@openfort/openfort-js 0.7.10 → 0.7.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +27 -17
- package/dist/index.d.ts +1 -1
- package/dist/index.js +27 -17
- package/package.json +1 -1
package/dist/index.cjs
CHANGED
|
@@ -1274,6 +1274,9 @@ const AuthenticationApiAxiosParamCreator = function (configuration) {
|
|
|
1274
1274
|
const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options };
|
|
1275
1275
|
const localVarHeaderParameter = {};
|
|
1276
1276
|
const localVarQueryParameter = {};
|
|
1277
|
+
// authentication pk required
|
|
1278
|
+
// http bearer authentication required
|
|
1279
|
+
await setBearerAuthToObject(localVarHeaderParameter, configuration);
|
|
1277
1280
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1278
1281
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
1279
1282
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
@@ -3109,7 +3112,7 @@ var OpenfortErrorType;
|
|
|
3109
3112
|
OpenfortErrorType["MISSING_SIGNER_ERROR"] = "MISSING_SIGNER_ERROR";
|
|
3110
3113
|
})(OpenfortErrorType || (OpenfortErrorType = {}));
|
|
3111
3114
|
function isAPIError(error) {
|
|
3112
|
-
return '
|
|
3115
|
+
return 'type' in error && 'message' in error;
|
|
3113
3116
|
}
|
|
3114
3117
|
class OpenfortError extends Error {
|
|
3115
3118
|
type;
|
|
@@ -4877,13 +4880,16 @@ class AuthManager {
|
|
|
4877
4880
|
return response.data;
|
|
4878
4881
|
}, OpenfortErrorType.USER_REGISTRATION_ERROR);
|
|
4879
4882
|
}
|
|
4880
|
-
async validateCredentials() {
|
|
4883
|
+
async validateCredentials(forceRefresh) {
|
|
4881
4884
|
const jwk = await this.instanceManager.getJWK();
|
|
4882
4885
|
const accessToken = this.instanceManager.getAccessToken()?.token;
|
|
4883
4886
|
const refreshToken = this.instanceManager.getRefreshToken();
|
|
4884
4887
|
if (!accessToken || !refreshToken || !jwk) {
|
|
4885
4888
|
throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
|
|
4886
4889
|
}
|
|
4890
|
+
if (forceRefresh) {
|
|
4891
|
+
return this.refreshTokens(refreshToken, forceRefresh);
|
|
4892
|
+
}
|
|
4887
4893
|
try {
|
|
4888
4894
|
const key = (await jose.importJWK({
|
|
4889
4895
|
kty: jwk.kty,
|
|
@@ -4900,23 +4906,27 @@ class AuthManager {
|
|
|
4900
4906
|
}
|
|
4901
4907
|
catch (error) {
|
|
4902
4908
|
if (error instanceof jose.errors.JWTExpired) {
|
|
4903
|
-
|
|
4904
|
-
refreshTokenRequest: {
|
|
4905
|
-
refreshToken,
|
|
4906
|
-
},
|
|
4907
|
-
};
|
|
4908
|
-
return withOpenfortError(async () => {
|
|
4909
|
-
const newToken = await this.backendApiClients.authenticationApi.refresh(request);
|
|
4910
|
-
return {
|
|
4911
|
-
player: newToken.data.player.id,
|
|
4912
|
-
accessToken: newToken.data.token,
|
|
4913
|
-
refreshToken: newToken.data.refreshToken,
|
|
4914
|
-
};
|
|
4915
|
-
}, OpenfortErrorType.REFRESH_TOKEN_ERROR);
|
|
4909
|
+
return this.refreshTokens(refreshToken);
|
|
4916
4910
|
}
|
|
4917
4911
|
throw error;
|
|
4918
4912
|
}
|
|
4919
4913
|
}
|
|
4914
|
+
async refreshTokens(refreshToken, forceRefresh) {
|
|
4915
|
+
const request = {
|
|
4916
|
+
refreshTokenRequest: {
|
|
4917
|
+
refreshToken,
|
|
4918
|
+
forceRefresh,
|
|
4919
|
+
},
|
|
4920
|
+
};
|
|
4921
|
+
return withOpenfortError(async () => {
|
|
4922
|
+
const response = await this.backendApiClients.authenticationApi.refresh(request);
|
|
4923
|
+
return {
|
|
4924
|
+
player: response.data.player.id,
|
|
4925
|
+
accessToken: response.data.token,
|
|
4926
|
+
refreshToken: response.data.refreshToken,
|
|
4927
|
+
};
|
|
4928
|
+
}, OpenfortErrorType.REFRESH_TOKEN_ERROR);
|
|
4929
|
+
}
|
|
4920
4930
|
async logout(accessToken, refreshToken) {
|
|
4921
4931
|
const request = {
|
|
4922
4932
|
logoutRequest: {
|
|
@@ -6408,13 +6418,13 @@ class Openfort {
|
|
|
6408
6418
|
/**
|
|
6409
6419
|
* Validates and refreshes the access token if needed.
