@judo/auth 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. package/LICENSE +277 -0
  2. package/README.md +131 -0
  3. package/dist/components/actor-auth-boundary.d.ts +38 -0
  4. package/dist/components/actor-auth-boundary.d.ts.map +1 -0
  5. package/dist/components/actor-switch-dialog.d.ts +38 -0
  6. package/dist/components/actor-switch-dialog.d.ts.map +1 -0
  7. package/dist/components/index.d.ts +3 -0
  8. package/dist/components/index.d.ts.map +1 -0
  9. package/dist/config/auth-config.d.ts +34 -0
  10. package/dist/config/auth-config.d.ts.map +1 -0
  11. package/dist/config/index.d.ts +3 -0
  12. package/dist/config/index.d.ts.map +1 -0
  13. package/dist/config/oidc-config.d.ts +58 -0
  14. package/dist/config/oidc-config.d.ts.map +1 -0
  15. package/dist/hooks/index.d.ts +4 -0
  16. package/dist/hooks/index.d.ts.map +1 -0
  17. package/dist/hooks/use-actor-switch.d.ts +44 -0
  18. package/dist/hooks/use-actor-switch.d.ts.map +1 -0
  19. package/dist/hooks/use-auth.d.ts +54 -0
  20. package/dist/hooks/use-auth.d.ts.map +1 -0
  21. package/dist/hooks/use-require-auth.d.ts +14 -0
  22. package/dist/hooks/use-require-auth.d.ts.map +1 -0
  23. package/dist/index.d.ts +12 -0
  24. package/dist/index.d.ts.map +1 -0
  25. package/dist/index.js +315 -0
  26. package/dist/index.js.map +1 -0
  27. package/dist/provider/auth-config-context.d.ts +36 -0
  28. package/dist/provider/auth-config-context.d.ts.map +1 -0
  29. package/dist/provider/index.d.ts +5 -0
  30. package/dist/provider/index.d.ts.map +1 -0
  31. package/dist/provider/judo-auth-provider.d.ts +19 -0
  32. package/dist/provider/judo-auth-provider.d.ts.map +1 -0
  33. package/dist/provider/principal-context.d.ts +54 -0
  34. package/dist/provider/principal-context.d.ts.map +1 -0
  35. package/dist/provider/realm-cache.d.ts +37 -0
  36. package/dist/provider/realm-cache.d.ts.map +1 -0
  37. package/dist/utils/claim-mapping.d.ts +18 -0
  38. package/dist/utils/claim-mapping.d.ts.map +1 -0
  39. package/dist/utils/index.d.ts +2 -0
  40. package/dist/utils/index.d.ts.map +1 -0
  41. package/package.json +62 -0
package/LICENSE ADDED
@@ -0,0 +1,277 @@
1
+ Eclipse Public License - v 2.0
2
+
3
+ THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS ECLIPSE
4
+ PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION
5
+ OF THE PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
6
+
7
+ 1. DEFINITIONS
8
+
9
+ "Contribution" means:
10
+
11
+ a) in the case of the initial Contributor, the initial content
12
+ Distributed under this Agreement, and
13
+
14
+ b) in the case of each subsequent Contributor:
15
+ i) changes to the Program, and
16
+ ii) additions to the Program;
17
+ where such changes and/or additions to the Program originate from
18
+ and are Distributed by that particular Contributor. A Contribution
19
+ "originates" from a Contributor if it was added to the Program by
20
+ such Contributor itself or anyone acting on such Contributor's behalf.
21
+ Contributions do not include changes or additions to the Program that
22
+ are not Modified Works.
23
+
24
+ "Contributor" means any person or entity that Distributes the Program.
25
+
26
+ "Licensed Patents" mean patent claims licensable by a Contributor which
27
+ are necessarily infringed by the use or sale of its Contribution alone
28
+ or when combined with the Program.
29
+
30
+ "Program" means the Contributions Distributed in accordance with this
31
+ Agreement.
32
+
33
+ "Recipient" means anyone who receives the Program under this Agreement
34
+ or any Secondary License (as applicable), including Contributors.
35
+
36
+ "Derivative Works" shall mean any work, whether in Source Code or other
37
+ form, that is based on (or derived from) the Program and for which the
38
+ editorial revisions, annotations, elaborations, or other modifications
39
+ represent, as a whole, an original work of authorship.
40
+
41
+ "Modified Works" shall mean any work in Source Code or other form that
42
+ results from an addition to, deletion from, or modification of the
43
+ contents of the Program, including, for purposes of clarity any new file
44
+ in Source Code form that contains any contents of the Program. Modified
45
+ Works shall not include works that contain only declarations,
46
+ interfaces, types, classes, structures, or files of the Program solely
47
+ in each case in order to link to, bind by name, or subclass the Program
48
+ or Modified Works thereof.
49
+
50
+ "Distribute" means the acts of a) distributing or b) making available
51
+ in any manner that enables the transfer of a copy.
52
+
53
+ "Source Code" means the form of a Program preferred for making
54
+ modifications, including but not limited to software source code,
55
+ documentation source, and configuration files.
