@meistrari/auth-core 1.13.3 → 1.15.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.mts CHANGED
@@ -3324,6 +3324,61 @@ declare function createAPIClient(apiUrl: string, fetchOptions?: BetterFetchOptio
3324
3324
  data: StartAuthorizationFlowResponse;
3325
3325
  error: null;
3326
3326
  }>;
3327
+ startDeviceAuthorizationFlow: (requesterApplicationId: string, targetApplicationId: string) => Promise<{
3328
+ data: null;
3329
+ error: {
3330
+ message?: string | undefined;
3331
+ status: number;
3332
+ statusText: string;
3333
+ };
3334
+ } | {
3335
+ data: DeviceAuthorizationResponse;
3336
+ error: null;
3337
+ }>;
3338
+ getDeviceAuthorizationContext: (userCode: string) => Promise<{
3339
+ data: null;
3340
+ error: {
3341
+ message?: string | undefined;
3342
+ status: number;
3343
+ statusText: string;
3344
+ };
3345
+ } | {
3346
+ data: DeviceAuthorizationContextResponse;
3347
+ error: null;
3348
+ }>;
3349
+ approveDeviceAuthorizationFlow: (userCode: string, organizationId: string) => Promise<{
3350
+ data: null;
3351
+ error: {
3352
+ message?: string | undefined;
3353
+ status: number;
3354
+ statusText: string;
3355
+ };
3356
+ } | {
3357
+ data: DeviceAuthorizationActionResponse;
3358
+ error: null;
3359
+ }>;
3360
+ denyDeviceAuthorizationFlow: (userCode: string) => Promise<{
3361
+ data: null;
3362
+ error: {
3363
+ message?: string | undefined;
3364
+ status: number;
3365
+ statusText: string;
3366
+ };
3367
+ } | {
3368
+ data: DeviceAuthorizationActionResponse;
3369
+ error: null;
3370
+ }>;
3371
+ exchangeDeviceCodeForTokens: (deviceCode: string) => Promise<{
3372
+ data: null;
3373
+ error: {
3374
+ message?: string | undefined;
3375
+ status: number;
3376
+ statusText: string;
3377
+ };
3378
+ } | {
3379
+ data: CompleteAuthorizationFlowResponse;
3380
+ error: null;
3381
+ }>;
3327
3382
  completeAuthorizationFlow: (code: string, codeVerifier: string) => Promise<{
3328
3383
  data: null;
3329
3384
  error: {
@@ -4360,6 +4415,32 @@ type WhoAmIResponse = {
4360
4415
  user: User;
4361
4416
  organization: FullOrganization;
4362
4417
  };
4418
+ type DeviceAuthorizationResponse = {
4419
+ device_code: string;
4420
+ user_code: string;
4421
+ verification_uri: string;
4422
+ verification_uri_complete: string;
4423
+ expires_in: number;
4424
+ interval: number;
4425
+ };
4426
+ type DeviceContextApplication = {
4427
+ id: string;
4428
+ name: string;
4429
+ description: string | null;
4430
+ };
4431
+ type DeviceAuthorizationContextResponse = {
4432
+ requester: DeviceContextApplication & {
4433
+ isVerified: boolean;
4434
+ };
4435
+ target: DeviceContextApplication;
4436
+ organizations: FullOrganization[];
4437
+ preselectedOrganizationId: string | null;
4438
+ status: 'pending' | 'approved' | 'denied';
4439
+ expiresIn: number;
4440
+ };
4441
+ type DeviceAuthorizationActionResponse = {
4442
+ success: boolean;
4443
+ };
4363
4444
 
4364
4445
  declare class BaseError extends Error {
4365
4446
  code: string;
@@ -4378,6 +4459,21 @@ declare class AuthorizationFlowError extends ApplicationError {
4378
4459
  declare class UserNotLoggedInError extends ApplicationError {
4379
4460
  constructor(message: string, options?: ErrorOptions);
4380
4461
  }
4462
+ declare class DeviceAuthorizationPendingError extends ApplicationError {
4463
+ constructor(options?: ErrorOptions);
4464
+ }
4465
+ declare class DeviceAuthorizationSlowDownError extends ApplicationError {
4466
+ constructor(options?: ErrorOptions);
4467
+ }
4468
+ declare class DeviceAccessDeniedError extends ApplicationError {
4469
+ constructor(options?: ErrorOptions);
4470
+ }
4471
+ declare class DeviceCodeExpiredError extends ApplicationError {
4472
+ constructor(options?: ErrorOptions);
4473
+ }
4474
+ declare class DeviceTransientServerError extends ApplicationError {
4475
+ constructor(options?: ErrorOptions);
4476
+ }
4381
4477
 
4382
4478
  /**
4383
4479
  * Service for managing applications and their candidate organizations.
