAAM,EAAE,OAAO,SAAS,IAAI;AAC5B,cAAI,CAAC,SAAS,CAAC,UAAU;AACvB,mBAAO,aAAa,KAAK,EAAE,OAAO,kCAAkC,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UACxF;AAEA,gBAAM,SAAS,MAAM,SAAS,KAAK,OAAO,EAAE,OAAO,SAAS,CAAC;AAE7D,cAAI,OAAO,OAAO;AAChB,mBAAO,aAAa,KAAK,EAAE,OAAO,OAAO,MAAM,QAAQ,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC3E;AAEA,cAAI,CAAC,OAAO,QAAQ,CAAC,OAAO,KAAK,MAAM;AACrC,mBAAO,aAAa,KAAK,EAAE,OAAO,iBAAiB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UACvE;AAEA,gBAAM,WAAW,aAAa,KAAK;AAAA,YACjC,MAAM,OAAO,KAAK;AAAA,YAClB,SAAS;AAAA,cACP,QAAQ,OAAO,KAAK,KAAK;AAAA,cACzB,WAAW;AAAA,cACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,YACpC;AAAA,UACF,CAAC;AAED,yBAAe,UAAU,OAAO,KAAK,eAAe,IAAI;AAAA,YACtD,IAAI,OAAO,KAAK,KAAK;AAAA,YACrB,OAAO,OAAO,KAAK,KAAK;AAAA,YACxB,MAAM,OAAO,KAAK,KAAK;AAAA,UACzB,CAAC;AAED,iBAAO;AAAA,QACT;AAAA,QAEA,KAAK,cAAc;AAGjB,gBAAM,aAAa,QAAQ,QAAQ,IAAI,eAAe;AACtD,gBAAM,kBAAkB,YAAY,WAAW,SAAS,IAAI,WAAW,MAAM,CAAC,IAAI;AAClF,gBAAM,QAAQ;AAEd,cAAI,CAAC,OAAO;AACV,oBAAQ,MAAM,0CAA0C;AACxD,mBAAO,aAAa,KAAK,EAAE,OAAO,oBAAoB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,UAC1E;AAGA,cAAI;AACF,kBAAM,WAAW,MAAM,MAAM,GAAG,OAAO,8BAA8B;AAAA,cACnE,SAAS;AAAA,gBACP,eAAe,UAAU,KAAK;AAAA,gBAC9B,gBAAgB;AAAA,cAClB;AAAA,YACF,CAAC;AAED,gBAAI,CAAC,SAAS,IAAI;AAChB,oBAAM,YAAY,MAAM,SAAS,KAAK;AACtC,sBAAQ,MAAM,uCAAuC,SAAS;AAC9D,qBAAO,aAAa;AAAA,gBAClB,EAAE,OAAO,iBAAiB,SAAS,UAAU;AAAA,gBAC7C,EAAE,QAAQ,IAAI;AAAA,cAChB;AAAA,YACF;AAEA,kBAAM,UAAW,MAAM,SAAS,KAAK;AAErC,kBAAM,eAAe,aAAa,KAAK;AAAA,cACrC,MAAM,QAAQ;AAAA,cACd,SAAS;AAAA,gBACP,QAAQ,QAAQ,KAAK;AAAA,gBACrB,WAAW;AAAA,gBACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,cACpC;AAAA,YACF,CAAC;AAED,2BAAe,cAAc,OAAO;AAAA,cAClC,IAAI,QAAQ,KAAK;AAAA,cACjB,OAAO,QAAQ,KAAK;AAAA,cACpB,MAAM,QAAQ,KAAK;AAAA,YACrB,CAAC;AAED,mBAAO;AAAA,UACT,SAAS,OAAO;AACd,oBAAQ,MAAM,sCAAsC,KAAK;AACzD,mBAAO,aAAa;AAAA,cAClB,EAAE,OAAO,2BAA2B,SAAS,OAAO,KAAK,EAAE;AAAA,cAC3D,EAAE,QAAQ,IAAI;AAAA,YAChB;AAAA,UACF;AAAA,QACF;AAAA,QAEA;AACE,iBAAO,aAAa,KAAK,EAAE,OAAO,iBAAiB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,MACzE;AAAA,IACF,SAAS,OAAO;AACd,cAAQ,MAAM,qBAAqB,KAAK;AACxC,aAAO,aAAa,KAAK,EAAE,OAAO,wBAAwB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,IAC9E;AAAA,EACF;AAKA,iBAAe,IAAI,SAAsB;AACvC,QAAI;AACF,YAAM,QAAQ,QAAQ,QAAQ,IAAI,aAAa,OAAO,GAAG;AAEzD,UAAI,CAAC,OAAO;AACV,eAAO,aAAa,KAAK,EAAE,MAAM,MAAM,SAAS,KAAK,CAAC;AAAA,MACxD;AAGA,YAAM,WAAW,MAAM,MAAM,GAAG,OAAO,8BAA8B;AAAA,QACnE,SAAS;AAAA,UACP,eAAe,UAAU,KAAK;AAAA,UAC9B,gBAAgB;AAAA,QAClB;AAAA,MACF,CAAC;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,cAAM,eAAe,aAAa,KAAK,EAAE,MAAM,MAAM,SAAS,KAAK,CAAC;AACpE,yBAAiB,YAAY;AAC7B,eAAO;AAAA,MACT;AAEA,YAAM,UAAW,MAAM,SAAS,KAAK;AAErC,aAAO,aAAa,KAAK;AAAA,QACvB,MAAM,QAAQ;AAAA,QACd,SAAS;AAAA,UACP,QAAQ,QAAQ,KAAK;AAAA,UACrB;AAAA,UACA,WAAW;AAAA,UACX,YAAW,oBAAI,KAAK,GAAE,YAAY;AAAA,QACpC;AAAA,MACF,CAAC;AAAA,IACH,SAAS,OAAO;AACd,cAAQ,MAAM,qBAAqB,KAAK;AACxC,aAAO,aAAa,KAAK,EAAE,MAAM,MAAM,SAAS,KAAK,CAAC;AAAA,IACxD;AAAA,EACF;AAKA,iBAAe,OAAO,SAAsB;AAC1C,QAAI;AACF,YAAM,QAAQ,QAAQ,QAAQ,IAAI,aAAa,OAAO,GAAG;AAEzD,UAAI,OAAO;AAET,YAAI;AACF,gBAAM,MAAM,GAAG,OAAO,0BAA0B;AAAA,YAC9C,QAAQ;AAAA,YACR,SAAS;AAAA,cACP,eAAe,UAAU,KAAK;AAAA,cAC9B,gBAAgB;AAAA,YAClB;AAAA,UACF,CAAC;AAAA,QACH,SAAS,OAAO;AAEd,kBAAQ,MAAM,8BAA8B,KAAK;AAAA,QACnD;AAAA,MACF;AAEA,YAAM,WAAW,aAAa,KAAK,EAAE,SAAS,KAAK,CAAC;AACpD,uBAAiB,QAAQ;AAEzB,aAAO;AAAA,IACT,SAAS,OAAO;AACd,cAAQ,MAAM,qBAAqB,KAAK;AACxC,aAAO,aAAa,KAAK,EAAE,OAAO,wBAAwB,GAAG,EAAE,QAAQ,IAAI,CAAC;AAAA,IAC9E;AAAA,EACF;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;","names":[]}
@@ -12,7 +12,7 @@ async function syncTokenToCookie(token) {
12
12
  const response = await fetch("/api/auth", {
13
13
  method: "POST",
14
14
  headers: {
15
- "Authorization": `Bearer ${token}`,
15
+ Authorization: `Bearer ${token}`,
16
16
  "Content-Type": "application/json"
17
17
  },
18
18
  body: JSON.stringify({
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../src/client/provider.tsx"],"sourcesContent":["'use client';\n\nimport {\n InsforgeProviderCore,\n type InsforgeProviderProps,\n type InitialAuthState,\n useInsforge as useReactInsforge,\n NavigationProvider,\n StyleProvider,\n} from '@insforge/react';\nimport { NavigationAdapter } from '../navigation';\n\n// Extended interface for Next.js provider\ninterface ExtendedProviderProps extends InsforgeProviderProps {\n afterSignInUrl?: string;\n onSignIn?: (authToken: string) => Promise<void>;\n onSignOut?: () => Promise<void>;\n onRefresh?: (authToken: string) => Promise<void>;\n /**\n * Initial auth state from server (for SSR hydration)\n * @internal\n */\n initialState?: InitialAuthState;\n}\n\n// Sync token to server-side cookie using Authorization header\nasync function syncTokenToCookie(token: string): Promise<void> {\n try {\n const response = await fetch('/api/auth', {\n method: 'POST',\n headers: {\n 'Authorization': `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n action: 'sync-token',\n }),\n });\n\n if (!response.ok) {\n const errorText = await response.text();\n console.error('[Insforge Client Provider] sync-token failed:', errorText);\n }\n } catch (err) {\n console.error('[Insforge Client Provider] Failed to sync token to cookie:', err);\n }\n}\n\n// Sync token to server-side cookie on sign in\nasync function handleSignIn(token: string): Promise<void> {\n await syncTokenToCookie(token);\n}\n\n// Sync token to server-side cookie on refresh (page load/refresh)\nasync function handleRefresh(token: string): Promise<void> {\n await syncTokenToCookie(token);\n}\n\n// Clear HTTP-only cookie on sign out\nasync function handleSignOut(): Promise<void> {\n try {\n await fetch('/api/auth', { method: 'DELETE' });\n } catch {\n // API route doesn't exist - ignore\n }\n}\n\n/**\n * Client Insforge Provider for Next.js\n *\n * This is a Client Component ('use client') that:\n * 1. Receives initialState from Server Provider\n * 2. Manages authentication state on the client\n * 3. Syncs tokens to HTTP-only cookies via /api/auth\n *\n * @internal - Not intended for direct use. Use the Server Provider instead.