@juspay/neurolink 9.31.2 → 9.32.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (161) hide show
  1. package/CHANGELOG.md +6 -0
  2. package/dist/auth/AuthProviderFactory.d.ts +71 -0
  3. package/dist/auth/AuthProviderFactory.js +111 -0
  4. package/dist/auth/AuthProviderRegistry.d.ts +33 -0
  5. package/dist/auth/AuthProviderRegistry.js +190 -0
  6. package/dist/auth/RequestContext.d.ts +23 -0
  7. package/dist/auth/RequestContext.js +78 -0
  8. package/dist/auth/authContext.d.ts +198 -0
  9. package/dist/auth/authContext.js +314 -0
  10. package/dist/auth/errors.d.ts +63 -0
  11. package/dist/auth/errors.js +39 -0
  12. package/dist/auth/index.d.ts +20 -8
  13. package/dist/auth/index.js +35 -7
  14. package/dist/auth/middleware/AuthMiddleware.d.ts +181 -0
  15. package/dist/auth/middleware/AuthMiddleware.js +519 -0
  16. package/dist/auth/middleware/rateLimitByUser.d.ts +282 -0
  17. package/dist/auth/middleware/rateLimitByUser.js +554 -0
  18. package/dist/auth/providers/BaseAuthProvider.d.ts +259 -0
  19. package/dist/auth/providers/BaseAuthProvider.js +723 -0
  20. package/dist/auth/providers/CognitoProvider.d.ts +61 -0
  21. package/dist/auth/providers/CognitoProvider.js +304 -0
  22. package/dist/auth/providers/KeycloakProvider.d.ts +61 -0
  23. package/dist/auth/providers/KeycloakProvider.js +393 -0
  24. package/dist/auth/providers/auth0.d.ts +59 -0
  25. package/dist/auth/providers/auth0.js +274 -0
  26. package/dist/auth/providers/betterAuth.d.ts +51 -0
  27. package/dist/auth/providers/betterAuth.js +182 -0
  28. package/dist/auth/providers/clerk.d.ts +65 -0
  29. package/dist/auth/providers/clerk.js +317 -0
  30. package/dist/auth/providers/custom.d.ts +64 -0
  31. package/dist/auth/providers/custom.js +112 -0
  32. package/dist/auth/providers/firebase.d.ts +63 -0
  33. package/dist/auth/providers/firebase.js +226 -0
  34. package/dist/auth/providers/jwt.d.ts +68 -0
  35. package/dist/auth/providers/jwt.js +212 -0
  36. package/dist/auth/providers/oauth2.d.ts +73 -0
  37. package/dist/auth/providers/oauth2.js +303 -0
  38. package/dist/auth/providers/supabase.d.ts +63 -0
  39. package/dist/auth/providers/supabase.js +259 -0
  40. package/dist/auth/providers/workos.d.ts +61 -0
  41. package/dist/auth/providers/workos.js +284 -0
  42. package/dist/auth/serverBridge.d.ts +14 -0
  43. package/dist/auth/serverBridge.js +25 -0
  44. package/dist/auth/sessionManager.d.ts +142 -0
  45. package/dist/auth/sessionManager.js +437 -0
  46. package/dist/cli/commands/authProviders.d.ts +43 -0
  47. package/dist/cli/commands/authProviders.js +399 -0
  48. package/dist/cli/factories/authCommandFactory.d.ts +23 -5
  49. package/dist/cli/factories/authCommandFactory.js +108 -5
  50. package/dist/cli/parser.js +1 -1
  51. package/dist/client/auth/AuthProviderFactory.js +111 -0
  52. package/dist/client/auth/AuthProviderRegistry.js +190 -0
  53. package/dist/client/auth/RequestContext.js +78 -0
  54. package/dist/client/auth/accountPool.js +178 -0
  55. package/dist/client/auth/authContext.js +314 -0
  56. package/dist/client/auth/errors.js +39 -0
  57. package/dist/client/auth/index.js +61 -0
  58. package/dist/client/auth/middleware/AuthMiddleware.js +519 -0
  59. package/dist/client/auth/middleware/rateLimitByUser.js +554 -0
  60. package/dist/client/auth/providers/BaseAuthProvider.js +723 -0
  61. package/dist/client/auth/providers/CognitoProvider.js +304 -0
  62. package/dist/client/auth/providers/KeycloakProvider.js +393 -0
  63. package/dist/client/auth/providers/auth0.js +274 -0
  64. package/dist/client/auth/providers/betterAuth.js +182 -0
  65. package/dist/client/auth/providers/clerk.js +317 -0
  66. package/dist/client/auth/providers/custom.js +112 -0
