@opencampus/ocid-connect-js 2.0.3 → 2.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md ADDED
@@ -0,0 +1,59 @@
1
+ # Changelog
2
+
3
+ All notable changes to this project will be documented in this file.
4
+
5
+ ## [v2.0.5] - 2025-11-06
6
+ ### Changed
7
+ - Add option to send email to login process.
8
+
9
+ ## [v2.0.3] - 2025-04-29
10
+ ### Changed
11
+ - Allow overriding state in LoginButton
12
+
13
+ ## [v2.0.2] - 2025-04-28
14
+ ### Changed
15
+ - Update for React v19
16
+
17
+ ## [v2.0.1] - 2025-04-03
18
+ ### Changed
19
+ - Add optional storage key override to allow overlap cookie domain to distinguish their own storage states.
20
+
21
+ ## [v2.0.0] - 2025-03-28
22
+ ### Changed
23
+ - Authentication Client Id.
24
+ - New updated spinner while waiting for token exchange.
25
+
26
+ ## [v1.2.3] - 2024-11-04
27
+ ### Changed
28
+ - Add logoutReturnTo as an optional parameter to logout method so users can instruct OC Service to return to a designation url after logging out.
29
+
30
+ ## [v1.2.2] - 2024-10-16
31
+ ### Changed
32
+ - Add new properties to OCAuthCore:
33
+ - OCId
34
+ - ethAddress
35
+ - State parameters (from signup process)
36
+
37
+ ## [v1.2.1] - 2024-10-03
38
+ ### Changed
39
+ - Add methods to access parsed data from idToken and accessToken
40
+
41
+ ## [v1.2.0] - 2024-09-22
42
+ ### Added
43
+ - Add logout function to instruct OC to log user out of OC Service
44
+
45
+ ## [v1.1.2] - 2024-08-28
46
+ ### Changed
47
+ - Add option to send referral code to registration process.
48
+ - Referral code is used in OpenCampus for bonus points.
49
+
50
+ ## [v1.1.0] - 2024-08-22
51
+ ### Added
52
+ - Improved cross-domain storage handling
53
+ - Implemented cookie-based storage option:
54
+ - Added `storageType: 'cookie'` option
55
+ - Added `cookieDomain` configuration for domain specification
56
+
57
+ ## [v1.0.1] - 2024-08-06
58
+ ### Added
59
+ - Initial release
package/README.md CHANGED
@@ -15,6 +15,10 @@ You **do not need a Client ID when testing integration in Sandbox mode**. Sandbo
15
15
 
16
16
  > If you were onboarded to live integration before Apr 2025 and did not have an Open Campus Developer Account, you would **need to** use the V1.x SDK. Please get in touch with your Open Campus point of contact to get your Open Campus Developer Account and migrate to the V2 SDK. Thanks!
17
17
 
18
+ ## Remark for sandbox mode
19
+
20
+ If your OCID is signed up through sandbox mode, your OCID will not be properly initialized in our system until you log in to https://id.sandbox.opencampus.xyz/.
21
+
18
22
  ## Setup
19
23
 
20
24
  **yarn**
@@ -430,8 +430,8 @@ var LoginCallBack = function LoginCallBack(_ref) {
430
430
  __webpack_require__.r(__webpack_exports__);
431
431
  /* harmony import */ var react__WEBPACK_IMPORTED_MODULE_0__ = __webpack_require__(3);
432
432
  /* harmony import */ var react__WEBPACK_IMPORTED_MODULE_0___default = /*#__PURE__*/__webpack_require__.n(react__WEBPACK_IMPORTED_MODULE_0__);
433
- /* harmony import */ var _OCSpinner_css__WEBPACK_IMPORTED_MODULE_1__ = __webpack_require__(7);
434
- /* harmony import */ var _OCSpinner_css__WEBPACK_IMPORTED_MODULE_1___default = /*#__PURE__*/__webpack_require__.n(_OCSpinner_css__WEBPACK_IMPORTED_MODULE_1__);
433
+ /* harmony import */ var _OCSpinner_module_css__WEBPACK_IMPORTED_MODULE_1__ = __webpack_require__(7);
434
+ /* harmony import */ var _OCSpinner_module_css__WEBPACK_IMPORTED_MODULE_1___default = /*#__PURE__*/__webpack_require__.n(_OCSpinner_module_css__WEBPACK_IMPORTED_MODULE_1__);
435
435
  /*!
436
436
  * Copyright 2024-Present Animoca Brands Corporation Ltd.
437
437
  *
@@ -1114,7 +1114,7 @@ function _toPrimitive(t, r) { if ("object" != _typeof(t) || !t) return t; var e
1114
1114
 