\n */\nexport function ClientInsforgeProvider({\n children,\n baseUrl,\n afterSignInUrl = '/',\n onAuthChange,\n initialState,\n}: ExtendedProviderProps) {\n const providerProps: ExtendedProviderProps = {\n children,\n baseUrl,\n afterSignInUrl,\n onAuthChange,\n onSignIn: handleSignIn,\n onSignOut: handleSignOut,\n onRefresh: handleRefresh,\n initialState,\n };\n\n return (\n <StyleProvider>\n <NavigationProvider adapter={NavigationAdapter}>\n <InsforgeProviderCore {...providerProps}>{children}</InsforgeProviderCore>\n </NavigationProvider>\n </StyleProvider>\n );\n}\n\n/**\n * Hook to access Insforge context\n *\n * Re-exports the hook from @insforge/react for convenience.\n *\n * @example\n * ```tsx\n * function MyComponent() {\n * const { user, isSignedIn, signOut } = useInsforge();\n *\n * if (!isSignedIn) return <SignIn />;\n *\n * return (\n * <div>\n * <p>Welcome {user.email}</p>\n * <button onClick={signOut}>Sign Out</button>\n * </div>\n * );\n * }\n * ```\n */\nexport const useInsforge = useReactInsforge;\n"],"mappings":";AAkGQ;AAhGR;AAAA,EACE;AAAA,EAGA,eAAe;AAAA,EACf;AAAA,EACA;AAAA,OACK;AACP,SAAS,yBAAyB;AAgBlC,eAAe,kBAAkB,OAA8B;AAC7D,MAAI;AACF,UAAM,WAAW,MAAM,MAAM,aAAa;AAAA,MACxC,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,iBAAiB,UAAU,KAAK;AAAA,QAChC,gBAAgB;AAAA,MAClB;AAAA,MACA,MAAM,KAAK,UAAU;AAAA,QACnB,QAAQ;AAAA,MACV,CAAC;AAAA,IACH,CAAC;AAED,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,YAAY,MAAM,SAAS,KAAK;AACtC,cAAQ,MAAM,iDAAiD,SAAS;AAAA,IAC1E;AAAA,EACF,SAAS,KAAK;AACZ,YAAQ,MAAM,8DAA8D,GAAG;AAAA,EACjF;AACF;AAGA,eAAe,aAAa,OAA8B;AACxD,QAAM,kBAAkB,KAAK;AAC/B;AAGA,eAAe,cAAc,OAA8B;AACzD,QAAM,kBAAkB,KAAK;AAC/B;AAGA,eAAe,gBAA+B;AAC5C,MAAI;AACF,UAAM,MAAM,aAAa,EAAE,QAAQ,SAAS,CAAC;AAAA,EAC/C,QAAQ;AAAA,EAER;AACF;AAYO,SAAS,uBAAuB;AAAA,EACrC;AAAA,EACA;AAAA,EACA,iBAAiB;AAAA,EACjB;AAAA,EACA;AACF,GAA0B;AACxB,QAAM,gBAAuC;AAAA,IAC3C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,UAAU;AAAA,IACV,WAAW;AAAA,IACX,WAAW;AAAA,IACX;AAAA,EACF;AAEA,SACE,oBAAC,iBACC,8BAAC,sBAAmB,SAAS,mBAC3B,8BAAC,wBAAsB,GAAG,eAAgB,UAAS,GACrD,GACF;AAEJ;AAuBO,MAAM,cAAc;","names":[]}
1
+ {"version":3,"sources":["../../../src/client/provider.tsx"],"sourcesContent":["'use client';\n\nimport {\n InsforgeProviderCore,\n type InsforgeProviderProps,\n type InitialAuthState,\n useInsforge as useReactInsforge,\n NavigationProvider,\n StyleProvider,\n} from '@insforge/react';\nimport { NavigationAdapter } from '../navigation';\n\n// Extended interface for Next.js provider\ninterface ExtendedProviderProps extends InsforgeProviderProps {\n afterSignInUrl?: string;\n onSignIn?: (authToken: string) => Promise<void>;\n onSignOut?: () => Promise<void>;\n onRefresh?: (authToken: string) => Promise<void>;\n /**\n * Initial auth state from server (for SSR hydration)\n * @internal\n */\n initialState?: InitialAuthState;\n}\n\n// Sync token to server-side cookie using Authorization header\nasync function syncTokenToCookie(token: string): Promise<void> {\n try {\n const response = await fetch('/api/auth', {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({\n action: 'sync-token',\n }),\n });\n\n if (!response.ok) {\n const errorText = await response.text();\n console.error('[Insforge Client Provider] sync-token failed:', errorText);\n }\n } catch (err) {\n console.error('[Insforge Client Provider] Failed to sync token to cookie:', err);\n }\n}\n\n// Sync token to server-side cookie on sign in\nasync function handleSignIn(token: string): Promise<void> {\n await syncTokenToCookie(token);\n}\n\n// Sync token to server-side cookie on refresh (page load/refresh)\nasync function handleRefresh(token: string): Promise<void> {\n await syncTokenToCookie(token);\n}\n\n// Clear HTTP-only cookie on sign out\nasync function handleSignOut(): Promise<void> {\n try {\n await fetch('/api/auth', { method: 'DELETE' });\n } catch {\n // API route doesn't exist - ignore\n }\n}\n\n/**\n * Client Insforge Provider for Next.js\n *\n * This is a Client Component ('use client') that:\n * 1. Receives initialState from Server Provider\n * 2. Manages authentication state on the client\n * 3. Syncs tokens to HTTP-only cookies via /api/auth\n *\n * @internal - Not intended for direct use. Use the Server Provider instead.\n */\nexport function ClientInsforgeProvider({\n children,\n baseUrl,\n afterSignInUrl = '/',\n onAuthChange,\n initialState,\n}: ExtendedProviderProps) {\n const providerProps: ExtendedProviderProps = {\n children,\n baseUrl,\n afterSignInUrl,\n onAuthChange,\n onSignIn: handleSignIn,\n onSignOut: handleSignOut,\n onRefresh: handleRefresh,\n initialState,\n };\n\n return (\n <StyleProvider>\n <NavigationProvider adapter={NavigationAdapter}>\n <InsforgeProviderCore {...providerProps}>{children}</InsforgeProviderCore>\n </NavigationProvider>\n </StyleProvider>\n );\n}\n\n/**\n * Hook to access Insforge context\n *\n * Re-exports the hook from @insforge/react for convenience.\n *\n * @example\n * ```tsx\n * function MyComponent() {\n * const { user, isSignedIn, signOut } = useInsforge();\n *\n * if (!isSignedIn) return <SignIn />;\n *\n * return (\n * <div>\n * <p>Welcome {user.email}</p>\n * <button onClick={signOut}>Sign Out</button>\n * </div>\n * );\n * }\n * ```\n */\nexport const useInsforge = useReactInsforge;\n"],"mappings":";AAkGQ;AAhGR;AAAA,EACE;AAAA,EAGA,eAAe;AAAA,EACf;AAAA,EACA;AAAA,OACK;AACP,SAAS,yBAAyB;AAgBlC,eAAe,kBAAkB,OAA8B;AAC7D,MAAI;AACF,UAAM,WAAW,MAAM,MAAM,aAAa;AAAA,MACxC,QAAQ;AAAA,MACR,SAAS;AAAA,QACP,eAAe,UAAU,KAAK;AAAA,QAC9B,gBAAgB;AAAA,MAClB;AAAA,MACA,MAAM,KAAK,UAAU;AAAA,QACnB,QAAQ;AAAA,MACV,CAAC;AAAA,IACH,CAAC;AAED,QAAI,CAAC,SAAS,IAAI;AAChB,YAAM,YAAY,MAAM,SAAS,KAAK;AACtC,cAAQ,MAAM,iDAAiD,SAAS;AAAA,IAC1E;AAAA,EACF,SAAS,KAAK;AACZ,YAAQ,MAAM,8DAA8D,GAAG;AAAA,EACjF;AACF;AAGA,eAAe,aAAa,OAA8B;AACxD,QAAM,kBAAkB,KAAK;AAC/B;AAGA,eAAe,cAAc,OAA8B;AACzD,QAAM,kBAAkB,KAAK;AAC/B;AAGA,eAAe,gBAA+B;AAC5C,MAAI;AACF,UAAM,MAAM,aAAa,EAAE,QAAQ,SAAS,CAAC;AAAA,EAC/C,QAAQ;AAAA,EAER;AACF;AAYO,SAAS,uBAAuB;AAAA,EACrC;AAAA,EACA;AAAA,EACA,iBAAiB;AAAA,EACjB;AAAA,EACA;AACF,GAA0B;AACxB,QAAM,gBAAuC;AAAA,IAC3C;AAAA,IACA;AAAA,IACA;AAAA,IACA;AAAA,IACA,UAAU;AAAA,IACV,WAAW;AAAA,IACX,WAAW;AAAA,IACX;AAAA,EACF;AAEA,SACE,oBAAC,iBACC,8BAAC,sBAAmB,SAAS,mBAC3B,8BAAC,wBAAsB,GAAG,eAAgB,UAAS,GACrD,GACF;AAEJ;AAuBO,MAAM,cAAc;","names":[]}
@@ -0,0 +1,72 @@
1
+ const COOKIE_NAMES = {
2
+ /** Session cookie storing the access token */
3
+ SESSION: "insforge-session",
4
+ /** User info cookie storing basic user data for SSR */
5
+ USER: "insforge-user"
6
+ };
7
+ const COOKIE_DEFAULTS = {
8
+ /** Default max age: 7 days in seconds */
9
+ MAX_AGE: 7 * 24 * 60 * 60,
10
+ /** Cookie path */
11
+ PATH: "/",
12
+ /** SameSite policy */
13
+ SAME_SITE: "lax"
14
+ };