@@ -4418,6 +4514,11 @@ declare class ApplicationService {
4418
4514
  * @param organizationId - The organization ID to start the authorization flow for
4419
4515
  */
4420
4516
  startAuthorizationFlow(applicationId: string, redirectUri: string, codeChallenge: string, organizationId: string): Promise<StartAuthorizationFlowResponse>;
4517
+ startDeviceAuthorizationFlow(requesterApplicationId: string, targetApplicationId: string): Promise<DeviceAuthorizationResponse>;
4518
+ getDeviceAuthorizationContext(userCode: string): Promise<DeviceAuthorizationContextResponse>;
4519
+ approveDeviceAuthorizationFlow(userCode: string, organizationId: string): Promise<DeviceAuthorizationActionResponse>;
4520
+ denyDeviceAuthorizationFlow(userCode: string): Promise<DeviceAuthorizationActionResponse>;
4521
+ exchangeDeviceCodeForTokens(deviceCode: string): Promise<CompleteAuthorizationFlowResponse>;
4421
4522
  /**
4422
4523
  * Completes an authorization flow for a specific application.
4423
4524
  *
@@ -4432,7 +4533,7 @@ declare class ApplicationService {
4432
4533
  * @throws {RefreshTokenExpiredError} When the refresh token has expired or is invalid
4433
4534
  * @throws {ApplicationError} For other API errors
4434
4535
  */
4435
- refreshAccessToken(refreshToken: string): Promise<CompleteAuthorizationFlowResponse>;
4536
+ refreshAccessToken(refreshToken: string): Promise<CompleteAuthorizationFlowResponse | null | undefined>;
4436
4537
  /**
4437
4538
  * Gets the current user and organization for a specific application.
4438
4539
  *
@@ -5083,5 +5184,5 @@ declare function validateToken(token: string, apiUrl: string): Promise<boolean>;
5083
5184
  */
5084
5185
  declare function extractTokenPayload(token: string): JWTPayload;
5085
5186
 
5086
- export { ApplicationError, AuthClient, AuthorizationFlowError, EmailRequired, InvalidCallbackURL, InvalidSocialProvider, JWTPayload, JWTPayloadUser, JWTPayloadWorkspace, RefreshTokenExpiredError, Roles, UserNotLoggedInError, ac, createAPIClient, extractTokenPayload, isTokenExpired, memberAdditionalFields, organizationAdditionalFields, rolesAccessControl, userAdditionalFields, validateToken };
5087
- export type { APIClient, ApiKey, ApiKeyMetadata, ApiKeyWithoutSecret, Application, CompleteAuthorizationFlowResponse, CreateApiKeyPayload, CreateTeamPayload, FullOrganization, Invitation, InviteUserToOrganizationOptions, ListCandidateOrganizationsResponse, ListMembersOptions, Member, ExtendedOrganization as Organization, RemoveUserFromOrganizationOptions, Role, Session, SignInWithEmailAndPasswordOptions, SignInWithSamlOptions, SocialSignInOptions, StartAuthorizationFlowResponse, Team, TeamMember, UpdateApiKeyPayload, UpdateMemberRoleOptions, UpdateOrganizationPayload, UpdateTeamPayload, User, WhoAmIResponse };
5187
+ export { ApplicationError, AuthClient, AuthorizationFlowError, DeviceAccessDeniedError, DeviceAuthorizationPendingError, DeviceAuthorizationSlowDownError, DeviceCodeExpiredError, DeviceTransientServerError, EmailRequired, InvalidCallbackURL, InvalidSocialProvider, JWTPayload, JWTPayloadUser, JWTPayloadWorkspace, RefreshTokenExpiredError, Roles, UserNotLoggedInError, ac, createAPIClient, extractTokenPayload, isTokenExpired, memberAdditionalFields, organizationAdditionalFields, rolesAccessControl, userAdditionalFields, validateToken };