56
+
57
+ "Secondary License" means either the GNU General Public License,
58
+ Version 2.0, or any later versions of that license, including any
59
+ exceptions or additional permissions as identified by the initial
60
+ Contributor.
61
+
62
+ 2. GRANT OF RIGHTS
63
+
64
+ a) Subject to the terms of this Agreement, each Contributor hereby
65
+ grants Recipient a non-exclusive, worldwide, royalty-free copyright
66
+ license to reproduce, prepare Derivative Works of, publicly display,
67
+ publicly perform, Distribute and sublicense the Contribution of such
68
+ Contributor, if any, and such Derivative Works.
69
+
70
+ b) Subject to the terms of this Agreement, each Contributor hereby
71
+ grants Recipient a non-exclusive, worldwide, royalty-free patent
72
+ license under Licensed Patents to make, use, sell, offer to sell,
73
+ import and otherwise transfer the Contribution of such Contributor,
74
+ if any, in Source Code or other form. This patent license shall
75
+ apply to the combination of the Contribution and the Program if, at
76
+ the time the Contribution is added by the Contributor, such addition
77
+ of the Contribution causes such combination to be covered by the
78
+ Licensed Patents. The patent license shall not apply to any other
79
+ combinations which include the Contribution. No hardware per se is
80
+ licensed hereunder.
81
+
82
+ c) Recipient understands that although each Contributor grants the
83
+ licenses to its Contributions set forth herein, no assurances are
84
+ provided by any Contributor that the Program does not infringe the
85
+ patent or other intellectual property rights of any other entity.
86
+ Each Contributor disclaims any liability to Recipient for claims
87
+ brought by any other entity based on infringement of intellectual
88
+ property rights or otherwise. As a condition to exercising the
89
+ rights and licenses granted hereunder, each Recipient hereby
90
+ assumes sole responsibility to secure any other intellectual
91
+ property rights needed, if any. For example, if a third party
92
+ patent license is required to allow Recipient to Distribute the
93
+ Program, it is Recipient's responsibility to acquire that license
94
+ before distributing the Program.
95
+
96
+ d) Each Contributor represents that to its knowledge it has
97
+ sufficient copyright rights in its Contribution, if any, to grant
98
+ the copyright license set forth in this Agreement.
99
+
100
+ e) Notwithstanding the terms of any Secondary License, no
101
+ Contributor makes additional grants to any Recipient (other than
102
+ those set forth in this Agreement) as a result of such Recipient's
103
+ receipt of the Program under the terms of a Secondary License
104
+ (if permitted under the terms of Section 3).
105
+
106
+ 3. REQUIREMENTS
107
+
108
+ 3.1 If a Contributor Distributes the Program in any form, then:
109
+
110
+ a) the Program must also be made available as Source Code, in
111
+ accordance with section 3.2, and the Contributor must accompany
112
+ the Program with a statement that the Source Code for the Program
113
+ is available under this Agreement, and informs Recipients how to
114
+ obtain it in a reasonable manner on or through a medium customarily
115
+ used for software exchange; and
116
+
117
+ b) the Contributor may Distribute the Program under a license
118
+ different than this Agreement, provided that such license:
119
+ i) effectively disclaims on behalf of all other Contributors all
120
+ warranties and conditions, express and implied, including
121
+ warranties or conditions of title and non-infringement, and
122
+ implied warranties or conditions of merchantability and fitness
123
+ for a particular purpose;
124
+
125
+ ii) effectively excludes on behalf of all other Contributors all
126
+ liability for damages, including direct, indirect, special,
127
+ incidental and consequential damages, such as lost profits;
128
+
129
+ iii) does not attempt to limit or alter the recipients' rights
130
+ in the Source Code under section 3.2; and
131
+
132
+ iv) requires any subsequent distribution of the Program by any
133
+ party to be under a license that satisfies the requirements
134
+ of this section 3.
135
+
136
+ 3.2 When the Program is Distributed as Source Code:
137
+
138
+ a) it must be made available under this Agreement, or if the
139
+ Program (i) is combined with other material in a separate file or
140
+ files made available under a Secondary License, and (ii) the initial
141
+ Contributor attached to the Source Code the notice described in
142
+ Exhibit A of this Agreement, then the Program may be made available
143
+ under the terms of such Secondary Licenses, and
144
+
145
+ b) a copy of this Agreement must be included with each copy of
146
+ the Program.
147
+
148
+ 3.3 Contributors may not remove or alter any copyright, patent,
149
+ trademark, attribution notices, disclaimers of warranty, or limitations
150
+ of liability ("notices") contained within the Program from any copy of
151
+ the Program which they Distribute, provided that Contributors may add
152
+ their own appropriate notices.