15
+ function isSecureCookie(explicitSecure) {
16
+ if (explicitSecure !== void 0) {
17
+ return explicitSecure;
18
+ }
19
+ return process.env.NODE_ENV === "production";
20
+ }
21
+ function getBaseCookieOptions(options) {
22
+ const secure = isSecureCookie(options?.secure);
23
+ const maxAge = options?.maxAge ?? COOKIE_DEFAULTS.MAX_AGE;
24
+ return {
25
+ httpOnly: true,
26
+ secure,
27
+ sameSite: COOKIE_DEFAULTS.SAME_SITE,
28
+ maxAge,
29
+ path: COOKIE_DEFAULTS.PATH
30
+ };
31
+ }
32
+ function getClearCookieOptions(options) {
33
+ const secure = isSecureCookie(options?.secure);
34
+ return {
35
+ httpOnly: true,
36
+ secure,
37
+ sameSite: COOKIE_DEFAULTS.SAME_SITE,
38
+ maxAge: 0,
39
+ path: COOKIE_DEFAULTS.PATH
40
+ };
41
+ }
42
+ function serializeUserCookie(user) {
43
+ return JSON.stringify({
44
+ id: user.id,
45
+ email: user.email,
46
+ name: user.name || ""
47
+ });
48
+ }
49
+ function parseUserCookie(cookieValue) {
50
+ if (!cookieValue) {
51
+ return null;
52
+ }
53
+ try {
54
+ const parsed = JSON.parse(cookieValue);
55
+ if (parsed && typeof parsed === "object" && "id" in parsed && "email" in parsed && "name" in parsed && typeof parsed.id === "string" && typeof parsed.email === "string" && typeof parsed.name === "string") {
56
+ return parsed;
57
+ }
58
+ return null;
59
+ } catch {
60
+ return null;
61
+ }
62
+ }
63
+ export {
64
+ COOKIE_DEFAULTS,
65
+ COOKIE_NAMES,
66
+ getBaseCookieOptions,
67
+ getClearCookieOptions,
68
+ isSecureCookie,
69
+ parseUserCookie,
70
+ serializeUserCookie
71
+ };
72
+ //# sourceMappingURL=cookies.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/lib/cookies.ts"],"sourcesContent":["import type { ResponseCookie } from 'next/dist/compiled/@edge-runtime/cookies';\n\n/**\n * Cookie names used by Insforge authentication\n * These are fixed and should not be changed to ensure consistency\n */\nexport const COOKIE_NAMES = {\n /** Session cookie storing the access token */\n SESSION: 'insforge-session',\n /** User info cookie storing basic user data for SSR */\n USER: 'insforge-user',\n} as const;\n\n/**\n * Default cookie configuration values\n */\nexport const COOKIE_DEFAULTS = {\n /** Default max age: 7 days in seconds */\n MAX_AGE: 7 * 24 * 60 * 60,\n /** Cookie path */\n PATH: '/',\n /** SameSite policy */\n SAME_SITE: 'lax' as const,\n} as const;\n\n/**\n * User information stored in the user cookie\n */\nexport interface CookieUserInfo {\n id: string;\n email: string;\n name: string;\n}\n\n/**\n * Options for cookie operations\n */\nexport interface CookieOptions {\n /** Max age in seconds (default: 7 days) */\n maxAge?: number;\n /** Whether to use secure cookies (HTTPS only). Auto-detected if not provided */\n secure?: boolean;\n}\n\n/**\n * Determines if secure cookies should be used based on environment\n * @param explicitSecure - Explicit secure value if provided\n * @returns Whether to use secure cookies\n */\nexport function isSecureCookie(explicitSecure?: boolean): boolean {\n if (explicitSecure !== undefined) {\n return explicitSecure;\n }\n // NODE_ENV is automatically set by Next.js runtime ('development' | 'production' | 'test')\n return process.env.NODE_ENV === 'production';\n}\n\n/**\n * Get base cookie options for auth cookies\n * @param options - Optional cookie configuration\n * @returns Cookie options object compatible with Next.js cookies API\n */\nexport function getBaseCookieOptions(\n options?: CookieOptions\n): Omit<ResponseCookie, 'name' | 'value'> {\n const secure = isSecureCookie(options?.secure);\n const maxAge = options?.maxAge ?? COOKIE_DEFAULTS.MAX_AGE;\n\n return {\n httpOnly: true,\n secure,\n sameSite: COOKIE_DEFAULTS.SAME_SITE,\n maxAge,\n path: COOKIE_DEFAULTS.PATH,\n };\n}\n\n/**\n * Get cookie options for clearing/deleting a cookie\n * @param options - Optional cookie configuration\n * @returns Cookie options for deletion (maxAge: 0)\n */\nexport function getClearCookieOptions(\n options?: Pick<CookieOptions, 'secure'>\n): Omit<ResponseCookie, 'name' | 'value'> {\n const secure = isSecureCookie(options?.secure);\n\n return {\n httpOnly: true,\n secure,\n sameSite: COOKIE_DEFAULTS.SAME_SITE,\n maxAge: 0,\n path: COOKIE_DEFAULTS.PATH,\n };\n}\n\n/**\n * Serialize user info for storage in cookie\n * @param user - User information to serialize\n * @returns JSON string of user info\n */\nexport function serializeUserCookie(user: { id: string; email: string; name?: string }): string {\n return JSON.stringify({\n id: user.id,\n email: user.email,\n name: user.name || '',\n });\n}\n\n/**\n * Parse user info from cookie value\n * @param cookieValue - Raw cookie value\n * @returns Parsed user info or null if invalid\n */\nexport function parseUserCookie(cookieValue: string | undefined): CookieUserInfo | null {\n if (!cookieValue) {\n return null;\n }\n\n try {\n const parsed = JSON.parse(cookieValue) as unknown;\n\n // Type guard to validate the parsed data\n if (\n parsed &&\n typeof parsed === 'object' &&\n 'id' in parsed &&\n 'email' in parsed &&\n 'name' in parsed &&\n typeof parsed.id === 'string' &&\n typeof parsed.email === 'string' &&\n typeof parsed.name === 'string'\n ) {\n return parsed as CookieUserInfo;\n }\n\n return null;\n } catch {\n return null;\n }\n}\n"],"mappings":"AAMO,MAAM,eAAe;AAAA;AAAA,EAE1B,SAAS;AAAA;AAAA,EAET,MAAM;AACR;AAKO,MAAM,kBAAkB;AAAA;AAAA,EAE7B,SAAS,IAAI,KAAK,KAAK;AAAA;AAAA,EAEvB,MAAM;AAAA;AAAA,EAEN,WAAW;AACb;AA0BO,SAAS,eAAe,gBAAmC;AAChE,MAAI,mBAAmB,QAAW;AAChC,WAAO;AAAA,EACT;AAEA,SAAO,QAAQ,IAAI,aAAa;AAClC;AAOO,SAAS,qBACd,SACwC;AACxC,QAAM,SAAS,eAAe,SAAS,MAAM;AAC7C,QAAM,SAAS,SAAS,UAAU,gBAAgB;AAElD,SAAO;AAAA,IACL,UAAU;AAAA,IACV;AAAA,IACA,UAAU,gBAAgB;AAAA,IAC1B;AAAA,IACA,MAAM,gBAAgB;AAAA,EACxB;AACF;AAOO,SAAS,sBACd,SACwC;AACxC,QAAM,SAAS,eAAe,SAAS,MAAM;AAE7C,SAAO;AAAA,IACL,UAAU;AAAA,IACV;AAAA,IACA,UAAU,gBAAgB;AAAA,IAC1B,QAAQ;AAAA,IACR,MAAM,gBAAgB;AAAA,EACxB;AACF;AAOO,SAAS,oBAAoB,MAA4D;AAC9F,SAAO,KAAK,UAAU;AAAA,IACpB,IAAI,KAAK;AAAA,IACT,OAAO,KAAK;AAAA,IACZ,MAAM,KAAK,QAAQ;AAAA,EACrB,CAAC;AACH;AAOO,SAAS,gBAAgB,aAAwD;AACtF,MAAI,CAAC,aAAa;AAChB,WAAO;AAAA,EACT;AAEA,MAAI;AACF,UAAM,SAAS,KAAK,MAAM,WAAW;AAGrC,QACE,UACA,OAAO,WAAW,YAClB,QAAQ,UACR,WAAW,UACX,UAAU,UACV,OAAO,OAAO,OAAO,YACrB,OAAO,OAAO,UAAU,YACxB,OAAO,OAAO,SAAS,UACvB;AACA,aAAO;AAAA,IACT;AAEA,WAAO;AAAA,EACT,QAAQ;AACN,WAAO;AAAA,EACT;AACF;","names":[]}
@@ -1,4 +1,5 @@
1
1
  import { NextResponse } from "next/server";