  67. package/dist/client/auth/providers/firebase.js +226 -0
  68. package/dist/client/auth/providers/jwt.js +212 -0
  69. package/dist/client/auth/providers/oauth2.js +303 -0
  70. package/dist/client/auth/providers/supabase.js +259 -0
  71. package/dist/client/auth/providers/workos.js +284 -0
  72. package/dist/client/auth/serverBridge.js +25 -0
  73. package/dist/client/auth/sessionManager.js +437 -0
  74. package/dist/client/core/infrastructure/baseRegistry.js +5 -1
  75. package/dist/client/index.js +25 -0
  76. package/dist/client/mcp/toolRegistry.js +11 -1
  77. package/dist/client/neurolink.js +218 -0
  78. package/dist/client/rag/ChunkerRegistry.js +2 -2
  79. package/dist/client/rag/metadata/MetadataExtractorRegistry.js +2 -2
  80. package/dist/client/rag/reranker/RerankerRegistry.js +2 -2
  81. package/dist/client/server/routes/agentRoutes.js +20 -2
  82. package/dist/client/types/authTypes.js +2 -1
  83. package/dist/core/infrastructure/baseRegistry.d.ts +3 -1
  84. package/dist/core/infrastructure/baseRegistry.js +5 -1
  85. package/dist/index.d.ts +1 -0
  86. package/dist/index.js +25 -0
  87. package/dist/lib/auth/AuthProviderFactory.d.ts +71 -0
  88. package/dist/lib/auth/AuthProviderFactory.js +112 -0
  89. package/dist/lib/auth/AuthProviderRegistry.d.ts +33 -0
  90. package/dist/lib/auth/AuthProviderRegistry.js +191 -0
  91. package/dist/lib/auth/RequestContext.d.ts +23 -0
  92. package/dist/lib/auth/RequestContext.js +79 -0
  93. package/dist/lib/auth/authContext.d.ts +198 -0
  94. package/dist/lib/auth/authContext.js +315 -0
  95. package/dist/lib/auth/errors.d.ts +63 -0
  96. package/dist/lib/auth/errors.js +40 -0
  97. package/dist/lib/auth/index.d.ts +20 -8
  98. package/dist/lib/auth/index.js +35 -7
  99. package/dist/lib/auth/middleware/AuthMiddleware.d.ts +181 -0
  100. package/dist/lib/auth/middleware/AuthMiddleware.js +520 -0
  101. package/dist/lib/auth/middleware/rateLimitByUser.d.ts +282 -0
  102. package/dist/lib/auth/middleware/rateLimitByUser.js +555 -0
  103. package/dist/lib/auth/providers/BaseAuthProvider.d.ts +259 -0
  104. package/dist/lib/auth/providers/BaseAuthProvider.js +724 -0
  105. package/dist/lib/auth/providers/CognitoProvider.d.ts +61 -0
  106. package/dist/lib/auth/providers/CognitoProvider.js +305 -0
  107. package/dist/lib/auth/providers/KeycloakProvider.d.ts +61 -0
  108. package/dist/lib/auth/providers/KeycloakProvider.js +394 -0
  109. package/dist/lib/auth/providers/auth0.d.ts +59 -0
  110. package/dist/lib/auth/providers/auth0.js +275 -0
  111. package/dist/lib/auth/providers/betterAuth.d.ts +51 -0
  112. package/dist/lib/auth/providers/betterAuth.js +183 -0
  113. package/dist/lib/auth/providers/clerk.d.ts +65 -0
  114. package/dist/lib/auth/providers/clerk.js +318 -0
  115. package/dist/lib/auth/providers/custom.d.ts +64 -0
  116. package/dist/lib/auth/providers/custom.js +113 -0
  117. package/dist/lib/auth/providers/firebase.d.ts +63 -0
  118. package/dist/lib/auth/providers/firebase.js +227 -0
  119. package/dist/lib/auth/providers/jwt.d.ts +68 -0
  120. package/dist/lib/auth/providers/jwt.js +213 -0
  121. package/dist/lib/auth/providers/oauth2.d.ts +73 -0
  122. package/dist/lib/auth/providers/oauth2.js +304 -0
  123. package/dist/lib/auth/providers/supabase.d.ts +63 -0
  124. package/dist/lib/auth/providers/supabase.js +260 -0
  125. package/dist/lib/auth/providers/workos.d.ts +61 -0
  126. package/dist/lib/auth/providers/workos.js +285 -0
  127. package/dist/lib/auth/serverBridge.d.ts +14 -0
  128. package/dist/lib/auth/serverBridge.js +26 -0
  129. package/dist/lib/auth/sessionManager.d.ts +142 -0
  130. package/dist/lib/auth/sessionManager.js +438 -0
  131. package/dist/lib/core/infrastructure/baseRegistry.d.ts +3 -1