5188
+ export type { APIClient, ApiKey, ApiKeyMetadata, ApiKeyWithoutSecret, Application, CompleteAuthorizationFlowResponse, CreateApiKeyPayload, CreateTeamPayload, DeviceAuthorizationActionResponse, DeviceAuthorizationContextResponse, DeviceAuthorizationResponse, FullOrganization, Invitation, InviteUserToOrganizationOptions, ListCandidateOrganizationsResponse, ListMembersOptions, Member, ExtendedOrganization as Organization, RemoveUserFromOrganizationOptions, Role, Session, SignInWithEmailAndPasswordOptions, SignInWithSamlOptions, SocialSignInOptions, StartAuthorizationFlowResponse, Team, TeamMember, UpdateApiKeyPayload, UpdateMemberRoleOptions, UpdateOrganizationPayload, UpdateTeamPayload, User, WhoAmIResponse };
package/dist/index.d.ts CHANGED
@@ -3324,6 +3324,61 @@ declare function createAPIClient(apiUrl: string, fetchOptions?: BetterFetchOptio
3324
3324
  data: StartAuthorizationFlowResponse;
3325
3325
  error: null;
3326
3326
  }>;
3327
+ startDeviceAuthorizationFlow: (requesterApplicationId: string, targetApplicationId: string) => Promise<{
3328
+ data: null;
3329
+ error: {
3330
+ message?: string | undefined;
3331
+ status: number;
3332
+ statusText: string;
3333
+ };
3334
+ } | {
3335
+ data: DeviceAuthorizationResponse;
3336
+ error: null;
3337
+ }>;
3338
+ getDeviceAuthorizationContext: (userCode: string) => Promise<{
3339
+ data: null;
3340
+ error: {
3341
+ message?: string | undefined;
3342
+ status: number;
3343
+ statusText: string;
3344
+ };
3345
+ } | {
3346
+ data: DeviceAuthorizationContextResponse;
3347
+ error: null;
3348
+ }>;
3349
+ approveDeviceAuthorizationFlow: (userCode: string, organizationId: string) => Promise<{
3350
+ data: null;
3351
+ error: {
3352
+ message?: string | undefined;
3353
+ status: number;
3354
+ statusText: string;
3355
+ };
3356
+ } | {
3357
+ data: DeviceAuthorizationActionResponse;
3358
+ error: null;
3359
+ }>;
3360
+ denyDeviceAuthorizationFlow: (userCode: string) => Promise<{
3361
+ data: null;
3362
+ error: {
3363
+ message?: string | undefined;
3364
+ status: number;
3365
+ statusText: string;
3366
+ };
3367
+ } | {
3368
+ data: DeviceAuthorizationActionResponse;
3369
+ error: null;
3370
+ }>;
3371
+ exchangeDeviceCodeForTokens: (deviceCode: string) => Promise<{
3372
+ data: null;
3373
+ error: {
3374
+ message?: string | undefined;
3375
+ status: number;
3376
+ statusText: string;
3377
+ };
3378
+ } | {
3379
+ data: CompleteAuthorizationFlowResponse;
3380
+ error: null;
3381
+ }>;
3327
3382
  completeAuthorizationFlow: (code: string, codeVerifier: string) => Promise<{
3328
3383
  data: null;
3329
3384
  error: {
@@ -4360,6 +4415,32 @@ type WhoAmIResponse = {
4360
4415
  user: User;
4361
4416
  organization: FullOrganization;
4362
4417
  };
4418
+ type DeviceAuthorizationResponse = {
4419
+ device_code: string;
4420
+ user_code: string;
4421
+ verification_uri: string;
4422
+ verification_uri_complete: string;
4423
+ expires_in: number;
4424
+ interval: number;
4425
+ };
4426