2
+ import { COOKIE_NAMES } from "../lib/cookies";
2
3
  const InsforgeMiddleware = (config) => {
3
4
  const {
4
5
  baseUrl,
@@ -9,39 +10,8 @@ const InsforgeMiddleware = (config) => {
9
10
  afterSignInUrl = "/",
10
11
  useBuiltInAuth = true
11
12
  } = config;
12
- const sessionCookieName = "insforge-session";
13
- const userCookieName = "insforge-user";
14
13
  return function middleware(request) {
15
- const { pathname, searchParams } = request.nextUrl;
16
- const accessToken = searchParams.get("access_token");
17
- const userId = searchParams.get("user_id");
18
- const email = searchParams.get("email");
19
- const name = searchParams.get("name");
20
- if (accessToken && userId && email) {
21
- const response = NextResponse.next();
22
- response.cookies.set(sessionCookieName, accessToken, {
23
- httpOnly: true,
24
- secure: process.env.NODE_ENV === "production",
25
- sameSite: "lax",
26
- path: "/",
27
- maxAge: 60 * 60 * 24 * 7
28
- // 7 days
29
- });
30
- const userInfo = JSON.stringify({
31
- id: userId,
32
- email,
33
- name: name || ""
34
- });
35
- response.cookies.set(userCookieName, userInfo, {
36
- httpOnly: true,
37
- secure: process.env.NODE_ENV === "production",
38
- sameSite: "lax",
39
- path: "/",
40
- maxAge: 60 * 60 * 24 * 7
41
- // 7 days
42
- });
43
- return response;
44
- }
14
+ const { pathname } = request.nextUrl;
45
15
  if (useBuiltInAuth) {
46
16
  const authRouteMapping = {
47
17
  [signInUrl]: "/auth/sign-in",
@@ -65,7 +35,7 @@ const InsforgeMiddleware = (config) => {
65
35
  if (isPublicRoute) {
66
36
  return NextResponse.next();
67
37
  }
68
- const token = request.cookies.get(sessionCookieName)?.value;
38
+ const token = request.cookies.get(COOKIE_NAMES.SESSION)?.value;
69
39
  if (!token) {
70
40
  if (useBuiltInAuth) {
71
41
  const backendSignInUrl = new URL("/auth/sign-in", baseUrl);
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../src/middleware/InsforgeMiddleware.ts"],"sourcesContent":["import { NextRequest, NextResponse } from 'next/server';\n\nexport interface InsforgeMiddlewareConfig {\n /**\n * Base URL of your Insforge backend\n * @example 'https://your-backend.com' or 'http://localhost:3001'\n */\n baseUrl: string;\n\n /**\n * Routes that are public and don't require authentication\n * @default ['/']\n * @example ['/sign-in', '/sign-up', '/', '/about']\n */\n publicRoutes?: string[];\n\n /**\n * Local route path for sign-in (can be customized to any path like '/login')\n * When using built-in auth, this will redirect to backend's `/auth/sign-in`\n * @default '/sign-in'\n */\n signInUrl?: string;\n\n /**\n * Local route path for sign-up (can be customized to any path like '/register')\n * When using built-in auth, this will redirect to backend's `/auth/sign-up`\n * @default '/sign-up'\n */\n signUpUrl?: string;\n\n /**\n * Local route path for forgot password\n * When using built-in auth, this will redirect to backend's `/auth/forgot-password`\n * @default '/forgot-password'\n */\n forgotPasswordUrl?: string;\n\n /**\n * URL to redirect to after successful authentication\n * When user completes sign-in/sign-up, they will be redirected to this URL with token in URL\n * @default '/'\n */\n afterSignInUrl?: string;\n\n /**\n * Whether to use built-in authentication pages hosted on the backend\n * - When true: redirects to backend's `/auth/sign-in` and `/auth/sign-up` pages\n * - When false: redirects to local sign-in/sign-up pages (you provide your own components)\n * @default true\n */\n useBuiltInAuth?: boolean;\n}\n\n/**\n * Creates Next.js middleware for protecting routes with Insforge authentication.\n *\n * This middleware provides lightweight route protection by:\n * - Detecting and storing auth tokens from URL parameters (after backend redirect)\n * - Checking for auth token presence in cookies\n * - Redirecting unauthenticated users to sign-in page\n * - Allowing public routes to be accessed without authentication\n * - Mapping local auth routes to backend's fixed paths when using built-in auth\n *\n * **How Authentication Flow Works:**\n * 1. User visits protected route → Middleware checks for token\n * 2. No token → Redirects to sign-in (backend or local)\n * 3. User accesses auth page (e.g., /sign-in) → Redirects to backend with afterSignInUrl as redirect target\n * 4. After sign-in → Backend redirects to `yourapp.com/afterSignInUrl?access_token=xxx&user_id=xxx...`\n * 5. Middleware detects `access_token` in URL → Stores in HTTP-only cookie → Cleans URL → Allows access\n * 6. SDK also detects token from URL → Stores in localStorage → Updates auth state\n *\n * **Important Notes:**\n * - This middleware only checks if a token exists, it doesn't validate it\n * - Tokens from URL are automatically extracted and stored in cookies\n * - When `useBuiltInAuth: true`, local routes map to backend's fixed auth paths\n * - You can customize local route paths (e.g., `/login`) while backend paths remain fixed\n * - After successful auth, users are redirected to `afterSignInUrl` (default: `/`), not back to the auth page\n *\n * @param config - Middleware configuration\n * @returns Next.js middleware function\n *\n * @example\n * ```ts\n * // middleware.ts - Using built-in auth\n * import { InsforgeMiddleware } from '@insforge/nextjs/middleware';\n *\n * export default InsforgeMiddleware({\n * baseUrl: process.env.INSFORGE_BASE_URL!,\n * publicRoutes: ['/', '/about'],\n * afterSignInUrl: '/', // Redirect here after successful auth\n * useBuiltInAuth: true,\n * });\n *\n * export const config = {\n * matcher: ['/((?!_next|api|.*\\\\..*).*)'],\n * };\n * ```\n *\n * @example\n * ```ts\n * // middleware.ts - Custom local auth pages with custom paths\n * import { InsforgeMiddleware } from '@insforge/nextjs/middleware';\n *\n * export default InsforgeMiddleware({\n * baseUrl: process.env.INSFORGE_BASE_URL!,\n * publicRoutes: ['/login', '/register', '/', '/about'],\n * signInUrl: '/login',\n * signUpUrl: '/register',\n * afterSignInUrl: '/dashboard',\n * useBuiltInAuth: false,\n * });\n *\n * export const config = {\n * matcher: ['/((?!_next|api|.*\\\\..*).