@openfort/openfort-js 0.7.10 → 0.7.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.cjs CHANGED
@@ -1274,6 +1274,9 @@ const AuthenticationApiAxiosParamCreator = function (configuration) {
1274
1274
  const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options };
1275
1275
  const localVarHeaderParameter = {};
1276
1276
  const localVarQueryParameter = {};
1277
+ // authentication pk required
1278
+ // http bearer authentication required
1279
+ await setBearerAuthToObject(localVarHeaderParameter, configuration);
1277
1280
  localVarHeaderParameter['Content-Type'] = 'application/json';
1278
1281
  setSearchParams(localVarUrlObj, localVarQueryParameter);
1279
1282
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
@@ -3109,7 +3112,7 @@ var OpenfortErrorType;
3109
3112
  OpenfortErrorType["MISSING_SIGNER_ERROR"] = "MISSING_SIGNER_ERROR";
3110
3113
  })(OpenfortErrorType || (OpenfortErrorType = {}));
3111
3114
  function isAPIError(error) {
3112
- return 'code' in error && 'message' in error;
3115
+ return 'type' in error && 'message' in error;
3113
3116
  }
3114
3117
  class OpenfortError extends Error {
3115
3118
  type;
@@ -4877,13 +4880,16 @@ class AuthManager {
4877
4880
  return response.data;
4878
4881
  }, OpenfortErrorType.USER_REGISTRATION_ERROR);
4879
4882
  }
4880
- async validateCredentials() {
4883
+ async validateCredentials(forceRefresh) {
4881
4884
  const jwk = await this.instanceManager.getJWK();
4882
4885
  const accessToken = this.instanceManager.getAccessToken()?.token;
4883
4886
  const refreshToken = this.instanceManager.getRefreshToken();
4884
4887
  if (!accessToken || !refreshToken || !jwk) {
4885
4888
  throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
4886
4889
  }
4890
+ if (forceRefresh) {
4891
+ return this.refreshTokens(refreshToken, forceRefresh);
4892
+ }
4887
4893
  try {
4888
4894
  const key = (await jose.importJWK({
4889
4895
  kty: jwk.kty,
@@ -4900,23 +4906,27 @@ class AuthManager {
4900
4906
  }
4901
4907
  catch (error) {
4902
4908
  if (error instanceof jose.errors.JWTExpired) {
4903
- const request = {
4904
- refreshTokenRequest: {
4905
- refreshToken,
4906
- },
4907
- };
4908
- return withOpenfortError(async () => {
4909
- const newToken = await this.backendApiClients.authenticationApi.refresh(request);
4910
- return {
4911
- player: newToken.data.player.id,
4912
- accessToken: newToken.data.token,
4913
- refreshToken: newToken.data.refreshToken,
4914
- };
4915
- }, OpenfortErrorType.REFRESH_TOKEN_ERROR);
4909
+ return this.refreshTokens(refreshToken);
4916
4910
  }
4917
4911
  throw error;
4918
4912
  }
4919
4913
  }
4914
+ async refreshTokens(refreshToken, forceRefresh) {
4915
+ const request = {
4916
+ refreshTokenRequest: {
4917
+ refreshToken,
4918
+ forceRefresh,
4919
+ },
4920
+ };
4921
+ return withOpenfortError(async () => {
4922
+ const response = await this.backendApiClients.authenticationApi.refresh(request);
4923
+ return {
4924
+ player: response.data.player.id,
4925
+ accessToken: response.data.token,
4926
+ refreshToken: response.data.refreshToken,
4927
+ };
4928
+ }, OpenfortErrorType.REFRESH_TOKEN_ERROR);
4929
+ }
4920
4930
  async logout(accessToken, refreshToken) {
4921
4931
  const request = {
4922
4932
  logoutRequest: {
@@ -6408,13 +6418,13 @@ class Openfort {
6408
6418
  /**
6409
6419
  * Validates and refreshes the access token if needed.
6410
6420
  */
6411
- async validateAndRefreshToken() {
6421
+ async validateAndRefreshToken(forceRefresh) {
6412
6422
  const authType = this.credentialsProvided();
6413
6423
  if (!authType) {
6414
6424
  throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
6415
6425
  }
6416
6426
  if (authType === exports.AuthType.OPENFORT) {
6417
- const auth = await this.authManager.validateCredentials();
6427
+ const auth = await this.authManager.validateCredentials(forceRefresh);
6418
6428
  this.storeCredentials(auth);
6419
6429
  if (this.signer && this.signer.useCredentials()) {
6420
6430
  await this.signer.updateAuthentication();
package/dist/index.d.ts CHANGED
@@ -823,7 +823,7 @@ declare class Openfort {
823
823
  /**
824
824
  * Validates and refreshes the access token if needed.