|
|
6410
6420
|
*/
|
|
6411
|
-
async validateAndRefreshToken() {
|
|
6421
|
+
async validateAndRefreshToken(forceRefresh) {
|
|
6412
6422
|
const authType = this.credentialsProvided();
|
|
6413
6423
|
if (!authType) {
|
|
6414
6424
|
throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
|
|
6415
6425
|
}
|
|
6416
6426
|
if (authType === exports.AuthType.OPENFORT) {
|
|
6417
|
-
const auth = await this.authManager.validateCredentials();
|
|
6427
|
+
const auth = await this.authManager.validateCredentials(forceRefresh);
|
|
6418
6428
|
this.storeCredentials(auth);
|
|
6419
6429
|
if (this.signer && this.signer.useCredentials()) {
|
|
6420
6430
|
await this.signer.updateAuthentication();
|
package/dist/index.d.ts
CHANGED
|
@@ -823,7 +823,7 @@ declare class Openfort {
|
|
|
823
823
|
/**
|
|
824
824
|
* Validates and refreshes the access token if needed.
|
|
825
825
|
*/
|
|
826
|
-
validateAndRefreshToken(): Promise<void>;
|
|
826
|
+
validateAndRefreshToken(forceRefresh?: boolean): Promise<void>;
|
|
827
827
|
private credentialsProvided;
|
|
828
828
|
private recoverSigner;
|
|
829
829
|
private waitSigner;
|
package/dist/index.js
CHANGED
|
@@ -1251,6 +1251,9 @@ const AuthenticationApiAxiosParamCreator = function (configuration) {
|
|
|
1251
1251
|
const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options };
|
|
1252
1252
|
const localVarHeaderParameter = {};
|
|
1253
1253
|
const localVarQueryParameter = {};
|
|
1254
|
+
// authentication pk required
|
|
1255
|
+
// http bearer authentication required
|
|
1256
|
+
await setBearerAuthToObject(localVarHeaderParameter, configuration);
|
|
1254
1257
|
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
1255
1258
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
1256
1259
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
@@ -3086,7 +3089,7 @@ var OpenfortErrorType;
|
|
|
3086
3089
|
OpenfortErrorType["MISSING_SIGNER_ERROR"] = "MISSING_SIGNER_ERROR";
|
|
3087
3090
|
})(OpenfortErrorType || (OpenfortErrorType = {}));
|
|
3088
3091
|
function isAPIError(error) {
|
|
3089
|
-
return '
|
|
3092
|
+
return 'type' in error && 'message' in error;
|
|
3090
3093
|
}
|
|
3091
3094
|
class OpenfortError extends Error {
|
|
3092
3095
|
type;
|
|
@@ -4854,13 +4857,16 @@ class AuthManager {
|
|
|
4854
4857
|
return response.data;
|
|
4855
4858
|
}, OpenfortErrorType.USER_REGISTRATION_ERROR);
|
|
4856
4859
|
}
|
|
4857
|
-
async validateCredentials() {
|
|
4860
|
+
async validateCredentials(forceRefresh) {
|
|
4858
4861
|
const jwk = await this.instanceManager.getJWK();
|
|
4859
4862
|
const accessToken = this.instanceManager.getAccessToken()?.token;
|
|
4860
4863
|
const refreshToken = this.instanceManager.getRefreshToken();
|
|
4861
4864
|