*)'],\n * };\n * ```\n *\n * @example\n * ```ts\n * // middleware.ts - Built-in auth with custom auth route paths\n * import { InsforgeMiddleware } from '@insforge/nextjs/middleware';\n *\n * export default InsforgeMiddleware({\n * baseUrl: 'https://your-backend.com',\n * signInUrl: '/login',\n * signUpUrl: '/register',\n * forgotPasswordUrl: '/forgot',\n * afterSignInUrl: '/dashboard',\n * useBuiltInAuth: true,\n * });\n * ```\n */\nexport const InsforgeMiddleware = (config: InsforgeMiddlewareConfig) => {\n const {\n baseUrl,\n publicRoutes = ['/'],\n signInUrl = '/sign-in',\n signUpUrl = '/sign-up',\n forgotPasswordUrl = '/forgot-password',\n afterSignInUrl = '/',\n useBuiltInAuth = true,\n } = config;\n\n // Fixed cookie names - not configurable\n const sessionCookieName = 'insforge-session';\n const userCookieName = 'insforge-user';\n\n return function middleware(request: NextRequest) {\n const { pathname, searchParams } = request.nextUrl;\n\n // STEP 1: Check if URL contains access_token (from backend redirect after auth)\n const accessToken = searchParams.get('access_token');\n const userId = searchParams.get('user_id');\n const email = searchParams.get('email');\n const name = searchParams.get('name');\n\n if (accessToken && userId && email) {\n // Token detected in URL - store it in HTTP-only cookies\n const response = NextResponse.next();\n\n // Set session cookie (access token)\n response.cookies.set(sessionCookieName, accessToken, {\n httpOnly: true,\n secure: process.env.NODE_ENV === 'production',\n sameSite: 'lax',\n path: '/',\n maxAge: 60 * 60 * 24 * 7, // 7 days\n });\n\n // Set user identity cookie (basic user info for SSR)\n const userInfo = JSON.stringify({\n id: userId,\n email: email,\n name: name || '',\n });\n\n response.cookies.set(userCookieName, userInfo, {\n httpOnly: true,\n secure: process.env.NODE_ENV === 'production',\n sameSite: 'lax',\n path: '/',\n maxAge: 60 * 60 * 24 * 7, // 7 days\n });\n\n return response;\n }\n\n // STEP 2: Handle built-in auth redirects for authentication pages\n // Map local auth routes to backend's fixed auth pages\n if (useBuiltInAuth) {\n const authRouteMapping: Record<string, string> = {\n [signInUrl]: '/auth/sign-in',\n [signUpUrl]: '/auth/sign-up',\n [forgotPasswordUrl]: '/auth/forgot-password',\n };\n\n const backendAuthPath = authRouteMapping[pathname];\n if (backendAuthPath) {\n // Redirect to afterSignInUrl after successful authentication\n const redirectUrl = new URL(afterSignInUrl, request.url).toString();\n const backendAuthUrl = new URL(backendAuthPath, baseUrl);\n backendAuthUrl.searchParams.set('redirect', redirectUrl);\n return NextResponse.redirect(backendAuthUrl.toString());\n }\n }\n\n // STEP 3: Check if route is public\n const isPublicRoute = publicRoutes.some((route) => {\n if (route.endsWith('*')) {\n // Wildcard route: /admin/* matches /admin/anything\n return pathname.startsWith(route.slice(0, -1));\n }\n // Exact match or starts with route path\n return pathname === route || pathname.startsWith(route + '/');\n });\n\n if (isPublicRoute) {\n return NextResponse.next();\n }\n\n // STEP 4: Check for authentication token in cookies\n const token = request.cookies.get(sessionCookieName)?.value;\n\n if (!token) {\n // No token found, redirect to sign-in\n if (useBuiltInAuth) {\n // Built-in auth: redirect to backend's /auth/sign-in page\n // Backend will redirect back to current URL with token\n const backendSignInUrl = new URL('/auth/sign-in', baseUrl);\n backendSignInUrl.searchParams.set('redirect', request.url);\n return NextResponse.redirect(backendSignInUrl);\n } else {\n // Custom auth: redirect to local sign-in page\n const localSignInUrl = new URL(signInUrl, request.url);\n localSignInUrl.searchParams.set('redirect', pathname);\n return NextResponse.redirect(localSignInUrl);\n }\n }\n\n // Token exists in cookie, allow request to continue\n return NextResponse.next();\n };\n};\n"],"mappings":"AAAA,SAAsB,oBAAoB;AAoInC,MAAM,qBAAqB,CAAC,WAAqC;AACtE,QAAM;AAAA,IACJ;AAAA,IACA,eAAe,CAAC,GAAG;AAAA,IACnB,YAAY;AAAA,IACZ,YAAY;AAAA,IACZ,oBAAoB;AAAA,IACpB,iBAAiB;AAAA,IACjB,iBAAiB;AAAA,EACnB,IAAI;AAGJ,QAAM,oBAAoB;AAC1B,QAAM,iBAAiB;AAEvB,SAAO,SAAS,WAAW,SAAsB;AAC/C,UAAM,EAAE,UAAU,aAAa,IAAI,QAAQ;AAG3C,UAAM,cAAc,aAAa,IAAI,cAAc;AACnD,UAAM,SAAS,aAAa,IAAI,SAAS;AACzC,UAAM,QAAQ,aAAa,IAAI,OAAO;AACtC,UAAM,OAAO,aAAa,IAAI,MAAM;AAEpC,QAAI,eAAe,UAAU,OAAO;AAElC,YAAM,WAAW,aAAa,KAAK;AAGnC,eAAS,QAAQ,IAAI,mBAAmB,aAAa;AAAA,QACnD,UAAU;AAAA,QACV,QAAQ,QAAQ,IAAI,aAAa;AAAA,QACjC,UAAU;AAAA,QACV,MAAM;AAAA,QACN,QAAQ,KAAK,KAAK,KAAK;AAAA;AAAA,MACzB,CAAC;AAGD,YAAM,WAAW,KAAK,UAAU;AAAA,QAC9B,IAAI;AAAA,QACJ;AAAA,QACA,MAAM,QAAQ;AAAA,MAChB,CAAC;AAED,eAAS,QAAQ,IAAI,gBAAgB,UAAU;AAAA,QAC7C,UAAU;AAAA,QACV,QAAQ,QAAQ,IAAI,aAAa;AAAA,QACjC,UAAU;AAAA,QACV,MAAM;AAAA,QACN,QAAQ,KAAK,KAAK,KAAK;AAAA;AAAA,MACzB,CAAC;AAED,aAAO;AAAA,IACT;AAIA,QAAI,gBAAgB;AAClB,YAAM,mBAA2C;AAAA,QAC/C,CAAC,SAAS,GAAG;AAAA,QACb,CAAC,SAAS,GAAG;AAAA,QACb,CAAC,iBAAiB,GAAG;AAAA,MACvB;AAEA,YAAM,kBAAkB,iBAAiB,QAAQ;AACjD,UAAI,iBAAiB;AAEnB,cAAM,cAAc,IAAI,IAAI,gBAAgB,QAAQ,GAAG,EAAE,SAAS;AAClE,cAAM,iBAAiB,IAAI,IAAI,iBAAiB,OAAO;AACvD,uBAAe,aAAa,IAAI,YAAY,WAAW;AACvD,eAAO,aAAa,SAAS,eAAe,SAAS,CAAC;AAAA,MACxD;AAAA,IACF;AAGA,UAAM,gBAAgB,aAAa,KAAK,CAAC,UAAU;AACjD,UAAI,MAAM,SAAS,GAAG,GAAG;AAEvB,eAAO,SAAS,WAAW,MAAM,MAAM,GAAG,EAAE,CAAC;AAAA,MAC/C;AAEA,aAAO,aAAa,SAAS,SAAS,WAAW,QAAQ,GAAG;AAAA,IAC9D,CAAC;AAED,QAAI,eAAe;AACjB,aAAO,aAAa,KAAK;AAAA,IAC3B;AAGA,UAAM,QAAQ,QAAQ,QAAQ,IAAI,iBAAiB,GAAG;AAEtD,QAAI,CAAC,OAAO;AAEV,UAAI,gBAAgB;AAGlB,cAAM,mBAAmB,IAAI,IAAI,iBAAiB,OAAO;AACzD,yBAAiB,aAAa,IAAI,YAAY,QAAQ,GAAG;AACzD,eAAO,aAAa,SAAS,gBAAgB;AAAA,MAC/C,OAAO;AAEL,cAAM,iBAAiB,IAAI,IAAI,WAAW,QAAQ,GAAG;AACrD,uBAAe,aAAa,IAAI,YAAY,QAAQ;AACpD,eAAO,aAAa,SAAS,cAAc;AAAA,MAC7C;AAAA,IACF;AAGA,WAAO,aAAa,KAAK;AAAA,EAC3B;AACF;","names":[]}
1