  132. package/dist/lib/core/infrastructure/baseRegistry.js +5 -1
  133. package/dist/lib/index.d.ts +1 -0
  134. package/dist/lib/index.js +25 -0
  135. package/dist/lib/mcp/toolRegistry.js +11 -1
  136. package/dist/lib/neurolink.d.ts +42 -1
  137. package/dist/lib/neurolink.js +218 -0
  138. package/dist/lib/rag/ChunkerRegistry.js +2 -2
  139. package/dist/lib/rag/metadata/MetadataExtractorRegistry.js +2 -2
  140. package/dist/lib/rag/reranker/RerankerRegistry.js +2 -2
  141. package/dist/lib/server/routes/agentRoutes.js +20 -2
  142. package/dist/lib/types/authTypes.d.ts +937 -1
  143. package/dist/lib/types/authTypes.js +2 -1
  144. package/dist/lib/types/configTypes.d.ts +46 -0
  145. package/dist/lib/types/generateTypes.d.ts +6 -0
  146. package/dist/lib/types/index.d.ts +1 -0
  147. package/dist/lib/types/streamTypes.d.ts +6 -0
  148. package/dist/mcp/toolRegistry.js +11 -1
  149. package/dist/neurolink.d.ts +42 -1
  150. package/dist/neurolink.js +218 -0
  151. package/dist/rag/ChunkerRegistry.js +2 -2
  152. package/dist/rag/metadata/MetadataExtractorRegistry.js +2 -2
  153. package/dist/rag/reranker/RerankerRegistry.js +2 -2
  154. package/dist/server/routes/agentRoutes.js +20 -2
  155. package/dist/types/authTypes.d.ts +937 -1
  156. package/dist/types/authTypes.js +2 -1
  157. package/dist/types/configTypes.d.ts +46 -0
  158. package/dist/types/generateTypes.d.ts +6 -0
  159. package/dist/types/index.d.ts +1 -0
  160. package/dist/types/streamTypes.d.ts +6 -0
  161. package/package.json +2 -1
@@ -0,0 +1,304 @@
1
+ // src/lib/auth/providers/oauth2.ts
2
+ import * as jose from "jose";
3
+ import { createProxyFetch } from "../../proxy/proxyFetch.js";
4
+ import { logger } from "../../utils/logger.js";
5
+ import { AuthError } from "../errors.js";
6
+ import { BaseAuthProvider } from "./BaseAuthProvider.js";
7
+ /**
8
+ * Generic OAuth2/OIDC Provider
9
+ *
10
+ * Supports any OAuth2-compliant identity provider with configurable endpoints.
11
+ * Works with both JWKS-based JWT validation and token introspection.
12
+ *
13
+ * Features:
14
+ * - JWT validation with JWKS (if jwksUrl provided)
15
+ * - Token introspection endpoint support
16
+ * - User info endpoint integration
17
+ * - PKCE support
18
+ *
19
+ * @example
20
+ * ```typescript
21
+ * const oauth2 = new OAuth2Provider({
22
+ * type: "oauth2",
23
+ * authorizationUrl: "https://idp.example.com/oauth/authorize",
24
+ * tokenUrl: "https://idp.example.com/oauth/token",
25
+ * userInfoUrl: "https://idp.example.com/userinfo",
26
+ * jwksUrl: "https://idp.example.com/.well-known/jwks.json",
27
+ * clientId: "your-client-id",
28
+ * clientSecret: "your-client-secret",
29
+ * });
30
+ *
31
+ * const result = await oauth2.authenticateToken(accessToken);
32
+ * ```
33
+ */
34
+ export class OAuth2Provider extends BaseAuthProvider {
35
+ type = "oauth2";
36
+ authorizationUrl;
37
+ tokenUrl;
38
+ userInfoUrl;
39
+ jwksUrl;
40
+ clientId;
41
+ clientSecret;
42
+ scopes;
43
+ redirectUrl;
44
+ usePKCE;
45
+ jwks = null;
46
+ constructor(config) {
47
+ super(config);
48
+ if (!config.authorizationUrl) {
49
+ throw AuthError.create("CONFIGURATION_ERROR", "OAuth2 authorizationUrl is required");
50
+ }
51
+ if (!config.tokenUrl) {
52
+ throw AuthError.create("CONFIGURATION_ERROR", "OAuth2 tokenUrl is required");
53
+ }
54
+ if (!config.clientId) {
55
+ throw AuthError.create("CONFIGURATION_ERROR", "OAuth2 clientId is required");
56
+ }
57
+ this.authorizationUrl = config.authorizationUrl;
58
+ this.tokenUrl = config.tokenUrl;
59
+ this.userInfoUrl = config.userInfoUrl;
60
+ this.jwksUrl = config.jwksUrl;
61
+ this.clientId = config.clientId;
62
+ this.clientSecret = config.clientSecret;
63