if (!accessToken || !refreshToken || !jwk) {
|
|
4862
4865
|
throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
|
|
4863
4866
|
}
|
|
4867
|
+
if (forceRefresh) {
|
|
4868
|
+
return this.refreshTokens(refreshToken, forceRefresh);
|
|
4869
|
+
}
|
|
4864
4870
|
try {
|
|
4865
4871
|
const key = (await importJWK({
|
|
4866
4872
|
kty: jwk.kty,
|
|
@@ -4877,23 +4883,27 @@ class AuthManager {
|
|
|
4877
4883
|
}
|
|
4878
4884
|
catch (error) {
|
|
4879
4885
|
if (error instanceof errors.JWTExpired) {
|
|
4880
|
-
|
|
4881
|
-
refreshTokenRequest: {
|
|
4882
|
-
refreshToken,
|
|
4883
|
-
},
|
|
4884
|
-
};
|
|
4885
|
-
return withOpenfortError(async () => {
|
|
4886
|
-
const newToken = await this.backendApiClients.authenticationApi.refresh(request);
|
|
4887
|
-
return {
|
|
4888
|
-
player: newToken.data.player.id,
|
|
4889
|
-
accessToken: newToken.data.token,
|
|
4890
|
-
refreshToken: newToken.data.refreshToken,
|
|
4891
|
-
};
|
|
4892
|
-
}, OpenfortErrorType.REFRESH_TOKEN_ERROR);
|
|
4886
|
+
return this.refreshTokens(refreshToken);
|
|
4893
4887
|
}
|
|
4894
4888
|
throw error;
|
|
4895
4889
|
}
|
|
4896
4890
|
}
|
|
4891
|
+
async refreshTokens(refreshToken, forceRefresh) {
|
|
4892
|
+
const request = {
|
|
4893
|
+
refreshTokenRequest: {
|
|
4894
|
+
refreshToken,
|
|
4895
|
+
forceRefresh,
|
|
4896
|
+
},
|
|
4897
|
+
};
|
|
4898
|
+
return withOpenfortError(async () => {
|
|
4899
|
+
const response = await this.backendApiClients.authenticationApi.refresh(request);
|
|
4900
|
+
return {
|
|
4901
|
+
player: response.data.player.id,
|
|
4902
|
+
accessToken: response.data.token,
|
|
4903
|
+
refreshToken: response.data.refreshToken,
|
|
4904
|
+
};
|
|
4905
|
+
}, OpenfortErrorType.REFRESH_TOKEN_ERROR);
|
|
4906
|
+
}
|
|
4897
4907
|
async logout(accessToken, refreshToken) {
|
|
4898
4908
|
const request = {
|
|
4899
4909
|
logoutRequest: {
|
|
@@ -6385,13 +6395,13 @@ class Openfort {
|
|
|
6385
6395
|
/**
|
|
6386
6396
|
* Validates and refreshes the access token if needed.
|
|
6387
6397
|
*/
|
|
6388
|
-
async validateAndRefreshToken() {
|
|
6398
|
+
async validateAndRefreshToken(forceRefresh) {
|
|
6389
6399
|
const authType = this.credentialsProvided();
|
|
6390
6400
|
if (!authType) {
|
|
6391
6401
|
throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
|
|
6392
6402
|
}
|
|
6393
6403
|
if (authType === AuthType.OPENFORT) {
|
|
6394
|
-
const auth = await this.authManager.validateCredentials();
|
|
6404
|
+
const auth = await this.authManager.validateCredentials(forceRefresh);
|
|
6395
6405
|
this.storeCredentials(auth);
|
|
6396
6406
|
if (this.signer && this.signer.useCredentials()) {
|
|
6397
6407
|
await this.signer.updateAuthentication();
|
package/package.json
CHANGED