+ type DeviceContextApplication = {
4427
+ id: string;
4428
+ name: string;
4429
+ description: string | null;
4430
+ };
4431
+ type DeviceAuthorizationContextResponse = {
4432
+ requester: DeviceContextApplication & {
4433
+ isVerified: boolean;
4434
+ };
4435
+ target: DeviceContextApplication;
4436
+ organizations: FullOrganization[];
4437
+ preselectedOrganizationId: string | null;
4438
+ status: 'pending' | 'approved' | 'denied';
4439
+ expiresIn: number;
4440
+ };
4441
+ type DeviceAuthorizationActionResponse = {
4442
+ success: boolean;
4443
+ };
4363
4444
 
4364
4445
  declare class BaseError extends Error {
4365
4446
  code: string;
@@ -4378,6 +4459,21 @@ declare class AuthorizationFlowError extends ApplicationError {
4378
4459
  declare class UserNotLoggedInError extends ApplicationError {
4379
4460
  constructor(message: string, options?: ErrorOptions);
4380
4461
  }
4462
+ declare class DeviceAuthorizationPendingError extends ApplicationError {
4463
+ constructor(options?: ErrorOptions);
4464
+ }
4465
+ declare class DeviceAuthorizationSlowDownError extends ApplicationError {
4466
+ constructor(options?: ErrorOptions);
4467
+ }
4468
+ declare class DeviceAccessDeniedError extends ApplicationError {
4469
+ constructor(options?: ErrorOptions);
4470
+ }
4471
+ declare class DeviceCodeExpiredError extends ApplicationError {
4472
+ constructor(options?: ErrorOptions);
4473
+ }
4474
+ declare class DeviceTransientServerError extends ApplicationError {
4475
+ constructor(options?: ErrorOptions);
4476
+ }
4381
4477
 
4382
4478
  /**
4383
4479
  * Service for managing applications and their candidate organizations.
@@ -4418,6 +4514,11 @@ declare class ApplicationService {
4418
4514
  * @param organizationId - The organization ID to start the authorization flow for
4419
4515
  */
4420
4516
  startAuthorizationFlow(applicationId: string, redirectUri: string, codeChallenge: string, organizationId: string): Promise<StartAuthorizationFlowResponse>;
4517
+ startDeviceAuthorizationFlow(requesterApplicationId: string, targetApplicationId: string): Promise<DeviceAuthorizationResponse>;
4518
+ getDeviceAuthorizationContext(userCode: string): Promise<DeviceAuthorizationContextResponse>;
4519
+ approveDeviceAuthorizationFlow(userCode: string, organizationId: string): Promise<DeviceAuthorizationActionResponse>;
4520
+ denyDeviceAuthorizationFlow(userCode: string): Promise<DeviceAuthorizationActionResponse>;
4521
+ exchangeDeviceCodeForTokens(deviceCode: string): Promise<CompleteAuthorizationFlowResponse>;
4421
4522
  /**
4422
4523
  * Completes an authorization flow for a specific application.
4423
4524
  *
@@ -4432,7 +4533,7 @@ declare class ApplicationService {
4432
4533
  * @throws {RefreshTokenExpiredError} When the refresh token has expired or is invalid
4433
4534
  * @throws {ApplicationError} For other API errors
4434
4535
  */
4435
- refreshAccessToken(refreshToken: string): Promise<CompleteAuthorizationFlowResponse>;
4536
+ refreshAccessToken(refreshToken: string): Promise<CompleteAuthorizationFlowResponse | null | undefined>;
4436
4537
  /**
4437
4538
  * Gets the current user and organization for a specific application.