+ this.scopes = config.scopes ?? ["openid", "profile", "email"];
64
+ this.redirectUrl = config.redirectUrl;
65
+ this.usePKCE = config.usePKCE ?? false;
66
+ }
67
+ /**
68
+ * Initialize JWKS for JWT verification (if jwksUrl is provided)
69
+ */
70
+ async initialize() {
71
+ if (this.jwksUrl) {
72
+ try {
73
+ const jwksUrl = new URL(this.jwksUrl);
74
+ this.jwks = jose.createRemoteJWKSet(jwksUrl);
75
+ logger.debug(`OAuth2 provider initialized with JWKS: ${this.jwksUrl}`);
76
+ }
77
+ catch (error) {
78
+ throw AuthError.create("PROVIDER_INIT_FAILED", "Failed to initialize OAuth2 JWKS", {
79
+ cause: error instanceof Error ? error : new Error(String(error)),
80
+ });
81
+ }
82
+ }
83
+ }
84
+ /**
85
+ * Validate OAuth2 access token
86
+ *
87
+ * Uses JWKS validation if available, otherwise falls back to userinfo endpoint
88
+ */
89
+ async authenticateToken(token, _context) {
90
+ // Try JWKS validation first if available
91
+ if (this.jwksUrl) {
92
+ // Lazy-init JWKS on first use if initialize() was not called
93
+ if (!this.jwks) {
94
+ await this.initialize();
95
+ }
96
+ if (!this.jwks) {
97
+ return {
98
+ valid: false,
99
+ error: "JWKS not available after initialization",
100
+ };
101
+ }
102
+ try {
103
+ const { payload } = await jose.jwtVerify(token, this.jwks);
104
+ // Validate issuer against the authorization server origin
105
+ if (payload.iss) {
106
+ const expectedIssuerOrigin = new URL(this.authorizationUrl).origin;
107
+ if (!payload.iss.startsWith(expectedIssuerOrigin)) {
108
+ return {
109
+ valid: false,
110
+ error: `Invalid issuer: ${payload.iss}. Expected origin: ${expectedIssuerOrigin}`,
111
+ };
112
+ }
113
+ }
114
+ // Validate audience against the configured clientId
115
+ if (payload.aud) {
116
+ const audiences = Array.isArray(payload.aud)
117
+ ? payload.aud
118
+ : [payload.aud];
119
+ if (!audiences.includes(this.clientId)) {
120
+ return {
121
+ valid: false,
122
+ error: `Invalid audience: ${audiences.join(", ")}. Expected: ${this.clientId}`,
123
+ };
124
+ }
125
+ }
126
+ if (!payload.sub) {
127
+ return {
128
+ valid: false,
129
+ error: "JWT is missing required 'sub' claim: cannot identify user",
130
+ };
131
+ }
132
+ const user = {
133
+ id: payload.sub,
134
+ email: payload.email,
135
+ name: payload.name,
136
+ picture: payload.picture,
137
+ roles: payload.roles ?? [],
138
+ permissions: payload.permissions ?? [],
139
+ metadata: payload,
140
+ };
141
+ return {
142
+ valid: true,
143
+ payload: payload,
144
+ user,
145
+ expiresAt: payload.exp ? new Date(payload.exp * 1000) : undefined,
146
+ tokenType: "jwt",
147
+ };
148
+ }
149
+ catch {
150
+ logger.debug("JWKS validation failed, trying userinfo endpoint");
151
+ }
152
+ }
153
+ // Fall back to userinfo endpoint if available
154
+ if (this.userInfoUrl) {
155
+ return this.validateViaUserInfo(token);
156
+ }
157
+ return {
158
+ valid: false,
159
+ error: "No validation method available (provide jwksUrl or userInfoUrl)",
160
+ };
161
+ }
162
+ /**
163
+ * Validate token via userinfo endpoint
164
+ */
165
+ async validateViaUserInfo(token) {
166
+ try {
167
+ const proxyFetch = createProxyFetch();
168
+ if (!this.userInfoUrl) {
169
+ return {
170
+ valid: false,
171
+ error: "UserInfo URL not configured",
172
+ };
173
+ }
174
+ const response = await proxyFetch(this.userInfoUrl, {
175
+ headers: {
176
+ Authorization: `Bearer ${token}`,
177
+ },
178
+ signal: AbortSignal.timeout(5000),
179
+ });
180
+ if (!response.ok) {
181
+ return {
182
+ valid: false,
183
+ error: `UserInfo endpoint returned ${response.status}`,
184
+ };
185
+ }
186
+ const data = (await response.json());
187
+ const userId = data.sub ?? data.id;
188
+ if (!userId) {
189
+ return {
190
+ valid: false,
191