+ {"version":3,"sources":["../../../src/middleware/InsforgeMiddleware.ts"],"sourcesContent":["import { NextRequest, NextResponse } from 'next/server';\nimport { COOKIE_NAMES } from '../lib/cookies';\n\nexport interface InsforgeMiddlewareConfig {\n /**\n * Base URL of your Insforge backend\n * @example 'https://your-backend.com' or 'http://localhost:3001'\n */\n baseUrl: string;\n\n /**\n * Routes that are public and don't require authentication\n * @default ['/']\n * @example ['/sign-in', '/sign-up', '/', '/about']\n */\n publicRoutes?: string[];\n\n /**\n * Local route path for sign-in (can be customized to any path like '/login')\n * When using built-in auth, this will redirect to backend's `/auth/sign-in`\n * @default '/sign-in'\n */\n signInUrl?: string;\n\n /**\n * Local route path for sign-up (can be customized to any path like '/register')\n * When using built-in auth, this will redirect to backend's `/auth/sign-up`\n * @default '/sign-up'\n */\n signUpUrl?: string;\n\n /**\n * Local route path for forgot password\n * When using built-in auth, this will redirect to backend's `/auth/forgot-password`\n * @default '/forgot-password'\n */\n forgotPasswordUrl?: string;\n\n /**\n * URL to redirect to after successful authentication\n * When user completes sign-in/sign-up, they will be redirected to this URL with token in URL\n * @default '/'\n */\n afterSignInUrl?: string;\n\n /**\n * Whether to use built-in authentication pages hosted on the backend\n * - When true: redirects to backend's `/auth/sign-in` and `/auth/sign-up` pages\n * - When false: redirects to local sign-in/sign-up pages (you provide your own components)\n * @default true\n */\n useBuiltInAuth?: boolean;\n}\n\n/**\n * Creates Next.js middleware for protecting routes with Insforge authentication.\n *\n * This middleware provides lightweight route protection by:\n * - Detecting and storing auth tokens from URL parameters (after backend redirect)\n * - Checking for auth token presence in cookies\n * - Redirecting unauthenticated users to sign-in page\n * - Allowing public routes to be accessed without authentication\n * - Mapping local auth routes to backend's fixed paths when using built-in auth\n *\n * **How Authentication Flow Works:**\n * 1. User visits protected route → Middleware checks for token\n * 2. No token → Redirects to sign-in (backend or local)\n * 3. User accesses auth page (e.g., /sign-in) → Redirects to backend with afterSignInUrl as redirect target\n * 4. After sign-in → Backend redirects to `yourapp.com/afterSignInUrl?access_token=xxx&user_id=xxx...`\n * 5. Middleware detects `access_token` in URL → Stores in HTTP-only cookie → Cleans URL → Allows access\n * 6. SDK also detects token from URL → Stores in localStorage → Updates auth state\n *\n * **Important Notes:**\n * - This middleware only checks if a token exists, it doesn't validate it\n * - Tokens from URL are automatically extracted and stored in cookies\n * - When `useBuiltInAuth: true`, local routes map to backend's fixed auth paths\n * - You can customize local route paths (e.g., `/login`) while backend paths remain fixed\n * - After successful auth, users are redirected to `afterSignInUrl` (default: `/`), not back to the auth page\n *\n * @param config - Middleware configuration\n * @returns Next.js middleware function\n *\n * @example\n * ```ts\n * // middleware.ts - Using built-in auth\n * import { InsforgeMiddleware } from '@insforge/nextjs/middleware';\n *\n * export default InsforgeMiddleware({\n * baseUrl: process.env.INSFORGE_BASE_URL!,\n * publicRoutes: ['/', '/about'],\n * afterSignInUrl: '/', // Redirect here after successful auth\n * useBuiltInAuth: true,\n * });\n *\n * export const config = {\n * matcher: ['/((?!_next|api|.*\\\\..*).*)'],\n * };\n * ```\n *\n * @example\n * ```ts\n * // middleware.ts - Custom local auth pages with custom paths\n * import { InsforgeMiddleware } from '@insforge/nextjs/middleware';\n *\n * export default InsforgeMiddleware({\n * baseUrl: process.env.INSFORGE_BASE_URL!,\n * publicRoutes: ['/login', '/register', '/', '/about'],\n * signInUrl: '/login',\n * signUpUrl: '/register',\n * afterSignInUrl: '/dashboard',\n * useBuiltInAuth: false,\n * });\n *\n * export const config = {\n * matcher: ['/((?!_next|api|.*\\\\..*).*)'],\n * };\n * ```\n *\n * @example\n * ```ts\n * // middleware.ts - Built-in auth with custom auth route paths\n * import { InsforgeMiddleware } from '@insforge/nextjs/middleware';\n *\n * export default InsforgeMiddleware({\n * baseUrl: 'https://your-backend.com',\n * signInUrl: '/login',\n * signUpUrl: '/register',\n * forgotPasswordUrl: '/forgot',\n * afterSignInUrl: '/dashboard',\n * useBuiltInAuth: true,\n * });\n * ```\n */\nexport const InsforgeMiddleware = (config: InsforgeMiddlewareConfig) => {\n const {\n baseUrl,\n publicRoutes = ['/'],\n signInUrl = '/sign-in',\n signUpUrl = '/sign-up',\n forgotPasswordUrl = '/forgot-password',\n afterSignInUrl = '/',\n useBuiltInAuth = true,\n } = config;\n\n return function middleware(request: NextRequest) {\n const { pathname } = request.nextUrl;\n\n // STEP 1: Handle built-in auth redirects for authentication pages\n // Map local auth routes to backend's fixed auth pages\n if (useBuiltInAuth) {\n const authRouteMapping: Record<string, string> = {\n [signInUrl]: '/auth/sign-in',\n [signUpUrl]: '/auth/sign-up',\n [forgotPasswordUrl]: '/auth/forgot-password',\n };\n\n const backendAuthPath = authRouteMapping[pathname];\n if (backendAuthPath) {\n // Redirect to afterSignInUrl after successful authentication\n const redirectUrl = new URL(afterSignInUrl, request.url).toString();\n const backendAuthUrl = new URL(backendAuthPath, baseUrl);\n backendAuthUrl.searchParams.set('redirect', redirectUrl);\n return NextResponse.redirect(backendAuthUrl.toString());\n }\n }\n\n // STEP 2: Check if route is public\n const isPublicRoute = publicRoutes.some((route) => {\n if (route.endsWith('*')) {\n // Wildcard route: /admin/* matches /admin/anything\n return pathname.startsWith(route.slice(0, -1));\n }\n // Exact match or starts with route path\n return pathname === route || pathname.startsWith(route + '/');\n });\n\n if (isPublicRoute) {\n return NextResponse.next();\n }\n\n // STEP 3: Check for authentication token in cookies\n const token = request.cookies.get(COOKIE_NAMES.SESSION)?.value;\n\n if (!token) {\n // No token found, redirect to sign-in\n if (useBuiltInAuth) {\n // Built-in auth: redirect to backend's /auth/sign-in page\n // Backend will redirect back to current URL with token\n const backendSignInUrl = new URL('/auth/sign-in', baseUrl);\n backendSignInUrl.searchParams.set('redirect', request.url);\n return NextResponse.redirect(backendSignInUrl);\n } else {\n // Custom auth: redirect to local sign-in page\n const localSignInUrl = new URL(signInUrl, request.url);\n localSignInUrl.searchParams.set('redirect', pathname);\n return NextResponse.redirect(localSignInUrl);\n }\n }\n\n // Token exists in cookie, allow request to continue\n return NextResponse.next();\n };\n};\n"],"mappings":"AAAA,SAAsB,oBAAoB;AAC1C,SAAS,oBAAoB;AAoItB,MAAM,qBAAqB,CAAC,WAAqC;AACtE,QAAM;AAAA,IACJ;AAAA,IACA,eAAe,CAAC,GAAG;AAAA,IACnB,YAAY;AAAA,IACZ,YAAY;AAAA,IACZ,oBAAoB;AAAA,IACpB,iBAAiB;AAAA,IACjB,iBAAiB;AAAA,EACnB,IAAI;AAEJ,SAAO,SAAS,WAAW,SAAsB;AAC/C,UAAM,EAAE,SAAS,IAAI,QAAQ;AAI7B,QAAI,gBAAgB;AAClB,YAAM,mBAA2C;AAAA,QAC/C,CAAC,SAAS,GAAG;AAAA,QACb,CAAC,SAAS,GAAG;AAAA,QACb,CAAC,iBAAiB,GAAG;AAAA,MACvB;AAEA,YAAM,kBAAkB,iBAAiB,QAAQ;AACjD,UAAI,iBAAiB;AAEnB,cAAM,cAAc,IAAI,IAAI,gBAAgB,QAAQ,GAAG,EAAE,SAAS;AAClE,cAAM,iBAAiB,IAAI,IAAI,iBAAiB,OAAO;AACvD,uBAAe,aAAa,IAAI,YAAY,WAAW;AACvD,eAAO,aAAa,SAAS,eAAe,SAAS,CAAC;AAAA,MACxD;AAAA,IACF;AAGA,UAAM,gBAAgB,aAAa,KAAK,CAAC,UAAU;AACjD,UAAI,MAAM,SAAS,GAAG,GAAG;AAEvB,eAAO,SAAS,WAAW,MAAM,MAAM,GAAG,EAAE,CAAC;AAAA,MAC/C;AAEA,aAAO,aAAa,SAAS,SAAS,WAAW,QAAQ,GAAG;AAAA,IAC9D,CAAC;AAED,QAAI,eAAe;AACjB,aAAO,aAAa,KAAK;AAAA,IAC3B;AAGA,UAAM,QAAQ,QAAQ,QAAQ,IAAI,aAAa,OAAO,GAAG;AAEzD,QAAI,CAAC,OAAO;AAEV,UAAI,gBAAgB;AAGlB,cAAM,mBAAmB,IAAI,IAAI,iBAAiB,OAAO;AACzD,yBAAiB,aAAa,IAAI,YAAY,QAAQ,GAAG;AACzD,eAAO,aAAa,SAAS,gBAAgB;AAAA,MAC/C,OAAO;AAEL,cAAM,iBAAiB,IAAI,IAAI,WAAW,QAAQ,GAAG;AACrD,uBAAe,aAAa,IAAI,YAAY,QAAQ;AACpD,eAAO,aAAa,SAAS,cAAc;AAAA,MAC7C;AAAA,IACF;AAGA,WAAO,aAAa,KAAK;AAAA,EAC3B;AACF;","names":[]}
@@ -1,23 +1,11 @@
1
1
  import { cookies } from "next/headers";
2
+ import { COOKIE_NAMES, parseUserCookie } from "../lib/cookies";
2
3
  async function auth() {
3
4
  const cookieStore = await cookies();
4
- const sessionCookieName = "insforge-session";
5
- const userCookieName = "insforge-user";
6
- const token = cookieStore.get(sessionCookieName)?.value || null;
7
- const userCookie = cookieStore.get(userCookieName)?.value;
8
- let user = null;
9
- let userId = null;
10
- if (userCookie) {
11
- try {
12
- const parsed = JSON.parse(userCookie);
13
- if (parsed && typeof parsed === "object" && "id" in parsed && "email" in parsed && "name" in parsed && typeof parsed.id === "string" && typeof parsed.email === "string" && typeof parsed.name === "string") {
14
- user = parsed;
15
- userId = user.id;
16
- }
17
- } catch (error) {
18
- console.error("[InsForge Auth] Failed to parse user cookie:", error);
19
- }
20
- }
5
+ const token = cookieStore.get(COOKIE_NAMES.SESSION)?.value || null;
6
+ const userCookie = cookieStore.get(COOKIE_NAMES.USER)?.value;
7
+ const user = parseUserCookie(userCookie);
8
+ const userId = user?.id || null;
21
9
  return {
22
10
  userId,
23
11
  token,
@@ -1 +1 @@
1
- {"version":3,"sources":["../../../src/server/auth.ts"],"sourcesContent":["import { cookies } from 'next/headers';\n\n/**\n * Session information extracted from cookies\n */\nexport interface InsforgeAuth {\n /**\n * The current user's ID, or null if not authenticated\n */\n userId: string | null;\n\n /**\n * The current session token, or null if not authenticated\n */\n token: string | null;\n\n /**\n * User information (email, name) if available\n */\n user: {\n id: string;\n email: string;\n name: string;\n } | null;\n}\n\n/**\n * Get authentication information from cookies in Server Components,\n * Route Handlers, and Server Actions.\n *\n * This function reads the HTTP-only cookies set by the middleware\n * and returns user authentication data.\n *\n * @example\n * ```ts\n * // In a Server Component\n * import { auth } from '@insforge/nextjs/server';\n *\n * export default async function Page() {\n * const { userId, token } = await auth();\n *\n * if (!userId) {\n * return <div>Not authenticated</div>;\n * }\n *\n * return <div>User ID: {userId}</div>;\n * }\n * ```\n *\n * @example\n * ```ts\n * // In an API Route Handler\n * import { auth } from '@insforge/nextjs/server';\n * import { createClient } from '@insforge/sdk';\n *\n * export async function GET() {\n * const { userId, token } = await auth();\n *\n * if (!userId || !token) {\n * return Response.json({ error: 'Unauthorized' }, { status: 401 });\n * }\n *\n * // Use token with SDK\n * const insforge = createClient({\n * baseUrl: process.env.INSFORGE_BASE_URL!,\n * edgeFunctionToken: token,\n * });\n *\n * const result = await insforge.database.from('posts').select();\n * return Response.json(result.data);\n * }\n * ```\n *\n * @example\n * ```ts\n * // In a Server Action\n * 'use server';\n *\n * import { auth } from '@insforge/nextjs/server';\n *\n * export async function createPost(formData: FormData) {\n * const { userId } = await auth();\n *\n * if (!userId) {\n * throw new Error('Not authenticated');\n * }\n *\n * // Create post with userId\n * }\n * ```\n */\nexport async function auth(): Promise<InsforgeAuth> {\n const cookieStore = await cookies();\n\n // Fixed cookie names (same as middleware and route handlers)\n const sessionCookieName = 'insforge-session';\n const userCookieName = 'insforge-user';\n\n // Get session token\n const token = cookieStore.get(sessionCookieName)?.value || null;\n\n // Get user info\n const userCookie = cookieStore.get(userCookieName)?.value;\n let user: { id: string; email: string; name: string } | null = null;\n let userId: string | null = null;\n\n if (userCookie) {\n try {\n const parsed = JSON.parse(userCookie) as unknown;\n // Type guard to validate the parsed data\n if (\n parsed &&\n typeof parsed === 'object' &&\n 'id' in parsed &&\n 'email' in parsed &&\n 'name' in parsed &&\n typeof parsed.id === 'string' &&\n typeof parsed.email === 'string' &&\n typeof parsed.name === 'string'\n ) {\n user = parsed as { id: string; email: string; name: string };\n userId = user.id;\n }\n } catch (error) {\n console.error('[InsForge Auth] Failed to parse user cookie:', error);\n }\n }\n\n return {\n userId,\n token,\n user,\n };\n}\n"],"mappings":"AAAA,SAAS,eAAe;AA2FxB,eAAsB,OAA8B;AAClD,QAAM,cAAc,MAAM,QAAQ;AAGlC,QAAM,oBAAoB;AAC1B,QAAM,iBAAiB;AAGvB,QAAM,QAAQ,YAAY,IAAI,iBAAiB,GAAG,SAAS;AAG3D,QAAM,aAAa,YAAY,IAAI,cAAc,GAAG;AACpD,MAAI,OAA2D;AAC/D,MAAI,SAAwB;AAE5B,MAAI,YAAY;AACd,QAAI;AACF,YAAM,SAAS,KAAK,MAAM,UAAU;AAEpC,UACE,UACA,OAAO,WAAW,YAClB,QAAQ,UACR,WAAW,UACX,UAAU,UACV,OAAO,OAAO,OAAO,YACrB,OAAO,OAAO,UAAU,YACxB,OAAO,OAAO,SAAS,UACvB;AACA,eAAO;AACP,iBAAS,KAAK;AAAA,MAChB;AAAA,IACF,SAAS,OAAO;AACd,cAAQ,MAAM,gDAAgD,KAAK;AAAA,IACrE;AAAA,EACF;AAEA,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;","names":[]}
1
