@oxyhq/services 5.7.4 → 5.7.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/README.md +121 -264
  2. package/lib/commonjs/core/auth-manager.js +440 -0
  3. package/lib/commonjs/core/auth-manager.js.map +1 -0
  4. package/lib/commonjs/core/index.js +102 -5
  5. package/lib/commonjs/core/index.js.map +1 -1
  6. package/lib/commonjs/core/use-auth.js +244 -0
  7. package/lib/commonjs/core/use-auth.js.map +1 -0
  8. package/lib/commonjs/node/index.js +2 -49
  9. package/lib/commonjs/node/index.js.map +1 -1
  10. package/lib/commonjs/ui/index.js +1 -16
  11. package/lib/commonjs/ui/index.js.map +1 -1
  12. package/lib/module/core/auth-manager.js +432 -0
  13. package/lib/module/core/auth-manager.js.map +1 -0
  14. package/lib/module/core/index.js +41 -5
  15. package/lib/module/core/index.js.map +1 -1
  16. package/lib/module/core/use-auth.js +235 -0
  17. package/lib/module/core/use-auth.js.map +1 -0
  18. package/lib/module/node/index.js +1 -11
  19. package/lib/module/node/index.js.map +1 -1
  20. package/lib/module/ui/index.js +1 -16
  21. package/lib/module/ui/index.js.map +1 -1
  22. package/lib/typescript/core/auth-manager.d.ts +136 -0
  23. package/lib/typescript/core/auth-manager.d.ts.map +1 -0
  24. package/lib/typescript/core/index.d.ts +24 -1
  25. package/lib/typescript/core/index.d.ts.map +1 -1
  26. package/lib/typescript/core/use-auth.d.ts +79 -0
  27. package/lib/typescript/core/use-auth.d.ts.map +1 -0
  28. package/lib/typescript/node/index.d.ts +1 -7
  29. package/lib/typescript/node/index.d.ts.map +1 -1
  30. package/lib/typescript/ui/index.d.ts +1 -2
  31. package/lib/typescript/ui/index.d.ts.map +1 -1
  32. package/package.json +4 -6
  33. package/src/__tests__/zero-config-auth.test.ts +607 -0
  34. package/src/core/auth-manager.ts +500 -0
  35. package/src/core/index.ts +41 -6
  36. package/src/core/use-auth.tsx +245 -0
  37. package/src/node/index.ts +1 -17
  38. package/src/ui/index.ts +1 -19
  39. package/lib/commonjs/node/middleware.js +0 -227
  40. package/lib/commonjs/node/middleware.js.map +0 -1
  41. package/lib/commonjs/ui/zero-config/index.js +0 -25
  42. package/lib/commonjs/ui/zero-config/index.js.map +0 -1
  43. package/lib/commonjs/ui/zero-config/provider.js +0 -278
  44. package/lib/commonjs/ui/zero-config/provider.js.map +0 -1
  45. package/lib/module/node/middleware.js +0 -199
  46. package/lib/module/node/middleware.js.map +0 -1
  47. package/lib/module/ui/zero-config/index.js +0 -8
  48. package/lib/module/ui/zero-config/index.js.map +0 -1
  49. package/lib/module/ui/zero-config/provider.js +0 -270
  50. package/lib/module/ui/zero-config/provider.js.map +0 -1
  51. package/lib/typescript/node/middleware.d.ts +0 -92
  52. package/lib/typescript/node/middleware.d.ts.map +0 -1
  53. package/lib/typescript/ui/zero-config/index.d.ts +0 -5
  54. package/lib/typescript/ui/zero-config/index.d.ts.map +0 -1
  55. package/lib/typescript/ui/zero-config/provider.d.ts +0 -84
  56. package/lib/typescript/ui/zero-config/provider.d.ts.map +0 -1
  57. package/src/node/middleware.ts +0 -234
  58. package/src/ui/zero-config/index.ts +0 -11
  59. package/src/ui/zero-config/provider.tsx +0 -310
@@ -0,0 +1,500 @@
1
+ /**
2
+ * Zero-Config Authentication Manager
3
+ *
4
+ * This module provides automatic token management, session handling,
5
+ * and seamless authentication for Oxy services.