+ error: "UserInfo response is missing 'sub' and 'id': cannot identify user",
192
+ };
193
+ }
194
+ const user = {
195
+ id: userId,
196
+ email: data.email,
197
+ name: data.name,
198
+ picture: data.picture,
199
+ emailVerified: data.email_verified,
200
+ roles: data.roles ?? [],
201
+ permissions: data.permissions ?? [],
202
+ metadata: data,
203
+ };
204
+ return {
205
+ valid: true,
206
+ payload: data,
207
+ user,
208
+ tokenType: "oauth",
209
+ };
210
+ }
211
+ catch (error) {
212
+ const message = error instanceof Error ? error.message : String(error);
213
+ logger.warn("OAuth2 userinfo validation failed:", message);
214
+ return {
215
+ valid: false,
216
+ error: message,
217
+ };
218
+ }
219
+ }
220
+ /**
221
+ * Get authorization URL for OAuth2 flow
222
+ */
223
+ getAuthorizationUrl(state, codeChallenge) {
224
+ const params = new URLSearchParams({
225
+ response_type: "code",
226
+ client_id: this.clientId,
227
+ scope: this.scopes.join(" "),
228
+ state,
229
+ });
230
+ if (this.redirectUrl) {
231
+ params.set("redirect_uri", this.redirectUrl);
232
+ }
233
+ if (this.usePKCE && codeChallenge) {
234
+ params.set("code_challenge", codeChallenge);
235
+ params.set("code_challenge_method", "S256");
236
+ }
237
+ return `${this.authorizationUrl}?${params.toString()}`;
238
+ }
239
+ /**
240
+ * Exchange authorization code for tokens
241
+ */
242
+ async exchangeCode(code, codeVerifier) {
243
+ const proxyFetch = createProxyFetch();
244
+ const body = new URLSearchParams({
245
+ grant_type: "authorization_code",
246
+ client_id: this.clientId,
247
+ code,
248
+ });
249
+ if (this.clientSecret) {
250
+ body.set("client_secret", this.clientSecret);
251
+ }
252
+ if (this.redirectUrl) {
253
+ body.set("redirect_uri", this.redirectUrl);
254
+ }
255
+ if (this.usePKCE && codeVerifier) {
256
+ body.set("code_verifier", codeVerifier);
257
+ }
258
+ const response = await proxyFetch(this.tokenUrl, {
259
+ method: "POST",
260
+ headers: {
261
+ "Content-Type": "application/x-www-form-urlencoded",
262
+ },
263
+ body: body.toString(),
264
+ signal: AbortSignal.timeout(5000),
265
+ });
266
+ if (!response.ok) {
267
+ throw AuthError.create("PROVIDER_ERROR", `Token exchange failed: ${response.status}`);
268
+ }
269
+ const data = (await response.json());
270
+ return {
271
+ accessToken: data.access_token,
272
+ refreshToken: data.refresh_token,
273
+ idToken: data.id_token,
274
+ };
275
+ }
276
+ /**
277
+ * Health check
278
+ */
279
+ async healthCheck() {
280
+ try {
281
+ // Try to fetch JWKS or authorization endpoint to check connectivity
282
+ const proxyFetch = createProxyFetch();
283
+ const checkUrl = this.jwksUrl ?? this.authorizationUrl;
284
+ const response = await proxyFetch(checkUrl, { method: "HEAD" });
285
+ return {
286
+ healthy: response.ok || response.status === 405, // 405 is ok for HEAD
287
+ providerConnected: true,
288
+ sessionStorageHealthy: true,
289
+ error: response.ok || response.status === 405
290
+ ? undefined
291
+ : `HTTP ${response.status}`,
292
+ };
293
+ }
294
+ catch (error) {
295
+ return {
296
+ healthy: false,
297
+ providerConnected: false,
298
+ sessionStorageHealthy: true,
299
+ error: error instanceof Error ? error.message : String(error),
300
+ };
301
+ }
302
+ }
303
+ }
304
+ //# sourceMappingURL=oauth2.js.map
@@ -0,0 +1,63 @@
1
+ import { BaseAuthProvider } from "./BaseAuthProvider.js";
2
+ import type { AuthProviderConfig, SupabaseConfig, AuthUser, TokenValidationResult, AuthRequestContext, AuthHealthCheck, AuthProviderType } from "../../types/authTypes.js";
3
+ /**
4
+ * Supabase Authentication Provider
5
+ *
6
+ * Supports Supabase JWT validation and user management.
7
+ * Can validate tokens locally with JWT secret or via Supabase API.