+ {"version":3,"sources":["../../../src/server/auth.ts"],"sourcesContent":["import { cookies } from 'next/headers';\nimport { COOKIE_NAMES, parseUserCookie, type CookieUserInfo } from '../lib/cookies';\n\n/**\n * Session information extracted from cookies\n */\nexport interface InsforgeAuth {\n /**\n * The current user's ID, or null if not authenticated\n */\n userId: string | null;\n\n /**\n * The current session token, or null if not authenticated\n */\n token: string | null;\n\n /**\n * User information (email, name) if available\n */\n user: CookieUserInfo | null;\n}\n\n/**\n * Get authentication information from cookies in Server Components,\n * Route Handlers, and Server Actions.\n *\n * This function reads the HTTP-only cookies set by the middleware\n * and returns user authentication data.\n *\n * @example\n * ```ts\n * // In a Server Component\n * import { auth } from '@insforge/nextjs/server';\n *\n * export default async function Page() {\n * const { userId, token } = await auth();\n *\n * if (!userId) {\n * return <div>Not authenticated</div>;\n * }\n *\n * return <div>User ID: {userId}</div>;\n * }\n * ```\n *\n * @example\n * ```ts\n * // In an API Route Handler\n * import { auth } from '@insforge/nextjs/server';\n * import { createClient } from '@insforge/sdk';\n *\n * export async function GET() {\n * const { userId, token } = await auth();\n *\n * if (!userId || !token) {\n * return Response.json({ error: 'Unauthorized' }, { status: 401 });\n * }\n *\n * // Use token with SDK\n * const insforge = createClient({\n * baseUrl: process.env.INSFORGE_BASE_URL!,\n * edgeFunctionToken: token,\n * });\n *\n * const result = await insforge.database.from('posts').select();\n * return Response.json(result.data);\n * }\n * ```\n *\n * @example\n * ```ts\n * // In a Server Action\n * 'use server';\n *\n * import { auth } from '@insforge/nextjs/server';\n *\n * export async function createPost(formData: FormData) {\n * const { userId } = await auth();\n *\n * if (!userId) {\n * throw new Error('Not authenticated');\n * }\n *\n * // Create post with userId\n * }\n * ```\n */\nexport async function auth(): Promise<InsforgeAuth> {\n const cookieStore = await cookies();\n\n // Get session token\n const token = cookieStore.get(COOKIE_NAMES.SESSION)?.value || null;\n\n // Get user info using centralized parsing\n const userCookie = cookieStore.get(COOKIE_NAMES.USER)?.value;\n const user = parseUserCookie(userCookie);\n const userId = user?.id || null;\n\n return {\n userId,\n token,\n user,\n };\n}\n"],"mappings":"AAAA,SAAS,eAAe;AACxB,SAAS,cAAc,uBAA4C;AAuFnE,eAAsB,OAA8B;AAClD,QAAM,cAAc,MAAM,QAAQ;AAGlC,QAAM,QAAQ,YAAY,IAAI,aAAa,OAAO,GAAG,SAAS;AAG9D,QAAM,aAAa,YAAY,IAAI,aAAa,IAAI,GAAG;AACvD,QAAM,OAAO,gBAAgB,UAAU;AACvC,QAAM,SAAS,MAAM,MAAM;AAE3B,SAAO;AAAA,IACL;AAAA,IACA;AAAA,IACA;AAAA,EACF;AACF;","names":[]}
@@ -0,0 +1,76 @@
1
+ import { ResponseCookie } from 'next/dist/compiled/@edge-runtime/cookies';
2
+
3
+ /**
4
+ * Cookie names used by Insforge authentication
5
+ * These are fixed and should not be changed to ensure consistency
6
+ */
7
+ declare const COOKIE_NAMES: {
8
+ /** Session cookie storing the access token */
9
+ readonly SESSION: "insforge-session";
10
+ /** User info cookie storing basic user data for SSR */
11
+ readonly USER: "insforge-user";
12
+ };
13
+ /**
14
+ * Default cookie configuration values
15
+ */
16
+ declare const COOKIE_DEFAULTS: {
17
+ /** Default max age: 7 days in seconds */
18
+ readonly MAX_AGE: number;
19
+ /** Cookie path */
20
+ readonly PATH: "/";
21
+ /** SameSite policy */
22
+ readonly SAME_SITE: "lax";
23
+ };
24
+ /**
25
+ * User information stored in the user cookie
26
+ */
27
+ interface CookieUserInfo {
28
+ id: string;
29
+ email: string;
30
+ name: string;
31
+ }
32
+ /**
33
+ * Options for cookie operations
34
+ */
35
+ interface CookieOptions {
36
+ /** Max age in seconds (default: 7 days) */
37
+ maxAge?: number;
38
+ /** Whether to use secure cookies (HTTPS only). Auto-detected if not provided */
39
+ secure?: boolean;
40
+ }
41
+ /**
42
+ * Determines if secure cookies should be used based on environment
43
+ * @param explicitSecure - Explicit secure value if provided
44
+ * @returns Whether to use secure cookies
45
+ */
46
+ declare function isSecureCookie(explicitSecure?: boolean): boolean;
47
+ /**
48
+ * Get base cookie options for auth cookies
49
+ * @param options - Optional cookie configuration
50
+ * @returns Cookie options object compatible with Next.js cookies API
51
+ */
52
+ declare function getBaseCookieOptions(options?: CookieOptions): Omit<ResponseCookie, 'name' | 'value'>;
53
+ /**
54
+ * Get cookie options for clearing/deleting a cookie
55
+ * @param options - Optional cookie configuration
56
+ * @returns Cookie options for deletion (maxAge: 0)
57
+ */
58
+ declare function getClearCookieOptions(options?: Pick<CookieOptions, 'secure'>): Omit<ResponseCookie, 'name' | 'value'>;
59
+ /**
60
+ * Serialize user info for storage in cookie
61
+ * @param user - User information to serialize
62
+ * @returns JSON string of user info
63
+ */
64
+ declare function serializeUserCookie(user: {
65
+ id: string;
66
+ email: string;
67
+ name?: string;
68
+ }): string;
69
+ /**
70
+ * Parse user info from cookie value
71
+ * @param cookieValue - Raw cookie value
72
+ * @returns Parsed user info or null if invalid
73
+ */
74
+ declare function parseUserCookie(cookieValue: string | undefined): CookieUserInfo | null;
75
+
76
+ export { COOKIE_DEFAULTS, COOKIE_NAMES, type CookieOptions, type CookieUserInfo, getBaseCookieOptions, getClearCookieOptions, isSecureCookie, parseUserCookie, serializeUserCookie };
@@ -1,3 +1,6 @@
1
+ import { CookieUserInfo } from '../lib/cookies.js';
2
+ import 'next/dist/compiled/@edge-runtime/cookies';
3
+
1
4
  /**
2
5
  * Session information extracted from cookies
3
6
  */
@@ -13,11 +16,7 @@ interface InsforgeAuth {
13
16
  /**
14
17
  * User information (email, name) if available
15
18
  */
16
- user: {
17
- id: string;
18
- email: string;
19
- name: string;
20
- } | null;
19
+ user: CookieUserInfo | null;
21
20
  }
22
21
  /**
23
22
  * Get authentication information from cookies in Server Components,
@@ -3,3 +3,5 @@ export { InsforgeAuth, auth } from './auth.js';
3
3
  import 'react/jsx-runtime';
4
4
  import 'react';
5
5
  import '@insforge/react';
6
+ import '../lib/cookies.js';
7
+ import 'next/dist/compiled/@edge-runtime/cookies';
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@insforge/nextjs",
3
- "version": "1.0.2-dev.1",
3
+ "version": "1.0.2-dev.2",
4
4
  "description": "Pre-built authentication UI components for Next.js with Insforge backend - zero configuration required",
5
5
  "type": "module",
6
6
  "types": "./dist/index.d.ts",