4438
4539
  *
@@ -5083,5 +5184,5 @@ declare function validateToken(token: string, apiUrl: string): Promise<boolean>;
5083
5184
  */
5084
5185
  declare function extractTokenPayload(token: string): JWTPayload;
5085
5186
 
5086
- export { ApplicationError, AuthClient, AuthorizationFlowError, EmailRequired, InvalidCallbackURL, InvalidSocialProvider, JWTPayload, JWTPayloadUser, JWTPayloadWorkspace, RefreshTokenExpiredError, Roles, UserNotLoggedInError, ac, createAPIClient, extractTokenPayload, isTokenExpired, memberAdditionalFields, organizationAdditionalFields, rolesAccessControl, userAdditionalFields, validateToken };
5087
- export type { APIClient, ApiKey, ApiKeyMetadata, ApiKeyWithoutSecret, Application, CompleteAuthorizationFlowResponse, CreateApiKeyPayload, CreateTeamPayload, FullOrganization, Invitation, InviteUserToOrganizationOptions, ListCandidateOrganizationsResponse, ListMembersOptions, Member, ExtendedOrganization as Organization, RemoveUserFromOrganizationOptions, Role, Session, SignInWithEmailAndPasswordOptions, SignInWithSamlOptions, SocialSignInOptions, StartAuthorizationFlowResponse, Team, TeamMember, UpdateApiKeyPayload, UpdateMemberRoleOptions, UpdateOrganizationPayload, UpdateTeamPayload, User, WhoAmIResponse };
5187
+ export { ApplicationError, AuthClient, AuthorizationFlowError, DeviceAccessDeniedError, DeviceAuthorizationPendingError, DeviceAuthorizationSlowDownError, DeviceCodeExpiredError, DeviceTransientServerError, EmailRequired, InvalidCallbackURL, InvalidSocialProvider, JWTPayload, JWTPayloadUser, JWTPayloadWorkspace, RefreshTokenExpiredError, Roles, UserNotLoggedInError, ac, createAPIClient, extractTokenPayload, isTokenExpired, memberAdditionalFields, organizationAdditionalFields, rolesAccessControl, userAdditionalFields, validateToken };
5188
+ export type { APIClient, ApiKey, ApiKeyMetadata, ApiKeyWithoutSecret, Application, CompleteAuthorizationFlowResponse, CreateApiKeyPayload, CreateTeamPayload, DeviceAuthorizationActionResponse, DeviceAuthorizationContextResponse, DeviceAuthorizationResponse, FullOrganization, Invitation, InviteUserToOrganizationOptions, ListCandidateOrganizationsResponse, ListMembersOptions, Member, ExtendedOrganization as Organization, RemoveUserFromOrganizationOptions, Role, Session, SignInWithEmailAndPasswordOptions, SignInWithSamlOptions, SocialSignInOptions, StartAuthorizationFlowResponse, Team, TeamMember, UpdateApiKeyPayload, UpdateMemberRoleOptions, UpdateOrganizationPayload, UpdateTeamPayload, User, WhoAmIResponse };
package/dist/index.mjs CHANGED
@@ -8,7 +8,7 @@ import { defaultStatements } from 'better-auth/plugins/organization/access';
8
8
  import { z } from 'zod';
9
9
  export { APIError } from 'better-auth';
10
10
 
11
- const version = "1.13.3";
11
+ const version = "1.15.0";
12
12
 
13
13
  const statements = {
14
14
  ...defaultStatements,
@@ -78,6 +78,7 @@ const JWTPayload = z.object({
78
78
  sessionKey: z.string()
79
79
  });
80
80
 
81
+ const DEVICE_CODE_GRANT = "urn:ietf:params:oauth:grant-type:device_code";
81
82
  function applicationsPluginClient() {
82
83
  return {
83
84
  id: "applications",
@@ -110,6 +111,49 @@ function applicationsPluginClient() {
110
111
  }
111
112
  });
112
113
  },
114
+ startDeviceAuthorizationFlow: async (requesterApplicationId, targetApplicationId) => {
115
+ return await $fetch("/applications/device/authorize", {
116
+ method: "POST",
117
+ body: {
118
+ requesterApplicationId,
119
+ targetApplicationId
120
+ }
121
+ });
122
+ },
123
+ getDeviceAuthorizationContext: async (userCode) => {
124
+ return await $fetch("/applications/device/context", {