6
+ */
7
+
8
+ import axios, { AxiosInstance, AxiosError, InternalAxiosRequestConfig } from 'axios';
9
+ import { jwtDecode } from 'jwt-decode';
10
+ import AsyncStorage from '@react-native-async-storage/async-storage';
11
+
12
+ interface AuthTokens {
13
+ accessToken: string;
14
+ refreshToken: string;
15
+ }
16
+
17
+ interface JwtPayload {
18
+ exp: number;
19
+ userId: string;
20
+ username: string;
21
+ [key: string]: any;
22
+ }
23
+
24
+ interface AuthState {
25
+ isAuthenticated: boolean;
26
+ user: any | null;
27
+ tokens: AuthTokens | null;
28
+ }
29
+
30
+ interface LoginCredentials {
31
+ username: string;
32
+ password: string;
33
+ }
34
+
35
+ interface LoginResponse {
36
+ success: boolean;
37
+ accessToken: string;
38
+ refreshToken: string;
39
+ user: any;
40
+ message?: string; // Make message optional
41
+ }
42
+
43
+ export class AuthenticationManager {
44
+ private client: AxiosInstance;
45
+ private tokens: AuthTokens | null = null;
46
+ private user: any | null = null;
47
+ private refreshPromise: Promise<AuthTokens> | null = null;
48
+ private listeners: ((state: AuthState) => void)[] = [];
49
+ private storageKey = '@oxy/auth-tokens';
50
+
51
+ constructor(baseURL: string) {
52
+ this.client = axios.create({
53
+ baseURL,
54
+ timeout: 15000,
55
+ withCredentials: true, // Enable cookies for session management
56
+ });
57
+
58
+ this.setupInterceptors();
59
+ this.initializeFromStorage();
60
+ }
61
+
62
+ /**
63
+ * Setup axios interceptors for automatic token management
64
+ */
65
+ private setupInterceptors(): void {
66
+ // Request interceptor - automatically add auth headers
67
+ this.client.interceptors.request.use(
68
+ async (config: InternalAxiosRequestConfig) => {
69
+ // Skip auth for login/signup endpoints
70
+ if (this.isPublicEndpoint(config.url || '')) {
71
+ return config;
72
+ }
73
+
74
+ // Ensure we have a valid token
75
+ await this.ensureValidToken();
76
+
77
+ // Add authorization header if we have a token
78
+ if (this.tokens?.accessToken) {
79
+ config.headers = config.headers || {};
80
+ config.headers.Authorization = `Bearer ${this.tokens.accessToken}`;
81
+ }
82
+
83
+ return config;
84
+ },
85
+ (error) => Promise.reject(error)
86
+ );
87
+
88
+ // Response interceptor - handle token expiration and auto-retry
89
+ this.client.interceptors.response.use(
90
+ (response) => response,
91
+ async (error: AxiosError) => {
92
+ const originalRequest = error.config as InternalAxiosRequestConfig & { _retry?: boolean };
93
+
94
+ // If it's a 401 and we haven't already retried, attempt token refresh
95
+ if (
96
+ error.response?.status === 401 &&
97
+ !originalRequest._retry &&
98
+ this.tokens?.refreshToken &&
99
+ !this.isPublicEndpoint(originalRequest?.url || '')
100
+ ) {
101
+ originalRequest._retry = true;
102
+
103
+ try {
104
+ await this.refreshTokens();
105
+
106
+ // Retry original request with new token
107
+ if (originalRequest && this.tokens?.accessToken) {
108
+ originalRequest.headers = originalRequest.headers || {};
109
+ originalRequest.headers.Authorization = `Bearer ${this.tokens.accessToken}`;
110
+ return this.client(originalRequest);
111
+ }
112
+ } catch (refreshError) {
113
+ // Refresh failed, clear tokens and notify listeners
114
+ await this.logout();
115
+ return Promise.reject(error);
116
+ }
117
+ }
118
+
119
+ // For non-auth errors or failed retries, reject with formatted error
120
+ return Promise.reject(this.formatError(error));
121
+ }
122
+ );
123
+ }
124
+
125
+ /**
126
+ * Check if endpoint is public (doesn't require authentication)
127
+ */
128
+ private isPublicEndpoint(url: string): boolean {
129
+ const publicPaths = [
130
+ '/auth/login',