8
+ *
9
+ * Features:
10
+ * - Local JWT validation with JWT secret
11
+ * - API-based token validation
12
+ * - User profile fetching (requires service role key)
13
+ * - Role extraction from app_metadata
14
+ *
15
+ * @example
16
+ * ```typescript
17
+ * const supabase = new SupabaseAuthProvider({
18
+ * type: "supabase",
19
+ * url: "https://your-project.supabase.co",
20
+ * anonKey: "your-anon-key",
21
+ * jwtSecret: "your-jwt-secret" // Optional for local validation
22
+ * });
23
+ *
24
+ * const result = await supabase.authenticateToken(accessToken);
25
+ * if (result.valid) {
26
+ * console.log("Authenticated user:", result.user);
27
+ * }
28
+ * ```
29
+ */
30
+ export declare class SupabaseAuthProvider extends BaseAuthProvider {
31
+ readonly type: AuthProviderType;
32
+ private supabaseUrl;
33
+ private anonKey;
34
+ private serviceRoleKey?;
35
+ private jwtSecret?;
36
+ constructor(config: AuthProviderConfig & SupabaseConfig);
37
+ /**
38
+ * Validate Supabase JWT
39
+ */
40
+ authenticateToken(token: string, _context?: AuthRequestContext): Promise<TokenValidationResult>;
41
+ /**
42
+ * Convert JWT payload to AuthUser
43
+ */
44
+ private payloadToUser;
45
+ /**
46
+ * Convert Supabase user to AuthUser
47
+ */
48
+ private supabaseUserToAuthUser;
49
+ /**
50
+ * Get user by ID via Supabase Admin API
51
+ * Requires service role key
52
+ */
53
+ getUser(userId: string): Promise<AuthUser | null>;
54
+ /**
55
+ * Get user by email via Supabase Admin API
56
+ * Requires service role key
57
+ */
58
+ getUserByEmail(email: string): Promise<AuthUser | null>;
59
+ /**
60
+ * Health check
61
+ */
62
+ healthCheck(): Promise<AuthHealthCheck>;
63
+ }
@@ -0,0 +1,260 @@
1
+ // src/lib/auth/providers/supabase.ts
2
+ import { BaseAuthProvider } from "./BaseAuthProvider.js";
3
+ import { AuthError } from "../errors.js";
4
+ import { logger } from "../../utils/logger.js";
5
+ import { createProxyFetch } from "../../proxy/proxyFetch.js";
6
+ import * as jose from "jose";
7
+ /**
8
+ * Supabase Authentication Provider
9
+ *
10
+ * Supports Supabase JWT validation and user management.
11
+ * Can validate tokens locally with JWT secret or via Supabase API.
12
+ *
13
+ * Features:
14
+ * - Local JWT validation with JWT secret
15
+ * - API-based token validation
16
+ * - User profile fetching (requires service role key)
17
+ * - Role extraction from app_metadata
18
+ *
19
+ * @example
20
+ * ```typescript
21
+ * const supabase = new SupabaseAuthProvider({
22
+ * type: "supabase",
23
+ * url: "https://your-project.supabase.co",
24
+ * anonKey: "your-anon-key",
25
+ * jwtSecret: "your-jwt-secret" // Optional for local validation
26
+ * });
27
+ *
28
+ * const result = await supabase.authenticateToken(accessToken);
29
+ * if (result.valid) {
30
+ * console.log("Authenticated user:", result.user);
31
+ * }
32
+ * ```
33
+ */
34
+ export class SupabaseAuthProvider extends BaseAuthProvider {
35
+ type = "supabase";
36
+ supabaseUrl;
37
+ anonKey;
38
+ serviceRoleKey;
39
+ jwtSecret;
40
+ constructor(config) {
41
+ super(config);
42
+ if (!config.url) {
43
+ throw AuthError.create("CONFIGURATION_ERROR", "Supabase URL is required", { details: { missingFields: ["url"] } });
44
+ }
45
+ if (!config.anonKey) {
46
+ throw AuthError.create("CONFIGURATION_ERROR", "Supabase anon key is required", { details: { missingFields: ["anonKey"] } });
47
+ }
48
+ this.supabaseUrl = config.url.replace(/\/$/, ""); // Remove trailing slash
49
+ this.anonKey = config.anonKey;
50
+ this.serviceRoleKey = config.serviceRoleKey;
51
+ this.jwtSecret = config.jwtSecret;
52
+ }
53
+ /**
54
+ * Validate Supabase JWT
55
+ */
56
+ async authenticateToken(token, _context) {
57
+ try {
58
+ // If JWT secret is provided, verify locally
59
+ if (this.jwtSecret) {
60
+ const secret = new TextEncoder().encode(this.jwtSecret);
61
+ const { payload } = await jose.jwtVerify(token, secret);
62