825
825
  */
826
- validateAndRefreshToken(): Promise<void>;
826
+ validateAndRefreshToken(forceRefresh?: boolean): Promise<void>;
827
827
  private credentialsProvided;
828
828
  private recoverSigner;
829
829
  private waitSigner;
package/dist/index.js CHANGED
@@ -1251,6 +1251,9 @@ const AuthenticationApiAxiosParamCreator = function (configuration) {
1251
1251
  const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options };
1252
1252
  const localVarHeaderParameter = {};
1253
1253
  const localVarQueryParameter = {};
1254
+ // authentication pk required
1255
+ // http bearer authentication required
1256
+ await setBearerAuthToObject(localVarHeaderParameter, configuration);
1254
1257
  localVarHeaderParameter['Content-Type'] = 'application/json';
1255
1258
  setSearchParams(localVarUrlObj, localVarQueryParameter);
1256
1259
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
@@ -3086,7 +3089,7 @@ var OpenfortErrorType;
3086
3089
  OpenfortErrorType["MISSING_SIGNER_ERROR"] = "MISSING_SIGNER_ERROR";
3087
3090
  })(OpenfortErrorType || (OpenfortErrorType = {}));
3088
3091
  function isAPIError(error) {
3089
- return 'code' in error && 'message' in error;
3092
+ return 'type' in error && 'message' in error;
3090
3093
  }
3091
3094
  class OpenfortError extends Error {
3092
3095
  type;
@@ -4854,13 +4857,16 @@ class AuthManager {
4854
4857
  return response.data;
4855
4858
  }, OpenfortErrorType.USER_REGISTRATION_ERROR);
4856
4859
  }
4857
- async validateCredentials() {
4860
+ async validateCredentials(forceRefresh) {
4858
4861
  const jwk = await this.instanceManager.getJWK();
4859
4862
  const accessToken = this.instanceManager.getAccessToken()?.token;
4860
4863
  const refreshToken = this.instanceManager.getRefreshToken();
4861
4864
  if (!accessToken || !refreshToken || !jwk) {
4862
4865
  throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
4863
4866
  }
4867
+ if (forceRefresh) {
4868
+ return this.refreshTokens(refreshToken, forceRefresh);
4869
+ }
4864
4870
  try {
4865
4871
  const key = (await importJWK({
4866
4872
  kty: jwk.kty,
@@ -4877,23 +4883,27 @@ class AuthManager {
4877
4883
  }
4878
4884
  catch (error) {
4879
4885
  if (error instanceof errors.JWTExpired) {
4880
- const request = {
4881
- refreshTokenRequest: {
4882
- refreshToken,
4883
- },
4884
- };
4885
- return withOpenfortError(async () => {
4886
- const newToken = await this.backendApiClients.authenticationApi.refresh(request);
4887
- return {
4888
- player: newToken.data.player.id,
4889
- accessToken: newToken.data.token,
4890
- refreshToken: newToken.data.refreshToken,
4891
- };
4892
- }, OpenfortErrorType.REFRESH_TOKEN_ERROR);
4886
+ return this.refreshTokens(refreshToken);
4893
4887
  }
4894
4888
  throw error;
4895
4889
  }
4896
4890
  }
4891
+ async refreshTokens(refreshToken, forceRefresh) {
4892
+ const request = {
4893
+ refreshTokenRequest: {
4894
+ refreshToken,
4895
+ forceRefresh,
4896
+ },
4897
+ };
4898
+ return withOpenfortError(async () => {
4899
+ const response = await this.backendApiClients.authenticationApi.refresh(request);
4900
+ return {
4901
+ player: response.data.player.id,
4902
+ accessToken: response.data.token,
4903
+ refreshToken: response.data.refreshToken,
4904
+ };
4905
+ }, OpenfortErrorType.REFRESH_TOKEN_ERROR);
4906
+ }
4897
4907
  async logout(accessToken, refreshToken) {
4898
4908
  const request = {
4899
4909
  logoutRequest: {
@@ -6385,13 +6395,13 @@ class Openfort {
6385
6395
  /**
6386
6396
  * Validates and refreshes the access token if needed.
6387
6397
  */
6388
- async validateAndRefreshToken() {
6398
+ async validateAndRefreshToken(forceRefresh) {
6389
6399
  const authType = this.credentialsProvided();
6390
6400
  if (!authType) {
6391
6401
  throw new OpenfortError('Must be logged in to validate and refresh token', OpenfortErrorType.NOT_LOGGED_IN_ERROR);
6392
6402
  }
6393
6403
  if (authType === AuthType.OPENFORT) {
6394
- const auth = await this.authManager.validateCredentials();
6404
+ const auth = await this.authManager.validateCredentials(forceRefresh);
6395
6405
  this.storeCredentials(auth);
6396
6406
  if (this.signer && this.signer.useCredentials()) {
6397
6407
  await this.signer.updateAuthentication();
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@openfort/openfort-js",
3
- "version": "0.7.10",
3
+ "version": "0.7.11",
4
4
  "author": "Openfort (https://www.openfort.xyz)",
5
5
  "bugs": "https://github.com/openfort-xyz/openfort-js/issues",
6
6
  "repository": "openfort-xyz/openfort-js.git",