131
+ '/auth/signup',
132
+ '/auth/register',
133
+ '/auth/check-username',
134
+ '/auth/check-email',
135
+ '/health',
136
+ '/'
137
+ ];
138
+
139
+ return publicPaths.some(path => url.includes(path));
140
+ }
141
+
142
+ /**
143
+ * Initialize authentication state from persistent storage
144
+ */
145
+ private async initializeFromStorage(): Promise<void> {
146
+ try {
147
+ const storedData = await AsyncStorage.getItem(this.storageKey);
148
+ if (storedData) {
149
+ const tokens = JSON.parse(storedData) as AuthTokens;
150
+
151
+ // Validate that tokens haven't expired
152
+ if (await this.validateStoredTokens(tokens)) {
153
+ this.tokens = tokens;
154
+ await this.fetchCurrentUser();
155
+ this.notifyStateChange();
156
+ } else {
157
+ // Tokens expired, clear storage
158
+ await AsyncStorage.removeItem(this.storageKey);
159
+ }
160
+ }
161
+ } catch (error) {
162
+ console.warn('[OxyAuth] Failed to initialize from storage:', error);
163
+ await AsyncStorage.removeItem(this.storageKey);
164
+ }
165
+ }
166
+
167
+ /**
168
+ * Validate stored tokens without making network calls if possible
169
+ */
170
+ private async validateStoredTokens(tokens: AuthTokens): Promise<boolean> {
171
+ try {
172
+ // First check if access token is expired
173
+ const decoded = jwtDecode<JwtPayload>(tokens.accessToken);
174
+ const now = Math.floor(Date.now() / 1000);
175
+
176
+ // If access token is still valid, we're good
177
+ if (decoded.exp > now + 60) { // 60 second buffer
178
+ return true;
179
+ }
180
+
181
+ // Access token expired, try refresh token
182
+ const refreshDecoded = jwtDecode<JwtPayload>(tokens.refreshToken);
183
+ return refreshDecoded.exp > now;
184
+ } catch {
185
+ return false;
186
+ }
187
+ }
188
+
189
+ /**
190
+ * Ensure we have a valid access token
191
+ */
192
+ private async ensureValidToken(): Promise<void> {
193
+ if (!this.tokens?.accessToken) {
194
+ return;
195
+ }
196
+
197
+ try {
198
+ const decoded = jwtDecode<JwtPayload>(this.tokens.accessToken);
199
+ const now = Math.floor(Date.now() / 1000);
200
+
201
+ // Refresh if token expires within 5 minutes
202
+ if (decoded.exp - now < 300) {
203
+ await this.refreshTokens();
204
+ }
205
+ } catch (error) {
206
+ console.warn('[OxyAuth] Token validation error:', error);
207
+ // If token is malformed, try refresh
208
+ if (this.tokens?.refreshToken) {
209
+ await this.refreshTokens();
210
+ }
211
+ }
212
+ }
213
+
214
+ /**
215
+ * Login with credentials
216
+ */
217
+ async login(credentials: LoginCredentials): Promise<LoginResponse> {
218
+ try {
219
+ const response = await this.client.post('/auth/login', credentials);
220
+ const loginData = response.data as LoginResponse;
221
+
222
+ if (loginData.success && loginData.accessToken && loginData.refreshToken) {
223
+ await this.setTokens({
224
+ accessToken: loginData.accessToken,
225
+ refreshToken: loginData.refreshToken,
226
+ });
227
+
228
+ this.user = loginData.user;
229
+ this.notifyStateChange();
230
+
231
+ return loginData;
232
+ } else {
233
+ throw new Error(loginData.message || 'Login failed');
234
+ }
235
+ } catch (error) {
236
+ throw this.formatError(error);
237
+ }
238
+ }
239
+
240
+ /**
241
+ * Register new user
242
+ */
243
+ async register(userData: { username: string; email: string; password: string }): Promise<LoginResponse> {
244
+ try {
245
+ const response = await this.client.post('/auth/register', userData);
246
+ const registerData = response.data as LoginResponse;
247
+
248
+ if (registerData.success && registerData.accessToken && registerData.refreshToken) {
249
+ await this.setTokens({
250
+ accessToken: registerData.accessToken,
251
+ refreshToken: registerData.refreshToken,