+ // Reject tokens without a sub claim (anon/service_role JWTs)
63
+ if (!payload.sub) {
64
+ return {
65
+ valid: false,
66
+ error: "Token missing sub claim: cannot authenticate without a user identity",
67
+ };
68
+ }
69
+ // Only accept tokens with "authenticated" role
70
+ const role = payload.role;
71
+ if (role && role !== "authenticated") {
72
+ return {
73
+ valid: false,
74
+ error: `Invalid token role: ${role}. Only "authenticated" role is accepted`,
75
+ };
76
+ }
77
+ const user = this.payloadToUser(payload);
78
+ return {
79
+ valid: true,
80
+ payload: payload,
81
+ user,
82
+ expiresAt: payload.exp ? new Date(payload.exp * 1000) : undefined,
83
+ tokenType: "jwt",
84
+ };
85
+ }
86
+ // Otherwise, validate via Supabase API
87
+ const proxyFetch = createProxyFetch();
88
+ const response = await proxyFetch(`${this.supabaseUrl}/auth/v1/user`, {
89
+ headers: {
90
+ Authorization: `Bearer ${token}`,
91
+ apikey: this.anonKey,
92
+ },
93
+ });
94
+ if (!response.ok) {
95
+ return {
96
+ valid: false,
97
+ error: `Token validation failed: HTTP ${response.status}`,
98
+ };
99
+ }
100
+ const userData = (await response.json());
101
+ const user = this.supabaseUserToAuthUser(userData);
102
+ return {
103
+ valid: true,
104
+ payload: userData,
105
+ user,
106
+ tokenType: "jwt",
107
+ };
108
+ }
109
+ catch (error) {
110
+ return {
111
+ valid: false,
112
+ error: error instanceof Error ? error.message : String(error),
113
+ };
114
+ }
115
+ }
116
+ /**
117
+ * Convert JWT payload to AuthUser
118
+ */
119
+ payloadToUser(payload) {
120
+ const appMetadata = payload.app_metadata;
121
+ const userMetadata = payload.user_metadata;
122
+ // Use payload.role (Supabase standard claim) for the roles array
123
+ const role = payload.role;
124
+ return {
125
+ id: payload.sub,
126
+ email: payload.email,
127
+ name: userMetadata?.full_name || userMetadata?.name,
128
+ picture: userMetadata?.avatar_url,
129
+ emailVerified: payload.email_confirmed || false,
130
+ roles: role ? [role] : appMetadata?.roles || [],
131
+ permissions: appMetadata?.permissions || [],
132
+ metadata: userMetadata,
133
+ };
134
+ }
135
+ /**
136
+ * Convert Supabase user to AuthUser
137
+ */
138
+ supabaseUserToAuthUser(userData) {
139
+ const appMetadata = userData.app_metadata;
140
+ const userMetadata = userData.user_metadata;
141
+ return {
142
+ id: userData.id,
143
+ email: userData.email,
144
+ name: userMetadata?.full_name || userMetadata?.name,
145
+ picture: userMetadata?.avatar_url,
146
+ emailVerified: !!userData.email_confirmed_at,
147
+ roles: appMetadata?.roles || [],
148
+ permissions: appMetadata?.permissions || [],
149
+ createdAt: userData.created_at
150
+ ? new Date(userData.created_at)
151
+ : undefined,
152
+ lastLoginAt: userData.last_sign_in_at
153
+ ? new Date(userData.last_sign_in_at)
154
+ : undefined,
155
+ metadata: userMetadata,
156
+ };
157
+ }
158
+ /**
159
+ * Get user by ID via Supabase Admin API
160
+ * Requires service role key
161
+ */
162
+ async getUser(userId) {
163
+ if (!this.serviceRoleKey) {
164
+ logger.warn("Service role key required for user lookup");
165
+ return null;
166
+ }
167
+ try {
168
+ const proxyFetch = createProxyFetch();
169
+ const response = await proxyFetch(`${this.supabaseUrl}/auth/v1/admin/users/${userId}`, {
170
+ headers: {
171
+ Authorization: `Bearer ${this.serviceRoleKey}`,
172
+ apikey: this.anonKey,
173
+ },
174
+ });
175
+ if (!response.ok) {
176
+ if (response.status === 404) {
177
+ return null;
178
+ }
179
+ throw AuthError.create("PROVIDER_ERROR", `Supabase API returned ${response.status}`, { details: { statusCode: response.status } });
180
+ }
181
+ const userData = (await response.json());
182
+ return this.supabaseUserToAuthUser(userData);
183
+ }
184
+ catch (error) {
185
+ logger.error("Failed to fetch Supabase user:", error);
186
+ if (error &&
187
+ typeof error === "object" &&
188
+ "code" in error &&
189