1115
1115
 
1116
1116
  var OCAuthCore = /*#__PURE__*/function () {
1117
- function OCAuthCore(clientId, loginEndpoint, redirectUri, transactionManager, tokenManager, referralCode, logoutEndPoint) {
1117
+ function OCAuthCore(clientId, loginEndpoint, redirectUri, transactionManager, tokenManager, referralCode, logoutEndPoint, emailPlaceholder) {
1118
1118
  _classCallCheck(this, OCAuthCore);
1119
1119
  _defineProperty(this, "clientId", void 0);
1120
1120
  _defineProperty(this, "tokenManager", void 0);
@@ -1124,6 +1124,7 @@ var OCAuthCore = /*#__PURE__*/function () {
1124
1124
  _defineProperty(this, "loginEndPoint", void 0);
1125
1125
  _defineProperty(this, "logoutEndPoint", void 0);
1126
1126
  _defineProperty(this, "referralCode", void 0);
1127
+ _defineProperty(this, "emailPlaceholder", void 0);
1127
1128
  if (!clientId) {
1128
1129
  throw new _utils_errors__WEBPACK_IMPORTED_MODULE_6__["InvalidParamsError"]('clientId is not defined');
1129
1130
  }
@@ -1134,6 +1135,7 @@ var OCAuthCore = /*#__PURE__*/function () {
1134
1135
  this.logoutEndPoint = logoutEndPoint;
1135
1136
  this.redirectUri = redirectUri;
1136
1137
  this.referralCode = referralCode;
1138
+ this.emailPlaceholder = emailPlaceholder;
1137
1139
  this.clientId = clientId;
1138
1140
  this.syncAuthInfo();
1139
1141
  }
@@ -1188,9 +1190,10 @@ var OCAuthCore = /*#__PURE__*/function () {
1188
1190
  meta = Object(_utils__WEBPACK_IMPORTED_MODULE_4__["createPkceMeta"])(signinParams);
1189
1191
  this.transactionManager.save(meta);
1190
1192
  signinParams.referralCode = this.referralCode;
1193
+ signinParams.emailPlaceholder = this.emailPlaceholder;
1191
1194
  requestUrl = Object(_endpoints__WEBPACK_IMPORTED_MODULE_5__["buildAuthEndpointUrl"])(signinParams, this.loginEndPoint);
1192
1195
  window.location.assign(requestUrl);
1193
- case 11:
1196
+ case 12:
1194
1197
  case "end":
1195
1198
  return _context2.stop();
1196
1199
  }
@@ -1328,7 +1331,8 @@ var OCAuthLive = /*#__PURE__*/function (_OCAuthCore2) {
1328
1331
  overridePublicKey = opts.publicKey,
1329
1332
  redirectUri = opts.redirectUri,
1330
1333
  referralCode = opts.referralCode,
1331
- clientId = opts.clientId;
1334
+ clientId = opts.clientId,
1335
+ emailPlaceholder = opts.emailPlaceholder;
1332
1336
  var tokenEndpoint = overrideTokenEndpoint || 'https://api.login.opencampus.xyz/auth/token';
1333
1337
  var loginEndpoint = overrideLoginEndpoint || 'https://api.login.opencampus.xyz/auth/login';
1334
1338
  var logoutEndpoint = overrideLogoutEndpoint || 'https://api.login.opencampus.xyz/auth/logout';
@@ -1336,7 +1340,7 @@ var OCAuthLive = /*#__PURE__*/function (_OCAuthCore2) {
1336
1340
  var storageClass = Object(_lib_StorageManager__WEBPACK_IMPORTED_MODULE_3__["getStorageClass"])(opts);