252
+ });
253
+
254
+ this.user = registerData.user;
255
+ this.notifyStateChange();
256
+
257
+ return registerData;
258
+ } else {
259
+ throw new Error(registerData.message || 'Registration failed');
260
+ }
261
+ } catch (error) {
262
+ throw this.formatError(error);
263
+ }
264
+ }
265
+
266
+ /**
267
+ * Logout user and clear all tokens
268
+ */
269
+ async logout(): Promise<void> {
270
+ // Attempt server-side logout if we have tokens
271
+ if (this.tokens?.refreshToken) {
272
+ try {
273
+ await this.client.post('/auth/logout', {
274
+ refreshToken: this.tokens.refreshToken,
275
+ });
276
+ } catch (error) {
277
+ console.warn('[OxyAuth] Server logout failed:', error);
278
+ }
279
+ }
280
+
281
+ // Clear local state
282
+ this.tokens = null;
283
+ this.user = null;
284
+
285
+ // Clear storage
286
+ try {
287
+ await AsyncStorage.removeItem(this.storageKey);
288
+ } catch (error) {
289
+ console.warn('[OxyAuth] Failed to clear storage:', error);
290
+ }
291
+
292
+ this.notifyStateChange();
293
+ }
294
+
295
+ /**
296
+ * Refresh access token using refresh token
297
+ */
298
+ private async refreshTokens(): Promise<AuthTokens> {
299
+ if (!this.tokens?.refreshToken) {
300
+ throw new Error('No refresh token available');
301
+ }
302
+
303
+ // If refresh is already in progress, return that promise
304
+ if (this.refreshPromise) {
305
+ return this.refreshPromise;
306
+ }
307
+
308
+ this.refreshPromise = this.performTokenRefresh();
309
+
310
+ try {
311
+ const newTokens = await this.refreshPromise;
312
+ this.refreshPromise = null;
313
+ return newTokens;
314
+ } catch (error) {
315
+ this.refreshPromise = null;
316
+ throw error;
317
+ }
318
+ }
319
+
320
+ /**
321
+ * Perform the actual token refresh
322
+ */
323
+ private async performTokenRefresh(): Promise<AuthTokens> {
324
+ try {
325
+ const response = await this.client.post('/auth/refresh', {
326
+ refreshToken: this.tokens!.refreshToken,
327
+ });
328
+
329
+ const newTokens: AuthTokens = {
330
+ accessToken: response.data.accessToken,
331
+ refreshToken: response.data.refreshToken,
332
+ };
333
+
334
+ await this.setTokens(newTokens);
335
+ return newTokens;
336
+ } catch (error) {
337
+ // Refresh failed, clear all tokens
338
+ await this.logout();
339
+ throw this.formatError(error);
340
+ }
341
+ }
342
+
343
+ /**
344
+ * Set tokens and persist to storage
345
+ */
346
+ private async setTokens(newTokens: AuthTokens): Promise<void> {
347
+ this.tokens = newTokens;
348
+
349
+ try {
350
+ await AsyncStorage.setItem(this.storageKey, JSON.stringify(newTokens));
351
+ } catch (error) {
352
+ console.warn('[OxyAuth] Failed to persist tokens:', error);
353
+ }
354
+ }
355
+
356
+ /**
357
+ * Fetch current user profile
358
+ */
359
+ private async fetchCurrentUser(): Promise<void> {
360
+ try {
361
+ const response = await this.client.get('/auth/me');
362
+ this.user = response.data.data || response.data;
363
+ } catch (error) {
364
+ console.warn('[OxyAuth] Failed to fetch current user:', error);
365
+ // Don't throw here, we can still function without user profile
366
+ }
367
+ }
368
+
369
+ /**
370
+ * Get current authentication state
371
+ */
372
+ getAuthState(): AuthState {
373
+ return {
374
+ isAuthenticated: !!(this.tokens?.accessToken),
375
+ user: this.user,
376
+ tokens: this.tokens,
377
+ };
378
+ }
379
+
380
+ /**
381
+ * Get current user (loads if not cached)
382
+ */
383
+ async getCurrentUser(): Promise<any> {
384
+ if (!this.tokens?.accessToken) {
385
+ throw new Error('Not authenticated');
386
+ }
387
+
388
+ if (!this.user) {
389
+ await this.fetchCurrentUser();
390
+ }
391
+
392
+ return this.user;
393
+ }
394
+
395
+ /**