+ typeof error.code === "string") {
190
+ throw error;
191
+ }
192
+ return null;
193
+ }
194
+ }
195
+ /**
196
+ * Get user by email via Supabase Admin API
197
+ * Requires service role key
198
+ */
199
+ async getUserByEmail(email) {
200
+ if (!this.serviceRoleKey) {
201
+ logger.warn("Service role key required for user lookup by email");
202
+ return null;
203
+ }
204
+ try {
205
+ const proxyFetch = createProxyFetch();
206
+ const response = await proxyFetch(`${this.supabaseUrl}/auth/v1/admin/users?email=${encodeURIComponent(email)}`, {
207
+ headers: {
208
+ Authorization: `Bearer ${this.serviceRoleKey}`,
209
+ apikey: this.anonKey,
210
+ },
211
+ });
212
+ if (!response.ok) {
213
+ throw AuthError.create("PROVIDER_ERROR", `Supabase API returned ${response.status}`, { details: { statusCode: response.status } });
214
+ }
215
+ const result = (await response.json());
216
+ const users = result.users || [];
217
+ if (users.length === 0) {
218
+ return null;
219
+ }
220
+ return this.supabaseUserToAuthUser(users[0]);
221
+ }
222
+ catch (error) {
223
+ logger.error("Failed to fetch Supabase user by email:", error);
224
+ if (error &&
225
+ typeof error === "object" &&
226
+ "code" in error &&
227
+ typeof error.code === "string") {
228
+ throw error;
229
+ }
230
+ return null;
231
+ }
232
+ }
233
+ /**
234
+ * Health check
235
+ */
236
+ async healthCheck() {
237
+ try {
238
+ const proxyFetch = createProxyFetch();
239
+ const response = await proxyFetch(`${this.supabaseUrl}/auth/v1/health`, {
240
+ headers: {
241
+ apikey: this.anonKey,
242
+ },
243
+ });
244
+ return {
245
+ healthy: response.ok,
246
+ providerConnected: response.ok,
247
+ sessionStorageHealthy: true,
248
+ };
249
+ }
250
+ catch (error) {
251
+ return {
252
+ healthy: false,
253
+ providerConnected: false,
254
+ sessionStorageHealthy: true,
255
+ error: error instanceof Error ? error.message : String(error),
256
+ };
257
+ }
258
+ }
259
+ }
260
+ //# sourceMappingURL=supabase.js.map
@@ -0,0 +1,61 @@
1
+ import type { AuthProviderConfig, WorkOSConfig, AuthUser, TokenValidationResult, AuthRequestContext, AuthHealthCheck } from "../../types/authTypes.js";
2
+ import { BaseAuthProvider } from "./BaseAuthProvider.js";
3
+ /**
4
+ * WorkOS Authentication Provider
5
+ *
6
+ * Supports WorkOS for enterprise SSO and user management.
7
+ * Validates JWTs issued by WorkOS and fetches user information.
8
+ *
9
+ * Features:
10
+ * - JWT validation using WorkOS JWKS
11
+ * - SSO token validation
12
+ * - Enterprise directory integration
13
+ * - Organization support for multi-tenant apps
14
+ * - Session management (inherited from BaseAuthProvider)
15
+ *
16
+ * @example
17
+ * ```typescript
18
+ * const workos = new WorkOSProvider({
19
+ * type: "workos",
20
+ * apiKey: "sk_...",
21
+ * clientId: "client_..."
22
+ * });
23
+ *
24
+ * const result = await workos.authenticateToken(accessToken);
25
+ * if (result.valid) {
26
+ * console.log("Authenticated user:", result.user);
27
+ * }
28
+ * ```
29
+ */
30
+ export declare class WorkOSProvider extends BaseAuthProvider {
31
+ readonly type: "workos";
32
+ private apiKey;
33
+ private clientId;
34
+ private organizationId?;
35
+ private jwks;
36
+ constructor(config: AuthProviderConfig & WorkOSConfig);
37
+ /**
38
+ * Initialize JWKS for WorkOS token verification
39
+ */
40
+ initialize(): Promise<void>;
41
+ /**
42
+ * Validate WorkOS access token
43
+ */
44
+ authenticateToken(token: string, _context?: AuthRequestContext): Promise<TokenValidationResult>;
45
+ /**
46
+ * Validate session via WorkOS API
47
+ */
48
+ private validateSessionViaAPI;
49
+ /**
50
+ * Get user by ID via WorkOS API
51
+ */
52
+ getUser(userId: string): Promise<AuthUser | null>;
53
+ /**
54
+ * Get user by email via WorkOS API
55
+ */
56
+ getUserByEmail(email: string): Promise<AuthUser | null>;
57
+ /**
58
+ * Health check
59
+ */
60
+ healthCheck(): Promise<AuthHealthCheck>;
61
+ }