153
+
154
+ 4. COMMERCIAL DISTRIBUTION
155
+
156
+ Commercial distributors of software may accept certain responsibilities
157
+ with respect to end users, business partners and the like. While this
158
+ license is intended to facilitate the commercial use of the Program,
159
+ the Contributor who includes the Program in a commercial product
160
+ offering should do so in a manner which does not create potential
161
+ liability for other Contributors. Therefore, if a Contributor includes
162
+ the Program in a commercial product offering, such Contributor
163
+ ("Commercial Contributor") hereby agrees to defend and indemnify every
164
+ other Contributor ("Indemnified Contributor") against any losses,
165
+ damages and costs (collectively "Losses") arising from claims, lawsuits
166
+ and other legal actions brought by a third party against the Indemnified
167
+ Contributor to the extent caused by the acts or omissions of such
168
+ Commercial Contributor in connection with its distribution of the Program
169
+ in a commercial product offering. The obligations in this section do not
170
+ apply to any claims or Losses relating to any actual or alleged
171
+ intellectual property infringement. In order to qualify, an Indemnified
172
+ Contributor must: a) promptly notify the Commercial Contributor in
173
+ writing of such claim, and b) allow the Commercial Contributor to control,
174
+ and cooperate with the Commercial Contributor in, the defense and any
175
+ related settlement negotiations. The Indemnified Contributor may
176
+ participate in any such claim at its own expense.
177
+
178
+ For example, a Contributor might include the Program in a commercial
179
+ product offering, Product X. That Contributor is then a Commercial
180
+ Contributor. If that Commercial Contributor then makes performance
181
+ claims, or offers warranties related to Product X, those performance
182
+ claims and warranties are such Commercial Contributor's responsibility
183
+ alone. Under this section, the Commercial Contributor would have to
184
+ defend claims against the other Contributors related to those performance
185
+ claims and warranties, and if a court requires any other Contributor to
186
+ pay any damages as a result, the Commercial Contributor must pay
187
+ those damages.
188
+
189
+ 5. NO WARRANTY
190
+
191
+ EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND TO THE EXTENT
192
+ PERMITTED BY APPLICABLE LAW, THE PROGRAM IS PROVIDED ON AN "AS IS"
193
+ BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
194
+ IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF
195
+ TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR
196
+ PURPOSE. Each Recipient is solely responsible for determining the
197
+ appropriateness of using and distributing the Program and assumes all
198
+ risks associated with its exercise of rights under this Agreement,
199
+ including but not limited to the risks and costs of program errors,
200
+ compliance with applicable laws, damage to or loss of data, programs
201
+ or equipment, and unavailability or interruption of operations.
202
+
203
+ 6. DISCLAIMER OF LIABILITY
204
+
205
+ EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, AND TO THE EXTENT
206
+ PERMITTED BY APPLICABLE LAW, NEITHER RECIPIENT NOR ANY CONTRIBUTORS
207
+ SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
208
+ EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST
209
+ PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
210
+ CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
211
+ ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE
212
+ EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE
213
+ POSSIBILITY OF SUCH DAMAGES.
214
+
215
+ 7. GENERAL
216
+
217
+ If any provision of this Agreement is invalid or unenforceable under
218
+ applicable law, it shall not affect the validity or enforceability of
219
+ the remainder of the terms of this Agreement, and without further
220
+ action by the parties hereto, such provision shall be reformed to the
221
+ minimum extent necessary to make such provision valid and enforceable.
222
+
223
+ If Recipient institutes patent litigation against any entity
224
+ (including a cross-claim or counterclaim in a lawsuit) alleging that the
225
+ Program itself (excluding combinations of the Program with other software
226
+ or hardware) infringes such Recipient's patent(s), then such Recipient's
227
+ rights granted under Section 2(b) shall terminate as of the date such
228
+ litigation is filed.
229
+
230
+ All Recipient's rights under this Agreement shall terminate if it
231
+ fails to comply with any of the material terms or conditions of this
232
+ Agreement and does not cure such failure in a reasonable period of
233
+ time after becoming aware of such noncompliance. If all Recipient's
234
+ rights under this Agreement terminate, Recipient agrees to cease use
235
+ and distribution of the Program as soon as reasonably practicable.
236
+ However, Recipient's obligations under this Agreement and any licenses
237
+ granted by Recipient relating to the Program shall continue and survive.
238
+
239
+ Everyone is permitted to copy and distribute copies of this Agreement,
240
+ but in order to avoid inconsistency the Agreement is copyrighted and
241
+ may only be modified in the following manner. The Agreement Steward
242
+ reserves the right to publish new versions (including revisions) of
243
+ this Agreement from time to time. No one other than the Agreement
244
+ Steward has the right to modify this Agreement. The Eclipse Foundation
245
+ is the initial Agreement Steward. The Eclipse Foundation may assign the
246
+ responsibility to serve as the Agreement Steward to a suitable separate
247
+ entity. Each new version of the Agreement will be given a distinguishing
248
+ version number. The Program (including Contributions) may always be
249
+ Distributed subject to the version of the Agreement under which it was
250
+ received. In addition, after a new version of the Agreement is published,
251
+ Contributor may elect to Distribute the Program (including its
252
+ Contributions) under the new version.