396
+ * Subscribe to authentication state changes
397
+ */
398
+ onAuthStateChange(callback: (state: AuthState) => void): () => void {
399
+ this.listeners.push(callback);
400
+
401
+ // Immediately call with current state
402
+ callback(this.getAuthState());
403
+
404
+ // Return unsubscribe function
405
+ return () => {
406
+ this.listeners = this.listeners.filter(listener => listener !== callback);
407
+ };
408
+ }
409
+
410
+ /**
411
+ * Notify all listeners of state changes
412
+ */
413
+ private notifyStateChange(): void {
414
+ const state = this.getAuthState();
415
+ this.listeners.forEach(listener => {
416
+ try {
417
+ listener(state);
418
+ } catch (error) {
419
+ console.error('[OxyAuth] Listener error:', error);
420
+ }
421
+ });
422
+ }
423
+
424
+ /**
425
+ * Format error responses consistently
426
+ */
427
+ private formatError(error: any): Error {
428
+ if (error?.response?.data?.message) {
429
+ return new Error(error.response.data.message);
430
+ }
431
+
432
+ if (error?.message) {
433
+ return new Error(error.message);
434
+ }
435
+
436
+ return new Error('An unexpected error occurred');
437
+ }
438
+
439
+ /**
440
+ * Get authenticated HTTP client for making API calls
441
+ */
442
+ getClient(): AxiosInstance {
443
+ return this.client;
444
+ }
445
+
446
+ /**
447
+ * Check username availability
448
+ */
449
+ async checkUsernameAvailability(username: string): Promise<{ available: boolean; message: string }> {
450
+ try {
451
+ const response = await this.client.get(`/auth/check-username/${encodeURIComponent(username)}`);
452
+ return response.data;
453
+ } catch (error) {
454
+ const axiosError = error as AxiosError;
455
+ if (axiosError?.response?.status === 400) {
456
+ return (axiosError.response as any).data;
457
+ }
458
+ throw this.formatError(error);
459
+ }
460
+ }
461
+
462
+ /**
463
+ * Check email availability
464
+ */
465
+ async checkEmailAvailability(email: string): Promise<{ available: boolean; message: string }> {
466
+ try {
467
+ const response = await this.client.post('/auth/check-email', { email });
468
+ return response.data;
469
+ } catch (error) {
470
+ const axiosError = error as AxiosError;
471
+ if (axiosError?.response?.status === 400) {
472
+ return (axiosError.response as any).data;
473
+ }
474
+ throw this.formatError(error);
475
+ }
476
+ }
477
+ }
478
+
479
+ // Global auth manager instance
480
+ let globalAuthManager: AuthenticationManager | null = null;
481
+
482
+ /**
483
+ * Initialize global authentication manager
484
+ */
485
+ export function initializeAuth(baseURL: string): AuthenticationManager {
486
+ if (!globalAuthManager) {
487
+ globalAuthManager = new AuthenticationManager(baseURL);
488
+ }
489
+ return globalAuthManager;
490
+ }
491
+
492
+ /**
493
+ * Get global authentication manager instance
494
+ */
495
+ export function getAuthManager(): AuthenticationManager {
496
+ if (!globalAuthManager) {
497
+ throw new Error('Authentication manager not initialized. Call initializeAuth() first.');
498
+ }
499
+ return globalAuthManager;
500
+ }
package/src/core/index.ts CHANGED
@@ -1,6 +1,10 @@
1
1
  import axios, { AxiosInstance, AxiosError, AxiosRequestConfig, InternalAxiosRequestConfig } from 'axios';
2
2
  import { jwtDecode } from 'jwt-decode';
3
3
 
4
+ // Zero-Config Authentication Exports
5
+ export { AuthenticationManager, initializeAuth, getAuthManager } from './auth-manager';
6
+ export { AuthProvider, useAuth, useOxyClient, useAuthStatus, useCurrentUser, withAuth } from './use-auth';
7
+
4
8
  // Remove all FormData, form-data, and polyfill logic. Delete uploadFile and uploadFiles methods. Add a comment to use the new raw upload approach instead.