1337
1341
  var pkceTransactionManager = new _lib_TransactionManager__WEBPACK_IMPORTED_MODULE_2__["default"](storageClass);
1338
1342
  var tokenManager = new _lib_TokenManager__WEBPACK_IMPORTED_MODULE_1__["default"](storageClass, tokenEndpoint, publicKey);
1339
- return _callSuper(this, OCAuthLive, [clientId, loginEndpoint, redirectUri, pkceTransactionManager, tokenManager, referralCode, logoutEndpoint]);
1343
+ return _callSuper(this, OCAuthLive, [clientId, loginEndpoint, redirectUri, pkceTransactionManager, tokenManager, referralCode, logoutEndpoint, emailPlaceholder]);
1340
1344
  }
1341
1345
  _inherits(OCAuthLive, _OCAuthCore2);
1342
1346
  return _createClass(OCAuthLive);
@@ -1350,7 +1354,8 @@ var OCAuthSandbox = /*#__PURE__*/function (_OCAuthCore3) {
1350
1354
  overrideLogoutEndpoint = opts.logoutEndPoint,
1351
1355
  overridePublicKey = opts.publicKey,
1352
1356
  redirectUri = opts.redirectUri,
1353
- referralCode = opts.referralCode;
1357
+ referralCode = opts.referralCode,
1358
+ emailPlaceholder = opts.emailPlaceholder;
1354
1359
  var clientId = opts.clientId || 'sandbox';
1355
1360
  var tokenEndpoint = overrideTokenEndpoint || 'https://api.login.sandbox.opencampus.xyz/auth/token';
1356
1361
  var loginEndpoint = overrideLoginEndpoint || 'https://api.login.sandbox.opencampus.xyz/auth/login';
@@ -1359,7 +1364,7 @@ var OCAuthSandbox = /*#__PURE__*/function (_OCAuthCore3) {
1359
1364
  var storageClass = Object(_lib_StorageManager__WEBPACK_IMPORTED_MODULE_3__["getStorageClass"])(opts);
1360
1365
  var pkceTransactionManager = new _lib_TransactionManager__WEBPACK_IMPORTED_MODULE_2__["default"](storageClass);
1361
1366
  var tokenManager = new _lib_TokenManager__WEBPACK_IMPORTED_MODULE_1__["default"](storageClass, tokenEndpoint, publicKey);
1362
- return _callSuper(this, OCAuthSandbox, [clientId, loginEndpoint, redirectUri, pkceTransactionManager, tokenManager, referralCode, logoutEndpoint]);
1367
+ return _callSuper(this, OCAuthSandbox, [clientId, loginEndpoint, redirectUri, pkceTransactionManager, tokenManager, referralCode, logoutEndpoint, emailPlaceholder]);
1363
1368
  }
1364
1369
  _inherits(OCAuthSandbox, _OCAuthCore3);
1365
1370
  return _createClass(OCAuthSandbox);
@@ -2684,6 +2689,11 @@ var buildAuthEndpointUrl = function buildAuthEndpointUrl(signInParams, loginEndP
2684
2689
  if (signInParams.referralCode) {
2685
2690
  loginUrl.searchParams.append('ref', signInParams.referralCode);
2686
2691
  }
2692
+
2693
+ // email data for register workflow
2694
+ if (signInParams.emailPlaceholder) {
2695
+ loginUrl.searchParams.append('emailPlaceholder', signInParams.emailPlaceholder);
2696
+ }
2687
2697
  return loginUrl.href;
2688
2698
  };
2689
2699