253
+
254
+ Except as expressly stated in Sections 2(a) and 2(b) above, Recipient
255
+ receives no rights or licenses to the intellectual property of any
256
+ Contributor under this Agreement, whether expressly, by implication,
257
+ estoppel or otherwise. All rights in the Program not expressly granted
258
+ under this Agreement are reserved. Nothing in this Agreement is intended
259
+ to be enforceable by any entity that is not a Contributor or Recipient.
260
+ No third-party beneficiary rights are created under this Agreement.
261
+
262
+ Exhibit A - Form of Secondary Licenses Notice
263
+
264
+ "This Source Code may also be made available under the following
265
+ Secondary Licenses when the conditions for such availability set forth
266
+ in the Eclipse Public License, v. 2.0 are satisfied: {name license(s),
267
+ version(s), and exceptions or additional permissions here}."
268
+
269
+ Simply including a copy of this Agreement, including this Exhibit A
270
+ is not sufficient to license the Source Code under Secondary Licenses.
271
+
272
+ If it is not possible or desirable to put the notice in a particular
273
+ file, then You may include the notice in a location (such as a LICENSE
274
+ file in a relevant directory) where a recipient would be likely to
275
+ look for such a notice.
276
+
277
+ You may add additional accurate notices of copyright ownership.
package/README.md ADDED
@@ -0,0 +1,131 @@
1
+ # @judo/auth
2
+
3
+ > OIDC authentication layer for JUDO UI Runtime
4
+
5
+ ## Purpose
6
+
7
+ A lightweight wrapper around `react-oidc-context` / `oidc-client-ts` that extracts auth configuration from ECore-based `Application` models, manages realm-based OIDC session caching, maps OIDC claims to principal data, and provides React components/hooks for gating and actor-switching.
8
+
9
+ ## Architecture Layer
10
+
11
+ **Layer 3 (Infrastructure)** — consumed by `app-shell` and optionally by application-level code.
12
+
13
+ ## Dependencies
14
+
15
+ - `@judo/model-api`, `@judo/model-loader` — model types and registry (dependency + peer)
16
+ - `@mui/material ^7` — UI components (peer)
17
+ - `oidc-client-ts ^3` — OIDC protocol client (peer)
18
+ - `react-oidc-context ^3` — React OIDC integration (peer)
19
+ - `react ^19` — React (peer)
20
+
21
+ ## File Structure
22
+
23
+ ```
24
+ src/
25
+ ├── index.ts # Barrel re-export
26
+ ├── config/
27
+ │ ├── auth-config.ts # Model → config extraction
28
+ │ └── oidc-config.ts # OIDC UserManagerSettings builder
29
+ ├── provider/
30
+ │ ├── auth-config-context.tsx # React context for auth config
31
+ │ ├── judo-auth-provider.tsx # Top-level auth provider
32
+ │ ├── principal-context.tsx # Backend principal context + provider
33
+ │ └── realm-cache.ts # Realm → UserManager cache
34
+ ├── hooks/
35
+ │ ├── use-auth.ts # Main auth hook
36
+ │ ├── use-require-auth.ts # Redirect-guard hook
37
+ │ └── use-actor-switch.ts # Actor-switching hook
38
+ ├── components/
39
+ │ ├── actor-auth-boundary.tsx # Auth gate component
40
+ │ └── actor-switch-dialog.tsx # Confirmation dialog
41
+ └── utils/
42
+ └── claim-mapping.ts # OIDC claim → principal mapping
43
+ ```
44
+
45
+ ## Exports Summary
46
+
47
+ ### Configuration
48
+
49
+ | Export | Kind | Description |
50
+ | ---------------------------------- | --------- | ------------------------------------------------------------------------------------------------------------------ |
51
+ | `ClaimMapping` | interface | Maps a `ClaimType` enum to a model attribute name (`claimType`, `attributeName`). |
52
+ | `ActorAuthConfig` | interface | Actor-level auth config: `actorName`, `requiresAuth`, `realm?`, `clientId?`, `claims`. |
53
+ | `getAuthConfig(app)` | function | Extracts an `ActorAuthConfig` from an `Application` model. Returns a no-auth stub when `authentication` is absent. |
54
+ | `isSameRealm(a, b)` | function | Checks whether two `ActorAuthConfig`s share the same OIDC realm. |
55
+ | `OidcConfig` | interface | Simplified config requiring only `issuerUrl`; other fields have defaults. |
56
+ | `OidcOptions` | interface | Full OIDC options: `issuerUrl`, `redirectUri`, `postLogoutRedirectUri`, `scope?`, `responseType?`. |
57
+ | `createOidcOptions(config)` | function | Expands an `OidcConfig` into full `OidcOptions` by applying defaults (`window.location.origin`). |
58
+ | `buildOidcConfig(config, options)` | function | Constructs `UserManagerSettings`. Computes `authority` as `${issuerUrl}/auth/realms/${realm}`. |
59
+ | `validateOidcOptions(options)` | function | Validates all required fields and URL parseability. Throws on failure. |
60
+
61
+ ### React Providers
62
+
63
+ | Export | Kind | Description |
64
+ | ------------------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
65
+ | `AuthConfigProvider` | component | Provides `ActorAuthConfig` + `OidcOptions` via React context. |
66
+ | `useAuthConfig()` | hook | Reads auth config context; **throws** if outside provider. |
67
+ | `useAuthConfigOptional()` | hook | Reads auth config context; returns `null` if outside provider. |
68
+ | `JudoAuthProvider` | component | Top-level auth provider. If `requiresAuth` is false, renders children directly. If true, wraps in OIDC `AuthProvider` using a **cached** `UserManager` per realm. Strips `?code=&state=` on OIDC callback. |
69