125
+ method: "GET",
126
+ query: {
127
+ userCode
128
+ }
129
+ });
130
+ },
131
+ approveDeviceAuthorizationFlow: async (userCode, organizationId) => {
132
+ return await $fetch("/applications/device/approve", {
133
+ method: "POST",
134
+ body: {
135
+ userCode,
136
+ organizationId
137
+ }
138
+ });
139
+ },
140
+ denyDeviceAuthorizationFlow: async (userCode) => {
141
+ return await $fetch("/applications/device/deny", {
142
+ method: "POST",
143
+ body: {
144
+ userCode
145
+ }
146
+ });
147
+ },
148
+ exchangeDeviceCodeForTokens: async (deviceCode) => {
149
+ return await $fetch("/applications/token", {
150
+ method: "POST",
151
+ body: {
152
+ grantType: DEVICE_CODE_GRANT,
153
+ deviceCode
154
+ }
155
+ });
156
+ },
113
157
  completeAuthorizationFlow: async (code, codeVerifier) => {
114
158
  return await $fetch("/applications/token", {
115
159
  method: "POST",
@@ -241,7 +285,70 @@ class UserNotLoggedInError extends ApplicationError {
241
285
  this.code = "USER_NOT_LOGGED_IN";
242
286
  }
243
287
  }
288
+ class DeviceAuthorizationPendingError extends ApplicationError {
289
+ constructor(options) {
290
+ super("Authorization is still pending", options);
291
+ this.code = "AUTHORIZATION_PENDING";
292
+ }
293
+ }
294
+ class DeviceAuthorizationSlowDownError extends ApplicationError {
295
+ constructor(options) {
296
+ super("Polling too frequently. Slow down and retry later.", options);
297
+ this.code = "SLOW_DOWN";
298
+ }
299
+ }
300
+ class DeviceAccessDeniedError extends ApplicationError {
301
+ constructor(options) {
302
+ super("The user denied the device authorization request", options);
303
+ this.code = "ACCESS_DENIED";
304
+ }
305
+ }
306
+ class DeviceCodeExpiredError extends ApplicationError {
307
+ constructor(options) {
308
+ super("The device code expired or has already been consumed", options);
309
+ this.code = "EXPIRED_TOKEN";
310
+ }
311
+ }
312
+ class DeviceTransientServerError extends ApplicationError {
313
+ constructor(options) {
314
+ super("The authorization server returned a transient error. The exchange can be safely retried.", options);
315
+ this.code = "TRANSIENT_SERVER_ERROR";
316
+ }
317
+ }
244
318
 
319
+ function parseErrorCode(error) {
320
+ if (!error || typeof error !== "object") {
321
+ return null;
322
+ }
323
+ const candidateError = error;
324
+ return candidateError.code ?? candidateError.error?.code ?? null;
325
+ }
326
+ function parseErrorMessage(error) {
327
+ if (!error || typeof error !== "object") {
328
+ return "Failed to exchange device code for tokens";
329
+ }
330
+ const candidateError = error;
331
+ return candidateError.message ?? candidateError.error?.message ?? "Failed to exchange device code for tokens";
332
+ }
333
+ function throwDeviceGrantError(error) {
334
+ const code = parseErrorCode(error);
335
+ if (code === "authorization_pending") {
336
+ throw new DeviceAuthorizationPendingError({ cause: error });
337
+ }
338
+ if (code === "slow_down") {
339
+ throw new DeviceAuthorizationSlowDownError({ cause: error });
340
+ }
341
+ if (code === "access_denied") {
342
+ throw new DeviceAccessDeniedError({ cause: error });
343
+ }
344
+ if (code === "expired_token") {
345
+ throw new DeviceCodeExpiredError({ cause: error });
346
+ }
347
+ if (code === "temporarily_unavailable") {
348
+ throw new DeviceTransientServerError({ cause: error });
349
+ }
350
+ throw new ApplicationError(parseErrorMessage(error), { cause: error });
351
+ }
245
352
  class ApplicationService {
246
353
  /**
247
354
  * Creates a new ApplicationService instance.