5
9
 
6
10
  import {
@@ -40,6 +44,7 @@ import {
40
44
 
41
45
  // Import secure session types
42
46
  import { SecureLoginResponse, SecureClientSession } from '../models/secureSession';
47
+ import { AuthenticationManager, initializeAuth } from './auth-manager';
43
48
 
44
49
  /**
45
50
  * Default cloud URL for Oxy services, cloud is where the user files are. (e.g. images, videos, etc.). Not the API.
@@ -59,7 +64,23 @@ interface JwtPayload {
59
64
  /**
60
65
  * OxyServices - Client library for interacting with the Oxy API
61
66
  *
62
- * Note: For authentication status in UI components, use `isAuthenticated` from useOxy() context
67
+ * ZERO-CONFIG MODE:
68
+ * Use the new AuthProvider and useAuth hooks for automatic authentication management:
69
+ *
70
+ * import { AuthProvider, useAuth } from '@oxyhq/services';
71
+ *
72
+ * <AuthProvider baseURL="https://api.oxy.so">
73
+ * <App />
74
+ * </AuthProvider>
75
+ *
76
+ * Then in components:
77
+ * const { login, user, isAuthenticated } = useAuth();
78
+ *
79
+ * LEGACY MODE:
80
+ * The OxyServices class below is maintained for backward compatibility
81
+ * but we recommend migrating to the new zero-config approach.
82
+ *
83
+ * Note: For authentication status in UI components, use `isAuthenticated` from useAuth() context
63
84
  * instead of checking token status directly on this service.
64
85
  */
65
86
  export class OxyServices {
@@ -67,17 +88,31 @@ export class OxyServices {
67
88
  private accessToken: string | null = null;
68
89
  private refreshToken: string | null = null;
69
90
  private refreshPromise: Promise<{ accessToken: string; refreshToken: string }> | null = null;
91
+ private authManager: AuthenticationManager | null = null;
70
92
 
71
93
  /**
72
94
  * Creates a new instance of the OxyServices client
73
95
  * @param config - Configuration for the client
74
96
  */
75
97
  constructor(config: OxyConfig) {
76
- this.client = axios.create({
77
- baseURL: config.baseURL,
78
- timeout: 10000 // 10 second timeout
79
- });
80
-
98
+ // Try to use the new auth manager if available, otherwise fall back to legacy mode
99
+ try {
100
+ this.authManager = initializeAuth(config.baseURL);
101
+ this.client = this.authManager.getClient();
102
+ } catch {
103
+ // Fall back to legacy implementation
104
+ this.client = axios.create({
105
+ baseURL: config.baseURL,
106
+ timeout: 10000 // 10 second timeout
107
+ });
108
+ this.setupLegacyInterceptors();
109
+ }
110
+ }
111
+
112
+ /**
113
+ * Setup legacy interceptors (only used if auth manager is not available)
114
+ */
115
+ private setupLegacyInterceptors(): void {
81
116
  // Interceptor for adding auth header and handling token refresh
82
117
  this.client.interceptors.request.use(async (req: InternalAxiosRequestConfig) => {
83
118
  if (!this.accessToken) {