+ | `PrincipalProvider` | component | Provides backend principal state with auto-fetch, refresh (`refreshPrincipal`), and local override (`setPrincipal`). Place inside auth boundary + API provider. |
70
+ | `usePrincipal()` | hook | Reads backend principal context; **throws** if outside `PrincipalProvider`. |
71
+ | `usePrincipalOptional()` | hook | Reads backend principal context; returns `null` if outside provider. |
72
+
73
+ ### Realm Cache
74
+
75
+ | Export | Kind | Description |
76
+ | ----------------------------------------- | -------- | ----------------------------------------------------------------------------- |
77
+ | `getOrCreateUserManager(realm, settings)` | function | Returns (or creates & caches) a `UserManager` instance keyed by realm string. |
78
+ | `clearRealmCache(realm)` | function | Removes a specific realm from the cache. |
79
+ | `clearAllRealmCache()` | function | Clears the entire realm cache (test utility). |
80
+ | `hasRealmInCache(realm)` | function | Checks if a realm has a cached `UserManager`. |
81
+ | `getCachedRealmCount()` | function | Returns number of cached realms. |
82
+
83
+ ### React Hooks
84
+
85
+ | Export | Kind | Description |
86
+ | ------------------------------------------------------------------ | -------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
87
+ | `useAuth()` | hook | Main auth hook. Returns unified `JudoAuthContext` for both authenticated and unauthenticated actors. If no auth required, returns a no-op stub. Otherwise delegates to `react-oidc-context` and maps claims to principal. |
88
+ | `useOidcAuthRequired()` | hook | Direct access to `react-oidc-context`'s `useAuth`. For internal use within OIDC provider. |
89
+ | `useRequireAuth()` | hook | Guard hook — triggers `signinRedirect` via `useEffect` if auth required but user not authenticated. |
90
+ | `useActorSwitch(currentApp, getApplication, setActiveApplication)` | hook | Manages actor switching. Same-realm → direct switch. Different realms → populates `pendingSwitch` for confirmation. |
91
+ | `getSwitchConfigs(currentApp, targetApp)` | function | Returns `{ currentConfig, targetConfig }` — both `ActorAuthConfig`s for a switch dialog. |
92
+
93
+ ### React Components
94
+
95
+ | Export | Kind | Description |
96
+ | ------------------- | --------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
97
+ | `ActorAuthBoundary` | component | Auth gate — renders children immediately for unauthenticated actors, shows loading spinner while OIDC loads, renders children once authenticated. Supports guest access mode (`supportGuestAccess` + `guestComponent` props) to show a guest page instead of OIDC redirect. |
98
+ | `ActorSwitchDialog` | component | MUI Dialog confirmation for cross-realm actor switches. Displays current/target actor names and warns when realms differ. |
99
+
100
+ ### Utilities
101
+
102
+ | Export | Kind | Description |
103
+ | ----------------------------------------- | -------- | ------------------------------------------------------------------------------------------------------------------- |
104
+ | `claimTypeToKey(claimType)` | function | Maps `ClaimType` enum value to its OIDC profile claim key string (e.g., `EMAIL` → `'email'`). |
105
+ | `mapClaimsToPrincipal(profile, mappings)` | function | Builds a principal data record from an OIDC profile. Maps 5 standard claims plus custom claim mappings from config. |
106
+
107
+ ### Type Exports
108
+
109
+ | Type | Description |
110
+ | ------------------------- | ---------------------------------------------------------------------------------- |
111
+ | `JudoAuthProviderProps` | Props for `JudoAuthProvider`. |
112
+ | `AuthConfigContextType` | Shape of the auth config context value. |
113
+ | `AuthConfigProviderProps` | Props for `AuthConfigProvider`. |
114
+ | `PrincipalContextType` | Shape of the principal context value. |
115
+ | `PrincipalProviderProps` | Props for `PrincipalProvider`. |
116
+ | `JudoAuthContext` | Return type of `useAuth()`. |
117
+ | `PrincipalData` | OIDC-claim-mapped principal shape (`email?`, `name?`, `preferredUsername?`, etc.). |
118
+ | `PendingSwitch` | Pending actor switch info (`targetActor`, `targetRealm?`, `requiresConfirmation`). |
119
+ | `UseActorSwitchResult` | Return type of `useActorSwitch()`. |
120
+ | `ActorAuthBoundaryProps` | Props for `ActorAuthBoundary`. |
121
+ | `ActorSwitchDialogProps` | Props for `ActorSwitchDialog`. |
122
+
123
+ ## Key Patterns
124
+
125
+ - **Conditional OIDC wrapping**: `JudoAuthProvider` only mounts the OIDC provider when `requiresAuth` is true
126
+ - **Realm-based session sharing**: A module-level `Map` ensures actors with the same realm share one `UserManager` (and thus one OIDC session)
127
+ - **Model-driven configuration**: `getAuthConfig` derives everything from the `Application` model, keeping auth in sync with the ECore meta-model
128
+ - **Graceful degradation**: Every hook handles the "no auth required" case cleanly, returning no-op stubs
129
+ - **Two-phase actor switching**: Same-realm switches happen instantly; cross-realm switches require user confirmation
130
+ - **Claim mapping pipeline**: Standard OIDC claims are always mapped, with model-defined custom claim entries on top
131
+ - **Optional context access**: Dual hooks (`useAuthConfig` / `useAuthConfigOptional`, `usePrincipal` / `usePrincipalOptional`) follow the throw-vs-null pattern
@@ -0,0 +1,38 @@
1
+ import { ReactNode } from 'react';
2
+ /**
3
+ * Props for ActorAuthBoundary.