@@ -282,6 +389,47 @@ class ApplicationService {
282
389
  }
283
390
  return response.data;
284
391
  }
392
+ async startDeviceAuthorizationFlow(requesterApplicationId, targetApplicationId) {
393
+ const response = await this.client.applications.startDeviceAuthorizationFlow(requesterApplicationId, targetApplicationId);
394
+ if (!response.data) {
395
+ throw new Error("No data returned from the API", { cause: response.error });
396
+ }
397
+ return response.data;
398
+ }
399
+ async getDeviceAuthorizationContext(userCode) {
400
+ const response = await this.client.applications.getDeviceAuthorizationContext(userCode);
401
+ if (!response.data) {
402
+ throw new Error("No data returned from the API", { cause: response.error });
403
+ }
404
+ return response.data;
405
+ }
406
+ async approveDeviceAuthorizationFlow(userCode, organizationId) {
407
+ const response = await this.client.applications.approveDeviceAuthorizationFlow(userCode, organizationId);
408
+ if (!response.data) {
409
+ throw new Error("No data returned from the API", { cause: response.error });
410
+ }
411
+ return response.data;
412
+ }
413
+ async denyDeviceAuthorizationFlow(userCode) {
414
+ const response = await this.client.applications.denyDeviceAuthorizationFlow(userCode);
415
+ if (!response.data) {
416
+ throw new Error("No data returned from the API", { cause: response.error });
417
+ }
418
+ return response.data;
419
+ }
420
+ async exchangeDeviceCodeForTokens(deviceCode) {
421
+ try {
422
+ const response = await this.client.applications.exchangeDeviceCodeForTokens(deviceCode);
423
+ if (!response.data) {
424
+ throwDeviceGrantError(response.error);
425
+ }
426
+ return response.data;
427
+ } catch (error) {
428
+ if (error instanceof ApplicationError)
429
+ throw error;
430
+ throwDeviceGrantError(error);
431
+ }
432
+ }
285
433
  /**
286
434
  * Completes an authorization flow for a specific application.
287
435
  *
@@ -303,16 +451,25 @@ class ApplicationService {
303
451
  * @throws {ApplicationError} For other API errors
304
452
  */
305
453
  async refreshAccessToken(refreshToken) {
306
- const response = await this.client.applications.refreshAccessToken(refreshToken);
307
- if (!response.data) {
308
- const error = response.error;
454
+ const handleRefreshError = (error) => {
309
455
  const status = error?.status;
310
456
  if (status === 404) {
311
457
  throw new RefreshTokenExpiredError({ cause: error });
312
458
  }
313
- throw new ApplicationError(error?.message || "Failed to refresh access token", { cause: error });
459
+ const message = error?.message;
460
+ throw new ApplicationError(message || "Failed to refresh access token", { cause: error });
461
+ };
462
+ try {
463
+ const response = await this.client.applications.refreshAccessToken(refreshToken);
464
+ if (!response.data) {
465
+ handleRefreshError(response.error);
466
+ }
467
+ return response.data;
468
+ } catch (error) {
469
+ if (error instanceof ApplicationError)
470
+ throw error;
471
+ handleRefreshError(error);
314
472
  }
315
- return response.data;
316
473
  }
317
474
  /**
318
475
  * Gets the current user and organization for a specific application.
@@ -877,4 +1034,4 @@ function extractTokenPayload(token) {
877
1034
  return payload;
878
1035
  }
879
1036
 
880
- export { ApplicationError, AuthClient, AuthorizationFlowError, EmailRequired, InvalidCallbackURL, InvalidSocialProvider, JWTPayload, JWTPayloadUser, JWTPayloadWorkspace, RefreshTokenExpiredError, Roles, UserNotLoggedInError, ac, extractTokenPayload, isTokenExpired, memberAdditionalFields, organizationAdditionalFields, rolesAccessControl, userAdditionalFields, validateToken };
1037
+ export { ApplicationError, AuthClient, AuthorizationFlowError, DeviceAccessDeniedError, DeviceAuthorizationPendingError, DeviceAuthorizationSlowDownError, DeviceCodeExpiredError, DeviceTransientServerError, EmailRequired, InvalidCallbackURL, InvalidSocialProvider, JWTPayload, JWTPayloadUser, JWTPayloadWorkspace, RefreshTokenExpiredError, Roles, UserNotLoggedInError, ac, extractTokenPayload, isTokenExpired, memberAdditionalFields, organizationAdditionalFields, rolesAccessControl, userAdditionalFields, validateToken };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@meistrari/auth-core",
3
- "version": "1.13.3",
3
+ "version": "1.15.0",
4
4
  "type": "module",
5
5
  "exports": {
6
6
  ".": {