4
+ */
5
+ export interface ActorAuthBoundaryProps {
6
+ children: ReactNode;
7
+ /** Custom loading component */
8
+ loadingComponent?: ReactNode;
9
+ /**
10
+ * When true, unauthenticated users see a guest page instead of being
11
+ * redirected to the OIDC provider. Typically derived from
12
+ * `Application.supportGuestAccess`.
13
+ */
14
+ supportGuestAccess?: boolean;
15
+ /**
16
+ * Component rendered when guest access is enabled and the user is
17
+ * not authenticated. When omitted, the default loading/redirect
18
+ * behavior applies even if `supportGuestAccess` is true (the
19
+ * calling layer should always provide a fallback).
20
+ */
21
+ guestComponent?: ReactNode;
22
+ }
23
+ /**
24
+ * Boundary component that gates children behind authentication.
25
+ *
26
+ * Mirrors react-oidc-context's `withAuthenticationRequired` HOC exactly:
27
+ * skip redirect when callback params are present, auth is loading,
28
+ * a navigator is active, or user is already authenticated.
29
+ * Otherwise trigger `signinRedirect()` — the browser navigates away.
30
+ *
31
+ * When `supportGuestAccess` is true and `guestComponent` is provided,
32
+ * unauthenticated users see the guest page instead of being redirected.
33
+ *
34
+ * The `JudoAuthProvider` handles callback processing and URL cleanup
35
+ * via its `onSigninCallback` prop.
36
+ */
37
+ export declare function ActorAuthBoundary({ children, loadingComponent, supportGuestAccess, guestComponent, }: ActorAuthBoundaryProps): import("react/jsx-runtime").JSX.Element;
38
+ //# sourceMappingURL=actor-auth-boundary.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"actor-auth-boundary.d.ts","sourceRoot":"","sources":["../../src/components/actor-auth-boundary.tsx"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,SAAS,EAAa,MAAM,OAAO,CAAC;AAIlD;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACtC,QAAQ,EAAE,SAAS,CAAC;IACpB,+BAA+B;IAC/B,gBAAgB,CAAC,EAAE,SAAS,CAAC;IAC7B;;;;OAIG;IACH,kBAAkB,CAAC,EAAE,OAAO,CAAC;IAC7B;;;;;OAKG;IACH,cAAc,CAAC,EAAE,SAAS,CAAC;CAC3B;AAaD;;;;;;;;;;;;;GAaG;AACH,wBAAgB,iBAAiB,CAAC,EACjC,QAAQ,EACR,gBAAgB,EAChB,kBAAkB,EAClB,cAAc,GACd,EAAE,sBAAsB,2CA0BxB"}
@@ -0,0 +1,38 @@
1
+ /**
2
+ * Props for ActorSwitchDialog.
3
+ */
4
+ export interface ActorSwitchDialogProps {
5
+ /** Whether dialog is open */
6
+ open: boolean;
7
+ /** Current actor name */
8
+ currentActor: string;
9
+ /** Target actor name to switch to */
10
+ targetActor: string;
11
+ /** Current realm (if authenticated) */
12
+ currentRealm?: string;
13
+ /** Target realm (if requires auth) */
14
+ targetRealm?: string;
15
+ /** Callback when user confirms switch */
16
+ onConfirm: () => void;
17
+ /** Callback when user cancels switch */
18
+ onCancel: () => void;
19
+ }
20
+ /**
21
+ * Confirmation dialog shown when switching actors between different realms.
22
+ * Warns user about potential logout.
23
+ *
24
+ * @example
25
+ * ```tsx
26
+ * <ActorSwitchDialog
27
+ * open={pendingSwitch !== null}
28
+ * currentActor="Admin"
29
+ * targetActor="User"
30
+ * currentRealm="admin-realm"
31
+ * targetRealm="user-realm"
32
+ * onConfirm={confirmSwitch}
33
+ * onCancel={cancelSwitch}
34
+ * />
35
+ * ```
36
+ */
37
+ export declare function ActorSwitchDialog({ open, currentActor, targetActor, currentRealm, targetRealm, onConfirm, onCancel, }: ActorSwitchDialogProps): import("react/jsx-runtime").JSX.Element;
38
+ //# sourceMappingURL=actor-switch-dialog.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"actor-switch-dialog.d.ts","sourceRoot":"","sources":["../../src/components/actor-switch-dialog.tsx"],"names":[],"mappings":"AAEA;;GAEG;AACH,MAAM,WAAW,sBAAsB;IACtC,6BAA6B;IAC7B,IAAI,EAAE,OAAO,CAAC;IACd,yBAAyB;IACzB,YAAY,EAAE,MAAM,CAAC;IACrB,qCAAqC;IACrC,WAAW,EAAE,MAAM,CAAC;IACpB,uCAAuC;IACvC,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,sCAAsC;IACtC,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,yCAAyC;IACzC,SAAS,EAAE,MAAM,IAAI,CAAC;IACtB,wCAAwC;IACxC,QAAQ,EAAE,MAAM,IAAI,CAAC;CACrB;AAED;;;;;;;;;;;;;;;;GAgBG;AACH,wBAAgB,iBAAiB,CAAC,EACjC,IAAI,EACJ,YAAY,EACZ,WAAW,EACX,YAAY,EACZ,WAAW,EACX,SAAS,EACT,QAAQ,GACR,EAAE,sBAAsB,2CA2BxB"}
@@ -0,0 +1,3 @@
1
+ export { ActorAuthBoundary, type ActorAuthBoundaryProps } from './actor-auth-boundary';
2
+ export { ActorSwitchDialog, type ActorSwitchDialogProps } from './actor-switch-dialog';
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/components/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,iBAAiB,EAAE,KAAK,sBAAsB,EAAE,MAAM,uBAAuB,CAAC;AACvF,OAAO,EAAE,iBAAiB,EAAE,KAAK,sBAAsB,EAAE,MAAM,uBAAuB,CAAC"}
@@ -0,0 +1,34 @@
1
+ import { Application, ClaimType } from '@judo/model-api';
2
+ /**
3
+ * Mapping of a claim to an attribute.
4
+ */
5
+ export interface ClaimMapping {
6
+ claimType: ClaimType;
7
+ attributeName: string;
8
+ }
9
+ /**
10
+ * Actor authentication configuration extracted from Application model.
11
+ */
12
+ export interface ActorAuthConfig {
13
+ actorName: string;
14
+ requiresAuth: boolean;
15
+ realm?: string;
16
+ clientId?: string;
17
+ claims: ClaimMapping[];
18
+ }
19
+ /**
20
+ * Extract authentication configuration from Application model.
21
+ *
22
+ * @param app - The Application model
23
+ * @returns ActorAuthConfig with authentication requirements
24
+ */
25
+ export declare function getAuthConfig(app: Application): ActorAuthConfig;
26
+ /**
27
+ * Check if two actors share the same authentication realm.
28
+ *
29
+ * @param config1 - First actor's auth config
30
+ * @param config2 - Second actor's auth config
31
+ * @returns true if both share same realm or neither requires auth
32
+ */
33
+ export declare function isSameRealm(config1: ActorAuthConfig, config2: ActorAuthConfig): boolean;
34
+ //# sourceMappingURL=auth-config.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth-config.d.ts","sourceRoot":"","sources":["../../src/config/auth-config.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE9D;;GAEG;AACH,MAAM,WAAW,YAAY;IAC5B,SAAS,EAAE,SAAS,CAAC;IACrB,aAAa,EAAE,MAAM,CAAC;CACtB;AAED;;GAEG;AACH,MAAM,WAAW,eAAe;IAC/B,SAAS,EAAE,MAAM,CAAC;IAClB,YAAY,EAAE,OAAO,CAAC;IACtB,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,MAAM,EAAE,YAAY,EAAE,CAAC;CACvB;AAED;;;;;GAKG;AACH,wBAAgB,aAAa,CAAC,GAAG,EAAE,WAAW,GAAG,eAAe,CAqB/D;AAED;;;;;;GAMG;AACH,wBAAgB,WAAW,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,EAAE,eAAe,GAAG,OAAO,CAavF"}
@@ -0,0 +1,3 @@
1
+ export { getAuthConfig, isSameRealm, type ActorAuthConfig, type ClaimMapping } from './auth-config';
2
+ export { buildOidcConfig, createOidcOptions, validateOidcOptions, type OidcConfig, type OidcOptions, } from './oidc-config';
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/config/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,aAAa,EAAE,WAAW,EAAE,KAAK,eAAe,EAAE,KAAK,YAAY,EAAE,MAAM,eAAe,CAAC;AACpG,OAAO,EACN,eAAe,EACf,iBAAiB,EACjB,mBAAmB,EACnB,KAAK,UAAU,EACf,KAAK,WAAW,GAChB,MAAM,eAAe,CAAC"}
@@ -0,0 +1,58 @@
1
+ import { UserManagerSettings } from 'oidc-client-ts';
2
+ import { ActorAuthConfig } from './auth-config';
3
+ /**
4
+ * Simplified OIDC configuration requiring only the provider URL.
5
+ * All other fields have sensible defaults.
6
+ *
7
+ * The client ID is derived automatically from the active actor's Application.name
8
+ * in the model — it is not configurable here.
9
+ */
10
+ export interface OidcConfig {
11
+ /** OIDC issuer base URL (e.g., 'https://auth.example.com'). The '/auth/realms/{realm}' path is appended from model. */
12
+ issuerUrl: string;
13
+ /** OAuth scopes. @default 'openid profile email' */
14
+ scope?: string;
15
+ /** Redirect URI after login. @default window.location.origin */
16
+ redirectUri?: string;
17
+ /** Redirect URI after logout. @default window.location.origin */
18
+ postLogoutRedirectUri?: string;
19
+ }
20
+ /**
21
+ * Create full OidcOptions from simplified OidcConfig with sensible defaults.
22
+ *
23
+ * @param config - Simplified OIDC config (only issuerUrl required)
24
+ * @returns Full OidcOptions with all fields populated
25
+ */
26
+ export declare function createOidcOptions(config: OidcConfig): OidcOptions;
27
+ /**
28
+ * Options for building OIDC configuration.
29
+ */
30
+ export interface OidcOptions {
31
+ /** Base URL for the OIDC issuer */
32
+ issuerUrl: string;
33
+ /** URI to redirect after login */
34
+ redirectUri: string;
35
+ /** URI to redirect after logout */
36
+ postLogoutRedirectUri: string;
37
+ /** OAuth scopes (defaults to 'openid profile email') */
38
+ scope?: string;
39
+ /** Response type (defaults to 'code') */
40
+ responseType?: string;
41
+ }
42
+ /**
43
+ * Build OIDC client configuration from ActorAuthConfig.
44
+ *
45
+ * @param config - Actor authentication configuration
46
+ * @param options - OIDC options
47
+ * @returns UserManagerSettings for oidc-client-ts
48
+ * @throws Error if config doesn't require authentication
49
+ */
50
+ export declare function buildOidcConfig(config: ActorAuthConfig, options: OidcOptions): UserManagerSettings;
51
+ /**
52
+ * Validate OIDC options.
53
+ *
54
+ * @param options - OIDC options to validate
55
+ * @throws Error if options are invalid
56
+ */
57
+ export declare function validateOidcOptions(options: OidcOptions): void;
58
+ //# sourceMappingURL=oidc-config.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"oidc-config.d.ts","sourceRoot":"","sources":["../../src/config/oidc-config.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,gBAAgB,CAAC;AAC1D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,eAAe,CAAC;AAErD;;;;;;GAMG;AACH,MAAM,WAAW,UAAU;IAC1B,uHAAuH;IACvH,SAAS,EAAE,MAAM,CAAC;IAClB,oDAAoD;IACpD,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,gEAAgE;IAChE,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,iEAAiE;IACjE,qBAAqB,CAAC,EAAE,MAAM,CAAC;CAC/B;AAED;;;;;GAKG;AACH,wBAAgB,iBAAiB,CAAC,MAAM,EAAE,UAAU,GAAG,WAAW,CAQjE;AAED;;GAEG;AACH,MAAM,WAAW,WAAW;IAC3B,mCAAmC;IACnC,SAAS,EAAE,MAAM,CAAC;IAClB,kCAAkC;IAClC,WAAW,EAAE,MAAM,CAAC;IACpB,mCAAmC;IACnC,qBAAqB,EAAE,MAAM,CAAC;IAC9B,wDAAwD;IACxD,KAAK,CAAC,EAAE,MAAM,CAAC;IACf,yCAAyC;IACzC,YAAY,CAAC,EAAE,MAAM,CAAC;CACtB;AAED;;;;;;;GAOG;AACH,wBAAgB,eAAe,CAAC,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,WAAW,GAAG,mBAAmB,CAuBlG;AAED;;;;;GAKG;AACH,wBAAgB,mBAAmB,CAAC,OAAO,EAAE,WAAW,GAAG,IAAI,CAuB9D"}
@@ -0,0 +1,4 @@
1
+ export { useAuth, useOidcAuthRequired, type JudoAuthContext, type PrincipalData } from './use-auth';
2
+ export { useRequireAuth } from './use-require-auth';
3
+ export { useActorSwitch, getSwitchConfigs, type PendingSwitch, type UseActorSwitchResult } from './use-actor-switch';
4
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/hooks/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,mBAAmB,EAAE,KAAK,eAAe,EAAE,KAAK,aAAa,EAAE,MAAM,YAAY,CAAC;AACpG,OAAO,EAAE,cAAc,EAAE,MAAM,oBAAoB,CAAC;AACpD,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,KAAK,aAAa,EAAE,KAAK,oBAAoB,EAAE,MAAM,oBAAoB,CAAC"}